path: root/wpa_supplicant/config_ssid.h
diff options
authorJouni Malinen <jouni@qca.qualcomm.com>2012-11-12 18:07:53 (GMT)
committerJouni Malinen <j@w1.fi>2012-11-12 18:07:53 (GMT)
commit6e2020210afe355bd0f8fcdb2a68f31746f6f7df (patch)
tree149f7ad9f6f411a178ad99edff457f584ed72a45 /wpa_supplicant/config_ssid.h
parent8713a2e6ff0940c03de9f2289c5c875c4df7bc9b (diff)
Allow OKC to be enabled by default
Previously, OKC (opportunistic key caching, a.k.a. proactive key caching) could be enabled only with a per-network parameter (proactive_key_caching). The new global parameter (okc) can now be used to change the default behavior to be OKC enabled (okc=1) for network blocks that do not override this with the proactive_key_caching parameter. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
Diffstat (limited to 'wpa_supplicant/config_ssid.h')
1 files changed, 6 insertions, 1 deletions
diff --git a/wpa_supplicant/config_ssid.h b/wpa_supplicant/config_ssid.h
index be83cc2..2d4d914 100644
--- a/wpa_supplicant/config_ssid.h
+++ b/wpa_supplicant/config_ssid.h
@@ -228,13 +228,18 @@ struct wpa_ssid {
* This field can be used to enable proactive key caching which is also
* known as opportunistic PMKSA caching for WPA2. This is disabled (0)
- * by default. Enable by setting this to 1.
+ * by default unless default value is changed with the global okc=1
+ * parameter. Enable by setting this to 1.
* Proactive key caching is used to make supplicant assume that the APs
* are using the same PMK and generate PMKSA cache entries without
* doing RSN pre-authentication. This requires support from the AP side
* and is normally used with wireless switches that co-locate the
* authenticator.
+ *
+ * Internally, special value -1 is used to indicate that the parameter
+ * was not specified in the configuration (i.e., default behavior is
+ * followed).
int proactive_key_caching;