2008-02-27 20:34:43 -05:00
|
|
|
/*
|
|
|
|
* hostapd / Station table
|
2011-08-28 16:07:02 -04:00
|
|
|
* Copyright (c) 2002-2011, Jouni Malinen <j@w1.fi>
|
2008-02-27 20:34:43 -05:00
|
|
|
*
|
2012-02-11 09:46:35 -05:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-27 20:34:43 -05:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef STA_INFO_H
|
|
|
|
#define STA_INFO_H
|
|
|
|
|
2014-03-11 00:07:01 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
/* needed for mesh_plink_state enum */
|
|
|
|
#include "common/defs.h"
|
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
2014-11-01 02:33:41 -04:00
|
|
|
#include "list.h"
|
|
|
|
|
2009-12-13 04:41:46 -05:00
|
|
|
/* STA flags */
|
|
|
|
#define WLAN_STA_AUTH BIT(0)
|
|
|
|
#define WLAN_STA_ASSOC BIT(1)
|
|
|
|
#define WLAN_STA_AUTHORIZED BIT(5)
|
|
|
|
#define WLAN_STA_PENDING_POLL BIT(6) /* pending activity poll not ACKed */
|
|
|
|
#define WLAN_STA_SHORT_PREAMBLE BIT(7)
|
|
|
|
#define WLAN_STA_PREAUTH BIT(8)
|
|
|
|
#define WLAN_STA_WMM BIT(9)
|
|
|
|
#define WLAN_STA_MFP BIT(10)
|
|
|
|
#define WLAN_STA_HT BIT(11)
|
|
|
|
#define WLAN_STA_WPS BIT(12)
|
|
|
|
#define WLAN_STA_MAYBE_WPS BIT(13)
|
2009-12-24 04:46:22 -05:00
|
|
|
#define WLAN_STA_WDS BIT(14)
|
2011-04-15 12:26:28 -04:00
|
|
|
#define WLAN_STA_ASSOC_REQ_OK BIT(15)
|
2011-08-28 12:16:59 -04:00
|
|
|
#define WLAN_STA_WPS2 BIT(16)
|
2012-02-26 15:34:19 -05:00
|
|
|
#define WLAN_STA_GAS BIT(17)
|
2012-08-10 12:49:18 -04:00
|
|
|
#define WLAN_STA_VHT BIT(18)
|
2013-12-27 12:06:52 -05:00
|
|
|
#define WLAN_STA_WNM_SLEEP_MODE BIT(19)
|
2014-02-10 07:43:05 -05:00
|
|
|
#define WLAN_STA_VHT_OPMODE_ENABLED BIT(20)
|
2014-11-10 10:12:29 -05:00
|
|
|
#define WLAN_STA_VENDOR_VHT BIT(21)
|
2011-09-06 14:03:02 -04:00
|
|
|
#define WLAN_STA_PENDING_DISASSOC_CB BIT(29)
|
|
|
|
#define WLAN_STA_PENDING_DEAUTH_CB BIT(30)
|
2009-12-13 04:41:46 -05:00
|
|
|
#define WLAN_STA_NONERP BIT(31)
|
|
|
|
|
2009-03-25 10:13:35 -04:00
|
|
|
/* Maximum number of supported rates (from both Supported Rates and Extended
|
|
|
|
* Supported Rates IEs). */
|
|
|
|
#define WLAN_SUPP_RATES_MAX 32
|
|
|
|
|
|
|
|
|
|
|
|
struct sta_info {
|
|
|
|
struct sta_info *next; /* next entry in sta list */
|
|
|
|
struct sta_info *hnext; /* next entry in hash table list */
|
|
|
|
u8 addr[6];
|
AP: Add support for Proxy ARP, DHCP snooping mechanism
Proxy ARP allows the AP devices to keep track of the hardware address to
IP address mapping of the STA devices within the BSS. When a request for
such information is made (i.e., ARP request, Neighbor Solicitation), the
AP will respond on behalf of the STA device within the BSS. Such
requests could originate from a device within the BSS or also from the
bridge. In the process of the AP replying to the request (i.e., ARP
reply, Neighbor Advertisement), the AP will drop the original request
frame. The relevant STA will not even know that such information was
ever requested.
This feature is a requirement for Hotspot 2.0, and is defined in IEEE
Std 802.11-2012, 10.23.13. While the Proxy ARP support code mainly
resides in the kernel bridge code, in order to optimize the performance
and simplify kernel implementation, the DHCP snooping code was added to
the hostapd.
