aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd/config_file.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2015-09-05 16:00:03 (GMT)
committerJouni Malinen <j@w1.fi>2015-09-05 16:11:02 (GMT)
commit0e2412d0864f0323e0d560edc024421bfae0b8bd (patch)
tree2a4395fc2acb5f7ef3656815e591b484cd8d1e4f /hostapd/config_file.c
parentec4387f9c92a66e921ee8b71d10807cb36b99697 (diff)
downloadhostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.zip
hostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.tar.gz
hostap-0e2412d0864f0323e0d560edc024421bfae0b8bd.tar.bz2
Add option to reject authentication on 2.4 GHz from dualband STA
The new no_auth_if_seen_on=<ifname> parameter can now be used to configure hostapd to reject authentication from a station that was seen on another radio. This can be used with enabled track_sta_max_num configuration on another interface controlled by the same hostapd process to reject authentication attempts from a station that has been detected to be capable of operating on another band, e.g., to try to reduce likelihood of the station selecting a 2.4 GHz BSS when the AP operates both a 2.4 GHz and 5 GHz BSS concurrently. Note: Enabling this can cause connectivity issues and increase latency for connecting with the AP. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'hostapd/config_file.c')
-rw-r--r--hostapd/config_file.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index 57ccbc6..82ac61d 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -3406,6 +3406,9 @@ static int hostapd_config_fill(struct hostapd_config *conf,
} else if (os_strcmp(buf, "no_probe_resp_if_seen_on") == 0) {
os_free(bss->no_probe_resp_if_seen_on);
bss->no_probe_resp_if_seen_on = os_strdup(pos);
+ } else if (os_strcmp(buf, "no_auth_if_seen_on") == 0) {
+ os_free(bss->no_auth_if_seen_on);
+ bss->no_auth_if_seen_on = os_strdup(pos);
} else {
wpa_printf(MSG_ERROR,
"Line %d: unknown configuration item '%s'",