FailOverFlow WII U Hack

      So, ich erstelle jetzt mal Pakete für Debian in den nächsten Tagen. Im Moment baue ich den Linux-Kernel mit dem notwendigen mac80211-Patch, danach kommen Wireshark und Co. Sobald was installierbares zur Verfügung steht, melde ich mich wieder.


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)

      TerryHomes schrieb:

      fof hat anscheinend weitere Informationen auf ihrem Blog zur Wii U gepostet: fail0verflow.com/blog/2014/console-hacking-2013-omake.html

      Condorstrike möchte anscheinend Homebrew für die Wii U entwickeln. Ist das nun mittlerweile doch möglich ?

      Sicher ist das möglich, es ist ja schon viel über die Wii U bekannt. Wie genau sie funktioniert, wie die Hardware zusammenarbeitet, u.v.m und anscheinend kommen selbst im Wii U Mode ELF-Dateien in den Spielen zum Einsatz.
      01-19-2038 03:14:08

      Dieser Beitrag wurde bereits 1 mal editiert, zuletzt von greenhorn ()

      Ob wir Homebrew für die Wiiu bekommen wie emulatoren,mediacenter,games,usb-loader sieht ja nicht grade gut aus da die gruppen/leute die so was entwickeln könnten'' wohl kein interesse an die nintendo konsole haben!

      Es gibt bestimmt noch andere Leute die wiiu knacken könnten außer Failoverflow?nur scheint keiner das zu wollen,natürlich erwarten wir nicht das es schnell statt findet falls andere daran arbeiten.

      Wie so oft stürzen sich alle auf die ps4/one konsolen und wiiu wird vielleicht ausgelassen mit homebrew:(


      Mein 3DS FC Lautet 1418-7285-8267
      Diese Konsolen bekommen aber keine Homebrew, fast nur Warez. Siehe Wii vs. PS3/X360.


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)

      @Setialpha

      Bei den neuen Konsolen könnte es der fall sein? da sie fast schon Computer sind und die nähe zur x86 Archektur vereinfacht das noch mehr!natürlich ist homebrew besser und legaler als reines Wazes nur 100% kann man es auf keinen Gerät das verhindern früher oder Später kommt das auf jeden fall.


      Mein 3DS FC Lautet 1418-7285-8267
      Funktioniert \o/
      Fehlt nur der Videostream zurück zum Gamepad, wodurch sich das nach kurzer Zeit von selbst abschaltet :/

      Wers schonmal selber versuchen will, hier: libdrc.org/docs/network.html. Ich werd mich aber auch noch mal dransetzen und nen Tutorial dafür schreiben.
      Bilder
      • IMG_20140103_223007.jpg

        2,22 MB, 4.128×3.096, 654 mal angesehen
      [TuT] [WIP] Wii U Gamepad mit dem PC (Linux) verbinden

      Dieser Beitrag wurde bereits 1 mal editiert, zuletzt von »feuri« (morgen, 13:37)

      setialpha schrieb:

      So, ich erstelle jetzt mal Pakete für Debian in den nächsten Tagen. Im Moment baue ich den Linux-Kernel mit dem notwendigen mac80211-Patch, danach kommen Wireshark und Co. Sobald was installierbares zur Verfügung steht, melde ich mich wieder.
      So, die Basis-Pakete sind fertig. Sowohl für i386 (32bit), als auch amd64 (64bit).
      • libx264 - 0.140.9999, gepatcht mit DRC-Unterstützung
      • libdrc - 1.0~git20140105.8e1bd6, aus dem Master
      • linux-image, linux-headers - 3.12-1nano-photonic, mit MAC80211-Anpassung für DRC
      Anleitung zur Nutzung meines Repositoriums. Die Pakete installieren und das System mit meinem Kernel neustarten, anschließend kann man @feuri Tutorial weiter folgen. Pakete für Wireshark mit DRC etc. kommen nach und nach.


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)

      Blitzur schrieb:

      Welches debian installiert mans ich dafür am besten um das zu machen? :D
      Ich verwende Debian/Unstable [Unstable bedeutet nicht, dass das System nicht stabil läuft, was genau dahintersteckt, ist ein wenig langatmig zu erklären].

      Repositorium-Update:
      • wpagui, wpa-supplicant, hostapd - 2.1~git20131228.d8f114, mit DRC Unterstützung
      • netboot - 2010.01.19
      Die Basis-Pakete sind nun also komplett. :)


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)

      Zur Info: ich rate zz. ab, meine Version des wpa_supplicant zu verwenden. Zwar kann man damit die nötigen Daten für das GamePad auslesen, allerdings läuft (zumindest bei mir), die normale WLAN-Verbindung nicht stabil. Ich arbeite an dem Problem. Es liegt nicht an den DRC-Patches, sondern an wpa_supplicant 2.1 als solches.

      Workaround: wpa_supplicant von packages.debian.org herunterladen. Dann meines installieren für das Auslesen der GamePad-Daten. Sobald fertig wieder den alten wpa_supplicant von packages.debian.org ("sudo dpkg -i wpa_supplicant_xxxxxx.deb") installieren.


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)

      So. Gefahr erkannt - Gefahr gebannt. Ich habe alle Pakete neugebaut, sodass sich die gepatchten neben den originalen installieren lassen.

