Previously hostapd created one control interface /var/run/hostapd-phyX
which only contained the first virtual bssid (for example wlan0). In
order to access the other virtual bssids with hostapd_cli add all
virtual bssids to /var/run/hostapd-phyX by specifying the ctrl_interface
parameter per bssid.
Previously the control interface looked like:
/var/run/hostapd-phyX/wlan0
Now, the control interface looks like this:
/var/run/hostapd-phyX/wlan0
/var/run/hostapd-phyX/wlan1
...
Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@24985 3c298f89-4303-0410-b956-a3cf2f4a3e73
This allows hostapd to make use of the config option
"vlan_tagged_interface" to automatically create bridge and
VLAN interfaces in a fully dynamic way.
Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@24722 3c298f89-4303-0410-b956-a3cf2f4a3e73
Hostapd can allow preauthentication for WPA2-EAP networks when
the interfaces through which preauthentication is allowed are
configured.
Add a new param "rsn_preauth=0/1" to the configuration that enables
or disables preauthentication on the according bridge interface.
Preauthentication for unbridged networks is not considered in this
patch.
Cc: Felix Fietkau <nbd@openwrt.org>
Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@24721 3c298f89-4303-0410-b956-a3cf2f4a3e73
Always set auth_algs in hostapd.conf. For WEP, auth_algs is configurable
by setting the encryption parameter of a wifi-iface to contain "open"
(1, open system), "shared" (2, shared key), or "mixed" (3, permits both
open system and shared key.) For example, use "wep+shared" for shared
key authentication. The default is default is "open" as it is more
secure than "shared" (although WEP is pretty weak regardless.) For
non-WEP, "open" is always used.
https://dev.openwrt.org/ticket/8120
Signed-off-by: Mark Mentovai <mark@moxienet.com>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@23655 3c298f89-4303-0410-b956-a3cf2f4a3e73
assoc_sa_query_retry_timeout from it's config file. Make these options
configurable in /etc/config/wireless. To make it clear that these
options are 802.11w related, I named them ieee80211w_max_timeout and
ieee80211w_retry_timeout instead.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@20397 3c298f89-4303-0410-b956-a3cf2f4a3e73
in /etc/config/wireless. Since ath9k is currently the only driver that
supports MFP, it will only be enabled when ath9k is enabled.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@20396 3c298f89-4303-0410-b956-a3cf2f4a3e73
(I sent this one to openwrt-devel before, but I am resending it as part of
this series because the next patch will also edit wpa_supplicant.sh).
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@20394 3c298f89-4303-0410-b956-a3cf2f4a3e73
Since client mode in mac80211is unreliable without using wpa_supplicant,
it would be better to enable wpa_supplicant by default.
With this patch, wpa_supplicant will always be used for mac80211-based
drivers in client mode. This will break client mode for images that
don't include wpa_supplicant or wpad, so maybe I need to add a check
somewhere to see if wpa_supplicant is available, and show the user a
warning if he tries client mode without wpa_supplicant. Suggestions on
where to add this check are welcome.
Tested with ath5k in client mode on open and wpa2-psk network, and
tested on my ath9k based AP as well to make sure it doesn't break AP mode.
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@19718 3c298f89-4303-0410-b956-a3cf2f4a3e73
use the new multi-bss single instance hostapd mode
move mac80211 specific bits out of /lib/wifi/hostapd.sh
add a new option 'htmode' for switching between HT20 and HT40+,HT40-
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@19235 3c298f89-4303-0410-b956-a3cf2f4a3e73