aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd/config_file.c
Commit message (Collapse)AuthorAgeFilesLines
* hostapd: enable dynamic modification of acl policyNadim Zubidat2012-11-061-2/+2
| | | | | | | | | add APIs for dynamically changing the macaddr_acl policy and mac addresses lists. once changed, hostapd will deauth stations which do not pass the new policy. Signed-off-by: Nadim Zubidat <nadimz@ti.com>
* hostap: add channel switch ability to AP & GO (INTERNAL)Victor Goldenshtein2012-09-131-0/+2
| | | | | | | | | | | | | | | Add channel switch command and handle channel switch request/complete events. New hostapd_eid_csa() which builds the channel switch announcement IE. Add this CSA to the beacon frame prior performing a channel switch and remove it once it's completed. New EVENT_REQ_CH_SW which indicates that the driver has requested to perform a channel switch. Signed-hostap: Victor Goldenshtein <victorg@ti.com>
* P2P: enable to set in the conf file the wmm paramsYoni Divinsky2012-07-301-73/+1
| | | | | | | | | | In case of P2P GO, the wpa_supplicant uses the default hostapd parameters. In the default parameters the ACM bit for video and voice are set to 1, meaning, P2P devices and stations which are connected to the GO cannot pass voice or video data packets. Signed-hostap: Yoni Divinsky <yoni.divinsky@ti.com>
* hostapd: Initial IEEE 802.11ac (VHT) definitionsMahesh Palivela2012-06-301-0/+77
| | | | | | Add IEEE 802.11ac definitions for config, IEEE structures, constants. Signed-hostap: Mahesh Palivela <maheshp@posedge.com>
* WPS: Add support for NCF password token from APJouni Malinen2012-06-281-1/+45
| | | | | | | | | | | | | | | | The new hostapd ctrl_iface command WPS_NFC_TOKEN can now be used to manage AP-as-Enrollee operations with NFC password token. WPS/NDEF parameters to this command can be used to generate a new NFC password token. enable/disable parameters can be used to enable/disable use of NFC password token (instead of AP PIN) for external Registrars. A preconfigured NFS password token can be used by providing its parameters with new hostapd.conf fields wps_nfc_dev_pw_id, wps_nfc_dh_pubkey, wps_nfc_dh_privkey, and wps_nfc_dev_pw. This use will also depend on WPS_NFC_TOKEN enable/disable commands, i.e., the configured NFS password token is disabled by default. Signed-hostap: Jouni Malinen <j@w1.fi>
* RADIUS DAS: Validate Event-TimestampJouni Malinen2012-06-171-0/+5
| | | | | | | | | | DAS will now validate Event-Timestamp value to be within an acceptable time window (300 seconds by default; can be set using radius_das_time_window parameter). In addition, Event-Timestamp can be required in Disconnect-Request and CoA-Request messages with radius_das_require_event_timestamp=1. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Return error value on configuration check failureBaruch Siach2012-06-161-1/+1
| | | | | | Don't count errors since the number isn't used anyway. Signed-hostap: Baruch Siach <baruch@tkos.co.il>
* hostapd: Remove redundant variable initializationBaruch Siach2012-06-161-1/+1
| | | | | | The 'errors' variable is initialized later anyway. Signed-hostap: Baruch Siach <baruch@tkos.co.il>
* Add preliminary RADIUS dynamic authorization server (RFC 5176)Jouni Malinen2012-05-061-0/+36
| | | | | | | | | | This adds the basic DAS mechanism to enable hostapd to be configured to request dynamic authorization requests (Disconnect-Request and CoA-Request). This commit does not add actual processing of the requests, i.e., this will only receive and authenticate the requests and NAK them regardless of what operation is requested. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Allow addition of arbitrary RADIUS attributesJouni Malinen2012-05-051-0/+100
| | | | | | | | New configuration parameters radius_auth_req_attr and radius_acct_req_attr can now be used to add (or override) RADIUS attributes in Access-Request and Accounting-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Add optional Chargeable-User-Identity request (RFC 4372)Jouni Malinen2012-05-051-1/+3
| | | | | | | | radius_request_cui=1 configuration parameter can now be used to configure hostapd to request CUI from the RADIUS server by including Chargeable-User-Identity attribute into Access-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Do not allow HT in 11b modeSujith Manoharan2012-04-031-0/+6
| | | | | | | When the HW mode has been configured as 11b, disable HT operations. Signed-hostap: Sujith Manoharan <c_manoha@qca.qualcomm.com>
* GAS server: Add support for ANQP Venue Name elementJouni Malinen2012-02-261-0/+46
| | | | | | | The new venue_name configuration parameter can now be used to configure the ANQP Venue Name values that stations can request through GAS. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Interworking: Add GAS server support for AP modeJay Katabathuni2012-02-261-0/+4
| | | | | | | | | | | This adds GAS/ANQP implementation into hostapd. This commit brings in the basic GAS/ANQP functionality, but only the ANQP Capability List element is supported. For testing purposes, hostapd control interface SET command can be used to set the gas_frag_limit parameter dynamically. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Allow config parameters to be set through ctrl_ifaceShan Palanisamy2012-02-161-0/+25
