mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-23 15:32:33 +00:00
6b9eb0c73a
When sta is configured, hostapd receives 'stop' and 'update' command from
wpa_supplicant. In the update command, hostapd gets sta parameters with
which it configures ap.
Problem is, with the default wireless configuration:
mode:11g freq:2.4GHz channel:1
If sta is connected to 5GHz network, then ap does not work. Ideally with
340-reload_freq_change.patch hostapd should reload the frequency changes
and start ap in 5GHz, but ap becomes invisible in the network.
This issue can be reproduced with following /etc/config/wireless:
config wifi-device radio0
option type mac80211
option channel 1
option hwmode 11g
option path 'virtual/uccp420/uccwlan'
option htmode 'none'
config wifi-iface 'ap'
option device 'radio0'
option encryption 'none'
option mode 'ap'
option network 'ap'
option ssid 'MyTestNet'
option encryption none
config wifi-iface 'sta'
option device radio0
option network sta
option mode sta
option ssid TestNet-5G
option encryption psk2
option key 12345
This change updates current_mode structure based on configured hw_mode
received from wpa_supplicant. Also prepare rates table after frequency
selection.
Signed-off-by: Abhilash Tuse <Abhilash.Tuse@imgtec.com>
Signed-off-by: Felix Fietkau <nbd@nbd.name> [cleanup, patch refresh]
(cherry picked from commit
|
||
---|---|---|
.. | ||
001-Fix-race-condition-between-AssocResp-callback-and-4a.patch | ||
002-Fix-duplicate-Reassociation-Request-frame-dropping.patch | ||
003-RSN-IBSS-Fix-TK-clearing-on-Authentication-frame-RX.patch | ||
004-hostapd-Add-possibility-to-send-debug-messages-to-sy.patch | ||
005-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch | ||
006-Prevent-reinstallation-of-an-already-in-use-group-ke.patch | ||
007-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch | ||
008-Prevent-installation-of-an-all-zero-TK.patch | ||
009-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch | ||
010-TDLS-Reject-TPK-TK-reconfiguration.patch | ||
011-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch | ||
012-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch | ||
013-Add-hostapd-options-wpa_group_update_count-and-wpa_p.patch | ||
014-WPA-Extra-defense-against-PTK-reinstalls-in-4-way-ha.patch | ||
015-Clear-PMK-length-and-check-for-this-when-deriving-PT.patch | ||
016-Optional-AP-side-workaround-for-key-reinstallation-a.patch | ||
017-Additional-consistentcy-checks-for-PTK-component-len.patch | ||
018-Clear-BSSID-information-in-supplicant-state-machine-.patch | ||
019-WNM-Ignore-WNM-Sleep-Mode-Request-in-wnm_sleep_mode-.patch | ||
100-daemonize_fix.patch | ||
110-no_eapol_fix.patch | ||
120-disable_bridge_packet_workaround.patch | ||
200-multicall.patch | ||
300-noscan.patch | ||
310-rescan_immediately.patch | ||
320-optional_rfkill.patch | ||
330-nl80211_fix_set_freq.patch | ||
340-reload_freq_change.patch | ||
350-nl80211_del_beacon_bss.patch | ||
360-ctrl_iface_reload.patch | ||
370-ap_sta_support.patch | ||
380-disable_ctrl_iface_mib.patch | ||
390-wpa_ie_cap_workaround.patch | ||
400-wps_single_auth_enc_type.patch | ||
410-limit_debug_messages.patch | ||
420-indicate-features.patch | ||
430-hostapd_cli_ifdef.patch | ||
431-wpa_cli_ifdef.patch | ||
432-missing-typedef.patch | ||
450-scan_wait.patch | ||
460-wpa_supplicant-add-new-config-params-to-be-used-with.patch | ||
461-driver_nl80211-use-new-parameters-during-ibss-join.patch | ||
462-wpa_s-support-htmode-param.patch | ||
470-survey_data_fallback.patch | ||
600-ubus_support.patch |