openwrt/package/network/services/hostapd/files
Timo Sigurdsson bf98faaac8 hostapd: make wnm_sleep_mode_no_keys configurable
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
2021-06-22 11:10:06 -10:00
..
hostapd-basic.config hostapd: enable airtime policy for the -basic variants 2021-04-03 18:57:13 +02:00
hostapd-full.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
hostapd-mini.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
hostapd.sh hostapd: make wnm_sleep_mode_no_keys configurable 2021-06-22 11:10:06 -10:00
multicall.c
wpa_supplicant-basic.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
wpa_supplicant-full.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
wpa_supplicant-mini.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
wpa_supplicant-p2p.config hostapd: enable the epoll-based event loop 2020-11-23 03:02:21 +00:00
wpad_acl.json hostapd: run as user 'network' if procd-ujail is installed 2021-01-14 00:52:50 +00:00
wpad.init hostapd: run as user 'network' if procd-ujail is installed 2021-01-14 00:52:50 +00:00
wpad.json hostapd: run as user 'network' if procd-ujail is installed 2021-01-14 00:52:50 +00:00
wps-hotplug.sh hostapd: add Multi-AP patches and config options 2019-02-20 13:17:11 +01:00