HOSTAPD wpa_supplicant Madwifi Detailed analysis (14)--End of article

Source: Internet
Author: User
Tags rfc

Note: This article does not talk about technology

Check out the "HOSTAPD wpa_supplicant Madwifi Detailed analysis" series of articles, intermittent update to now, found that the middle of the duration is nearly two years. Remember that time just graduated to the company, the team leader asked me to see the wireless part of the project code, their own silly look at one months, the leader asked me:

How is VAP created? How are the STA and AP connected? How does WDS work? What is the difference between pin and pushbutton in WPS? How are several encryption methods in our DUT implemented? What is HOSTAPD used for?

I was so embarrassed by these questions that I felt that what I had spent one months learning was trivial to them. Later decided to start from HOSTAPD deep learning, while summing up their own ideas.

Although the above problems have been clear, but for various reasons have been interrupted, failed to update in a timely manner. More importantly, the more you find that there are more things to add, the more you will find their own description of the loopholes too much, the more dare not easy to write, so as not to bring anything misleading.

Then do Cisco's project, responsible for the function of the captive portal, a figure is two months, careless right, and then own the Netgear Extender project, busy before busy, a full nine months, small rookie always because of various problems to get the burn, Will because can not think of the solution and distracted, that period of time, overtime is simply a routine, if one day did not work overtime in the heart but will feel empty, now think about then really wayward!

The first article in this series is what does the HOSTAPD do? ", in fact, when the answer is not good, as the end of the article, here to answer:

HOSTAPD is an application that, as a process of working in the application layer, can do what it does, much depends on the kernel and the driver, and HOSTAPD is the wireless-related process, so it is more dependent on the WiFi driver. If you want to ask HOSTAPD is why, mainly based on WiFi driver to ask, different wireless chip manufacturers have different implementations, have to provide different WiFi driver, so the need to hostapd to supplement the corresponding features of the WiFi driver, HOSTAPD is the right-arm for Wireless LAN, such as QCA, but for a WiFi driver that does not require HOSTAPD to provide services that can encapsulate the functionality, HOSTAPD is not very useful. such as MTK.

HOSTAPD can accomplish almost any wireless configuration work that other wireless tools can accomplish, such as Iwconfig,iwpriv, Wlanconfig, Iwlist, and so on, HOSTAPD it can be done.

HOSTAPD can also complete the work that the wireless tool does not do, including WPA/WPA2 encryption, RADIUS encryption, Wps,pin, and other functions.

So in the application layer, WiFi this piece often as long as a HOSTAPD process is enough, especially for the STA interface, such as mobile phones, often as long as a wpa_supplicant process can do most of the WiFi work. Therefore, HOSTAPD can not only complete the configuration of the wireless interface in the application layer, but also obtain the information of the wireless interface, and can realize the encryption function of the corresponding interface.


The previous series of articles, although the introduction of HOSTAPD and wpa_supplicant Some of the things, is not very comprehensive, most of it is just a summary, not in depth, of course, for an application to go deep to where it seems not too realistic, Unless you know more about driver and wireless network protocols. Later should not write this series of articles, but will be on the previous article maintenance, to enrich, but also maintain a hostapd.git warehouse, some of the code to comment, interested students can come here clone view [email protected] : Lee244868149/hostapd.git.

In front of those articles, the main information is from the Web search (there are offensive to the original author's Place also pointed out, will be corrected) as well as the RfC, personal referral to the official standard documents, after all, through other people's collation, there may be errors, other people's books or articles should be used to help us better understand the RFC, Ultimately, it's up to the RFC to find the original basis. The following is the relevant RFC:

802.1x-2004.pdf

IEEE STD 802.1x-2010.pdf

rfc4137. state-machines-for-extensible-authentication-protocol-(EAP)-peer-and-authenticator.pdf

802.11-2012.pdf

Wi-fi_simple_configuration_technical_specification_v2.0.5.pdf

Wpa_supplicant-devel.pdf

IEEE STD 802.1ar-2009 IEEE Standard for Local and metropolitan area Networks-secure Device identity.pdf

HOSTAPD wpa_supplicant Madwifi Detailed analysis (14)--end of article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.