hostapd: Settings for DAE/CoA server
authornbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Tue, 6 Aug 2013 18:55:30 +0000 (18:55 +0000)
committernbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Tue, 6 Aug 2013 18:55:30 +0000 (18:55 +0000)
commit3f0051a424b64c5c73aedbbc70a5b33288beb7a3
tree3b84f740e50e8dc6c38b1c11300e99fcafa2ff87
parent1b5931e7d6f6646216d817f897b04f4f662cca66
hostapd: Settings for DAE/CoA server

hostapd supports "Dynamic Authorization Extensions", making it possible
to forcibly disconnect a user by sending it a RADIUS "Disconnect-Request"
packet.

I've added three new variables to enable setting of the
"radius_das_client" and "radius_das_port" variables in the hostapd
configuration, which enable these extensions.

* dae_client - IP of the client that can send disconnect requests
* dae_secret - shared secret for DAE packets

These are combined into the "radius_das_client" option in hostapd.conf
To enable the server, both dae_client and dae_secret must be set.

* dae_port - optional, default value is 3799 as specified in RFC 5176

Signed-off-by: Martijn van de Streek <martijn@vandestreek.net>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@37734 3c298f89-4303-0410-b956-a3cf2f4a3e73
package/network/services/hostapd/files/hostapd.sh