[arch-commits] Commit in hostapd/repos (14 files)

Evangelos Foutras foutrelis at nymeria.archlinux.org
Thu Mar 7 12:22:41 UTC 2013


    Date: Thursday, March 7, 2013 @ 13:22:41
  Author: foutrelis
Revision: 85796

archrelease: copy trunk to community-staging-i686, community-staging-x86_64

Added:
  hostapd/repos/community-staging-i686/
  hostapd/repos/community-staging-i686/PKGBUILD
    (from rev 85795, hostapd/trunk/PKGBUILD)
  hostapd/repos/community-staging-i686/config
    (from rev 85795, hostapd/trunk/config)
  hostapd/repos/community-staging-i686/hostapd
    (from rev 85795, hostapd/trunk/hostapd)
  hostapd/repos/community-staging-i686/hostapd.conf.d
    (from rev 85795, hostapd/trunk/hostapd.conf.d)
  hostapd/repos/community-staging-i686/hostapd.install
    (from rev 85795, hostapd/trunk/hostapd.install)
  hostapd/repos/community-staging-i686/hostapd.service
    (from rev 85795, hostapd/trunk/hostapd.service)
  hostapd/repos/community-staging-x86_64/
  hostapd/repos/community-staging-x86_64/PKGBUILD
    (from rev 85795, hostapd/trunk/PKGBUILD)
  hostapd/repos/community-staging-x86_64/config
    (from rev 85795, hostapd/trunk/config)
  hostapd/repos/community-staging-x86_64/hostapd
    (from rev 85795, hostapd/trunk/hostapd)
  hostapd/repos/community-staging-x86_64/hostapd.conf.d
    (from rev 85795, hostapd/trunk/hostapd.conf.d)
  hostapd/repos/community-staging-x86_64/hostapd.install
    (from rev 85795, hostapd/trunk/hostapd.install)
  hostapd/repos/community-staging-x86_64/hostapd.service
    (from rev 85795, hostapd/trunk/hostapd.service)

------------------------------------------+
 community-staging-i686/PKGBUILD          |   71 ++++++++++++++++++++++
 community-staging-i686/config            |   92 +++++++++++++++++++++++++++++
 community-staging-i686/hostapd           |   35 +++++++++++
 community-staging-i686/hostapd.conf.d    |    2 
 community-staging-i686/hostapd.install   |    7 ++
 community-staging-i686/hostapd.service   |   11 +++
 community-staging-x86_64/PKGBUILD        |   71 ++++++++++++++++++++++
 community-staging-x86_64/config          |   92 +++++++++++++++++++++++++++++
 community-staging-x86_64/hostapd         |   35 +++++++++++
 community-staging-x86_64/hostapd.conf.d  |    2 
 community-staging-x86_64/hostapd.install |    7 ++
 community-staging-x86_64/hostapd.service |   11 +++
 12 files changed, 436 insertions(+)

