Commit graph

12 commits

Author SHA1 Message Date
Hamish Guthrie
92d36617b6 hostapd: correctly pass 64 char hex PSK to wpa_supplicant
SVN-Revision: 30504
2012-02-13 16:07:53 +00:00
Jo-Philipp Wich
e1d199bbbc hostapd: introduce a client_cert option which is passed on to wpa_supplicant (#8876)
SVN-Revision: 29901
2012-01-24 20:54:13 +00:00
Jo-Philipp Wich
ec20b84048 hostapd: add code to prevent accidentally bridging non-wds sta mode interfaces
SVN-Revision: 28858
2011-11-08 14:22:56 +00:00
Vasilis Tsiligiannis
87cba7eb46 hostapd: Add 'identity' config option when eap_type is 'tls' on wpa_supplicant (#8164)
SVN-Revision: 23817
2010-11-03 10:39:29 +00:00
Felix Fietkau
35cdc5d722 hostapd/mac80211: implement support for AP+STA
SVN-Revision: 23602
2010-10-23 23:39:54 +00:00
Jo-Philipp Wich
4289fa555e hostapd: forgot the actual change in previous commit
SVN-Revision: 21821
2010-06-16 20:28:11 +00:00
Travis Kemen
21f006f156 Enable management frame protection in wpa_supplicant, and make it configurable in /etc/config/wireless.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>

SVN-Revision: 20395
2010-03-24 00:21:28 +00:00
Travis Kemen
e74fbc183b Cleanup redundant psk handling code in wpa_supplicant.sh. (I sent this one to openwrt-devel before, but I am resending it as part of this series because the next patch will also edit wpa_supplicant.sh).
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>

SVN-Revision: 20394
2010-03-24 00:19:42 +00:00
Felix Fietkau
7fdbfef92f wpa_supplicant: fix bridging settings for wds
SVN-Revision: 20088
2010-03-09 17:35:59 +00:00
Felix Fietkau
d692a2340c mac80211: always use wpa_supplicant for client connections (patch by Stijn Tintel)
Since client mode in mac80211is unreliable without using wpa_supplicant,
it would be better to enable wpa_supplicant by default.

With this patch, wpa_supplicant will always be used for mac80211-based
drivers in client mode. This will break client mode for images that
don't include wpa_supplicant or wpad, so maybe I need to add a check
somewhere to see if wpa_supplicant is available, and show the user a
warning if he tries client mode without wpa_supplicant. Suggestions on
where to add this check are welcome.

Tested with ath5k in client mode on open and wpa2-psk network, and
tested on my ath9k based AP as well to make sure it doesn't break AP mode.

SVN-Revision: 19718
2010-02-19 01:07:21 +00:00
Felix Fietkau
e1efddf19b mac80211: use wpa_supplicant for unencrypted connections to improve client mode reliability (patch by Stijn Tintel from #6653)
SVN-Revision: 19550
2010-02-08 13:42:14 +00:00
Felix Fietkau
64268c7165 hostapd: add a build variant for wpa_supplicant and one for a multicall hostapd+supplicant program (wpad) and remove the old wpa_supplicant package
SVN-Revision: 19286
2010-01-23 08:28:26 +00:00
Renamed from package/wpa_supplicant/files/wpa_supplicant.sh (Browse further)