[RFC] Prohibits configuring WEP when HT enabled
Yogesh Ashok Powar
yogeshp
Fri Oct 22 04:49:13 PDT 2010
Keeping security policy as WEP is not allowed When 11n enabled. According to 11n
test plan version 2.0.8 (refer, test case 4.2.45). This will prevent beacons
generation with HT and WEP both enabled.
Signed-off-by: Yogesh Ashok Powar <yogeshp at marvell.com>
---
hostapd/config_file.c | 10 ++++++++++
1 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index a6a3e5c..35826f3 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -1089,6 +1089,16 @@ static int hostapd_config_check_bss(struct hostapd_bss_config *bss,
#endif /* CONFIG_IEEE80211R */
#ifdef CONFIG_IEEE80211N
+ if (conf->ieee80211n &&
+ (bss->ssid.security_policy == SECURITY_STATIC_WEP)) {
+
+ wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WEP "
+ "does not allowed");
+ return -1;
+ }
+#endif /* CONFIG_IEEE80211N */
+
+#ifdef CONFIG_IEEE80211N
if (conf->ieee80211n && bss->wpa &&
!(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
!(bss->rsn_pairwise & WPA_CIPHER_CCMP)) {
--
1.5.4.3
More information about the Hostap
mailing list