mirror of
				https://github.com/Telecominfraproject/wlan-ap.git
				synced 2025-10-30 18:07:52 +00:00 
			
		
		
		
	Compare commits
	
		
			91 Commits
		
	
	
		
			v1.0.0
			...
			release/v1
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|   | 11ec1256c5 | ||
|   | dc8b77ce5f | ||
|   | 87ac2d554d | ||
|   | b122f99bc1 | ||
|   | ef68964976 | ||
|   | d166cf1e31 | ||
|   | 9a7295d396 | ||
|   | 29768c526d | ||
|   | 192546ee01 | ||
|   | b78645a965 | ||
|   | 94fd1a1821 | ||
|   | c3d02f8719 | ||
|   | cc9936baef | ||
|   | 2e018a628c | ||
|   | b3b1b1307e | ||
|   | feac133dab | ||
|   | 1bc19d3e99 | ||
|   | bb459312b0 | ||
|   | af89773c40 | ||
|   | 3a5531b569 | ||
|   | 1f85d25c83 | ||
|   | ad9df817de | ||
|   | d0387fe60c | ||
|   | fc2cba962e | ||
|   | 2a202eb697 | ||
|   | 327c048b30 | ||
|   | 91b2ec5013 | ||
|   | ce703e1b2e | ||
|   | 725f213e65 | ||
|   | 320896474b | ||
|   | 8b07342d9d | ||
|   | 1c5a8940e4 | ||
|   | ec8170bb11 | ||
|   | 804c83e70e | ||
|   | e412557080 | ||
|   | 12ed24eaf8 | ||
|   | c3e14356ab | ||
|   | 53ad416396 | ||
|   | ebaa9b25ce | ||
|   | aea505ddf9 | ||
|   | 94bcfaf93f | ||
|   | ed9379af7b | ||
|   | 25e7374680 | ||
|   | 167d2828b0 | ||
|   | e71df5ebe4 | ||
|   | d7b413bd0e | ||
|   | a1ff0f90f6 | ||
|   | a71436d27c | ||
|   | 915041e40f | ||
|   | 5a5bdac405 | ||
|   | 82e7af0c77 | ||
|   | d3695266fc | ||
|   | d40e1f9d13 | ||
|   | acc7a24464 | ||
|   | 327b85b44a | ||
|   | 811f5e60aa | ||
|   | 93baf6d334 | ||
|   | 63f602a136 | ||
|   | 49383f1c01 | ||
|   | 7ac036af0a | ||
|   | 666e740e0b | ||
|   | 58572f81ae | ||
|   | 0c621a4da1 | ||
|   | b0a660ba31 | ||
|   | 5613bbb6f3 | ||
|   | 7ec23942a0 | ||
|   | 655d284a8f | ||
|   | 593f654d3c | ||
|   | 6021a14426 | ||
|   | 482cfee8d5 | ||
|   | 3fc41fac2c | ||
|   | 8b5e2058f3 | ||
|   | 5815e883a0 | ||
|   | cc8e30e1d4 | ||
|   | e5bc8c9550 | ||
|   | a91e00337c | ||
|   | b4e20e6289 | ||
|   | dd86dfceb0 | ||
|   | 42a87e7fa4 | ||
|   | 315e953110 | ||
|   | fa5c8b06ef | ||
|   | 5d8ce34973 | ||
|   | b717b1361d | ||
|   | 45dcf6a878 | ||
|   | 0fb8809a28 | ||
|   | 077009a263 | ||
|   | 5feaee3327 | ||
|   | 077e1cda3c | ||
|   | 9cb289b605 | ||
|   | bc9f8ba1a7 | ||
|   | 97632b83d6 | 
							
								
								
									
										626
									
								
								feeds/ipq807x/qca-nss-clients/Makefile
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										626
									
								
								feeds/ipq807x/qca-nss-clients/Makefile
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,626 @@ | ||||
| include $(TOPDIR)/rules.mk | ||||
| include $(INCLUDE_DIR)/kernel.mk | ||||
|  | ||||
| PKG_NAME:=qca-nss-clients | ||||
| PKG_SOURCE_PROTO:=git | ||||
| PKG_BRANCH:=master | ||||
| PKG_RELEASE:=2 | ||||
| PKG_SOURCE_URL:=https://source.codeaurora.org/quic/qsdk/oss/lklm/nss-clients/ | ||||
| PKG_VERSION:=9136ef60bf68ceed760781d3acbeddb05470e432 | ||||
|  | ||||
| PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz | ||||
| PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION) | ||||
| PKG_SOURCE_VERSION:=$(PKG_VERSION) | ||||
|  | ||||
| #PKG_BUILD_DEPENDS := PACKAGE_kmod-qca-nss-crypto:kmod-qca-nss-crypto | ||||
| MAKE_OPTS:= | ||||
|  | ||||
| include $(INCLUDE_DIR)/package.mk | ||||
|  | ||||
| # Keep default as ipq806x for branches that does not have subtarget framework | ||||
| ifeq ($(CONFIG_TARGET_ipq),y) | ||||
| subtarget:=$(SUBTARGET) | ||||
| else | ||||
| subtarget:=$(CONFIG_TARGET_BOARD) | ||||
| endif | ||||
|  | ||||
| ifneq (, $(findstring $(subtarget), "ipq807x" "ipq807x_ipq807x" "ipq60xx" "ipq807x_ipq60xx")) | ||||
| # DTLS Manager v2.0 for Hawkeye/Cypress | ||||
|   DTLSMGR_DIR:=v2.0 | ||||
| # IPsec Manager v2.0 for Hawkeye/Cypress | ||||
|   IPSECMGR_DIR:=v2.0 | ||||
| else | ||||
| # DTLS Manager v1.0 for Akronite. | ||||
|   DTLSMGR_DIR:=v1.0 | ||||
| # IPsec Manager v1.0 for Akronite. | ||||
|   IPSECMGR_DIR:=v1.0 | ||||
| endif | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tun6rd | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - tun6rd | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-sit @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/qca-nss-tun6rd.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,60,qca-nss-tun6rd) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tun6rd/Description | ||||
| Kernel modules for NSS connection manager - Support for 6rd tunnel | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-dtlsmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - dtlsmgr | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-cfi-cryptoapi @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/dtls/$(DTLSMGR_DIR)/qca-nss-dtlsmgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-dtls/Description | ||||
| Kernel modules for NSS connection manager - Support for DTLS sessions | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tlsmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - tlsmgr | ||||
|   DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx +kmod-qca-nss-drv +kmod-qca-nss-cfi @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/tls/qca-nss-tlsmgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tls/Description | ||||
| Kernel modules for NSS connection manager - Support for TLS sessions | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-l2tpv2 | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - l2tp | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-ppp +kmod-l2tp @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/l2tp/l2tpv2/qca-nss-l2tpv2.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-l2tpv2) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-l2tp/Description | ||||
| Kernel modules for NSS connection manager - Support for l2tp tunnel | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pptp | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - PPTP | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-pptp @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/pptp/qca-nss-pptp.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-pptp) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pptp/Description | ||||
| Kernel modules for NSS connection manager - Support for PPTP tunnel | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pppoe | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - PPPoE | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-pppoe @!LINUX_3_18 \ | ||||
| 		+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding | ||||
|   FILES:=$(PKG_BUILD_DIR)/pppoe/qca-nss-pppoe.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-pppoe) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pppoe/Description | ||||
| Kernel modules for NSS connection manager - Support for PPPoE | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-map-t | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - MAP-T | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-nat46 @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/map/map-t/qca-nss-map-t.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-map-t) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-map-t/Description | ||||
| Kernel modules for NSS connection manager - Support for MAP-T | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-gre | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - GRE | ||||
|   DEPENDS:=@TARGET_ipq_ipq806x||TARGET_ipq806x||TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \ | ||||
| 	   +kmod-qca-nss-drv @!LINUX_3_18 +kmod-gre6 | ||||
|   FILES:=$(PKG_BUILD_DIR)/gre/qca-nss-gre.ko $(PKG_BUILD_DIR)/gre/test/qca-nss-gre-test.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-gre) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-gre/Description | ||||
| Kernel modules for NSS connection manager - Support for GRE | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tunipip6 | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (connection manager) - DS-lite and ipip6 Tunnel | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-iptunnel6 +kmod-ip6-tunnel @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/tunipip6/qca-nss-tunipip6.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,60,qca-nss-tunipip6) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-tunipip6/Description | ||||
| Kernel modules for NSS connection manager | ||||
| Add support for DS-lite and ipip6 tunnel | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-profile | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 | ||||
|   TITLE:=Profiler for QCA NSS driver (IPQ806x) | ||||
|   FILES:=$(PKG_BUILD_DIR)/profiler/qca-nss-profile-drv.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-profile/Description | ||||
| This package contains a NSS driver profiler for QCA chipset | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ipsecmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (ipsec manager) - ipsecmgr | ||||
|   DEPENDS:=@TARGET_ipq806x||TARGET_ipq_ipq806x||TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \ | ||||
| 		+kmod-qca-nss-drv +kmod-qca-nss-cfi-cryptoapi +kmod-qca-nss-cfi-ocf @!LINUX_3_18 | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2),) | ||||
|   DEPENDS:=+kmod-qca-nss-drv-l2tpv2 | ||||
| endif | ||||
|   FILES:=$(PKG_BUILD_DIR)/ipsecmgr/$(IPSECMGR_DIR)/qca-nss-ipsecmgr.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,60,qca-nss-ipsecmgr) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ipsecmgr/Description | ||||
| Kernel module for NSS IPsec offload manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ipsecmgr-klips | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS (ipsec klips) | ||||
|   DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \ | ||||
| 		+kmod-qca-nss-drv-ipsecmgr kmod-qca-nss-ecm | ||||
|   FILES:=$(PKG_BUILD_DIR)/ipsecmgr/$(IPSECMGR_DIR)/plugins/klips/qca-nss-ipsec-klips.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ipsecmgr-klips/Description | ||||
| NSS Kernel module for IPsec klips offload | ||||
| endef | ||||
|  | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-capwapmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-dtlsmgr @!LINUX_3_18 | ||||
|   TITLE:=NSS CAPWAP Manager for QCA NSS driver (IPQ806x) | ||||
|   FILES:=$(PKG_BUILD_DIR)/capwapmgr/qca-nss-capwapmgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-capwapmgr/Description | ||||
| This package contains a NSS CAPWAP Manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-bridge-mgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS bridge manager | ||||
|   DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \ | ||||
| 		+TARGET_ipq_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 		+TARGET_ipq_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 		+TARGET_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 		+TARGET_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 		+TARGET_ipq_ipq60xx:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 		+TARGET_ipq807x_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \ | ||||
| 		+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding | ||||
|   FILES:=$(PKG_BUILD_DIR)/bridge/qca-nss-bridge-mgr.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-bridge-mgr) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-bridge-mgr/Description | ||||
| Kernel modules for NSS bridge manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-vlan-mgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS vlan manager | ||||
|   DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx +kmod-qca-nss-drv @!LINUX_3_18 \ | ||||
| 		+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding | ||||
|   FILES:=$(PKG_BUILD_DIR)/vlan/qca-nss-vlan.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-vlan) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-vlan-mgr/Description | ||||
| Kernel modules for NSS vlan manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-qdisc | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Support | ||||
|   TITLE:=Qdisc for configuring shapers in NSS | ||||
|   DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/nss_qdisc/qca-nss-qdisc.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,58,qca-nss-qdisc) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-qdisc/Description | ||||
| Linux qdisc that aids in configuring shapers in the NSS | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-igs | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Support | ||||
|   TITLE:=Action for offloading traffic to an IFB interface to perform ingress shaping. | ||||
|   DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \ | ||||
| 	+kmod-qca-nss-drv +kmod-sched-core +kmod-ifb +kmod-qca-nss-drv-qdisc @!LINUX_3_18 | ||||
|   FILES:=$(PKG_BUILD_DIR)/nss_qdisc/igs/act_nssmirred.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-igs/Description | ||||
| Linux action that helps in offloading traffic to an IFB interface to perform ingress shaping. | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-lag-mgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS LAG manager | ||||
|   DEPENDS:=+kmod-qca-nss-drv  @!LINUX_3_18 \ | ||||
| 	   +TARGET_ipq_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 	   +TARGET_ipq_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \ | ||||
| 	   +TARGET_ipq807x:kmod-qca-nss-drv-vlan-mgr \ | ||||
| 	   +TARGET_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \ | ||||
| 	   +TARGET_ipq_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \ | ||||
| 	   +TARGET_ipq807x_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \ | ||||
| 	   +kmod-bonding | ||||
|   FILES:=$(PKG_BUILD_DIR)/lag/qca-nss-lag-mgr.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-lag-mgr) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-lag-mgr/Description | ||||
| Kernel modules for NSS LAG manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-netlink | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=@TARGET_ipq807x||TARGET_ipq_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \ | ||||
| 		+kmod-qca-nss-drv @!LINUX_3_18 \ | ||||
| 		+PACKAGE_kmod-qca-nss-drv-ipsecmgr:kmod-qca-nss-drv-ipsecmgr \ | ||||
| 		+PACKAGE_kmod-qca-nss-drv-dtlsmgr:kmod-qca-nss-drv-dtlsmgr \ | ||||
| 		+PACKAGE_kmod-qca-nss-drv-capwapmgr:kmod-qca-nss-drv-capwapmgr @!LINUX_3_18 | ||||
|   TITLE:=NSS NETLINK Manager for QCA NSS driver | ||||
|   FILES:=$(PKG_BUILD_DIR)/netlink/qca-nss-netlink.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-netlink/Description | ||||
| Kernel module for NSS netlink manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ovpn-mgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for NSS OpenVPN manager | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-cfi +kmod-tun +kmod-ipt-conntrack @!LINUX_3_18 \ | ||||
| 	  @TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx | ||||
|   FILES:=$(PKG_BUILD_DIR)/openvpn/src/qca-nss-ovpn-mgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ovpn-mgr/Description | ||||
| Kernel module for NSS OpenVPN manager | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ovpn-link | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   TITLE:=Kernel driver for interfacing NSS OpenVPN manager with ECM | ||||
|   DEPENDS:=+kmod-qca-nss-drv-ovpn-mgr +kmod-qca-nss-ecm-premium @!LINUX_3_18 \ | ||||
| 	  @TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx | ||||
|   FILES:=$(PKG_BUILD_DIR)/openvpn/plugins/qca-nss-ovpn-link.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ovpn-link/Description | ||||
| This module registers with ECM and communicates with NSS OpenVPN manager for supporting OpenVPN offload. | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pvxlanmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 | ||||
|   TITLE:=NSS PVXLAN Manager for QCA NSS driver | ||||
|   FILES:=$(PKG_BUILD_DIR)/pvxlanmgr/qca-nss-pvxlanmgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-pvxlanmgr/Description | ||||
| Kernel module for managing NSS PVxLAN | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-eogremgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-gre @!LINUX_3_18 | ||||
|   TITLE:=NSS EOGRE Manager for QCA NSS driver | ||||
|   FILES:=$(PKG_BUILD_DIR)/eogremgr/qca-nss-eogremgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-eogremgr/Description | ||||
| Kernel module for managing NSS EoGRE | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-clmapmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-eogremgr @!LINUX_3_18 | ||||
|   TITLE:=NSS clmap Manager for QCA NSS driver | ||||
|   FILES:=$(PKG_BUILD_DIR)/clmapmgr/qca-nss-clmapmgr.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-clmapmgr/Description | ||||
| Kernel module for managing NSS clmap | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-vxlanmgr | ||||
|   SECTION:=kernel | ||||
|   CATEGORY:=Kernel modules | ||||
|   SUBMENU:=Network Devices | ||||
|   DEPENDS:=+kmod-qca-nss-drv +kmod-vxlan @!LINUX_3_18 | ||||
|   TITLE:=NSS VxLAN Manager for QCA NSS driver | ||||
|   FILES:=$(PKG_BUILD_DIR)/vxlanmgr/qca-nss-vxlanmgr.ko | ||||
|   AUTOLOAD:=$(call AutoLoad,51,qca-nss-vxlanmgr) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-vxlanmgr/Description | ||||
| Kernel module for managing NSS VxLAN | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-match | ||||
|  SECTION:=kernel | ||||
|  CATEGORY:=Kernel modules | ||||
|  SUBMENU:=Network Devices | ||||
|  DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 | ||||
|  TITLE:=NSS Match for QCA NSS driver | ||||
|  FILES:=$(PKG_BUILD_DIR)/match/qca-nss-match.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-match/Description | ||||
| Kernel module for managing NSS Match | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-mirror | ||||
|  SECTION:=kernel | ||||
|  CATEGORY:=Kernel modules | ||||
|  SUBMENU:=Network Support | ||||
|  TITLE:=Module for mirroring packets from NSS to host. | ||||
|  DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 | ||||
|  FILES:=$(PKG_BUILD_DIR)/mirror/qca-nss-mirror.ko | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-mirror/Description | ||||
| Kernel module for managing NSS Mirror | ||||
| endef | ||||
|  | ||||
| define Build/InstallDev/qca-nss-clients | ||||
| 	$(INSTALL_DIR) $(1)/usr/include/qca-nss-clients | ||||
| 	$(CP) $(PKG_BUILD_DIR)/netlink/include/* $(1)/usr/include/qca-nss-clients/ | ||||
| 	$(CP) $(PKG_BUILD_DIR)/exports/* $(1)/usr/include/qca-nss-clients/ | ||||
| endef | ||||
|  | ||||
| define Build/InstallDev | ||||
| 	$(call Build/InstallDev/qca-nss-clients,$(1)) | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ovpn-mgr/install | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/qca-nss-ovpn.init $(1)/etc/init.d/qca-nss-ovpn | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-ipsecmgr-klips/install | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/qca-nss-ipsec $(1)/etc/init.d/qca-nss-ipsec | ||||
| endef | ||||
|  | ||||
| define KernelPackage/qca-nss-drv-igs/install | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/qca-nss-mirred.init $(1)/etc/init.d/qca-nss-mirred | ||||
| endef | ||||
|  | ||||
| EXTRA_CFLAGS+= \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-nss-drv \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-nss-crypto \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-nss-cfi \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-nss-gmac \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-ssdk \ | ||||
| 	-I$(STAGING_DIR)/usr/include/qca-ssdk/fal \ | ||||
| 	-I$(STAGING_DIR)/usr/include/nat46 | ||||
|  | ||||
| # Build individual packages if selected | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-profile),) | ||||
| MAKE_OPTS+=profile=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-capwapmgr),) | ||||
| MAKE_OPTS+=capwapmgr=y | ||||
| EXTRA_CFLAGS += -DNSS_CAPWAPMGR_ONE_NETDEV | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tun6rd),) | ||||
| MAKE_OPTS+=tun6rd=m | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-dtlsmgr),) | ||||
| MAKE_OPTS+=dtlsmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tlsmgr),) | ||||
| MAKE_OPTS+=tlsmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2),) | ||||
| MAKE_OPTS+=l2tpv2=y | ||||
| EXTRA_CFLAGS += -DNSS_L2TPV2_ENABLED | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pptp),) | ||||
| MAKE_OPTS+=pptp=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-map-t),) | ||||
| MAKE_OPTS+=map-t=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tunipip6),) | ||||
| MAKE_OPTS+=tunipip6=m | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-qdisc),) | ||||
| MAKE_OPTS+=qdisc=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-igs),) | ||||
| MAKE_OPTS+=igs=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ipsecmgr),) | ||||
| EXTRA_CFLAGS+= -I$(PKG_BUILD_DIR)/exports | ||||
| MAKE_OPTS+=ipsecmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ipsecmgr-klips),) | ||||
| EXTRA_CFLAGS+= -I$(STAGING_DIR)/usr/include/qca-nss-ecm | ||||
| MAKE_OPTS+=ipsecmgr-klips=m | ||||
| endif | ||||
|  | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-bridge-mgr),) | ||||
| MAKE_OPTS+=bridge-mgr=y | ||||
| #enable OVS bridge if ovsmgr is enabled | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-ovsmgr),) | ||||
| MAKE_OPTS+= NSS_BRIDGE_MGR_OVS_ENABLE=y | ||||
| EXTRA_CFLAGS+= -I$(STAGING_DIR)/usr/include/qca-ovsmgr | ||||
| endif | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-vlan-mgr),) | ||||
| MAKE_OPTS+=vlan-mgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-lag-mgr),) | ||||
| MAKE_OPTS+=lag-mgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-gre),) | ||||
| EXTRA_CFLAGS+= -I$(PKG_BUILD_DIR)/exports | ||||
| MAKE_OPTS+=gre=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pppoe),) | ||||
| MAKE_OPTS+=pppoe=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-netlink),) | ||||
| MAKE_OPTS+=netlink=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ovpn-mgr),) | ||||
| MAKE_OPTS+=ovpn-mgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ovpn-link),) | ||||
| MAKE_OPTS+=ovpn-link=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pvxlanmgr),) | ||||
| MAKE_OPTS+=pvxlanmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-eogremgr),) | ||||
| MAKE_OPTS+=eogremgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-clmapmgr),) | ||||
| MAKE_OPTS+=clmapmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-vxlanmgr),) | ||||
| MAKE_OPTS+=vxlanmgr=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-match),) | ||||
| MAKE_OPTS+=match=y | ||||
| endif | ||||
|  | ||||
| ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-mirror),) | ||||
| MAKE_OPTS+=mirror=y | ||||
| endif | ||||
|  | ||||
| define Build/Compile | ||||
| 	$(MAKE) -C "$(LINUX_DIR)" $(strip $(MAKE_OPTS)) \ | ||||
| 		CROSS_COMPILE="$(TARGET_CROSS)" \ | ||||
| 		ARCH="$(LINUX_KARCH)" \ | ||||
| 		M="$(PKG_BUILD_DIR)" \ | ||||
| 		EXTRA_CFLAGS="$(EXTRA_CFLAGS)" \ | ||||
| 		SoC="$(subtarget)" \ | ||||
| 		DTLSMGR_DIR="$(DTLSMGR_DIR)" \ | ||||
| 		IPSECMGR_DIR="$(IPSECMGR_DIR)" \ | ||||
| 		modules | ||||
| endef | ||||
|  | ||||
| $(eval $(call KernelPackage,qca-nss-drv-profile)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-capwapmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-tun6rd)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-dtlsmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-l2tpv2)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-pptp)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-pppoe)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-map-t)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-tunipip6)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-qdisc)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-igs)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-netlink)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-ipsecmgr)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-ipsecmgr-klips)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-bridge-mgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-vlan-mgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-lag-mgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-gre)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-ovpn-mgr)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-ovpn-link)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-pvxlanmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-eogremgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-clmapmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-vxlanmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-match)) | ||||
| #$(eval $(call KernelPackage,qca-nss-drv-tlsmgr)) | ||||
| $(eval $(call KernelPackage,qca-nss-drv-mirror)) | ||||
							
								
								
									
										92
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-ipsec
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										92
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-ipsec
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,92 @@ | ||||
| #!/bin/sh  /etc/rc.common | ||||
| # | ||||
| # Copyright (c) 2018-2019 The Linux Foundation. All rights reserved. | ||||
| # | ||||
| # Permission to use, copy, modify, and/or distribute this software for any | ||||
| # purpose with or without fee is hereby granted, provided that the above | ||||
| # copyright notice and this permission notice appear in all copies. | ||||
| # | ||||
| # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||||
| # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||||
| # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||||
| # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||||
| # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||||
| # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||||
| # OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||||
|  | ||||
| NSS_IPSEC_LOG_FILE=/tmp/.nss_ipsec_log | ||||
| NSS_IPSEC_LOG_STR_ECM="ECM_Loaded" | ||||
|  | ||||
| ecm_load () { | ||||
| 	if [ ! -d /sys/module/ecm ]; then | ||||
| 		/etc/init.d/qca-nss-ecm start | ||||
| 		if [ -d /sys/module/ecm ]; then | ||||
| 			echo ${NSS_IPSEC_LOG_STR_ECM} >> ${NSS_IPSEC_LOG_FILE} | ||||
| 		fi | ||||
| 	fi | ||||
| } | ||||
|  | ||||
| ecm_unload () { | ||||
| 	if [ -f /tmp/.nss_ipsec_log ]; then | ||||
| 		str=`grep ${NSS_IPSEC_LOG_STR_ECM} ${NSS_IPSEC_LOG_FILE}` | ||||
| 		if [[ $str == ${NSS_IPSEC_LOG_STR_ECM} ]]; then | ||||
| 			/etc/init.d/qca-nss-ecm stop | ||||
| 			`sed 's/${NSS_IPSEC_LOG_STR_ECM}/ /g' $NSS_IPSEC_LOG_FILE >  $NSS_IPSEC_LOG_FILE` | ||||
| 		fi | ||||
| 	fi | ||||
| } | ||||
|  | ||||
| ecm_disable() { | ||||
|  | ||||
| 	if [ ! -d /sys/module/ecm ]; then | ||||
| 		return; | ||||
| 	fi | ||||
|  | ||||
| 	echo 1 > /sys/kernel/debug/ecm/front_end_ipv4_stop | ||||
| 	echo 1 > /sys/kernel/debug/ecm/front_end_ipv6_stop | ||||
| 	echo 1 > /sys/kernel/debug/ecm/ecm_db/defunct_all | ||||
| 	sleep 2 | ||||
| } | ||||
|  | ||||
| ecm_enable() { | ||||
| 	if [ ! -d /sys/module/ecm ]; then | ||||
| 		return; | ||||
| 	fi | ||||
|  | ||||
| 	echo 0 > /sys/kernel/debug/ecm/ecm_db/defunct_all | ||||
| 	echo 0 > /sys/kernel/debug/ecm/front_end_ipv4_stop | ||||
| 	echo 0 > /sys/kernel/debug/ecm/front_end_ipv6_stop | ||||
| } | ||||
|  | ||||
| start() { | ||||
| 	ecm_load | ||||
|  | ||||
| 	local kernel_version=$(uname -r) | ||||
|  | ||||
| 	insmod /lib/modules/${kernel_version}/qca-nss-ipsec-klips.ko | ||||
| 	if [ "$?" -gt 0 ]; then | ||||
| 		echo "Failed to load plugin. Please start ecm if not done already" | ||||
| 		ecm_enable | ||||
| 		return | ||||
| 	fi | ||||
|  | ||||
| 	/etc/init.d/ipsec start | ||||
| 	sleep 2 | ||||
| 	ipsec eroute | ||||
|  | ||||
| 	ecm_enable | ||||
| } | ||||
|  | ||||
| stop() { | ||||
| 	ecm_disable | ||||
|  | ||||
| 	/etc/init.d/ipsec stop | ||||
| 	rmmod qca-nss-ipsec-klips | ||||
|  | ||||
| 	ecm_unload | ||||
| } | ||||
|  | ||||
| restart() { | ||||
| 	stop | ||||
| 	start | ||||
| } | ||||
							
								
								
									
										28
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-mirred.init
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-mirred.init
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,28 @@ | ||||
| #!/bin/sh /etc/rc.common | ||||
|  | ||||
| ########################################################################### | ||||
| # Copyright (c) 2019, The Linux Foundation. All rights reserved. | ||||
| # Permission to use, copy, modify, and/or distribute this software for | ||||
| # any purpose with or without fee is hereby granted, provided that the | ||||
| # above copyright notice and this permission notice appear in all copies. | ||||
| # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||||
| # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||||
| # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||||
| # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||||
| # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||||
| # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT | ||||
| # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||||
| ########################################################################### | ||||
|  | ||||
| restart() { | ||||
| 	rmmod act_nssmirred.ko | ||||
| 	insmod act_nssmirred.ko | ||||
| } | ||||
|  | ||||
| start() { | ||||
| 	insmod act_nssmirred.ko | ||||
| } | ||||
|  | ||||
| stop() { | ||||
| 	rmmod act_nssmirred.ko | ||||
| } | ||||
							
								
								
									
										69
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-ovpn.init
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										69
									
