diff --git a/hostapd/config_file.c b/hostapd/config_file.c index b1ab13e..79b79da 100644 --- a/hostapd/config_file.c +++ b/hostapd/config_file.c @@ -3592,6 +3592,8 @@ static int hostapd_config_fill(struct hostapd_config *conf, if (bss->ocv && !bss->ieee80211w) bss->ieee80211w = 1; #endif /* CONFIG_OCV */ + } else if (os_strcmp(buf, "noscan") == 0) { + conf->noscan = atoi(pos); } else if (os_strcmp(buf, "ieee80211n") == 0) { conf->ieee80211n = atoi(pos); } else if (os_strcmp(buf, "ht_capab") == 0) { diff --git a/src/ap/ap_config.h b/src/ap/ap_config.h index 5b71126..0428859 100644 --- a/src/ap/ap_config.h +++ b/src/ap/ap_config.h @@ -1093,6 +1093,7 @@ struct hostapd_config { int ht_op_mode_fixed; u16 ht_capab; + int noscan; int ieee80211n; int secondary_channel; int no_pri_sec_switch; diff --git a/src/ap/hw_features.c b/src/ap/hw_features.c index 84e74ee..3e9d0bc 100644 --- a/src/ap/hw_features.c +++ b/src/ap/hw_features.c @@ -546,7 +546,8 @@ static int ieee80211n_check_40mhz(struct hostapd_iface *iface) int ret; /* Check that HT40 is used and PRI / SEC switch is allowed */ - if (!iface->conf->secondary_channel || iface->conf->no_pri_sec_switch) + if (!iface->conf->secondary_channel || iface->conf->no_pri_sec_switch || + iface->conf->noscan) return 0; hostapd_set_state(iface, HAPD_IFACE_HT_SCAN); diff --git a/src/ap/ieee802_11_ht.c b/src/ap/ieee802_11_ht.c index 214855d..3697ca3 100644 --- a/src/ap/ieee802_11_ht.c +++ b/src/ap/ieee802_11_ht.c @@ -230,6 +230,9 @@ void hostapd_2040_coex_action(struct hostapd_data *hapd, return; } + if (iface->conf->noscan) + return; + if (len < IEEE80211_HDRLEN + 2 + sizeof(*bc_ie)) { wpa_printf(MSG_DEBUG, "Ignore too short 20/40 BSS Coexistence Management frame"); @@ -390,6 +393,9 @@ void ht40_intolerant_add(struct hostapd_iface *iface, struct sta_info *sta) if (iface->current_mode->mode != HOSTAPD_MODE_IEEE80211G) return; + if (iface->conf->noscan) + return; + wpa_printf(MSG_INFO, "HT: Forty MHz Intolerant is set by STA " MACSTR " in Association Request", MAC2STR(sta->addr));