aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/ap.h
Commit message (Collapse)AuthorAgeFilesLines
* wpa_supplicant: Rename wpas_event_*() to wpas_ap_event_*()Dmitry Lebed2018-04-151-9/+9
| | | | | | | Rename DFS event handling functions, since they are located in ap.c and refer to AP-mode only. Needed to add some STA-mode DFS event handling. Signed-off-by: Dmitry Lebed <dlebed@quantenna.com>
* mesh: Add MESH_PMKSA_GET/ADD commandsMasashi Honma2017-01-141-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | These commnds are mesh version of PMKSA_GET/ADD commands. So the usage and security risk is similar to them. Refer to commit 3459381dd260e15e7bf768a75cb0b799cc1db33a ('External persistent storage for PMKSA cache entries') also. The MESH_PMKSA_GET command requires peer MAC address or "any" as an argument and outputs appropriate stored PMKSA cache. And the MESH_PMKSA_ADD command receives an output of MESH_PMKSA_GET and re-store the PMKSA cache into wpa_supplicant. By using re-stored PMKSA cache, wpa_supplicant can skip commit message creation which can use significant CPU resources. The output of the MESH_PMKSA_GET command uses the following format: <BSSID> <PMKID> <PMK> <expiration in seconds> The example of MESH_PMKSA_ADD command is this. MESH_PMKSA_ADD 02:00:00:00:03:00 231dc1c9fa2eed0354ea49e8ff2cc2dc cb0f6c9cab358a8146488566ca155421ab4f3ea4a6de2120050c149b797018fe 42930 MESH_PMKSA_ADD 02:00:00:00:04:00 d7e595916611640d3e4e8eac02909c3c eb414a33c74831275f25c2357b3c12e3d8bd2f2aab6cf781d6ade706be71321a 43180 This functionality is disabled by default and can be enabled with CONFIG_PMKSA_CACHE_EXTERNAL=y build configuration option. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* PMKSA: Flush AP/mesh PMKSA cache by PMKSA_FLUSH commandMasashi Honma2016-03-201-0/+1
| | | | | | | | | This extends the wpa_supplicant PMKSA_FLUSH control interface command to allow the PMKSA list from the authenticator side to be flushed for AP and mesh mode. In addition, this adds a hostapd PMKSA_FLUSH control interface command to flush the PMKSA entries. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* PMKSA: Show AP/mesh PMKSA list in PMKSA commandMasashi Honma2016-03-201-0/+3
| | | | | | | | | This extends the wpa_supplicant PMKSA control interface command to allow the PMKSA list from the authenticator side to be listed for AP and mesh mode. In addition, this adds a hostapd PMKSA control interface command to show the same list for the AP case. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* P2P: Implement wpas_p2p_move_go_csa()Andrei Otcheretianski2015-10-031-3/+3
| | | | | | | | | Use channel switch mechanism to move a P2P GO to a new channel, when required. In order to be able to reconfigure the GO channel, split wpa_supplicant_conf_ap() function, so the frequency configuration part can be reused to find additional CSA settings. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* Add shared periodic cleanup function for AP modeJouni Malinen2015-07-201-0/+2
| | | | | | | | | This new mechanism can be used to combine multiple periodic AP (including P2P GO) task into a single eloop timeout to minimize number of wakeups for the process. hostapd gets its own periodic caller and wpa_supplicant uses the previously added timer to trigger these calls. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* DFS: wpa_supplicant event processingAhmad Kholaif2015-03-051-0/+11
| | | | | | | | Add radar event processing logic for AP/P2P GO. The DFS processing functions from hostapd are now used for these wpa_supplicant cases as well for both offloaded and non-offloaded DFS. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Add STOP_AP control interface commandJouni Malinen2015-02-081-0/+2
| | | | | | | This is mainly for testing purposes to allow beaconing to be stopped without clearing AP state in hostapd. Signed-off-by: Jouni Malinen <j@w1.fi>
* mesh: Enable mesh HT modeJason Mobarak2014-11-161-0/+5
| | | | | | | | | | | | Add a new option "mesh_ht_mode" that specifies the HT mode for the mesh, with this option on, mesh beacons, actions frames, and probe responses with include the appropriate HT information elements. [original implementation by Chun-Yeow Yeoh <yeohchunyeow@gmail.com>] [some fixes by Masashi Honma <masashi.honma@gmail.com>] Signed-off-by: Ashok Nagarajan <ashok.dragon@gmail.com> Signed-off-by: Javier Cardona <javier@cozybit.com> Signed-off-by: Jason Mobarak <x@jason.mobarak.name>