      Original-Paketnamen: hostapd / wpasupplicant
      Meine Paketnamen: hostapd-drc / wpasupplicant-drc

      Original-Programmnamen: hostapd / wpa_supplicant / wpa_passphrase / wpa_cli
      Meine Programmnamen: hostapd-drc / wpa_supplicant-drc / wpa_passphrase-drc / wpa_cli-drc

      Also überall nur ein "-drc" Suffix. So bleibt das System sauber und man kann dem GamePad die Daten entlocken. Kann also nun alles bedenkenlos installiert werden

      Änderungen in wpa-nano_2.1~20131228

      Quellcode

      1. wpa-nano (2.1~git20131228.d8f114-4nano) unstable; urgency=low
      2. * add -drc suffix to all package and binary names
      3. * remove all stuff related to files that conflict
      4. with the official hostapd, wpa_supplicant packages
      5. * no longer build wpagui package
      6. * enable various options in hostapd config
      7. * enable various options in wpa_supplicant config
      8. * no longer build udebs
      9. * remove all stuff for kfreebsd
      10. -- Christopher Roy Bratusek <[email protected]> Wed, 08 Jan 2014 21:48:34 +0100
      11. wpa-nano (2.1~git20131228.d8f114-3nano) unstable; urgency=low
      12. * fixup hostapd config
      13. -- Christopher Roy Bratusek <[email protected]> Tue, 07 Jan 2014 21:55:51 +0100
      14. wpa-nano (2.1~git20131228.d8f114-2nano) unstable; urgency=low
      15. * fixup wpa_supplicant config
      16. -- Christopher Roy Bratusek <[email protected]> Tue, 07 Jan 2014 21:22:54 +0100
      17. wpa-nano (2.1~git20131228.d8f114-1nano) unstable; urgency=low
      18. * new upstream snapshot
      19. -- Christopher Roy Bratusek <[email protected]> Tue, 07 Jan 2014 19:40:27 +0100
      Alles anzeigen
      Patch der den Programmen das -drc Suffix hinzufügt

      Unterschiede-Datei

      1. Description: make -drc packages side-installable to system-ones
      2. Don't overwrite official wpa_supplicant, hostapd, wpa_cli and
      3. wpa_passphrase when installing this packages, so append -drc
      4. suffix to all of them.
      5. .
      6. wpa-nano (2.1~git20131228.d8f114-4nano) unstable; urgency=low
      7. .
      8. * fixup hostapd config
      9. Author: Christopher Roy Bratusek <[email protected]>
      10. ---
      11. --- wpa-nano-2.1~git20131228.d8f114.orig/hostapd/Makefile
      12. +++ wpa-nano-2.1~git20131228.d8f114/hostapd/Makefile
      13. @@ -850,7 +850,7 @@ ifdef CONFIG_TENDONIN
      14. CFLAGS += -DCONFIG_TENDONIN
      15. endif
      16. -ALL=hostapd hostapd_cli
      17. +ALL=hostapd-drc hostapd_cli-drc
      18. all: verify_config $(ALL)
      19. @@ -886,15 +886,15 @@ install: all
      20. BCHECK=../src/drivers/build.hostapd
      21. -hostapd: $(BCHECK) $(OBJS)
      22. - $(Q)$(CC) $(LDFLAGS) -o hostapd $(OBJS) $(LIBS)
      23. +hostapd-drc: $(BCHECK) $(OBJS)
      24. + $(Q)$(CC) $(LDFLAGS) -o hostapd-drc $(OBJS) $(LIBS)
      25. @$(E) " LD " $@
      26. ifdef CONFIG_WPA_TRACE
      27. OBJS_c += ../src/utils/trace.o
      28. endif
      29. -hostapd_cli: $(OBJS_c)
      30. - $(Q)$(CC) $(LDFLAGS) -o hostapd_cli $(OBJS_c) $(LIBS_c)
      31. +hostapd_cli-drc: $(OBJS_c)
      32. + $(Q)$(CC) $(LDFLAGS) -o hostapd_cli-drc $(OBJS_c) $(LIBS_c)
      33. @$(E) " LD " $@
      34. NOBJS = nt_password_hash.o ../src/crypto/ms_funcs.o $(SHA1OBJS) ../src/crypto/md5.o
      35. --- wpa-nano-2.1~git20131228.d8f114.orig/wpa_supplicant/Makefile
      36. +++ wpa-nano-2.1~git20131228.d8f114/wpa_supplicant/Makefile
      37. @@ -15,10 +15,10 @@ CFLAGS += -I../src/utils
      38. -include .config
      39. -BINALL=wpa_supplicant wpa_cli
      40. +BINALL=wpa_supplicant-drc wpa_cli-drc
      41. ifndef CONFIG_NO_WPA_PASSPHRASE
      42. -BINALL += wpa_passphrase
      43. +BINALL += wpa_passphrase-drc
      44. endif
      45. ALL = $(BINALL)
      46. @@ -1547,8 +1547,8 @@ wpa_priv: $(BCHECK) $(OBJS_priv)
      47. $(OBJS_c) $(OBJS_t) $(OBJS_t2) $(OBJS) $(BCHECK) $(EXTRA_progs): .config
      48. -wpa_supplicant: $(BCHECK) $(OBJS) $(EXTRA_progs)
      49. - $(Q)$(LDO) $(LDFLAGS) -o wpa_supplicant $(OBJS) $(LIBS) $(EXTRALIBS)
      50. +wpa_supplicant-drc: $(BCHECK) $(OBJS) $(EXTRA_progs)
      51. + $(Q)$(LDO) $(LDFLAGS) -o wpa_supplicant-drc $(OBJS) $(LIBS) $(EXTRALIBS)
      52. @$(E) " LD " $@
      53. eapol_test: $(OBJS_t)
      54. @@ -1559,12 +1559,12 @@ preauth_test: $(OBJS_t2)
      55. $(Q)$(LDO) $(LDFLAGS) -o preauth_test $(OBJS_t2) $(LIBS)
      56. @$(E) " LD " $@
      57. -wpa_passphrase: $(OBJS_p)
      58. - $(Q)$(LDO) $(LDFLAGS) -o wpa_passphrase $(OBJS_p) $(LIBS_p)
      59. +wpa_passphrase-drc: $(OBJS_p)
      60. + $(Q)$(LDO) $(LDFLAGS) -o wpa_passphrase-drc $(OBJS_p) $(LIBS_p)
      61. @$(E) " LD " $@
      62. -wpa_cli: $(OBJS_c)
      63. - $(Q)$(LDO) $(LDFLAGS) -o wpa_cli $(OBJS_c) $(LIBS_c)
      64. +wpa_cli-drc: $(OBJS_c)
      65. + $(Q)$(LDO) $(LDFLAGS) -o wpa_cli-drc $(OBJS_c) $(LIBS_c)
      66. @$(E) " LD " $@
      67. link_test: $(OBJS) $(OBJS_h) tests/link_test.o
      Alles anzeigen
      Meine hostapd config für Selber-Kompilierer

