1 --- a/hostapd/config_file.c
2 +++ b/hostapd/config_file.c
3 @@ -1781,6 +1781,8 @@ static int hostapd_config_fill(struct ho
5 } else if (os_strcmp(buf, "wds_sta") == 0) {
6 bss->wds_sta = atoi(pos);
7 + } else if (os_strcmp(buf, "start_disabled") == 0) {
8 + bss->start_disabled = atoi(pos);
9 } else if (os_strcmp(buf, "ap_isolate") == 0) {
10 bss->isolate = atoi(pos);
11 } else if (os_strcmp(buf, "ap_max_inactivity") == 0) {
12 --- a/hostapd/hostapd.conf
13 +++ b/hostapd/hostapd.conf
14 @@ -389,6 +389,9 @@ wmm_ac_vo_acm=0
15 # use a separate bridge.
18 +# Start the AP with beaconing disabled by default.
21 # Client isolation can be used to prevent low-level bridging of frames between
22 # associated stations in the BSS. By default, this bridging is allowed.
24 --- a/src/ap/ap_config.h
25 +++ b/src/ap/ap_config.h
26 @@ -243,6 +243,7 @@ struct hostapd_bss_config {
32 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
33 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
34 --- a/src/ap/hostapd.c
35 +++ b/src/ap/hostapd.c
36 @@ -819,7 +819,8 @@ static int hostapd_setup_bss(struct host
40 - ieee802_11_set_beacon(hapd);
41 + if (!hapd->conf->start_disabled)
42 + ieee802_11_set_beacon(hapd);
44 if (hapd->wpa_auth && wpa_init_keys(hapd->wpa_auth) < 0)