* P2P NFC: Report connection handover as trigger for P2PJouni Malinen2014-01-271-0/+2
| | | | | | | | "NFC_REPORT_HANDOVER {INIT,RESP} P2P <req> <sel>" can now be used to report completed NFC negotiated connection handover in which the P2P alternative carrier was selected. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS NFC: Add support for wpa_supplicant AP/GO mode to use handoverJouni Malinen2014-01-271-0/+4
| | | | | | | | New functionality is needed for this with the update NFC connection handover design that depends on the AP side using the public key hash from the handover request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* nl80211/hostapd: Extend channel switch notify handlingJanusz Dziedzic2013-12-081-1/+1
| | | | | | | Adds support for VHT by parsing bandwidth and center_freq{1,2}. Signed-hostap: Michal Kazior <michal.kazior@tieto.com> Signed-hostap: Janusz Dziedzic <janusz.dziedzic@tieto.com>
* Add chan_switch to ctrl interface of wpa_supplicant and hostapdAndrei Otcheretianski2013-11-171-0/+1
| | | | | | | Add chan_switch to the control interface of wpa_supplicant and hostapd, and also to wpa_cli and hostapd_cli. Signed-hostap: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* Add AP channel switch mechanismAndrei Otcheretianski2013-11-171-0/+2
| | | | | | | | | Build CSA settings and call the driver to perform the switch. Construct Beacon, Probe Response, and (Re)Association Response frames both for CSA period and for the new channel. These frames are built based on the current configuration. Add CSA IE in Beacon and Probe Response frames. Signed-hostap: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* WPS NFC: Fix build without CONFIG_AP=yJouni Malinen2013-09-031-0/+9
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS: Add support for NFC handover select generation with wpa_supplicantJouni Malinen2013-02-151-0/+2
| | | | | | | | When wpa_supplicant is controlling an AP mode interface, it can generate the alternative carrier record for NFC connection handover select message similarly to the way this is done in hostapd. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS: Add support for config token generation with wpa_supplicantJouni Malinen2013-02-151-0/+2
| | | | | | | | When wpa_supplicant is controlling an AP mode interface, it can generate the NFC configuration token similarly to the way this is done in hostapd. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS: Allow PIN timeout to be specified with wpa_supplicant AP/GOJouni Malinen2012-10-101-1/+2
| | | | | | | | Extend the wpa_cli wps_pin command to support specification of the PIN expiration time in seconds similarly to hostapd_cli wps_pin command when using wpa_supplicant for AP mode (including P2P GO). Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* nl80211: Handle CH_SWITCH eventThomas Pedersen2012-06-251-0/+2
| | | | | | | Some drivers may independently decide to switch channels. Handle this by updating the hostapd and wpa_supplicant AP and GO configuration. Signed-hostap: Thomas Pedersen <c_tpeder@qca.qualcomm.com>
* Add wpa_supplicant AP mode STA deauthenticate/disassociate commandsJithu Jance2012-02-251-0/+4
| | | | | | | | Move disassociate and deauthenticate commands to ctrl_iface_ap.c, so that they ares accessible for wpa_supplicant AP mode and wpa_cli (with CONFIG_AP option enabled). Signed-hostap: Jithu Jance <jithu@broadcom.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* AP: Add explicit EAPOL TX status eventJohannes Berg2011-11-191-0/+2
| | | | | | | | The new event can be used when EAPOL TX status can't be reported as a complete 802.11 frame but is instead reported as just the EAPOL data as originally passed to hapd_send_eapol(). Signed-hostap: Johannes Berg <johannes.berg@intel.com>
* AP: Pass only bssid/addr/wds to EVENT_RX_FROM_UNKNOWNJohannes Berg2011-10-201-1/+1
|
* AP: Do station poll in driver wrapperJohannes Berg2011-10-201-0/+1
| | | | | | | | | This offloads the station polling to driver wrappers, which may offload it again to the driver. The hostap driver wrapper uses "real" data frames while nl80211 uses null data frames. Also add a specific event to indicate that a poll was successful for future use with the nl80211 driver.
