path: root/hostapd/hostapd_cli.c
Commit message (Collapse)AuthorAgeFilesLines
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* Select the BSD license terms as the only license alternativeJouni Malinen2012-02-111-20/+3
| | | | | | | | | | | | | | | Simplify licensing terms for hostap.git by selecting the BSD license alternative for any future distribution. This drops the GPL v2 alternative from distribution terms and from contribution requirements. The BSD license alternative that has been used in hostap.git (the one with advertisement clause removed) is compatible with GPL and as such the software in hostap.git can still be used with GPL projects. In addition, any new contribution to hostap.git is expected to be licensed under the BSD terms that allow the changes to be merged into older hostap repositories that still include the GPL v2 alternative. Signed-hostap: Jouni Malinen <j@w1.fi>
* Update copyright notices to include year 2012Jouni Malinen2012-01-011-1/+1
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* WNM: Add BSS Transition Management Request for ESS Disassoc ImminentJouni Malinen2011-10-161-0/+21
| | | | | | | "hostapd_cli ess_disassoc (STA addr) (URL)" can now be used to send an ESS Dissassociation Imminent notification to the STA. This event is shown in wpa_supplicant ctrl_iface monitors (e.g., wpa_cli): "WNM: ESS Disassociation Imminent - session_info_url=http://example.com/session/"
* hostapd_cli: Start using src/utils/edit*.cJouni Malinen2011-07-161-63/+84
| | | | | This brings hostapd_cli closer to the design used in wpa_cli and allows command history and editing mechanisms to be added.
* Update copyright notices to include the new yearJouni Malinen2011-02-271-2/+2
* hostapd: Allow logging to fileBen Greear2011-02-061-0/+7
| | | | | | Also supports 'relog' CLI command to re-open the log file. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Add ctrl_iface command 'GET version'Jouni Malinen2010-10-311-0/+26
| | | | | This can be used to fetch the wpa_supplicant/hostapd version string.
* hostapd: Add wps_config ctrl_interface command for configuring APJouni Malinen2010-10-211-0/+46
| | | | | | This command can be used to configure the AP using the internal WPS registrar. It works in the same way as new AP settings received from an ER.
* WPS: Add hostapd_cli get_config commandJouni Malinen2010-09-231-0/+9
| | | | This can be used by a WPS UI to display the current AP configuration.
* WPS: Add wps_check_pin command for processing PIN from user inputJouni Malinen2010-09-231-0/+28
| | | | | UIs can use this command to process a PIN entered by a user and to validate the checksum digit (if present).
* WPS: Make testing operations configurable at runtimeJouni Malinen2010-09-221-0/+21
| | | | | | | | | | | | | | | | | | | Instead of build time options (CONFIG_WPS_TESTING_EXTRA_CRED and CONFIG_WPS_EXTENSIBILITY_TESTING), use a single build option (CONFIG_WPS_TESTING) and runtime configuration of which testing operations are enabled. This allows a single binary to be used for various tests. The runtime configuration can be done through control interface with wpa_cli/hostapd_cli commands: Enable extensibility tests: set wps_version_number 0x57 Disable extensibility tests (WPS2 build): set wps_version_number 0x20 Enable extra credential tests: set wps_testing_dummy_cred 1 Disable extra credential tests: set wps_testing_dummy_cred 0
* WPS 2.0: Add support for AuthorizedMACs attributeJouni Malinen2010-09-091-3/+6
| | | | | | | | | | Advertize list of authorized enrollee MAC addresses in Beacon and Probe Response frames and use these when selecting the AP. In order to provide the list, the enrollee MAC address should be specified whenever adding a new PIN. In addition, add UUID-R into SetSelectedRegistrar action to make it potentially easier for an AP to figure out which ER sent the action should there be multiple ERs using the same IP address.
* WPS: Add support for dynamic AP PIN managementJouni Malinen2010-08-241-0/+23
| | | | | | | | | A new hostapd_cli command, wps_ap_pin, can now be used to manage AP PIN at runtime. This can be used to generate a random AP PIN and to only enable the AP PIN for short period (e.g., based on user action on the AP device). Use of random AP PIN that is only enabled for short duration is highly recommended to avoid security issues with a static AP PIN.
