Home | History | Annotate | Download | only in hostapd

Lines Matching refs:hostapd

0 ##### hostapd configuration file ##############################################
9 # configuration parameter, bridge, may be used to notify hostapd if the
16 # added to the bridge automatically (brctl may refuse to do this before hostapd
23 # Use driver=none if building hostapd as a standalone RADIUS server that does
30 # hostapd event logger configuration
57 # Interface for separate control program. If this is specified, hostapd
61 # multiple hostapd processes/interfaces can be run at the same time if more
63 # /var/run/hostapd is the recommended directory for sockets and by default,
64 # hostapd_cli will use it when trying to connect with hostapd.
65 ctrl_interface=/var/run/hostapd
69 # possible to run hostapd as root (since it needs to change network
73 # cases. By default, hostapd is configured to use gid 0 (root). If you
140 # Please note that some drivers do not use this value from hostapd and the
175 # Channel list restriction. This option allows hostapd to select one of the
198 # If this field is not included in hostapd.conf, hostapd will not control
203 # If this field is not included in hostapd.conf, hostapd will not control
241 # hostapd to take care of management frame processing and as such, this can be
251 #accept_mac_file=/etc/hostapd.accept
252 #deny_mac_file=/etc/hostapd.deny
254 # IEEE 802.11 specifies two authentication algorithms. hostapd can be
362 # Enable this flag if U-APSD supported outside hostapd (eg., Firmware/driver)
471 # This field can be used to configure hostapd to add a fixed BSS Load element
501 # on overlapping BSSes. These changes are done automatically when hostapd
685 # hostapd is implemented based on IEEE Std 802.1X-2004 which defines EAPOL
688 # In order to make hostapd interoperate with these clients, the version number
735 # Optionally, hostapd can be configured to use an integrated EAP server
741 # server. This is also needed if hostapd is configured to act as a RADIUS
748 #eap_user_file=/etc/hostapd.eap_user
751 #ca_cert=/etc/hostapd.ca.pem
754 #server_cert=/etc/hostapd.server.pem
761 #private_key=/etc/hostapd.server.prv
768 # use this value. If not set, "hostapd" is used as a default.
772 # Note: hostapd does not yet support CRL downloading based on CDP. Thus, a
775 # concatenating these into one file. Whenever CRL changes, hostapd needs to be
795 # -CAfile /etc/hostapd.ca.pem \
796 # -issuer /etc/hostapd.ca.pem \
797 # -cert /etc/hostapd.server.pem \
816 # "openssl dhparam -out /etc/hostapd.dh.pem 2048"
817 #dh_file=/etc/hostapd.dh.pem
824 # on cipher suite configuration. This is applicable only if hostapd is built to
839 # prefix. If hostapd is built with SQLite support (CONFIG_SQLITE=y in .config),
842 #eap_sim_db=unix:/tmp/hlr_auc_gw.sock db=/tmp/hostapd.db
913 # to the NAS within the scope of the RADIUS server. Please note that hostapd
967 # If this is set (larger than 0) and acct_server is configured, hostapd will
970 # value should not be configured in hostapd.conf, if RADIUS server is used to
977 # This parameter can be used to configure hostapd to request CUI from the
1012 #vlan_file=/etc/hostapd.vlan
1015 # used to determine which VLAN a station is on. hostapd creates a bridge for
1016 # each VLAN. Then hostapd adds a VLAN interface (associated with the interface
1027 # When hostapd creates a VLAN interface on vlan_tagged_interfaces, it needs
1037 # of the attributes added automatically by hostapd.
1085 # hostapd can be used as a RADIUS authentication server for other hosts. This
1091 #radius_server_clients=/etc/hostapd.radius_clients
1133 #wpa_psk_file=/etc/hostapd.wpa_psk
1238 # and BSSes (i.e., all configurations within a single hostapd process).
1342 # interface controlled by the same hostapd process to restrict Probe Request
1356 # interface controlled by the same hostapd process to reject authentication
1374 # By default, a single hostapd process applies WPS operations to all configured
1400 # sent to hostapd ctrl_iface monitor. In addition, they can be written to a
1463 # If not set, hostapd will not allow external WPS Registrars to control the
1483 #extra_cred=hostapd.cred
1494 # wps_cred_processing=1 will disabled automatic updates of hostapd.conf file
1501 # By default, hostapd generates the AP Settings Attributes for M7 based on the
1506 #ap_settings=hostapd.ap_settings
1859 # option CONFIG_FST is set while compiling hostapd. They allow this interface
1885 # option CONFIG_TESTING_OPTIONS is set while compiling hostapd. They allow
1888 # Ignore probe requests sent to hostapd with the given probability, must be a
1914 # hostapd will generate BSSID mask based on the BSSIDs that are
1915 # configured. hostapd will verify that dev_addr & MASK == dev_addr. If this is
1917 # hostapd (ifconfig wlan0 hw ether <MAC addr>). If a BSSID is configured for
1918 # every secondary BSS, this limitation is not applied at hostapd and other
1930 # hostapd to use the driver auto-generated interface address (e.g., to use the
1938 # Please note that hostapd uses some of the values configured for the first BSS