* P2P: Allow WPS_PBC command on GO to select on P2P Device AddressJouni Malinen2011-02-071-1/+2
| | | | | | | | | | | | | | An optional parameter, p2p_dev_addr, can now be given to WPS_PBC command on P2P GO to indicate that only the P2P device with the specified P2P Device Address is allowed to connect using PBC. If any other device tries to use PBC, a session overlap is indicated and the negotiation is rejected with M2D. The command format for specifying the address is "WPS_PBC p2p_dev_addr=<address>", e.g., WPS_PBC p2p_dev_addr=02:03:04:05:06:07 In addition, show the PBC session overlap indication as a WPS failure event on an AP/GO interface. This particular new case shows up as "WPS-FAIL msg=4 config_error=12".
* WPS: Add wps_ap_pin ctrl_iface command for wpa_supplicant AP modeJouni Malinen2010-11-171-0/+6
| | | | | This can be used to control the AP PIN in wpa_supplicant AP mode in the same way as the identical command in hostapd ctrl_iface.
* WPS: Allow pending WPS operation to be cancelledArdong Chen2010-09-101-0/+1
| | | | | | | A new ctrl_interface command, WPS_CANCEL, can now be used to cancel a pending or ongoing WPS operation. For now, this is only available with wpa_supplicant (either in station or AP mode). Similar functionality should be added for hostapd, too.
* P2P: Add initial version of P2P ModuleJouni Malinen2010-09-091-0/+1
|
* wpa_supplicant AP mode: Add function for enabling MAC address filteringJouni Malinen2010-04-111-0/+2
| | | | This can be used to allow only a specific station to associate.
* Fix CONFIG_AP=y build after driver API changesJouni Malinen2010-01-031-2/+1
|
* Move struct hostapd_frame_info definition away from driver APIJouni Malinen2010-01-031-2/+1
| | | | | This is internal data structure for hostapd/AP functionality and does not need to be defined in driver.h.
* Mark management frame processing functions to use const bufferJouni Malinen2009-12-131-1/+1
|
* Use generic driver events for TX status and RX reportingJouni Malinen2009-12-131-0/+7
| | | | | | | | | | Replace driver wrapper calls to hostapd_tx_status(), hostapd_rx_from_unknown_sta(), hostapd_mgmt_rx(), and hostapd_mgmt_tx_cb() with new generic driver events EVENT_TX_STATUS, EVENT_RX_FROM_UNKNOWN, and EVENT_RX_MGMT. This cleans up lot of the driver wrapper code to be less dependent on whether it is being used within wpa_supplicant AP mode or hostapd.
* Add AP mode WPA status into ctrl_ifaceJouni Malinen2009-10-161-0/+2
|
* Add station table query to wpa_supplicant AP ctrl_ifaceJouni Malinen2009-09-081-0/+6
| | | | | | "wpa_cli all_sta" and "wpa_cli sta <addr>" can now be used to fetch information about stations associated with the wpa_supplicant-controlled AP.
* wpa_supplicant AP: Add preliminary support for WPS Internal RegistrarJouni Malinen2009-04-211-0/+3
| | | | | | | When in AP mode, wpa_supplicant is now enabling WPS (only Internal Registrar). wpa_cli wps_pbc and wps_pin commands can be used to initiate WPS negotiation similarly to how this is done in station mode (though, the BSSID parameter is ignored).
* wpa_supplicant AP: Add EAPOL frame TX and RXJouni Malinen2009-04-201-0/+2
| | | | This allows WPA-Personal 4-way handshake to be completed successfully.
* Add preliminary hostapd data structure initialization for AP modeJouni Malinen2009-03-261-2/+3
| | | | | | | | wpa_supplicant can now initialize hostapd data structures when mode=2 is used to set up an AP. The hostapd configuration is not yet set based on wpa_supplicant network configuration block. In addition, the glue code for hostapd driver_ops needs number of functions that will be needed for AP functionality.
* Move wpa_supplicant_create_ap() into ap.cJouni Malinen2009-03-261-0/+22