Signed-off-by: Kyeyoon Park <kyeyoonp@qca.qualcomm.com>
2014-09-26 01:32:55 -04:00
|
|
|
be32 ipaddr;
|
2014-11-01 02:33:41 -04:00
|
|
|
struct dl_list ip6addr; /* list head for struct ip6addr */
|
2009-03-25 10:13:35 -04:00
|
|
|
u16 aid; /* STA's unique AID (1 .. 2007) or 0 if not yet assigned */
|
2009-12-13 04:41:46 -05:00
|
|
|
u32 flags; /* Bitfield of WLAN_STA_* */
|
2009-03-25 10:13:35 -04:00
|
|
|
u16 capability;
|
|
|
|
u16 listen_interval; /* or beacon_int for APs */
|
|
|
|
u8 supported_rates[WLAN_SUPP_RATES_MAX];
|
|
|
|
int supported_rates_len;
|
2011-12-17 05:38:06 -05:00
|
|
|
u8 qosinfo; /* Valid when WLAN_STA_WMM is set */
|
2009-03-25 10:13:35 -04:00
|
|
|
|
2014-03-11 00:07:01 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
enum mesh_plink_state plink_state;
|
|
|
|
u16 peer_lid;
|
|
|
|
u16 my_lid;
|
|
|
|
u16 mpm_close_reason;
|
|
|
|
int mpm_retries;
|
2014-09-01 00:23:29 -04:00
|
|
|
u8 my_nonce[32];
|
|
|
|
u8 peer_nonce[32];
|
|
|
|
u8 aek[32]; /* SHA256 digest length */
|
|
|
|
u8 mtk[16];
|
|
|
|
u8 mgtk[16];
|
2014-09-01 00:23:31 -04:00
|
|
|
u8 sae_auth_retry;
|
2014-03-11 00:07:01 -04:00
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
2009-03-25 10:13:35 -04:00
|
|
|
unsigned int nonerp_set:1;
|
|
|
|
unsigned int no_short_slot_time_set:1;
|
|
|
|
unsigned int no_short_preamble_set:1;
|
|
|
|
unsigned int no_ht_gf_set:1;
|
|
|
|
unsigned int no_ht_set:1;
|
2014-04-14 13:40:56 -04:00
|
|
|
unsigned int ht40_intolerant_set:1;
|
2009-03-25 10:13:35 -04:00
|
|
|
unsigned int ht_20mhz_set:1;
|
2010-07-08 20:14:24 -04:00
|
|
|
unsigned int no_p2p_set:1;
|
2013-07-24 05:28:20 -04:00
|
|
|
unsigned int qos_map_enabled:1;
|
2012-11-21 17:48:48 -05:00
|
|
|
unsigned int remediation:1;
|
2013-07-26 15:13:58 -04:00
|
|
|
unsigned int hs20_deauth_requested:1;
|
2014-10-04 12:36:48 -04:00
|
|
|
unsigned int session_timeout_set:1;
|
2015-01-16 05:10:52 -05:00
|
|
|
unsigned int radius_das_match:1;
|
2009-03-25 10:13:35 -04:00
|
|
|
|
|
|
|
u16 auth_alg;
|
|
|
|
|
|
|
|
enum {
|
2013-04-05 11:41:26 -04:00
|
|
|
STA_NULLFUNC = 0, STA_DISASSOC, STA_DEAUTH, STA_REMOVE,
|
|
|
|
STA_DISASSOC_FROM_CLI
|
2009-03-25 10:13:35 -04:00
|
|
|
} timeout_next;
|
|
|
|
|
2011-08-28 16:07:02 -04:00
|
|
|
u16 deauth_reason;
|
|
|
|
u16 disassoc_reason;
|
|
|
|
|
2009-03-25 10:13:35 -04:00
|
|
|
/* IEEE 802.1X related data */
|
|
|
|
struct eapol_state_machine *eapol_sm;
|
|
|
|
|
|
|
|
u32 acct_session_id_hi;
|
|
|
|
u32 acct_session_id_lo;
|
2013-12-16 15:08:22 -05:00
|
|
|
struct os_reltime acct_session_start;
|
2009-03-25 10:13:35 -04:00
|
|
|
int acct_session_started;
|
|
|
|
int acct_terminate_cause; /* Acct-Terminate-Cause */
|
|
|
|
int acct_interim_interval; /* Acct-Interim-Interval */
|
|
|
|
|
|
|
|
unsigned long last_rx_bytes;
|
|
|
|
unsigned long last_tx_bytes;
|
|
|
|
u32 acct_input_gigawords; /* Acct-Input-Gigawords */
|
|
|
|
u32 acct_output_gigawords; /* Acct-Output-Gigawords */
|
|
|
|
|
|
|
|
u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */
|
|
|
|
|
|
|
|
struct wpa_state_machine *wpa_sm;
|
|
|
|
struct rsn_preauth_interface *preauth_iface;
|
|
|
|
|
|
|
|
struct hostapd_ssid *ssid; /* SSID selection based on (Re)AssocReq */
|
|
|
|
struct hostapd_ssid *ssid_probe; /* SSID selection based on ProbeReq */
|
|
|
|
|
2015-04-10 08:49:46 -04:00
|
|
|
int vlan_id; /* 0: none, >0: VID */
|
2012-11-25 10:49:25 -05:00