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Split hostapd security parameter updating into a separate functionJouni Malinen2012-02-161-57/+61
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Split config item parser into a separate functionShan Palanisamy2012-02-161-72/+85
| | | | | | | This makes it easier to use the configuration file parser for updating the configuration at run time. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Clear wpa_psk/passphrase when the other option is configuredShan Palanisamy2012-02-161-0/+4
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Make inactivity polling configurableYogesh Ashok Powar2011-12-251-0/+2
| | | | | | | | | | | | | | | hostapd uses the poll method to check if the station is alive after the station has been inactive for ap_max_inactivity seconds. Make the poll mechanism configurable so that user can choose to disconnect idle clients. This can be especially useful when some devices/firmwares have restrictions on the number of clients that can connect to the AP and that limit is smaller than the total number of stations trying to use the AP. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com> Signed-off-by: Nishant Sarmukadam <nishants@marvell.com>
* Allow WPA passphrase to be fetched with RADIUS Tunnel-Password attributeMichael Braun2011-12-111-1/+20
| | | | | | | | | | | | This allows per-device PSK to be configured for WPA-Personal using a RADIUS authentication server. This uses RADIUS-based MAC address ACL (macaddr_acl=2), i.e., Access-Request uses the MAC address of the station as the User-Name and User-Password. The WPA passphrase is returned in Tunnel-Password attribute in Access-Accept. This functionality can be enabled with the new hostapd.conf parameter, wpa_psk_radius. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
* Add MSK dump mechanism into hostapd RADIUS server for testingJouni Malinen2011-12-091-0/+5
| | | | | | | | | | | | | | Testing code can now be enabled in the hostapd RADIUS server to dump each derived MSK into a text file (e.g., to be used as an input to wlantest). This functionality is not included in the default build and can be enabled by adding the following line to hostapd/.config: CFLAGS += -DCONFIG_RADIUS_TEST The MSK dump file is specified with dump_msk_file parameter in hostapd.conf (path to the dump file). If this variable is not set, MSK dump mechanism is not enabled at run time. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Allow RF Bands value to be overriddenBharat Chakravarty2011-11-301-0/+15
| | | | | | | | A new hostapd.conf parameter, wps_rf_bands, can now be used to fix the RF Bands value in cases where hw_mode is not set or when operating a dual band dual concurrent AP. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Use wpa_key_mgmt_*() helpersJouni Malinen2011-11-241-2/+1
| | | | | | | This cleans up the source code and makes it less likely that new AKM addition misses some needed changes in the future. Signed-hostap: Jouni Malinen <j@w1.fi>
* Use a single define for maximum number of EAP methodsJouni Malinen2011-11-171-1/+1
| | | | | | | | This cleans up the code a bit by not having to deal with theoretical possibility of maximum number of EAP methods to be different between various components in hostapd. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add support for Time AdvertisementJouni Malinen2011-10-181-0/+14
| | | | | This adds preliminary support for IEEE 802.11v Time Advertisement mechanism with UTC TSF offset.
* Interworking: Add support for configuring Roaming Consortium ListJouni Malinen2011-10-171-0/+37
|
* IEEE 802.11u: Add configuration and advertisement for InterworkingJouni Malinen2011-10-161-0/+32
|
* AP: Set pairwise/group cipher for non-WPA modesJouni Malinen2011-09-151-2/+19
| | | | | | This is needed to avoid confusing configuration in some nl80211 drivers that the new AP mode configuration alternatives for setting security policy.
* Allow PMKSA caching to be disabled on AuthenticatorJouni Malinen2011-07-051-0/+2
| | | | | | | A new hostapd configuration parameter, disable_pmksa_caching=1, can now be used to disable PMKSA caching on the Authenticator. This forces the stations to complete EAP authentication on every association when WPA2 is being used.
* WPS: Add a workaround for Windows 7 capability discovery for PBCJouni Malinen2011-05-171-0/+2
| | | | | | | | | | | | Windows 7 uses incorrect way of figuring out AP's WPS capabilities by acting as a Registrar and using M1 from the AP. The config methods attribute in that message is supposed to indicate only the configuration method supported by the AP in Enrollee role, i.e., to add an external Registrar. For that case, PBC shall not be used and as such, the PushButton config method is removed from M1 by default. If pbc_in_m1=1 is included in the configuration file, the PushButton config method is left in M1 (if included in config_methods parameter) to allow Windows 7 to use PBC instead of PIN (e.g., from a label in the AP).
* hostapd: Add testing mode for RSN element extensionsJouni Malinen2011-03-211-0/+5
| | | | | | | | CFLAGS += -DCONFIG_RSN_TESTING in .config and rsn_testing=1 in hostapd.conf can now be used to enable a testing mode that adds extensions to RSN element. This can be used to check whether station implementations are incompatible with future extensions to the RSN element.