      Quellcode

      1. # Example hostapd build time configuration
      2. #
      3. # This file lists the configuration options that are used when building the
      4. # hostapd binary. All lines starting with # are ignored. Configuration option
      5. # lines must be commented out complete, if they are not to be included, i.e.,
      6. # just setting VARIABLE=n is not disabling that variable.
      7. #
      8. # This file is included in Makefile, so variables like CFLAGS and LIBS can also
      9. # be modified from here. In most cass, these lines should use += in order not
      10. # to override previous values of the variables.
      11. # Driver interface for Host AP driver
      12. CONFIG_DRIVER_HOSTAP=y
      13. # Driver interface for wired authenticator
      14. CONFIG_DRIVER_WIRED=y
      15. # Driver interface for madwifi driver
      16. #CONFIG_DRIVER_MADWIFI=y
      17. #CFLAGS += -I../../madwifi # change to the madwifi source directory
      18. # Driver interface for drivers using the nl80211 kernel interface
      19. CONFIG_DRIVER_NL80211=y
      20. # use libnl 3.2
      21. CONFIG_LIBNL32=y
      22. # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
      23. #CONFIG_DRIVER_BSD=y
      24. #CFLAGS += -I/usr/local/include
      25. #LIBS += -L/usr/local/lib
      26. #LIBS_p += -L/usr/local/lib
      27. #LIBS_c += -L/usr/local/lib
      28. # Driver interface for no driver (e.g., RADIUS server only)
      29. #CONFIG_DRIVER_NONE=y
      30. # IEEE 802.11F/IAPP
      31. CONFIG_IAPP=y
      32. # WPA2/IEEE 802.11i RSN pre-authentication
      33. CONFIG_RSN_PREAUTH=y
      34. # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
      35. CONFIG_PEERKEY=y
      36. # IEEE 802.11w (management frame protection)
      37. # This version is an experimental implementation based on IEEE 802.11w/D1.0
      38. # draft and is subject to change since the standard has not yet been finalized.
      39. # Driver support is also needed for IEEE 802.11w.
      40. CONFIG_IEEE80211W=y
      41. # Integrated EAP server
      42. CONFIG_EAP=y
      43. # EAP-MD5 for the integrated EAP server
      44. CONFIG_EAP_MD5=y
      45. # EAP-TLS for the integrated EAP server
      46. CONFIG_EAP_TLS=y
      47. # EAP-MSCHAPv2 for the integrated EAP server
      48. CONFIG_EAP_MSCHAPV2=y
      49. # EAP-PEAP for the integrated EAP server
      50. CONFIG_EAP_PEAP=y
      51. # EAP-GTC for the integrated EAP server
      52. CONFIG_EAP_GTC=y
      53. # EAP-TTLS for the integrated EAP server
      54. CONFIG_EAP_TTLS=y
      55. # EAP-SIM for the integrated EAP server
      56. CONFIG_EAP_SIM=y
      57. # EAP-AKA for the integrated EAP server
      58. CONFIG_EAP_AKA=y
      59. # EAP-AKA' for the integrated EAP server
      60. # This requires CONFIG_EAP_AKA to be enabled, too.
      61. CONFIG_EAP_AKA_PRIME=y
      62. # EAP-PAX for the integrated EAP server
      63. CONFIG_EAP_PAX=y
      64. # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
      65. CONFIG_EAP_PSK=y
      66. # EAP-pwd for the integrated EAP server (secure authentication with a password)
      67. CONFIG_EAP_PWD=y
      68. # EAP-SAKE for the integrated EAP server
      69. CONFIG_EAP_SAKE=y
      70. # EAP-GPSK for the integrated EAP server
      71. CONFIG_EAP_GPSK=y
      72. # Include support for optional SHA256 cipher suite in EAP-GPSK
      73. CONFIG_EAP_GPSK_SHA256=y
      74. # EAP-FAST for the integrated EAP server
      75. # Note: Default OpenSSL package does not include support for all the
      76. # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
      77. # the OpenSSL library must be patched (openssl-0.9.9-session-ticket.patch)
      78. # to add the needed functions.
      79. #CONFIG_EAP_FAST=y
      80. # Wi-Fi Protected Setup (WPS)
      81. CONFIG_WPS=y
      82. # Enable WSC 2.0 support
      83. CONFIG_WPS2=y
      84. # Enable UPnP support for external WPS Registrars
      85. CONFIG_WPS_UPNP=y
      86. # Enable WPS support with NFC config method
      87. CONFIG_WPS_NFC=y
      88. # EAP-IKEv2
      89. CONFIG_EAP_IKEV2=y
      90. # Trusted Network Connect (EAP-TNC)
      91. CONFIG_EAP_TNC=y
      92. # EAP-EKE for the integrated EAP server
      93. CONFIG_EAP_EKE=y
      94. # PKCS#12 (PFX) support (used to read private key and certificate file from
      95. # a file that usually has extension .p12 or .pfx)
      96. CONFIG_PKCS12=y
      97. # RADIUS authentication server. This provides access to the integrated EAP
      98. # server from external hosts using RADIUS.
      99. CONFIG_RADIUS_SERVER=y
      100. # Build IPv6 support for RADIUS operations
      101. CONFIG_IPV6=y
      102. # IEEE Std 802.11r-2008 (Fast BSS Transition)
      103. #CONFIG_IEEE80211R=y
      104. # Use the hostapd's IEEE 802.11 authentication (ACL), but without
      105. # the IEEE 802.11 Management capability (e.g., madwifi or FreeBSD/net80211)
      106. #CONFIG_DRIVER_RADIUS_ACL=y
      107. # IEEE 802.11n (High Throughput) support
      108. CONFIG_IEEE80211N=y
      109. # Wireless Network Management (IEEE Std 802.11v-2011)
      110. # Note: This is experimental and not complete implementation.
      111. #CONFIG_WNM=y
      112. # IEEE 802.11ac (Very High Throughput) support
      113. CONFIG_IEEE80211AC=y
      114. # Remove debugging code that is printing out debug messages to stdout.
      115. # This can be used to reduce the size of the hostapd considerably if debugging
      116. # code is not needed.
      117. #CONFIG_NO_STDOUT_DEBUG=y
      118. # Add support for writing debug log to a file: -f /tmp/hostapd.log
      119. # Disabled by default.
      120. #CONFIG_DEBUG_FILE=y
      121. # Add support for sending all debug messages (regardless of debug verbosity)
      122. # to the Linux kernel tracing facility. This helps debug the entire stack by
      123. # making it easy to record everything happening from the driver up into the
      124. # same file, e.g., using trace-cmd.
      125. #CONFIG_DEBUG_LINUX_TRACING=y
      126. # Remove support for RADIUS accounting
      127. #CONFIG_NO_ACCOUNTING=y
      128. # Remove support for RADIUS
      129. #CONFIG_NO_RADIUS=y
      130. # Remove support for VLANs
      131. #CONFIG_NO_VLAN=y
      132. # Enable support for fully dynamic VLANs. This enables hostapd to
      133. # automatically create bridge and VLAN interfaces if necessary.
      134. CONFIG_FULL_DYNAMIC_VLAN=y
      135. # Use netlink-based kernel API for VLAN operations instead of ioctl()
      136. # Note: This requires libnl 3.1 or newer.
      137. CONFIG_VLAN_NETLINK=y
      138. # Remove support for dumping state into a file on SIGUSR1 signal
      139. # This can be used to reduce binary size at the cost of disabling a debugging