								
								feeds/ipq807x/qca-nss-clients/files/qca-nss-ovpn.init
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,69 @@ | ||||
| #!/bin/sh /etc/rc.common | ||||
|  | ||||
| ########################################################################### | ||||
| # Copyright (c) 2019, The Linux Foundation. All rights reserved. | ||||
| # Permission to use, copy, modify, and/or distribute this software for | ||||
| # any purpose with or without fee is hereby granted, provided that the | ||||
| # above copyright notice and this permission notice appear in all copies. | ||||
| # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||||
| # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||||
| # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||||
| # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||||
| # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||||
| # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT | ||||
| # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||||
| ########################################################################### | ||||
|  | ||||
| ecm_disable() { | ||||
| 	if [ ! -d /sys/module/ecm ]; then | ||||
| 	   return | ||||
| 	fi | ||||
|  | ||||
| 	echo 1 > /sys/kernel/debug/ecm/front_end_ipv4_stop | ||||
| 	echo 1 > /sys/kernel/debug/ecm/front_end_ipv6_stop | ||||
| 	echo 1 > /sys/kernel/debug/ecm/ecm_db/defunct_all | ||||
| 	sleep 2 | ||||
| } | ||||
|  | ||||
| ecm_enable() { | ||||
| 	if [ ! -d /sys/module/ecm ]; then | ||||
| 	   return | ||||
| 	fi | ||||
|  | ||||
| 	echo 0 > /sys/kernel/debug/ecm/ecm_db/defunct_all | ||||
| 	echo 0 > /sys/kernel/debug/ecm/front_end_ipv4_stop | ||||
| 	echo 0 > /sys/kernel/debug/ecm/front_end_ipv6_stop | ||||
| } | ||||
|  | ||||
| restart() { | ||||
| 	ecm_disable | ||||
|  | ||||
| 	/etc/init.d/openvpn stop | ||||
| 	rmmod qca-nss-ovpn-link | ||||
| 	rmmod qca-nss-ovpn-mgr | ||||
|  | ||||
| 	insmod qca-nss-ovpn-mgr | ||||
| 	insmod qca-nss-ovpn-link | ||||
|  | ||||
| 	if [ "$?" -gt 0 ]; then | ||||
| 		echo "Failed to load plugin. Please start ecm if not done already" | ||||
| 		ecm_enable | ||||
| 		return | ||||
| 	fi | ||||
|  | ||||
| 	ecm_enable | ||||
| } | ||||
|  | ||||
| start() { | ||||
| 	restart | ||||
| } | ||||
|  | ||||
| stop() { | ||||
| 	ecm_disable | ||||
|  | ||||
| 	/etc/init.d/openvpn stop | ||||
| 	rmmod qca-nss-ovpn-link | ||||
| 	rmmod qca-nss-ovpn-mgr | ||||
|  | ||||
| 	ecm_enable | ||||
| } | ||||
| @@ -47,8 +47,18 @@ hostapd_append_wpa_key_mgmt() { | ||||
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type_l}-SHA256" | ||||
| 			[ "${ieee80211ai:-0}" -gt 0 ] && append wpa_key_mgmt "FILS-SHA256" | ||||
| 		;; | ||||
| 		eap-only) | ||||
| 			append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap-transition) | ||||
| 			append wpa_key_mgmt "WPA-EAP" | ||||
| 			append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap192) | ||||
| 			append wpa_key_mgmt "WPA-EAP-SUITE-B-192" | ||||
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap-eap192) | ||||
| @@ -204,6 +214,9 @@ hostapd_common_add_bss_config() { | ||||
| 	config_add_int maxassoc max_inactivity | ||||
| 	config_add_boolean disassoc_low_ack isolate short_preamble | ||||
|  | ||||
| config_add_int signal_connect signal_stay signal_poll_time \ | ||||
| 		signal_drop_reason signal_strikes | ||||
|  | ||||
| 	config_add_int \ | ||||
| 		wep_rekey eap_reauth_period \ | ||||
| 		wpa_group_rekey wpa_pair_rekey wpa_master_rekey | ||||
| @@ -311,14 +324,15 @@ hostapd_common_add_bss_config() { | ||||
| 	config_add_string osu_ssid hs20_wan_metrics hs20_operating_class hs20_t_c_filename hs20_t_c_timestamp | ||||
|  | ||||
| 	config_add_boolean interworking internet | ||||
| 	config_add_int access_network_type asra esr uesa venue_group venue_type ipaddr_type_availability \ | ||||
| 	config_add_int access_network_type asra esr uesa venue_group venue_type  \ | ||||
| 		gas_address3 | ||||
| 	config_add_string hessid network_auth_type \ | ||||
| 	config_add_string hessid network_auth_type ipaddr_type_availability \ | ||||
| 		anqp_3gpp_cell_net anqp_elem domain_name qos_map_set hs20_t_c_server_url | ||||
|  | ||||
| 	config_add_array airtime_sta_weight | ||||
| 	config_add_int airtime_bss_weight airtime_bss_limit | ||||
| 	config_add_int rts_threshold | ||||
| 	config_add_boolean multicast_to_unicast proxy_arp | ||||
| } | ||||
|  | ||||
| hostapd_set_vlan_file() { | ||||
| @@ -474,6 +488,7 @@ hostapd_set_bss_options() { | ||||
| 	local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt | ||||
|  | ||||
| 	json_get_vars \ | ||||
| 	signal_connect signal_stay signal_poll_time signal_drop_reason signal_strikes \ | ||||
| 		wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_strict_rekey \ | ||||
| 		wpa_disable_eapol_key_retries tdls_prohibit \ | ||||
| 		maxassoc max_inactivity disassoc_low_ack isolate auth_cache \ | ||||
| @@ -485,7 +500,8 @@ hostapd_set_bss_options() { | ||||
| 		bss_load_update_period chan_util_avg_period sae_require_mfp \ | ||||
| 		multi_ap multi_ap_backhaul_ssid multi_ap_backhaul_key \ | ||||
| 		airtime_bss_weight airtime_bss_limit airtime_sta_weight \ | ||||
| 		rssi_reject_assoc_rssi rssi_ignore_probe_request rts_threshold  | ||||
| 		rssi_reject_assoc_rssi rssi_ignore_probe_request rts_threshold \ | ||||
| 		proxy_arp multicast_to_unicast | ||||
|  | ||||
| 	set_default isolate 0 | ||||
| 	set_default maxassoc 0 | ||||
| @@ -508,6 +524,14 @@ hostapd_set_bss_options() { | ||||
| 	set_default rssi_reject_assoc_rssi 0 | ||||
| 	set_default rssi_ignore_probe_request 0 | ||||
| 	set_default rts_threshold -1 | ||||
| 	set_default signal_connect -128 | ||||
| 	set_default signal_stay -128 | ||||
| 	set_default signal_poll_time 5 | ||||
| 	set_default signal_drop_reason 3 | ||||
| 	set_default signal_strikes 3 | ||||
| 	set_default proxy_arp 0 | ||||
| 	set_default multicast_to_unicast 0 | ||||
|  | ||||
|  | ||||
| 	append bss_conf "ctrl_interface=/var/run/hostapd" | ||||
| 	if [ "$isolate" -gt 0 ]; then | ||||
| @@ -536,6 +560,14 @@ hostapd_set_bss_options() { | ||||
| 	append bss_conf "rssi_reject_assoc_rssi=$rssi_reject_assoc_rssi" "$N" | ||||
| 	append bss_conf "rssi_ignore_probe_request=$rssi_ignore_probe_request" "$N" | ||||
| 	append bss_conf "rts_threshold=$rts_threshold" "$N" | ||||
| 	append bss_conf "signal_connect=$signal_connect" "$N" | ||||
| 	append bss_conf "signal_stay=$signal_stay" "$N" | ||||
| 	append bss_conf "signal_poll_time=$signal_poll_time" "$N" | ||||
| 	append bss_conf "signal_strikes=$signal_strikes" "$N" | ||||
| 	append bss_conf "signal_drop_reason=$signal_drop_reason" "$N" | ||||
|  | ||||
| 	[ -n "$proxy_arp" ] && append bss_conf "proxy_arp=$proxy_arp" "$N" | ||||
| 	[ -n "$multicast_to_unicast" ] && append bss_conf "multicast_to_unicast=$multicast_to_unicast" "$N" | ||||
|  | ||||
| 	[ "$tdls_prohibit" -gt 0 ] && append bss_conf "tdls_prohibit=$tdls_prohibit" "$N" | ||||
|  | ||||
| @@ -557,11 +589,11 @@ hostapd_set_bss_options() { | ||||
| 	} | ||||
|  | ||||
| 	case "$auth_type" in | ||||
| 		sae|owe|eap192|eap-eap192) | ||||
| 		sae|owe|eap192|eap-eap192|eap-only) | ||||
| 			set_default ieee80211w 2 | ||||
| 			set_default sae_require_mfp 1 | ||||
| 		;; | ||||
| 		psk-sae) | ||||
| 		psk-sae|eap-transition) | ||||
| 			set_default ieee80211w 1 | ||||
| 			set_default sae_require_mfp 1 | ||||
| 		;; | ||||
| @@ -603,7 +635,7 @@ hostapd_set_bss_options() { | ||||
| 			vlan_possible=1 | ||||
| 			wps_possible=1 | ||||
| 		;; | ||||
| 		eap|eap192|eap-eap192) | ||||
| 		eap|eap192|eap-eap192|eap-only|eap-transition) | ||||
| 			json_get_vars \ | ||||
| 				auth_server auth_secret auth_port \ | ||||
| 				dae_client dae_secret dae_port \ | ||||
| @@ -815,7 +847,15 @@ hostapd_set_bss_options() { | ||||
| 				json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout | ||||
| 				append bss_conf "ieee80211w=$ieee80211w" "$N" | ||||
| 				[ "$ieee80211w" -gt "0" ] && { | ||||
| 					append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N" | ||||
| 					case "$auth_type" in | ||||
| 						eap192) | ||||
| 							append bss_conf "group_mgmt_cipher=BIP-GMAC-256" "$N" | ||||
| 							append bss_conf "group_cipher=GCMP-256" "$N" | ||||
| 						;; | ||||
| 						*) | ||||
| 							append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N" | ||||
| 						;; | ||||
| 					esac | ||||
| 					[ -n "$ieee80211w_max_timeout" ] && \ | ||||
| 						append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N" | ||||
| 					[ -n "$ieee80211w_retry_timeout" ] && \ | ||||
| @@ -940,16 +980,15 @@ hostapd_set_bss_options() { | ||||
| 	set_default access_network_type 0 | ||||
| 	set_default venue_group 0 | ||||
| 	set_default venue_type 0 | ||||
| 	set_default ipaddr_type_availability 0 | ||||
| 	set_default gas_address3 0 | ||||
| 	set_default hs20_deauth_req_timeout 60 | ||||
| 	if [ "$hs20" = "1" ]; then | ||||
| 		append bss_conf "hs20=1" "$N" | ||||
| 		append_hs20_icons | ||||
| 		[ -n "$disable_dgaf"] && append bss_conf "disable_dgaf=$disable_dgaf" "$N" | ||||
| 		[ -n "$osen"] && append bss_conf "osen=$osen" "$N" | ||||
| 		[ -n "$disable_dgaf" ] && append bss_conf "disable_dgaf=$disable_dgaf" "$N" | ||||
| 		[ -n "$osen" ] && append bss_conf "osen=$osen" "$N" | ||||
| 		[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N" | ||||
| 		[ -n "$hs20_deauth_req_timeout"] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N" | ||||
| 		[ -n "$hs20_deauth_req_timeout" ] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N" | ||||
| 		[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N" | ||||
| 		[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N" | ||||
| 		[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N" | ||||
| @@ -972,7 +1011,7 @@ hostapd_set_bss_options() { | ||||
| 		[ "$uesa" -gt 0 ] && append bss_conf "uesa=$uesa" "$N" | ||||
| 		[ "$venue_group" -gt 0 ] && append bss_conf "venue_group=$venue_group" "$N" | ||||
| 		[ "$venue_type" -gt 0 ] && append bss_conf "venue_type=$venue_type" "$N" | ||||
| 		[ "$ipaddr_type_availability" -gt 0 ] && append bss_conf "ipaddr_type_availability=$ipaddr_type_availability" "$N" | ||||
| 		[ -n "$ipaddr_type_availability" ] && append bss_conf "ipaddr_type_availability=$ipaddr_type_availability" "$N" | ||||
| 		[ "$gas_address3" -gt 0 ] && append bss_conf "gas_address3=$gas_address3" "$N" | ||||
| 		[ -n "$hessid" ] && append bss_conf "hessid=$hessid" "$N" | ||||
| 		[ -n "$network_auth_type" ] && append bss_conf "network_auth_type=$network_auth_type" "$N" | ||||
|   | ||||
| @@ -0,0 +1,24 @@ | ||||
| --- a/src/ap/ubus.c | ||||
| +++ b/src/ap/ubus.c | ||||
| @@ -722,6 +722,7 @@ hostapd_switch_chan(struct ubus_context | ||||
|  	struct blob_attr *tb[__CSA_MAX]; | ||||
|  	struct hostapd_data *hapd = get_hapd_from_object(obj); | ||||
|  	struct csa_settings css; | ||||
| +	int i; | ||||
|   | ||||
|  	blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg)); | ||||
|   | ||||
| @@ -746,9 +747,10 @@ hostapd_switch_chan(struct ubus_context | ||||
|  	SET_CSA_SETTING(CSA_VHT, freq_params.vht_enabled, bool); | ||||
|  	SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool); | ||||
|   | ||||
| - | ||||
| -	if (hostapd_switch_channel(hapd, &css) != 0) | ||||
| -		return UBUS_STATUS_NOT_SUPPORTED; | ||||
| +	for (i = 0; i < hapd->iface->num_bss; i++) { | ||||
| +		if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0) | ||||
| +			return UBUS_STATUS_NOT_SUPPORTED; | ||||
| +	} | ||||
|  	return UBUS_STATUS_OK; | ||||
|  #undef SET_CSA_SETTING | ||||
|  } | ||||
| @@ -0,0 +1,186 @@ | ||||
| --- a/src/ap/dfs.c | ||||
| +++ b/src/ap/dfs.c | ||||
| @@ -19,7 +19,7 @@ | ||||
|  #include "dfs.h" | ||||
|  #include "beacon.h" | ||||
|  #include "eloop.h" | ||||
| - | ||||
| +#include "ubus.h" | ||||
|   | ||||
|  static int dfs_get_used_n_chans(struct hostapd_iface *iface, int *seg1) | ||||
|  { | ||||
| @@ -1207,6 +1207,11 @@ static int hostapd_dfs_start_channel_swi | ||||
|  			break; | ||||
|  	} | ||||
|   | ||||
| +	if (!err) { | ||||
| +		wpa_printf(MSG_DEBUG, "Reporting DFS event to ubus"); | ||||
| +		hostapd_ubus_handle_channel_switch_event(iface, HOSTAPD_UBUS_DFS_SWITCH,  channel->freq); | ||||
| +	} | ||||
| + | ||||
|  	if (err) { | ||||
|  		wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback", | ||||
|  			   err); | ||||
| --- a/src/ap/ubus.c | ||||
| +++ b/src/ap/ubus.c | ||||
| @@ -29,6 +29,8 @@ static int ctx_ref; | ||||
|  static char** bss_lst = NULL; | ||||
|  static size_t bss_nr = 0; | ||||
|   | ||||
| +static LIST_HEAD(chan_events); | ||||
| + | ||||
|  static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj) | ||||
|  { | ||||
|  	return container_of(obj, struct hapd_interfaces, ubus); | ||||
| @@ -714,6 +716,42 @@ static int hostapd_sessions(struct ubus_ | ||||
|  	return 0; | ||||
|  } | ||||
|   | ||||
| +static int hostapd_get_chan_switch_events(struct ubus_context *ctx, | ||||
| +					  struct ubus_object *obj, | ||||
| +					  struct ubus_request_data *req, | ||||
| +					  const char *method, | ||||
| +					  struct blob_attr *msg) | ||||
| +{ | ||||
| +	void *a = NULL; | ||||
| +	void *t = NULL; | ||||
| +	struct hostapd_chan_event_list *entry, *tmp; | ||||
| + | ||||
| +	blob_buf_init(&b_ev, 0); | ||||
| +	a = blobmsg_open_table(&b_ev, "chan_switch_event"); | ||||
| +	list_for_each_entry(entry, &chan_events, list) { | ||||
| +		t = blobmsg_open_table(&b_ev, "event"); | ||||
| +		blobmsg_add_u32(&b_ev, "radio_name", entry->records.band); | ||||
| +		blobmsg_add_u32(&b_ev, "reason", entry->records.reason); | ||||
| +		blobmsg_add_u64(&b_ev, "timestamp", entry->records.ts); | ||||
| +		blobmsg_add_u32(&b_ev, "frequency", entry->records.freq); | ||||
| +		blobmsg_close_table(&b_ev, t); | ||||
| +	} | ||||
| + | ||||
| +	blobmsg_close_table(&b_ev, a); | ||||
| +	ubus_send_reply(ctx, req, b_ev.head); | ||||
| + | ||||
| +	/*delete list*/ | ||||
| + | ||||
| +	if (!list_empty(&chan_events)) { | ||||
| +		list_for_each_entry_safe(entry, tmp, &chan_events, list) { | ||||
| +			list_del(&entry->list); | ||||
| +			free(entry); | ||||
| +		} | ||||
| +	} | ||||
| + | ||||
| +	return 0; | ||||
| +} | ||||
| + | ||||
|  static int | ||||
|  hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj, | ||||
|  		    struct ubus_request_data *req, const char *method, | ||||
| @@ -751,6 +789,9 @@ hostapd_switch_chan(struct ubus_context | ||||
|  		if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0) | ||||
|  			return UBUS_STATUS_NOT_SUPPORTED; | ||||
|  	} | ||||
| + | ||||
| +	hostapd_ubus_handle_channel_switch_event(hapd->iface, HOSTAPD_UBUS_HIGH_INTERFERENCE, css.freq_params.freq); | ||||
| + | ||||
|  	return UBUS_STATUS_OK; | ||||
|  #undef SET_CSA_SETTING | ||||
|  } | ||||
| @@ -1446,6 +1487,7 @@ static const struct ubus_method daemon_m | ||||
|  	UBUS_METHOD("config_add", hostapd_config_add, config_add_policy), | ||||
|  	UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy), | ||||
|  	UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list), | ||||
| +	UBUS_METHOD_NOARG("get_chan_switch_events", hostapd_get_chan_switch_events), | ||||
|  }; | ||||
|   | ||||
|  static struct ubus_object_type daemon_object_type = | ||||
| @@ -1509,6 +1551,26 @@ ubus_event_cb(struct ubus_notify_request | ||||
|  	ureq->resp = ret; | ||||
|  } | ||||
|   | ||||
| +void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface, int reason, | ||||
| +					      int freq) | ||||
| +{ | ||||
| +	struct hostapd_chan_event_list *rec = NULL; | ||||
| +	struct timespec ts; | ||||
| +	uint64_t timestamp = 0; | ||||
| + | ||||
| +	clock_gettime(CLOCK_REALTIME, &ts); | ||||
| +	timestamp = get_time_in_ms(&ts); | ||||
| + | ||||
| +	rec = os_zalloc(sizeof(struct hostapd_chan_event_list)); | ||||
| + | ||||
| +	rec->records.reason = reason; | ||||
| +	rec->records.band = iface->freq; | ||||
| +	rec->records.ts = timestamp; | ||||
| +	rec->records.freq = freq; | ||||
| + | ||||
| +	list_add_tail(&rec->list, &chan_events); | ||||
| +} | ||||
| + | ||||
|  int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd, | ||||
|  				 struct hostapd_ubus_request *req) | ||||
|  { | ||||
| --- a/src/ap/ubus.h | ||||
| +++ b/src/ap/ubus.h | ||||
| @@ -17,9 +17,15 @@ enum hostapd_ubus_event_type { | ||||
|  	HOSTAPD_UBUS_DEAUTH_REQ, | ||||
|  	HOSTAPD_UBUS_FDATA_REQ, | ||||
|  	HOSTAPD_UBUS_IP_REQ, | ||||
| +	HOSTAPD_UBUS_CHAN_SWITCH, | ||||
|  	HOSTAPD_UBUS_TYPE_MAX | ||||
|  }; | ||||
|   | ||||
| +enum hostapd_ubus_chan_event_reason { | ||||
| +	HOSTAPD_UBUS_DFS_SWITCH, | ||||
| +	HOSTAPD_UBUS_HIGH_INTERFERENCE | ||||
| +}; | ||||
| + | ||||
|  struct hostapd_ubus_request { | ||||
|  	enum hostapd_ubus_event_type type; | ||||
|  	const struct ieee80211_mgmt *mgmt_frame; | ||||
| @@ -40,6 +46,7 @@ struct rrm_measurement_beacon_report; | ||||
|   | ||||
|  #include <libubox/avl.h> | ||||
|  #include <libubus.h> | ||||
| +#include <libubox/list.h> | ||||
|   | ||||
|  struct hostapd_ubus_bss { | ||||
|  	struct ubus_object obj; | ||||
| @@ -121,11 +128,24 @@ struct hostapd_event_avl_rec { | ||||
|  	struct avl_node avl; | ||||
|  }; | ||||
|   | ||||
| +struct channel_switch_event { | ||||
| +	int band; /* Radio name*/ | ||||
| +	uint8_t reason; | ||||
| +	uint64_t ts; | ||||
| +	uint32_t freq; | ||||
| +}; | ||||
| + | ||||
| +struct hostapd_chan_event_list { | ||||
| +	struct channel_switch_event records; | ||||
| +	struct list_head list; | ||||
| +}; | ||||
| + | ||||
|  void hostapd_ubus_add_iface(struct hostapd_iface *iface); | ||||
|  void hostapd_ubus_free_iface(struct hostapd_iface *iface); | ||||
|  void hostapd_ubus_add_bss(struct hostapd_data *hapd); | ||||
|  void hostapd_ubus_free_bss(struct hostapd_data *hapd); | ||||
| - | ||||
| +void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface, | ||||
| +					      int reason, int channel); | ||||
|  int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req); | ||||
|  int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req); | ||||
|  void hostapd_ubus_notify(struct hostapd_data *hapd, const char *type, const u8 *mac); | ||||
| @@ -157,6 +177,11 @@ static inline void hostapd_ubus_free_bss | ||||
|  { | ||||
|  } | ||||
|   | ||||
| +static inline void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface, | ||||
| +							    int reason, int channel) | ||||
| +{ | ||||
| +} | ||||
| + | ||||
|  static inline int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req) | ||||
|  { | ||||
|  	return 0; | ||||
| @@ -0,0 +1,28 @@ | ||||
| Index: hostapd-2020-06-08-5a8b3662/src/ap/ieee802_11.c | ||||
| =================================================================== | ||||
| --- hostapd-2020-06-08-5a8b3662.orig/src/ap/ieee802_11.c | ||||
| +++ hostapd-2020-06-08-5a8b3662/src/ap/ieee802_11.c | ||||
| @@ -3675,6 +3675,13 @@ static int add_associated_sta(struct hos | ||||
|  	 * drivers to accept the STA parameter configuration. Since this is | ||||
|  	 * after a new FT-over-DS exchange, a new TK has been derived, so key | ||||
|  	 * reinstallation is not a concern for this case. | ||||
| +	 * | ||||
| +	 * If the STA was associated and authorized earlier, but came for a new | ||||
| +	 * connection (!added_unassoc + !reassoc), remove the existing STA entry | ||||
| +	 * so that it can be re-added. This case is rarely seen when the AP could | ||||
| +	 * not receive the deauth/disassoc frame from the STA. And the STA comes | ||||
| +	 * back with new connection within a short period or before the inactive | ||||
| +	 * STA entry is removed from the list. | ||||
|  	 */ | ||||
|  	wpa_printf(MSG_DEBUG, "Add associated STA " MACSTR | ||||
|  		   " (added_unassoc=%d auth_alg=%u ft_over_ds=%u reassoc=%d authorized=%d ft_tk=%d fils_tk=%d)", | ||||
| @@ -3688,7 +3695,8 @@ static int add_associated_sta(struct hos | ||||
|  	    (!(sta->flags & WLAN_STA_AUTHORIZED) || | ||||
|  	     (reassoc && sta->ft_over_ds && sta->auth_alg == WLAN_AUTH_FT) || | ||||
|  	     (!wpa_auth_sta_ft_tk_already_set(sta->wpa_sm) && | ||||
| -	      !wpa_auth_sta_fils_tk_already_set(sta->wpa_sm)))) { | ||||
| +	      !wpa_auth_sta_fils_tk_already_set(sta->wpa_sm)) || | ||||
| +	     (!reassoc && (sta->flags & WLAN_STA_AUTHORIZED)))) { | ||||
|  		hostapd_drv_sta_remove(hapd, sta->addr); | ||||
|  		wpa_auth_sm_event(sta->wpa_sm, WPA_DRV_STA_REMOVED); | ||||
|  		set = 0; | ||||
							
								
								
									
										32
									
								
								feeds/wifi-ax/hostapd/patches/f00-014-fix-ubus-assoc.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								feeds/wifi-ax/hostapd/patches/f00-014-fix-ubus-assoc.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,32 @@ | ||||
| --- a/src/ap/ieee802_11.c | ||||
| +++ b/src/ap/ieee802_11.c | ||||
| @@ -4463,6 +4463,14 @@ static void handle_assoc(struct hostapd_ | ||||
|  			ieee802_11_set_beacons(hapd->iface); | ||||
|  	} | ||||
|   | ||||
| +	ubus_resp = hostapd_ubus_handle_event(hapd, &req); | ||||
| +	if (ubus_resp) { | ||||
| +		wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n", | ||||
| +		       MAC2STR(mgmt->sa)); | ||||
| +		resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE; | ||||
| +		goto fail; | ||||
| +	} | ||||
| + | ||||
|  	update_ht_state(hapd, sta); | ||||
|   | ||||
|  	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211, | ||||
| @@ -4568,14 +4576,6 @@ static void handle_assoc(struct hostapd_ | ||||
|  					    pos, left, rssi, omit_rsnxe); | ||||
|  	os_free(tmp); | ||||
|   | ||||
| -	ubus_resp = hostapd_ubus_handle_event(hapd, &req); | ||||
| -	if (ubus_resp) { | ||||
| -		wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n", | ||||
| -		       MAC2STR(mgmt->sa)); | ||||
| -		resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE; | ||||
| -		goto fail; | ||||
| -	} | ||||
| - | ||||
|  	/* | ||||
|  	 * Remove the station in case tranmission of a success response fails | ||||
|  	 * (the STA was added associated to the driver) or if the station was | ||||
| @@ -0,0 +1,84 @@ | ||||
| From 0e23a88c63d6abbeaef8ec90bd29584b7c5068bd Mon Sep 17 00:00:00 2001 | ||||
| From: Sriram R <srirrama@codeaurora.org> | ||||
| Date: Thu, 10 Dec 2020 14:20:50 +0530 | ||||
| Subject: [PATCH] ath11k: Clear the fragment cache during key install | ||||
|  | ||||
| Currently the fragment cache setup during peer assoc is | ||||
| cleared during peer delete. In case a key reinstallation | ||||
| happens with the same peer, possibilitites are same fragment cache | ||||
| where some fragments were added before key installation could be clubbed | ||||
| with fragments received after. In ideal cases where | ||||
| this could result in wrong PN since we expect all fragments to | ||||
| have incrementing PN, this behavior could be explioted | ||||
| to mix fragments of different data resulting in a proper | ||||
| unintended reassembled packet to be passed up the stack. | ||||
|  | ||||
| Signed-off-by: Sriram R <srirrama@codeaurora.org> | ||||
| --- | ||||
|  drivers/net/wireless/ath/ath11k/dp_rx.c | 19 +++++++++++++++++++ | ||||
|  drivers/net/wireless/ath/ath11k/dp_rx.h |  1 + | ||||
|  drivers/net/wireless/ath/ath11k/mac.c   |  6 ++++++ | ||||
|  3 files changed, 26 insertions(+) | ||||
|  | ||||
| diff --git a/drivers/net/wireless/ath/ath11k/dp_rx.c b/drivers/net/wireless/ath/ath11k/dp_rx.c | ||||
| index 0fa25c1..06bbd6e 100644 | ||||
| --- a/drivers/net/wireless/ath/ath11k/dp_rx.c | ||||
| +++ b/drivers/net/wireless/ath/ath11k/dp_rx.c | ||||
| @@ -844,6 +844,25 @@ static void ath11k_dp_rx_frags_cleanup(struct dp_rx_tid *rx_tid, bool rel_link_d | ||||
|  	__skb_queue_purge(&rx_tid->rx_frags); | ||||
|  } | ||||
|   | ||||
| +void ath11k_peer_frags_flush(struct ath11k *ar, struct ath11k_peer *peer) | ||||
| +{ | ||||
| +	struct dp_rx_tid *rx_tid; | ||||
| +	int i; | ||||
| + | ||||
| +	lockdep_assert_held(&ar->ab->base_lock); | ||||
| + | ||||
| +	for (i = 0; i <= IEEE80211_NUM_TIDS; i++) { | ||||
| +		rx_tid = &peer->rx_tid[i]; | ||||
| + | ||||
| +		spin_unlock_bh(&ar->ab->base_lock); | ||||
| +		del_timer_sync(&rx_tid->frag_timer); | ||||
| +		spin_lock_bh(&ar->ab->base_lock); | ||||
| + | ||||
| +		ath11k_dp_rx_frags_cleanup(rx_tid, true); | ||||
| + | ||||
| +	} | ||||
| +} | ||||
| + | ||||
|  void ath11k_peer_rx_tid_cleanup(struct ath11k *ar, struct ath11k_peer *peer) | ||||
|  { | ||||
|  	struct dp_rx_tid *rx_tid; | ||||
| diff --git a/drivers/net/wireless/ath/ath11k/dp_rx.h b/drivers/net/wireless/ath/ath11k/dp_rx.h | ||||
| index f005ded..732f9a7 100644 | ||||
| --- a/drivers/net/wireless/ath/ath11k/dp_rx.h | ||||
| +++ b/drivers/net/wireless/ath/ath11k/dp_rx.h | ||||
| @@ -68,6 +68,7 @@ int ath11k_dp_peer_rx_pn_replay_config(struct ath11k_vif *arvif, | ||||
|  				       const u8 *peer_addr, | ||||
|  				       enum set_key_cmd key_cmd, | ||||
|  				       struct ieee80211_key_conf *key); | ||||
| +void ath11k_peer_frags_flush(struct ath11k *ar, struct ath11k_peer *peer); | ||||
|  void ath11k_peer_rx_tid_cleanup(struct ath11k *ar, struct ath11k_peer *peer); | ||||
|  void ath11k_peer_rx_tid_delete(struct ath11k *ar, | ||||
|  			       struct ath11k_peer *peer, u8 tid); | ||||
| diff --git a/drivers/net/wireless/ath/ath11k/mac.c b/drivers/net/wireless/ath/ath11k/mac.c | ||||
| index 4c88eab..91d645e 100644 | ||||
| --- a/drivers/net/wireless/ath/ath11k/mac.c | ||||
| +++ b/drivers/net/wireless/ath/ath11k/mac.c | ||||
| @@ -3707,6 +3707,12 @@ static int ath11k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, | ||||
|  	 */ | ||||
|  	spin_lock_bh(&ab->base_lock); | ||||
|  	peer = ath11k_peer_find(ab, arvif->vdev_id, peer_addr); | ||||
| + | ||||
| +	/* flush the fragments cache during key (re)install to | ||||
| +	 * ensure all frags in the new frag list  belong to the same key. | ||||
| +	 */ | ||||
| +	if (peer && cmd == SET_KEY) | ||||
| +		ath11k_peer_frags_flush(ar, peer); | ||||
|  	spin_unlock_bh(&ab->base_lock); | ||||
|   | ||||
|  	if (!peer) { | ||||
| --  | ||||
| 2.7.4 | ||||
|  | ||||
							
								
								
									
										242
									
								
								feeds/wifi-ax/mac80211/patches/pending/213-mac80211-frag.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										242
									
								
								feeds/wifi-ax/mac80211/patches/pending/213-mac80211-frag.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,242 @@ | ||||
| From patchwork Tue May 11 18:02:44 2021 | ||||
| Content-Type: text/plain; charset="utf-8" | ||||
| MIME-Version: 1.0 | ||||
| Content-Transfer-Encoding: 7bit | ||||
| X-Patchwork-Submitter: Johannes Berg <johannes@sipsolutions.net> | ||||
| X-Patchwork-Id: 12251641 | ||||
| X-Patchwork-Delegate: johannes@sipsolutions.net | ||||
| Return-Path: <linux-wireless-owner@kernel.org> | ||||
| X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on | ||||
| 	aws-us-west-2-korg-lkml-1.web.codeaurora.org | ||||
| X-Spam-Level:  | ||||
| X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00, | ||||
| 	HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, | ||||
| 	MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT | ||||
| 	autolearn=unavailable autolearn_force=no version=3.4.0 | ||||
| Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) | ||||
| 	by smtp.lore.kernel.org (Postfix) with ESMTP id 5E0C4C43617 | ||||
| 	for <linux-wireless@archiver.kernel.org>; | ||||
|  Tue, 11 May 2021 18:03:20 +0000 (UTC) | ||||
| Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) | ||||
| 	by mail.kernel.org (Postfix) with ESMTP id 2E1D461625 | ||||
| 	for <linux-wireless@archiver.kernel.org>; | ||||
|  Tue, 11 May 2021 18:03:20 +0000 (UTC) | ||||
| Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand | ||||
|         id S231693AbhEKSEZ (ORCPT | ||||
|         <rfc822;linux-wireless@archiver.kernel.org>); | ||||
|         Tue, 11 May 2021 14:04:25 -0400 | ||||
| Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41156 "EHLO | ||||
|         lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org | ||||
|         with ESMTP id S231561AbhEKSEV (ORCPT | ||||
|         <rfc822;linux-wireless@vger.kernel.org>); | ||||
|         Tue, 11 May 2021 14:04:21 -0400 | ||||
| Received: from sipsolutions.net (s3.sipsolutions.net | ||||
|  [IPv6:2a01:4f8:191:4433::2]) | ||||
|         by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D055CC06175F; | ||||
|         Tue, 11 May 2021 11:03:10 -0700 (PDT) | ||||
| Received: by sipsolutions.net with esmtpsa | ||||
|  (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) | ||||
|         (Exim 4.94.2) | ||||
|         (envelope-from <johannes@sipsolutions.net>) | ||||
|         id 1lgWir-007aAS-9o; Tue, 11 May 2021 20:03:09 +0200 | ||||
| From: Johannes Berg <johannes@sipsolutions.net> | ||||
| To: linux-wireless@vger.kernel.org | ||||
| Cc: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be>, stable@vger.kernel.org | ||||
| Subject: [PATCH 03/18] mac80211: properly handle A-MSDUs that start with an | ||||
|  RFC 1042 header | ||||
| Date: Tue, 11 May 2021 20:02:44 +0200 | ||||
| Message-Id:  | ||||
|  <20210511200110.0b2b886492f0.I23dd5d685fe16d3b0ec8106e8f01b59f499dffed@changeid> | ||||
| X-Mailer: git-send-email 2.30.2 | ||||
| In-Reply-To: <20210511180259.159598-1-johannes@sipsolutions.net> | ||||
| References: <20210511180259.159598-1-johannes@sipsolutions.net> | ||||
| MIME-Version: 1.0 | ||||
| Precedence: bulk | ||||
| List-ID: <linux-wireless.vger.kernel.org> | ||||
| X-Mailing-List: linux-wireless@vger.kernel.org | ||||
|  | ||||
| From: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be> | ||||
|  | ||||
| Properly parse A-MSDUs whose first 6 bytes happen to equal a rfc1042 | ||||
| header. This can occur in practice when the destination MAC address | ||||
| equals AA:AA:03:00:00:00. More importantly, this simplifies the next | ||||
| patch to mitigate A-MSDU injection attacks. | ||||
|  | ||||
| Cc: stable@vger.kernel.org | ||||
| Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be> | ||||
| Signed-off-by: Johannes Berg <johannes.berg@intel.com> | ||||
| --- | ||||
|  include/net/cfg80211.h | 4 ++-- | ||||
|  net/mac80211/rx.c      | 2 +- | ||||
|  net/wireless/util.c    | 4 ++-- | ||||
|  3 files changed, 5 insertions(+), 5 deletions(-) | ||||
|  | ||||
| Index: backports-20200902_001-4.4.60-931c337125/include/net/cfg80211.h | ||||
| =================================================================== | ||||
| --- backports-20200902_001-4.4.60-931c337125.orig/include/net/cfg80211.h | ||||
| +++ backports-20200902_001-4.4.60-931c337125/include/net/cfg80211.h | ||||
| @@ -5631,7 +5631,7 @@ unsigned int ieee80211_get_mesh_hdrlen(s | ||||
|   */ | ||||
|  int ieee80211_data_to_8023_exthdr(struct sk_buff *skb, struct ethhdr *ehdr, | ||||
|  				  const u8 *addr, enum nl80211_iftype iftype, | ||||
| -				  u8 data_offset); | ||||
| +				  u8 data_offset, bool is_amsdu); | ||||
|   | ||||
|  /** | ||||
|   * ieee80211_data_to_8023 - convert an 802.11 data frame to 802.3 | ||||
| @@ -5643,7 +5643,7 @@ int ieee80211_data_to_8023_exthdr(struct | ||||
|  static inline int ieee80211_data_to_8023(struct sk_buff *skb, const u8 *addr, | ||||
|  					 enum nl80211_iftype iftype) | ||||
|  { | ||||
| -	return ieee80211_data_to_8023_exthdr(skb, NULL, addr, iftype, 0); | ||||
| +	return ieee80211_data_to_8023_exthdr(skb, NULL, addr, iftype, 0, false); | ||||
|  } | ||||
|   | ||||
|  /** | ||||
| Index: backports-20200902_001-4.4.60-931c337125/net/mac80211/rx.c | ||||
| =================================================================== | ||||
| --- backports-20200902_001-4.4.60-931c337125.orig/net/mac80211/rx.c | ||||
| +++ backports-20200902_001-4.4.60-931c337125/net/mac80211/rx.c | ||||
| @@ -6,7 +6,7 @@ | ||||
|   * Copyright 2007-2010	Johannes Berg <johannes@sipsolutions.net> | ||||
|   * Copyright 2013-2014  Intel Mobile Communications GmbH | ||||
|   * Copyright(c) 2015 - 2017 Intel Deutschland GmbH | ||||
| - * Copyright (C) 2018-2020 Intel Corporation | ||||
| + * Copyright (C) 2018-2021 Intel Corporation | ||||
|   */ | ||||
|   | ||||
|  #include <linux/jiffies.h> | ||||
| @@ -2555,13 +2555,13 @@ static bool ieee80211_frame_allowed(stru | ||||
|  	struct ethhdr *ehdr = (struct ethhdr *) rx->skb->data; | ||||
|   | ||||
|  	/* | ||||
| -	 * Allow EAPOL frames to us/the PAE group address regardless | ||||
| -	 * of whether the frame was encrypted or not. | ||||
| -	 */ | ||||
| -	if (ehdr->h_proto == rx->sdata->control_port_protocol && | ||||
| -	    (ether_addr_equal(ehdr->h_dest, rx->sdata->vif.addr) || | ||||
| -	     ether_addr_equal(ehdr->h_dest, pae_group_addr))) | ||||
| -		return true; | ||||
| +	 * Allow EAPOL frames to us/the PAE group address regardless of | ||||
| +	 * whether the frame was encrypted or not, and always disallow | ||||
| +	 * all other destination addresses for them. | ||||
| +	 */ | ||||
| +	if (unlikely(ehdr->h_proto == rx->sdata->control_port_protocol)) | ||||
| +		return ether_addr_equal(ehdr->h_dest, rx->sdata->vif.addr) || | ||||
| +		       ether_addr_equal(ehdr->h_dest, pae_group_addr); | ||||
|   | ||||
|  	if (ieee80211_802_1x_port_control(rx) || | ||||
|  	    ieee80211_drop_unencrypted(rx, fc)) | ||||
| @@ -2632,7 +2632,26 @@ static void ieee80211_deliver_skb_to_loc | ||||
|  		cfg80211_rx_control_port(dev, skb, noencrypt); | ||||
|  		dev_kfree_skb(skb); | ||||
|  	} else { | ||||
| +		struct ethhdr *ehdr = (void *)skb_mac_header(skb); | ||||
|  		memset(skb->cb, 0, sizeof(skb->cb)); | ||||
| +		/* | ||||
| +		 * 802.1X over 802.11 requires that the authenticator address | ||||
| +		 * be used for EAPOL frames. However, 802.1X allows the use of | ||||
| +		 * the PAE group address instead. If the interface is part of | ||||
| +		 * a bridge and we pass the frame with the PAE group address, | ||||
| +		 * then the bridge will forward it to the network (even if the | ||||
| +		 * client was not associated yet), which isn't supposed to | ||||
| +		 * happen. | ||||
| +		 * To avoid that, rewrite the destination address to our own | ||||
| +		 * address, so that the authenticator (e.g. hostapd) will see | ||||
| +		 * the frame, but bridge won't forward it anywhere else. Note | ||||
| +		 * that due to earlier filtering, the only other address can | ||||
| +		 * be the PAE group address. | ||||
| +		 */ | ||||
| +		if (unlikely(skb->protocol == sdata->control_port_protocol && | ||||
| +			     !ether_addr_equal(ehdr->h_dest, sdata->vif.addr))) | ||||
| +			ether_addr_copy(ehdr->h_dest, sdata->vif.addr); | ||||
| + | ||||
|  		netif_rx_nss(rx, skb); | ||||
|  	} | ||||
|  } | ||||
| @@ -2672,6 +2691,7 @@ ieee80211_deliver_skb(struct ieee80211_r | ||||
|  	if ((sdata->vif.type == NL80211_IFTYPE_AP || | ||||
|  	     sdata->vif.type == NL80211_IFTYPE_AP_VLAN) && | ||||
|  	    !(sdata->flags & IEEE80211_SDATA_DONT_BRIDGE_PACKETS) && | ||||
| +	    ehdr->h_proto != rx->sdata->control_port_protocol && | ||||
|  	    (sdata->vif.type != NL80211_IFTYPE_AP_VLAN || !sdata->u.vlan.sta)) { | ||||
|  		if (is_multicast_ether_addr(ehdr->h_dest) && | ||||
|  		    ieee80211_vif_get_num_mcast_if(sdata) != 0) { | ||||
| @@ -2781,7 +2801,7 @@ __ieee80211_rx_h_amsdu(struct ieee80211_ | ||||
|  	if (ieee80211_data_to_8023_exthdr(skb, ðhdr, | ||||
|  					  rx->sdata->vif.addr, | ||||
|  					  rx->sdata->vif.type, | ||||
| -					  data_offset)) | ||||
| +					  data_offset, true)) | ||||
|  		return RX_DROP_UNUSABLE; | ||||
|   | ||||
|  	ieee80211_amsdu_to_8023s(skb, &frame_list, dev->dev_addr, | ||||
| @@ -2838,6 +2858,23 @@ ieee80211_rx_h_amsdu(struct ieee80211_rx | ||||
|  	if (is_multicast_ether_addr(hdr->addr1)) | ||||
|  		return RX_DROP_UNUSABLE; | ||||
|   | ||||
| +	if (rx->key) { | ||||
| +		/* | ||||
| +		 * We should not receive A-MSDUs on pre-HT connections, | ||||
| +		 * and HT connections cannot use old ciphers. Thus drop | ||||
| +		 * them, as in those cases we couldn't even have SPP | ||||
| +		 * A-MSDUs or such. | ||||
| +		 */ | ||||
| +		switch (rx->key->conf.cipher) { | ||||
| +		case WLAN_CIPHER_SUITE_WEP40: | ||||
| +		case WLAN_CIPHER_SUITE_WEP104: | ||||
| +		case WLAN_CIPHER_SUITE_TKIP: | ||||
| +			return RX_DROP_UNUSABLE; | ||||
| +		default: | ||||
| +			break; | ||||
| +		} | ||||
| +	} | ||||
| + | ||||
|  	return __ieee80211_rx_h_amsdu(rx, 0); | ||||
|  } | ||||
|   | ||||
| Index: backports-20200902_001-4.4.60-931c337125/net/wireless/util.c | ||||
| =================================================================== | ||||
| --- backports-20200902_001-4.4.60-931c337125.orig/net/wireless/util.c | ||||
| +++ backports-20200902_001-4.4.60-931c337125/net/wireless/util.c | ||||
| @@ -474,7 +474,7 @@ EXPORT_SYMBOL(ieee80211_get_mesh_hdrlen) | ||||
|   | ||||
|  int ieee80211_data_to_8023_exthdr(struct sk_buff *skb, struct ethhdr *ehdr, | ||||
|  				  const u8 *addr, enum nl80211_iftype iftype, | ||||
| -				  u8 data_offset) | ||||
| +				  u8 data_offset, bool is_amsdu) | ||||
|  { | ||||
|  	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data; | ||||
|  	struct { | ||||
| @@ -562,7 +562,7 @@ int ieee80211_data_to_8023_exthdr(struct | ||||
|  	skb_copy_bits(skb, hdrlen, &payload, sizeof(payload)); | ||||
|  	tmp.h_proto = payload.proto; | ||||
|   | ||||
| -	if (likely((ether_addr_equal(payload.hdr, rfc1042_header) && | ||||
| +	if (likely((!is_amsdu && ether_addr_equal(payload.hdr, rfc1042_header) && | ||||
|  		    tmp.h_proto != htons(ETH_P_AARP) && | ||||
|  		    tmp.h_proto != htons(ETH_P_IPX)) || | ||||
|  		   ether_addr_equal(payload.hdr, bridge_tunnel_header))) | ||||
| @@ -708,6 +708,9 @@ void ieee80211_amsdu_to_8023s(struct sk_ | ||||
|  		remaining = skb->len - offset; | ||||
|  		if (subframe_len > remaining) | ||||
|  			goto purge; | ||||
| +		/* mitigate A-MSDU aggregation injection attacks */ | ||||
| +		if (ether_addr_equal(eth.h_dest, rfc1042_header)) | ||||
| +			goto purge; | ||||
|   | ||||
|  		offset += sizeof(struct ethhdr); | ||||
|  		last = remaining <= subframe_len + padding; | ||||
| Index: backports-20200902_001-4.4.60-931c337125/drivers/net/wireless/ath/ath11k/nss.c | ||||
| =================================================================== | ||||
| --- backports-20200902_001-4.4.60-931c337125.orig/drivers/net/wireless/ath/ath11k/nss.c | ||||
| +++ backports-20200902_001-4.4.60-931c337125/drivers/net/wireless/ath/ath11k/nss.c | ||||
| @@ -477,7 +477,7 @@ static int ath11k_nss_deliver_rx(struct | ||||
|  	} | ||||
|   | ||||
|  	if (ieee80211_data_to_8023_exthdr(skb, NULL, vif->addr, vif->type, | ||||
| -					  data_offs - hdr_len)) { | ||||
| +					  data_offs - hdr_len, false)) { | ||||
|  		dev_kfree_skb_any(skb); | ||||
|  		return -EINVAL; | ||||
|  	} | ||||
| @@ -0,0 +1,22 @@ | ||||
| diff -Naur a/drivers/net/wireless/ath/ath11k/mac.c b/drivers/net/wireless/ath/ath11k/mac.c | ||||
| --- a/drivers/net/wireless/ath/ath11k/mac.c	2021-06-09 10:02:12.040840722 -0400 | ||||
| +++ b/drivers/net/wireless/ath/ath11k/mac.c	2021-06-10 10:40:12.094003411 -0400 | ||||
| @@ -3472,13 +3472,14 @@ | ||||
|  		scan_timeout = min_t(u32, arg->max_rest_time * | ||||
|  				    (arg->chan_list.num_chan - 1) + (req->duration + | ||||
|  				     ATH11K_SCAN_CHANNEL_SWITCH_WMI_EVT_OVERHEAD) * | ||||
| -				     arg->chan_list.num_chan, arg->max_scan_time + | ||||
| -				     ATH11K_MAC_SCAN_TIMEOUT_MSECS); | ||||
| +				     arg->chan_list.num_chan, arg->max_scan_time); | ||||
|  	} else { | ||||
| -		/* Add a 200ms margin to account for event/command processing */ | ||||
| -		scan_timeout = arg->max_scan_time + ATH11K_MAC_SCAN_TIMEOUT_MSECS; | ||||
| +		scan_timeout = arg->max_scan_time; | ||||
|  	} | ||||
|   | ||||
| +	/* Add a 200ms margin to account for event/command processing */ | ||||
| +	scan_timeout += ATH11K_MAC_SCAN_TIMEOUT_MSECS; | ||||
| + | ||||
|  	ret = ath11k_start_scan(ar, arg); | ||||
|  	if (ret) { | ||||
|  		ath11k_warn(ar->ab, "failed to start hw scan: %d\n", ret); | ||||
| @@ -8,8 +8,8 @@ PKG_LICENSE_FILES:= | ||||
|  | ||||
| PKG_SOURCE_URL:=https://github.com/greearb/ath10k-ct.git | ||||
| PKG_SOURCE_PROTO:=git | ||||
| PKG_SOURCE_DATE:=2020-08-26 | ||||
| PKG_SOURCE_VERSION:=13319ff0b5dc3c86e8313f49fca583b829878736 | ||||
| PKG_SOURCE_DATE:=2021-05-22b | ||||
| PKG_SOURCE_VERSION:=54a9ac02f1139596ea4361ebbc3e444955d86cfd | ||||
| #PKG_MIRROR_HASH:=97cf22a4a57381c7eb7a9b8a8b1e347e9711ce51c89db971b4ab9a35af476ece | ||||
|  | ||||
| # Build the 5.4 ath10k-ct driver version.  Other option is "-4.19". | ||||
|   | ||||
| @@ -0,0 +1,22 @@ | ||||
| diff -Naur a/ath10k-5.7/mac.c b/ath10k-5.7/mac.c | ||||
| --- a/ath10k-5.7/mac.c	2021-06-09 16:30:17.793556032 -0400 | ||||
| +++ b/ath10k-5.7/mac.c	2021-06-09 17:38:08.587733979 -0400 | ||||
| @@ -7103,13 +7103,15 @@ | ||||
|  		scan_timeout = min_t(u32, arg.max_rest_time * | ||||
|  				(arg.n_channels - 1) + (req->duration + | ||||
|  				ATH10K_SCAN_CHANNEL_SWITCH_WMI_EVT_OVERHEAD) * | ||||
| -				arg.n_channels, arg.max_scan_time + 200); | ||||
| +				arg.n_channels, arg.max_scan_time); | ||||
|   | ||||
|  	} else { | ||||
| -		/* Add a 200ms margin to account for event/command processing */ | ||||
| -		scan_timeout = arg.max_scan_time + 200; | ||||
| +		scan_timeout = arg.max_scan_time; | ||||
|  	} | ||||
|   | ||||
| +	/* Add a 200ms margin to account for event/command processing */ | ||||
| +	scan_timeout += 200; | ||||
| + | ||||
|  	ret = ath10k_start_scan(ar, &arg); | ||||
|  	if (ret) { | ||||
|  		ath10k_warn(ar, "failed to start hw scan: %d\n", ret); | ||||
| @@ -47,8 +47,18 @@ hostapd_append_wpa_key_mgmt() { | ||||
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type_l}-SHA256" | ||||
| 			[ "${ieee80211ai:-0}" -gt 0 ] && append wpa_key_mgmt "FILS-SHA256" | ||||
| 		;; | ||||
| 		eap-only) | ||||
| 			append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap-transition) | ||||
| 			append wpa_key_mgmt "WPA-EAP" | ||||
| 			append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap192) | ||||
| 			append wpa_key_mgmt "WPA-EAP-SUITE-B-192" | ||||
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256" | ||||
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP" | ||||
| 		;; | ||||
| 		eap-eap192) | ||||
| @@ -294,15 +304,17 @@ hostapd_common_add_bss_config() { | ||||
| 	config_add_string osu_ssid hs20_wan_metrics hs20_operating_class hs20_t_c_filename hs20_t_c_timestamp | ||||
|  | ||||
| 	config_add_boolean interworking internet | ||||
| 	config_add_int access_network_type asra esr uesa venue_group venue_type ipaddr_type_availability \ | ||||
| 	config_add_int access_network_type asra esr uesa venue_group venue_type \ | ||||
| 		gas_address3 | ||||
| 	config_add_string hessid network_auth_type \ | ||||
| 	config_add_string hessid network_auth_type ipaddr_type_availability \ | ||||
| 		anqp_3gpp_cell_net anqp_elem domain_name qos_map_set hs20_t_c_server_url | ||||
|  | ||||
| 	config_add_int airtime_bss_weight airtime_bss_limit | ||||
| 	config_add_int rts_threshold | ||||
| 	config_add_array radius_auth_req_attr | ||||
| 	config_add_array radius_acct_req_attr | ||||
|  | ||||
| 	config_add_boolean multicast_to_unicast proxy_arp | ||||
| } | ||||
|  | ||||
| hostapd_set_vlan_file() { | ||||
| @@ -446,7 +458,8 @@ hostapd_set_bss_options() { | ||||
| 		bss_load_update_period chan_util_avg_period sae_require_mfp \ | ||||
| 		multi_ap multi_ap_backhaul_ssid multi_ap_backhaul_key \ | ||||
| 		airtime_bss_weight airtime_bss_limit \ | ||||
| 		rssi_reject_assoc_rssi rssi_ignore_probe_request rts_threshold  | ||||
| 		rssi_reject_assoc_rssi rssi_ignore_probe_request rts_threshold \ | ||||
| 		proxy_arp multicast_to_unicast | ||||
|  | ||||
| 	set_default isolate 0 | ||||
| 	set_default maxassoc 0 | ||||
| @@ -474,6 +487,9 @@ hostapd_set_bss_options() { | ||||
| 	set_default signal_poll_time 5 | ||||
| 	set_default signal_drop_reason 3 | ||||
| 	set_default signal_strikes 3 | ||||
| 	set_default proxy_arp 0 | ||||
| 	set_default multicast_to_unicast 0 | ||||
|  | ||||
|  | ||||
| 	append bss_conf "ctrl_interface=/var/run/hostapd" | ||||
| 	if [ "$isolate" -gt 0 ]; then | ||||
| @@ -507,6 +523,9 @@ hostapd_set_bss_options() { | ||||
| 	append bss_conf "signal_strikes=$signal_strikes" "$N" | ||||
| 	append bss_conf "signal_drop_reason=$signal_drop_reason" "$N" | ||||
|  | ||||
| 	[ -n "$proxy_arp" ] && append bss_conf "proxy_arp=$proxy_arp" "$N" | ||||
| 	[ -n "$multicast_to_unicast" ] && append bss_conf "multicast_to_unicast=$multicast_to_unicast" "$N" | ||||
|  | ||||
| 	[ "$tdls_prohibit" -gt 0 ] && append bss_conf "tdls_prohibit=$tdls_prohibit" "$N" | ||||
|  | ||||
| 	[ "$wpa" -gt 0 ] && { | ||||
| @@ -529,11 +548,11 @@ hostapd_set_bss_options() { | ||||
| 	} | ||||
|  | ||||
| 	case "$auth_type" in | ||||
| 		sae|owe|eap192|eap-eap192) | ||||
| 		sae|owe|eap192|eap-eap192|eap-only) | ||||
| 			set_default ieee80211w 2 | ||||
| 			set_default sae_require_mfp 1 | ||||
| 		;; | ||||
| 		psk-sae) | ||||
| 		psk-sae|eap-transition) | ||||
| 			set_default ieee80211w 1 | ||||
| 			set_default sae_require_mfp 1 | ||||
| 		;; | ||||
| @@ -575,7 +594,7 @@ hostapd_set_bss_options() { | ||||
| 			vlan_possible=1 | ||||
| 			wps_possible=1 | ||||
| 		;; | ||||
| 		eap|eap192|eap-eap192) | ||||
| 		eap|eap192|eap-eap192|eap-only|eap-transition) | ||||
| 			json_get_vars \ | ||||
| 				auth_server auth_secret auth_port \ | ||||
| 				dae_client dae_secret dae_port \ | ||||
| @@ -791,7 +810,15 @@ hostapd_set_bss_options() { | ||||
| 				json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout | ||||
| 				append bss_conf "ieee80211w=$ieee80211w" "$N" | ||||
| 				[ "$ieee80211w" -gt "0" ] && { | ||||
| 					append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N" | ||||
| 					case "$auth_type" in | ||||
| 						eap192) | ||||
| 							append bss_conf "group_mgmt_cipher=BIP-GMAC-256" "$N" | ||||
| 							append bss_conf "group_cipher=GCMP-256" "$N" | ||||
| 						;; | ||||
| 						*) | ||||
| 							append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N" | ||||
| 						;; | ||||
| 					esac | ||||
| 					[ -n "$ieee80211w_max_timeout" ] && \ | ||||
| 						append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N" | ||||
| 					[ -n "$ieee80211w_retry_timeout" ] && \ | ||||
| @@ -871,16 +898,15 @@ hostapd_set_bss_options() { | ||||
| 	set_default access_network_type 0 | ||||
| 	set_default venue_group 0 | ||||
| 	set_default venue_type 0 | ||||
| 	set_default ipaddr_type_availability 0 | ||||
| 	set_default gas_address3 0 | ||||
| 	set_default hs20_deauth_req_timeout 60 | ||||
| 	if [ "$hs20" = "1" ]; then | ||||
| 		append bss_conf "hs20=1" "$N" | ||||
| 		append_hs20_icons | ||||
| 		[ -n "$disable_dgaf"] && append bss_conf "disable_dgaf=$disable_dgaf" "$N" | ||||
| 		[ -n "$osen"] && append bss_conf "osen=$osen" "$N" | ||||
| 		[ -n "$disable_dgaf" ] && append bss_conf "disable_dgaf=$disable_dgaf" "$N" | ||||
| 		[ -n "$osen" ] && append bss_conf "osen=$osen" "$N" | ||||
| 		[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N" | ||||
| 		[ -n "$hs20_deauth_req_timeout"] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N" | ||||
| 		[ -n "$hs20_deauth_req_timeout" ] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N" | ||||
| 		[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N" | ||||
| 		[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N" | ||||
| 		[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N" | ||||
| @@ -903,7 +929,7 @@ hostapd_set_bss_options() { | ||||
| 		[ "$uesa" -gt 0 ] && append bss_conf "uesa=$uesa" "$N" | ||||
| 		[ "$venue_group" -gt 0 ] && append bss_conf "venue_group=$venue_group" "$N" | ||||
| 		[ "$venue_type" -gt 0 ] && append bss_conf "venue_type=$venue_type" "$N" | ||||
| 		[ "$ipaddr_type_availability" -gt 0 ] && append bss_conf "ipaddr_type_availability=$ipaddr_type_availability" "$N" | ||||
| 		[ -n "$ipaddr_type_availability" ] && append bss_conf "ipaddr_type_availability=$ipaddr_type_availability" "$N" | ||||
| 		[ "$gas_address3" -gt 0 ] && append bss_conf "gas_address3=$gas_address3" "$N" | ||||
| 		[ -n "$hessid" ] && append bss_conf "hessid=$hessid" "$N" | ||||
| 		[ -n "$network_auth_type" ] && append bss_conf "network_auth_type=$network_auth_type" "$N" | ||||
|   | ||||
| @@ -1,7 +1,5 @@ | ||||
| Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c | ||||
| =================================================================== | ||||
| --- hostapd-2020-06-08-5a8b3662.orig/src/ap/dfs.c | ||||
| +++ hostapd-2020-06-08-5a8b3662/src/ap/dfs.c | ||||
| --- a/src/ap/dfs.c | ||||
| +++ b/src/ap/dfs.c | ||||
| @@ -18,7 +18,7 @@ | ||||
|  #include "drivers/driver.h" | ||||
|  #include "dfs.h" | ||||
| @@ -23,10 +21,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c | ||||
|  	if (err) { | ||||
|  		wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback", | ||||
|  			   err); | ||||
| Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
| =================================================================== | ||||
| --- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.c | ||||
| +++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
| --- a/src/ap/ubus.c | ||||
| +++ b/src/ap/ubus.c | ||||
| @@ -29,6 +29,8 @@ static int ctx_ref; | ||||
|  static char** bss_lst = NULL; | ||||
|  static size_t bss_nr = 0; | ||||
| @@ -36,7 +32,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
|  static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj) | ||||
|  { | ||||
|  	return container_of(obj, struct hapd_interfaces, ubus); | ||||
| @@ -714,6 +716,43 @@ static int hostapd_sessions(struct ubus_ | ||||
| @@ -714,6 +716,44 @@ static int hostapd_sessions(struct ubus_ | ||||
|  	return 0; | ||||
|  } | ||||
|   | ||||
| @@ -48,7 +44,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
| +{ | ||||
| +	void *a = NULL; | ||||
| +	void *t = NULL; | ||||
| +	struct hostapd_chan_event_list *entry; | ||||
| +	struct hostapd_chan_event_list *entry, *tmp; | ||||
| + | ||||
| +	blob_buf_init(&b_ev, 0); | ||||
| +	a = blobmsg_open_table(&b_ev, "chan_switch_event"); | ||||
| @@ -68,9 +64,10 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
| +	/*delete list*/ | ||||
| + | ||||
| +	if (!list_empty(&chan_events)) { | ||||
| +	list_for_each_entry(entry, &chan_events, list) | ||||
| +	list_for_each_entry_safe(entry, tmp, &chan_events, list) | ||||
| +		{ | ||||
| +			list_del(&entry->list); | ||||
| +			free(entry); | ||||
| +		} | ||||
| +	} | ||||
| + | ||||
| @@ -80,7 +77,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
|  static int | ||||
|  hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj, | ||||
|  		    struct ubus_request_data *req, const char *method, | ||||
| @@ -749,6 +788,9 @@ hostapd_switch_chan(struct ubus_context | ||||
| @@ -749,6 +789,9 @@ hostapd_switch_chan(struct ubus_context | ||||
|   | ||||
|  	if (hostapd_switch_channel(hapd, &css) != 0) | ||||
|  		return UBUS_STATUS_NOT_SUPPORTED; | ||||
| @@ -90,7 +87,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
|  	return UBUS_STATUS_OK; | ||||
|  #undef SET_CSA_SETTING | ||||
|  } | ||||
| @@ -1444,6 +1486,7 @@ static const struct ubus_method daemon_m | ||||
| @@ -1444,6 +1487,7 @@ static const struct ubus_method daemon_m | ||||
|  	UBUS_METHOD("config_add", hostapd_config_add, config_add_policy), | ||||
|  	UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy), | ||||
|  	UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list), | ||||
| @@ -98,7 +95,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
|  }; | ||||
|   | ||||
|  static struct ubus_object_type daemon_object_type = | ||||
| @@ -1507,6 +1550,28 @@ ubus_event_cb(struct ubus_notify_request | ||||
| @@ -1507,6 +1551,28 @@ ubus_event_cb(struct ubus_notify_request | ||||
|  	ureq->resp = ret; | ||||
|  } | ||||
|   | ||||
| @@ -127,10 +124,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c | ||||
|  int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd, | ||||
|  				 struct hostapd_ubus_request *req) | ||||
|  { | ||||
| Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.h | ||||
| =================================================================== | ||||
| --- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.h | ||||
| +++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.h | ||||
| --- a/src/ap/ubus.h | ||||
| +++ b/src/ap/ubus.h | ||||
| @@ -17,9 +17,15 @@ enum hostapd_ubus_event_type { | ||||
|  	HOSTAPD_UBUS_DEAUTH_REQ, | ||||
|  	HOSTAPD_UBUS_FDATA_REQ, | ||||
|   | ||||
| @@ -0,0 +1,23 @@ | ||||
| --- a/src/ap/ubus.c | ||||
| +++ b/src/ap/ubus.c | ||||
| @@ -762,6 +762,7 @@ hostapd_switch_chan(struct ubus_context | ||||
|  	struct blob_attr *tb[__CSA_MAX]; | ||||
|  	struct hostapd_data *hapd = get_hapd_from_object(obj); | ||||
|  	struct csa_settings css; | ||||
| +	int i; | ||||
|   | ||||
|  	blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg)); | ||||
|   | ||||
| @@ -787,8 +788,10 @@ hostapd_switch_chan(struct ubus_context | ||||
|  	SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool); | ||||
|   | ||||
|   | ||||
| -	if (hostapd_switch_channel(hapd, &css) != 0) | ||||
| -		return UBUS_STATUS_NOT_SUPPORTED; | ||||
| +	for (i = 0; i < hapd->iface->num_bss; i++) { | ||||
| +		if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0) | ||||
| +			return UBUS_STATUS_NOT_SUPPORTED; | ||||
| +	} | ||||
|   | ||||
|  	hostapd_ubus_handle_channel_switch_event(hapd->iface,HOSTAPD_UBUS_HIGH_INTERFERENCE,  css.freq_params.freq); | ||||
|   | ||||
| @@ -0,0 +1,28 @@ | ||||
| Index: hostapd-2020-06-08-5a8b3662/src/ap/ieee802_11.c | ||||
| =================================================================== | ||||
| --- hostapd-2020-06-08-5a8b3662.orig/src/ap/ieee802_11.c | ||||
| +++ hostapd-2020-06-08-5a8b3662/src/ap/ieee802_11.c | ||||
| @@ -3675,6 +3675,13 @@ static int add_associated_sta(struct hos | ||||
|  	 * drivers to accept the STA parameter configuration. Since this is | ||||
|  	 * after a new FT-over-DS exchange, a new TK has been derived, so key | ||||
|  	 * reinstallation is not a concern for this case. | ||||
| +	 * | ||||
| +	 * If the STA was associated and authorized earlier, but came for a new | ||||
| +	 * connection (!added_unassoc + !reassoc), remove the existing STA entry | ||||
| +	 * so that it can be re-added. This case is rarely seen when the AP could | ||||
| +	 * not receive the deauth/disassoc frame from the STA. And the STA comes | ||||
| +	 * back with new connection within a short period or before the inactive | ||||
| +	 * STA entry is removed from the list. | ||||
|  	 */ | ||||
|  	wpa_printf(MSG_DEBUG, "Add associated STA " MACSTR | ||||
|  		   " (added_unassoc=%d auth_alg=%u ft_over_ds=%u reassoc=%d authorized=%d ft_tk=%d fils_tk=%d)", | ||||
| @@ -3688,7 +3695,8 @@ static int add_associated_sta(struct hos | ||||
|  	    (!(sta->flags & WLAN_STA_AUTHORIZED) || | ||||
|  	     (reassoc && sta->ft_over_ds && sta->auth_alg == WLAN_AUTH_FT) || | ||||
|  	     (!wpa_auth_sta_ft_tk_already_set(sta->wpa_sm) && | ||||
| -	      !wpa_auth_sta_fils_tk_already_set(sta->wpa_sm)))) { | ||||
| +	      !wpa_auth_sta_fils_tk_already_set(sta->wpa_sm)) || | ||||
| +	     (!reassoc && (sta->flags & WLAN_STA_AUTHORIZED)))) { | ||||
|  		hostapd_drv_sta_remove(hapd, sta->addr); | ||||
|  		wpa_auth_sm_event(sta->wpa_sm, WPA_DRV_STA_REMOVED); | ||||
|  		set = 0; | ||||
							
