path: root/hostapd/defconfig
Commit message (Collapse)AuthorAgeFilesLines
* IEEE 802.11u: Add configuration and advertisement for InterworkingJouni Malinen2011-10-161-0/+5
* Remove EAP-TTLSv1 and TLS/IAJouni Malinen2011-09-251-9/+1
| | | | | | | | | | | | | | These protocols seem to be abandoned: latest IETF drafts have expired years ago and it does not seem likely that EAP-TTLSv1 would be deployed. The implementation in hostapd/wpa_supplicant was not complete and not fully tested. In addition, the TLS/IA functionality was only available when GnuTLS was used. Since GnuTLS removed this functionality in 3.0.0, there is no available TLS/IA implementation in the latest version of any supported TLS library. Remove the EAP-TTLSv1 and TLS/IA implementation to clean up unwanted complexity from hostapd and wpa_supplicant. In addition, this removes any potential use of the GnuTLS extra library.
* TLS: Add support for TLS v1.1 (RFC 4346) with internal TLSJouni Malinen2011-09-251-0/+36
| | | | | This is disabled by defautl and can be enabled with CONFIG_TLSV11=y build configuration parameter.
* random: Add support for maintaining internal entropy store over restartsJouni Malinen2011-05-311-2/+8
| | | | | | | This can be used to avoid rejection of first two 4-way handshakes every time hostapd (or wpa_supplicant in AP/IBSS mode) is restarted. A new command line parameter, -e, can now be used to specify an entropy file that will be used to maintain the needed state.
* Include nl80211 driver wrapper in default configuration for hostapdJouni Malinen2011-05-161-1/+1
* Remove obsolete comments about libnl 1.1 being newJouni Malinen2011-02-211-6/+0
* hostapd: Allow logging to fileBen Greear2011-02-061-0/+4
| | | | | | Also supports 'relog' CLI command to re-open the log file. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Maintain internal entropy pool for augmenting random number generationJouni Malinen2010-11-231-0/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default, make hostapd and wpa_supplicant maintain an internal entropy pool that is fed with following information: hostapd: - Probe Request frames (timing, RSSI) - Association events (timing) - SNonce from Supplicants wpa_supplicant: - Scan results (timing, signal/noise) - Association events (timing) The internal pool is used to augment the random numbers generated with the OS mechanism (os_get_random()). While the internal implementation is not expected to be very strong due to limited amount of generic (non-platform specific) information to feed the pool, this may strengthen key derivation on some devices that are not configured to provide strong random numbers through os_get_random() (e.g., /dev/urandom on Linux/BSD). This new mechanism is not supposed to replace proper OS provided random number generation mechanism. The OS mechanism needs to be initialized properly (e.g., hw random number generator, maintaining entropy pool over reboots, etc.) for any of the security assumptions to hold. If the os_get_random() is known to provide strong ramdom data (e.g., on Linux/BSD, the board in question is known to have reliable source of random data from /dev/urandom), the internal hostapd random pool can be disabled. This will save some in binary size and CPU use. However, this should only be considered for builds that are known to be used on devices that meet the requirements described above. The internal pool is disabled by adding CONFIG_NO_RANDOM_POOL=y to the .config file.
* Fix a typo in the commentJouni Malinen2010-11-101-1/+1
* hostapd: Add comment about CONFIG_FULL_DYNAMIC_VLAN to defconfigHelmut Schaa2010-11-091-0/+4
| | | | | | | Add comment about CONFIG_FULL_DYNAMIC_VLAN to defconfig. By default this feature is still disabled. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* WPS 2.0: Make WSC 2.0 support to be build option (CONFIG_WPS2)Jouni Malinen2010-09-091-0/+2
| | | | | For now, the default build will only include WSC 1.0 support. CONFIG_WPS2=y can be used to add support for WSC 2.0.
* bsd: Add support for WPA_TRACE and WPA_TRACE_BFDMasashi Honma2010-01-091-0/+10
| | | | On FreeBSD 8.0, WPA_TRACE and WPA_TRACE_BFD functionality build fails.