      140. # option.
      141. #CONFIG_NO_DUMP_STATE=y
      142. # Enable tracing code for developer debugging
      143. # This tracks use of memory allocations and other registrations and reports
      144. # incorrect use with a backtrace of call (or allocation) location.
      145. #CONFIG_WPA_TRACE=y
      146. # For BSD, comment out these.
      147. #LIBS += -lexecinfo
      148. #LIBS_p += -lexecinfo
      149. #LIBS_c += -lexecinfo
      150. # Use libbfd to get more details for developer debugging
      151. # This enables use of libbfd to get more detailed symbols for the backtraces
      152. # generated by CONFIG_WPA_TRACE=y.
      153. #CONFIG_WPA_TRACE_BFD=y
      154. # For BSD, comment out these.
      155. #LIBS += -lbfd -liberty -lz
      156. #LIBS_p += -lbfd -liberty -lz
      157. #LIBS_c += -lbfd -liberty -lz
      158. # hostapd depends on strong random number generation being available from the
      159. # operating system. os_get_random() function is used to fetch random data when
      160. # needed, e.g., for key generation. On Linux and BSD systems, this works by
      161. # reading /dev/urandom. It should be noted that the OS entropy pool needs to be
      162. # properly initialized before hostapd is started. This is important especially
      163. # on embedded devices that do not have a hardware random number generator and
      164. # may by default start up with minimal entropy available for random number
      165. # generation.
      166. #
      167. # As a safety net, hostapd is by default trying to internally collect
      168. # additional entropy for generating random data to mix in with the data
      169. # fetched from the OS. This by itself is not considered to be very strong, but
      170. # it may help in cases where the system pool is not initialized properly.
      171. # However, it is very strongly recommended that the system pool is initialized
      172. # with enough entropy either by using hardware assisted random number
      173. # generator or by storing state over device reboots.
      174. #
      175. # hostapd can be configured to maintain its own entropy store over restarts to
      176. # enhance random number generation. This is not perfect, but it is much more
      177. # secure than using the same sequence of random numbers after every reboot.
      178. # This can be enabled with -e<entropy file> command line option. The specified
      179. # file needs to be readable and writable by hostapd.
      180. #
      181. # If the os_get_random() is known to provide strong random data (e.g., on
      182. # Linux/BSD, the board in question is known to have reliable source of random
      183. # data from /dev/urandom), the internal hostapd random pool can be disabled.
      184. # This will save some in binary size and CPU use. However, this should only be
      185. # considered for builds that are known to be used on devices that meet the
      186. # requirements described above.
      187. #CONFIG_NO_RANDOM_POOL=y
      188. # Select TLS implementation
      189. # openssl = OpenSSL (default)
      190. # gnutls = GnuTLS
      191. # internal = Internal TLSv1 implementation (experimental)
      192. # none = Empty template
      193. #CONFIG_TLS=openssl
      194. # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
      195. # can be enabled to get a stronger construction of messages when block ciphers
      196. # are used.
      197. #CONFIG_TLSV11=y
      198. # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
      199. # can be enabled to enable use of stronger crypto algorithms.
      200. CONFIG_TLSV12=y
      201. # If CONFIG_TLS=internal is used, additional library and include paths are
      202. # needed for LibTomMath. Alternatively, an integrated, minimal version of
      203. # LibTomMath can be used. See beginning of libtommath.c for details on benefits
      204. # and drawbacks of this option.
      205. #CONFIG_INTERNAL_LIBTOMMATH=y
      206. #ifndef CONFIG_INTERNAL_LIBTOMMATH
      207. #LTM_PATH=/usr/src/libtommath-0.39
      208. #CFLAGS += -I$(LTM_PATH)
      209. #LIBS += -L$(LTM_PATH)
      210. #LIBS_p += -L$(LTM_PATH)
      211. #endif
      212. # At the cost of about 4 kB of additional binary size, the internal LibTomMath
      213. # can be configured to include faster routines for exptmod, sqr, and div to
      214. # speed up DH and RSA calculation considerably
      215. #CONFIG_INTERNAL_LIBTOMMATH_FAST=y
      216. # Interworking (IEEE 802.11u)
      217. # This can be used to enable functionality to improve interworking with
      218. # external networks.
      219. #CONFIG_INTERWORKING=y
      220. # Hotspot 2.0
      221. #CONFIG_HS20=y
      222. # Enable SQLite database support in hlr_auc_gw, EAP-SIM DB, and eap_user_file
      223. CONFIG_SQLITE=y
      224. # Testing options
      225. # This can be used to enable some testing options (see also the example
      226. # configuration file) that are really useful only for testing clients that
      227. # connect to this hostapd. These options allow, for example, to drop a
      228. # certain percentage of probe requests or auth/(re)assoc frames.
      229. #
      230. #CONFIG_TESTING_OPTIONS=y
      231. # Automatic Channel Selection
      232. # This will allow hostapd to pick the channel automatically when channel is set
      233. # to "acs_survey" or "0". Eventually, other ACS algorithms can be added in
      234. # similar way.
      235. #
      236. # Automatic selection is currently only done through initialization, later on
      237. # we hope to do background checks to keep us moving to more ideal channels as
      238. # time goes by. ACS is currently only supported through the nl80211 driver and
      239. # your driver must have survey dump capability that is filled by the driver
      240. # during scanning.
      241. #
      242. # You can customize the ACS survey algorithm with the hostapd.conf variable
      243. # acs_num_scans.
      244. #
      245. # Supported ACS drivers:
      246. # * ath9k
      247. # * ath5k
      248. # * ath10k
      249. #
      250. # For more details refer to:
      251. # http://wireless.kernel.org/en/users/Documentation/acs
      252. #
      253. #CONFIG_ACS=y
      254. # Nintendo made some obfuscation changes to WPS and WPA for the Wi-Fi network
      255. # used between the Wii U and its gamepad. If this option is enabled, hostapd
      256. # will host an access point that uses these non standard obfuscations for Wii U
      257. # gamepad compatibility. Only modified clients will be able to connect.
      258. CONFIG_TENDONIN=y
      259. CONFIG_P2P_MANAGER=y
      Alles anzeigen
      Meine wpa_supplicant config für Selber-Kompilierer