								
								
									
										32
									
								
								feeds/wifi-trunk/hostapd/patches/904-fix-ubus-assoc.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								feeds/wifi-trunk/hostapd/patches/904-fix-ubus-assoc.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,32 @@ | ||||
| --- a/src/ap/ieee802_11.c | ||||
| +++ b/src/ap/ieee802_11.c | ||||
| @@ -4463,6 +4463,14 @@ static void handle_assoc(struct hostapd_ | ||||
|  			ieee802_11_set_beacons(hapd->iface); | ||||
|  	} | ||||
|   | ||||
| +	ubus_resp = hostapd_ubus_handle_event(hapd, &req); | ||||
| +	if (ubus_resp) { | ||||
| +		wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n", | ||||
| +		       MAC2STR(mgmt->sa)); | ||||
| +		resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE; | ||||
| +		goto fail; | ||||
| +	} | ||||
| + | ||||
|  	update_ht_state(hapd, sta); | ||||
|   | ||||
|  	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211, | ||||
| @@ -4568,14 +4576,6 @@ static void handle_assoc(struct hostapd_ | ||||
|  					    pos, left, rssi, omit_rsnxe); | ||||
|  	os_free(tmp); | ||||
|   | ||||
| -	ubus_resp = hostapd_ubus_handle_event(hapd, &req); | ||||
| -	if (ubus_resp) { | ||||
| -		wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n", | ||||
| -		       MAC2STR(mgmt->sa)); | ||||
| -		resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE; | ||||
| -		goto fail; | ||||
| -	} | ||||
| - | ||||
|  	/* | ||||
|  	 * Remove the station in case tranmission of a success response fails | ||||
|  	 * (the STA was added associated to the driver) or if the station was | ||||
| @@ -11,7 +11,7 @@ include $(INCLUDE_DIR)/package.mk | ||||
|  | ||||
| define Package/apc | ||||
|   SECTION:=base | ||||
|   DEPENDS:=+libev +libinterapcomm | ||||
|   DEPENDS:=+libev +libinterapcomm +libubus +libubox | ||||
|   CATEGORY:=Base system | ||||
|   TITLE:=Access Point Coordinator | ||||
| endef | ||||
| @@ -33,5 +33,11 @@ endef | ||||
| define Package/apc/install | ||||
| 	$(INSTALL_DIR) $(1)/usr/bin | ||||
| 	$(INSTALL_DATA) $(PKG_BUILD_DIR)/apc $(1)/usr/bin | ||||
| 	chmod 0700 $(1)/usr/bin/apc | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/apc.init $(1)/etc/init.d/apc | ||||
| 	$(INSTALL_DIR) $(1)/etc/config | ||||
| 	$(INSTALL_BIN) ./files/apc.config $(1)/etc/config/apc | ||||
|  | ||||
| endef | ||||
| $(eval $(call BuildPackage,apc)) | ||||
|   | ||||
							
								
								
									
										0
									
								
								feeds/wlan-ap/apc/files/apc.config
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								feeds/wlan-ap/apc/files/apc.config
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										20
									
								
								feeds/wlan-ap/apc/files/apc.init
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								feeds/wlan-ap/apc/files/apc.init
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,20 @@ | ||||
| #!/bin/sh /etc/rc.common | ||||
|  | ||||
| USE_PROCD=1 | ||||
| START=40 | ||||
| STOP=40 | ||||
|  | ||||
| PROG="/usr/bin/apc" | ||||
|  | ||||
| start_service() { | ||||
|     procd_open_instance | ||||
|     echo "Starting APC" | ||||
|     procd_set_param command ${PROG} | ||||
|     procd_set_param respawn | ||||
|     procd_close_instance | ||||
| } | ||||
|  | ||||
| stop_service() { | ||||
|     echo "Killing APC" | ||||
|     killall -s SIGTERM apc | ||||
| } | ||||
| @@ -3,19 +3,21 @@ srcdir ?= . | ||||
| VPATH ?= $(srcdir)/src | ||||
|  | ||||
|  | ||||
| LIBS = -lpthread -lrt -linterapcomm -lev | ||||
| LIBS = -lpthread -lrt -linterapcomm -lev -lubus -lubox | ||||
| $(call output,usr/sbin/wc-apc) | ||||
|  | ||||
| CFLAGS += -I./include/ \ | ||||
| 	-I../include/ | ||||
|  | ||||
| CFLAGS += -DUBUS_SUPPORT | ||||
|  | ||||
| CFLAGS  += -Wall -g | ||||
| CFLAGS += -MMD -Wall -g -Wpointer-arith -Wcast-qual -Wshadow \ | ||||
| 				-Waggregate-return -Wnested-externs -Wstrict-prototypes \ | ||||
| 				-fno-omit-frame-pointer -g -rdynamic -fexceptions -funwind-tables -funsigned-char | ||||
|  | ||||
| OBJS := apc_main.o \ | ||||
|                hello.o iface.o neighbor.o apc.o | ||||
|                hello.o iface.o neighbor.o apc.o ubus.o | ||||
|  | ||||
| all: apc | ||||
|  | ||||
|   | ||||
| @@ -262,6 +262,8 @@ struct apc_neighbor | ||||
| #define APC_IS_DROTHER 4   /* I'm on BCAST or NBMA and I'm not DR */ | ||||
| #define APC_IS_BACKUP  5   /* I'm BDR */ | ||||
| #define APC_IS_DR      6   /* I'm DR */ | ||||
| #define APC_MAX_MODE   7 | ||||
|  | ||||
|  | ||||
| /* Definitions for interface state machine */ | ||||
| #define ISM_UP      0   /* Interface Up */ | ||||
|   | ||||
| @@ -30,4 +30,9 @@ static inline timer * tm_new_set( void (*hook)(struct _timer *), void *data, uns | ||||
|     return t; | ||||
| } | ||||
|  | ||||
| static inline void tm_free(timer *t) | ||||
| { | ||||
|     free(t); | ||||
| } | ||||
|  | ||||
| #endif | ||||
|   | ||||
							
								
								
									
										22
									
								
								feeds/wlan-ap/apc/src/include/ubus.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										22
									
								
								feeds/wlan-ap/apc/src/include/ubus.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,22 @@ | ||||
| /* | ||||
|  * netifd - network interface daemon | ||||
|  * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org> | ||||
|  * | ||||
|  * This program is free software; you can redistribute it and/or modify | ||||
|  * it under the terms of the GNU General Public License version 2 | ||||
|  * as published by the Free Software Foundation | ||||
|  * | ||||
|  * This program is distributed in the hope that it will be useful, | ||||
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||
|  * GNU General Public License for more details. | ||||
|  */ | ||||
| #ifndef __NETIFD_UBUS_H | ||||
| #define __NETIFD_UBUS_H | ||||
|  | ||||
| extern struct ubus_context *ubus_ctx; | ||||
|  | ||||
| int ubus_init(); | ||||
| void ubus_done(void); | ||||
|  | ||||
| #endif | ||||
| @@ -26,7 +26,8 @@ static void apc_dump( struct proto * P ) | ||||
| static struct proto * apc_init(struct proto_config * c) | ||||
| { | ||||
| 	struct proto * P = mb_allocz(sizeof(struct apc_proto)); | ||||
| 	 | ||||
|  | ||||
| 	printf("apc_init\n"); | ||||
| 	P->cf = c; | ||||
| 	P->debug = c->debug; | ||||
| 	P->mrtdump = c->mrtdump; | ||||
|   | ||||
| @@ -21,9 +21,11 @@ | ||||
| #include <nest/apcn.h> | ||||
| #include <apc.h> | ||||
| #include <protocol.h> | ||||
| #include <ubus.h> | ||||
|  | ||||
| static ev_io iac_io; | ||||
| static ev_timer  check_timer; | ||||
| #include <libubus.h> | ||||
| static struct uloop_timeout check_timer; | ||||
| static void check_timer_handler(struct uloop_timeout *timeout); | ||||
| static unsigned int CheckIp; | ||||
| static int CheckCount; | ||||
|  | ||||
| @@ -228,8 +230,7 @@ int set_socket(void) | ||||
| /*************************************/ | ||||
|  | ||||
|  | ||||
| static void check_timer_handler(struct ev_loop *loop, ev_timer *timer, | ||||
| 				 int revents)  | ||||
| static void check_timer_handler(struct uloop_timeout *timeout) | ||||
| { | ||||
| 	timers_go(); | ||||
| 	if (WaitingToReelect) | ||||
| @@ -252,29 +253,56 @@ static void check_timer_handler(struct ev_loop *loop, ev_timer *timer, | ||||
| 		if (CheckIp && (MyIpAddr != CheckIp)) | ||||
| 		{ | ||||
| 			printf("IP address changed from %x to %x - restart APC election\n", MyIpAddr, CheckIp); | ||||
| 			system("/usr/opensync/bin/ovsh u APC_State dr_addr:=0.0.0.0 bdr_addr:=0.0.0.0 enabled:=false mode:=NC"); | ||||
| 			uloop_done(); | ||||
| 			ubus_done(); | ||||
| 			interap_rcv_close(); | ||||
| 			exit(0); | ||||
| 		} | ||||
| 		 | ||||
| 		CheckCount = 0; | ||||
| 		if (ApcSpecSaved.IsApc == I_AM_APC) | ||||
| 		{ | ||||
| 		//Radius stuff | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	uloop_timeout_set(&check_timer, 1000); | ||||
| 	uloop_timeout_add(&check_timer); | ||||
|  | ||||
| } | ||||
|  | ||||
| static void handle_signal(int signo) | ||||
| { | ||||
| 	uloop_done(); | ||||
| 	ubus_done(); | ||||
| 	interap_rcv_close(); | ||||
| 	system("/usr/opensync/bin/ovsh u APC_State dr_addr:=0.0.0.0 bdr_addr:=0.0.0.0 enabled:=false mode:=NC"); | ||||
| } | ||||
|  | ||||
| static void set_signals(void) | ||||
| { | ||||
| 	struct sigaction s; | ||||
|  | ||||
| 	memset(&s, 0, sizeof(s)); | ||||
| 	s.sa_handler = handle_signal; | ||||
| 	s.sa_flags = 0; | ||||
| 	sigaction(SIGINT, &s, NULL); | ||||
| 	sigaction(SIGTERM, &s, NULL); | ||||
| 	sigaction(SIGPIPE, &s, NULL); | ||||
| } | ||||
|  | ||||
| extern struct ubus_context *ubus_ctx; | ||||
|  | ||||
| int main(int argc, char *const* argv) | ||||
| { | ||||
| 	struct proto_config c; | ||||
| 	struct proto * apc_proto; | ||||
| 	struct ev_loop *loop = EV_DEFAULT; | ||||
| 	uloop_init(); | ||||
| 	/*init term signals*/ | ||||
| 	set_signals(); | ||||
|  | ||||
| 	/*Socket*/ | ||||
| 	set_socket(); | ||||
|  | ||||
| 	/*Radius stuff*/ | ||||
|  | ||||
| 	printf("Basic MAC\n"); | ||||
| 	memset(MyBasicMac, 0, 6); | ||||
| 	if (get_mac_addr("br-wan", MyBasicMac) == 0) { | ||||
| 		printf("APC: br-wan mac:%02X:%02X:%02X:%02X:%02X:%02X\n", | ||||
| @@ -291,6 +319,7 @@ int main(int argc, char *const* argv) | ||||
|  | ||||
| 	/*get local ip of br-wan*/ | ||||
| 	MyIpAddr = 0; | ||||
| 	printf("Getting br-wan IP\n"); | ||||
| 	while(1) | ||||
| 	{ | ||||
| 		GetLocalIpv4Addr((unsigned char *)&MyIpAddr, "br-wan"); | ||||
| @@ -303,9 +332,13 @@ int main(int argc, char *const* argv) | ||||
|  | ||||
| 	/*listening interAP*/ | ||||
| 	callback cb = receive_from_socket; | ||||
|  | ||||
| 	if (interap_recv(IAC_APC_ELECTION_PORT, cb, 1000, | ||||
| 			 loop, &iac_io) < 0) | ||||
| 			 NULL, NULL) < 0) { | ||||
| 		printf("Error: Failed InterAP receive"); | ||||
| 		return 1; | ||||
| 	} | ||||
|  | ||||
|  | ||||
| 	memset(Timers, 0, sizeof(Timers)); | ||||
| 	 | ||||
| @@ -319,11 +352,15 @@ int main(int argc, char *const* argv) | ||||
| 	ApcProto = (struct apc_proto *)apc_proto; | ||||
| 	proto_apc.start(apc_proto); | ||||
|  | ||||
| 	ev_timer_init(&check_timer, check_timer_handler, 1, 1); | ||||
| 	check_timer.cb = check_timer_handler; | ||||
| 	uloop_timeout_set(&check_timer, 1000); | ||||
| 	uloop_timeout_add(&check_timer); | ||||
|  | ||||
| 	ev_timer_start(loop, &check_timer); | ||||
|  | ||||
| 	ev_run(loop, 0); | ||||
| 	ubus_init(); | ||||
| 	uloop_run(); | ||||
| 	uloop_done(); | ||||
| 	ubus_done(); | ||||
| 	interap_rcv_close(); | ||||
|  | ||||
| 	return(1); | ||||
| } | ||||
|   | ||||
| @@ -103,6 +103,7 @@ void apc_send_hello(struct apc_iface * ifa, int kind ) | ||||
| 	struct apc_hello2_packet ps; | ||||
| 	unsigned int length, report = 0; | ||||
| 	struct apc_spec ApcSpec; | ||||
| 	char dst_ip[16]; | ||||
| 	 | ||||
| 	if (WaitingToReelect ) | ||||
| 		return; | ||||
| @@ -188,8 +189,11 @@ void apc_send_hello(struct apc_iface * ifa, int kind ) | ||||
| 			else | ||||
| 				ApcSpec.FloatIp = ApcSpecSaved.FloatIp; | ||||
| 		} | ||||
| 		else | ||||
| 		else if (ApcSpec.IsApc == I_AM_BAPC ) | ||||
| 		{ | ||||
| 			ifa->priority = 0x12; | ||||
| 		} | ||||
| 		else { | ||||
| 			ifa->priority = 0x11; | ||||
| 			if ((ApcSpecSaved.IsApc == I_AM_APC) || BackingUpRadius ) | ||||
| 			{ | ||||
| @@ -202,8 +206,7 @@ void apc_send_hello(struct apc_iface * ifa, int kind ) | ||||
|  | ||||
| 	length += i * sizeof(u32); | ||||
|  | ||||
| 	printf("HELLO packet sent via %s\n", ifa->ifname ); | ||||
| 	char *dst_ip = malloc(16); | ||||
| 	printf("HELLO packet sent via  %s\n", ifa->ifname ); | ||||
| 	memset(dst_ip, 0, 16); | ||||
| 	if ((get_current_ip(dst_ip, IAC_IFACE)) < 0) { | ||||
| 		printf("Error: Cannot get IP for %s", IAC_IFACE); | ||||
|   | ||||
| @@ -65,7 +65,7 @@ void apc_iface_chstate(struct apc_iface * ifa, u8 state) | ||||
| 	 | ||||
| 	if (state == oldstate) | ||||
| 		return; | ||||
| 	 | ||||
|  | ||||
| 	printf("Interface %s changed state from %s to %s\n", | ||||
| 		ifa->ifname, apc_is_names[oldstate], apc_is_names[state]); | ||||
| 	 | ||||
| @@ -168,7 +168,7 @@ void apc_iface_new( void ) | ||||
| 	ifa->priority = 0x11; | ||||
| 	ifa->drip = MyIpAddr; | ||||
| 	ifa->helloint = 4; | ||||
| 	ifa->deadint = 16; | ||||
| 	ifa->deadint = 12; | ||||
| 	ifa->waitint = 16; | ||||
| 	 | ||||
| 	ifa->type = APC_IT_BCAST; | ||||
|   | ||||
| @@ -33,11 +33,10 @@ reset_lists(struct apc_proto *p, struct apc_neighbor *n) | ||||
| { | ||||
| } | ||||
|  | ||||
|  | ||||
| struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa) | ||||
| { | ||||
| 	struct apc_neighbor * n = mb_allocz(sizeof(struct apc_neighbor)); | ||||
| 	 | ||||
| 	printf("apc_new_neighbor\n");	 | ||||
| 	n->ifa = ifa; | ||||
| 	add_tail(&ifa->neigh_list, NODE n); | ||||
| 	n->adj = 0; | ||||
| @@ -52,7 +51,6 @@ struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa) | ||||
| 	return(n); | ||||
| } | ||||
|  | ||||
|  | ||||
| static void apc_neigh_down(struct apc_neighbor * n) | ||||
| { | ||||
| 	struct apc_iface * ifa = n->ifa; | ||||
| @@ -60,9 +58,10 @@ static void apc_neigh_down(struct apc_neighbor * n) | ||||
| 	rem_node(NODE n); | ||||
| 	 | ||||
| 	printf("Neighbor %x on %s removed", n->rid, ifa->ifname ); | ||||
| 	tm_free(n->inactim); | ||||
| 	mb_free(n); | ||||
| } | ||||
|  | ||||
|  | ||||
| /** | ||||
|  * apc_neigh_chstate - handles changes related to new or lod state of neighbor | ||||
|  * @n: APC neighbor | ||||
| @@ -81,7 +80,8 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state) | ||||
| 		return; | ||||
| 	 | ||||
| 	printf("Neighbor %x on %s changed state from %s to %s\n", | ||||
| 	                n->rid, ifa->ifname, apc_ns_names[old_state], apc_ns_names[state] ); | ||||
| 	                n->rid, ifa->ifname, apc_ns_names[old_state], | ||||
| 			apc_ns_names[state]); | ||||
| 	 | ||||
| 	n->state = state; | ||||
|  | ||||
| @@ -121,7 +121,6 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state) | ||||
| 		apc_iface_sm(ifa, ISM_NEICH); | ||||
| } | ||||
|  | ||||
|  | ||||
| /** | ||||
|  * apc_neigh_sm - apc neighbor state machine | ||||
|  * @n: neighor | ||||
| @@ -218,7 +217,6 @@ void apc_neigh_sm(struct apc_neighbor * n, int event) | ||||
| 	} | ||||
| } | ||||
|  | ||||
|  | ||||
| static int can_do_adj(struct apc_neighbor * n) | ||||
| { | ||||
| 	struct apc_iface * ifa = n->ifa; | ||||
| @@ -257,13 +255,11 @@ static int can_do_adj(struct apc_neighbor * n) | ||||
| 	return i; | ||||
| } | ||||
|  | ||||
|  | ||||
| static inline u32 neigh_get_id(struct apc_proto *p, struct apc_neighbor *n) | ||||
| { | ||||
| 	return ipa_to_u32(n->ip); | ||||
| } | ||||
|  | ||||
|  | ||||
| static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl) | ||||
| { | ||||
|     struct apc_neighbor *neigh, *n1, *n2; | ||||
| @@ -271,7 +267,7 @@ static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl) | ||||
|  | ||||
|     n1 = NULL; | ||||
|     n2 = NULL; | ||||
|     WALK_LIST( neigh, nl )                      /* First try those decl. themselves */ | ||||
|     WALK_LIST( neigh, nl )                /* First try those decl. themselves */ | ||||
|     { | ||||
|         nid = neigh_get_id( p, neigh ); | ||||
|  | ||||
| @@ -317,7 +313,6 @@ static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl) | ||||
|     return( n1 ); | ||||
| } | ||||
|  | ||||
|  | ||||
| static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl ) | ||||
| { | ||||
|     struct apc_neighbor *neigh, *n; | ||||
| @@ -351,7 +346,6 @@ static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl ) | ||||
|     return( n ); | ||||
| } | ||||
|  | ||||
|  | ||||
| /** | ||||
|  * apc_dr_election - (Backup) Designed Router election | ||||
|  * @ifa: actual interface | ||||
| @@ -450,7 +444,6 @@ void apc_dr_election(struct apc_iface * ifa) | ||||
| 	} | ||||
| } | ||||
|  | ||||
|  | ||||
| struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip) | ||||
| { | ||||
| 	struct apc_neighbor * n; | ||||
| @@ -463,7 +456,6 @@ struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip) | ||||
| 	return NULL; | ||||
| } | ||||
|  | ||||
|  | ||||
| static void inactivity_timer_hook(struct _timer * tmr) | ||||
| { | ||||
| 	struct apc_neighbor * n = (struct apc_neighbor *) tmr->data; | ||||
| @@ -490,13 +482,17 @@ static void inactivity_timer_hook(struct _timer * tmr) | ||||
| 			n_neigh += 1; | ||||
| 			//Radius stuff | ||||
| 			BackingUpRadius = 1; | ||||
| 			apc_ifa->priority = 0x33; | ||||
| 		} | ||||
| 		else | ||||
| 			apc_ifa->priority = 0x11; | ||||
|  | ||||
|  | ||||
| 		apc_ifa->drip = MyIpAddr; | ||||
| 		apc_ifa->priority = 0x11; | ||||
| 		apc_ifa->bdrip = 0; | ||||
| 		memset(&ApcSpec, 0, sizeof(struct apc_spec)); | ||||
| 		WaitingToReelect = 12; | ||||
| 		WaitingToReelect = 3; | ||||
|  | ||||
| 		return; | ||||
| 	} | ||||
| 	printf("Inactivity timer expired for nbr %x on %s", n->rid,  | ||||
|   | ||||
							
								
								