Copied: hostapd/repos/community-staging-i686/PKGBUILD (from rev 85795, hostapd/trunk/PKGBUILD)
===================================================================
--- community-staging-i686/PKGBUILD	                        (rev 0)
+++ community-staging-i686/PKGBUILD	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,71 @@
+# $Id$
+# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
+
+pkgname=hostapd
+pkgver=2.0
+pkgrel=3
+pkgdesc="IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator"
+arch=('i686' 'x86_64')
+url="http://w1.fi/hostapd/"
+license=('custom')
+depends=('openssl' 'libnl')
+backup=('etc/hostapd/hostapd.conf'
+        'etc/conf.d/hostapd'
+        'etc/hostapd/hlr_auc_gw.milenage_db'
+        'etc/hostapd/hostapd.accept'
+        'etc/hostapd/hostapd.deny'
+        'etc/hostapd/hostapd.eap_user'
+        'etc/hostapd/hostapd.radius_clients'
+        'etc/hostapd/hostapd.sim_db'
+        'etc/hostapd/hostapd.vlan'
+        'etc/hostapd/hostapd.wpa_psk'
+        'etc/hostapd/wired.conf')
+install=hostapd.install
+source=(http://w1.fi/releases/$pkgname-$pkgver.tar.gz
+	config
+	hostapd
+	hostapd.conf.d
+	hostapd.service)
+md5sums=('ba22e639bc57aa4035d2ea8ffa9bbbee'
+         '5d7ee10b04e33f22c37be56a4c33dddb'
+         'd570327c385f34a4af24d3a0d61cea19'
+         'f169534b0f59b341f6df1a21e0344511'
+         'a0a16879eed5e4e41ae6b225a4809955')
+
+build() {
+  cd $pkgname-$pkgver/hostapd
+  cp ../../config .config
+  sed -i 's#/etc/hostapd#/etc/hostapd/hostapd#' hostapd.conf
+  export CFLAGS="$CFLAGS $(pkg-config --cflags libnl-3.0)"
+  make
+}
+
+package() {
+  # RC script
+  install -D hostapd "$pkgdir/etc/rc.d/hostapd"
+  install -Dm644 hostapd.conf.d "$pkgdir/etc/conf.d/hostapd"
+
+  # Systemd unit
+  install -Dm644 hostapd.service "$pkgdir/usr/lib/systemd/system/hostapd.service"
+
+  cd $pkgname-$pkgver
+
+  # License
+  install -Dm644 COPYING "$pkgdir/usr/share/licenses/$pkgname/COPYING"
+
+  cd hostapd
+
+  # Binaries
+  install -d "$pkgdir/usr/bin"
+  install -t "$pkgdir/usr/bin" hostapd hostapd_cli
+
+  # Configuration
+  install -d "$pkgdir/etc/hostapd"
+  install -m644 -t "$pkgdir/etc/hostapd" \
+    hostapd.{accept,conf,deny,eap_user,radius_clients,sim_db,vlan,wpa_psk} \
+    wired.conf hlr_auc_gw.milenage_db
+
+  # Man pages
+  install -Dm644 hostapd.8 "$pkgdir/usr/share/man/man8/hostapd.8"
+  install -Dm644 hostapd_cli.1 "$pkgdir/usr/share/man/man1/hostapd_cli.1"
+}

Copied: hostapd/repos/community-staging-i686/config (from rev 85795, hostapd/trunk/config)
===================================================================
--- community-staging-i686/config	                        (rev 0)
+++ community-staging-i686/config	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,92 @@
+# Example hostapd build time configuration
+#
+# This file lists the configuration options that are used when building the
+# hostapd binary. All lines starting with # are ignored. Configuration option
+# lines must be commented out complete, if they are not to be included, i.e.,
+# just setting VARIABLE=n is not disabling that variable.
+#
+# This file is included in Makefile, so variables like CFLAGS and LIBS can also
+# be modified from here. In most cass, these lines should use += in order not
+# to override previous values of the variables.
+
+# Driver interface for Host AP driver
+CONFIG_DRIVER_HOSTAP=y
+
+# Driver interface for wired authenticator
+CONFIG_DRIVER_WIRED=y
+
+# Driver interface for Prism54 driver
+CONFIG_DRIVER_PRISM54=y
+
+# IEEE 802.11F/IAPP
+CONFIG_IAPP=y
+
+# WPA2/IEEE 802.11i RSN pre-authentication
+CONFIG_RSN_PREAUTH=y
+
+# PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
+CONFIG_PEERKEY=y
+
+# IEEE 802.11w (management frame protection)
+# This version is an experimental implementation based on IEEE 802.11w/D1.0
+# draft and is subject to change since the standard has not yet been finalized.
+# Driver support is also needed for IEEE 802.11w.
+CONFIG_IEEE80211W=y
+
+# Integrated EAP server
+CONFIG_EAP=y
+
+# EAP-MD5 for the integrated EAP server
+CONFIG_EAP_MD5=y
+
+# EAP-TLS for the integrated EAP server
+CONFIG_EAP_TLS=y
+
+# EAP-MSCHAPv2 for the integrated EAP server
+CONFIG_EAP_MSCHAPV2=y
+
+# EAP-PEAP for the integrated EAP server
+CONFIG_EAP_PEAP=y
+
+# EAP-GTC for the integrated EAP server
+CONFIG_EAP_GTC=y
+
+# EAP-TTLS for the integrated EAP server
+CONFIG_EAP_TTLS=y
+
+# EAP-SIM for the integrated EAP server
+CONFIG_EAP_SIM=y
+
+# EAP-AKA for the integrated EAP server
+CONFIG_EAP_AKA=y
+
+# EAP-PAX for the integrated EAP server
+CONFIG_EAP_PAX=y
+
+# EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
+CONFIG_EAP_PSK=y
+
+# EAP-SAKE for the integrated EAP server
+CONFIG_EAP_SAKE=y
+
+# EAP-GPSK for the integrated EAP server
+CONFIG_EAP_GPSK=y
+# Include support for optional SHA256 cipher suite in EAP-GPSK
+CONFIG_EAP_GPSK_SHA256=y
+
+# PKCS#12 (PFX) support (used to read private key and certificate file from
+# a file that usually has extension .p12 or .pfx)
+CONFIG_PKCS12=y
+
+# RADIUS authentication server. This provides access to the integrated EAP
+# server from external hosts using RADIUS.
+CONFIG_RADIUS_SERVER=y
+
+# Build IPv6 support for RADIUS operations
+CONFIG_IPV6=y
+
+CONFIG_DRIVER_NL80211=y
+
+CONFIG_IEEE80211N=y
+
+CONFIG_LIBNL32=y

Copied: hostapd/repos/community-staging-i686/hostapd (from rev 85795, hostapd/trunk/hostapd)
===================================================================
--- community-staging-i686/hostapd	                        (rev 0)
+++ community-staging-i686/hostapd	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,35 @@
+#!/bin/bash
+
+. /etc/rc.conf
+. /etc/rc.d/functions
+. /etc/conf.d/hostapd
+
+case "$1" in
+  start)
+    stat_busy "Starting hostapd"
+    /usr/bin/hostapd -B -P ${HOSTAPD_PID} ${HOSTAPD_CONF} &> /dev/null
+    if [ $? -gt 0 ]; then
+      stat_fail
+    else
+      stat_done
+      add_daemon hostapd
+    fi
+    ;;
+  stop)
+    stat_busy "Stopping hostapd"
+    [ -f ${HOSTAPD_PID} ] && kill `cat ${HOSTAPD_PID}` &> /dev/null
+    if [ $? -gt 0 ]; then
+      stat_fail
+    else
+      stat_done
+      rm_daemon hostapd
+    fi
+    ;;
+  restart)
+    $0 stop
+    sleep 1
+    $0 start
+    ;;
+  *)
+    echo "usage: $0 {start|stop|restart}"
+esac

Copied: hostapd/repos/community-staging-i686/hostapd.conf.d (from rev 85795, hostapd/trunk/hostapd.conf.d)
===================================================================
--- community-staging-i686/hostapd.conf.d	                        (rev 0)
+++ community-staging-i686/hostapd.conf.d	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,2 @@
+HOSTAPD_PID="/var/run/hostapd.pid"
+HOSTAPD_CONF="/etc/hostapd/hostapd.conf"

Copied: hostapd/repos/community-staging-i686/hostapd.install (from rev 85795, hostapd/trunk/hostapd.install)
===================================================================
--- community-staging-i686/hostapd.install	                        (rev 0)
+++ community-staging-i686/hostapd.install	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,7 @@
+post_install() {
+  echo "> More info: https://wiki.archlinux.org/index.php/Software_Access_Point"
+}
+
+post_upgrade() {
+  post_install
+}

Copied: hostapd/repos/community-staging-i686/hostapd.service (from rev 85795, hostapd/trunk/hostapd.service)
===================================================================
--- community-staging-i686/hostapd.service	                        (rev 0)
+++ community-staging-i686/hostapd.service	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,11 @@
+[Unit]
+Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
+After=network.target
+
+[Service]
+Type=forking
+PIDFile=/run/hostapd.pid
+ExecStart=/usr/bin/hostapd /etc/hostapd/hostapd.conf -P /run/hostapd.pid -B
+
+[Install]
+WantedBy=multi-user.target