      Quellcode

      1. # Debian wpa_supplicant build time configuration
      2. #
      3. # This file lists the configuration options that are used when building the
      4. # hostapd binary. All lines starting with # are ignored. Configuration option
      5. # lines must be commented out complete, if they are not to be included, i.e.,
      6. # just setting VARIABLE=n is not disabling that variable.
      7. #
      8. # This file is included in Makefile, so variables like CFLAGS and LIBS can also
      9. # be modified from here. In most cases, these lines should use += in order not
      10. # to override previous values of the variables.
      11. # Uncomment following two lines and fix the paths if you have installed OpenSSL
      12. # or GnuTLS in non-default location
      13. #CFLAGS += -I/usr/local/openssl/include
      14. #LIBS += -L/usr/local/openssl/lib
      15. # Some Red Hat versions seem to include kerberos header files from OpenSSL, but
      16. # the kerberos files are not in the default include path. Following line can be
      17. # used to fix build issues on such systems (krb5.h not found).
      18. #CFLAGS += -I/usr/include/kerberos
      19. # Example configuration for various cross-compilation platforms
      20. #### sveasoft (e.g., for Linksys WRT54G) ######################################
      21. #CC=mipsel-uclibc-gcc
      22. #CC=/opt/brcm/hndtools-mipsel-uclibc/bin/mipsel-uclibc-gcc
      23. #CFLAGS += -Os
      24. #CPPFLAGS += -I../src/include -I../../src/router/openssl/include
      25. #LIBS += -L/opt/brcm/hndtools-mipsel-uclibc-0.9.19/lib -lssl
      26. ###############################################################################
      27. #### openwrt (e.g., for Linksys WRT54G) #######################################
      28. #CC=mipsel-uclibc-gcc
      29. #CC=/opt/brcm/hndtools-mipsel-uclibc/bin/mipsel-uclibc-gcc
      30. #CFLAGS += -Os
      31. #CPPFLAGS=-I../src/include -I../openssl-0.9.7d/include \
      32. # -I../WRT54GS/release/src/include
      33. #LIBS = -lssl
      34. ###############################################################################
      35. # Driver interface for Host AP driver
      36. CONFIG_DRIVER_HOSTAP=y
      37. # Driver interface for Agere driver
      38. #CONFIG_DRIVER_HERMES=y
      39. # Change include directories to match with the local setup
      40. #CFLAGS += -I../../hcf -I../../include -I../../include/hcf
      41. #CFLAGS += -I../../include/wireless
      42. # Driver interface for madwifi driver
      43. # Deprecated; use CONFIG_DRIVER_WEXT=y instead.
      44. #CONFIG_DRIVER_MADWIFI=y
      45. # Set include directory to the madwifi source tree
      46. #CFLAGS += -I../../madwifi
      47. # Driver interface for ndiswrapper
      48. # Deprecated; use CONFIG_DRIVER_WEXT=y instead.
      49. #CONFIG_DRIVER_NDISWRAPPER=y
      50. # Driver interface for Atmel driver
      51. CONFIG_DRIVER_ATMEL=y
      52. # Driver interface for old Broadcom driver
      53. # Please note that the newer Broadcom driver ("hybrid Linux driver") supports
      54. # Linux wireless extensions and does not need (or even work) with the old
      55. # driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
      56. #CONFIG_DRIVER_BROADCOM=y
      57. # Example path for wlioctl.h; change to match your configuration
      58. #CFLAGS += -I/opt/WRT54GS/release/src/include
      59. # Driver interface for Intel ipw2100/2200 driver
      60. # Deprecated; use CONFIG_DRIVER_WEXT=y instead.
      61. #CONFIG_DRIVER_IPW=y
      62. # Driver interface for Ralink driver
      63. CONFIG_DRIVER_RALINK=y
      64. # Driver interface for generic Linux wireless extensions
      65. # Note: WEXT is deprecated in the current Linux kernel version and no new
      66. # functionality is added to it. nl80211-based interface is the new
      67. # replacement for WEXT and its use allows wpa_supplicant to properly control
      68. # the driver to improve existing functionality like roaming and to support new
      69. # functionality.
      70. CONFIG_DRIVER_WEXT=y
      71. # Driver interface for Linux drivers using the nl80211 kernel interface
      72. CONFIG_DRIVER_NL80211=y
      73. CONFIG_LIBNL32=y
      74. # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
      75. #CONFIG_DRIVER_BSD=y
      76. #CFLAGS += -I/usr/local/include
      77. #LIBS += -L/usr/local/lib
      78. #LIBS_p += -L/usr/local/lib
      79. #LIBS_c += -L/usr/local/lib
      80. # Driver interface for Windows NDIS
      81. #CONFIG_DRIVER_NDIS=y
      82. #CFLAGS += -I/usr/include/w32api/ddk
      83. #LIBS += -L/usr/local/lib
      84. # For native build using mingw
      85. #CONFIG_NATIVE_WINDOWS=y
      86. # Additional directories for cross-compilation on Linux host for mingw target
      87. #CFLAGS += -I/opt/mingw/mingw32/include/ddk
      88. #LIBS += -L/opt/mingw/mingw32/lib
      89. #CC=mingw32-gcc
      90. # By default, driver_ndis uses WinPcap for low-level operations. This can be
      91. # replaced with the following option which replaces WinPcap calls with NDISUIO.
      92. # However, this requires that WZC is disabled (net stop wzcsvc) before starting
      93. # wpa_supplicant.
      94. # CONFIG_USE_NDISUIO=y
      95. # Driver interface for development testing
      96. #CONFIG_DRIVER_TEST=y
      97. # Driver interface for wired Ethernet drivers
      98. CONFIG_DRIVER_WIRED=y
      99. # Driver interface for the Broadcom RoboSwitch family