									
										211
									
								
								feeds/wlan-ap/apc/src/src/ubus.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										211
									
								
								feeds/wlan-ap/apc/src/src/ubus.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,211 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
| #define _GNU_SOURCE | ||||
|  | ||||
| #include <arpa/inet.h> | ||||
| #include <string.h> | ||||
| #include <stdio.h> | ||||
| #include <ev.h> | ||||
| #include "ubus.h" | ||||
| #include <libubus.h> | ||||
| #include <libubox/blobmsg.h> | ||||
| #include <apc.h> | ||||
| #include <libubox/uloop.h> | ||||
|  | ||||
| struct ubus_context *ubus_ctx = NULL; | ||||
| static struct blob_buf b; | ||||
| static struct blob_buf nb; | ||||
| timer *notify_timer; | ||||
| extern struct apc_iface * apc_ifa; | ||||
| /* Mandatorily Notify APC_State period */ | ||||
| #define APC_NOTIFY_INTERVAL 10 | ||||
| /* Check if any change in APC State and notify period */ | ||||
| #define APC_NOTIFY_CHECK 1 | ||||
| static ip_addr old_drip; | ||||
| static ip_addr old_bdrip; | ||||
| static u8 old_state; | ||||
| static unsigned int ucount = 0; | ||||
|  | ||||
| struct apc_state { | ||||
| 	char mode[4]; | ||||
| 	char dr_addr[17]; | ||||
| 	char bdr_addr[17]; | ||||
| 	bool enabled; | ||||
| } state; | ||||
|  | ||||
| static int | ||||
| apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj, | ||||
| 			  struct ubus_request_data *req, const char *method, | ||||
| 			  struct blob_attr *msg); | ||||
|  | ||||
| static void ubus_reconnect_timer(struct uloop_timeout *timeout); | ||||
| static struct uloop_timeout reconnect = { | ||||
| 	.cb = ubus_reconnect_timer, | ||||
| }; | ||||
|  | ||||
| static void ubus_reconnect_timer(struct uloop_timeout *timeout) | ||||
| { | ||||
|         if (ubus_reconnect(ubus_ctx, NULL) != 0) { | ||||
|                 printf("APC ubus failed to reconnect\n"); | ||||
|                 uloop_timeout_set(&reconnect, 2000); | ||||
|                 return; | ||||
|         } | ||||
|  | ||||
|         printf("APC ubus reconnected\n"); | ||||
| #ifdef FD_CLOEXEC | ||||
| 	fcntl(ubus_ctx->sock.fd, F_SETFD, | ||||
| 	      fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC); | ||||
| #endif | ||||
| } | ||||
|  | ||||
| static void ubus_connection_lost(struct ubus_context *ctx) | ||||
| { | ||||
| 	printf("APC ubus connection lost\n"); | ||||
|         ubus_reconnect_timer(NULL); | ||||
| } | ||||
|  | ||||
| static const struct blobmsg_policy apc_policy = { | ||||
| 	.name = "info", | ||||
| 	.type = BLOBMSG_TYPE_STRING, | ||||
| }; | ||||
|  | ||||
| static struct ubus_method apc_object_methods[] = { | ||||
| 	UBUS_METHOD_NOARG("info", apc_info_handle), | ||||
| }; | ||||
|  | ||||
| static struct ubus_object_type apc_object_type = | ||||
| 	UBUS_OBJECT_TYPE("apc", apc_object_methods); | ||||
|  | ||||
| static struct ubus_object apc_object = { | ||||
| 	.name = "apc", | ||||
| 	.type = &apc_object_type, | ||||
| 	.methods = apc_object_methods, | ||||
| 	.n_methods = ARRAY_SIZE(apc_object_methods), | ||||
| }; | ||||
|  | ||||
| static int | ||||
| apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj, | ||||
| 			  struct ubus_request_data *req, const char *method, | ||||
| 			  struct blob_attr *msg) | ||||
| { | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	blobmsg_add_string(&b, "mode", state.mode); | ||||
| 	blobmsg_add_string(&b, "dr_addr", state.dr_addr); | ||||
| 	blobmsg_add_string(&b, "bdr_addr", state.bdr_addr); | ||||
| 	blobmsg_add_u8(&b, "enabled", state.enabled); | ||||
|  | ||||
| 	ubus_notify(ctx, &apc_object, "apc", b.head, -1); | ||||
| 	ubus_send_event(ctx, "apc", b.head); | ||||
| 	ubus_send_reply(ctx, req, b.head); | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| static char apc_mode[APC_MAX_MODE][8] = {"DOWN", "LOOP", "WT", "PTP", "OR", "BDR", "DR"}; | ||||
| int apc_update_state(void) | ||||
| { | ||||
| 	struct in_addr dr_addr; | ||||
| 	struct in_addr bdr_addr; | ||||
| 	ip_addr cur_drip; | ||||
| 	ip_addr cur_bdrip; | ||||
| 	u8 cur_state; | ||||
|  | ||||
| 	cur_drip = apc_ifa->drip; | ||||
| 	cur_bdrip = apc_ifa->bdrip; | ||||
| 	cur_state = apc_ifa->state; | ||||
| 	ucount++; | ||||
|  | ||||
| 	if (cur_drip == old_drip && | ||||
| 	    cur_bdrip == old_bdrip && | ||||
| 	    cur_state == old_state && ucount < APC_NOTIFY_INTERVAL) { | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	printf("APC State update %u", ucount); | ||||
| 	ucount = 0; | ||||
|  | ||||
| 	dr_addr.s_addr = htonl(cur_drip); | ||||
| 	bdr_addr.s_addr = htonl(cur_bdrip); | ||||
|  | ||||
| 	state.enabled = true; | ||||
| 	if ((cur_state == APC_IS_DR) || | ||||
| 	    (cur_state == APC_IS_BACKUP) || | ||||
| 	    (cur_state == APC_IS_DROTHER)) { | ||||
| 		snprintf(state.mode, sizeof(state.mode), "%s", | ||||
| 			 &apc_mode[cur_state][0]); | ||||
| 		snprintf(state.dr_addr, sizeof(state.dr_addr), | ||||
| 			 "%s", inet_ntoa(dr_addr)); | ||||
| 		snprintf(state.bdr_addr, sizeof(state.bdr_addr), | ||||
| 			 "%s", inet_ntoa(bdr_addr)); | ||||
| 	} else if (apc_ifa->state == APC_IS_WAITING) { | ||||
| 		snprintf(state.mode, sizeof(state.mode), "%s", | ||||
| 			 &apc_mode[cur_state][0]); | ||||
| 		snprintf(state.dr_addr, sizeof(state.dr_addr), "0.0.0.0"); | ||||
| 		snprintf(state.bdr_addr, sizeof(state.bdr_addr), "0.0.0.0"); | ||||
| 	} else { | ||||
| 		snprintf(state.mode, sizeof(state.mode), "NC"); | ||||
| 		snprintf(state.dr_addr, sizeof(state.dr_addr), "0.0.0.0"); | ||||
| 		snprintf(state.bdr_addr, sizeof(state.bdr_addr), "0.0.0.0"); | ||||
| 	} | ||||
|  | ||||
| 	old_drip = cur_drip; | ||||
| 	old_bdrip = cur_bdrip; | ||||
| 	old_state = cur_state; | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| void apc_send_notification(struct _timer * tmr) | ||||
| { | ||||
| 	int ustate = 0; | ||||
|  | ||||
| 	ustate = apc_update_state(); | ||||
| 	if(ustate != 0) | ||||
| 		return; | ||||
|  | ||||
| 	printf("APC send ubus notification\n"); | ||||
| 	blob_buf_init(&nb, 0); | ||||
| 	blobmsg_add_string(&nb, "mode", state.mode); | ||||
| 	blobmsg_add_string(&nb, "dr_addr", state.dr_addr); | ||||
| 	blobmsg_add_string(&nb, "bdr_addr", state.bdr_addr); | ||||
| 	blobmsg_add_u8(&nb, "enabled", state.enabled); | ||||
| 	ubus_notify(ubus_ctx, &apc_object, "apc", nb.head, -1); | ||||
| } | ||||
|  | ||||
| static void add_object(struct ubus_object *obj) | ||||
| { | ||||
| 	int ret = ubus_add_object(ubus_ctx, obj); | ||||
|  | ||||
| 	if (ret != 0) | ||||
| 		fprintf(stderr, "Add object fail '%s': %s\n", | ||||
| 			obj->name, ubus_strerror(ret)); | ||||
| } | ||||
|  | ||||
| int | ||||
| ubus_init(void) { | ||||
| 	ubus_ctx = ubus_connect(NULL); | ||||
| 	if (!ubus_ctx) | ||||
| 		return -EIO; | ||||
|  | ||||
| 	ubus_add_uloop(ubus_ctx); | ||||
| #ifdef FD_CLOEXEC | ||||
| 	fcntl(ubus_ctx->sock.fd, F_SETFD, | ||||
| 	      fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC); | ||||
| #endif | ||||
| 	add_object(&apc_object); | ||||
| 	notify_timer = tm_new_set(apc_send_notification, NULL, | ||||
| 				  0, APC_NOTIFY_CHECK); | ||||
| 	if (notify_timer) { | ||||
| 		printf("APC Start state check and notify timer\n"); | ||||
| 		tm_start(notify_timer, APC_NOTIFY_CHECK); | ||||
| 	} | ||||
|  | ||||
| 	ubus_ctx->connection_lost = ubus_connection_lost; | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| void | ||||
| ubus_done(void) | ||||
| { | ||||
| 	ubus_free(ubus_ctx); | ||||
| } | ||||
| @@ -11,6 +11,7 @@ include $(INCLUDE_DIR)/package.mk | ||||
|  | ||||
| define Package/libinterapcomm | ||||
|   SECTION:=libs | ||||
|   DEPENDS:=+libev +libubox +libubus | ||||
|   CATEGORY:=Libraries | ||||
|   TITLE:=Inter AP communication library | ||||
| endef | ||||
| @@ -29,5 +30,8 @@ endef | ||||
| define Package/libinterapcomm/install | ||||
| 	$(INSTALL_DIR) $(1)/usr/lib | ||||
| 	$(INSTALL_DATA) $(PKG_BUILD_DIR)/libinterapcomm.so $(1)/usr/lib/ | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/interap.init $(1)/etc/init.d/interap | ||||
|  | ||||
| endef | ||||
| $(eval $(call BuildPackage,libinterapcomm)) | ||||
|   | ||||
							
								
								
									
										35
									
								
								feeds/wlan-ap/interAPcomm/files/interap.init
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										35
									
								
								feeds/wlan-ap/interAPcomm/files/interap.init
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,35 @@ | ||||
| #!/bin/sh /etc/rc.common | ||||
|  | ||||
| START=12 | ||||
| STOP=12 | ||||
|  | ||||
| start() { | ||||
| 	apc=`cat /etc/config/firewall | grep Allow-APC` | ||||
| 	ucc=`cat /etc/config/firewall | grep Allow-UCC` | ||||
|  | ||||
| 	if [ -z "$apc" ]; then | ||||
| 		uci add firewall rule | ||||
| 		uci set firewall.@rule[-1].name='Allow-APC' | ||||
| 		uci set firewall.@rule[-1].src='wan' | ||||
| 		uci set firewall.@rule[-1].proto='udp' | ||||
| 		uci set firewall.@rule[-1].dst_port='50010' | ||||
| 		uci set firewall.@rule[-1].target='ACCEPT' | ||||
| 		uci set firewall.@rule[-1].family='ipv4' | ||||
| 		uci commit firewall | ||||
| 	fi | ||||
|  | ||||
| 	if [ -z "$ucc" ]; then | ||||
| 		uci add firewall rule | ||||
| 		uci set firewall.@rule[-1].name='Allow-UCC' | ||||
| 		uci set firewall.@rule[-1].src='wan' | ||||
| 		uci set firewall.@rule[-1].proto='udp' | ||||
| 		uci set firewall.@rule[-1].dst_port='50000' | ||||
| 		uci set firewall.@rule[-1].target='ACCEPT' | ||||
| 		uci set firewall.@rule[-1].family='ipv4' | ||||
| 		uci commit firewall | ||||
| 	fi | ||||
| } | ||||
|  | ||||
| stop() { | ||||
| 	echo stop | ||||
| } | ||||
| @@ -6,7 +6,7 @@ subdirs=src/test | ||||
|  | ||||
| CFLAGS += -O -Wall -Werror -Wshadow | ||||
| CFLAGS += -I./include/ | ||||
| LIBS = -lev | ||||
| LIBS = -lev -lubox -lubus | ||||
|  | ||||
| all: $(LIBNAME) $(subdirs) | ||||
|  | ||||
|   | ||||
| @@ -5,6 +5,7 @@ int interap_send(unsigned short port, char *dst_ip, | ||||
| int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), | ||||
| 		 unsigned int len, struct ev_loop *loop, | ||||
| 		 ev_io *io); | ||||
| void interap_rcv_close(void); | ||||
|  | ||||
| typedef int (*callback)(void *, ssize_t); | ||||
| typedef struct recv_arg { | ||||
|   | ||||
| @@ -7,12 +7,31 @@ | ||||
| #include <string.h> | ||||
| #include <unistd.h> | ||||
| #include <interAPcomm.h> | ||||
| #include <libubox/uloop.h> | ||||
|  | ||||
| /*Receiver socket*/ | ||||
| int recv_sock = -1; | ||||
|  | ||||
| recv_arg ra; | ||||
|  | ||||
| static void receive_data_uloop(struct uloop_fd *fd, unsigned int events) | ||||
| { | ||||
| 	void *recv_data; | ||||
| 	ssize_t recv_data_len; | ||||
|  | ||||
| 	recv_data = malloc(ra.len); | ||||
| 	memset(recv_data, 0, ra.len); | ||||
| 	if ((recv_data_len = recvfrom(recv_sock, recv_data, ra.len, | ||||
| 				      0, NULL, 0)) < 0) { | ||||
| 		printf("recvfrom() failed"); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	ra.cb(recv_data, recv_data_len); | ||||
| 	free(recv_data); | ||||
|  | ||||
| } | ||||
|  | ||||
| static void receive_data(struct ev_loop *ev, ev_io *io, int event) | ||||
| { | ||||
| 	void *recv_data; | ||||
| @@ -25,11 +44,14 @@ static void receive_data(struct ev_loop *ev, ev_io *io, int event) | ||||
| 		printf("recvfrom() failed"); | ||||
|  | ||||
| 	ra.cb(recv_data, recv_data_len); | ||||
| 	free(recv_data); | ||||
|  | ||||
| } | ||||
|  | ||||
| int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned int len, | ||||
| 		 struct ev_loop *loop, ev_io *io) | ||||
| static struct uloop_fd server; | ||||
|  | ||||
| int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), | ||||
| 		 unsigned int len, struct ev_loop *loop, ev_io *io) | ||||
| { | ||||
| 	struct sockaddr_in addr; | ||||
| 	int bcast_perm; | ||||
| @@ -65,12 +87,25 @@ int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned | ||||
| 	} | ||||
|  | ||||
| 	printf("Interap recving: p:%d\n", port); | ||||
| 	ev_io_init(io, receive_data, recv_sock, EV_READ); | ||||
| 	ev_io_start(loop, io); | ||||
|  | ||||
| 	if (io && loop) { | ||||
| 		ev_io_init(io, receive_data, recv_sock, EV_READ); | ||||
| 		ev_io_start(loop, io); | ||||
| 	} else { | ||||
|  | ||||
| 		server.cb = receive_data_uloop; | ||||
| 		server.fd = recv_sock; | ||||
| 		uloop_fd_add(&server, ULOOP_READ); | ||||
| 	} | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| void interap_rcv_close(void) | ||||
| { | ||||
| 	close(recv_sock); | ||||
| } | ||||
|  | ||||
| int interap_send(unsigned short port, char *dst_ip, void *data, | ||||
| 		 unsigned int len) | ||||
| { | ||||
|   | ||||
| @@ -3,7 +3,7 @@ OBJS = interapcommtest.o | ||||
|  | ||||
| CFLAGS += -Wall $(EXTRA_CFLAGS) $(extra_cflags-y) | ||||
|  | ||||
| LIBS =	-L ../../ -linterapcomm -lev | ||||
| LIBS =	-L ../../ -linterapcomm -lev -lubox -lubus | ||||
|  | ||||
| CFLAGS += -I. \ | ||||
| 	-I../../include/ | ||||
|   | ||||
| @@ -6,6 +6,8 @@ | ||||
| #include <ev.h> | ||||
| #include <interAPcomm.h> | ||||
|  | ||||
| #include <libubus.h> | ||||
|  | ||||
| struct my_data { | ||||
| 	int x; | ||||
| 	char y; | ||||
| @@ -13,7 +15,8 @@ struct my_data { | ||||
| }; | ||||
|  | ||||
|  | ||||
| int recv_process(void *data) { | ||||
| int recv_process(void *data, ssize_t n) | ||||
| { | ||||
| 	struct my_data *dat = (struct my_data*) data; | ||||
|  | ||||
| 	printf("Recv process: %d, %c, %d\n", dat->x, dat->y, dat->z); | ||||
| @@ -22,34 +25,37 @@ int recv_process(void *data) { | ||||
|  | ||||
| int main (int argc, char *argv[ ]) | ||||
| { | ||||
| 	unsigned int send = atoi(argv[1]);   /* First arg: broadcast port */ | ||||
| 	unsigned short port = 50000; | ||||
| 	unsigned int send = atoi(argv[1]); | ||||
| 	unsigned short port = 50020; | ||||
| //	char *dst_ip = "255.255.255.255"; | ||||
| 	char *dst_ip = "192.168.9.255"; | ||||
| 	char *dst_ip = "10.42.0.255"; | ||||
| //	char *data = "InterAP Hello"; | ||||
| 	struct my_data data; | ||||
| 	data.x = 1001; | ||||
| 	data.y = 'H'; | ||||
| 	data.z = 3003; | ||||
|  | ||||
| //	callback cb = recv_process; | ||||
|  | ||||
|  | ||||
| 	printf("arg1 = %d\n", send); | ||||
| 	printf("send = %d\n", send); | ||||
|  | ||||
| 	if (send) { | ||||
| 		printf("Send"); | ||||
| 		interap_send(port, dst_ip, &data, sizeof(data)); | ||||
| 		while (1) | ||||
| 		{ | ||||
| 			sleep(3); | ||||
| 			printf("Sending...\n"); | ||||
| 			interap_send(port, dst_ip, &data, sizeof(data)); | ||||
| 		} | ||||
| 	} | ||||
| 	else { | ||||
| 		printf("Recieve"); | ||||
| //		interap_recv(port, cb, sizeof(struct my_data)); | ||||
| 		uloop_init(); | ||||
| 		callback cb = recv_process; | ||||
|  | ||||
| 		interap_recv(port, cb, sizeof(struct my_data), NULL, NULL); | ||||
| 		uloop_run(); | ||||
| 		uloop_done(); | ||||
|  | ||||
| 	} | ||||
|  | ||||
| 	while (1) | ||||
| 	{ | ||||
| 		sleep(3); | ||||
| 		printf("In while loop\n"); | ||||
| 	} | ||||
| 	return 1; | ||||
| } | ||||
|   | ||||
| @@ -444,6 +444,10 @@ return view.extend({ | ||||
| 		o.datatype = 'ip4addr("nomask")'; | ||||
| 		o.depends('proto', 'static'); | ||||
|  | ||||
| 		o = s.option(form.Button, 'save', _('')); | ||||
| 		o.inputtitle = _('Save Settings'); | ||||
| 		o.onclick = ui.createHandlerFn(this, 'handleSettingsSave', m); | ||||
|  | ||||
| 		s = m.section(form.NamedSection, 'lan', 'lan', _('LAN')); | ||||
|  | ||||
| 		o = s.option(form.Value, 'addr', _('IP Address')); | ||||
| @@ -456,7 +460,7 @@ return view.extend({ | ||||
|  | ||||
| 		o = s.option(form.Button, 'save', _('')); | ||||
| 		o.inputtitle = _('Save Settings'); | ||||
| 		o.onclick = ui.createHandlerFn(this, 'handleSettingsSave', m); | ||||
| 		o.onclick = ui.createHandlerFn(this, 'handleLANSettingsSave', m); | ||||
|  | ||||
| 		s = m.section(form.NamedSection, 'maintenance', 'maintenance', _('System Maintenance')); | ||||
|  | ||||
|   | ||||
										
											Binary file not shown.
										
									
								
							| @@ -1,4 +1,12 @@ | ||||
| @import url('https://fonts.googleapis.com/css2?family=Montserrat&display=swap'); | ||||
| /* latin */ | ||||
| @font-face { | ||||
| 	font-family: 'Montserrat'; | ||||
| 	font-style: normal; | ||||
| 	font-weight: 400; | ||||
| 	font-display: swap; | ||||
| 	src: url(Montserrat_latin.woff2) format('woff2'); | ||||
| 	unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; | ||||
| } | ||||
|  | ||||
| :root { | ||||
| 	--main-bright-color: #1B465C; | ||||
|   | ||||
| @@ -48,13 +48,8 @@ define Package/nft-qos/install | ||||
| 	$(INSTALL_DIR) $(1)/lib/nft-qos | ||||
| 	$(INSTALL_DATA) ./files/lib/* $(1)/lib/nft-qos/ | ||||
| 	chmod 0700 $(1)/lib/nft-qos/mac-rate.sh | ||||
| 	$(INSTALL_DIR) $(1)/etc/config | ||||
| 	$(INSTALL_CONF) ./files/nft-qos.config $(1)/etc/config/nft-qos | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) ./files/nft-qos.init $(1)/etc/init.d/nft-qos | ||||
| 	$(INSTALL_DIR) $(1)/etc/hotplug.d/dhcp | ||||
| 	$(INSTALL_BIN) ./files/nft-qos-monitor.hotplug $(1)/etc/hotplug.d/dhcp/00-nft-qos-monitor | ||||
| 	$(INSTALL_BIN) ./files/nft-qos-dynamic.hotplug $(1)/etc/hotplug.d/dhcp/01-nft-qos-dynamic | ||||
| endef | ||||
|  | ||||
| $(eval $(call BuildPackage,nft-qos)) | ||||
|   | ||||
| @@ -27,23 +27,31 @@ if [ -z "$1" -o -z "$2" -o -z "$3" ]; then | ||||
| 	exit 1 | ||||
| fi | ||||
|  | ||||
| logger -t "$1 $2 $3" | ||||
| logger -t "mac-rate" "$1 $2 $3" | ||||
|  | ||||
| bridge=`uci get wireless.$iface.network` | ||||
| if [ "$bridge" == "lan" ]; then | ||||
| 	dlchain="download_nat" | ||||
|         ulchain="upload_nat" | ||||
| else | ||||
|         dlchain="download" | ||||
|         ulchain="upload" | ||||
| fi | ||||
|  | ||||
| if [ "$1" == "add" ]; then | ||||
| 	config_load wireless | ||||
|  | ||||
| 	config_foreach handle_interface wifi-iface download | ||||
|  | ||||
| 	exists=`nft list chain bridge nft-qos-ssid-lan-bridge download  -a | grep -ic $3` | ||||
| 	exists=`nft list chain bridge nft-qos-ssid-lan-bridge $dlchain  -a | grep -ic $3` | ||||
| 	logger -t "mac-rate" "exists = $exists" | ||||
| 	if [ "$exists" -ne 0 ]; then | ||||
| 		old_drate=`nft list chain bridge nft-qos-ssid-lan-bridge download -a | grep -i $3 |  awk -F'kbytes' '{print $1}' | awk '{print $NF}'` | ||||
| 		old_drate=`nft list chain bridge nft-qos-ssid-lan-bridge $dlchain -a | grep -i $3 |  awk -F'kbytes' '{print $1}' | awk '{print $NF}'` | ||||
| 		logger -t "mac-rate" "old_drate=$old_drate" | ||||
| 		if [ "$old_drate" -ne "$rate" ]; then | ||||
| 			changed=1 | ||||
| 			id=`nft list chain bridge nft-qos-ssid-lan-bridge download  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 			id=`nft list chain bridge nft-qos-ssid-lan-bridge $dlchain  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 			if [ -n "$id" ]; then | ||||
| 				nft delete rule bridge nft-qos-ssid-lan-bridge download handle $id | ||||
| 				nft delete rule bridge nft-qos-ssid-lan-bridge $dlchain handle $id | ||||
| 			fi | ||||
| 			logger -t "mac-rate" "changed DL $old_drate to $rate, del $3" | ||||
| 		else | ||||
| @@ -54,19 +62,19 @@ if [ "$1" == "add" ]; then | ||||
|  | ||||
|         if [ "$exists" == 0 -o "$changed" == 1 ]; then | ||||
| 	        if [ "$rate" -ne 0 ]; then | ||||
| 			dok=`nft add rule bridge nft-qos-ssid-lan-bridge download ether daddr $3 limit rate over $rate kbytes/second drop` | ||||
| 			dok=`nft add rule bridge nft-qos-ssid-lan-bridge $dlchain ether daddr $3 limit rate over $rate kbytes/second drop` | ||||
| 	        fi | ||||
|         fi | ||||
|  | ||||
| 	config_foreach handle_interface wifi-iface upload | ||||
| 	exists=`nft list chain bridge nft-qos-ssid-lan-bridge upload  -a | grep -ic $3` | ||||
| 	exists=`nft list chain bridge nft-qos-ssid-lan-bridge $ulchain  -a | grep -ic $3` | ||||
| 	if [ "$exists" -ne 0 ]; then | ||||
| 		old_urate=`nft list chain bridge nft-qos-ssid-lan-bridge upload -a | grep -i $3 |  awk -F'kbytes' '{print $1}' | awk '{print $NF}'` | ||||
| 		old_urate=`nft list chain bridge nft-qos-ssid-lan-bridge $ulchain -a | grep -i $3 |  awk -F'kbytes' '{print $1}' | awk '{print $NF}'` | ||||
| 		if [ "$old_urate" -ne "$rate" ]; then | ||||
| 			changed=1 | ||||
| 			id=`nft list chain bridge nft-qos-ssid-lan-bridge upload  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 			id=`nft list chain bridge nft-qos-ssid-lan-bridge $ulchain  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 			if [ -n "$id" ]; then | ||||
| 				nft delete rule bridge nft-qos-ssid-lan-bridge upload handle $id | ||||
| 				nft delete rule bridge nft-qos-ssid-lan-bridge $ulchain handle $id | ||||
| 			fi | ||||
|  | ||||
| 			logger -t "mac-rate" "changed UL $old_urate to $rate del $3" | ||||
| @@ -78,20 +86,20 @@ if [ "$1" == "add" ]; then | ||||
|  | ||||
|         if [ "$exists" == 0 -o "$changed" == 1 ]; then | ||||
|         	if [ "$rate" -ne 0 ]; then | ||||
| 			uok=`nft add rule bridge nft-qos-ssid-lan-bridge upload ether saddr $3 limit rate over $rate kbytes/second drop` | ||||
| 			uok=`nft add rule bridge nft-qos-ssid-lan-bridge $ulchain ether saddr $3 limit rate over $rate kbytes/second drop` | ||||
| 		fi | ||||
| 	fi | ||||
|  | ||||
| elif [ "$1" == "del" ]; then | ||||
| 	id=`nft list chain bridge nft-qos-ssid-lan-bridge download  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 	id=`nft list chain bridge nft-qos-ssid-lan-bridge $dlchain  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 	logger -t "mac-rate" "$id $3" | ||||
| 	if [ -n "$id" ]; then | ||||
| 		nft delete rule bridge nft-qos-ssid-lan-bridge download handle $id | ||||
| 		nft delete rule bridge nft-qos-ssid-lan-bridge $dlchain handle $id | ||||
| 	fi | ||||
|  | ||||
| 	id=`nft list chain bridge nft-qos-ssid-lan-bridge upload  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 	id=`nft list chain bridge nft-qos-ssid-lan-bridge $ulchain  -a | grep -i $3  | awk -F "handle " '{print $2;exit}'` | ||||
| 	if [ -n "$id" ]; then | ||||
| 		nft delete rule bridge nft-qos-ssid-lan-bridge upload handle $id | ||||
| 		nft delete rule bridge nft-qos-ssid-lan-bridge $ulchain handle $id | ||||
| 	fi | ||||
|  | ||||
| fi | ||||
|   | ||||
| @@ -42,8 +42,20 @@ qosdef_append_rule_ssid() { # <section> <operator> <bridge> | ||||
| 		rate=$((rate/8)) | ||||
| 	fi | ||||
|  | ||||
| 	if [ -z "$iface" -o -z "$rate" -o $rate == 0 ]; then | ||||
| 		logger -t "nft-qos" "Error: No interface $iface or rate $rate present" | ||||
| 	if [ -z "$iface" ]; then | ||||
| 		logger -t "nft-qos" "Error: No interface $iface present" | ||||
| 		return | ||||
| 	fi | ||||
|  | ||||
| 	if [ -z "$rate" -o $rate == 0 ]; then | ||||
| 		logger -t "nft-qos" "ssid-rate disabled $iface, configure client-rate" | ||||
| 	        maclist=`iwinfo $iface assoclist | grep dBm | cut -f 1 -s -d" "` | ||||
|  | ||||
| 		for mac in $maclist | ||||
| 		do | ||||
| 			logger -t "nft-qos" "Add $mac" | ||||
| 			/lib/nft-qos/mac-rate.sh add $iface $mac | ||||
| 		done | ||||
| 		return | ||||
| 	fi | ||||
|  | ||||
|   | ||||
| @@ -4,49 +4,26 @@ | ||||
| # | ||||
|  | ||||
| . /lib/nft-qos/core.sh | ||||
| . /lib/nft-qos/monitor.sh | ||||
| . /lib/nft-qos/dynamic.sh | ||||
| . /lib/nft-qos/static.sh | ||||
| . /lib/nft-qos/priority.sh | ||||
| . /lib/nft-qos/ssid_ratelimit.sh | ||||
|  | ||||
| START=99 | ||||
| USE_PROCD=1 | ||||
|  | ||||
| service_triggers() { | ||||
| #	procd_add_reload_trigger nft-qos wireless | ||||
| #	procd_add_reload_trigger wireless | ||||
|  | ||||
| 	procd_open_validate | ||||
| #	qosdef_validate_dynamic | ||||
| #	qosdef_validate_static | ||||
| #	qosdef_validate_priority | ||||
| 	procd_close_validate | ||||
| } | ||||
|  | ||||
| start_service() { | ||||
| 	config_load nft-qos | ||||
|  | ||||
| #	qosdef_init_env | ||||
| #	qosdef_flush_static | ||||
| #	qosdef_flush_dynamic | ||||
| 	qosdef_flush_ssid_ratelimit | ||||
| #	qosdef_remove_priority | ||||
|  | ||||
| #	qosdef_init_header | ||||
| #	qosdef_init_monitor | ||||
| #	qosdef_validate_dynamic default qosdef_init_dynamic | ||||
| #	qosdef_validate_static default qosdef_init_static | ||||
| #	qosdef_validate_priority default qosdef_init_priority | ||||
| 	qosdef_init_ssid_ratelimit | ||||
| 	qosdef_init_done | ||||
| 	qosdef_start | ||||
| } | ||||
|  | ||||
| stop_service() { | ||||
| #	qosdef_flush_dynamic | ||||
| #	qosdef_flush_static | ||||
| #	qosdef_remove_priority | ||||
| 	qosdef_flush_ssid_ratelimit | ||||
| 	qosdef_clean_cache | ||||
| } | ||||
|   | ||||
| @@ -52,7 +52,6 @@ define Package/opennds/install | ||||
| 	$(INSTALL_DIR) $(1)/usr/lib/opennds | ||||
|  | ||||
| 	$(CP) ./files/lib/splash.css $(1)/etc/opennds/htdocs/ | ||||
| 	$(CP) ./files/lib/Tip.png $(1)/etc/opennds/htdocs/images/ | ||||
| 	$(CP) ./files/lib/opennds $(1)/etc/config/ | ||||
| 	$(CP) ./files/etc/init.d/opennds $(1)/etc/init.d/ | ||||
| 	$(CP) ./files/lib/login.sh $(1)/usr/lib/opennds/ | ||||
|   | ||||
										
											Binary file not shown.
										
									
								
							| Before Width: | Height: | Size: 21 KiB | 
							
								
								
									
										17
									
								
								feeds/wlan-ap/opensync/files/bin/auto-conf
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										17
									
								
								feeds/wlan-ap/opensync/files/bin/auto-conf
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,17 @@ | ||||
| #!/bin/sh | ||||
| # Finds the highest settings an AP can support for various settings when set to "auto" in config | ||||
|  | ||||
| find_auto_hwmode() { | ||||
| 	# This function finds the highest mode (hw_mode) that the AP can support | ||||
|  | ||||
| 	# Arguments | ||||
| 	device=$1 | ||||
|  | ||||
| 	mode='11n' | ||||
| 	iw phy "$device" info | grep -q 'VHT Capabilities*' && mode="11ac" | ||||
| 	iw phy "$device" info | grep -q 'HE.*Capabilities' && mode="11ax" | ||||
|  | ||||
| 	echo "$mode" | ||||
| } | ||||
|  | ||||
| find_auto_hwmode $1 | ||||
							
								
								
									
										7
									
								
								feeds/wlan-ap/opensync/files/bin/check_wan_link.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										7
									
								
								feeds/wlan-ap/opensync/files/bin/check_wan_link.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,7 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| if="$(uci get network.wan.ifname)" | ||||
| [ "$(cat /sys/class/net/"${if}"/carrier)" = 0 ] && { | ||||
| 	return 0 | ||||
| } | ||||
| return 1 | ||||
							
								
								
									
										55
									
								
								feeds/wlan-ap/opensync/files/bin/dynamic_lookup.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										55
									
								
								feeds/wlan-ap/opensync/files/bin/dynamic_lookup.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,55 @@ | ||||
| #! /bin/sh | ||||
|  | ||||
| usage() { | ||||
|    echo "Usage: ${0} <realm>" | ||||
|    exit 1 | ||||
| } | ||||
|  | ||||
| test -n "${1}" || usage | ||||
|  | ||||
| REALM="${1}" | ||||
| DIGCMD=$(command -v dig) | ||||
| PRINTCMD=$(command -v printf) | ||||
|  | ||||
| validate_host() { | ||||
|          echo ${@} | tr -d '\n\t\r' | grep -E '^[_0-9a-zA-Z][-._0-9a-zA-Z]*$' | ||||
| } | ||||
|  | ||||
| validate_port() { | ||||
|          echo ${@} | tr -d '\n\t\r' | grep -E '^[0-9]+$' | ||||
| } | ||||
|  | ||||
| srv_lookup() { | ||||
|    ${DIGCMD} +short srv $SRV_HOST | sort -n -k1 | | ||||
|    while read line ; do | ||||
|       set $line ; PORT=$(validate_port $3) ; HOST=$(validate_host $4) | ||||
|       if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then  | ||||
|          $PRINTCMD "\thost ${HOST%.}:${PORT}\n" | ||||
|       fi | ||||
|    done | ||||
| } | ||||
|  | ||||
| naptr_lookup() { | ||||
|     ${DIGCMD} +short naptr ${REALM} | grep aaa+auth:radius.tls.tcp | sort -n -k1 | | ||||
|     while read line; do | ||||
|     set $line ; TYPE=$3 ; HOST=$6 | ||||
|     if [ "$TYPE" = "\"s\"" -o "$TYPE" = "\"S\"" ]; then | ||||
|         SRV_HOST=${HOST%.} | ||||
|         srv_lookup | ||||
|     fi | ||||
|     done | ||||
| } | ||||
|  | ||||
| if test -x "${DIGCMD}" ; then | ||||
|    SERVERS=$(naptr_lookup) | ||||
| else | ||||
|    echo "${0} requires \"dig\" command." | ||||
|    exit 1 | ||||
| fi | ||||
|  | ||||
| if test -n "${SERVERS}" ; then | ||||
|         $PRINTCMD "server dynamic_radsec.${REALM} {\n${SERVERS}\n\ttype TLS\n}\n" | ||||
|         exit 0 | ||||
| fi | ||||
|  | ||||
| exit 10				# No server found. | ||||
| @@ -24,7 +24,8 @@ | ||||
| # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | ||||
| # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||||
|  | ||||
| IMGFILE="$(ls ${1}.*)" | ||||
| # Get the most recent upgrade file available | ||||
| IMGFILE="$(ls -t1 ${1}.* | head -n 1)" | ||||
|  | ||||
| if [ -z "$IMGFILE" ] || [ ! -f "$IMGFILE" ] ; then | ||||
|   echo | ||||
| @@ -34,11 +35,14 @@ fi | ||||
|  | ||||
| # Set the current version as inactive before the upgrade | ||||
| FW_VERSION=`sed -n 's/FW_IMAGE_ACTIVE:\(.*\)/\1/p' < /usr/opensync/.versions` | ||||
| FW_BACKUP=$(uci get system.tip.inactivefw) | ||||
| uci set system.tip.inactivefw="${FW_VERSION}" | ||||
| uci commit | ||||
| uci commit system | ||||
|  | ||||
| /sbin/sysupgrade $IMGFILE | ||||
| if [ "$?" != "0" ] ; then | ||||
|   uci set system.tip.inactivefw="${FW_BACKUP}" | ||||
|   uci commit system | ||||
|   echo "$0: Sysupgrade failed." | ||||
|   exit 1 | ||||
| fi | ||||
|   | ||||
							
								
								
									
										4
									
								
								feeds/wlan-ap/opensync/files/bin/wlan_ap_factory_reset.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										4
									
								
								feeds/wlan-ap/opensync/files/bin/wlan_ap_factory_reset.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,4 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| tar czf /sysupgrade.tgz /usr/opensync/certs/ | ||||
| jffs2reset -r -y -k | ||||
							
								
								
									
										7
									
								
								feeds/wlan-ap/opensync/files/bin/wlan_ap_led.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										7
									
								
								feeds/wlan-ap/opensync/files/bin/wlan_ap_led.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,7 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| #Blink AP's LED | ||||
| /usr/opensync/tools/ovsh insert Node_Config module:="led" key:="led_blink" value:="on" | ||||
|  | ||||
| #Turnoff AP's LED | ||||
| /usr/opensync/tools/ovsh insert Node_Config module:="led" key:="led_off" value:="off" | ||||
| @@ -1,12 +1,49 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| if [ $# -ne 1 ] ; then | ||||
| 	echo "Usage: $0 <redirector address>" >&2 | ||||
| 	exit 1 | ||||
| AP_PRIVATE_KEY_FILE="/usr/opensync/certs/client_dec.key" | ||||
| AP_CERTIFICATE_FILE="/usr/opensync/certs/client.pem" | ||||
| AP_DEVICE_ID_FILE="/usr/opensync/certs/client_deviceid.txt" | ||||
| DIGICERT_API_URI="clientauth.one.digicert.com" | ||||
|  | ||||
| if [ "$1" = "-h" ]; then | ||||
|   echo "Usage: $0 [redirector address]" >&2 | ||||
|   exit 1 | ||||
| fi | ||||
|  | ||||
| redirector_addr=$1 | ||||
| # Query DigiCert's API if redirector wasn't specified | ||||
| if [ -z "$1" ]; then | ||||
|   if [ ! -f "$AP_DEVICE_ID_FILE" ]; then | ||||
|       echo "Device ID file $AP_DEVICE_ID_FILE does not exist. Make sure to create it or specify the redirector address manually." | ||||
|       exit 1 | ||||
|   fi | ||||
|  | ||||
|   digicert_device_id=`cat ${AP_DEVICE_ID_FILE}` | ||||
|   device_data=`curl -s \ | ||||
|     --retry 5 \ | ||||
|     --show-error \ | ||||
|     --key "${AP_PRIVATE_KEY_FILE}" \ | ||||
|     --cert "${AP_CERTIFICATE_FILE}" \ | ||||
|     "https://${DIGICERT_API_URI}/iot/api/v2/device/${digicert_device_id}"` | ||||
|  | ||||
|   controller_url=`echo ${device_data} | jsonfilter -e '@.fields[@.name="Redirector"].value'` | ||||
|   if [ -z "$controller_url" ]; then | ||||
|     echo "No redirector found for this device" | ||||
|     exit 1 | ||||
|   fi | ||||
|   controller_port=`echo ${controller_url} | cut -s -d ":" -f2)` | ||||
|   if [ -z "$controller_port" ]; then | ||||
|     redirector_addr="ssl:${controller_url}:6643" | ||||
|   else | ||||
|     redirector_addr="ssl:${controller_url}" | ||||
|   fi | ||||
| else | ||||
|   redirector_addr=$1 | ||||
| fi | ||||
|  | ||||
| echo "${redirector_addr}" > /usr/opensync/certs/redirector.txt | ||||
| /etc/init.d/uhttpd enable | ||||
| /etc/init.d/uhttpd start | ||||
| uci set system.tip.redirector="${redirector_addr}" | ||||
| uci set system.tip.deployed=0 | ||||
| uci commit system | ||||
| /etc/init.d/opensync restart | ||||
|   | ||||
| @@ -10,11 +10,11 @@ hwmode=$(uci get wireless.${radio}.hwmode) | ||||
| 
 | ||||
| [ "${hwmode}" = "11a" ] && band=5 || band=2 | ||||
| 
 | ||||
| bcn_rate=$(uci get wireless.${DEVICENAME}.bcn_rate) | ||||
| bcn_rate=$(($(uci get wireless.${DEVICENAME}.bcn_rate)/10)) | ||||
| mcast_rate=$(uci get wireless.${DEVICENAME}.mcast_rate) | ||||
| 
 | ||||
| # ath10k rate-codes: 0x43 1M, 0x42 2M, 0x41 5.5M, 0x40 11M, 0x3 6M, 0x7 9M, 0x2 12M, 0x6 18M, 0x1 24M, 0x5 36M, 0x0 48M, 0x4 54M, 0xFF default | ||||
| rate_codes="1:0x43 2:0x42 5.5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4" | ||||
| rate_codes="1:0x43 2:0x42 5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4" | ||||
| 
 | ||||
| # Default codes | ||||
| beacon_code=0xFF | ||||
| @@ -33,6 +33,6 @@ done | ||||
| 
 | ||||
| # set rates | ||||
| logger -t hotplug "Set Tx rates for device ${DEVICENAME}" | ||||
| sleep 5 | ||||
| sleep 20 | ||||
| echo "${DEVICENAME} beacon ${band} ${beacon_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates | ||||
| echo "${DEVICENAME} mcast ${band} ${mcast_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates | ||||
							
								
								
									
										10
									
								
								feeds/wlan-ap/opensync/files/etc/logrotate.d/ovsdb.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								feeds/wlan-ap/opensync/files/etc/logrotate.d/ovsdb.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,10 @@ | ||||
| /tmp/log/openvswitch/*.log { | ||||
|     daily | ||||
|     rotate 5 | ||||
|     size 1M | ||||
|     compress | ||||
|     delaycompress | ||||
|     dateext | ||||
|     dateformat -%s | ||||
|     notifempty | ||||
| } | ||||
							
