Rany Hany
913368a223
hostapd: add support for SAE in PPSK option
...
This patch allows the use of SAE when using PPSK after
https://w1.fi/cgit/hostap/commit/?id=fcbdaae8a52e542705a651ee78b39b02935fda20
added support for it.
It also implements a fix so that this option works with SAE. The reason this
doesn't work out of the box is because OpenWRT deviates from hostapd defaults
by setting `sae_pwe` option to 2 which makes this mode not function properly
(results in every auth attempt being denied).
That issue was addressed by not overriding hostapd's default for the `sae_pwe`
option when the PPSK option is in use. This should be fine because hostapd's
test cases specifically test this mode with the default SAE parameters. See:
https://w1.fi/cgit/hostap/commit/?id=c34b35b54e81dbacd9dee513b74604c87f93f6a3
Signed-off-by: Rany Hany <rany_hany@riseup.net >
Link: https://github.com/openwrt/openwrt/pull/16343
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de >
2024-10-20 19:27:08 +02:00
Felix Fietkau
c1e43c36b4
wifi-scripts: add better defaults for 6 GHz interop
...
Indicate stationary AP and set default 6G regulatory power type to indoor
Signed-off-by: Felix Fietkau <nbd@nbd.name >
2024-10-02 18:17:26 +02:00
Lev A. Melnikovsky
b0aecfaa4f
hostapd-common: add missing ingredients for standalone EAP server
...
Namely radius_server_auth_port and radius_server_clients arguments. Below is a working config example:
config wifi-iface 'enterprise1'
option device 'radio1'
option mode 'ap'
option network 'lan'
option ssid 'openwrt'
option encryption 'wpa2'
option dh_file '/etc/hostapd/dh.pem'
option eap_server '1'
option eap_user_file '/etc/hostapd/eap_user'
option ca_cert '/etc/hostapd/ca.pem'
option server_cert '/etc/hostapd/server.crt'
option private_key '/etc/hostapd/server.key'
option radius_server_clients '/etc/hostapd/radius_clients'
option radius_server_auth_port 1812
config wifi-iface 'enterprise2'
option device 'radio2'
option mode 'ap'
option network 'lan'
option ssid 'openwrt'
option encryption 'wpa2'
option dh_file '/etc/hostapd/dh.pem'
option auth_server '127.0.0.1'
option auth_secret 'radius_secret'
option auth_cache '0'
Signed-off-by: Lev A. Melnikovsky <melnikovsky@gmail>
Link: https://github.com/openwrt/openwrt/pull/16112
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de >
2024-09-22 23:25:14 +02:00
Sarah Maedel
8de185a176
hostapd: fix anqp_3gpp_cell_net list delimiter
...
This patch fixes the list delimiter between 3GPP networks
passed to hostapd.
> list iw_anqp_3gpp_cell_net '262,001'
> list iw_anqp_3gpp_cell_net '262,002'
When passing a list of "iw_anqp_3gpp_cell_net" parameters via UCI,
hostapd would crash at startup:
> daemon.err hostapd: Line 73: Invalid anqp_3gpp_cell_net: 262,001:262,002
Using a semicolon as a delimiter, hostapd will start as expected.
Signed-off-by: Sarah Maedel <git@tbspace.de >
2024-08-28 11:57:23 +02:00
Gioacchino Mazzurco
e80520197c
hostapd: Add support for APuP
...
Add support for hostapd Access Point Micro Peering
Signed-off-by: Gioacchino Mazzurco <gio@polymathes.cc >
Link: https://gitlab.com/g10h4ck/hostap/-/commits/APuP
Link: https://github.com/openwrt/openwrt/pull/15442
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de >
2024-08-13 00:28:32 +02:00
Eneas U de Queiroz
472312f83f
wifi-scripts: fix FILS AKM selection with EAP-192
...
Fix netifd hostapd.sh selection of FILS-SHA384 algorithm with eap-192.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com >
2024-02-17 08:36:48 -03:00
Felix Fietkau
2716853132
wifi-scripts: add new package, move wifi scripts to a single place
...
Signed-off-by: Felix Fietkau <nbd@nbd.name >
2024-02-03 16:16:36 +01:00