This Patch add APNOS support for captive portal radius user
authentication
Package: OpenNDS
Signed-off-by: Nagendrababu <nagendrababu.bonkuri@connectus.ai>
- Add support for configuring Passpoint parameters
- Add support for configuring RADIUS accounting parameters
Signed-off-by: Arif Alam <arif.alam@connectus.ai>
* Previous patch caused CI/CD to fail; this fix
fixes the issue.
Signed-off-by: Mario Senecic <mario.senecic@sartura.hr>
Signed-off-by: Damir Franusic <damir.franusic@sartura.hr>
* Bugfix in hostapd: fixed improper increment operator usage in os_realloc
function that caused a crash on multiple SSIDs
* Bugfix in ubus_collector: fixed the improper usage of blobmsg_for_each_attr
macro and the misplaced evsched_task_reschedule calls
* Reverted the previous client sessions hostapd patch
Signed-off-by: Mario Senecic <mario.senecic@sartura.hr>
* implementation of the following ubus methods:
1. "get_sessions"
2. "clear_sessions"
3. "clear_session"
4. "get_bss_list"
* tracking of STA sessions and events (AUTH, ASSOC, etc.)
* caching of events is handled by hostapd and resides in
AVL until it is processed by ubus_collector
* added hard-coded caching limit to prevent memory leaks;
this should be made configurable at some point in the
future
Signed-off-by: Damir Franusic <damir.franusic@netexperience.com>
Procd currently only respawns hostapd five times. This commit
will ensure that hostapd is always respawned.
Fixes: WIFI-705
Signed-off-by: Arif Alam <arif.alam@connectus.ai>
Procd currently only respawns hostapd five times. This commit
will ensure that hostapd is always respawned.
Fixes: WIFI-705
Signed-off-by: Arif Alam <arif.alam@connectus.ai>
We can now put "option rssi_ignore_probe_request -40" into uci. Probe requests
with a rssi worse then -40 will not be replied to.
Signed-off-by: John Crispin <john@phrozen.org>
beacon_rate config was introduced as part of rrm commit. Some
drivers don't support this. Removing this config from
hostapd config.
Signed-off-by: Arif Alam <arif.alam@connectus.ai>
We require the eap version of the package. Default_packages was leaking in
the the wrong variant. Rather than patching every target we just make the
variant non available.
Signed-off-by: John Crispin <john@phrozen.org>