								
								
									
										75
									
								
								feeds/wlan-ap/opensync/files/usr/opensync/certs/ca.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										75
									
								
								feeds/wlan-ap/opensync/files/usr/opensync/certs/ca.pem
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,75 @@ | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIEcTCCA1mgAwIBAgIUJFhIMlIJHJ7hW4gEzZuLBUaWjNcwDQYJKoZIhvcNAQEL | ||||
| BQAwbDELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG1RlbGVjb20gSW5mcmEgUHJvamVj | ||||
| dCwgSW5jLjEMMAoGA1UECxMDVElQMSkwJwYDVQQDEyBUZWxlY29tIEluZnJhIFBy | ||||
| b2plY3QgSXNzdWluZyBDQTAeFw0yMTA0MjUyMDMzNTRaFw0yNjA0MTMyMjM4NDZa | ||||
| MCMxITAfBgNVBAMTGGNhY2VydHMub25lLmRpZ2ljZXJ0LmNvbTCCASIwDQYJKoZI | ||||
| hvcNAQEBBQADggEPADCCAQoCggEBAJwKRHdkdEQkp32bNi9TdgN4FNRG0nRppguQ | ||||
| mdCysJHA6/SuyAXNwKSbENysjFrcBkfYTlALjvIMqSu4d26ix6Mv4HnVxLjDzapV | ||||
| TZhOhfxIbRQa3HNieNup2vMi8jJvgwLcK/4CwhBJsbEMkB5lbyL8UnCBxzW9GGbM | ||||
| IvurvDFkUDUpUmiFg47nTpjub79KME6NqK38DxKzlUHvJge1TKFM73kZ3YkfWExQ | ||||
| yRQPRiU5KxMi/Wkr30FOf/rMTx4XNacOgyTJvzcStGwrlr0iGr8eLC1/XVXoOQz3 | ||||
| 0lyOeUzTB+HPU1Z2JrbPW5PnGxcQ0f7v/3qkWV1B2wuvFcQk+D0CAwEAAaOCAVIw | ||||
| ggFOMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFIj2Mhdk10e46DeI+aEZKSSK8Hj+ | ||||
| MB8GA1UdIwQYMBaAFLMbVLjgR6s98ziA5Dzl/QBhbdHoMA4GA1UdDwEB/wQEAwIE | ||||
| 8DAWBgNVHSUBAf8EDDAKBggrBgEFBQcDAjCBhgYIKwYBBQUHAQEEejB4MCgGCCsG | ||||
| AQUFBzABhhxodHRwOi8vb2NzcC5vbmUuZGlnaWNlcnQuY29tMEwGCCsGAQUFBzAC | ||||
| hkBodHRwOi8vY2FjZXJ0cy5vbmUuZGlnaWNlcnQuY29tL1RlbGVjb21JbmZyYVBy | ||||
| b2plY3RJc3N1aW5nQ0EuY3J0ME0GA1UdHwRGMEQwQqBAoD6GPGh0dHA6Ly9jcmwu | ||||
| b25lLmRpZ2ljZXJ0LmNvbS9UZWxlY29tSW5mcmFQcm9qZWN0SXNzdWluZ0NBLmNy | ||||
| bDANBgkqhkiG9w0BAQsFAAOCAQEADlFwshNPkeI2Gl6ooIauZL9d+6k+RWa5RTle | ||||
| JWziYL23XVEBT11+dvp4IB9HwVw5dByl3XAfTd1r4qyncwgXQpc6j2X8e45E8izI | ||||
| z2S1zhLMe1bA2lOiZz/sdpbonvxIHdiISyQI7q3mWQsvNkpkbjivjxLAJTcGPmOS | ||||
| gc/95YL+2xqPV45XAnPcl5qkLThtmb57Xst1sLWiSS2fUId6HMVuCgZa5su+aAl9 | ||||
| iMXv9YfHcvyfwXBaOtoBlItyMGl60uy0E/Fr5uEhEWi53EIqhty6KQckQBB7wdjQ | ||||
| eiXNI5Ox5cf+TFdesuKPaoEn3WNpFL9PCA3S5nGegJlZQ4N9Eg== | ||||
| -----END CERTIFICATE----- | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIEnDCCA4SgAwIBAgIUVpyCUx1MUeUwxg+7I1BvGFTz7HkwDQYJKoZIhvcNAQEL | ||||
| BQAwaTELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG1RlbGVjb20gSW5mcmEgUHJvamVj | ||||
| dCwgSW5jLjEMMAoGA1UECxMDVElQMSYwJAYDVQQDEx1UZWxlY29tIEluZnJhIFBy | ||||
| b2plY3QgUm9vdCBDQTAeFw0yMTA0MTMyMjUxMjZaFw0yNjA0MTMyMjM4NDZaMGwx | ||||
| CzAJBgNVBAYTAlVTMSQwIgYDVQQKExtUZWxlY29tIEluZnJhIFByb2plY3QsIElu | ||||
| Yy4xDDAKBgNVBAsTA1RJUDEpMCcGA1UEAxMgVGVsZWNvbSBJbmZyYSBQcm9qZWN0 | ||||
| IElzc3VpbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDtKBrq | ||||
| qd2aKVSk25KfL5xHu8X7/8rJrz3IvyPuVKWhk/N1zabot3suBcGaYNKjnRHxg78R | ||||
| yKwKzajKYWtiQFqztu24g16LQeAnoUxZnF6a0z3JkkRPsz14A2y8TUhdEe1tx+UU | ||||
| 4VGsk3n+FMmOQHL+79FO57zQC1LwylgfLSltrI6mF3jowVUQvnwzKhUzT87AJ6EO | ||||
| ndK/q0T/Bgi+aI39zfVOjJjsTJwghvrmYW3iarP1THSKxeib2s02bZKrvvHa5HL4 | ||||
| UI8+LvREpVZl4mzt1z6Nl344Y6f+UeJlYa/Ci0jJqaXJmyVnUbAz+c0i5JfwAVn3 | ||||
| YQzfC4eLnZCmdF8zAgMBAAGjggE3MIIBMzAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud | ||||
| DgQWBBSzG1S44EerPfM4gOQ85f0AYW3R6DAfBgNVHSMEGDAWgBQCRpZgebFT9qny | ||||
| 98WfIUDk6ZEB+jAOBgNVHQ8BAf8EBAMCAYYwgYMGCCsGAQUFBwEBBHcwdTAoBggr | ||||
| BgEFBQcwAYYcaHR0cDovL29jc3Aub25lLmRpZ2ljZXJ0LmNvbTBJBggrBgEFBQcw | ||||
| AoY9aHR0cDovL2NhY2VydHMub25lLmRpZ2ljZXJ0LmNvbS9UZWxlY29tSW5mcmFQ | ||||
| cm9qZWN0Um9vdENBLmNydDBKBgNVHR8EQzBBMD+gPaA7hjlodHRwOi8vY3JsLm9u | ||||
| ZS5kaWdpY2VydC5jb20vVGVsZWNvbUluZnJhUHJvamVjdFJvb3RDQS5jcmwwDQYJ | ||||
| KoZIhvcNAQELBQADggEBAFbz+K94bHIkBMJqps0dApniUmOn0pO6Q6cGh47UP/kX | ||||
| IiPIsnYgG+hqYD/qtsiqJhaWi0hixRWn38UmvZxMRk27aSTGE/TWx0JTC3qDGsSe | ||||
| XkUagumbSfmS0ZyiTwMPeGAjXwyzGorqZWeA95eKfImntMiOf3E7//GK0K7HpCx8 | ||||
| IPCnLZsZD2q/mLyBsduImFIRQJbLAhwIxpcd1qYJk+BlGFL+HtBpEbq6JxW2Xy+v | ||||
| DpNWc2WIsUTle0rTc9JNJrLX4ChUJmKqf8obKHap3Xh3//qw/jDB9pOAinA33FLJ | ||||
| EmCnwBvQr9mfNmPBGMYZVU8cPruDQJ57GjmmvdisbJY= | ||||
| -----END CERTIFICATE----- | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIDojCCAoqgAwIBAgIUPVYBpqNbcLYygF6Mx+qxSWwQyFowDQYJKoZIhvcNAQEL | ||||
| BQAwaTELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG1RlbGVjb20gSW5mcmEgUHJvamVj | ||||
| dCwgSW5jLjEMMAoGA1UECxMDVElQMSYwJAYDVQQDEx1UZWxlY29tIEluZnJhIFBy | ||||
| b2plY3QgUm9vdCBDQTAeFw0yMTA0MTMyMjQyNDRaFw0zMTA0MTMyMjM4NDZaMGkx | ||||
| CzAJBgNVBAYTAlVTMSQwIgYDVQQKExtUZWxlY29tIEluZnJhIFByb2plY3QsIElu | ||||
| Yy4xDDAKBgNVBAsTA1RJUDEmMCQGA1UEAxMdVGVsZWNvbSBJbmZyYSBQcm9qZWN0 | ||||
| IFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIGCibwf5u | ||||
| AAwZ+1H8U0e3u2V+0d2gSctucoK86XwUmfe1V2a/qlCYZd29r80IuN1IIeB0naIm | ||||
| KnK/MzXW87clF6tFd1+HzEvmlY/W4KyIXalVCTEzirFSvBEG2oZpM0yC3AefytAO | ||||
| aOpA00LaM3xTfTqMKIRhJBuLy0I4ANUVG6ixVebbGuc78IodleqiLoWy2Q9QHyEO | ||||
| t/7hZndJhiVogh0PveRhho45EbsACu7ymDY+JhlIleevqwlE3iQoq0YcmYADHno6 | ||||
| Eq8vcwLpZFxihupUafkd1T3WJYQAJf9coCjBu2qIhNgrcrGD8R9fGswwNRzMRMpX | ||||
| 720+GjcDW3bJAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAJG | ||||
| lmB5sVP2qfL3xZ8hQOTpkQH6MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsF | ||||
| AAOCAQEAVjl9dm4epG9NUYnagT9sg7scVQEPfz3Lt6w1NXJXgD8mAUlK0jXmEyvM | ||||
| dCPD4514n+8+lM7US8fh+nxc7jO//LwK17Wm9FblgjNFR7+anv0Q99T9fP19DLlF | ||||
| PSNHL2emogy1bl1lLTAoj8nxg2wVKPDSHBGviQ5LR9fsWUIJDv9Bs5k0qWugWYSj | ||||
| 19S6qnHeskRDB8MqRLhKMG82oDVLerSnhD0P6HjySBHgTTU7/tYS/OZr1jI6MPbG | ||||
| L+/DtiR5fDVMNdBSGU89UNTi0wHY9+RFuNlIuvZC+x/swF0V9R5mN+ywquTPtDLA | ||||
| 5IOM7ItsRmen6u3qu+JXros54e4juQ== | ||||
| -----END CERTIFICATE----- | ||||
| @@ -1,6 +1,6 @@ | ||||
| --- a/src/lib/datapipeline/src/dppline.c | ||||
| +++ b/src/lib/datapipeline/src/dppline.c | ||||
| @@ -2147,9 +2147,10 @@ static void dppline_add_stat_events(Sts_ | ||||
| @@ -2147,9 +2147,11 @@ static void dppline_add_stat_events(Sts_ | ||||
|  			ipe->timestamp_ms = cs_rec->ip_event->timestamp; | ||||
|   | ||||
|  			if (cs_rec->ip_event->ip_addr) { | ||||
| @@ -10,11 +10,12 @@ | ||||
| +				uint8_t ip[IPV4_BYTES_LEN] = {0}; | ||||
| +				sscanf(cs_rec->ip_event->ip_addr, "%hhu.%hhu.%hhu.%hhu", &ip[0], &ip[1], &ip[2], &ip[3]); | ||||
| +				ipe->ip_addr.data = malloc(IPV4_BYTES_LEN); | ||||
| +				memcpy(ipe->ip_addr.data, ip, IPV4_BYTES_LEN); | ||||
| +				ipe->ip_addr.len = IPV4_BYTES_LEN; | ||||
|  				ipe->has_ip_addr = true; | ||||
|  			} | ||||
|  		} | ||||
| @@ -2224,10 +2225,10 @@ static void dppline_add_stat_events(Sts_ | ||||
| @@ -2224,10 +2226,11 @@ static void dppline_add_stat_events(Sts_ | ||||
|  			} | ||||
|   | ||||
|  			if (cs_rec->connect_event->ip_addr) { | ||||
| @@ -25,6 +26,7 @@ | ||||
| +				uint8_t ip[IPV4_BYTES_LEN] = {0}; | ||||
| +				sscanf(cs_rec->connect_event->ip_addr, "%hhu.%hhu.%hhu.%hhu", &ip[0], &ip[1], &ip[2], &ip[3]); | ||||
| +				coe->ip_addr.data = malloc(IPV4_BYTES_LEN); | ||||
| +				memcpy(coe->ip_addr.data, ip, IPV4_BYTES_LEN); | ||||
| +				coe->ip_addr.len = IPV4_BYTES_LEN; | ||||
|  				coe->has_ip_addr = true; | ||||
|  			} | ||||
|   | ||||
| @@ -0,0 +1,143 @@ | ||||
| Index: opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema | ||||
| +++ opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| @@ -9368,6 +9368,69 @@ | ||||
|              } | ||||
|         }, | ||||
|        "isRoot": true | ||||
| +    }, | ||||
| +    "APC_Config": { | ||||
| +      "columns": { | ||||
| +        "enabled": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "boolean" | ||||
| +            }, | ||||
| +            "min": 0, | ||||
| +            "max": 1 | ||||
| +          } | ||||
| +        } | ||||
| +      }, | ||||
| +      "isRoot": true, | ||||
| +      "maxRows": 1 | ||||
| +    }, | ||||
| +    "APC_State": { | ||||
| +      "columns": { | ||||
| +        "dr_addr": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "bdr_addr": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "enabled": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "boolean" | ||||
| +            }, | ||||
| +            "min": 0, | ||||
| +            "max": 1 | ||||
| +          } | ||||
| +        }, | ||||
| +        "mode": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string", | ||||
| +              "enum": [ | ||||
| +                "set", | ||||
| +                [ | ||||
| +                  "DR", | ||||
| +                  "BDR", | ||||
| +                  "OR", | ||||
| +                  "WT", | ||||
| +                  "NC" | ||||
| +                ] | ||||
| +              ] | ||||
| +            }, | ||||
| +            "min": 0, | ||||
| +            "max": 1 | ||||
| +          } | ||||
| +        } | ||||
| +      }, | ||||
| +      "isRoot": true, | ||||
| +      "maxRows": 1 | ||||
|      } | ||||
|    } | ||||
|  } | ||||
| Index: opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/platform/openwrt/src/lib/target/src/radio_ubus.c | ||||
| +++ opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c | ||||
| @@ -10,6 +10,7 @@ | ||||
|  extern struct ev_loop *wifihal_evloop; | ||||
|  static struct ubus_context *ubus; | ||||
|  extern struct ev_loop *wifihal_evloop; | ||||
| +extern void apc_state_set(struct blob_attr *msg); | ||||
|   | ||||
|  int hapd_rrm_enable(char *name, int neighbor, int beacon) | ||||
|  { | ||||
| @@ -179,6 +180,7 @@ radio_ubus_add_vif_cb(struct ubus_contex | ||||
|  	return UBUS_STATUS_OK; | ||||
|  } | ||||
|   | ||||
| + | ||||
|  static const struct ubus_method radio_ubus_methods[] = { | ||||
|          UBUS_METHOD("dbg_add_vif", radio_ubus_add_vif_cb, add_vif_policy), | ||||
|          UBUS_METHOD("dummy", radio_ubus_dummy_cb, dummy_policy), | ||||
| @@ -201,8 +203,36 @@ static void radio_ubus_connect(struct ub | ||||
|  	ubus_add_object(ubus, &radio_ubus_object); | ||||
|  } | ||||
|   | ||||
| +static int radio_ubus_notify(struct ubus_context *ctx, struct ubus_object *obj, | ||||
| +			     struct ubus_request_data *req, const char *method, | ||||
| +			     struct blob_attr *msg) | ||||
| +{ | ||||
| +	char *str; | ||||
| + | ||||
| +	str = blobmsg_format_json(msg, true); | ||||
| +	LOGD("ubus: Received ubus notify '%s': %s\n", method, str); | ||||
| +	free(str); | ||||
| + | ||||
| +	if (!strncmp(method, "apc", 3)) { | ||||
| +		LOGD("APC notification Received"); | ||||
| +		apc_state_set(msg); | ||||
| +	} | ||||
| + | ||||
| +	return 0; | ||||
| +} | ||||
| + | ||||
| + | ||||
| + | ||||
|  static struct ubus_instance ubus_instance = { | ||||
|  	.connect = radio_ubus_connect, | ||||
| +	.notify = radio_ubus_notify, | ||||
| +	.list = { | ||||
| +			{ | ||||
| +				.path = "apc", | ||||
| +			}, | ||||
| +		}, | ||||
| +	.len = 1, | ||||
| + | ||||
|  }; | ||||
|   | ||||
|  int radio_ubus_init(void) | ||||
| Index: opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/schema/inc/schema_consts.h | ||||
| +++ opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h | ||||
| @@ -154,6 +154,7 @@ typedef enum { | ||||
|  #define SCHEMA_CONSTS_DISABLE_B_RATES	"disable_b_rates" | ||||
|  #define SCHEMA_CONSTS_IEEE80211k	"ieee80211k" | ||||
|  #define SCHEMA_CONSTS_DYNAMIC_VLAN	"dynamic_vlan" | ||||
| +#define SCHEMA_CONSTS_RADPROXY	"radproxy" | ||||
|   | ||||
|  /* radio Custom options */ | ||||
|  #define SCHEMA_CONSTS_LOCAL_PWR_CONSTRAINT "local_pwr_constraint" | ||||
| @@ -0,0 +1,270 @@ | ||||
| Index: opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema | ||||
| +++ opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| @@ -199,6 +199,59 @@ | ||||
|                "type": "integer" | ||||
|              } | ||||
|            } | ||||
| +        }, | ||||
| +        "qr_code": { | ||||
| +          "type": { | ||||
| +            "key": "string", | ||||
| +            "value": { | ||||
| +               "type": "string", | ||||
| +               "maxLength": 128 | ||||
| +            }, | ||||
| +            "min": 0, | ||||
| +            "max": "unlimited" | ||||
| +          } | ||||
| +        }, | ||||
| +        "model_description": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "manufacturer_name": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "manufacturer_date": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "manufacturer_url": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "reference_design": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
| +        }, | ||||
| +        "certification_region": { | ||||
| +          "type": { | ||||
| +            "key": { | ||||
| +              "type": "string" | ||||
| +            } | ||||
| +          } | ||||
|          } | ||||
|        }, | ||||
|        "isRoot": true, | ||||
| Index: opensync-2.0.5.0/src/lib/target/inc/target.h | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/target/inc/target.h | ||||
| +++ opensync-2.0.5.0/src/lib/target/inc/target.h | ||||
| @@ -332,6 +332,115 @@ bool target_hw_revision_get(void *buff, | ||||
|   */ | ||||
|  bool target_platform_version_get(void *buff, size_t buffsz); | ||||
|   | ||||
| +/** | ||||
| + * @brief Return device model revision | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * model revision. The model revision is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_model_revision_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device model description | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * model description. The model description is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_model_description_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device manufacturer name | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * manufacturer name. The manufacturer name is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_manuf_name_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device manufacturer date | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * manufacturer date. The manufacturer date is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_manuf_date_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device manufacturer url | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * manufacturer url. The manufacturer url is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_manuf_url_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device manufacturer name abbreviation | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * manufacturer name abbreviation. This is one of the pieces that form | ||||
| + * the QR code entry which is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_manuf_abbr_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device reference design | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * reference design. The reference design is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_ref_design_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device certification region | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * certification region. The certification region is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_cert_region_get(void *buff, size_t buffsz); | ||||
| + | ||||
| +/** | ||||
| + * @brief Return device mac address | ||||
| + * | ||||
| + * This function provides a null terminated byte string containing the | ||||
| + * mac address. The mac address is a part of AWLAN_Node table. | ||||
| + * | ||||
| + * @param buff   pointer to a string buffer | ||||
| + * @param buffsz size of string buffer | ||||
| + * @return true on success | ||||
| + */ | ||||
| +bool target_mac_addr_get(void *buff, size_t buffsz); | ||||
| + | ||||
|  /// @} LIB_TARGET_ENTITY | ||||
|   | ||||
|  /// @defgroup LIB_TARGET_MAP Interface Mapping API | ||||
| Index: opensync-2.0.5.0/src/dm/src/dm_ovsdb.c | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/dm/src/dm_ovsdb.c | ||||
| +++ opensync-2.0.5.0/src/dm/src/dm_ovsdb.c | ||||
| @@ -326,7 +326,7 @@ void fill_entity_data(struct schema_AWLA | ||||
|          s_awlan_node->sku_number_exists = true; | ||||
|      } | ||||
|   | ||||
| -    if (true == target_hw_revision_get(buff, sizeof(buff))) | ||||
| +    if (true == target_model_revision_get(buff, sizeof(buff))) | ||||
|      { | ||||
|          STRSCPY(s_awlan_node->revision, buff); | ||||
|      } | ||||
| @@ -359,6 +359,58 @@ void fill_entity_data(struct schema_AWLA | ||||
|      } | ||||
|      s_awlan_node->model_exists = true; | ||||
|   | ||||
| +    if (true == target_model_description_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->model_description, buff); | ||||
| +        s_awlan_node->model_description_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_manuf_name_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->manufacturer_name, buff); | ||||
| +        s_awlan_node->manufacturer_name_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_manuf_date_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->manufacturer_date, buff); | ||||
| +        s_awlan_node->manufacturer_date_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_manuf_url_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->manufacturer_url, buff); | ||||
| +        s_awlan_node->manufacturer_url_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_ref_design_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->reference_design, buff); | ||||
| +        s_awlan_node->reference_design_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_cert_region_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->certification_region, buff); | ||||
| +        s_awlan_node->certification_region_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    if (true == target_mac_addr_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +        STRSCPY(s_awlan_node->id, buff); | ||||
| +        s_awlan_node->id_exists = true; | ||||
| +    } | ||||
| + | ||||
| +    SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DT", "AP"); | ||||
| +    SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DM", s_awlan_node->id); | ||||
| +    if (true == target_manuf_abbr_get(buff, sizeof(buff))) | ||||
| +    { | ||||
| +    	SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "VN", buff); | ||||
| +    } | ||||
| +    SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "SN", s_awlan_node->serial_number); | ||||
| +    SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "MN", s_awlan_node->model); | ||||
| +    SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "HW", s_awlan_node->revision); | ||||
| + | ||||
|      LOG(NOTICE, "Device entity {serial=%s id=%s version=%s platform=%s sku=%s}", | ||||
|              s_awlan_node->serial_number, | ||||
|              s_awlan_node->id, | ||||
| @@ -422,6 +474,13 @@ bool act_update_entity (void) | ||||
|                                   "sku_number", | ||||
|                                   "upgrade_status", | ||||
|                                   "upgrade_timer", | ||||
| +                                 "qr_code", | ||||
| +                                 "model_description", | ||||
| +                                 "manufacturer_name", | ||||
| +                                 "manufacturer_date", | ||||
| +                                 "manufacturer_url", | ||||
| +                                 "reference_design", | ||||
| +                                 "certification_region", | ||||
|                                   NULL) | ||||
|                               ); | ||||
|   | ||||
							
								
								
									
										149
									
								
								feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										149
									
								
								feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,149 @@ | ||||
| --- a/interfaces/opensync.ovsschema | ||||
| +++ b/interfaces/opensync.ovsschema | ||||
| @@ -9493,6 +9493,146 @@ | ||||
|        }, | ||||
|        "isRoot": true, | ||||
|        "maxRows": 1 | ||||
| +    }, | ||||
| +    "Radius_Proxy_Config": { | ||||
| +        "columns": { | ||||
| +            "radius_config_name": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "radsec": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "boolean" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "auto_discover": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "boolean" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "server": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "port": { | ||||
| +              "type": { | ||||
| +                "key": { | ||||
| +                  "type": "integer" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "secret": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string" | ||||
| +                }, | ||||
| +                "min": 1, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "acct_server": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string" | ||||
| +                }, | ||||
| +                "min": 0, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "acct_port": { | ||||
| +              "type": { | ||||
| +                "key": { | ||||
| +                  "type": "integer" | ||||
| +                }, | ||||
| +                "min": 0, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "acct_secret": { | ||||
| +                "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string" | ||||
| +                }, | ||||
| +                "min": 0, | ||||
| +                "max": 1 | ||||
| +              } | ||||
| +            }, | ||||
| +            "ca_cert": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "string", | ||||
| +                        "minLength": 1, | ||||
| +                        "maxLength": 256 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +              }, | ||||
| +            "client_cert": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "string", | ||||
| +                        "minLength": 1, | ||||
| +                        "maxLength": 256 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +              }, | ||||
| +            "client_key": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "string", | ||||
| +                        "minLength": 1, | ||||
| +                        "maxLength": 256 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +              }, | ||||
| +            "passphrase": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "string", | ||||
| +                        "minLength": 0, | ||||
| +                        "maxLength": 128 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +              }, | ||||
| +            "realm": { | ||||
| +              "type": { | ||||
| +                "key": { | ||||
| +                  "type": "string", | ||||
| +                  "maxLength": 256 | ||||
| +                }, | ||||
| +                "min": 0, | ||||
| +                "max": 16 | ||||
| +              } | ||||
| +            } | ||||
| +         }, | ||||
| +        "isRoot": true | ||||
|      } | ||||
|    } | ||||
|  } | ||||
							
								
								
									
										13
									
								
								feeds/wlan-ap/opensync/patches/35-add-proxy-arp-schema.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								feeds/wlan-ap/opensync/patches/35-add-proxy-arp-schema.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,13 @@ | ||||
| Index: opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/schema/inc/schema_consts.h | ||||
| +++ opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h | ||||
| @@ -155,6 +155,8 @@ typedef enum { | ||||
|  #define SCHEMA_CONSTS_IEEE80211k	"ieee80211k" | ||||
|  #define SCHEMA_CONSTS_DYNAMIC_VLAN	"dynamic_vlan" | ||||
|  #define SCHEMA_CONSTS_RADPROXY	"radproxy" | ||||
| +#define SCHEMA_CONSTS_PROXY_ARP		"proxy_arp" | ||||
| +#define SCHEMA_CONSTS_MCAST_TO_UCAST	"mcast_to_ucast" | ||||
|   | ||||
|  /* radio Custom options */ | ||||
|  #define SCHEMA_CONSTS_LOCAL_PWR_CONSTRAINT "local_pwr_constraint" | ||||
							
								
								
									
										34
									
								
								feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										34
									
								
								feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,34 @@ | ||||
| Index: opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/datapipeline/src/dppline.c | ||||
| +++ opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c | ||||
| @@ -652,8 +652,8 @@ static bool dppline_copysts(dppline_stat | ||||
|  			dst->u.events.client_event_qty++; | ||||
|  		} | ||||
|   | ||||
| -		size = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t); | ||||
| -		dst->u.events.client_event_list = calloc(1, size); | ||||
| +		int size_cl = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t); | ||||
| +		dst->u.events.client_event_list = calloc(1, size_cl); | ||||
|  		int count = 0; | ||||
|  		ds_dlist_foreach(&report_data->client_event_list, result) | ||||
|  		{ | ||||
| @@ -671,8 +671,8 @@ static bool dppline_copysts(dppline_stat | ||||
|  			dst->u.events.channel_event_qty++; | ||||
|  		} | ||||
|   | ||||
| -		size = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t); | ||||
| -		dst->u.events.channel_event_list = calloc(1, size); | ||||
| +		int size_ch = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t); | ||||
| +		dst->u.events.channel_event_list = calloc(1, size_ch); | ||||
|  		ds_dlist_foreach(&report_data->channel_switch_list, channel_result) | ||||
|  		{ | ||||
|  			assert(count < (int)dst->u.events.channel_event_qty); | ||||
| @@ -680,6 +680,7 @@ static bool dppline_copysts(dppline_stat | ||||
|  			       sizeof(dpp_event_record_channel_switch_t)); | ||||
|  			count++; | ||||
|  		} | ||||
| +		size = size_cl + size_ch; | ||||
|   | ||||
|  	} break; | ||||
|   | ||||
| @@ -0,0 +1,66 @@ | ||||
| Index: opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema | ||||
| +++ opensync-2.0.5.0/interfaces/opensync.ovsschema | ||||
| @@ -8982,6 +8982,61 @@ | ||||
|                      "min": 0, | ||||
|                      "max": 1 | ||||
|                  } | ||||
| +            }, | ||||
| +            "noise_floor_thresh": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "integer", | ||||
| +                        "minInteger": -90, | ||||
| +                        "maxInteger": -10 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +            }, | ||||
| +            "noise_floor_time": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "integer", | ||||
| +                        "minInteger": 60, | ||||
| +                        "maxInteger": 600 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +            }, | ||||
| +            "non_wifi_thresh": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "integer", | ||||
| +                        "minInteger": 0, | ||||
| +                        "maxInteger": 100 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +            }, | ||||
| +            "non_wifi_time": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "integer", | ||||
| +                        "minInteger": 60, | ||||
| +                        "maxInteger": 600 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
| +            }, | ||||
| +            "obss_hop_mode": { | ||||
| +                "type": { | ||||
| +                    "key": { | ||||
| +                        "type": "integer", | ||||
| +                        "minInteger": 1, | ||||
| +                        "maxInteger": 2 | ||||
| +                    }, | ||||
| +                    "min": 0, | ||||
| +                    "max": 1 | ||||
| +                } | ||||
|              } | ||||
|          }, | ||||
|          "isRoot": true | ||||
							
								
								
									
										12
									
								
								feeds/wlan-ap/opensync/patches/37-add-auto-hw_mode.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								feeds/wlan-ap/opensync/patches/37-add-auto-hw_mode.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,12 @@ | ||||
| --- a/interfaces/opensync.ovsschema | ||||
| +++ b/interfaces/opensync.ovsschema | ||||
| @@ -1357,7 +1357,8 @@ | ||||
|                    "11n", | ||||
|                    "11ab", | ||||
|                    "11ac", | ||||
| -                  "11ax" | ||||
| +                  "11ax", | ||||
| +                  "auto" | ||||
|                  ] | ||||
|                ] | ||||
|              }, | ||||
| @@ -0,0 +1,19 @@ | ||||
| --- a/interfaces/opensync.ovsschema | ||||
| +++ b/interfaces/opensync.ovsschema | ||||
| @@ -1880,7 +1880,15 @@ | ||||
|              "min": 0, | ||||
|              "max": "unlimited" | ||||
|            } | ||||
| -        } | ||||
| +        }, | ||||
| +        "channel_max_power": { | ||||
| +          "type": { | ||||
| +            "key": "integer", | ||||
| +            "value": "integer", | ||||
| +            "min": 0, | ||||
| +            "max": "unlimited" | ||||
| +          } | ||||
| +        } | ||||
|        }, | ||||
|        "isRoot": true, | ||||
|        "maxRows": 256 | ||||
							
								
								
									
										13
									
								
								feeds/wlan-ap/opensync/patches/37-cpu-utilization.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								feeds/wlan-ap/opensync/patches/37-cpu-utilization.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,13 @@ | ||||
| Index: opensync-2.0.5.0/src/lib/target/src/target_linux.c | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/target/src/target_linux.c | ||||
| +++ opensync-2.0.5.0/src/lib/target/src/target_linux.c | ||||
| @@ -249,7 +249,7 @@ static bool linux_device_cpuutil_get(dpp | ||||
|          } | ||||
|   | ||||
|          /* Calculate percentage and round */ | ||||
| -        busy = (1.0 - ((double)diff.hz_idle / (double)hz_total_diff)) * 100.0; | ||||
| +       	busy = (100.0 - (((double)diff.hz_idle *100.0) / (double)hz_total_diff)); | ||||
|   | ||||
|          cpuutil->cpu_util = (uint32_t) (busy + 0.5); | ||||
|   | ||||
| @@ -0,0 +1,16 @@ | ||||
| Index: opensync-2.0.5.0/src/lib/datapipeline/inc/dpp_types.h | ||||
| =================================================================== | ||||
| --- opensync-2.0.5.0.orig/src/lib/datapipeline/inc/dpp_types.h | ||||
| +++ opensync-2.0.5.0/src/lib/datapipeline/inc/dpp_types.h | ||||
| @@ -148,10 +148,9 @@ typedef enum | ||||
|      RADIO_SCAN_TYPE_FULL, | ||||
|      RADIO_SCAN_TYPE_ONCHAN, | ||||
|      RADIO_SCAN_TYPE_OFFCHAN, | ||||
| +    RADIO_SCAN_MAX_TYPE_QTY | ||||
|  } radio_scan_type_t; | ||||
|   | ||||
| -#define RADIO_SCAN_MAX_TYPE_QTY       3 | ||||
| - | ||||
|  typedef enum | ||||
|  { | ||||
|      RADIO_QUEUE_TYPE_VI = 0, | ||||
							
								
								
									
										12
									
								
								feeds/wlan-ap/opensync/patches/39-allow-upgrade-retry.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								feeds/wlan-ap/opensync/patches/39-allow-upgrade-retry.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,12 @@ | ||||
| --- a/src/um/src/um_ovsdb.c | ||||
| +++ b/src/um/src/um_ovsdb.c | ||||
| @@ -356,7 +356,8 @@ static void callback_AWLAN_Node( | ||||
|                  //TODO Is there something that needs to be done here? | ||||
|              } | ||||
|   | ||||
| -            if(awlan_node->upgrade_timer_changed){ | ||||
| +            if(awlan_node->upgrade_timer_changed | ||||
| +                || ((awlan_node->firmware_url_changed) && (strlen(awlan_node->firmware_url) > 0))) { | ||||
|                  if (awlan_node->upgrade_timer > 0) | ||||
|                  { | ||||
|                      /* if there is active timer, stop it to set new value   */ | ||||
| @@ -0,0 +1,32 @@ | ||||
| --- a/src/um/inc/um.h | ||||
| +++ b/src/um/inc/um.h | ||||
| @@ -32,6 +32,8 @@ SOFTWARE, EVEN IF ADVISED OF THE POSSIBI | ||||
|   | ||||
|  #define UM_STS_FW_DL_START     (10)    /* FW download started                      */ | ||||
|  #define UM_STS_FW_DL_END       (11)    /* FW download successfully completed       */ | ||||
| +#define UM_STS_RB_END          (12)    /* Reboot has been started                  */ | ||||
| +#define UM_STS_FR_END          (13)    /* Factory reset has been started           */ | ||||
|  #define UM_STS_FW_WR_START     (20)    /* FW write on alt partition started        */ | ||||
|  #define UM_STS_FW_WR_END       (21)    /* FW image write successfully completed    */ | ||||
|  #define UM_STS_FW_BC_START     (30)    /* Bootconfig partition update started      */ | ||||
| --- a/src/um/src/um_ovsdb.c | ||||
| +++ b/src/um/src/um_ovsdb.c | ||||
| @@ -248,8 +248,16 @@ static void cb_upg(const osp_upg_op_t op | ||||
|          case OSP_UPG_DL: | ||||
|              if (status == OSP_UPG_OK) | ||||
|              { | ||||
| -                LOG(INFO, "Download successfully completed"); | ||||
| -                ret_status = UM_STS_FW_DL_END; | ||||
| +                if (!strcmp(upg_url, "reboot")) { | ||||
| +                    LOG(INFO, "Reboot successfully initiated"); | ||||
| +                    ret_status = UM_STS_RB_END; | ||||
| +                } else if (!strcmp(upg_url, "factory"))  { | ||||
| +                    LOG(INFO, "Factory reset successfully initiated"); | ||||
| +                    ret_status = UM_STS_FR_END; | ||||
| +                } else { | ||||
| +                    LOG(INFO, "Download successfully completed"); | ||||
| +                    ret_status = UM_STS_FW_DL_END; | ||||
| +                } | ||||
|              } | ||||
|              else | ||||
|              { | ||||
							
								
								