* Comment CONFIG_WPA_TRACE_BFD=y out by defaultJouni Malinen2009-12-231-1/+1
* Describe tracing build options for developersJouni Malinen2009-12-201-0/+10
* Remove obsolete Prism54.org driver support (driver_prism54.c)Jouni Malinen2009-12-121-3/+0
| | | | | | | | | | | | | | | | | The Prism54.org project seems have been dead for a while and it does not look like this driver would ever be maintained again. Furthermore, it is difficult to find a version that would work with the driver_prism54.c wrapper and there is another driver for these card in the Linux kernel tree. The hostapd integration in driver_prism54.c is quite different from the other driver wrappers and would require major effort to get it cleaned up. Since there does not seem to be any real users for the cleaned up version, there does not seem to be justification to spend this effort on the wrapper. This old code is making it much more difficult to clean up the driver interface and at this point, the best option seems to be to remove the driver wrappers. Should someone really still need this, the old code will continue to be available in hostapd 0.6.x.
* Make HOSTAPD_DUMP_STATE configurable with CONFIG_NO_DUMP_STATEJouni Malinen2009-11-291-0/+5
| | | | | | This removes the hardcoded definition from Makefile and cleans up source code by moving the mail HOSTAPD_DUMP_STATE blocks into separate files to avoid conditional compilation within files.
* Use better examples for MadWifi path in defconfig, clarify commentsPavel Roskin2009-02-041-1/+1
| | | | | | | | MadWifi is unlikely to be in ../head relative to hostapd or wpa_supplicant, as it would be inside the hostap git repository. MadWifi sources are more likely to be in a directory called "madwifi" and residing outside the hostap repository. Using "madwifi" also demonstrates that the top-level madwifi directory is needed.
* Added notes about WPS UPnP support and external RegistrarsJouni Malinen2009-01-291-0/+2
* Added build option for removing VLAN support (CONFIG_NO_VLAN)Jouni Malinen2009-01-121-0/+3
* Added support for removing RADIUS accounting and RADIUS in generalJouni Malinen2009-01-081-0/+6
| | | | | CONFIG_NO_ACCOUNTING=y and CONFIG_NO_RADIUS=y build options can now be used to remove RADIUS support from the hostapd build.
* Added CONFIG_NO_STDOUT_DEBUG for hostapdJouni Malinen2009-01-081-0/+5
| | | | | This is similar to one in wpa_supplicant and can be used to reduce the binary size by removing debugging messages.
* Added CONFIG_IEEE80211N into defconfig (commented out)Jouni Malinen2008-12-091-0/+3
* Updated the comment about libnl to state that version 1.1 is new enoughJouni Malinen2008-12-091-2/+3
* Merged EAP-AKA' into eap_aka.c and added it to defconfig/ChangeLogJouni Malinen2008-12-071-0/+4
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+3
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* Added a new driver wrapper, "none", for RADIUS server only configurationJouni Malinen2008-10-011-0/+3
| | | | | This can be used to limit hostapd code size and clean up debug output for configurations that do not use hostapd to control AP functionality.
* IEEE Std 802.11r-2008 has been released, so update referencesJouni Malinen2008-08-151-4/+1
* Support for RADIUS ACLs with drivers that do not use hostapd MLMEChris Zimmermann2008-03-121-0/+4
| | | | | | | | | | | | | | | | | | Sam Leffler <sam@errno.com>: Attached are changes from Chris Zimmerman (cc'd) to allow drivers to handle radius ACL's. The patch is against 0.5.10 but I suspect will also apply to your latest code. These mods enable radius acl support in freebsd w/ my vap code. You may want to do the changes to ieee802_11_auth.c differently as they currently require all participating drivers to work the same. You might be able to check the return value from hostapd_set_radius_acl_auth and use that to decide whether the alternate code should be run so you can have 1 driver using this stuff while the other does not. (jm: Added without more dynamic check for now; in addition, none of the current in-tree driver wrappers actually implement these handlers, so this is in preparation for future changes)
* TNC: Added TNC server support into documentation and ChangeLogsJouni Malinen2008-03-091-0/+3
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+119