Compare commits

..

1 Commits

Author SHA1 Message Date
Arif Alam
734b768fcb ucentral-client: fix hostname validation
- Wire hostname validation enable / disable to hostname_validate
  flag in gateway.json

- Fix hostname validation check when server cert Subject CN has
  other attributes like Organization in case of Insta
  server certs: subject=CN=*.example.com, O=ExampleInc.
  Fix backported to libwebsockets from:
  5124ffe9d4

Fixes WIFI-15384

Signed-off-by: Arif Alam <arif.alam@netexperience.com>
2026-03-13 18:16:13 -04:00
2 changed files with 0 additions and 60 deletions

View File

@@ -1,17 +0,0 @@
--- a/src/ap/ieee802_11_auth.c
+++ b/src/ap/ieee802_11_auth.c
@@ -149,6 +149,14 @@
if (add_common_radius_attr(hapd, hapd->conf->radius_auth_req_attr,
NULL, msg) < 0)
goto fail;
+
+ if (hapd->conf->radius_request_cui &&
+ !radius_msg_add_attr(msg,
+ RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
+ (const u8 *) "\0", 1)) {
+ wpa_printf(MSG_DEBUG, "Could not add CUI");
+ goto fail;
+ }
os_snprintf(buf, sizeof(buf), RADIUS_802_1X_ADDR_FORMAT,
MAC2STR(addr));

View File

@@ -1,43 +0,0 @@
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: John Crispin <john@phrozen.org>
Date: Fri, 14 Mar 2026 09:00:00 +0100
Subject: [PATCH] hostapd: add CUI to ACL RADIUS Access-Request
When radius_request_cui=1 is configured, hostapd includes the
Chargeable-User-Identity attribute (RFC 4372) in EAP Access-Request
messages but not in the ACL path used by psk2-radius / mpsk-radius.
RADIUS servers expecting CUI for PSK-RADIUS therefore receive no CUI.
Add a nul CUI to hostapd_radius_acl_query() so that the RADIUS server
is solicited for a CUI in the Access-Accept, matching the initial-request
behaviour of the EAP path when no prior CUI is known. The response side
already extracts CUI from Access-Accept and stores it.
Signed-off-by: John Crispin <john@phrozen.org>
---
.../hostapd/patches/zzz-0018-acl-radius-cui.patch | 17 +++++++++++++++++
1 file changed, 17 insertions(+)
create mode 100644 package/network/services/hostapd/patches/zzz-0018-acl-radius-cui.patch
diff --git a/package/network/services/hostapd/patches/zzz-0018-acl-radius-cui.patch b/package/network/services/hostapd/patches/zzz-0018-acl-radius-cui.patch
new file mode 100644
--- /dev/null
+++ b/package/network/services/hostapd/patches/zzz-0018-acl-radius-cui.patch
@@ -0,0 +1,17 @@
+--- a/src/ap/ieee802_11_auth.c
++++ b/src/ap/ieee802_11_auth.c
+@@ -149,6 +149,14 @@
+ if (add_common_radius_attr(hapd, hapd->conf->radius_auth_req_attr,
+ NULL, msg) < 0)
+ goto fail;
++
++ if (hapd->conf->radius_request_cui &&
++ !radius_msg_add_attr(msg,
++ RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
++ (const u8 *) "\0", 1)) {
++ wpa_printf(MSG_DEBUG, "Could not add CUI");
++ goto fail;
++ }
+
+ os_snprintf(buf, sizeof(buf), RADIUS_802_1X_ADDR_FORMAT,
+ MAC2STR(addr));