									
										11
									
								
								feeds/wlan-ap/opensync/patches/41-log-supression.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								feeds/wlan-ap/opensync/patches/41-log-supression.patch
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,11 @@ | ||||
| --- a/src/lib/ovsdb/src/ovsdb_table.c | ||||
| +++ b/src/lib/ovsdb/src/ovsdb_table.c | ||||
| @@ -560,7 +560,7 @@ void ovsdb_table_update_cb(ovsdb_update_ | ||||
|          return; | ||||
|      } | ||||
|   | ||||
| -    LOG(INFO, "MON upd: %s table: %s row: %s", typestr, table->table_name, mon_uuid ); | ||||
| +    LOG(TRACE, "MON upd: %s table: %s row: %s", typestr, table->table_name, mon_uuid ); | ||||
|   | ||||
|      if (LOG_SEVERITY_TRACE <= log_module_severity_get(MODULE_ID)) | ||||
|      { | ||||
| @@ -37,6 +37,23 @@ start_service() { | ||||
|     echo "Setting certificates" | ||||
|     mkdir -p ${CERTS_DEST_PATH} | ||||
|     cp ${CERTS_SRC_PATH}/* ${CERTS_DEST_PATH}/ | ||||
|     echo "Checking Redirector" | ||||
|     redirector=$(uci get system.tip.redirector) | ||||
|     if [ -z "$redirector" ]; then | ||||
|         [[ -f /usr/opensync/certs/redirector.txt ]] && saved_redirector=$(cat /usr/opensync/certs/redirector.txt | tr -d '\r\n') | ||||
|         logger -t opensync "Contacting DigiCert for redirector address" | ||||
|         wlan_ap_redirector.sh | ||||
|         new_redirector=$(uci get system.tip.redirector) | ||||
|         if [ -z "$new_redirector" && -n "$saved_redirector" ]; then | ||||
|             logger -t opensync "No response from DigiCert, using saved redirector address ${saved_redirector}" | ||||
|             wlan_ap_redirector.sh ${saved_redirector} | ||||
|         else | ||||
|             logger -t opensync "DigiCert returned redirector address ${new_redirector}" | ||||
|         fi | ||||
|     else | ||||
|         logger -t opensync "Using existing redirector address ${redirector}" | ||||
|         [[ -f /usr/opensync/certs/redirector.txt ]] || echo "${redirector}" > /usr/opensync/certs/redirector.txt | ||||
|     fi | ||||
|     echo "Starting OpenSync" | ||||
|     procd_set_param command ${PROG} | ||||
|     procd_close_instance | ||||
|   | ||||
| @@ -215,6 +215,7 @@ pid_t cmd_handler_tcpdump_wifi(struct task *task) | ||||
| 	char *argv[] = { "/usr/sbin/tcpdump", "-c", "1000", "-G", duration, "-W", "1", "-w", pcap, "-i", phy, NULL }; | ||||
| 	char iw[128]; | ||||
| 	pid_t pid; | ||||
| 	int ret = 0; | ||||
|  | ||||
| 	task->arg = SCHEMA_KEY_VAL(task->conf.payload, "wifi"); | ||||
| 	if (!task->arg) { | ||||
| @@ -225,15 +226,23 @@ pid_t cmd_handler_tcpdump_wifi(struct task *task) | ||||
|  | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	uci = uci_alloc_context(); | ||||
| 	uci_load(uci, "wireless", &p); | ||||
| 	s = uci_lookup_section(uci, p, task->arg); | ||||
|         if (!s) { | ||||
| 		task_status(task, TASK_FAILED, "unknown wifi"); | ||||
|  | ||||
| 	ret = uci_load(uci, "wireless", &p); | ||||
| 	if (ret) { | ||||
| 		LOGE("%s: uci_load() failed with rc %d", __func__, ret); | ||||
| 		uci_free_context(uci); | ||||
|                 return -1; | ||||
| 		return -1; | ||||
| 	} | ||||
| 	s = uci_lookup_section(uci, p, task->arg); | ||||
| 	if (!s) { | ||||
| 		task_status(task, TASK_FAILED, "unknown wifi"); | ||||
| 		uci_unload(uci, p); | ||||
| 		uci_free_context(uci); | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
|         uci_to_blob(&b, s, &phy_param); | ||||
| 	uci_to_blob(&b, s, &phy_param); | ||||
| 	uci_unload(uci, p); | ||||
| 	uci_free_context(uci); | ||||
|  | ||||
| 	blobmsg_parse(phy_policy, __PHY_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head)); | ||||
|   | ||||
| @@ -1,6 +1,9 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #include <string.h> | ||||
| #include <glob.h> | ||||
| #include <linux/limits.h> | ||||
| #include <libgen.h> | ||||
|  | ||||
| #include "uci.h" | ||||
| #include "command.h" | ||||
| @@ -88,9 +91,14 @@ static void syslog_state(int config) | ||||
| 	struct uci_element *e = NULL; | ||||
| 	struct uci_section *s = NULL; | ||||
| 	char val[128]; | ||||
| 	int ret = 0; | ||||
|  | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	uci_load(uci, "system", &system); | ||||
| 	ret = uci_load(uci, "system", &system); | ||||
| 	if (ret) { | ||||
| 		LOGE("%s: uci_load() failed with rc %d", __func__, ret); | ||||
| 		return; | ||||
| 	} | ||||
| 	uci_foreach_element(&system->sections, e) { | ||||
| 		s = uci_to_section(e); | ||||
| 		if (!strcmp(s->type, "system")) | ||||
| @@ -151,7 +159,6 @@ static void syslog_handler(int type, | ||||
| 	blob_to_uci_section(uci, "system", "@system[-1]", "system", | ||||
| 			    b.head, &log_param, NULL); | ||||
| 	uci_commit_all(uci); | ||||
| 	system("/sbin/reload_config"); | ||||
| 	if (del) | ||||
| 		node_state_del("syslog"); | ||||
| 	else | ||||
| @@ -179,14 +186,20 @@ static void ntp_state(int config) | ||||
|         struct uci_section *s; | ||||
| 	struct blob_attr *cur = NULL; | ||||
| 	char val[128] = {}; | ||||
| 	int first = 1, rem = 0; | ||||
| 	int first = 1, rem = 0, ret = 0; | ||||
|  | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	uci_load(uci, "system", &p); | ||||
| 	ret = uci_load(uci, "system", &p); | ||||
| 	if (ret) { | ||||
| 		LOGE("%s: uci_load() failed with rc %d", __func__, ret); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	s = uci_lookup_section(uci, p, "ntp"); | ||||
| 	if (!s) | ||||
| 	if (!s) { | ||||
| 		uci_unload(uci, p); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	uci_to_blob(&b, s, &ntp_param); | ||||
| 	blobmsg_parse(ntp_policy, __NTP_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head)); | ||||
| @@ -238,10 +251,132 @@ static void ntp_handler(int type, | ||||
| 	blob_to_uci_section(uci, "system", "ntp", "timeserver", | ||||
| 			    b.head, &ntp_param, NULL); | ||||
| 	uci_commit_all(uci); | ||||
| 	system("/sbin/reload_config"); | ||||
| 	ntp_state(0); | ||||
| } | ||||
|  | ||||
| enum { | ||||
| 	LED_ATTR_SYSFS, | ||||
| 	LED_ATTR_TRIGGER, | ||||
| 	LED_ATTR_DELAYON, | ||||
| 	LED_ATTR_DELAYOFF, | ||||
| 	LED_ATTR_VALUE, | ||||
| 	LED_ATTR_KEY, | ||||
| 	__LED_ATTR_MAX, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy led_policy[__LED_ATTR_MAX] = { | ||||
| 	[LED_ATTR_SYSFS] = { .name = "sysfs", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[LED_ATTR_TRIGGER] = { .name = "trigger", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[LED_ATTR_DELAYON] = { .name = "delayon", .type = BLOBMSG_TYPE_STRING}, | ||||
| 	[LED_ATTR_DELAYOFF] = { .name = "delayoff", .type = BLOBMSG_TYPE_STRING}, | ||||
| 	[LED_ATTR_VALUE] = { .name = "value", .type = BLOBMSG_TYPE_STRING}, | ||||
| 	[LED_ATTR_KEY] = { .name = "key", .type = BLOBMSG_TYPE_STRING}, | ||||
| }; | ||||
|  | ||||
| static const struct uci_blob_param_list led_param = { | ||||
| 	.n_params = __LED_ATTR_MAX, | ||||
| 	.params = led_policy, | ||||
| }; | ||||
|  | ||||
| static char led[][8]={"lan", "wan", "eth", "wifi2", "wifi5", "wlan2g", "wlan5g", "power","eth0", | ||||
| 			  "status", "eth1", "wifi2g", "eth2", "wifi5g", "plug", "world", "usb", "linksys", "wps", "bt"}; | ||||
|  | ||||
| static void led_state(int config) | ||||
| { | ||||
| 	struct blob_attr *tb[__LED_ATTR_MAX] = { }; | ||||
| 	struct uci_package *system; | ||||
| 	struct uci_section *s = NULL; | ||||
| 	struct uci_element *e = NULL; | ||||
| 	char val[8]; | ||||
| 	char key[16]; | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	uci_load(uci, "system", &system); | ||||
| 	uci_foreach_element(&system->sections, e) { | ||||
| 		s = uci_to_section(e); | ||||
| 		if (!strcmp(s->type, "led")) { | ||||
| 			uci_to_blob(&b, s, &led_param); | ||||
| 			blobmsg_parse(led_policy, __LED_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head)); | ||||
| 			if(tb[LED_ATTR_KEY]) | ||||
| 				strcpy(key, blobmsg_get_string(tb[LED_ATTR_KEY])); | ||||
| 			if(tb[LED_ATTR_VALUE]) | ||||
| 				strcpy(val, blobmsg_get_string(tb[LED_ATTR_VALUE])); | ||||
| 			break; | ||||
| 		} | ||||
| 		s = NULL; | ||||
| 	} | ||||
| 	if (!s) | ||||
| 		goto out; | ||||
| 	if (config) | ||||
| 		node_config_set("led", key, val); | ||||
| 	node_state_set("led", key, val); | ||||
| out: | ||||
| 	uci_unload(uci, system); | ||||
| } | ||||
|  | ||||
| int available_led_check(char *led_name) | ||||
| { | ||||
| 	unsigned int i; | ||||
| 	for (i = 0; i < ARRAY_SIZE(led); i++) { | ||||
| 		if(!strcmp(led_name,led[i])) { | ||||
| 			return 1; | ||||
| 		} | ||||
| 	} | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| static void set_led_config(char *trigger_name, char *key, char* value, char* led_string, char* led_section) | ||||
| { | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	blobmsg_add_string(&b, "sysfs", led_string); | ||||
| 	blobmsg_add_string(&b, "trigger", trigger_name); | ||||
| 	blobmsg_add_string(&b, "value", value); | ||||
| 	blobmsg_add_string(&b, "key", key); | ||||
| 	blob_to_uci_section(uci, "system", led_section, "led", b.head, &led_param, NULL); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| static void led_handler(int type, | ||||
| 			struct schema_Node_Config *old, | ||||
| 			struct schema_Node_Config *conf) | ||||
| { | ||||
| 	char led_string[32]; | ||||
| 	char ap_name[16]; | ||||
| 	char color[16]; | ||||
| 	char led_section[16]; | ||||
| 	char sys[8]; | ||||
| 	char class[8]; | ||||
| 	char leds[8]; | ||||
| 	char sysled[PATH_MAX]; | ||||
| 	glob_t gl; | ||||
| 	unsigned int i; | ||||
|  | ||||
| 	switch (type) { | ||||
| 	case OVSDB_UPDATE_NEW: | ||||
| 	case OVSDB_UPDATE_MODIFY: | ||||
| 		if (!strcmp(conf->key, "led_blink") || !strcmp(conf->key, "led_off")) | ||||
| 		{ | ||||
| 			if (glob("/sys/class/leds/*", GLOB_NOSORT, NULL, &gl)) | ||||
| 				return; | ||||
| 			for (i = 0; i < gl.gl_pathc; i++) { | ||||
| 				strncpy(sysled, gl.gl_pathv[i], sizeof(sysled)); | ||||
| 				sscanf(sysled,"/%[^/]/%[^/]/%[^/]/%s", sys, class, leds, led_string); | ||||
| 				sscanf(led_string,"%[^:]:%[^:]:%s",ap_name, color, led_section); | ||||
| 				if(available_led_check(led_section)) { | ||||
| 					if(!strcmp(conf->key, "led_blink")) { | ||||
| 						set_led_config("heartbeat", conf->key, conf->value, led_string, led_section); | ||||
| 					} | ||||
| 					else if(!strcmp(conf->key, "led_off")) { | ||||
| 						set_led_config("none", conf->key, conf->value, led_string, led_section); | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		globfree(&gl); | ||||
| 	} | ||||
| 	uci_commit_all(uci); | ||||
| 	led_state(0); | ||||
| } | ||||
|  | ||||
| static struct node_handler { | ||||
| 	char *name; | ||||
| 	void (*handler)(int type, | ||||
| @@ -259,6 +394,11 @@ static struct node_handler { | ||||
| 		.handler = ntp_handler, | ||||
| 		.state = ntp_state, | ||||
| 	}, | ||||
| 	{ | ||||
| 		.name = "led", | ||||
| 		.handler = led_handler, | ||||
| 		.state = led_state, | ||||
| 	}, | ||||
| }; | ||||
|  | ||||
| static void callback_Node_Config(ovsdb_update_monitor_t *mon, | ||||
|   | ||||
| @@ -10,7 +10,7 @@ extern const struct schema_Wifi_VIF_Config *vconf; | ||||
| extern void vif_captive_portal_set (const struct schema_Wifi_VIF_Config *vconf, char *ifname); | ||||
| extern void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate); | ||||
| extern void captive_portal_init(); | ||||
| extern void splash_page_logo(char* dest_file,char* src_url); | ||||
| extern void captive_portal_files_download(char* dest_file,char* src_url); | ||||
| extern void vif_dhcp_opennds_allowlist_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname); | ||||
| extern void vif_state_dhcp_allowlist_get(struct schema_Wifi_VIF_State *vstate); | ||||
|  | ||||
|   | ||||
| @@ -0,0 +1,19 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #ifndef _FIXUP_H__ | ||||
| #define _FIXUP_H__ | ||||
|  | ||||
| struct vif_fixup { | ||||
|         struct avl_node avl; | ||||
|         char name[IF_NAMESIZE]; | ||||
|         bool has_captive; | ||||
| }; | ||||
|  | ||||
| struct vif_fixup * vif_fixup_find(const char *name); | ||||
| void vif_fixup_del(char *ifname); | ||||
|  | ||||
|  | ||||
| bool vif_fixup_captive_enabled(void); | ||||
| bool vif_fixup_iface_captive_enabled(const char *ifname); | ||||
| void vif_fixup_set_iface_captive(const char *ifname, bool en); | ||||
| #endif | ||||
| @@ -5,13 +5,14 @@ | ||||
|  | ||||
| extern int phy_from_path(char *path, char *phy); | ||||
| extern int phy_get_mac(char *phy, char *mac); | ||||
| extern int phy_find_hwmon(char *path, char *hwmon); | ||||
| extern int phy_find_hwmon(char *phy, char *hwmon, bool *DegreesNotMilliDegrees); | ||||
| extern int phy_get_tx_chainmask(const char *name); | ||||
| extern int phy_get_rx_chainmask(const char *name); | ||||
| extern int phy_get_tx_available_antenna(const char *name); | ||||
| extern int phy_get_rx_available_antenna(const char *name); | ||||
| extern int phy_get_max_tx_power(const char *name , int channel); | ||||
| extern int phy_get_channels(const char *name, int *channel); | ||||
| extern int phy_get_dfs_channels(const char *name, int *channel); | ||||
| extern int phy_get_channels_state(const char *name, | ||||
| 			struct schema_Wifi_Radio_State *rstate); | ||||
| extern int phy_get_band(const char *name, char *band); | ||||
|   | ||||
| @@ -3,6 +3,10 @@ | ||||
| #ifndef _RADIO_H__ | ||||
| #define _RADIO_H__ | ||||
|  | ||||
| #include "ovsdb_update.h" | ||||
|  | ||||
| #define CONFIG_APPLY_TIMEOUT 35 | ||||
|  | ||||
| struct rrm_neighbor { | ||||
| 	char *mac; | ||||
| 	char *ssid; | ||||
| @@ -10,7 +14,6 @@ struct rrm_neighbor { | ||||
| }; | ||||
|  | ||||
| extern const struct target_radio_ops *radio_ops; | ||||
| extern int reload_config; | ||||
| extern struct blob_buf b; | ||||
| extern struct uci_context *uci; | ||||
|  | ||||
| @@ -21,4 +24,9 @@ extern int hapd_rrm_set_neighbors(char *name, struct rrm_neighbor *neigh, int co | ||||
|  | ||||
| extern void radio_maverick(void *arg); | ||||
|  | ||||
| int nl80211_channel_get(char *name, unsigned int *chan); | ||||
| void set_config_apply_timeout(ovsdb_update_monitor_t *mon); | ||||
| bool apc_read_conf(struct schema_APC_Config *apcconf); | ||||
| bool apc_read_state(struct schema_APC_State *apcst); | ||||
|  | ||||
| #endif | ||||
|   | ||||
| @@ -0,0 +1,38 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #ifndef RADIUS_PROXY_H_INCLUDED | ||||
| #define RADIUS_PROXY_H_INCLUDED | ||||
|  | ||||
| #include <stdbool.h> | ||||
| #include <jansson.h> | ||||
| #include <ev.h> | ||||
| #include <sys/time.h> | ||||
| #include <syslog.h> | ||||
|  | ||||
| #include "log.h" | ||||
| #include "os_nif.h" | ||||
|  | ||||
| #include "target.h" | ||||
| #include "dppline.h" | ||||
|  | ||||
| #include "os.h" | ||||
| #include "util.h" | ||||
| #include "ovsdb.h" | ||||
| #include "ovsdb_update.h" | ||||
| #include "ovsdb_sync.h" | ||||
| #include "ovsdb_table.h" | ||||
| #include "ovsdb_cache.h" | ||||
| #include "schema.h" | ||||
| #include "target.h" | ||||
|  | ||||
| #include "utils.h" | ||||
| #include <libubox/list.h> | ||||
| #include <evsched.h> | ||||
|  | ||||
| extern ovsdb_table_t table_Radius_Proxy_Config; | ||||
|  | ||||
| void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *mon, | ||||
| 		struct schema_Radius_Proxy_Config *old, struct schema_Radius_Proxy_Config *conf); | ||||
|  | ||||
| #endif /* RADIUS_PROXY_H_INCLUDED */ | ||||
|  | ||||
| @@ -0,0 +1,20 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #ifndef __TIMER_H__ | ||||
| #define __TIMER_H__ | ||||
|  | ||||
| #include <sys/time.h> | ||||
|  | ||||
| struct timeout; | ||||
| typedef void (*timeout_handler)(struct timeout *t); | ||||
|  | ||||
| struct timeout { | ||||
| 	bool pending; | ||||
| 	timeout_handler cb; | ||||
| 	struct timeval time; | ||||
| }; | ||||
|  | ||||
| int timeout_set(struct timeout *timeout, int msecs); | ||||
| void timer_expiry_check(struct timeout *timeout); | ||||
|  | ||||
| #endif | ||||
| @@ -13,6 +13,7 @@ struct mode_map { | ||||
| 	char *ucihwmode; | ||||
| 	char *htmode; | ||||
| 	char *ucihtmode; | ||||
| 	int  sec_channel_offset; | ||||
| }; | ||||
|  | ||||
| extern struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode); | ||||
| @@ -20,6 +21,7 @@ extern struct mode_map *mode_map_get_cloud(const char *htmode, const char *hwmod | ||||
|  | ||||
| extern int vif_get_mac(char *vap, char *mac); | ||||
| extern int vif_is_ready(const char *name); | ||||
| bool vif_get_key_for_key_distr(const char *secret, char *key_str); | ||||
|  | ||||
| #define blobmsg_add_bool blobmsg_add_u8 | ||||
| extern int blobmsg_add_hex16(struct blob_buf *buf, const char *name, uint16_t val); | ||||
| @@ -38,4 +40,8 @@ extern int iface_is_up(const char *ifname); | ||||
| extern int net_get_mtu(char *iface); | ||||
| extern int net_get_mac(char *iface, char *mac); | ||||
| extern int net_is_bridge(char *iface); | ||||
| extern char* get_max_channel_bw_channel(int channel_freq, const char* htmode); | ||||
| int phy_find_hwmon_helper(char *dir, char *file, char *hwmon); | ||||
| extern double dBm_to_mwatts(double dBm); | ||||
| extern double mWatts_to_dBm(double mW); | ||||
| #endif | ||||
|   | ||||
| @@ -19,6 +19,7 @@ | ||||
| #define OVSDB_SECURITY_ENCRYPTION_WPA_SAE   "WPA-SAE" | ||||
| #define OVSDB_SECURITY_ENCRYPTION_WPA_EAP   "WPA-EAP" | ||||
| #define OVSDB_SECURITY_ENCRYPTION_WPA3_EAP  "WPA3-EAP" | ||||
| #define OVSDB_SECURITY_ENCRYPTION_WPA3_EAP_192  "WPA3-EAP-192" | ||||
| #define OVSDB_SECURITY_RADIUS_SERVER_IP     "radius_server_ip" | ||||
| #define OVSDB_SECURITY_RADIUS_SERVER_PORT   "radius_server_port" | ||||
| #define OVSDB_SECURITY_RADIUS_SERVER_SECRET "radius_server_secret" | ||||
| @@ -37,5 +38,6 @@ void vif_hs20_update(struct schema_Hotspot20_Config *hs2conf); | ||||
| void vif_hs20_osu_update(struct schema_Hotspot20_OSU_Providers *hs2osuconf); | ||||
| void vif_hs20_icon_update(struct schema_Hotspot20_Icon_Config *hs2iconconf); | ||||
| void vif_section_del(char *section_name); | ||||
| void vif_check_radius_proxy(void); | ||||
|  | ||||
| #endif | ||||
|   | ||||
| @@ -46,6 +46,9 @@ UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/sysupgrade.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/dhcpdiscovery.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_proxy.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/timer.c | ||||
| UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/fixup.c | ||||
|  | ||||
| CONFIG_USE_KCONFIG=y | ||||
| CONFIG_INET_ETH_LINUX=y | ||||
|   | ||||
| @@ -20,10 +20,18 @@ | ||||
| #include "nl80211.h" | ||||
| #include "utils.h" | ||||
| #include "captive.h" | ||||
| #include <libubox/avl-cmp.h> | ||||
| #include <libubox/avl.h> | ||||
| #include <libubox/vlist.h> | ||||
| #include <net/if.h> | ||||
| #include "fixup.h" | ||||
|  | ||||
| struct blob_buf cap={ }; | ||||
| static struct blob_buf cap={ }; | ||||
| static struct blob_buf cap_blob={ }; | ||||
| static struct blob_buf url_buf={ }; | ||||
| static struct uci_package *opennds; | ||||
| static struct uci_context *cap_uci; | ||||
| static struct uci_context *caps_uci; | ||||
| static struct uci_context *capg_uci; | ||||
| struct blob_attr *d; | ||||
|  | ||||
| #define SCHEMA_CAPTIVE_PORTAL_OPT_SZ            255 | ||||
| @@ -140,6 +148,10 @@ void vif_state_dhcp_allowlist_get(struct schema_Wifi_VIF_State *vstate) | ||||
| 	char read_ifname[8]; | ||||
| 	char set[8]; | ||||
| 	struct blob_attr *td[__DNS_ATTR_MAX] = { }; | ||||
|  | ||||
| 	if (vif_fixup_iface_captive_enabled(vstate->if_name) == false) | ||||
| 		return; | ||||
|  | ||||
| 	uci_load(dns, "dhcp", &dhcp); | ||||
| 	ip_section = uci_lookup_section(dns, dhcp,"dnsmasq"); | ||||
| 	if(!ip_section) { | ||||
| @@ -182,12 +194,16 @@ void vif_dhcp_opennds_allowlist_set(const struct schema_Wifi_VIF_Config *vconf, | ||||
| 	int i; | ||||
| 	char ips[128]; | ||||
| 	char buff[64]; | ||||
|  | ||||
| 	if (vif_fixup_iface_captive_enabled(vconf->if_name) == false) | ||||
| 		return; | ||||
|  | ||||
| 	ipset_flush(ifname); | ||||
| 	e = blobmsg_open_array(&dnsmas, "ipset"); | ||||
| 	for (i = 0; i < vconf->captive_allowlist_len; i++) | ||||
| 	{ | ||||
| 		strcpy(buff,(char*)vconf->captive_allowlist[i]); | ||||
| 		sprintf(ips,"/%s/set_%s", buff,"opennds"); | ||||
| 		snprintf(ips, sizeof(ips), "/%s/set_%s", buff,"opennds"); | ||||
| 		blobmsg_add_string(&dnsmas, NULL,ips); | ||||
| 	} | ||||
| 	blobmsg_close_array(&dnsmas, e); | ||||
| @@ -235,10 +251,13 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate) | ||||
| 	struct blob_attr *tc[__NDS_ATTR_MAX] = { }; | ||||
| 	struct uci_section *cp_section; | ||||
|  | ||||
| 	uci_load(cap_uci, "opennds", &opennds); | ||||
| 	cp_section = uci_lookup_section(cap_uci, opennds,"opennds"); | ||||
| 	if (vif_fixup_iface_captive_enabled(vstate->if_name) == false) | ||||
| 		return; | ||||
|  | ||||
| 	uci_load(capg_uci, "opennds", &opennds); | ||||
| 	cp_section = uci_lookup_section(capg_uci, opennds,"opennds"); | ||||
| 	if(!cp_section) { | ||||
| 		uci_unload(cap_uci, opennds); | ||||
| 		uci_unload(capg_uci, opennds); | ||||
| 		return; | ||||
| 	} | ||||
| 	blob_buf_init(&cap, 0); | ||||
| @@ -258,12 +277,8 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate) | ||||
| 		} else if (!strcmp(opt, "authentication")) { | ||||
| 			if(tc[NDS_ATTR_AUTHENTICATION]) { | ||||
| 				buf = blobmsg_get_string(tc[NDS_ATTR_AUTHENTICATION]); | ||||
| 				if (!strcmp(buf, "None")) { | ||||
| 				if (!strcmp(buf, "None") || !strcmp(buf, "username") || !strcmp(buf, "radius")) { | ||||
|  | ||||
| 					set_captive_portal_state(vstate, &index, | ||||
| 							captive_portal_options_table[i], | ||||
| 							buf); | ||||
| 				} else if (!strcmp(buf,"username")) { | ||||
| 					set_captive_portal_state(vstate, &index, | ||||
| 							captive_portal_options_table[i], | ||||
| 							buf); | ||||
| @@ -355,15 +370,14 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate) | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| uci_unload(cap_uci, opennds); | ||||
| uci_unload(capg_uci, opennds); | ||||
| return; | ||||
| } | ||||
|  | ||||
| void clean_up(CURL *curl,FILE* imagefile, FILE* headerfile) | ||||
| void clean_up(CURL *curl,FILE* imagefile) | ||||
| { | ||||
| 	curl_easy_cleanup(curl); | ||||
| 	fclose(imagefile); | ||||
| 	fclose(headerfile); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| @@ -372,33 +386,27 @@ size_t write_data(void *ptr, size_t size, size_t nmemb, FILE *stream) { | ||||
|     return written; | ||||
| } | ||||
|  | ||||
| void splash_page_logo(char* dest_file, char* src_url) | ||||
| void captive_portal_files_download(char* dest_file, char* src_url) | ||||
| { | ||||
| 	CURL *curl; | ||||
| 	CURLcode res; | ||||
| 	FILE *imagefile; | ||||
| 	FILE *headerfile; | ||||
| 	static const char *clientcert = "/usr/opensync/certs/client.pem"; | ||||
| 	const char *clientcert = "/usr/opensync/certs/client.pem"; | ||||
| 	const char *clientkey = "/usr/opensync/certs/client_dec.key"; | ||||
| 	static const char *pHeaderFile = "/etc/opennds/splashlogo_header"; | ||||
| 	const char *keytype = "PEM"; | ||||
| 	char errbuf[CURL_ERROR_SIZE]; | ||||
| 	headerfile = fopen(pHeaderFile, "wb"); | ||||
|  | ||||
| 	imagefile = fopen(dest_file, "wb"); | ||||
| 	if(imagefile == NULL){ | ||||
| 		LOG(ERR, "fopen failed"); | ||||
| 		if(headerfile) | ||||
| 			fclose(headerfile); | ||||
| 		return; | ||||
| 	} | ||||
| 	curl = curl_easy_init(); | ||||
|  | ||||
| 	if (curl == NULL){ | ||||
| 		LOG(ERR, "curl_easy_init failed"); | ||||
| 		clean_up(curl,imagefile,headerfile); | ||||
| 		clean_up(curl,imagefile); | ||||
| 		return; | ||||
| 	} | ||||
| 	curl_easy_setopt(curl, CURLOPT_HEADERDATA, headerfile); | ||||
| 	curl_easy_setopt(curl, CURLOPT_URL, src_url); | ||||
| 	curl_easy_setopt(curl, CURLOPT_SSLCERT, clientcert); | ||||
| 	curl_easy_setopt(curl, CURLOPT_SSLKEY, clientkey); | ||||
| @@ -407,23 +415,22 @@ void splash_page_logo(char* dest_file, char* src_url) | ||||
| 	curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L); | ||||
| 	curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_data); | ||||
| 	curl_easy_setopt(curl, CURLOPT_WRITEDATA, imagefile); | ||||
| 	curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, errbuf); | ||||
| 	curl_easy_setopt(curl, CURLOPT_HEADER, 0L); | ||||
|  | ||||
| 	res = curl_easy_perform(curl); | ||||
| 	if (res != CURLE_OK){ | ||||
| 		clean_up(curl,imagefile,headerfile); | ||||
| 		clean_up(curl,imagefile); | ||||
| 		remove(dest_file); | ||||
| 		return; | ||||
| 	} | ||||
| 	clean_up(curl,imagefile,headerfile); | ||||
| 	clean_up(curl,imagefile); | ||||
| 	return ; | ||||
| } | ||||
|  | ||||
| int ipset_create(char *ifnds) | ||||
| { | ||||
| 	char command[64]; | ||||
| 	sprintf(command,"ipset create set_%s hash:ip", ifnds); | ||||
| 	snprintf(command, sizeof(command), "ipset create set_%s hash:ip", ifnds); | ||||
| 	return (system(command)); | ||||
| } | ||||
|  | ||||
| @@ -431,18 +438,19 @@ void captive_portal_get_current_urls(char *ifname, char *splash_logo, char *back | ||||
| { | ||||
| 	char *buf = NULL; | ||||
| 	struct blob_attr *tc[__NDS_ATTR_MAX] = { }; | ||||
| 	struct blob_buf url_buf={ }; | ||||
| 	struct uci_section *cp_section; | ||||
| 	struct uci_section *cp_section = NULL; | ||||
| 	struct uci_package *opennds = NULL; | ||||
|  | ||||
| 	uci_load(cap_uci, "opennds", &opennds); | ||||
| 	cp_section = uci_lookup_section(cap_uci, opennds,"opennds"); | ||||
| 	uci_load(caps_uci, "opennds", &opennds); | ||||
| 	cp_section = uci_lookup_section(caps_uci, opennds,"opennds"); | ||||
| 	if(!cp_section) { | ||||
| 		uci_unload(cap_uci, opennds); | ||||
| 		uci_unload(caps_uci, opennds); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	blob_buf_init(&url_buf, 0); | ||||
| 	uci_to_blob(&url_buf, cp_section, &opennds_param); | ||||
|  | ||||
| 	blobmsg_parse(opennds_policy, __NDS_ATTR_MAX, tc, blob_data(url_buf.head), blob_len(url_buf.head)); | ||||
|  | ||||
| 	if (tc[NDS_ATTR_SPLASH_PAGE_LOGO]) { | ||||
| @@ -464,7 +472,8 @@ void captive_portal_get_current_urls(char *ifname, char *splash_logo, char *back | ||||
| 	} else { | ||||
| 		user_file[0]=0; | ||||
| 	} | ||||
| 	uci_unload(cap_uci, opennds); | ||||
| 	uci_unload(caps_uci, opennds); | ||||
|  | ||||
| 	return; | ||||
| } | ||||
| void opennds_parameters(char *ifname) | ||||
| @@ -473,7 +482,7 @@ void opennds_parameters(char *ifname) | ||||
| 	char users_router[7][64] = { "allow tcp port 53","allow udp port 53", | ||||
| 				"allow udp port 67","allow tcp port 22", | ||||
| 				"allow tcp port 23", "allow tcp port 80", "allow tcp port 443"}; | ||||
| 	struct blob_buf cap_blob={ }; | ||||
|  | ||||
| 	blob_buf_init(&cap_blob, 0); | ||||
|  | ||||
| 	blobmsg_add_string(&cap_blob, "fwhook_enabled","1"); | ||||
| @@ -497,8 +506,8 @@ void opennds_parameters(char *ifname) | ||||
| 		blobmsg_add_string(&cap_blob, NULL, users_router[i]); | ||||
| 	} | ||||
| 	blobmsg_close_array(&cap_blob, d); | ||||
| 	blob_to_uci_section(cap_uci, "opennds", "opennds", "opennds", cap_blob.head, &opennds_param, NULL); | ||||
| 	uci_commit_all(cap_uci); | ||||
| 	blob_to_uci_section(caps_uci, "opennds", "opennds", "opennds", cap_blob.head, &opennds_param, NULL); | ||||
| 	uci_commit_all(caps_uci); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| @@ -506,25 +515,26 @@ void opennds_section_del(char *section_name) | ||||
| { | ||||
| 	struct uci_package *opennds; | ||||
| 	struct uci_element *e = NULL, *tmp = NULL; | ||||
| 	int ret=0; | ||||
| 	int ret = 0; | ||||
|  | ||||
| 	ret= uci_load(uci, "opennds", &opennds); | ||||
| 	ret = uci_load(caps_uci, "opennds", &opennds); | ||||
| 	if (ret) { | ||||
| 		LOGD("%s: uci_load() failed with rc %d", section_name, ret); | ||||
| 		LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret); | ||||
| 		uci_unload(caps_uci, opennds); | ||||
| 		return; | ||||
| 	} | ||||
| 	uci_foreach_element_safe(&opennds->sections, tmp, e) { | ||||
| 		struct uci_section *s = uci_to_section(e); | ||||
| 		if (!strcmp(s->e.name, section_name)) { | ||||
| 			uci_section_del(uci, "vif", "opennds", (char *)s->e.name, section_name); | ||||
| 			uci_section_del(caps_uci, "vif", "opennds", (char *)s->e.name, section_name); | ||||
| 		} | ||||
| 		else { | ||||
| 			continue; | ||||
| 		} | ||||
| 	} | ||||
| 	uci_commit(uci, &opennds, false); | ||||
| 	uci_unload(uci, opennds); | ||||
| 	reload_config = 1; | ||||
|  | ||||
| 	uci_commit(caps_uci, &opennds, false); | ||||
| 	uci_unload(caps_uci, opennds); | ||||
| } | ||||
|  | ||||
| void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname) | ||||
| @@ -534,23 +544,26 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 	const char *opt; | ||||
| 	const char *val; | ||||
| 	blob_buf_init(&cap, 0); | ||||
| 	char path[64]; | ||||
| 	char webroot[64]; | ||||
| 	char path[64] = {0}; | ||||
| 	char webroot[64] = {0}; | ||||
|  | ||||
| 	char ipset_tcp80[64]; | ||||
| 	char ipset_tcp443[64]; | ||||
| 	char splash_logo[84]; | ||||
| 	char back_image[84]; | ||||
| 	char user_file[84]; | ||||
|  | ||||
| 	sprintf(path,"/etc/opennds/htdocs/images/"); | ||||
| 	sprintf(webroot,"/etc/opennds/htdocs"); | ||||
| 	sprintf(ipset_tcp80,"allow tcp port 80 ipset set_opennds"); | ||||
| 	sprintf(ipset_tcp443,"allow tcp port 443 ipset set_opennds"); | ||||
| 	char splash_logo[84] = {0}; | ||||
| 	char back_image[84] = {0}; | ||||
| 	char user_file[84] = {0}; | ||||
|  | ||||
| 	snprintf(path, sizeof(path), "/etc/opennds/htdocs/images/"); | ||||
| 	snprintf(webroot, sizeof(webroot), "/etc/opennds/htdocs"); | ||||
|  | ||||
| 	snprintf(ipset_tcp80, sizeof(ipset_tcp80),"allow tcp port 80 ipset set_opennds"); | ||||
| 	snprintf(ipset_tcp443, sizeof(ipset_tcp443), "allow tcp port 443 ipset set_opennds"); | ||||
|  | ||||
| 	char file_path[128]; | ||||
| 	struct stat st = {0}; | ||||
| 	if (stat(path, &st) == -1) | ||||
| 		mkdir(path, 0755); | ||||
|  | ||||
| 	captive_portal_get_current_urls(ifname, splash_logo, back_image, user_file); | ||||
|  | ||||
| 	for (j = 0; j < SCHEMA_CAPTIVE_PORTAL_OPTS_MAX; j++) { | ||||
| @@ -575,6 +588,7 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 				blobmsg_add_string(&cap, NULL, ipset_tcp80); | ||||
| 				blobmsg_add_string(&cap, NULL, ipset_tcp443); | ||||
| 				blobmsg_close_array(&cap, d); | ||||
| 				vif_fixup_set_iface_captive(ifname, true); | ||||
|  | ||||
| 			} else if (strcmp(value,"username")==0) { | ||||
| 				blobmsg_add_string(&cap, "webroot",webroot); | ||||
| @@ -589,6 +603,8 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 				blobmsg_add_string(&cap, NULL, ipset_tcp443); | ||||
| 				blobmsg_close_array(&cap, d); | ||||
|  | ||||
| 				vif_fixup_set_iface_captive(ifname, true); | ||||
|  | ||||
| 			} else if (strcmp(value,"radius")==0)  { | ||||
| 				blobmsg_add_string(&cap, "webroot",webroot); | ||||
| 				opennds_parameters("opennds"); | ||||
| @@ -596,14 +612,19 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 				blobmsg_add_string(&cap, "enabled", "1"); | ||||
| 				blobmsg_add_string(&cap, "gatewayinterface","br-lan"); | ||||
| 				blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh"); | ||||
| 				ipset_create(ifname); | ||||
|  | ||||
| 				ipset_create("opennds"); | ||||
| 				d = blobmsg_open_array(&cap, "preauthenticated_users"); | ||||
| 				blobmsg_add_string(&cap, NULL, ipset_tcp80); | ||||
| 				blobmsg_add_string(&cap, NULL, ipset_tcp443); | ||||
| 				blobmsg_close_array(&cap, d); | ||||
|  | ||||
| 				vif_fixup_set_iface_captive(ifname, true); | ||||
| 			} | ||||
| 			else { | ||||
| 				opennds_section_del("opennds"); | ||||
| 				vif_fixup_set_iface_captive(ifname, false); | ||||
| 				if (vif_fixup_captive_enabled() == false) | ||||
| 					opennds_section_del("opennds"); | ||||
| 				return; | ||||
| 			} | ||||
| 		} | ||||
| @@ -616,8 +637,12 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 		else if (strcmp(opt, "radius_server_secret") == 0) | ||||
| 			blobmsg_add_string(&cap, "radius_server_secret", value); | ||||
|  | ||||
| 		else if (strcmp(opt, "radius_auth_type") == 0) | ||||
| 			blobmsg_add_string(&cap, "radius_auth_type", value); | ||||
| 		else if (strcmp(opt, "radius_auth_type") == 0) { | ||||
| 			if(!strcmp(value, "MSCHAPv2")) | ||||
| 				blobmsg_add_string(&cap, "radius_auth_type", "MSCHAPV2"); | ||||
| 			else | ||||
| 				blobmsg_add_string(&cap, "radius_auth_type", value); | ||||
| 		} | ||||
|  | ||||
| 		else if (strcmp(opt, "session_timeout") == 0) | ||||
| 			blobmsg_add_string(&cap, "sessiontimeout", value); | ||||
| @@ -626,17 +651,21 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 			blobmsg_add_string(&cap, "gatewayname", value); | ||||
|  | ||||
| 		else if (strcmp(opt, "splash_page_logo") == 0) { | ||||
| 			blobmsg_add_string(&cap, "splash_page_logo", value); | ||||
| 			if (strcmp(splash_logo,value) !=0) { | ||||
| 				sprintf(file_path,"%s%s",path,"TipLogo.png"); | ||||