Copied: hostapd/repos/community-staging-x86_64/PKGBUILD (from rev 85795, hostapd/trunk/PKGBUILD)
===================================================================
--- community-staging-x86_64/PKGBUILD	                        (rev 0)
+++ community-staging-x86_64/PKGBUILD	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,71 @@
+# $Id$
+# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
+
+pkgname=hostapd
+pkgver=2.0
+pkgrel=3
+pkgdesc="IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator"
+arch=('i686' 'x86_64')
+url="http://w1.fi/hostapd/"
+license=('custom')
+depends=('openssl' 'libnl')
+backup=('etc/hostapd/hostapd.conf'
+        'etc/conf.d/hostapd'
+        'etc/hostapd/hlr_auc_gw.milenage_db'
+        'etc/hostapd/hostapd.accept'
+        'etc/hostapd/hostapd.deny'
+        'etc/hostapd/hostapd.eap_user'
+        'etc/hostapd/hostapd.radius_clients'
+        'etc/hostapd/hostapd.sim_db'
+        'etc/hostapd/hostapd.vlan'
+        'etc/hostapd/hostapd.wpa_psk'
+        'etc/hostapd/wired.conf')
+install=hostapd.install
+source=(http://w1.fi/releases/$pkgname-$pkgver.tar.gz
+	config
+	hostapd
+	hostapd.conf.d
+	hostapd.service)
+md5sums=('ba22e639bc57aa4035d2ea8ffa9bbbee'
+         '5d7ee10b04e33f22c37be56a4c33dddb'
+         'd570327c385f34a4af24d3a0d61cea19'
+         'f169534b0f59b341f6df1a21e0344511'
+         'a0a16879eed5e4e41ae6b225a4809955')
+
+build() {
+  cd $pkgname-$pkgver/hostapd
+  cp ../../config .config
+  sed -i 's#/etc/hostapd#/etc/hostapd/hostapd#' hostapd.conf
+  export CFLAGS="$CFLAGS $(pkg-config --cflags libnl-3.0)"
+  make
+}
+
+package() {
+  # RC script
+  install -D hostapd "$pkgdir/etc/rc.d/hostapd"
+  install -Dm644 hostapd.conf.d "$pkgdir/etc/conf.d/hostapd"
+
+  # Systemd unit
+  install -Dm644 hostapd.service "$pkgdir/usr/lib/systemd/system/hostapd.service"
+
+  cd $pkgname-$pkgver
+
+  # License
+  install -Dm644 COPYING "$pkgdir/usr/share/licenses/$pkgname/COPYING"
+
+  cd hostapd
+
+  # Binaries
+  install -d "$pkgdir/usr/bin"
+  install -t "$pkgdir/usr/bin" hostapd hostapd_cli
+
+  # Configuration
+  install -d "$pkgdir/etc/hostapd"
+  install -m644 -t "$pkgdir/etc/hostapd" \
+    hostapd.{accept,conf,deny,eap_user,radius_clients,sim_db,vlan,wpa_psk} \
+    wired.conf hlr_auc_gw.milenage_db
+
+  # Man pages
+  install -Dm644 hostapd.8 "$pkgdir/usr/share/man/man8/hostapd.8"
+  install -Dm644 hostapd_cli.1 "$pkgdir/usr/share/man/man1/hostapd_cli.1"
+}

Copied: hostapd/repos/community-staging-x86_64/config (from rev 85795, hostapd/trunk/config)
===================================================================
--- community-staging-x86_64/config	                        (rev 0)
+++ community-staging-x86_64/config	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,92 @@
+# Example hostapd build time configuration
+#
+# This file lists the configuration options that are used when building the
+# hostapd binary. All lines starting with # are ignored. Configuration option
+# lines must be commented out complete, if they are not to be included, i.e.,
+# just setting VARIABLE=n is not disabling that variable.
+#
+# This file is included in Makefile, so variables like CFLAGS and LIBS can also
+# be modified from here. In most cass, these lines should use += in order not
+# to override previous values of the variables.
+
+# Driver interface for Host AP driver
+CONFIG_DRIVER_HOSTAP=y
+
+# Driver interface for wired authenticator
+CONFIG_DRIVER_WIRED=y
+
+# Driver interface for Prism54 driver
+CONFIG_DRIVER_PRISM54=y
+
+# IEEE 802.11F/IAPP
+CONFIG_IAPP=y
+
+# WPA2/IEEE 802.11i RSN pre-authentication
+CONFIG_RSN_PREAUTH=y
+
+# PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
+CONFIG_PEERKEY=y
+
+# IEEE 802.11w (management frame protection)
+# This version is an experimental implementation based on IEEE 802.11w/D1.0
+# draft and is subject to change since the standard has not yet been finalized.
+# Driver support is also needed for IEEE 802.11w.
+CONFIG_IEEE80211W=y
+
+# Integrated EAP server
+CONFIG_EAP=y
+
+# EAP-MD5 for the integrated EAP server
+CONFIG_EAP_MD5=y
+
+# EAP-TLS for the integrated EAP server
+CONFIG_EAP_TLS=y
+
+# EAP-MSCHAPv2 for the integrated EAP server
+CONFIG_EAP_MSCHAPV2=y
+
+# EAP-PEAP for the integrated EAP server
+CONFIG_EAP_PEAP=y
+
+# EAP-GTC for the integrated EAP server
+CONFIG_EAP_GTC=y
+
+# EAP-TTLS for the integrated EAP server
+CONFIG_EAP_TTLS=y
+
+# EAP-SIM for the integrated EAP server
+CONFIG_EAP_SIM=y
+
+# EAP-AKA for the integrated EAP server
+CONFIG_EAP_AKA=y
+
+# EAP-PAX for the integrated EAP server
+CONFIG_EAP_PAX=y
+
+# EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
+CONFIG_EAP_PSK=y
+
+# EAP-SAKE for the integrated EAP server
+CONFIG_EAP_SAKE=y
+
+# EAP-GPSK for the integrated EAP server
+CONFIG_EAP_GPSK=y
+# Include support for optional SHA256 cipher suite in EAP-GPSK
+CONFIG_EAP_GPSK_SHA256=y
+
+# PKCS#12 (PFX) support (used to read private key and certificate file from
+# a file that usually has extension .p12 or .pfx)
+CONFIG_PKCS12=y
+
+# RADIUS authentication server. This provides access to the integrated EAP
+# server from external hosts using RADIUS.
+CONFIG_RADIUS_SERVER=y
+
+# Build IPv6 support for RADIUS operations
+CONFIG_IPV6=y
+
+CONFIG_DRIVER_NL80211=y
+
+CONFIG_IEEE80211N=y
+
+CONFIG_LIBNL32=y

