| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
SVN-Revision: 33688
|
|
|
|
| |
SVN-Revision: 33412
|
|
|
|
| |
SVN-Revision: 33400
|
|
|
|
|
|
| |
mode reliability with many clients
SVN-Revision: 33399
|
|
|
|
|
|
| |
and Opportunistic Key Caching (#12129)
SVN-Revision: 33359
|
|
|
|
|
|
| |
hardcoded wpa rekey intervals, remove hardcoded radius_acct_interim_interval as it might overrule the radius Acct-Interim-Interval attribute
SVN-Revision: 28207
|
|
|
|
|
|
| |
wifi-device section gains the following settings: * log_level (2) - Defines the minimum message level * log_80211 (true) - Log 802.11 events * log_8021x (true) - Log 802.1X events * log_radius (true) - Log RADIUS events * log_wpa (true) - Log WPA events * log_driver (true) - Log driver interface messages * log_iapp (true) - Log IAPP events * log_mlme (true) - Log MLME events
SVN-Revision: 28056
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Hello
This patch add accounting configuration in hostapd.sh
It also change "server, port, key" to "auth_server, auth_port, auth_secret" but keep backward compatibility
Please patch backfire & trunk
Thanks in advance.
Signed-off-by: Etienne CHAMPETIER <etienne.champetier@free.fr>
SVN-Revision: 26482
|
|
|
|
| |
SVN-Revision: 26288
|
|
|
|
| |
SVN-Revision: 25543
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Previously hostapd created one control interface /var/run/hostapd-phyX
which only contained the first virtual bssid (for example wlan0). In
order to access the other virtual bssids with hostapd_cli add all
virtual bssids to /var/run/hostapd-phyX by specifying the ctrl_interface
parameter per bssid.
Previously the control interface looked like:
/var/run/hostapd-phyX/wlan0
Now, the control interface looks like this:
/var/run/hostapd-phyX/wlan0
/var/run/hostapd-phyX/wlan1
...
Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
SVN-Revision: 24985
|
|
|
|
|
|
| |
Signed-off-by: Alexander Couzens <lynxis@c-base.org>
SVN-Revision: 24724
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Hostapd can allow preauthentication for WPA2-EAP networks when
the interfaces through which preauthentication is allowed are
configured.
Add a new param "rsn_preauth=0/1" to the configuration that enables
or disables preauthentication on the according bridge interface.
Preauthentication for unbridged networks is not considered in this
patch.
Cc: Felix Fietkau <nbd@openwrt.org>
Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
SVN-Revision: 24721
|
|
|
|
|
|
|
|
|
|
| |
auth_algs in hostapd.conf. For WEP, auth_algs is configurable by setting the encryption parameter of a wifi-iface to contain "open" (1, open system), "shared" (2, shared key), or "mixed" (3, permits both open system and shared key.) For example, use "wep+shared" for shared key authentication. The default is default is "open" as it is more secure than "shared" (although WEP is pretty weak regardless.) For non-WEP, "open" is always used.
https://dev.openwrt.org/ticket/8120
Signed-off-by: Mark Mentovai <mark@moxienet.com>
SVN-Revision: 23655
|
|
|
|
| |
SVN-Revision: 22527
|
|
|
|
|
|
| |
handle multi-bss yet)
SVN-Revision: 22100
|
|
|
|
| |
SVN-Revision: 22000
|
|
|
|
| |
SVN-Revision: 21998
|
|
|
|
| |
SVN-Revision: 21179
|
|
|
|
| |
SVN-Revision: 20675
|
|
|
|
|
|
|
|
| |
assoc_sa_query_retry_timeout from it's config file. Make these options configurable in /etc/config/wireless. To make it clear that these options are 802.11w related, I named them ieee80211w_max_timeout and ieee80211w_retry_timeout instead.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
SVN-Revision: 20397
|
|
|
|
|
|
|
|
| |
/etc/config/wireless. Since ath9k is currently the only driver that supports MFP, it will only be enabled when ath9k is enabled.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
SVN-Revision: 20396
|
|
|
|
| |
SVN-Revision: 20363
|
|
|
|
|
|
| |
fixes #6672
SVN-Revision: 19720
|
|
|
|
|
|
| |
instance hostapd mode move mac80211 specific bits out of /lib/wifi/hostapd.sh add a new option 'htmode' for switching between HT20 and HT40+,HT40-
SVN-Revision: 19235
|
|
|
|
| |
SVN-Revision: 18727
|
|
|
|
| |
SVN-Revision: 18602
|
|
|
|
| |
SVN-Revision: 18364
|
|
|
|
| |
SVN-Revision: 18293
|
|
|
|
|
|
| |
association problems
SVN-Revision: 18051
|
|
|
|
| |
SVN-Revision: 17823
|
|
|
|
| |
SVN-Revision: 16841
|
|
|
|
| |
SVN-Revision: 16594
|
|
|
|
|
|
| |
is set the scripts transfers it now to g mode.
SVN-Revision: 15182
|
|
|
|
| |
SVN-Revision: 15055
|
|
|
|
| |
SVN-Revision: 14713
|
|
|
|
| |
SVN-Revision: 14608
|
|
|
|
| |
SVN-Revision: 14276
|
|
|
|
| |
SVN-Revision: 14039
|
|
|
|
|
|
| |
allowed values
SVN-Revision: 13790
|
|
|
|
| |
SVN-Revision: 13084
|
|
|
|
|
|
| |
when bringing an interface down - fixes an issue with random hostapd death
SVN-Revision: 13078
|
|
|
|
| |
SVN-Revision: 13076
|
|
|
|
|
|
| |
(instead of hardcoding it to g)
SVN-Revision: 12673
|
|
|
|
|
|
|
|
| |
passphrase which is hashed to a 256 bit key together with the SSID, or a 64 character hex key. Currently, the latter option is supported by the broadcom wifi type, but no by hostapd. The attached patch allows using a 64 character hex key. (#3935)
Signed-off-by: thomas@archlinux.org
SVN-Revision: 12394
|
|
|
|
| |
SVN-Revision: 12375
|
|
|
|
| |
SVN-Revision: 11355
|
|
|
|
| |
SVN-Revision: 10488
|
|
|
|
|
|
| |
it into the "key" variable.
SVN-Revision: 10478
|
|
SVN-Revision: 7000
|