wpa_supplicant: Support dtim_period configuration for AP mode

Signed-off-by: Etay Luz <eluz@qca.qualcomm.com>
This commit is contained in:
Etay Luz 2012-06-04 17:52:37 +03:00 committed by Jouni Malinen
parent f5d4dd5ad4
commit fdfb1c8bcf
4 changed files with 13 additions and 0 deletions

View File

@ -193,6 +193,9 @@ static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
if (ssid->ap_max_inactivity)
bss->ap_max_inactivity = ssid->ap_max_inactivity;
if (ssid->dtim_period)
bss->dtim_period = ssid->dtim_period;
/* Select group cipher based on the enabled pairwise cipher suites */
pairwise = 0;
if (bss->wpa & 1)

View File

@ -1610,6 +1610,7 @@ static const struct parse_data ssid_fields[] = {
{ STR(ht_mcs) },
#endif /* CONFIG_HT_OVERRIDES */
{ INT(ap_max_inactivity) },
{ INT(dtim_period) },
};
#undef OFFSET

View File

@ -499,6 +499,12 @@ struct wpa_ssid {
* By default: 300 seconds.
*/
int ap_max_inactivity;
/**
* dtim_period - DTIM period in Beacon intervals
* By default: 2
*/
int dtim_period;
};
#endif /* CONFIG_SSID_H */

View File

@ -687,6 +687,9 @@ fast_reauth=1
# default: 300 (i.e., 5 minutes)
#ap_max_inactivity=300
# DTIM period in Beacon intervals for AP mode (default: 2)
#dtim_period=2
# Example blocks:
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers