]> git.ipfire.org Git - thirdparty/hostap.git/commit - wpa_supplicant/events.c
Add disallow_aps parameter to disallow BSSIDs/SSIDs
authorJouni Malinen <jouni@qca.qualcomm.com>
Thu, 27 Sep 2012 14:36:59 +0000 (17:36 +0300)
committerJouni Malinen <j@w1.fi>
Thu, 27 Sep 2012 14:36:59 +0000 (17:36 +0300)
commit6407f4132f9691f6f1263245e531000b73aa5862
tree163873ba8fd48004f10372fbe28527bc41dfbcd9
parent39b1572c41b76c059ac0390aa57eac87ad1a0d99
Add disallow_aps parameter to disallow BSSIDs/SSIDs

External programs can use this new parameter to prevent wpa_supplicant
from connecting to a list of BSSIDs and/or SSIDs. The disallowed BSSes
will still be visible in scan results and it is possible to run ANQP
operations with them, but BSS selection for connection will skip any
BSS that matches an entry in the disallowed list.

The new parameter can be set with the control interface SET command
using following syntax:

SET disallow_aps <disallow_list>
disallow_list ::= <ssid_spec> | <bssid_spec> | <disallow_list> | “”
SSID_SPEC ::= ssid <SSID_HEX>
BSSID_SPEC ::= bssid <BSSID_HEX>

For example:
wpa_cli set disallow_list "ssid 74657374 bssid 001122334455 ssid 68656c6c6f"
wpa_cli set disallow_list
(the empty value removes all entries)

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
wpa_supplicant/ctrl_iface.c
wpa_supplicant/events.c
wpa_supplicant/wpa_supplicant.c
wpa_supplicant/wpa_supplicant_i.h