* hostapd_cli: Add deauth/disassoc commands to usage helpJouni Malinen2010-04-111-0/+2
* Use more os.h wrapper functions in hostapd_cliJouni Malinen2010-04-071-6/+7
* Add support for action scripts in hostapd_cliGregory Detal2010-04-071-20/+139
* Add test commands for sending deauth/disassoc without dropping stateJouni Malinen2010-03-291-4/+12
| | | | | | | | | | | This can be used to test 802.11w by sending a protected or unprotected deauth/disassoc frame. hostapd_cli deauth <dst addr> test=<0/1> hostapd_cli disassoc <dst addr> test=<0/1> test=0: unprotected test=1: protected
* Add deauthenticate/disassociate ctrl_iface commandsJouni Malinen2010-03-291-0/+30
* Preparations for v0.7.1 releasehostap_0_7_1Jouni Malinen2010-01-161-2/+2
* hostapd_cli: Use os_program_{init,deinit}Jouni Malinen2009-12-191-0/+4
* Remove src/common from default header file pathJouni Malinen2009-11-291-2/+2
| | | | | | | | | | This makes it clearer which files are including header from src/common. Some of these cases should probably be cleaned up in the future not to do that. In addition, src/common/nl80211_copy.h and wireless_copy.h were moved into src/drivers since they are only used by driver wrappers and do not need to live in src/common.
* WPS: Add support for setting timeout for PINJouni Malinen2009-05-261-4/+8
| | | | | | | hostapd_cli wps_pin command can now have an optional timeout parameter that sets the PIN lifetime in seconds. This can be used to reduce the likelihood of someone else using the PIN should an active PIN be left in the Registrar.
* WPS: Add support for NFC out-of-band mechanismMasashi Honma2009-03-061-8/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The new file wps_nfc.c and ndef.c implements NFC device independent operation, wps_nfc_pn531.c implements NFC device dependent operation. This patch is only for the following use case: - Enrollee = wpa_supplicant - Registrar = hostapd internal Registrar Following NFC methods can be used: - Enrollee PIN with NFC - Registrar PIN with NFC - unencrypted credential with NFC Encrypted credentials are not supported. Enrollee side operation: Registrar side operation: Example configuration. CONFIG_WPS=y CONFIG_WPS_NFC=y CONFIG_WPS_NFC_PN531=y I used NFC device "NXP PN531". The NFC device access method is confidential, so I used outer library. Please download below files from https://www.saice-wpsnfc.bz/index.php [WPS NFC Library] WpsNfcLibrary/WpsNfc.h WpsNfcLibrary/WpsNfcType.h WpsNfcLibrary/WpsNfcVersion.h WpsNfcLibrary/linux/libnfc_mapping_pn53x.dll WpsNfcLibrary/linux/wpsnfc.dll [NFC Reader/Writer Kernel Driver] NFCKernelDriver-1.0.3/linux/kobj/sonyrw.ko <WiFi test> The hostapd/wpa_supplicant with this patch passed below tests on "Wi-Fi WPS Test Plan Version 1.6". 4.2.5 Add device using NFC Method with password token (I used SONY STA instead of NXP STA.) 4.2.6 Add device using NFC Method with configuration token 5.1.9 Add to AP using NFC Method with password token through internal registrar (I used SONY AP instead of NXP AP.) 5.1.10 Add to AP using NFC Method with configuration token through internal registrar
* WPS UFD: Build OOB functionality only if UFD is enabledJouni Malinen2009-02-261-0/+6
* WPS: Add UFD support (USBA out-of-band mechanism)Masashi Honma2009-02-261-0/+27
| | | | | | | | | | | | | | | | | | | | | | | | | This patch is only for the following use case: - Enrollee = wpa_supplicant - Registrar = hostapd internal Registrar Following UFD methods can be used: - Enrollee PIN with UFD - Registrar PIN with UFD - unencrypted credential with UFD Encrypted credentials are not supported. Enrollee side operation: wpa_cli -i ath0 wps_oob <device type> <mount point> <oob method> oob method = pin-e/pin-r/cred wpa_cli -i ath0 wps_oob ufd /mnt/ pin-r Registrar side operation: ./hostapd_cli -i ath0 wps_oob <device type> <mount point> <oob method> oob method = pin-e/pin-r/cred hostapd_cli -i ath0 wps_oob ufd /mnt/ cred
* Increased wpa_cli/hostapd_cli ping interval and made it configurableJouni Malinen2009-01-201-4/+9
| | | | | | The default interval is now 5 seconds (used to be 1 second for interactive mode and 2 seconds for wpa_cli -a). The interval can be changed with -G<seconds> command line option.
* Preparations for 0.6.7 releaseJouni Malinen2009-01-061-2/+2
* Added ctrl_interface command for sending a SA Query requestJouni Malinen2008-12-301-0/+22
| | | | | This can be useful for testing IEEE 802.11w functionality, so provide means for manual request to send a SA Query request.
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+31
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+615