mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
Support multiple 20/40 BSS Intolerant Channel Report elements
This extends 20/40 BSS Coexistence Management frame processing to iterate over all the included 20/40 BSS Intolerant Channel Report elements instead of using only the first one. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
8127a0ac02
commit
8cbd9c3ed4
@ -313,7 +313,7 @@ void hostapd_2040_coex_action(struct hostapd_data *hapd,
|
||||
}
|
||||
|
||||
/* 20/40 BSS Intolerant Channel Report element (zero or more times) */
|
||||
if (start + len - data >= 3 &&
|
||||
while (start + len - data >= 3 &&
|
||||
data[0] == WLAN_EID_20_40_BSS_INTOLERANT && data[1] >= 1) {
|
||||
u8 ielen = data[1];
|
||||
|
||||
@ -341,6 +341,8 @@ void hostapd_2040_coex_action(struct hostapd_data *hapd,
|
||||
chan);
|
||||
is_ht40_allowed = 0;
|
||||
}
|
||||
|
||||
data += 2 + ielen;
|
||||
}
|
||||
wpa_printf(MSG_DEBUG, "is_ht40_allowed=%d num_sta_ht40_intolerant=%d",
|
||||
is_ht40_allowed, iface->num_sta_ht40_intolerant);
|
||||
|
Loading…
Reference in New Issue
Block a user