[RFC] Prohibits configuring WEP when HT enabled

Yogesh Ashok Powar yogeshp at marvell.com
Fri Oct 22 07:49:13 EDT 2010


Keeping security policy as WEP is not allowed When 11n enabled. According to 11n
test plan version 2.0.8 (refer, test case 4.2.45). This will prevent beacons
generation with HT and WEP both enabled.

Signed-off-by: Yogesh Ashok Powar <yogeshp at marvell.com>
---
 hostapd/config_file.c |   10 ++++++++++
 1 files changed, 10 insertions(+), 0 deletions(-)

diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index a6a3e5c..35826f3 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -1089,6 +1089,16 @@ static int hostapd_config_check_bss(struct hostapd_bss_config *bss,
 #endif /* CONFIG_IEEE80211R */
 
 #ifdef CONFIG_IEEE80211N
+	if (conf->ieee80211n && 
+		(bss->ssid.security_policy == SECURITY_STATIC_WEP)) {
+
+		wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WEP "
+			   "does not allowed");
+		return -1;
+	}
+#endif /* CONFIG_IEEE80211N */
+
+#ifdef CONFIG_IEEE80211N
 	if (conf->ieee80211n && bss->wpa &&
 	    !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
 	    !(bss->rsn_pairwise & WPA_CIPHER_CCMP)) {
-- 
1.5.4.3




More information about the HostAP mailing list