Browse Source

wpa_supplicant: Support dtim_period configuration for AP mode

Signed-off-by: Etay Luz <eluz@qca.qualcomm.com>
Etay Luz 13 years ago
parent
commit
fdfb1c8bcf

+ 3 - 0
wpa_supplicant/ap.c

@@ -193,6 +193,9 @@ static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
 	if (ssid->ap_max_inactivity)
 		bss->ap_max_inactivity = ssid->ap_max_inactivity;
 
+	if (ssid->dtim_period)
+		bss->dtim_period = ssid->dtim_period;
+
 	/* Select group cipher based on the enabled pairwise cipher suites */
 	pairwise = 0;
 	if (bss->wpa & 1)

+ 1 - 0
wpa_supplicant/config.c

@@ -1610,6 +1610,7 @@ static const struct parse_data ssid_fields[] = {
 	{ STR(ht_mcs) },
 #endif /* CONFIG_HT_OVERRIDES */
 	{ INT(ap_max_inactivity) },
+	{ INT(dtim_period) },
 };
 
 #undef OFFSET

+ 6 - 0
wpa_supplicant/config_ssid.h

@@ -499,6 +499,12 @@ struct wpa_ssid {
 	 * By default: 300 seconds.
 	 */
 	int ap_max_inactivity;
+
+	/**
+	 * dtim_period - DTIM period in Beacon intervals
+	 * By default: 2
+	 */
+	int dtim_period;
 };
 
 #endif /* CONFIG_SSID_H */

+ 3 - 0
wpa_supplicant/wpa_supplicant.conf

@@ -687,6 +687,9 @@ fast_reauth=1
 # default: 300 (i.e., 5 minutes)
 #ap_max_inactivity=300
 
+# DTIM period in Beacon intervals for AP mode (default: 2)
+#dtim_period=2
+
 # Example blocks:
 
 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers