path: root/hostapd/Makefile
Commit message (Collapse)AuthorAgeFilesLines
* Start deprecating various AP mode driver_opsJouni Malinen2011-10-171-1/+1
| | | | | The preferred way of configuring AP mode will be to use set_ap() instead of number of separate operations hostapd has collected over the years.
* Move SA Query mechanism into a file that can be shared more easilyMahesh Palivela2011-10-171-0/+1
| | | | | | This is the first step in allowing SA Query mechanism in hostapd to be used with drivers that implement authentication and association MLME/SME (i.e., do not use ieee802_11.c).
* IEEE 802.11u: Add configuration and advertisement for InterworkingJouni Malinen2011-10-161-0/+4
* Fix object file list for hlr_auc_gwMukesh Agrawal2011-10-151-0/+1
| | | | | | | If CONFIG_NO_RANDOM_POOL is unset, src/crypto/random.o is linked into hlr_auc_gw. However, in this configuration, random.o requires symbols defined in src/utils/eloop.o. So add eloop.o to the object file list for hlr_auc_gw.
* Remove EAP-TTLSv1 and TLS/IAJouni Malinen2011-09-251-4/+0
| | | | | | | | | | | | | | These protocols seem to be abandoned: latest IETF drafts have expired years ago and it does not seem likely that EAP-TTLSv1 would be deployed. The implementation in hostapd/wpa_supplicant was not complete and not fully tested. In addition, the TLS/IA functionality was only available when GnuTLS was used. Since GnuTLS removed this functionality in 3.0.0, there is no available TLS/IA implementation in the latest version of any supported TLS library. Remove the EAP-TTLSv1 and TLS/IA implementation to clean up unwanted complexity from hostapd and wpa_supplicant. In addition, this removes any potential use of the GnuTLS extra library.
* TLS: Add support for TLS v1.1 (RFC 4346) with internal TLSJouni Malinen2011-09-251-0/+4
| | | | | This is disabled by defautl and can be enabled with CONFIG_TLSV11=y build configuration parameter.
* Fix hostapd_cli linking without CONFIG_WPA_TRACE=yVladimir2011-07-191-1/+1
* hostapd_cli: Start using src/utils/edit*.cJouni Malinen2011-07-161-2/+13
| | | | | This brings hostapd_cli closer to the design used in wpa_cli and allows command history and editing mechanisms to be added.
* Make the link process quieter unless V=1 is specifiedJouni Malinen2011-03-171-4/+8
| | | | | | Hide the long command lines used for linking the binaries in the default build. "make V=1" can be used to show the actual commands if needed.
* hostapd: Allow logging to fileBen Greear2011-02-061-0/+4
| | | | | | Also supports 'relog' CLI command to re-open the log file. Signed-off-by: Ben Greear <greearb@candelatech.com>
* hostapd: Ensure that the destination directory existsMike Crowe2011-01-301-0/+1
| | | | | | | Ensure that the destination binary directory exists before installing into it. Signed-off-by: Mike Crowe <mac@mcrowe.com>
* Use DESTDIR when installing hostapd to support cross-compilingMike Crowe2011-01-301-1/+1
| | | | Signed-off-by: Mike Crowe <mac@mcrowe.com>
* Maintain internal entropy pool for augmenting random number generationJouni Malinen2010-11-231-0/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default, make hostapd and wpa_supplicant maintain an internal entropy pool that is fed with following information: hostapd: - Probe Request frames (timing, RSSI) - Association events (timing) - SNonce from Supplicants wpa_supplicant: - Scan results (timing, signal/noise) - Association events (timing) The internal pool is used to augment the random numbers generated with the OS mechanism (os_get_random()). While the internal implementation is not expected to be very strong due to limited amount of generic (non-platform specific) information to feed the pool, this may strengthen key derivation on some devices that are not configured to provide strong random numbers through os_get_random() (e.g., /dev/urandom on Linux/BSD). This new mechanism is not supposed to replace proper OS provided random number generation mechanism. The OS mechanism needs to be initialized properly (e.g., hw random number generator, maintaining entropy pool over reboots, etc.) for any of the security assumptions to hold. If the os_get_random() is known to provide strong ramdom data (e.g., on Linux/BSD, the board in question is known to have reliable source of random data from /dev/urandom), the internal hostapd random pool can be disabled. This will save some in binary size and CPU use. However, this should only be considered for builds that are known to be used on devices that meet the requirements described above. The internal pool is disabled by adding CONFIG_NO_RANDOM_POOL=y to the .config file.
* Fix hlr_auc_gw build with CONFIG_WPA_TRACE=yJouni Malinen2010-11-231-0/+2
* P2P: Extend P2P manager functionality to work with driver MLMEJouni Malinen2010-10-081-0/+5
| | | | | Add P2P IE into Beacon, Probe Response, and (Re)Association Request frames for drivers that generate this frames internally.
* WPS: Make testing operations configurable at runtimeJouni Malinen2010-09-221-0/+4
| | | | | | | | | | | | | | | | | | | Instead of build time options (CONFIG_WPS_TESTING_EXTRA_CRED and CONFIG_WPS_EXTENSIBILITY_TESTING), use a single build option (CONFIG_WPS_TESTING) and runtime configuration of which testing operations are enabled. This allows a single binary to be used for various tests. The runtime configuration can be done through control interface with wpa_cli/hostapd_cli commands: Enable extensibility tests: set wps_version_number 0x57 Disable extensibility tests (WPS2 build): set wps_version_number 0x20 Enable extra credential tests: set wps_testing_dummy_cred 1 Disable extra credential tests: set wps_testing_dummy_cred 0
* EAP-pwd: Add support for EAP-pwd server and peer functionalityDan Harkins2010-09-151-0/+6
| | | | | This adds an initial EAP-pwd (RFC 5931) implementation. For now, this requires OpenSSL.
* WPS: Fix CONFIG_WPS_STRICT build optionJouni Malinen2010-09-091-5/+5
| | | | This was not supposed to be depending on CONFIG_WPS_NFC.
* WPS 2.0: Make WSC 2.0 support to be build option (CONFIG_WPS2)Jouni Malinen2010-09-091-0/+4
| | | | | For now, the default build will only include WSC 1.0 support. CONFIG_WPS2=y can be used to add support for WSC 2.0.
* WPS 2.0: Validate WPS attributes in management frames and WSC messagesJouni Malinen2010-09-091-0/+5
| | | | | | | | If CONFIG_WPS_STRICT is set, validate WPS IE(s) in management frames and reject the frames if any of the mandatory attributes is missing or if an included attribute uses an invalid value. In addition, verify that all mandatory attributes are included and have valid values in the WSC messages.
* Fix hostapd build with CONFIG_IEEE80211N but without NEED_AP_MLMEJouni Malinen2010-09-051-2/+2
* WPS: Include CONFIG_EAP automatically if WPS is enabledJouni Malinen2010-04-171-0/+1
* Support for Solaris default shell restrictionMasashi Honma2010-04-171-1/+1
| | | | | Some shells (like Solaris default /bin/sh) doesn't allow -e option for file existence check. Use -f instead.
* hostapd: Use cp -f in make installMichael Buesch2010-04-061-1/+1
| | | | | | | | | If hostapd is running, a make install fails with cp: cannot create regular file `/usr/local/bin/hostapd': Text file busy Use cp -f to avoid this error and force-override the file. Signed-off-by: Michael Buesch <mb@bu3sch.de>
* Rename EAP server source files to avoid duplicate namesJouni Malinen2010-02-191-21/+21
| | | | | This makes it easier to build both EAP peer and server functionality into the same project with some toolchains.
* Fix linking of nt_password_hashJouni Malinen2010-01-161-1/+12
| | | | | Need to use conditional linking of some crypto functionality and add couple of additional object files. [Bug 343]
* Remove src/drivers/scan_helpers.cJouni Malinen2010-01-031-1/+0
| | | | | | | Most of this file was already moved into wpa_supplicant/scan.c and we can remove the file completely by having couple of small helper functions copied to the remaining users outside core wpa_supplicant code.
* Rename some src/ap files to avoid duplicate file namesJouni Malinen2009-12-251-7/+7
| | | | | | Doxygen and some build tools may get a bit confused about same file name being used in different directories. Clean this up a bit by renaming some of the duplicated file names in src/ap.
