path: root/wpa_supplicant/config_ssid.h
Commit message (Collapse)AuthorAgeFilesLines
* Add freq_list network configuration parameterJouni Malinen2010-03-271-0/+10
| | | | | | | This can be used to limit which frequencies are considered when selecting a BSS. This is somewhat similar to scan_freq, but will also affect any scan results regardless of which program triggered the scan.
* Define struct wpa_ssid::mode as an enum with more readable valuesJouni Malinen2009-12-281-1/+5
* Remove src/common from default header file pathJouni Malinen2009-11-291-1/+1
| | | | | | | | | | This makes it clearer which files are including header from src/common. Some of these cases should probably be cleaned up in the future not to do that. In addition, src/common/nl80211_copy.h and wireless_copy.h were moved into src/drivers since they are only used by driver wrappers and do not need to live in src/common.
* Add preliminary background scan and roaming module designJouni Malinen2009-09-141-0/+9
| | | | | | | | | | | | | | | | | | | | | | This allows background scanning and roaming decisions to be contained in a single place based on a defined set of notification events which will hopefully make it easier to experiment with roaming improvements. In addition, this allows multiple intra-ESS roaming policies to be used (each network configuration block can configure its own bgscan module). The beacon loss and signal strength notifications are implemented for the bgscan API, but the actual events are not yet available from the driver. The included sample bgscan module ("simple") is an example of what can be done with the new bgscan mechanism. It requests periodic background scans when the device remains associated with an ESS and has couple of notes on what a more advanced bgscan module could do to optimize background scanning and roaming. The periodic scans will cause the scan result handler to pick a better AP if one becomes available. This bgscan module can be taken into use by adding bgscan="simple" (or bgscan="simple:<bgscan interval in seconds>") into the network configuration block.
* Add support for specifying subset of enabled frequencies to scanJouni Malinen2009-03-261-0/+10
| | | | | | | | | | | | | A new network block parameter, scan_freq, can be used to specify subset of frequencies to scan. This can speed up scanning process considerably if it is known that only a small subset of channels is actually used in the network. A union of configured frequencies for all enabled network blocks is used in scan requests. Currently, only driver_nl80211.c has support for this functionality. For example, following parameter marks 2.4 GHz channels 1, 6, 11 to be scanned: scan_freq=2412 2437 2462
* Allow hostapd/config.h and wpa_supplicant/config_ssid.h coexistJouni Malinen2009-03-261-5/+1
| | | | | | Move the shared IEEE 802.11w enum definition into src/common/defs.h to avoid redefinition when both configuration structures are included into the same file.
* Initial step in adding simple AP mode support into wpa_supplicantJouni Malinen2009-03-251-0/+2
| | | | | | This version is adding the configuration option (mode=2) for this and driver capability reporting to figure out whether AP mode can be used. However, this does not actually implement any real functionality yet.
* Added support for enforcing frequent PTK rekeyingJouni Malinen2008-11-061-0/+8
| | | | | | | | | | | | Added a new configuration option, wpa_ptk_rekey, that can be used to enforce frequent PTK rekeying, e.g., to mitigate some attacks against TKIP deficiencies. This can be set either by the Authenticator (to initiate periodic 4-way handshake to rekey PTK) or by the Supplicant (to request Authenticator to rekey PTK). With both wpa_ptk_rekey and wpa_group_rekey (in hostapd) set to 600, TKIP keys will not be used for more than 10 minutes which may make some attacks against TKIP more difficult to implement.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+339