* WPS: Store (secondary) device type as binaryJohannes Berg2011-03-171-2/+2
| | | | | | | Instead of converting back and forth from the string representation, always use the binary representation internally. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* FT: Make FT-over-DS configurable (hostapd.conf ft_over_ds=0/1)Shan Palanisamy2011-03-061-0/+2
|
* hostapd: Allow coexistance of HT BSSes with WEP/TKIP BSSesHelmut Schaa2011-02-211-4/+5
| | | | | | | | | | | | | | | | | | | In multi BSS setups it wasn't possible to set up an HT BSS in conjunction with a WEP/TKIP BSS. HT needed to be turned off entirely to allow WEP/TKIP BSSes to be used. In order to allow HT BSSes to coexist with non-HT WEP/TKIP BSSes add a new BSS conf attribute "disable_11n" which disables HT capabilities on a single BSS by suppressing HT IEs in the beacon and probe response frames. Furthermore, mark all STAs associated to a WEP/TKIP BSS as non-HT STAs. The disable_11n parameter is used internally; no new entry is parsed from hostapd.conf. This allows a non-HT WEP/TKIP BSS to coexist with a HT BSS without having to disable HT mode entirely. Nevertheless, all STAs associated to the WEP/TKIP BSS will only be served as if they were non-HT STAs. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* hostapd: Add require_ht configuration parameterJouni Malinen2011-02-091-0/+2
| | | | | This can be used to configure hostapd to reject association with any station that does not support HT PHY.
* AP: Enable WMM with default parameters by default for HTJohannes Berg2011-02-011-3/+1
| | | | | | | | If WMM is not disabled explicitly (wmm_enabled=0 in hostapd.conf), enable WMM automatically whenever HT (ieee80211n) is enabled. Use the default WMM parameters for AP TX queues and the EDCA parameters advertised for stations in WMM IE if no overriding values are included in the configuration.
* hostapd: Allow TDLS use to be prohibited in the BSSJouni Malinen2011-01-281-0/+12
| | | | | | tdls_prohibit=1 and tdls_prohibit_chan_switch=1 and now be used to disable use of TDLS or TDLS channel switching in the BSS using extended cabilities IE as defined in IEEE 802.11z.
* Allow AP mode to disconnect STAs based on low ACK conditionJohannes Berg2010-12-281-0/+2
| | | | | | | | | | | The nl80211 driver can report low ACK condition (in fact it reports complete loss right now only). Use that, along with a config option, to disconnect stations when the data connection is not working properly, e.g., due to the STA having went outside the range of the AP. This is disabled by default and can be enabled with disassoc_low_ack=1 in hostapd or wpa_supplicant configuration file. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* hostapd: Prohibit WEP configuration when HT is enabledYogesh Ashok Powar2010-11-091-0/+7
| | | | | | | WFA 11n testing does not allow WEP when IEEE 802.11n is enabled. Reject such combination when parsing hostapd configuration file. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com>
* Allow client isolation to be configured (ap_isolate=1)Felix Fietkau2010-11-091-0/+2
| | | | | | Client isolation can be used to prevent low-level bridging of frames between associated stations in the BSS. By default, this bridging is allowed.
* Add bridge handling for WDS STA interfacesFelix Fietkau2010-11-091-0/+3
| | | | | By default, add them to the configured bridge of the AP interface (if present), but allow the user to specify a separate bridge.
* Remove unused TX queue parameters related to Beacon framesJouni Malinen2010-11-051-10/+11
| | | | | | | These are not used by any driver wrapper, i.e., only the four data queues (BK, BE, VI, VO) are configurable. Better remove these so that there is no confusion about being able to configure something additional.
* Add WPA_IGNORE_CONFIG_ERRORS option to continue in case of bad configDmitry Shmidt2010-10-311-0/+2
| | | | | | | | | This is an option to continue with wpa_supplicant and hostapd even if config file has errors. The problem is that these daemons are the best "candidates" for the config change, so if they can not start because config file was let's say corrupted, you can not fix it easily. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* WPS 2.0: Disable WPS if ignore_broadcast_ssid or WEP is usedJouni Malinen2010-09-241-0/+14
| | | | | These combinations are disallowed in WPS 2.0 (and do not work well (or at all) with many deployed WPS 1.0 devices either).
* EAP-pwd: Add support for EAP-pwd server and peer functionalityDan Harkins2010-09-141-0/+4
| | | | | This adds an initial EAP-pwd (RFC 5931) implementation. For now, this requires OpenSSL.
* P2P: Add preliminary P2P Manager AP support for hostapdJouni Malinen2010-09-091-0/+13
|
* EAP server: Add support for configuring fragment sizeJouni Malinen2010-07-201-0/+2
|
* Allow advertising of U-APSD functionality in BeaconYogesh Ashok Powar2010-04-111-0/+2
| | | | | | | | hostapd does not implement UAPSD functionality. However, if U-APSD functionality is implemented outside hostapd, add support to advertise the functionality in beacon. Signed-off-by: yogeshp@marvell.com
* Close config file on error pathJouni Malinen2010-01-091-0/+1
|