      100. #CONFIG_DRIVER_ROBOSWITCH=y
      101. # Driver interface for no driver (e.g., WPS ER only)
      102. CONFIG_DRIVER_NONE=y
      103. # Solaris libraries
      104. #LIBS += -lsocket -ldlpi -lnsl
      105. #LIBS_c += -lsocket
      106. # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
      107. # included)
      108. CONFIG_IEEE8021X_EAPOL=y
      109. # EAP-MD5
      110. CONFIG_EAP_MD5=y
      111. # EAP-MSCHAPv2
      112. CONFIG_EAP_MSCHAPV2=y
      113. # EAP-TLS
      114. CONFIG_EAP_TLS=y
      115. # EAL-PEAP
      116. CONFIG_EAP_PEAP=y
      117. # EAP-TTLS
      118. CONFIG_EAP_TTLS=y
      119. # EAP-FAST
      120. # Note: Default OpenSSL package does not include support for all the
      121. # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
      122. # the OpenSSL library must be patched (openssl-0.9.8d-tls-extensions.patch)
      123. # to add the needed functions.
      124. #CONFIG_EAP_FAST=y
      125. # EAP-GTC
      126. CONFIG_EAP_GTC=y
      127. # EAP-OTP
      128. CONFIG_EAP_OTP=y
      129. # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
      130. CONFIG_EAP_SIM=y
      131. # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
      132. CONFIG_EAP_PSK=y
      133. # EAP-pwd (secure authentication using only a password)
      134. CONFIG_EAP_PWD=y
      135. # EAP-PAX
      136. CONFIG_EAP_PAX=y
      137. # LEAP
      138. CONFIG_EAP_LEAP=y
      139. # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used)
      140. CONFIG_EAP_AKA=y
      141. # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used).
      142. # This requires CONFIG_EAP_AKA to be enabled, too.
      143. CONFIG_EAP_AKA_PRIME=y
      144. # Enable USIM simulator (Milenage) for EAP-AKA
      145. #CONFIG_USIM_SIMULATOR=y
      146. # EAP-SAKE
      147. CONFIG_EAP_SAKE=y
      148. # EAP-GPSK
      149. CONFIG_EAP_GPSK=y
      150. # Include support for optional SHA256 cipher suite in EAP-GPSK
      151. CONFIG_EAP_GPSK_SHA256=y
      152. # EAP-TNC and related Trusted Network Connect support (experimental)
      153. CONFIG_EAP_TNC=y
      154. # Wi-Fi Protected Setup (WPS)
      155. CONFIG_WPS=y
      156. # Enable WSC 2.0 support
      157. CONFIG_WPS2=y
      158. # Enable WPS external registrar functionality
      159. CONFIG_WPS_ER=y
      160. # Disable credentials for an open network by default when acting as a WPS
      161. # registrar.
      162. CONFIG_WPS_REG_DISABLE_OPEN=y
      163. # EAP-IKEv2
      164. CONFIG_EAP_IKEV2=y
      165. # PKCS#12 (PFX) support (used to read private key and certificate file from
      166. # a file that usually has extension .p12 or .pfx)
      167. CONFIG_PKCS12=y
      168. # Smartcard support (i.e., private key on a smartcard), e.g., with openssl
      169. # engine.
      170. CONFIG_SMARTCARD=y
      171. # PC/SC interface for smartcards (USIM, GSM SIM)
      172. # Enable this if EAP-SIM or EAP-AKA is included
      173. CONFIG_PCSC=y
      174. # Development testing
      175. #CONFIG_EAPOL_TEST=y
      176. # Select control interface backend for external programs, e.g, wpa_cli:
      177. # unix = UNIX domain sockets (default for Linux/*BSD)
      178. # udp = UDP sockets using localhost (127.0.0.1)
      179. # named_pipe = Windows Named Pipe (default for Windows)
      180. # y = use default (backwards compatibility)
      181. # If this option is commented out, control interface is not included in the
      182. # build.
      183. CONFIG_CTRL_IFACE=y
      184. # Include support for GNU Readline and History Libraries in wpa_cli.
      185. # When building a wpa_cli binary for distribution, please note that these
      186. # libraries are licensed under GPL and as such, BSD license may not apply for
      187. # the resulting binary.
      188. CONFIG_READLINE=y
      189. # Include internal line edit mode in wpa_cli. This can be used as a replacement
      190. # for GNU Readline to provide limited command line editing and history support.
      191. #CONFIG_WPA_CLI_EDIT=y
      192. # Remove debugging code that is printing out debug message to stdout.
      193. # This can be used to reduce the size of the wpa_supplicant considerably
      194. # if debugging code is not needed. The size reduction can be around 35%
      195. # (e.g., 90 kB).
      196. #CONFIG_NO_STDOUT_DEBUG=y
      197. # Remove WPA support, e.g., for wired-only IEEE 802.1X supplicant, to save
      198. # 35-50 kB in code size.
      199. #CONFIG_NO_WPA=y
      200. # Remove WPA2 support. This allows WPA to be used, but removes WPA2 code to
      201. # save about 1 kB in code size when building only WPA-Personal (no EAP support)
      202. # or 6 kB if building for WPA-Enterprise.
      203. #CONFIG_NO_WPA2=y
      204. # Remove IEEE 802.11i/WPA-Personal ASCII passphrase support
      205. # This option can be used to reduce code size by removing support for
      206. # converting ASCII passphrases into PSK. If this functionality is removed, the
      207. # PSK can only be configured as the 64-octet hexstring (e.g., from
      208. # wpa_passphrase). This saves about 0.5 kB in code size.
      209. #CONFIG_NO_WPA_PASSPHRASE=y
      210. # Disable scan result processing (ap_mode=1) to save code size by about 1 kB.
      211. # This can be used if ap_scan=1 mode is never enabled.
      212. #CONFIG_NO_SCAN_PROCESSING=y
      213. # Select configuration backend:
      214. # file = text file (e.g., wpa_supplicant.conf; note: the configuration file
