aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/sta_info.h
Commit message (Collapse)AuthorAgeFilesLines
* add set/cancel_priority to ap mode as wellEliad Peller2012-08-021-0/+3
| | | | | | | ROC when the ap gets the first auth request, and CROC after authorization (or after connection fails). Signed-off-by: Eliad Peller <eliad@wizery.com>
* sta_info: Remove duplicated function declarationAntonio Quartulli2012-06-091-1/+0
| | | | | | In sta_info.h, ap_free_sta() was declared twice. Signed-off-by: Antonio Quartulli <ordex@autistici.org>
* Add wps_cancel for hostapd_cliAnirban Sirkhell2012-03-301-0/+4
| | | | | | | Implement wps_cancel for hostapd similarly to how it was already supported in wpa_supplicant AP mode. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Interworking: Add GAS server support for AP modeJay Katabathuni2012-02-261-0/+7
| | | | | | | | | | | This adds GAS/ANQP implementation into hostapd. This commit brings in the basic GAS/ANQP functionality, but only the ANQP Capability List element is supported. For testing purposes, hostapd control interface SET command can be used to set the gas_frag_limit parameter dynamically. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* AP: Pass station's WMM configuration to driver wrappersJason Young2011-12-171-3/+1
| | | | | | | This updates a previous patch did more or less the same thing by providing the qosinfo as a single variable to the driver wrappers. Signed-hostap: Jason Young <jason.young@dspg.com>
* AP: Add uapsd_queues and max_sp fieldsEliad Peller2011-12-171-0/+3
| | | | | | | | | Add uapsd_queues and max_sp fields to sta_info struct, and pass them to the sta_add callback. These values are determined by the WMM IE in the (Re)Association Request. Signed-off-by: Eliad Peller <eliad@wizery.com>
* Allow WPA passphrase to be fetched with RADIUS Tunnel-Password attributeMichael Braun2011-12-111-0/+1
| | | | | | | | | | | | This allows per-device PSK to be configured for WPA-Personal using a RADIUS authentication server. This uses RADIUS-based MAC address ACL (macaddr_acl=2), i.e., Access-Request uses the MAC address of the station as the User-Name and User-Password. The WPA passphrase is returned in Tunnel-Password attribute in Access-Accept. This functionality can be enabled with the new hostapd.conf parameter, wpa_psk_radius. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
* Fix typos found by codespellPavel Roskin2011-09-221-1/+1
| | | | Signed-off-by: Pavel Roskin <proski@gnu.org>
* Fix Deauth/Disassoc callback handling with test framesJouni Malinen2011-09-061-0/+2
| | | | | | | | | | | | The Deauth/Disassoc TX status callbacks were ending up kicking the station entry from kernel driver when test functionality was used to inject Deauth/Disassoc frames from the AP with the purpose of leaving the local association in place. Fix this by using STA flags to figure out whether there was a pending callback for the frame that we need to act on. In addition, add forgotten functionality for the Disassoc TX status callback to match the behavior with Deauth.
* Delay STA entry removal until Deauth/Disassoc TX status in AP modeJouni Malinen2011-08-281-1/+7
| | | | | | | | | | | | | | | | | This allows the driver to use PS buffering of Deauthentication and Disassociation frames when the STA is in power save sleep. The STA entry (and PTK) will be removed from the kernel only after the Deauth/Disassoc has been transmitted (e.g., when the STA wakes up). A hardcoded two second timeout is used to limit the length of this window should the driver fail to deliver the frame (e.g., the STA is out of range and does not wake up). The kernel STA entry is marked unauthorized during the wait to avoid accepting Data frames from the STA that we have decided to disconnect. This behavior is available only with drivers that provide TX status events for Deauth/Disassoc frames (nl80211 at this point). Other drivers continue to use the previous behavior where the STA entry is removed immediately.
* WPS: Wait for EAPOL-Start unless WPS 2.0 station as workaroundJouni Malinen2011-08-281-0/+1
| | | | | | | | | | | Extend the code that waits for the station to send EAPOL-Start before initiating EAPOL authenticator operations to cover the case where the station includes WPS IE in (Re)Association Request frame if that IE does not include support for WPS 2.0. While this should not really be needed, this may help with some deployed WPS 1.0 stations that do not support EAPOL operations correctly and may get confused of the EAP-Request/Identity packets that would show up twice if EAPOL-Start is transmitted.
* Add workaround for race condition with AssocResp TX statusJouni Malinen2011-04-151-0/+1
| | | | | | | | | | | | | It may take some time for the TX status to be delivered for a (Re)Association Response frame and if any Data frames are received during that time, they may end up getting dropped as Class 3 frames in not-associated state. This results in a Disassociation frame being sent to the station and it assuming that the association has been lost. Work around the issue by remembering that the (Re)Association Request has already been accepted and skip the Deauth/Disassoc sending because of the possible Class 3 frames before the TX status callback is received.
* AP: Introduce sta authorized wrappersJohannes Berg2011-02-021-0/+7
| | | | | | | | To enable making state change notifications on the WLAN_STA_AUTHORIZED flag, introduce ap_sta_set_authorized(), and to reduce use of the flag itself also add a wrapper for testing the flag: ap_sta_is_authorized(). Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Disable periodic NoA when non-P2P STA is connectedJouni Malinen2010-09-091-0/+1
| | | | | | For now, this applies to the test command that can be used to set periodic NoA (p2p_set noa). The value are stored and periodic NoA is enabled whenever there are no non-P2P STAs connected to the GO.
* P2P: Save a copy of P2P IE(s) data from (Re)Association RequestJouni Malinen2010-09-091-0/+1
|
* Move generic AP functionality implementation into src/apJouni Malinen2009-12-251-0/+155
This code can be shared by both hostapd and wpa_supplicant and this is an initial step in getting the generic code moved to be under the src directories. Couple of generic files still remain under the hostapd directory due to direct dependencies to files there. Once the dependencies have been removed, they will also be moved to the src/ap directory to allow wpa_supplicant to be built without requiring anything from the hostapd directory.