Copied: hostapd/repos/community-staging-x86_64/hostapd (from rev 85795, hostapd/trunk/hostapd)
===================================================================
--- community-staging-x86_64/hostapd	                        (rev 0)
+++ community-staging-x86_64/hostapd	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,35 @@
+#!/bin/bash
+
+. /etc/rc.conf
+. /etc/rc.d/functions
+. /etc/conf.d/hostapd
+
+case "$1" in
+  start)
+    stat_busy "Starting hostapd"
+    /usr/bin/hostapd -B -P ${HOSTAPD_PID} ${HOSTAPD_CONF} &> /dev/null
+    if [ $? -gt 0 ]; then
+      stat_fail
+    else
+      stat_done
+      add_daemon hostapd
+    fi
+    ;;
+  stop)
+    stat_busy "Stopping hostapd"
+    [ -f ${HOSTAPD_PID} ] && kill `cat ${HOSTAPD_PID}` &> /dev/null
+    if [ $? -gt 0 ]; then
+      stat_fail
+    else
+      stat_done
+      rm_daemon hostapd
+    fi
+    ;;
+  restart)
+    $0 stop
+    sleep 1
+    $0 start
+    ;;
+  *)
+    echo "usage: $0 {start|stop|restart}"
+esac

Copied: hostapd/repos/community-staging-x86_64/hostapd.conf.d (from rev 85795, hostapd/trunk/hostapd.conf.d)
===================================================================
--- community-staging-x86_64/hostapd.conf.d	                        (rev 0)
+++ community-staging-x86_64/hostapd.conf.d	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,2 @@
+HOSTAPD_PID="/var/run/hostapd.pid"
+HOSTAPD_CONF="/etc/hostapd/hostapd.conf"

Copied: hostapd/repos/community-staging-x86_64/hostapd.install (from rev 85795, hostapd/trunk/hostapd.install)
===================================================================
--- community-staging-x86_64/hostapd.install	                        (rev 0)
+++ community-staging-x86_64/hostapd.install	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,7 @@
+post_install() {
+  echo "> More info: https://wiki.archlinux.org/index.php/Software_Access_Point"
+}
+
+post_upgrade() {
+  post_install
+}

Copied: hostapd/repos/community-staging-x86_64/hostapd.service (from rev 85795, hostapd/trunk/hostapd.service)
===================================================================
--- community-staging-x86_64/hostapd.service	                        (rev 0)
+++ community-staging-x86_64/hostapd.service	2013-03-07 12:22:41 UTC (rev 85796)
@@ -0,0 +1,11 @@
+[Unit]
+Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
+After=network.target
+
+[Service]
+Type=forking
+PIDFile=/run/hostapd.pid
+ExecStart=/usr/bin/hostapd /etc/hostapd/hostapd.conf -P /run/hostapd.pid -B
+
+[Install]
+WantedBy=multi-user.target




More information about the arch-commits mailing list