* Move rest of the generic AP mode functionality into src/apJouni Malinen2009-12-251-5/+5
* Move WPA authenticator glue code into a separate fileJouni Malinen2009-12-251-0/+1
* Move authentication server setup into separate fileJouni Malinen2009-12-251-0/+1
* Move iapp.c into src/apJouni Malinen2009-12-251-1/+1
* Move ctrl_iface_ap.c into src/apJouni Malinen2009-12-251-1/+1
* Move wps_hostapd.c into src/apJouni Malinen2009-12-241-1/+2
* Move generic AP functionality implementation into src/apJouni Malinen2009-12-241-13/+25
| | | | | | | | | | This code can be shared by both hostapd and wpa_supplicant and this is an initial step in getting the generic code moved to be under the src directories. Couple of generic files still remain under the hostapd directory due to direct dependencies to files there. Once the dependencies have been removed, they will also be moved to the src/ap directory to allow wpa_supplicant to be built without requiring anything from the hostapd directory.
* Move hostapd configuration parser into separate fileJouni Malinen2009-12-241-1/+1
| | | | | | config.c includes now only the generic helper functions that are needed both for hostapd and the AP mode operations in wpa_supplicant. hostapd/config_file.c is only needed for hostapd.
* hostapd: Use separate driver operations abstractionJouni Malinen2009-12-241-0/+1
| | | | | | It would be bettet to avoid including driver_i.h, i.e., direct driver operation calls from hostapd components. This is an initial step in that direction for WPS IE updates.
* Add option libbfd support for tracing codeJouni Malinen2009-12-201-1/+8
| | | | | | CONFIG_WPA_TRACE=y and CONFIG_WPA_TRACE_BFD=y can now be used to get even more complete symbols (func/file/line and inline functions) for backtraces.
* Add memory allocation analyzer to verify OS wrapper useJouni Malinen2009-12-191-0/+4
| | | | | | | | WPA_TRACE=y builds will now verify that memory allocation in done consistently using os_{zalloc,malloc,realloc,strdup,free} (i.e., no mixing of os_* functions and unwrapper functions). In addition, some common memory allocation issues (double-free, memory leaks, etc.) are detected automatically.
* Add backtrace support for debuggingJouni Malinen2009-12-191-0/+5
| | | | | | | WPA_TRACE=y can now be used to enable internal backtrace support that will provide more details about implementation errors, e.g., when some resources are not released correctly. In addition, this will print out a backtrace automatically if SIGSEGV is received.
* WPS: Handle Selected Registrar as a union of info from all RegistrarsJouni Malinen2009-12-121-0/+1
| | | | | | | | | | | | | | | | | Instead of using the latest selected registrar change, collect selected registrar information separately from all registrars and use the union of this information when building the WPS IE for Beacon and Probe Response frames. Note: SetSelectedRegistrar UPnP action does not include a unique identifier, so the ER matching routine is based only on the IP address of the ER. In theory, there could be multiple ERs using the same IP address (but different port or URL), so there may be some corner cases that would not always match the correct ER entry at the AP. Anyway, this is not really expected to occur in normal use cases and even if it did happen, the selected registrar information is not any worse than it was before when only the last change from any registrar for being advertized.
* Fix dh_groups.o build for some configurationsJouni Malinen2009-12-111-7/+4
| | | | | Need to include dh_groups.o in the build even if not all DH groups are included. Only internal crypto build case was doing this properly.
* Move IEEE 802.11n HT management code into a separate fileJouni Malinen2009-12-061-0/+3
* Move hlr_auc_gw into hostapd directoryJouni Malinen2009-12-061-1/+1
| | | | | | | This is a separate program and is used mainly with hostapd, so it is better to move this into the hostapd subdirectory now that Milenage code has already been moved into src/crypto. Milenage was the only generic component in hlr_auc_gw.
* Remove unneeded CONFIG_INTERNAL_X509 and NEED_SHA256 definesJouni Malinen2009-12-061-2/+1
* Split crypto_internal.c into parts to clean up buildJouni Malinen2009-12-061-4/+8
| | | | | This makes it easier to make src/libcrypto.a and only link in code that is really used.
* Move EAP method registration away from src/eap_{peer,server}Jouni Malinen2009-12-061-0/+2
| | | | | | This makes it easier to make a library out of EAP methods without losing possiblity of binary size optimization by linker dropping unreferenced code.
* Remove Milenage test from hostapd/MakefileJouni Malinen2009-12-051-17/+0
* Move milenage.[ch] into src/cryptoJouni Malinen2009-12-051-1/+1
* Remove src/crypto from default include pathJouni Malinen2009-11-291-1/+0
| | | | | | In addition, start ordering header file includes to be in more consistent order: system header files, src/utils, src/*, same directory as the *.c file.