|
|
|
/* PSKs from RADIUS authentication server */
|
|
|
|
struct hostapd_sta_wpa_psk_short *psk;
|
2009-03-25 10:13:35 -04:00
|
|
|
|
2012-08-19 07:20:10 -04:00
|
|
|
char *identity; /* User-Name from RADIUS */
|
|
|
|
char *radius_cui; /* Chargeable-User-Identity from RADIUS */
|
|
|
|
|
2009-11-29 14:07:52 -05:00
|
|
|
struct ieee80211_ht_capabilities *ht_capabilities;
|
2012-08-10 12:49:18 -04:00
|
|
|
struct ieee80211_vht_capabilities *vht_capabilities;
|
2014-02-10 07:43:05 -05:00
|
|
|
u8 vht_opmode;
|
2009-03-25 10:13:35 -04:00
|
|
|
|
|
|
|
#ifdef CONFIG_IEEE80211W
|
|
|
|
int sa_query_count; /* number of pending SA Query requests;
|
|
|
|
* 0 = no SA Query in progress */
|
|
|
|
int sa_query_timed_out;
|
|
|
|
u8 *sa_query_trans_id; /* buffer of WLAN_SA_QUERY_TR_ID_LEN *
|
|
|
|
* sa_query_count octets of pending SA Query
|
|
|
|
* transaction identifiers */
|
2013-11-25 15:56:09 -05:00
|
|
|
struct os_reltime sa_query_start;
|
2009-03-25 10:13:35 -04:00
|
|
|
#endif /* CONFIG_IEEE80211W */
|
|
|
|
|
2012-02-26 15:34:19 -05:00
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
#define GAS_DIALOG_MAX 8 /* Max concurrent dialog number */
|
|
|
|
struct gas_dialog_info *gas_dialog;
|
|
|
|
u8 gas_dialog_next;
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
2009-03-25 10:13:35 -04:00
|
|
|
struct wpabuf *wps_ie; /* WPS IE from (Re)Association Request */
|
2010-07-18 17:30:25 -04:00
|
|
|
struct wpabuf *p2p_ie; /* P2P IE from (Re)Association Request */
|
2012-11-21 17:19:17 -05:00
|
|
|
struct wpabuf *hs20_ie; /* HS 2.0 IE from (Re)Association Request */
|
2012-11-21 17:48:48 -05:00
|
|
|
u8 remediation_method;
|
|
|
|
char *remediation_url; /* HS 2.0 Subscription Remediation Server URL */
|
2013-07-26 15:13:58 -04:00
|
|
|
struct wpabuf *hs20_deauth_req;
|
2013-08-01 17:39:30 -04:00
|
|
|
char *hs20_session_info_url;
|
|
|
|
int hs20_disassoc_timer;
|
2012-09-26 06:52:19 -04:00
|
|
|
|
2013-11-25 15:56:04 -05:00
|
|
|
struct os_reltime connected_time;
|
2012-09-30 12:51:07 -04:00
|
|
|
|
|
|
|
#ifdef CONFIG_SAE
|
2012-12-30 14:48:19 -05:00
|
|
|
struct sae_data *sae;
|
2012-09-30 12:51:07 -04:00
|
|
|
#endif /* CONFIG_SAE */
|
2014-10-04 12:36:48 -04:00
|
|
|
|
|
|
|
u32 session_timeout; /* valid only if session_timeout_set == 1 */
|
2014-11-05 03:50:34 -05:00
|
|
|
|
|
|
|
/* Last Authentication/(Re)Association Request/Action frame sequence
|
|
|
|
* control */
|
|
|
|
u16 last_seq_ctrl;
|
|
|
|
/* Last Authentication/(Re)Association Request/Action frame subtype */
|
|
|
|
u8 last_subtype;
|
2009-03-25 10:13:35 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* Default value for maximum station inactivity. After AP_MAX_INACTIVITY has
|
|
|
|
* passed since last received frame from the station, a nullfunc data frame is
|
|
|
|
* sent to the station. If this frame is not acknowledged and no other frames
|
|
|
|
* have been received, the station will be disassociated after
|
2011-09-21 17:43:59 -04:00
|
|
|
* AP_DISASSOC_DELAY seconds. Similarly, the station will be deauthenticated
|
2009-03-25 10:13:35 -04:00
|
|
|
* after AP_DEAUTH_DELAY seconds has passed after disassociation. */
|
|
|
|
#define AP_MAX_INACTIVITY (5 * 60)
|
|
|
|
#define AP_DISASSOC_DELAY (1)
|
|
|
|
#define AP_DEAUTH_DELAY (1)
|
|
|
|
/* Number of seconds to keep STA entry with Authenticated flag after it has
|
|
|
|
* been disassociated. */