      215. # path is given on command line, not here; this option is just used to
      216. # select the backend that allows configuration files to be used)
      217. # winreg = Windows registry (see win_example.reg for an example)
      218. CONFIG_BACKEND=file
      219. # Remove configuration write functionality (i.e., to allow the configuration
      220. # file to be updated based on runtime configuration changes). The runtime
      221. # configuration can still be changed, the changes are just not going to be
      222. # persistent over restarts. This option can be used to reduce code size by
      223. # about 3.5 kB.
      224. #CONFIG_NO_CONFIG_WRITE=y
      225. # Remove support for configuration blobs to reduce code size by about 1.5 kB.
      226. #CONFIG_NO_CONFIG_BLOBS=y
      227. # Select program entry point implementation:
      228. # main = UNIX/POSIX like main() function (default)
      229. # main_winsvc = Windows service (read parameters from registry)
      230. # main_none = Very basic example (development use only)
      231. CONFIG_MAIN=main
      232. # Select wrapper for operatins system and C library specific functions
      233. # unix = UNIX/POSIX like systems (default)
      234. # win32 = Windows systems
      235. # none = Empty template
      236. CONFIG_OS=unix
      237. # Select event loop implementation
      238. # eloop = select() loop (default)
      239. # eloop_win = Windows events and WaitForMultipleObject() loop
      240. # eloop_none = Empty template
      241. CONFIG_ELOOP=eloop
      242. # Select layer 2 packet implementation
      243. # linux = Linux packet socket (default)
      244. # pcap = libpcap/libdnet/WinPcap
      245. # freebsd = FreeBSD libpcap
      246. # winpcap = WinPcap with receive thread
      247. # ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)
      248. # none = Empty template
      249. CONFIG_L2_PACKET=linux
      250. # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
      251. CONFIG_PEERKEY=y
      252. # IEEE 802.11w (management frame protection)
      253. # This version is an experimental implementation based on IEEE 802.11w/D1.0
      254. # draft and is subject to change since the standard has not yet been finalized.
      255. # Driver support is also needed for IEEE 802.11w.
      256. CONFIG_IEEE80211W=y
      257. # Select TLS implementation
      258. # openssl = OpenSSL (default)
      259. # gnutls = GnuTLS
      260. # internal = Internal TLSv1 implementation (experimental)
      261. # none = Empty template
      262. CONFIG_TLS=openssl
      263. # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
      264. # can be enabled to get a stronger construction of messages when block ciphers
      265. # are used. It should be noted that some existing TLS v1.0 -based
      266. # implementation may not be compatible with TLS v1.1 message (ClientHello is
      267. # sent prior to negotiating which version will be used)
      268. CONFIG_TLSV11=y
      269. # If CONFIG_TLS=internal is used, additional library and include paths are
      270. # needed for LibTomMath. Alternatively, an integrated, minimal version of
      271. # LibTomMath can be used. See beginning of libtommath.c for details on benefits
      272. # and drawbacks of this option.
      273. #CONFIG_INTERNAL_LIBTOMMATH=y
      274. #ifndef CONFIG_INTERNAL_LIBTOMMATH
      275. #LTM_PATH=/usr/src/libtommath-0.39
      276. #CFLAGS += -I$(LTM_PATH)
      277. #LIBS += -L$(LTM_PATH)
      278. #LIBS_p += -L$(LTM_PATH)
      279. #endif
      280. # At the cost of about 4 kB of additional binary size, the internal LibTomMath
      281. # can be configured to include faster routines for exptmod, sqr, and div to
      282. # speed up DH and RSA calculation considerably
      283. #CONFIG_INTERNAL_LIBTOMMATH_FAST=y
      284. # Include NDIS event processing through WMI into wpa_supplicant/wpasvc.
      285. # This is only for Windows builds and requires WMI-related header files and
      286. # WbemUuid.Lib from Platform SDK even when building with MinGW.
      287. #CONFIG_NDIS_EVENTS_INTEGRATED=y
      288. #PLATFORMSDKLIB="/opt/Program Files/Microsoft Platform SDK/Lib"
      289. # Add support for old DBus control interface
      290. # (fi.epitest.hostap.WPASupplicant)
      291. CONFIG_CTRL_IFACE_DBUS=y
      292. # Add support for new DBus control interface
      293. # (fi.w1.hostap.wpa_supplicant1)
      294. CONFIG_CTRL_IFACE_DBUS_NEW=y
      295. # Add introspection support for new DBus control interface
      296. CONFIG_CTRL_IFACE_DBUS_INTRO=y
      297. # Add support for loading EAP methods dynamically as shared libraries.
      298. # When this option is enabled, each EAP method can be either included
      299. # statically (CONFIG_EAP_<method>=y) or dynamically (CONFIG_EAP_<method>=dyn).
      300. # Dynamic EAP methods are build as shared objects (eap_*.so) and they need to
      301. # be loaded in the beginning of the wpa_supplicant configuration file
      302. # (see load_dynamic_eap parameter in the example file) before being used in
      303. # the network blocks.
      304. #
      305. # Note that some shared parts of EAP methods are included in the main program
      306. # and in order to be able to use dynamic EAP methods using these parts, the
      307. # main program must have been build with the EAP method enabled (=y or =dyn).
      308. # This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries
      309. # unless at least one of them was included in the main build to force inclusion
      310. # of the shared code. Similarly, at least one of EAP-SIM/AKA must be included
      311. # in the main build to be able to load these methods dynamically.
      312. #
      313. # Please also note that using dynamic libraries will increase the total binary
      314. # size. Thus, it may not be the best option for targets that have limited
      315. # amount of memory/flash.
      316. #CONFIG_DYNAMIC_EAP_METHODS=y
      317. # IEEE Std 802.11r-2008 (Fast BSS Transition)
      318. CONFIG_IEEE80211R=y
      319. # Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt)
      320. CONFIG_DEBUG_FILE=y
      321. # Send debug messages to syslog instead of stdout
      322. CONFIG_DEBUG_SYSLOG=y
      323. # Set syslog facility for debug messages
      324. CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
      325. # Enable privilege separation (see README 'Privilege separation' for details)
      326. #CONFIG_PRIVSEP=y
      327. # Enable mitigation against certain attacks against TKIP by delaying Michael
      328. # MIC error reports by a random amount of time between 0 and 60 seconds
      329. CONFIG_DELAYED_MIC_ERROR_REPORT=y
      330. # Enable tracing code for developer debugging
      331. # This tracks use of memory allocations and other registrations and reports
      332. # incorrect use with a backtrace of call (or allocation) location.
      333. #CONFIG_WPA_TRACE=y
      334. # For BSD, uncomment these.
      335. #LIBS += -lexecinfo
      336. #LIBS_p += -lexecinfo
      337. #LIBS_c += -lexecinfo
      338. # Use libbfd to get more details for developer debugging
      339. # This enables use of libbfd to get more detailed symbols for the backtraces
      340. # generated by CONFIG_WPA_TRACE=y.
      341. #CONFIG_WPA_TRACE_BFD=y
      342. # For BSD, uncomment these.
      343. #LIBS += -lbfd -liberty -lz
      344. #LIBS_p += -lbfd -liberty -lz
      345. #LIBS_c += -lbfd -liberty -lz
      346. # wpa_supplicant depends on strong random number generation being available
      347. # from the operating system. os_get_random() function is used to fetch random
      348. # data when needed, e.g., for key generation. On Linux and BSD systems, this
      349. # works by reading /dev/urandom. It should be noted that the OS entropy pool
      350. # needs to be properly initialized before wpa_supplicant is started. This is
      351. # important especially on embedded devices that do not have a hardware random
      352. # number generator and may by default start up with minimal entropy available
      353. # for random number generation.
      354. #
      355. # As a safety net, wpa_supplicant is by default trying to internally collect
      356. # additional entropy for generating random data to mix in with the data fetched
      357. # from the OS. This by itself is not considered to be very strong, but it may
      358. # help in cases where the system pool is not initialized properly. However, it
      359. # is very strongly recommended that the system pool is initialized with enough
      360. # entropy either by using hardware assisted random number generator or by
      361. # storing state over device reboots.
      362. #
      363. # wpa_supplicant can be configured to maintain its own entropy store over
      364. # restarts to enhance random number generation. This is not perfect, but it is
      365. # much more secure than using the same sequence of random numbers after every
      366. # reboot. This can be enabled with -e<entropy file> command line option. The
      367. # specified file needs to be readable and writable by wpa_supplicant.
      368. #
      369. # If the os_get_random() is known to provide strong random data (e.g., on
      370. # Linux/BSD, the board in question is known to have reliable source of random
      371. # data from /dev/urandom), the internal wpa_supplicant random pool can be
      372. # disabled. This will save some in binary size and CPU use. However, this
      373. # should only be considered for builds that are known to be used on devices
      374. # that meet the requirements described above.
      375. #CONFIG_NO_RANDOM_POOL=y
      376. # IEEE 802.11n (High Throughput) support (mainly for AP mode)
      377. CONFIG_IEEE80211N=y
      378. # Interworking (IEEE 802.11u)
      379. # This can be used to enable functionality to improve interworking with
      380. # external networks (GAS/ANQP to learn more about the networks and network
      381. # selection based on available credentials).
      382. CONFIG_INTERWORKING=y
      383. # XXX: Debian #650834
      384. CONFIG_BGSCAN_SIMPLE=y
      385. # XXX: Debian #678147
      386. # keep it disabled for wheezy:
      387. # - low impact, but too late in the release cycle
      388. # (especially for a security update).
      389. CONFIG_IBSS_RSN=y
      390. # XXX: Wi-Fi P2P support
      391. # keep it disabled for wheezy:
      392. # - kernel 3.2 has no support for Wi-Fi P2P
      393. # - there are still lots of (bug-)fixes going into hostapd-1.git, the P2P
      394. # feature is definately not supportable with wpa 1.0 without further updates
      395. # from the hostapd-1.git stable tree.
      396. CONFIG_P2P=y
      397. CONFIG_TENDONIN=y
      Alles anzeigen


      MarioKart Wii: 1807-8091-0335
      Wii U: Chris (Mii Name) / setialpha (ID)
      3DS: 3754 6370 1034 (Chris)