[PATCH] Allow remote RADIUS authentication with local VLAN management

Jouni Malinen j at w1.fi
Thu Apr 19 15:21:27 PDT 2018

On Wed, Apr 18, 2018 at 03:12:46PM -0700, Nils Nieuwejaar wrote:
> If dynamic_vlan=0 (disabled), then vlan assignments will be managed
> using the local accept_mac_file ACL file, even if a RADIUS server is
> being used for user authentication.  This allows us to manage users
> and devices independently.
Please read the top level CONTRIBUTIONS and send this again with the
Signed-off-by: tag added to the commit message for me to be able to
consider applying the changes. In addition, the inline patch had some
whitespace issues that prevent it from being applied. For example here:

> diff --git a/src/ap/ieee802_11_auth.c b/src/ap/ieee802_11_auth.c
> index 5cb7fb145..b2ea12c3a 100644
> --- a/src/ap/ieee802_11_auth.c
> +++ b/src/ap/ieee802_11_auth.c
> @@ -289,6 +289,9 @@ int hostapd_allowed_address(struct hostapd_data
> *hapd, const u8 *addr,

That line got split in the middle..

Please use a mailer that does not modify whitespace and/or send the
patch also as an attachment so that I don't need to try to apply this

Jouni Malinen                                            PGP id EFC895FA

More information about the Hostap mailing list