| 				splash_page_logo(file_path,value); | ||||
| 			if (value[0] != '\0') { | ||||
| 				blobmsg_add_string(&cap, "splash_page_logo", value); | ||||
| 				if (strcmp(splash_logo,value) !=0) { | ||||
| 					snprintf(file_path, sizeof(file_path), "%s%s",path,"TipLogo.png"); | ||||
| 					captive_portal_files_download(file_path,value); | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 		} else if (strcmp(opt, "splash_page_background_logo") == 0) { | ||||
| 			blobmsg_add_string(&cap, "page_background_logo", value); | ||||
| 			if (strcmp(back_image,value) !=0) { | ||||
| 				sprintf(file_path,"%s%s",path,"TipBackLogo.png"); | ||||
| 				splash_page_logo(file_path,value); | ||||
| 			if (value[0] != '\0') { | ||||
| 				blobmsg_add_string(&cap, "page_background_logo", value); | ||||
| 				if (strcmp(back_image,value) !=0) { | ||||
| 					snprintf(file_path, sizeof(file_path),"%s%s",path,"TipBackLogo.png"); | ||||
| 					captive_portal_files_download(file_path,value); | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| @@ -654,20 +683,24 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if | ||||
| 			blobmsg_add_string(&cap, "login_success_text", value); | ||||
|  | ||||
| 		else if (strcmp(opt, "username_password_file") == 0) { | ||||
| 			blobmsg_add_string(&cap, "username_password_file", value); | ||||
| 			if (strcmp(user_file,value) !=0) { | ||||
| 				sprintf(file_path,"%s%s",path,"userpass.dat"); | ||||
| 				splash_page_logo(file_path,value); | ||||
| 			if (value[0] != '\0') { | ||||
| 				blobmsg_add_string(&cap, "username_password_file", value); | ||||
| 				if (strcmp(user_file,value) !=0) { | ||||
| 					snprintf(file_path, sizeof(file_path),"%s%s",path,"userpass.dat"); | ||||
| 					captive_portal_files_download(file_path,value); | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	blob_to_uci_section(cap_uci, "opennds", "opennds", "opennds", cap.head, &opennds_param, NULL); | ||||
| 	uci_commit_all(cap_uci); | ||||
| 	blob_to_uci_section(caps_uci, "opennds", "opennds", "opennds", cap.head, &opennds_param, NULL); | ||||
| 	uci_commit_all(caps_uci); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| void captive_portal_init() | ||||
| { | ||||
| 	cap_uci=uci_alloc_context(); | ||||
| 	caps_uci=uci_alloc_context(); | ||||
| 	capg_uci=uci_alloc_context(); | ||||
| 	dns=uci_alloc_context(); | ||||
| 	return; | ||||
| } | ||||
|   | ||||
| @@ -0,0 +1,89 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <string.h> | ||||
| #include <fcntl.h> | ||||
| #include <ctype.h> | ||||
| #include <stdbool.h> | ||||
| #include <errno.h> | ||||
| #include <stdlib.h> | ||||
|  | ||||
| #include "log.h" | ||||
| #include "const.h" | ||||
| #include "target.h" | ||||
|  | ||||
| #include <libubox/avl-cmp.h> | ||||
| #include <libubox/avl.h> | ||||
| #include <libubox/vlist.h> | ||||
| #include <net/if.h> | ||||
|  | ||||
| #include "fixup.h" | ||||
|  | ||||
|  | ||||
| /* | ||||
|  * VIF Fixup | ||||
|  */ | ||||
|  | ||||
| static struct avl_tree vif_fixup_tree = AVL_TREE_INIT(vif_fixup_tree, avl_strcmp, false, NULL); | ||||
|  | ||||
| struct vif_fixup * vif_fixup_find(const char *ifname) | ||||
| { | ||||
|         struct vif_fixup *vif = avl_find_element(&vif_fixup_tree, ifname, vif, avl); | ||||
|         if (vif) | ||||
|                 return vif; | ||||
|  | ||||
| 	/* Not found, add */ | ||||
|         vif = malloc(sizeof(*vif)); | ||||
|         if (!vif) | ||||
|                 return NULL; | ||||
|  | ||||
|         memset(vif, 0, sizeof(*vif)); | ||||
|         strncpy(vif->name, ifname, IF_NAMESIZE); | ||||
|         vif->avl.key = vif->name; | ||||
|         avl_insert(&vif_fixup_tree, &vif->avl); | ||||
|         return vif; | ||||
| } | ||||
|  | ||||
| void vif_fixup_del(char *ifname) | ||||
| { | ||||
|         struct vif_fixup *vif = NULL; | ||||
|         vif = avl_find_element(&vif_fixup_tree, ifname, vif, avl); | ||||
|         if (vif) { | ||||
| 		avl_delete(&vif_fixup_tree, &vif->avl); | ||||
| 		free(vif); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| bool vif_fixup_captive_enabled(void) | ||||
| { | ||||
|         struct vif_fixup *vif_ptr = NULL; | ||||
|         struct vif_fixup *vif = NULL; | ||||
|  | ||||
| 	avl_for_each_element_safe(&vif_fixup_tree, vif, avl, vif_ptr) { | ||||
| 		if (vif->has_captive == true) | ||||
| 			return true; | ||||
| 	} | ||||
| 	return false; | ||||
| } | ||||
|  | ||||
| bool vif_fixup_iface_captive_enabled(const char *ifname) | ||||
| { | ||||
| 	struct vif_fixup * vif = NULL; | ||||
|  | ||||
| 	vif = vif_fixup_find(ifname); | ||||
|  | ||||
| 	if (vif) | ||||
| 		return vif->has_captive; | ||||
| 	else | ||||
| 		return false; | ||||
| } | ||||
|  | ||||
| void vif_fixup_set_iface_captive(const char *ifname, bool en) | ||||
| { | ||||
| 	struct vif_fixup * vif = NULL; | ||||
|  | ||||
| 	vif = vif_fixup_find(ifname); | ||||
|  | ||||
| 	if (vif) | ||||
| 		vif->has_captive = en; | ||||
| } | ||||
| @@ -26,16 +26,26 @@ | ||||
| #include "captive.h" | ||||
| #include "rrm_config.h" | ||||
| #include "vlan.h" | ||||
| #include "radius_proxy.h" | ||||
| #include "timer.h" | ||||
|  | ||||
| ovsdb_table_t table_Hotspot20_Config; | ||||
| ovsdb_table_t table_Hotspot20_OSU_Providers; | ||||
| ovsdb_table_t table_Hotspot20_Icon_Config; | ||||
| ovsdb_table_t table_Radius_Proxy_Config; | ||||
|  | ||||
| ovsdb_table_t table_APC_Config; | ||||
| ovsdb_table_t table_APC_State; | ||||
| ovsdb_table_t table_Wifi_VIF_Config; | ||||
| ovsdb_table_t table_Wifi_Inet_Config; | ||||
| ovsdb_table_t table_Node_Config; | ||||
|  | ||||
| unsigned int radproxy_apc = 0; | ||||
|  | ||||
| static struct uci_package *wireless; | ||||
| struct uci_context *uci; | ||||
| struct blob_buf b = { }; | ||||
| struct blob_buf del = { }; | ||||
| int reload_config = 0; | ||||
| static struct timespec startup_time; | ||||
|  | ||||
| enum { | ||||
| @@ -72,7 +82,7 @@ static const struct blobmsg_policy wifi_device_policy[__WDEV_ATTR_MAX] = { | ||||
| 	[WDEV_ATTR_RX_ANTENNA] = { .name = "rxantenna", .type = BLOBMSG_TYPE_INT32 }, | ||||
| 	[WDEV_ATTR_FREQ_BAND] = { .name = "freq_band", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[WDEV_AATR_CHANNELS] = {.name = "channels", .type = BLOBMSG_TYPE_ARRAY}, | ||||
|         [WDEV_ATTR_DISABLE_B_RATES] = { .name = "legacy_rates", .type = BLOBMSG_TYPE_BOOL }, | ||||
| 	[WDEV_ATTR_DISABLE_B_RATES] = { .name = "legacy_rates", .type = BLOBMSG_TYPE_BOOL }, | ||||
| 	[WDEV_ATTR_MAXASSOC_CLIENTS] = { .name = "maxassoc", .type = BLOBMSG_TYPE_INT32 }, | ||||
| 	[WDEV_ATTR_LOCAL_PWR_CONSTRAINT] = { .name = "local_pwr_constraint", .type = BLOBMSG_TYPE_INT32 }, | ||||
| }; | ||||
| @@ -175,6 +185,36 @@ static void radio_state_custom_options_get(struct schema_Wifi_Radio_State *rstat | ||||
| 	} | ||||
| } | ||||
|  | ||||
| static void set_channel_max_power(struct schema_Wifi_Radio_State *rstate, | ||||
|                                     int *index, int channel, | ||||
|                                     int max_power) | ||||
| { | ||||
| 	rstate->channel_max_power_keys[*index] = channel; | ||||
| 	rstate->channel_max_power[*index] = max_power; | ||||
| 	*index += 1; | ||||
| 	rstate->channel_max_power_len = *index; | ||||
| } | ||||
|  | ||||
| // Update the entire channel_max_power map in the radio state | ||||
| static void update_channel_max_power(char* phy, struct schema_Wifi_Radio_State *rstate) { | ||||
| 	int channels[64]; | ||||
| 	int channel_count = phy_get_channels(phy, channels); | ||||
| 	channel_count += phy_get_dfs_channels(phy, channels + channel_count); | ||||
|  | ||||
| 	// Clear the data previously stored in channel_max_power | ||||
| 	memset(rstate->channel_max_power_keys, 0, sizeof(rstate->channel_max_power_keys)); | ||||
| 	memset(rstate->channel_max_power, 0, sizeof(rstate->channel_max_power)); | ||||
| 	rstate->channel_max_power_len = 0; | ||||
|  | ||||
| 	// Set the new values for channel_max_power | ||||
| 	int i, index = 0; | ||||
| 	for (i = 0; i < channel_count && i < 64; i++) { | ||||
| 		int channel = channels[i]; | ||||
| 		int max_tx_power = phy_get_max_tx_power(phy, channel); | ||||
| 		set_channel_max_power(rstate, &index, channel, max_tx_power); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| const struct uci_blob_param_list wifi_device_param = { | ||||
| 	.n_params = __WDEV_ATTR_MAX, | ||||
| 	.params = wifi_device_policy, | ||||
| @@ -186,7 +226,7 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C | ||||
| 	struct schema_Wifi_Radio_State  rstate; | ||||
| 	char phy[6]; | ||||
| 	int antenna; | ||||
| 	int32_t chan; | ||||
| 	uint32_t chan = 0; | ||||
|  | ||||
| 	LOGT("%s: get state", s->e.name); | ||||
|  | ||||
| @@ -210,8 +250,10 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C | ||||
| 		return false; | ||||
| 	} | ||||
|  | ||||
| 	update_channel_max_power(phy, &rstate); | ||||
|  | ||||
| 	if (tb[WDEV_ATTR_CHANNEL]) { | ||||
| 		chan = get_current_channel(phy); | ||||
| 		nl80211_channel_get(phy, &chan); | ||||
| 		if(chan) | ||||
| 			SCHEMA_SET_INT(rstate.channel, chan); | ||||
| 		else | ||||
| @@ -401,8 +443,27 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 	} | ||||
|  | ||||
| 	if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) { | ||||
| 		struct mode_map *m = mode_map_get_uci(rconf->freq_band, rconf->ht_mode, | ||||
| 						      rconf->hw_mode); | ||||
| 		int channel_freq; | ||||
| 		char buffer[8]; | ||||
| 		FILE *confFile_p; | ||||
| 		const char* hw_mode = rconf->hw_mode; | ||||
|  | ||||
| 		channel_freq = ieee80211_channel_to_frequency(rconf->channel); | ||||
| 		if (!strcmp(rconf->hw_mode, "auto")) { | ||||
| 			char command[] = "auto-conf "; | ||||
| 			strcat(command, phy); | ||||
| 			confFile_p = popen(command, "r"); | ||||
| 			 | ||||
| 			if (confFile_p) | ||||
| 			{ | ||||
| 				fgets(buffer, sizeof(buffer), confFile_p); | ||||
| 				pclose(confFile_p); | ||||
| 				buffer[strlen(buffer) - 1] = '\0'; // Remove extra \n that got added from 'echo' in script | ||||
| 				hw_mode = buffer; | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		struct mode_map *m = mode_map_get_uci(rconf->freq_band, get_max_channel_bw_channel(channel_freq, rconf->ht_mode), hw_mode); | ||||
| 		if (m) { | ||||
| 			blobmsg_add_string(&b, "htmode", m->ucihtmode); | ||||
| 			blobmsg_add_string(&b, "hwmode", m->ucihwmode); | ||||
| @@ -430,19 +491,14 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 	blob_to_uci_section(uci, "wireless", rconf->if_name, "wifi-device", | ||||
| 			    b.head, &wifi_device_param, del.head); | ||||
|  | ||||
| 	reload_config = 1; | ||||
|  | ||||
| 	uci_commit_all(uci); | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| static void periodic_task(void *arg) | ||||
| { | ||||
| 	static int counter = 0; | ||||
| 	int ret = 0; | ||||
| 	struct uci_element *e = NULL, *tmp = NULL; | ||||
|  | ||||
| 	if ((counter % 15) && !reload_config) | ||||
| 		goto done; | ||||
|  | ||||
| 	if (startup_time.tv_sec) { | ||||
| 		static struct timespec current_time; | ||||
|  | ||||
| @@ -453,18 +509,12 @@ static void periodic_task(void *arg) | ||||
| 			radio_maverick(NULL); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if (reload_config) { | ||||
| 		LOGT("periodic: reload config"); | ||||
| 		reload_config = 0; | ||||
| 		uci_commit_all(uci); | ||||
| 		sync(); | ||||
| 		system("reload_config"); | ||||
| 	LOGD("periodic: start state update "); | ||||
| 	ret = uci_load(uci, "wireless", &wireless); | ||||
| 	if (ret) { | ||||
| 		LOGE("%s: uci_load() failed with rc %d", __func__, ret); | ||||
| 		goto out; | ||||
| 	} | ||||
|  | ||||
| 	LOGT("periodic: start state update "); | ||||
|  | ||||
| 	uci_load(uci, "wireless", &wireless); | ||||
| 	uci_foreach_element_safe(&wireless->sections, tmp, e) { | ||||
| 		struct uci_section *s = uci_to_section(e); | ||||
|  | ||||
| @@ -479,11 +529,10 @@ static void periodic_task(void *arg) | ||||
| 			vif_state_update(s, NULL); | ||||
| 	} | ||||
| 	uci_unload(uci, wireless); | ||||
| 	LOGT("periodic: stop state update "); | ||||
| 	LOGD("periodic: stop state update "); | ||||
|  | ||||
| done: | ||||
| 	counter++; | ||||
| 	evsched_task_reschedule_ms(EVSCHED_SEC(1)); | ||||
| out: | ||||
| 	evsched_task_reschedule_ms(EVSCHED_SEC(15)); | ||||
| } | ||||
|  | ||||
| bool target_radio_config_init2(void) | ||||
| @@ -516,7 +565,6 @@ bool target_radio_config_init2(void) | ||||
| 	} | ||||
| 	if (invalidVifFound) { | ||||
| 		uci_commit(uci, &wireless, false); | ||||
| 		reload_config = 1; | ||||
| 	} | ||||
| 	uci_unload(uci, wireless); | ||||
|  | ||||
| @@ -599,6 +647,7 @@ void radio_maverick(void *arg) | ||||
| 	uci_unload(uci, wireless); | ||||
| } | ||||
|  | ||||
|  | ||||
| static void callback_Hotspot20_Config(ovsdb_update_monitor_t *mon, | ||||
| 				 struct schema_Hotspot20_Config *old, | ||||
| 				 struct schema_Hotspot20_Config *conf) | ||||
| @@ -618,6 +667,7 @@ static void callback_Hotspot20_Config(ovsdb_update_monitor_t *mon, | ||||
| 		LOG(ERR, "Hotspot20_Config: unexpected mon_type %d %s", mon->mon_type, mon->mon_uuid); | ||||
| 		break; | ||||
| 	} | ||||
| 	set_config_apply_timeout(mon); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| @@ -641,6 +691,7 @@ static void callback_Hotspot20_OSU_Providers(ovsdb_update_monitor_t *mon, | ||||
| 				mon->mon_type, mon->mon_uuid); | ||||
| 		break; | ||||
| 	} | ||||
| 	set_config_apply_timeout(mon); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| @@ -665,10 +716,422 @@ static void callback_Hotspot20_Icon_Config(ovsdb_update_monitor_t *mon, | ||||
| 				mon->mon_type, mon->mon_uuid); | ||||
| 		break; | ||||
| 	} | ||||
| 	set_config_apply_timeout(mon); | ||||
| 	return; | ||||
|  | ||||
| } | ||||
|  | ||||
| enum { | ||||
| 	WIF_APC_ENABLE, | ||||
| 	__WIF_APC_MAX, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy apc_enpolicy[__WIF_APC_MAX] = { | ||||
| 		[WIF_APC_ENABLE] = { .name = "enabled", BLOBMSG_TYPE_BOOL }, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list apc_param = { | ||||
| 	.n_params = __WIF_APC_MAX, | ||||
| 	.params = apc_enpolicy, | ||||
| }; | ||||
|  | ||||
| void APC_config_update(struct schema_APC_Config *conf) | ||||
| { | ||||
| 	struct blob_buf apcb = { }; | ||||
| 	struct uci_context *apc_uci; | ||||
|  | ||||
| 	apc_uci = uci_alloc_context(); | ||||
|  | ||||
| 	blob_buf_init(&apcb, 0); | ||||
| 	if (conf && conf->enabled == true) { | ||||
| 		blobmsg_add_bool(&apcb, "enabled", 1); | ||||
| 		system("/etc/init.d/apc start"); | ||||
| 	} else { | ||||
| 		blobmsg_add_bool(&apcb, "enabled", 0); | ||||
| 		system("/etc/init.d/apc stop"); | ||||
| 	} | ||||
|  | ||||
| 	blob_to_uci_section(apc_uci, "apc", "apc", "apc", | ||||
| 			apcb.head, &apc_param, NULL); | ||||
|  | ||||
| 	uci_commit_all(apc_uci); | ||||
| 	uci_free_context(apc_uci); | ||||
| } | ||||
|  | ||||
| static void callback_APC_Config(ovsdb_update_monitor_t *mon, | ||||
|                                 struct schema_APC_Config *old, | ||||
|                                 struct schema_APC_Config *conf) | ||||
| { | ||||
| 	if (mon->mon_type == OVSDB_UPDATE_DEL) | ||||
| 		APC_config_update(NULL); | ||||
| 	else | ||||
| 		APC_config_update(conf); | ||||
|  | ||||
| } | ||||
|  | ||||
| static void callback_APC_State(ovsdb_update_monitor_t *mon, | ||||
|                                 struct schema_APC_State *old, | ||||
|                                 struct schema_APC_State *conf) | ||||
| { | ||||
| 	LOGN("APC_state: enabled:%s dr_addr:%s bdr_addr:%s mode:%s", | ||||
| 	     (conf->enabled_changed)? "changed":"unchanged",  | ||||
| 	     (conf->dr_addr_changed)? "changed":"unchanged", | ||||
| 	     (conf->bdr_addr_changed)? "changed":"unchanged", | ||||
| 	     (conf->mode_changed)? "changed":"unchanged"); | ||||
|  | ||||
| 	/* APC changed: if radproxy enabled then restart wireless */ | ||||
| 	if (radproxy_apc) { | ||||
| 		radproxy_apc = 0; | ||||
| 		system("ubus call service event '{\"type\": \"config.change\", \"data\": { \"package\": \"wireless\" }}'"); | ||||
| 	} | ||||
|  | ||||
| 	/* APC changed: start / stop radius proxy service if needed */ | ||||
| 	vif_check_radius_proxy(); | ||||
|  | ||||
| } | ||||
|  | ||||
| struct schema_APC_State apc_state; | ||||
| enum { | ||||
| 	APC_ATTR_MODE, | ||||
| 	APC_ATTR_DR_ADDR, | ||||
| 	APC_ATTR_BDR_ADDR, | ||||
| 	APC_ATTR_ENABLED, | ||||
| 	__APC_ATTR_MAX, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy apc_policy[__APC_ATTR_MAX] = { | ||||
| 	[APC_ATTR_MODE] = { .name = "mode", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[APC_ATTR_DR_ADDR] = { .name = "dr_addr", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[APC_ATTR_BDR_ADDR] = { .name = "bdr_addr", .type = BLOBMSG_TYPE_STRING }, | ||||
| 	[APC_ATTR_ENABLED] = { .name = "enabled", .type = BLOBMSG_TYPE_BOOL }, | ||||
| }; | ||||
|  | ||||
| struct schema_APC_Config apc_conf; | ||||
|  | ||||
|  | ||||
| bool apc_read_conf(struct schema_APC_Config *apcconf) | ||||
| { | ||||
| 	json_t *jrows; | ||||
| 	int cnt = 0; | ||||
| 	int i = 0; | ||||
| 	pjs_errmsg_t perr; | ||||
|  | ||||
| 	jrows = ovsdb_sync_select_where(SCHEMA_TABLE(APC_Config), NULL); | ||||
| 	if(!jrows) | ||||
| 	{ | ||||
| 		return false; | ||||
| 	} | ||||
| 	cnt = json_array_size(jrows); | ||||
| 	if(!cnt) | ||||
| 	{ | ||||
| 		json_decref(jrows); | ||||
| 		return false; | ||||
| 	} | ||||
|  | ||||
| 	for (i = 0; i < cnt; i++) | ||||
| 	{ | ||||
| 		if(!schema_APC_Config_from_json(apcconf, json_array_get(jrows, i), | ||||
| 						false, perr)) | ||||
| 		{ | ||||
| 			LOGE("Unable to parse APC Config column: %s", perr); | ||||
| 			json_decref(jrows); | ||||
| 			return false; | ||||
| 		} | ||||
| 	} | ||||
| 	json_decref(jrows); | ||||
|  | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| bool apc_read_state(struct schema_APC_State *apcst) | ||||
| { | ||||
| 	json_t *jrows; | ||||
| 	int cnt = 0; | ||||
| 	int i = 0; | ||||
| 	pjs_errmsg_t perr; | ||||
|  | ||||
| 	jrows = ovsdb_sync_select_where(SCHEMA_TABLE(APC_State), NULL); | ||||
| 	if(!jrows) | ||||
| 	{ | ||||
| 		return false; | ||||
| 	} | ||||
| 	cnt = json_array_size(jrows); | ||||
| 	if(!cnt) | ||||
| 	{ | ||||
| 		json_decref(jrows); | ||||
| 		return false; | ||||
| 	} | ||||
|  | ||||
| 	for (i = 0; i < cnt; i++) | ||||
| 	{ | ||||
| 		if(!schema_APC_State_from_json(apcst, json_array_get(jrows, i), | ||||
| 						false, perr)) | ||||
| 		{ | ||||
| 			LOGE("Unable to parse APC State column: %s", perr); | ||||
| 			json_decref(jrows); | ||||
| 			return false; | ||||
| 		} | ||||
| 	} | ||||
| 	json_decref(jrows); | ||||
|  | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| /* Check if apc conf is disabled, if disabled the update state | ||||
|  * with NC mode and return, this is to avoid the apc ubus | ||||
|  * notifications which come after the APC is disabled */ | ||||
| bool apc_conf_en() | ||||
| { | ||||
| 	struct schema_APC_Config apcconf; | ||||
| 	struct schema_APC_State apc_state; | ||||
|  | ||||
| 	if(apc_read_conf(&apcconf) == false) | ||||
| 		return true; | ||||
|  | ||||
| 	if (apcconf.enabled == false) { | ||||
| 		SCHEMA_SET_STR(apc_state.mode, "NC"); | ||||
| 		SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0"); | ||||
| 		SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0"); | ||||
| 		SCHEMA_SET_INT(apc_state.enabled, false); | ||||
| 		if (!ovsdb_table_update(&table_APC_State, &apc_state)) | ||||
| 			LOG(ERR, "APC_state: failed to update"); | ||||
| 		return false; | ||||
| 	} | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| void apc_state_set(struct blob_attr *msg) | ||||
| { | ||||
| 	struct blob_attr *tb[__APC_ATTR_MAX] = { }; | ||||
| 	struct schema_APC_State apc_state; | ||||
|  | ||||
| 	if(apc_conf_en() == false) | ||||
| 		return; | ||||
|  | ||||
| 	blobmsg_parse(apc_policy, __APC_ATTR_MAX, tb, | ||||
| 		      blob_data(msg), blob_len(msg)); | ||||
|  | ||||
| 	if (tb[APC_ATTR_MODE]) { | ||||
| 		LOGD("APC mode: %s", blobmsg_get_string(tb[APC_ATTR_MODE])); | ||||
| 		SCHEMA_SET_STR(apc_state.mode, | ||||
| 			       blobmsg_get_string(tb[APC_ATTR_MODE])); | ||||
| 	} | ||||
| 	if (tb[APC_ATTR_DR_ADDR]) { | ||||
| 		LOGD("APC dr-addr: %s", blobmsg_get_string(tb[APC_ATTR_DR_ADDR])); | ||||
| 		SCHEMA_SET_STR(apc_state.dr_addr, | ||||
| 			       blobmsg_get_string(tb[APC_ATTR_DR_ADDR])); | ||||
| 	} | ||||
| 	if (tb[APC_ATTR_BDR_ADDR]) { | ||||
| 		LOGD("APC bdr-addr: %s", blobmsg_get_string(tb[APC_ATTR_BDR_ADDR])); | ||||
| 		SCHEMA_SET_STR(apc_state.bdr_addr, | ||||
| 			       blobmsg_get_string(tb[APC_ATTR_BDR_ADDR])); | ||||
| 	} | ||||
| 	if (tb[APC_ATTR_ENABLED]) { | ||||
| 		LOGD("APC enabled: %d", blobmsg_get_bool(tb[APC_ATTR_ENABLED])); | ||||
| 		if (blobmsg_get_bool(tb[APC_ATTR_ENABLED])) { | ||||
| 			SCHEMA_SET_INT(apc_state.enabled, true); | ||||
| 		} | ||||
| 		else { | ||||
| 			SCHEMA_SET_INT(apc_state.enabled, false); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	LOGI("APC_state Updating: mode: %s, dr-addr: %s bdr-addr: %s",  | ||||
| 	     apc_state.mode, apc_state.dr_addr, apc_state.bdr_addr); | ||||
|  | ||||
| 	if (!ovsdb_table_update(&table_APC_State, &apc_state)) | ||||
| 		LOG(ERR, "APC_state: failed to update"); | ||||
|  | ||||
| } | ||||
|  | ||||
| static ovsdb_table_t table_Manager; | ||||
| static int conn_since = 0; | ||||
| #define APC_CLOUD_MON_PERIOD 60 | ||||
|  | ||||
| static void apc_enable(bool flag) { | ||||
|  | ||||
| 	struct schema_APC_State apc_state; | ||||
| 	 | ||||
| 	LOGI("APC %s: %s APC", __func__, flag?"enable":"disable"); | ||||
| 	if (flag == false) { | ||||
| 		if(apc_read_state(&apc_state) == false) { | ||||
| 			LOG(ERR, "%s: APC_State read failed", __func__); | ||||
| 			apc_state.enabled = true; | ||||
| 		} | ||||
|  | ||||
| 		if (apc_state.enabled == true) { | ||||
| 			SCHEMA_SET_INT(apc_conf.enabled, flag); | ||||
| 			if (!ovsdb_table_update(&table_APC_Config, &apc_conf)) { | ||||
| 				LOG(ERR, "%s:APC_Config: failed to update", __func__); | ||||
| 				return; | ||||
| 			} | ||||
| 			SCHEMA_SET_STR(apc_state.mode, "NC"); | ||||
| 			SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0"); | ||||
| 			SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0"); | ||||
| 			SCHEMA_SET_INT(apc_state.enabled, false); | ||||
| 			if (!ovsdb_table_update(&table_APC_State, &apc_state)) | ||||
| 				LOG(ERR, "APC_state: failed to update"); | ||||
| 		} | ||||
| 	} else { | ||||
| 		SCHEMA_SET_INT(apc_conf.enabled, flag); | ||||
| 		if (!ovsdb_table_update(&table_APC_Config, &apc_conf)) { | ||||
| 			LOG(ERR, "%s:APC_Config: failed to update", __func__); | ||||
| 			return; | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| static void | ||||
| apc_cld_mon_cb(struct schema_Manager *mgr) | ||||
| { | ||||
| 	int i = 0; | ||||
| 	conn_since = 0; | ||||
| 	struct schema_APC_State apc_state; | ||||
| 	int ret = 0; | ||||
| 	int link = 1; | ||||
|  | ||||
| 	if(apc_read_state(&apc_state) == false) { | ||||
| 		LOG(ERR, "%s: APC_State read failed", __func__); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	/*Checks if wan ethernet port is down and disables apc*/ | ||||
| 	ret = system("/bin/check_wan_link.sh"); | ||||
| 	if (WIFEXITED(ret)) { | ||||
| 		link = WEXITSTATUS(ret); | ||||
| 		if (link == 0) { | ||||
| 			LOGD("APC link down"); | ||||
| 			apc_enable(false); | ||||
| 			return; | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	/*if cloud conn is false then disable apc*/ | ||||
| 	if (mgr->is_connected == false) { | ||||
| 			apc_enable(false); | ||||
| 	} | ||||
| 	else { | ||||
| 		for(i=0; i < mgr->status_len; i++) { | ||||
| 			if(!strncmp(mgr->status_keys[i] , "sec_since_connect", | ||||
| 					       strlen("sec_since_connect"))) { | ||||
| 				conn_since = atoi(mgr->status[i]); | ||||
| 				break; | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		/*if the APC was stopped earlier, start it if connection good | ||||
| 		 * for atleast 60 secs*/ | ||||
| 		if (!apc_state.enabled && conn_since > APC_CLOUD_MON_PERIOD) { | ||||
| 			apc_enable(true); | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| /*Monitor the cloud connection*/ | ||||
| static void callback_Manager(ovsdb_update_monitor_t *mon, | ||||
| 			     struct schema_Manager *old, | ||||
| 			     struct schema_Manager *conf) | ||||
| { | ||||
| 	switch (mon->mon_type) | ||||
| 	{ | ||||
| 	case OVSDB_UPDATE_NEW: | ||||
| 	case OVSDB_UPDATE_MODIFY: | ||||
| 		apc_cld_mon_cb(conf); | ||||
| 		break; | ||||
|  | ||||
| 	case OVSDB_UPDATE_DEL: | ||||
| 		apc_enable(false); | ||||
| 		break; | ||||
|  | ||||
| 	default: | ||||
| 		break; | ||||
| 	} | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| void cloud_disconn_mon(void) | ||||
| { | ||||
| 	OVSDB_TABLE_INIT_NO_KEY(Manager); | ||||
| 	OVSDB_TABLE_MONITOR(Manager, false); | ||||
| } | ||||
|  | ||||
| void apc_init() | ||||
| { | ||||
| 	/* APC Config */ | ||||
| 	OVSDB_TABLE_INIT_NO_KEY(APC_Config); | ||||
| 	OVSDB_TABLE_MONITOR(APC_Config, false); | ||||
| 	/* Disable APC by default, enable when cloud connected*/ | ||||
| 	SCHEMA_SET_INT(apc_conf.enabled, false); | ||||
| 	LOGI("APC state/config Initialize"); | ||||
| 	if (!ovsdb_table_insert(&table_APC_Config, &apc_conf)) { | ||||
| 		LOG(ERR, "APC_Config: failed to initialize"); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	/* APC State */ | ||||
| 	OVSDB_TABLE_INIT_NO_KEY(APC_State); | ||||
| 	OVSDB_TABLE_MONITOR(APC_State, false); | ||||
| 	SCHEMA_SET_STR(apc_state.mode, "NC"); | ||||
| 	SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0"); | ||||
| 	SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0"); | ||||
| 	SCHEMA_SET_INT(apc_state.enabled, false); | ||||
| 	if (!ovsdb_table_insert(&table_APC_State, &apc_state)) { | ||||
| 		LOG(ERR, "APC_state: failed to initialize"); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	/* Cloud connection monitor - if cloud unreachable | ||||
| 	 * for certain time, disable APC and enable after the | ||||
| 	 * cloud connection becomes stable. */ | ||||
| 	cloud_disconn_mon(); | ||||
|  | ||||
| } | ||||
|  | ||||
| static void apply_config_handler(struct timeout *timeout) | ||||
| { | ||||
| 	uci_commit_all(uci); | ||||
| 	sync(); | ||||
| 	LOGI("====Calling reload_config===="); | ||||
| 	system("/sbin/reload_config"); | ||||
| } | ||||
|  | ||||
| static struct timeout config_timer = { | ||||
| 		.cb = apply_config_handler | ||||
| }; | ||||
|  | ||||
| static void config_timer_task(void *arg) | ||||
| { | ||||
| 	timer_expiry_check(&config_timer); | ||||
| 	evsched_task_reschedule_ms(EVSCHED_SEC(1)); | ||||
| } | ||||
|  | ||||
| void set_config_apply_timeout(ovsdb_update_monitor_t *mon) | ||||
| { | ||||
| 	static bool firstconfig = true; | ||||
| 	LOGI("=====Received config update - table:%s uuid:%s Action:%d======", mon->mon_table, mon->mon_uuid, mon->mon_type); | ||||
| 	if(firstconfig) { | ||||
| 		firstconfig = false; | ||||
| 		timeout_set(&config_timer, CONFIG_APPLY_TIMEOUT * 1000); | ||||
| 		evsched_task(&config_timer_task, NULL, EVSCHED_SEC(1)); | ||||
| 	} else { | ||||
| 		timeout_set(&config_timer, CONFIG_APPLY_TIMEOUT * 1000); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon, | ||||
| 		struct schema_Wifi_Inet_Config *old_rec, | ||||
| 		struct schema_Wifi_Inet_Config *iconf) | ||||
| { | ||||
| 	set_config_apply_timeout(mon); | ||||
| } | ||||
|  | ||||
| static void callback_Node_Config(ovsdb_update_monitor_t *mon, | ||||
| 		struct schema_Node_Config *old, | ||||
| 		struct schema_Node_Config *conf) | ||||
| { | ||||
| 	set_config_apply_timeout(mon); | ||||
| } | ||||
|  | ||||
| bool target_radio_init(const struct target_radio_ops *ops) | ||||
| { | ||||
| 	uci = uci_alloc_context(); | ||||
| @@ -691,13 +1154,23 @@ bool target_radio_init(const struct target_radio_ops *ops) | ||||
| 	OVSDB_TABLE_INIT(Hotspot20_Icon_Config, _uuid); | ||||
| 	OVSDB_TABLE_MONITOR(Hotspot20_Icon_Config, false); | ||||
|  | ||||
|         OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid); | ||||
|         OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false); | ||||
| 	OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid); | ||||
| 	OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false); | ||||
|  | ||||
| 	OVSDB_TABLE_INIT(Radius_Proxy_Config, _uuid); | ||||
| 	OVSDB_TABLE_MONITOR(Radius_Proxy_Config, false); | ||||
|  | ||||
| 	OVSDB_TABLE_INIT(Wifi_Inet_Config, _uuid); | ||||
| 	OVSDB_TABLE_MONITOR(Wifi_Inet_Config, false); | ||||
|  | ||||
| 	OVSDB_TABLE_INIT(Node_Config, _uuid); | ||||
| 	OVSDB_TABLE_MONITOR(Node_Config, false); | ||||
|  | ||||
| 	evsched_task(&periodic_task, NULL, EVSCHED_SEC(5)); | ||||
|  | ||||
| 	radio_nl80211_init(); | ||||
| 	radio_ubus_init(); | ||||
| 	apc_init(); | ||||
|  | ||||
| 	clock_gettime(CLOCK_MONOTONIC, &startup_time); | ||||
|  | ||||
|   | ||||
| @@ -50,7 +50,8 @@ | ||||
| extern struct ev_loop *wifihal_evloop; | ||||
| extern ovsdb_table_t table_Wifi_VIF_State; | ||||
| extern ovsdb_table_t table_Wifi_Associated_Clients; | ||||
| static struct unl unl; | ||||
| static struct unl unl_req; | ||||
| static struct unl unl_notify; | ||||
| static ev_io unl_io; | ||||
|  | ||||
| static int avl_addrcmp(const void *k1, const void *k2, void *ptr) | ||||
| @@ -103,7 +104,7 @@ static void vif_add_sta_rate_rule(uint8_t *addr, char *ifname) | ||||
| 	char *rule; | ||||
| 	ssize_t rule_sz; | ||||
|  | ||||
| 	LOGI("Add mac rate rule: %s %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| 	LOGI("Add mac rate rule:%s: %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| 	     ifname, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]); | ||||
|  | ||||
| 	rule_sz = snprintf(NULL, 0, "/lib/nft-qos/mac-rate.sh add %s %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| @@ -123,7 +124,7 @@ static void vif_del_sta_rate_rule(uint8_t *addr, char *ifname) | ||||
| 	char *rule; | ||||
| 	ssize_t rule_sz; | ||||
|  | ||||
| 	LOGI("Del mac rate rule: %s %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| 	LOGI("Del mac rate rule:%s: %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| 	     ifname, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]); | ||||
|  | ||||
| 	rule_sz = snprintf(NULL, 0, "/lib/nft-qos/mac-rate.sh del %s %02X:%02X:%02X:%02X:%02X:%02X", | ||||
| @@ -147,11 +148,10 @@ static void nl80211_add_station(struct nlattr **tb, char *ifname) | ||||
| 		return; | ||||
|  | ||||
| 	addr = nla_data(tb[NL80211_ATTR_MAC]); | ||||
| 	vif_add_sta_rate_rule(addr, ifname); | ||||
| 	sta = avl_find_element(&sta_tree, addr, sta, avl); | ||||
| 	if (sta) { | ||||
| 		vif_add_sta_rate_rule(addr, ifname); | ||||
| 	if (sta) | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	wif = avl_find_element(&wif_tree, ifname, wif, avl); | ||||
| 	if (!wif) | ||||
| @@ -168,7 +168,6 @@ static void nl80211_add_station(struct nlattr **tb, char *ifname) | ||||
| 	list_add(&sta->iface, &wif->stas); | ||||
|  | ||||
| 	vif_add_station(sta, ifname, 1); | ||||
| 	vif_add_sta_rate_rule(addr, ifname); | ||||
| } | ||||
|  | ||||
| static void _nl80211_del_station(char *ifname, struct wifi_station *sta) | ||||
| @@ -396,6 +395,7 @@ static void nl80211_add_phy(struct nlattr **tb, char *name) | ||||
|  | ||||
| 					if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR]) { | ||||
| 						phy->chandfs[chan] = 1; | ||||
| 						phy->chanpwr[chan] = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_MAX_TX_POWER]); | ||||
| 						phy->chandisabled[chan] = 0; | ||||
| 						LOG(DEBUG, "%s: found dfs channel %d", phy->name, chan); | ||||
| 						continue; | ||||
| @@ -432,15 +432,55 @@ static void nl80211_del_phy(struct nlattr **tb, char *name) | ||||
| 	free(phy); | ||||
| } | ||||
|  | ||||
| static void nl80211_update_current_channel(struct nlattr **tb, char *name, int freq) | ||||
| static int nl80211_channel_recv(struct nl_msg *msg, void *arg) | ||||
| { | ||||
| 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); | ||||
| 	struct nlattr *tb[NL80211_ATTR_MAX + 1]; | ||||
| 	unsigned int *chan = (unsigned int *)arg; | ||||
|  | ||||
| 	memset(tb, 0, sizeof(tb)); | ||||
| 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), | ||||
| 		  genlmsg_attrlen(gnlh, 0), NULL); | ||||
|  | ||||
| 	if (tb[NL80211_ATTR_WIPHY_FREQ]) { | ||||
| 		*chan = ieee80211_frequency_to_channel(nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ])); | ||||
| 	} | ||||
|  | ||||
| 	return NL_OK; | ||||
| } | ||||
|  | ||||
| int nl80211_channel_get(char *name, unsigned int *chan) | ||||
| { | ||||
| 	struct nl_msg *msg; | ||||
| 	struct wifi_phy *phy; | ||||
| 	struct wifi_iface *wif=NULL; | ||||
| 	int idx = 0; | ||||
|  | ||||
| 	phy = avl_find_element(&phy_tree, name, phy, avl); | ||||
| 	if (!phy) | ||||
| 		return; | ||||
| 		return -1; | ||||
|  | ||||
| 	phy->current_channel = ieee80211_frequency_to_channel(freq); | ||||
| 	if (list_empty(&phy->wifs)) | ||||
