wpa_supplicant: Add provision to configure inactivity period in AP mode
This patch adds a configuration in network block, ap_max_inactivity, for station's inactivity period when in AP mode. The time period is configured in seconds, by default 300 seconds. Signed-hostap: Vasanthakumar Thiagarajan <vthiagar@qca.qualcomm.com>
This commit is contained in:
parent
17e729d49c
commit
07f53b8cc7
4 changed files with 29 additions and 0 deletions
|
@ -181,6 +181,9 @@ static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
|
||||||
wep->keys_set = 1;
|
wep->keys_set = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (ssid->ap_max_inactivity)
|
||||||
|
bss->ap_max_inactivity = ssid->ap_max_inactivity;
|
||||||
|
|
||||||
/* Select group cipher based on the enabled pairwise cipher suites */
|
/* Select group cipher based on the enabled pairwise cipher suites */
|
||||||
pairwise = 0;
|
pairwise = 0;
|
||||||
if (bss->wpa & 1)
|
if (bss->wpa & 1)
|
||||||
|
|
|
@ -1602,6 +1602,7 @@ static const struct parse_data ssid_fields[] = {
|
||||||
{ INT_RANGE(ampdu_density, -1, 7) },
|
{ INT_RANGE(ampdu_density, -1, 7) },
|
||||||
{ STR(ht_mcs) },
|
{ STR(ht_mcs) },
|
||||||
#endif /* CONFIG_HT_OVERRIDES */
|
#endif /* CONFIG_HT_OVERRIDES */
|
||||||
|
{ INT(ap_max_inactivity) },
|
||||||
};
|
};
|
||||||
|
|
||||||
#undef OFFSET
|
#undef OFFSET
|
||||||
|
|
|
@ -484,6 +484,14 @@ struct wpa_ssid {
|
||||||
*/
|
*/
|
||||||
char *ht_mcs;
|
char *ht_mcs;
|
||||||
#endif /* CONFIG_HT_OVERRIDES */
|
#endif /* CONFIG_HT_OVERRIDES */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* ap_max_inactivity - Timeout in seconds to detect STA's inactivity
|
||||||
|
*
|
||||||
|
* This timeout value is used in AP mode to clean up inactive stations.
|
||||||
|
* By default: 300 seconds.
|
||||||
|
*/
|
||||||
|
int ap_max_inactivity;
|
||||||
};
|
};
|
||||||
|
|
||||||
#endif /* CONFIG_SSID_H */
|
#endif /* CONFIG_SSID_H */
|
||||||
|
|
|
@ -653,6 +653,23 @@ fast_reauth=1
|
||||||
# number of authentication servers. Strict EAP conformance mode can be
|
# number of authentication servers. Strict EAP conformance mode can be
|
||||||
# configured by disabling workarounds with eap_workaround=0.
|
# configured by disabling workarounds with eap_workaround=0.
|
||||||
|
|
||||||
|
# Station inactivity limit
|
||||||
|
#
|
||||||
|
# If a station does not send anything in ap_max_inactivity seconds, an
|
||||||
|
# empty data frame is sent to it in order to verify whether it is
|
||||||
|
# still in range. If this frame is not ACKed, the station will be
|
||||||
|
# disassociated and then deauthenticated. This feature is used to
|
||||||
|
# clear station table of old entries when the STAs move out of the
|
||||||
|
# range.
|
||||||
|
#
|
||||||
|
# The station can associate again with the AP if it is still in range;
|
||||||
|
# this inactivity poll is just used as a nicer way of verifying
|
||||||
|
# inactivity; i.e., client will not report broken connection because
|
||||||
|
# disassociation frame is not sent immediately without first polling
|
||||||
|
# the STA with a data frame.
|
||||||
|
# default: 300 (i.e., 5 minutes)
|
||||||
|
#ap_max_inactivity=300
|
||||||
|
|
||||||
# Example blocks:
|
# Example blocks:
|
||||||
|
|
||||||
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
|
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
|
||||||
|
|
Loading…
Reference in a new issue