aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/beacon.h
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2015-09-05 16:00:03 (GMT)
committerJouni Malinen <j@w1.fi>2015-09-05 16:11:02 (GMT)
commit0e2412d0864f0323e0d560edc024421bfae0b8bd (patch)
tree2a4395fc2acb5f7ef3656815e591b484cd8d1e4f /src/ap/beacon.h
parentec4387f9c92a66e921ee8b71d10807cb36b99697 (diff)
downloadhostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.zip
hostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.tar.gz
hostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.tar.bz2
Add option to reject authentication on 2.4 GHz from dualband STA
The new no_auth_if_seen_on=<ifname> parameter can now be used to configure hostapd to reject authentication from a station that was seen on another radio. This can be used with enabled track_sta_max_num configuration on another interface controlled by the same hostapd process to reject authentication attempts from a station that has been detected to be capable of operating on another band, e.g., to try to reduce likelihood of the station selecting a 2.4 GHz BSS when the AP operates both a 2.4 GHz and 5 GHz BSS concurrently. Note: Enabling this can cause connectivity issues and increase latency for connecting with the AP. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'src/ap/beacon.h')
-rw-r--r--src/ap/beacon.h3
1 files changed, 3 insertions, 0 deletions
diff --git a/src/ap/beacon.h b/src/ap/beacon.h
index 21df9fa..e183cde 100644
--- a/src/ap/beacon.h
+++ b/src/ap/beacon.h
@@ -22,5 +22,8 @@ int ieee802_11_build_ap_params(struct hostapd_data *hapd,
struct wpa_driver_ap_params *params);
void ieee802_11_free_ap_params(struct wpa_driver_ap_params *params);
void sta_track_expire(struct hostapd_iface *iface, int force);
+struct hostapd_data *
+sta_track_seen_on(struct hostapd_iface *iface, const u8 *addr,
+ const char *ifname);
#endif /* BEACON_H */