|
|
|
|
#define AP_MAX_INACTIVITY_AFTER_DISASSOC (1 * 30)
|
|
|
|
/* Number of seconds to keep STA entry after it has been deauthenticated. */
|
|
|
|
#define AP_MAX_INACTIVITY_AFTER_DEAUTH (1 * 5)
|
|
|
|
|
|
|
|
|
|
|
|
struct hostapd_data;
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
int ap_for_each_sta(struct hostapd_data *hapd,
|
|
|
|
int (*cb)(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
void *ctx),
|
|
|
|
void *ctx);
|
|
|
|
struct sta_info * ap_get_sta(struct hostapd_data *hapd, const u8 *sta);
|
2013-09-01 10:37:22 -04:00
|
|
|
struct sta_info * ap_get_sta_p2p(struct hostapd_data *hapd, const u8 *addr);
|
2008-02-27 20:34:43 -05:00
|
|
|
void ap_sta_hash_add(struct hostapd_data *hapd, struct sta_info *sta);
|
|
|
|
void ap_free_sta(struct hostapd_data *hapd, struct sta_info *sta);
|
2014-11-01 02:33:41 -04:00
|
|
|
void ap_sta_ip6addr_del(struct hostapd_data *hapd, struct sta_info *sta);
|
2008-02-27 20:34:43 -05:00
|
|
|
void hostapd_free_stas(struct hostapd_data *hapd);
|
|
|
|
void ap_handle_timer(void *eloop_ctx, void *timeout_ctx);
|
2013-11-06 16:20:28 -05:00
|
|
|
void ap_sta_replenish_timeout(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
u32 session_timeout);
|
2008-02-27 20:34:43 -05:00
|
|
|
void ap_sta_session_timeout(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
u32 session_timeout);
|
|
|
|
void ap_sta_no_session_timeout(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta);
|
2013-08-01 17:39:30 -04:00
|
|
|
void ap_sta_session_warning_timeout(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta, int warning_time);
|
2008-02-27 20:34:43 -05:00
|
|
|
struct sta_info * ap_sta_add(struct hostapd_data *hapd, const u8 *addr);
|
|
|
|
void ap_sta_disassociate(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
u16 reason);
|
|
|
|
void ap_sta_deauthenticate(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
u16 reason);
|
2012-03-19 02:23:31 -04:00
|
|
|
#ifdef CONFIG_WPS
|
|
|
|
int ap_sta_wps_cancel(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta, void *ctx);
|
|
|
|
#endif /* CONFIG_WPS */
|
2008-02-27 20:34:43 -05:00
|
|
|
int ap_sta_bind_vlan(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
int old_vlanid);
|
2008-12-26 04:46:21 -05:00
|
|
|
void ap_sta_start_sa_query(struct hostapd_data *hapd, struct sta_info *sta);
|
|
|
|
void ap_sta_stop_sa_query(struct hostapd_data *hapd, struct sta_info *sta);
|
2008-12-26 05:30:34 -05:00
|
|
|
int ap_check_sa_query_timeout(struct hostapd_data *hapd, struct sta_info *sta);
|
2009-12-24 13:41:30 -05:00
|
|
|
void ap_sta_disconnect(struct hostapd_data *hapd, struct sta_info *sta,
|
|
|
|
const u8 *addr, u16 reason);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
2011-02-02 09:52:32 -05:00
|
|
|
void ap_sta_set_authorized(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta, int authorized);
|
|
|
|
static inline int ap_sta_is_authorized(struct sta_info *sta)
|
|
|
|
{
|
|
|
|
return sta->flags & WLAN_STA_AUTHORIZED;
|
|
|
|
}
|
|
|
|
|
2011-08-28 16:07:02 -04:00
|
|
|
void ap_sta_deauth_cb(struct hostapd_data *hapd, struct sta_info *sta);
|
|
|
|
void ap_sta_disassoc_cb(struct hostapd_data *hapd, struct sta_info *sta);
|
|
|
|
|
2013-12-27 12:24:24 -05:00
|
|
|
int ap_sta_flags_txt(u32 flags, char *buf, size_t buflen);
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
#endif /* STA_INFO_H */
|