aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd/config_file.c
diff options
context:
space:
mode:
authorDmitry Shmidt <dimitrysh@google.com>2013-04-24 12:57:01 -0700
committerDmitry Shmidt <dimitrysh@google.com>2013-04-24 12:57:01 -0700
commit8da800a193fb6f8832218715f82a7b4e2d2ad338 (patch)
treef41eaa6909b85c49449e1b02385b9af9a09348f7 /hostapd/config_file.c
parent2a96702ab0ec3e15ac53558a051c393d66c1c51e (diff)
downloadandroid_external_wpa_supplicant_8-8da800a193fb6f8832218715f82a7b4e2d2ad338.tar.gz
android_external_wpa_supplicant_8-8da800a193fb6f8832218715f82a7b4e2d2ad338.tar.bz2
android_external_wpa_supplicant_8-8da800a193fb6f8832218715f82a7b4e2d2ad338.zip
Accumulative patch from commit 97279d8d1ad40bd7d884af8e2fc26dff0163331a
97279d8 nl80211: Drop frame events that are for foreign address cc2ada8 nl80211: Reduce debug on Probe Request frames 63a965c P2P: Fix after_scan_tx processing during ongoing operations 06b7f58 RSN: Update preauth scan results only based on new scan results 18e00b5 Move wpa_s freeing into wpa_supplicant_deinit_iface() 754632c dbus_new: Add EAP logon/logoff c2aff6b hostapd: Add some testing options adc96dc nl80211: Fix nla_nest_start conversion 0606052 wpa_supplicant: Add get_capability freq c7a39ba Provide TLS alerts to CLI/UI over control interface 2a07a27 P2P: Increase GTK rekeying period to 24 hours 75fa7d1 TDLS: Fix key configuration with current mac80211 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested Change-Id: Ic4b568c341657d266b7759513230d4ef206d75b1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
Diffstat (limited to 'hostapd/config_file.c')
-rw-r--r--hostapd/config_file.c19
1 files changed, 19 insertions, 0 deletions
diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index 12d627a8..cd68e3ef 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -2876,6 +2876,25 @@ static int hostapd_config_fill(struct hostapd_config *conf,
bss->hs20_operating_class = oper_class;
bss->hs20_operating_class_len = oper_class_len;
#endif /* CONFIG_HS20 */
+#ifdef CONFIG_TESTING_OPTIONS
+#define PARSE_TEST_PROBABILITY(_val) \
+ } else if (os_strcmp(buf, #_val) == 0) { \
+ char *end; \
+ \
+ conf->_val = strtod(pos, &end); \
+ if (*end || conf->_val < 0.0d || \
+ conf->_val > 1.0d) { \
+ wpa_printf(MSG_ERROR, \
+ "Line %d: Invalid value '%s'", \
+ line, pos); \
+ errors++; \
+ return errors; \
+ }
+ PARSE_TEST_PROBABILITY(ignore_probe_probability)
+ PARSE_TEST_PROBABILITY(ignore_auth_probability)
+ PARSE_TEST_PROBABILITY(ignore_assoc_probability)
+ PARSE_TEST_PROBABILITY(ignore_reassoc_probability)
+#endif /* CONFIG_TESTING_OPTIONS */
} else if (os_strcmp(buf, "vendor_elements") == 0) {
struct wpabuf *elems;
size_t len = os_strlen(pos);