| 		return -1; | ||||
|  | ||||
| 	wif = list_first_entry(&phy->wifs, struct wifi_iface, phy); | ||||
|  | ||||
| 	if (!wif) | ||||
| 		return -1; | ||||
|  | ||||
| 	idx = if_nametoindex(wif->name); | ||||
|  | ||||
| 	if (!idx) | ||||
| 		return -1; | ||||
|  | ||||
| 	msg = unl_genl_msg(&unl_req, NL80211_CMD_GET_INTERFACE, true); | ||||
| 	nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx); | ||||
|  | ||||
| 	unl_genl_request(&unl_req, msg, nl80211_channel_recv, chan); | ||||
|  | ||||
| 	phy->current_channel = *chan; | ||||
|  | ||||
| 	return NL_OK; | ||||
| } | ||||
|  | ||||
| static int nl80211_recv(struct nl_msg *msg, void *arg) | ||||
| @@ -451,7 +491,6 @@ static int nl80211_recv(struct nl_msg *msg, void *arg) | ||||
| 	char *pif_name=NULL; | ||||
| 	char phyname[IFNAMSIZ] = {}; | ||||
| 	int ifidx = -1, phy = -1; | ||||
| 	int freq = 0; | ||||
| 	memset(tb, 0, sizeof(tb)); | ||||
|  | ||||
| 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), | ||||
| @@ -467,16 +506,11 @@ static int nl80211_recv(struct nl_msg *msg, void *arg) | ||||
|  | ||||
| 	if (tb[NL80211_ATTR_WIPHY]) { | ||||
| 		phy = nla_get_u32(tb[NL80211_ATTR_WIPHY]); | ||||
| 		if (tb[NL80211_ATTR_WIPHY_NAME]) | ||||
| 			strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ); | ||||
| 		else | ||||
| 			snprintf(phyname, sizeof(phyname), "phy%d", phy); | ||||
| 	} | ||||
|  | ||||
| 	if(tb[NL80211_ATTR_WIPHY_FREQ]) { | ||||
| 		freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]); | ||||
| 		snprintf(phyname, sizeof(phyname), "phy%d", phy); | ||||
| 		nl80211_update_current_channel(tb, phyname, freq); | ||||
| 	} else if (tb[NL80211_ATTR_WIPHY_NAME]) { | ||||
| 			strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ); | ||||
| 	} else if (sscanf(ifname, "wlan%d", &phy)) { | ||||
| 			snprintf(phyname, sizeof(phyname), "phy%d", phy); | ||||
| 	} | ||||
|  | ||||
| 	switch (gnlh->cmd) { | ||||
| @@ -530,7 +564,7 @@ static void nl80211_ev(struct ev_loop *ev, struct ev_io *io, int event) | ||||
| 	nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, NULL); | ||||
| 	nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL); | ||||
| 	nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, nl80211_recv, NULL); | ||||
| 	nl_recvmsgs(unl.sock, cb); | ||||
| 	nl_recvmsgs(unl_notify.sock, cb); | ||||
| 	nl_cb_put(cb); | ||||
| } | ||||
|  | ||||
| @@ -548,24 +582,33 @@ int radio_nl80211_init(void) | ||||
| { | ||||
| 	struct nl_msg *msg; | ||||
|  | ||||
| 	if (unl_genl_init(&unl, "nl80211") < 0) { | ||||
| 	if (unl_genl_init(&unl_req, "nl80211") < 0) { | ||||
| 		syslog(0, "nl80211: failed to connect\n"); | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	msg = unl_genl_msg(&unl, NL80211_CMD_GET_WIPHY, true); | ||||
| 	unl_genl_request(&unl, msg, nl80211_recv, NULL); | ||||
| 	msg = unl_genl_msg(&unl, NL80211_CMD_GET_INTERFACE, true); | ||||
| 	unl_genl_request(&unl, msg, nl80211_recv, NULL); | ||||
| 	if (unl_genl_init(&unl_notify, "nl80211") < 0) { | ||||
| 		syslog(0, "nl80211: failed to connect\n"); | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	unl_genl_subscribe(&unl, "config"); | ||||
| 	unl_genl_subscribe(&unl, "mlme"); | ||||
| 	unl_genl_subscribe(&unl, "vendor"); | ||||
| 	msg = unl_genl_msg(&unl_req, NL80211_CMD_GET_WIPHY, true); | ||||
| 	unl_genl_request(&unl_req, msg, nl80211_recv, NULL); | ||||
| 	msg = unl_genl_msg(&unl_req, NL80211_CMD_GET_INTERFACE, true); | ||||
| 	unl_genl_request(&unl_req, msg, nl80211_recv, NULL); | ||||
|  | ||||
| 	if (nl_socket_set_buffer_size(unl.sock, 262144, 0) < 0) | ||||
| 	unl_genl_subscribe(&unl_notify, "config"); | ||||
| 	unl_genl_subscribe(&unl_notify, "mlme"); | ||||
| 	unl_genl_subscribe(&unl_notify, "vendor"); | ||||
|  | ||||
|  | ||||
| 	if (nl_socket_set_buffer_size(unl_notify.sock, 262144, 0) < 0) | ||||
| 		LOGE("radio_nl80211: Failed to set nl socket buffer size"); | ||||
|  | ||||
| 	ev_io_init(&unl_io, nl80211_ev, unl.sock->s_fd, EV_READ); | ||||
| 	if (nl_socket_set_nonblocking(unl_notify.sock)) | ||||
| 		LOGE("radio_nl80211: Failed to set socket in the non blocking mode"); | ||||
|  | ||||
| 	ev_io_init(&unl_io, nl80211_ev, unl_notify.sock->s_fd, EV_READ); | ||||
|         ev_io_start(wifihal_evloop, &unl_io); | ||||
| 	evsched_task(&vif_poll_stations, NULL, EVSCHED_SEC(5)); | ||||
|  | ||||
|   | ||||
| @@ -0,0 +1,417 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <stdbool.h> | ||||
| #include <time.h> | ||||
|  | ||||
| #include <uci.h> | ||||
| #include <uci_blob.h> | ||||
|  | ||||
| #include <target.h> | ||||
|  | ||||
| #include <curl/curl.h> | ||||
|  | ||||
| #include "ovsdb.h" | ||||
| #include "ovsdb_update.h" | ||||
| #include "ovsdb_sync.h" | ||||
| #include "ovsdb_table.h" | ||||
| #include "ovsdb_cache.h" | ||||
|  | ||||
| #include "nl80211.h" | ||||
| #include "radio.h" | ||||
| #include "vif.h" | ||||
| #include "phy.h" | ||||
| #include "log.h" | ||||
| #include "evsched.h" | ||||
| #include "uci.h" | ||||
| #include "utils.h" | ||||
| #include "radius_proxy.h" | ||||
|  | ||||
| struct blob_buf uci_buf = {}; | ||||
| struct blob_attr *n; | ||||
| extern ovsdb_table_t table_APC_State; | ||||
| extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record); | ||||
|  | ||||
| enum { | ||||
| 	RADIUS_PROXY_OPTIONS_LISTEN_UDP, | ||||
| 	RADIUS_PROXY_OPTIONS_NAME, | ||||
| 	__RADIUS_PROXY_OPTIONS_MAX | ||||
| }; | ||||
|  | ||||
| enum { | ||||
| 	RADIUS_PROXY_CLIENT_NAME, | ||||
| 	RADIUS_PROXY_CLIENT_HOST, | ||||
| 	RADIUS_PROXY_CLIENT_TYPE, | ||||
| 	RADIUS_PROXY_CLIENT_SECRET, | ||||
| 	__RADIUS_PROXY_CLIENT_MAX | ||||
| }; | ||||
|  | ||||
| enum { | ||||
| 	RADIUS_PROXY_SERVER_NAME, | ||||
| 	RADIUS_PROXY_SERVER_HOST, | ||||
| 	RADIUS_PROXY_SERVER_TYPE, | ||||
| 	RADIUS_PROXY_SERVER_SECRET, | ||||
| 	RADIUS_PROXY_SERVER_PORT, | ||||
| 	RADIUS_PROXY_SERVER_STATUS, | ||||
| 	RADIUS_PROXY_SERVER_TLS, | ||||
| 	RADIUS_PROXY_SERVER_CERT_NAME_CHECK, | ||||
| 	RADIUS_PROXY_SERVER_DYNAMIC_LOOKUP, | ||||
| 	__RADIUS_PROXY_SERVER_MAX | ||||
| }; | ||||
|  | ||||
| enum { | ||||
| 	RADIUS_PROXY_TLS_NAME, | ||||
| 	RADIUS_PROXY_TLS_CA_CERT, | ||||
| 	RADIUS_PROXY_TLS_CLIENT_CERT, | ||||
| 	RADIUS_PROXY_TLS_CLIENT_KEY, | ||||
| 	RADIUS_PROXY_TLS_CERT_PASSWORD, | ||||
| 	__RADIUS_PROXY_TLS_MAX, | ||||
| }; | ||||
|  | ||||
| enum { | ||||
| 	RADIUS_PROXY_REALM_NAME, | ||||
| 	RADIUS_PROXY_REALM_AUTH_SERVER, | ||||
| 	RADIUS_PROXY_REALM_ACCT_SERVER, | ||||
| 	__RADIUS_PROXY_REALM_MAX | ||||
| }; | ||||
|  | ||||
|  | ||||
| static const struct blobmsg_policy radius_proxy_options_policy[__RADIUS_PROXY_OPTIONS_MAX] = { | ||||
| 		[RADIUS_PROXY_OPTIONS_LISTEN_UDP] = { .name = "ListenUDP", BLOBMSG_TYPE_ARRAY }, | ||||
| 		[RADIUS_PROXY_OPTIONS_NAME] = { .name = "name", BLOBMSG_TYPE_STRING }, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy radius_proxy_client_policy[__RADIUS_PROXY_CLIENT_MAX] = { | ||||
| 		[RADIUS_PROXY_CLIENT_NAME] = { .name = "name", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_CLIENT_HOST] = { .name = "host", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_CLIENT_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_CLIENT_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING }, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy radius_proxy_tls_policy[__RADIUS_PROXY_TLS_MAX] = { | ||||
| 		[RADIUS_PROXY_TLS_NAME] = { .name = "name", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_TLS_CA_CERT] = { .name = "CACertificateFile", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_TLS_CLIENT_CERT] = { .name = "certificateFile", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_TLS_CLIENT_KEY] = { .name = "certificateKeyFile", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_TLS_CERT_PASSWORD] = { .name = "certificateKeyPassword", BLOBMSG_TYPE_STRING }, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy radius_proxy_server_policy[__RADIUS_PROXY_SERVER_MAX] = { | ||||
| 		[RADIUS_PROXY_SERVER_NAME] = { .name = "name", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_SERVER_HOST] = { .name = "host", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_SERVER_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_SERVER_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_SERVER_PORT] = { .name = "port", BLOBMSG_TYPE_INT32 }, | ||||
| 		[RADIUS_PROXY_SERVER_STATUS] = { .name = "statusServer", BLOBMSG_TYPE_BOOL }, | ||||
| 		[RADIUS_PROXY_SERVER_TLS] = { .name = "tls", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_SERVER_CERT_NAME_CHECK] = { .name = "certificateNameCheck", BLOBMSG_TYPE_BOOL }, | ||||
| 		[RADIUS_PROXY_SERVER_DYNAMIC_LOOKUP] = { .name = "dynamicLookupCommand", BLOBMSG_TYPE_STRING }, | ||||
| }; | ||||
|  | ||||
| static const struct blobmsg_policy radius_proxy_realm_policy[__RADIUS_PROXY_REALM_MAX] = { | ||||
| 		[RADIUS_PROXY_REALM_NAME] = { .name = "name", BLOBMSG_TYPE_STRING }, | ||||
| 		[RADIUS_PROXY_REALM_AUTH_SERVER] = { .name = "server", BLOBMSG_TYPE_ARRAY }, | ||||
| 		[RADIUS_PROXY_REALM_ACCT_SERVER] = { .name = "accountingServer", BLOBMSG_TYPE_ARRAY }, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list radius_proxy_options_param = { | ||||
| 	.n_params = __RADIUS_PROXY_OPTIONS_MAX, | ||||
| 	.params = radius_proxy_options_policy, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list radius_proxy_client_param = { | ||||
| 	.n_params = __RADIUS_PROXY_CLIENT_MAX, | ||||
| 	.params = radius_proxy_client_policy, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list radius_proxy_tls_param = { | ||||
| 	.n_params = __RADIUS_PROXY_TLS_MAX, | ||||
| 	.params = radius_proxy_tls_policy, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list radius_proxy_server_param = { | ||||
| 	.n_params = __RADIUS_PROXY_SERVER_MAX, | ||||
| 	.params = radius_proxy_server_policy, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list radius_proxy_realm_param = { | ||||
| 	.n_params = __RADIUS_PROXY_REALM_MAX, | ||||
| 	.params = radius_proxy_realm_policy, | ||||
| }; | ||||
|  | ||||
|  | ||||
| size_t file_write(void *ptr, size_t size, size_t nmemb, FILE *stream) { | ||||
| 	size_t written = fwrite(ptr, size, nmemb, stream); | ||||
| 	return written; | ||||
| } | ||||
|  | ||||
| static bool radsec_download_cert(char *cert_name, char *dir_name, char *cert_url) | ||||
| { | ||||
| 	CURL *curl; | ||||
| 	FILE *fp; | ||||
| 	CURLcode curl_ret; | ||||
| 	char path[200]; | ||||
| 	char dir_path[200]; | ||||
| 	char name[32]; | ||||
| 	char dir[32]; | ||||
| 	char *gw_clientcert = "/usr/opensync/certs/client.pem"; | ||||
| 	char *gw_clientkey = "/usr/opensync/certs/client_dec.key"; | ||||
| 	struct stat stat_buf; | ||||
|  | ||||
| 	strcpy(name, cert_name); | ||||
| 	strcpy(dir, dir_name); | ||||
| 	sprintf(dir_path, "/tmp/radsec/certs/%s", dir); | ||||
| 	sprintf(path, "/tmp/radsec/certs/%s/%s", dir, name); | ||||
|  | ||||
| 	if (stat(dir_path, &stat_buf) == -1) | ||||
| 	{ | ||||
| 		char cmd[200]; | ||||
| 		sprintf(cmd, "mkdir -p %s", dir_path); | ||||
| 		system(cmd); | ||||
| 	} | ||||
|  | ||||
| 	curl = curl_easy_init(); | ||||
| 	if (curl) | ||||
| 	{ | ||||
| 		fp = fopen(path, "wb"); | ||||
|  | ||||
| 		if (fp == NULL) | ||||
| 		{ | ||||
| 			curl_easy_cleanup(curl); | ||||
| 			return false; | ||||
| 		} | ||||
|  | ||||
| 		if (cert_url == NULL) | ||||
| 		{ | ||||
| 			curl_easy_cleanup(curl); | ||||
| 			fclose(fp); | ||||
| 			return false; | ||||
| 		} | ||||
|  | ||||
| 		curl_easy_setopt(curl, CURLOPT_SSLCERT, gw_clientcert); | ||||
| 		curl_easy_setopt(curl, CURLOPT_SSLKEY, gw_clientkey); | ||||
| 		curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L); | ||||
| 		curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L); | ||||
| 		curl_easy_setopt(curl, CURLOPT_HEADER, 0L); | ||||
| 		curl_easy_setopt(curl, CURLOPT_URL, cert_url); | ||||
| 		curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, file_write); | ||||
| 		curl_easy_setopt(curl, CURLOPT_WRITEDATA, fp); | ||||
| 		curl_ret = curl_easy_perform(curl); | ||||
|  | ||||
| 		if (curl_ret != CURLE_OK) | ||||
| 		{ | ||||
| 			LOGE("radsec: certificate download failed %s", curl_easy_strerror(curl_ret)); | ||||
| 			curl_easy_cleanup(curl); | ||||
| 			fclose(fp); | ||||
| 			remove(path); | ||||
| 			return false; | ||||
| 		} | ||||
|  | ||||
| 		curl_easy_cleanup(curl); | ||||
| 		fclose(fp); | ||||
| 	} | ||||
|  | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf) | ||||
| { | ||||
| 	int i = 0; | ||||
| 	char path[200]; | ||||
| 	char name[256]; | ||||
| 	char server_name[256] = {}; | ||||
| 	char acct_server_name[256] = {}; | ||||
| 	char tls_name[256] = {}; | ||||
|  | ||||
| 	/* Configure options block */ | ||||
| 	blob_buf_init(&uci_buf, 0); | ||||
| 	n = blobmsg_open_array(&uci_buf,"ListenUDP"); | ||||
| 	blobmsg_add_string(&uci_buf, NULL, "*:1812"); | ||||
| 	blobmsg_add_string(&uci_buf, NULL, "*:1813"); | ||||
| 	blobmsg_close_array(&uci_buf, n); | ||||
| 	memset(name, '\0', sizeof(name)); | ||||
| 	sprintf(name, "%s%s", conf->radius_config_name, "options"); | ||||
| 	blobmsg_add_string(&uci_buf, "name", name); | ||||
| 	blob_to_uci_section(uci, "radsecproxy", name, "options", | ||||
| 			uci_buf.head, &radius_proxy_options_param, NULL); | ||||
|  | ||||
| 	/* Configure client block */ | ||||
| 	blob_buf_init(&uci_buf, 0); | ||||
| 	blobmsg_add_string(&uci_buf, "host", "0.0.0.0/0"); | ||||
| 	blobmsg_add_string(&uci_buf, "type", "udp"); | ||||
| 	blobmsg_add_string(&uci_buf, "secret", "secret"); | ||||
| 	memset(name, '\0', sizeof(name)); | ||||
| 	sprintf(name, "%s%s", conf->radius_config_name, "client"); | ||||
| 	blobmsg_add_string(&uci_buf, "name", name); | ||||
| 	blob_to_uci_section(uci, "radsecproxy", name, "client", | ||||
| 			uci_buf.head, &radius_proxy_client_param, NULL); | ||||
|  | ||||
| 	/* Configure TLS/non-TLS and server blocks */ | ||||
| 	sprintf(server_name, "%s%s", conf->radius_config_name, "server"); | ||||
| 	sprintf(acct_server_name, "%s%s", conf->radius_config_name, "Acctserver"); | ||||
| 	sprintf(tls_name, "%s%s", conf->radius_config_name, "tls"); | ||||
| 	if (conf->radsec) | ||||
| 	{ | ||||
| 		blob_buf_init(&uci_buf, 0); | ||||
| 		radsec_download_cert("cacert.pem", | ||||
| 				conf->radius_config_name, conf->ca_cert); | ||||
| 		radsec_download_cert("clientcert.pem", | ||||
| 				conf->radius_config_name, conf->client_cert); | ||||
| 		radsec_download_cert("clientdec.key", | ||||
| 				conf->radius_config_name, conf->client_key); | ||||
|  | ||||
| 		blobmsg_add_string(&uci_buf, "name", tls_name); | ||||
|  | ||||
| 		memset(path, '\0', sizeof(path)); | ||||
| 		sprintf(path, "/tmp/radsec/certs/%s/cacert.pem", | ||||
| 				conf->radius_config_name); | ||||
| 		blobmsg_add_string(&uci_buf, "CACertificateFile", path); | ||||
|  | ||||
| 		memset(path, '\0', sizeof(path)); | ||||
| 		sprintf(path, "/tmp/radsec/certs/%s/clientcert.pem", | ||||
| 				conf->radius_config_name); | ||||
| 		blobmsg_add_string(&uci_buf, "certificateFile", path); | ||||
|  | ||||
| 		memset(path, '\0', sizeof(path)); | ||||
| 		sprintf(path, "/tmp/radsec/certs/%s/clientdec.key", | ||||
| 				conf->radius_config_name); | ||||
| 		blobmsg_add_string(&uci_buf, "certificateKeyFile", path); | ||||
|  | ||||
| 		if (strlen(conf->passphrase) > 0) | ||||
| 			blobmsg_add_string(&uci_buf, "certificateKeyPassword", conf->passphrase); | ||||
|  | ||||
| 		blob_to_uci_section(uci, "radsecproxy", tls_name, | ||||
| 				"tls", uci_buf.head, &radius_proxy_tls_param, NULL); | ||||
|  | ||||
| 		blob_buf_init(&uci_buf, 0); | ||||
| 		if (conf->auto_discover) | ||||
| 		{ /* auto discover radsec server address via realm DNS NAPTR record */ | ||||
| 			blobmsg_add_string(&uci_buf, "dynamicLookupCommand", "/bin/dynamic_lookup.sh"); | ||||
| 		} | ||||
| 		else | ||||
| 		{ | ||||
| 			blobmsg_add_string(&uci_buf, "host", conf->server); | ||||
| 			blobmsg_add_u32(&uci_buf, "port", conf->port); | ||||
| 			blobmsg_add_string(&uci_buf, "secret", "radsec"); | ||||
| 		} | ||||
| 		blobmsg_add_string(&uci_buf, "name", server_name); | ||||
| 		blobmsg_add_string(&uci_buf, "type", "tls"); | ||||
| 		blobmsg_add_string(&uci_buf, "tls", tls_name); | ||||
| 		blobmsg_add_bool(&uci_buf, "statusServer", 0); | ||||
| 		blobmsg_add_bool(&uci_buf, "certificateNameCheck", 0); | ||||
| 		blob_to_uci_section(uci, "radsecproxy", server_name, "server", | ||||
| 				uci_buf.head, &radius_proxy_server_param, NULL); | ||||
| 	} | ||||
| 	else /* non-TLS block */ | ||||
| 	{ | ||||
| 		/* Authentication server */ | ||||
| 		blob_buf_init(&uci_buf, 0); | ||||
| 		blobmsg_add_string(&uci_buf, "name", server_name); | ||||
| 		blobmsg_add_string(&uci_buf, "host", conf->server); | ||||
| 		blobmsg_add_string(&uci_buf, "type", "udp"); | ||||
| 		if (strlen(conf->secret) > 0) | ||||
| 			blobmsg_add_string(&uci_buf, "secret", conf->secret); | ||||
| 		if (conf->port > 0) | ||||
| 			blobmsg_add_u32(&uci_buf, "port", conf->port); | ||||
| 		blob_to_uci_section(uci, "radsecproxy", server_name, "server", | ||||
| 				uci_buf.head, &radius_proxy_server_param, NULL); | ||||
|  | ||||
| 		/* Accounting server */ | ||||
| 		if (strlen(conf->acct_server) > 0) | ||||
| 		{ | ||||
| 			blob_buf_init(&uci_buf, 0); | ||||
| 			blobmsg_add_string(&uci_buf, "name", acct_server_name); | ||||
| 			blobmsg_add_string(&uci_buf, "host", conf->acct_server); | ||||
| 			blobmsg_add_string(&uci_buf, "type", "udp"); | ||||
| 			if (strlen(conf->secret) > 0) | ||||
| 				blobmsg_add_string(&uci_buf, "secret", conf->acct_secret); | ||||
| 			if (conf->acct_port > 0) | ||||
| 				blobmsg_add_u32(&uci_buf, "port", conf->acct_port); | ||||
| 			blob_to_uci_section(uci, "radsecproxy", acct_server_name, "server", | ||||
| 								uci_buf.head, &radius_proxy_server_param, NULL); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	/* Configure realm block */ | ||||
| 	for (i = 0; i < conf->realm_len; i++) | ||||
| 	{ | ||||
| 		blob_buf_init(&uci_buf, 0); | ||||
| 		blobmsg_add_string(&uci_buf, "name", conf->realm[i]); | ||||
| 		n = blobmsg_open_array(&uci_buf,"server"); | ||||
| 		blobmsg_add_string(&uci_buf, NULL, server_name); | ||||
| 		blobmsg_close_array(&uci_buf, n); | ||||
| 		if (conf->radsec) | ||||
| 		{ /* Accounting server same as auth server */ | ||||
| 			n = blobmsg_open_array(&uci_buf, "accountingServer"); | ||||
| 			blobmsg_add_string(&uci_buf, NULL, server_name); | ||||
| 			blobmsg_close_array(&uci_buf, n); | ||||
| 		} | ||||
| 		else if (strlen(conf->acct_server) > 0) | ||||
| 		{ /* non-TLS case where accounting server is configured */ | ||||
| 			n = blobmsg_open_array(&uci_buf, "accountingServer"); | ||||
| 			blobmsg_add_string(&uci_buf, NULL, acct_server_name); | ||||
| 			blobmsg_close_array(&uci_buf, n); | ||||
| 		} | ||||
| 		memset(name, '\0', sizeof(name)); | ||||
| 		sprintf(name, "%s%s%d", conf->radius_config_name, "realm", i); | ||||
| 		blob_to_uci_section(uci, "radsecproxy", name, "realm", | ||||
| 				uci_buf.head, &radius_proxy_realm_param, NULL); | ||||
| 	} | ||||
| 	uci_commit_all(uci); | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| static bool radius_proxy_config_delete() | ||||
| { | ||||
| 	struct uci_package *radsecproxy; | ||||
| 	struct uci_context *rad_uci; | ||||
| 	struct uci_element *e = NULL, *tmp = NULL; | ||||
| 	int ret = 0; | ||||
|  | ||||
| 	rad_uci = uci_alloc_context(); | ||||
|  | ||||
| 	ret = uci_load(rad_uci, "radsecproxy", &radsecproxy); | ||||
| 	if (ret) { | ||||
| 		LOGE("%s: uci_load() failed with rc %d", __func__, ret); | ||||
| 		uci_free_context(rad_uci); | ||||
| 		return false; | ||||
| 	} | ||||
| 	uci_foreach_element_safe(&radsecproxy->sections, tmp, e) { | ||||
| 		struct uci_section *s = uci_to_section(e); | ||||
| 		if ((s == NULL) || (s->type == NULL)) continue; | ||||
| 		uci_section_del(rad_uci, "radsecproxy", "radsecproxy", | ||||
| 				(char *)s->e.name, s->type); | ||||
| 	} | ||||
| 	uci_commit(rad_uci, &radsecproxy, false); | ||||
| 	uci_unload(rad_uci, radsecproxy); | ||||
| 	uci_free_context(rad_uci); | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *self, | ||||
| 				 struct schema_Radius_Proxy_Config *old, | ||||
| 				 struct schema_Radius_Proxy_Config *conf) | ||||
| { | ||||
| 	switch (self->mon_type) | ||||
| 	{ | ||||
| 	case OVSDB_UPDATE_NEW: | ||||
| 	case OVSDB_UPDATE_MODIFY: | ||||
| 		(void) radius_proxy_config_set(conf); | ||||
| 		vif_check_radius_proxy(); | ||||
| 		break; | ||||
|  | ||||
| 	case OVSDB_UPDATE_DEL: | ||||
| 		(void) radius_proxy_config_delete(); | ||||
| 		vif_check_radius_proxy(); | ||||
| 		break; | ||||
|  | ||||
| 	default: | ||||
| 		LOG(ERR, "Radius_Proxy_Config: unexpected mon_type %d %s", | ||||
| 				self->mon_type, self->mon_uuid); | ||||
| 		break; | ||||
| 	} | ||||
| 	set_config_apply_timeout(self); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
|  | ||||
| @@ -47,8 +47,19 @@ void rrm_config_vif(struct blob_buf *b, struct blob_buf *del, const char * freq_ | ||||
| 		blobmsg_add_u32(b, "rssi_ignore_probe_request", conf.probe_resp_threshold); | ||||
| 		blobmsg_add_u32(b, "signal_connect", conf.client_disconnect_threshold); | ||||
| 		blobmsg_add_u32(b, "signal_stay", conf.client_disconnect_threshold); | ||||
| 		blobmsg_add_u32(b, "bcn_rate", conf.beacon_rate); | ||||
| 		blobmsg_add_u32(b, "mcast_rate", conf.mcast_rate); | ||||
|  | ||||
| 		if (conf.beacon_rate == 0) { | ||||
| 			// Default to the lowest possible bit rate for each frequency band | ||||
| 			if (!strcmp(freq_band, "2.4G")) { | ||||
| 				blobmsg_add_u32(b, "bcn_rate", 10); | ||||
| 			} else { | ||||
| 				blobmsg_add_u32(b, "bcn_rate", 60); | ||||
| 			} | ||||
| 		} else { | ||||
| 			blobmsg_add_u32(b, "bcn_rate", conf.beacon_rate); | ||||
| 		} | ||||
| 		 | ||||
| 	} | ||||
| 	return; | ||||
| } | ||||
| @@ -167,7 +178,8 @@ void callback_Wifi_RRM_Config(ovsdb_update_monitor_t *self, | ||||
| 	default: | ||||
| 		LOG(ERR, "Wifi_RRM_Config: unexpected mon_type %d %s", self->mon_type, self->mon_uuid); | ||||
| 		break; | ||||
| 	}	 | ||||
| 	} | ||||
| 	set_config_apply_timeout(self); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
|   | ||||
| @@ -350,12 +350,12 @@ bool target_stats_device_temp_get(radio_entry_t *radio_cfg, dpp_device_temp_t *t | ||||
| 	char hwmon_path[PATH_MAX]; | ||||
| 	int32_t temperature; | ||||
| 	FILE *fp = NULL; | ||||
| 	bool DegreesNotMilliDegrees; | ||||
|  | ||||
| 	if (phy_find_hwmon(target_map_ifname(radio_cfg->phy_name), hwmon_path)) { | ||||
| 	if (phy_find_hwmon(target_map_ifname(radio_cfg->phy_name), hwmon_path, &DegreesNotMilliDegrees)) { | ||||
| 		LOG(ERR, "%s: hwmon is missing", radio_cfg->phy_name); | ||||
| 		return false; | ||||
| 	} | ||||
|  | ||||
| 	fp = fopen(hwmon_path, "r"); | ||||
| 	if (!fp) { | ||||
| 		LOG(ERR, "%s: Failed to open temp input files", radio_cfg->phy_name); | ||||
| @@ -372,7 +372,10 @@ bool target_stats_device_temp_get(radio_entry_t *radio_cfg, dpp_device_temp_t *t | ||||
|  | ||||
| 	fclose(fp); | ||||
| 	temp_entry->type  = radio_cfg->type; | ||||
| 	temp_entry->value = temperature / 1000; | ||||
| 	if(DegreesNotMilliDegrees) | ||||
| 		temp_entry->value = temperature; | ||||
| 	else | ||||
| 		temp_entry->value = temperature / 1000; | ||||
|  | ||||
| 	return true; | ||||
| } | ||||
|   | ||||
| @@ -38,7 +38,8 @@ | ||||
|  | ||||
| extern struct ev_loop *wifihal_evloop; | ||||
| static int nl80211_scan_started; | ||||
| static struct unl unl; | ||||
| static struct unl unl_req; | ||||
| static struct unl unl_notify; | ||||
| static ev_io unl_io; | ||||
|  | ||||
| struct nl80211_scan { | ||||
| @@ -345,7 +346,7 @@ static struct nl_msg *nl80211_call_phy(char *name, int cmd, bool dump) | ||||
| 	if (idx < 0) | ||||
| 		return NULL; | ||||
|  | ||||
| 	msg = unl_genl_msg(&unl, cmd, dump); | ||||
| 	msg = unl_genl_msg(&unl_req, cmd, dump); | ||||
| 	nla_put_u32(msg, NL80211_ATTR_WIPHY, idx); | ||||
|  | ||||
| 	return msg; | ||||
| @@ -461,7 +462,7 @@ static void nl80211_ev(struct ev_loop *ev, struct ev_io *io, int event) | ||||
| 	nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, NULL); | ||||
| 	nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL); | ||||
| 	nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, nl80211_recv, NULL); | ||||
| 	nl_recvmsgs(unl.sock, cb); | ||||
| 	nl_recvmsgs(unl_notify.sock, cb); | ||||
| 	nl_cb_put(cb); | ||||
| } | ||||
|  | ||||
| @@ -471,9 +472,9 @@ static struct nl_msg *nl80211_call_vif(struct nl_call_param *nl_call_param, int | ||||
| 	struct nl_msg *msg; | ||||
|  | ||||
| 	if (!nl80211_scan_started) { | ||||
| 		unl_genl_subscribe(&unl, "scan"); | ||||
| 		unl_genl_subscribe(&unl_notify, "scan"); | ||||
|  | ||||
| 		ev_io_init(&unl_io, nl80211_ev, unl.sock->s_fd, EV_READ); | ||||
| 		ev_io_init(&unl_io, nl80211_ev, unl_notify.sock->s_fd, EV_READ); | ||||
| 		ev_io_start(wifihal_evloop, &unl_io); | ||||
| 		nl80211_scan_started = 1; | ||||
| 	} | ||||
| @@ -481,7 +482,7 @@ static struct nl_msg *nl80211_call_vif(struct nl_call_param *nl_call_param, int | ||||
| 	if (!idx) | ||||
| 		return NULL; | ||||
|  | ||||
| 	msg = unl_genl_msg(&unl, cmd, dump); | ||||
| 	msg = unl_genl_msg(&unl_req, cmd, dump); | ||||
| 	nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx); | ||||
|  | ||||
| 	return msg; | ||||
| @@ -494,7 +495,7 @@ int nl80211_get_tx_chainmask(char *name, unsigned int *mask) | ||||
| 	if (!msg) | ||||
| 		return -1; | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_chainmask_recv, mask); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_chainmask_recv, mask); | ||||
| } | ||||
|  | ||||
| int nl80211_get_oper_channel(char *name, unsigned int *chan) | ||||
| @@ -505,10 +506,10 @@ int nl80211_get_oper_channel(char *name, unsigned int *chan) | ||||
| 	if (!idx) | ||||
| 		return -1; | ||||
|  | ||||
| 	msg = unl_genl_msg(&unl, NL80211_CMD_GET_INTERFACE, true); | ||||
| 	msg = unl_genl_msg(&unl_req, NL80211_CMD_GET_INTERFACE, true); | ||||
| 	nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx); | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_channel_recv, chan); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_channel_recv, chan); | ||||
| } | ||||
|  | ||||
| int nl80211_get_ssid(struct nl_call_param *nl_call_param) | ||||
| @@ -518,7 +519,7 @@ int nl80211_get_ssid(struct nl_call_param *nl_call_param) | ||||
|         if (!msg) | ||||
|                 return -1; | ||||
|  | ||||
|         return unl_genl_request(&unl, msg, nl80211_interface_recv, nl_call_param); | ||||
|         return unl_genl_request(&unl_req, msg, nl80211_interface_recv, nl_call_param); | ||||
| } | ||||
|  | ||||
| int nl80211_get_assoclist(struct nl_call_param *nl_call_param) | ||||
| @@ -528,7 +529,7 @@ int nl80211_get_assoclist(struct nl_call_param *nl_call_param) | ||||
| 	if (!msg) | ||||
| 		return -1; | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_assoclist_recv, nl_call_param); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_assoclist_recv, nl_call_param); | ||||
| } | ||||
|  | ||||
| int nl80211_get_survey(struct nl_call_param *nl_call_param) | ||||
| @@ -538,7 +539,7 @@ int nl80211_get_survey(struct nl_call_param *nl_call_param) | ||||
| 	if (!msg) | ||||
| 		return -1; | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_survey_recv, nl_call_param); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_survey_recv, nl_call_param); | ||||
| } | ||||
|  | ||||
| int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_list, uint32_t chan_num, | ||||
| @@ -547,17 +548,41 @@ int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_lis | ||||
| { | ||||
| 	struct nl_msg *msg = nl80211_call_vif(nl_call_param, NL80211_CMD_TRIGGER_SCAN, false); | ||||
| 	struct nlattr *freq; | ||||
| 	unsigned int i; | ||||
| 	unsigned int i, flags = 0; | ||||
| 	int ret = 0; | ||||
| 	uint32_t oper_chan; | ||||
|  | ||||
| 	if (!msg) | ||||
| 		return -1; | ||||
|  | ||||
| 	LOGT("%s: not setting dwell time\n", nl_call_param->ifname); | ||||
| 	//nla_put_u16(msg, NL80211_ATTR_MEASUREMENT_DURATION, dwell_time); | ||||
| 	if (nl80211_get_oper_channel(nl_call_param->ifname, &oper_chan) < 0) { | ||||
| 		/* Could not get the current operating channel */ | ||||
| 		oper_chan = 0; | ||||
| 		LOGE("%s: Could not get the current operating channel\n", | ||||
| 			nl_call_param->ifname); | ||||
| 	} | ||||
|  | ||||
| 	/* Add the ap-force flag, otherwise the scan fails on wifi6 APs */ | ||||
| 	flags |= NL80211_SCAN_FLAG_AP; | ||||
| 	nla_put(msg, NL80211_ATTR_SCAN_FLAGS, sizeof(uint32_t), &flags); | ||||
|  | ||||
| 	if ((scan_type == RADIO_SCAN_TYPE_OFFCHAN) && dwell_time) | ||||
| 		nla_put_u16(msg, NL80211_ATTR_MEASUREMENT_DURATION, dwell_time); | ||||
|  | ||||
| 	freq = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES); | ||||
| 	for (i = 0; i < chan_num; i ++) | ||||
| 		nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i])); | ||||
| 	for (i = 0; i < chan_num; i ++) { | ||||
| 		if (!oper_chan || (scan_type == RADIO_SCAN_TYPE_FULL)) { | ||||
| 			nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i])); | ||||
| 		} | ||||
| 		else if ((scan_type == RADIO_SCAN_TYPE_OFFCHAN) && | ||||
| 			(chan_list[i] != oper_chan)) { | ||||
| 			nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i])); | ||||
| 		} | ||||
| 		else if ((scan_type == RADIO_SCAN_TYPE_ONCHAN) && | ||||
| 			(chan_list[i] == oper_chan)) { | ||||
| 			nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i])); | ||||
| 		} | ||||
| 	} | ||||
| 	nla_nest_end(msg, freq); | ||||
|  | ||||
| 	ret = nl80211_scan_add(nl_call_param->ifname, scan_cb, scan_ctx);  | ||||
| @@ -566,8 +591,10 @@ int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_lis | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	ret = unl_genl_request(&unl, msg, nl80211_scan_trigger_recv, NULL); | ||||
| 	if (ret)	LOG(DEBUG, "%s: scan request failed %d\n", nl_call_param->ifname, ret); | ||||
| 	ret = unl_genl_request(&unl_req, msg, nl80211_scan_trigger_recv, NULL); | ||||
| 	if (ret) | ||||
| 		LOG(DEBUG, "%s: scan request failed %d\n", nl_call_param->ifname, ret); | ||||
|  | ||||
| 	return ret; | ||||
| } | ||||
|  | ||||
| @@ -582,7 +609,7 @@ int nl80211_scan_abort(struct nl_call_param *nl_call_param) | ||||
| 	if (nl80211_scan) | ||||
| 		nl80211_scan_del(nl80211_scan); | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_scan_abort_recv, NULL); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_scan_abort_recv, NULL); | ||||
| } | ||||
|  | ||||
| int nl80211_scan_dump(struct nl_call_param *nl_call_param) | ||||
| @@ -592,18 +619,26 @@ int nl80211_scan_dump(struct nl_call_param *nl_call_param) | ||||
| 	if (!msg) | ||||
| 		return -1; | ||||
|  | ||||
| 	return unl_genl_request(&unl, msg, nl80211_scan_dump_recv, nl_call_param); | ||||
| 	return unl_genl_request(&unl_req, msg, nl80211_scan_dump_recv, nl_call_param); | ||||
| } | ||||
|  | ||||
| int stats_nl80211_init(void) | ||||
| { | ||||
| 	if (unl_genl_init(&unl, "nl80211") < 0) { | ||||
| 	if (unl_genl_init(&unl_req, "nl80211") < 0) { | ||||
| 		LOGE("failed to spawn nl80211"); | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	if (nl_socket_set_buffer_size(unl.sock, 262144, 0) < 0) | ||||
| 	if (unl_genl_init(&unl_notify, "nl80211") < 0) { | ||||
| 		LOGE("failed to spawn nl80211"); | ||||
| 		return -1; | ||||
| 	} | ||||
|  | ||||
| 	if (nl_socket_set_buffer_size(unl_notify.sock, 262144, 0) < 0) | ||||
| 		LOGE("stats_nl80211: Failed to set nl socket buffer size"); | ||||
|  | ||||
| 	if (nl_socket_set_nonblocking(unl_notify.sock)) | ||||
| 		LOGE("stats_nl80211: Failed to set stats nl socket in the non blocking mode"); | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|   | ||||
| @@ -291,7 +291,7 @@ static void cb_osp_start_factory_reboot(EV_P_ ev_timer *w, int events) | ||||
| 	if (!strcmp(upg_url, "reboot")) | ||||
| 		system("reboot"); | ||||
| 	else | ||||
| 		system("jffs2reset -y -r"); | ||||
| 		system("wlan_ap_factory_reset.sh"); | ||||
|  | ||||
| 	upg_running = false; | ||||
|  | ||||
|   | ||||
| @@ -0,0 +1,62 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #include <stdio.h> | ||||
| #include <stdbool.h> | ||||
| #include <time.h> | ||||
|  | ||||
| #include "log.h" | ||||
| #include "evsched.h" | ||||
|  | ||||
| #include "timer.h" | ||||
|  | ||||
| static int tv_diff(struct timeval *t1, struct timeval *t2) | ||||
| { | ||||
| 	return | ||||
| 			(t1->tv_sec - t2->tv_sec) * 1000 + | ||||
| 			(t1->tv_usec - t2->tv_usec) / 1000; | ||||
| } | ||||
|  | ||||
| static void gettime(struct timeval *tv) | ||||
| { | ||||
| 	struct timespec ts; | ||||
|  | ||||
| 	clock_gettime(CLOCK_MONOTONIC, &ts); | ||||
| 	tv->tv_sec = ts.tv_sec; | ||||
| 	tv->tv_usec = ts.tv_nsec / 1000; | ||||
| } | ||||
|  | ||||
| int timeout_set(struct timeout *timeout, int msecs) | ||||
| { | ||||
| 	if (!timeout) { | ||||
| 		LOGE("%s No timer data", __func__); | ||||
| 		return -1; | ||||
| 	} | ||||
| 	struct timeval *time = &timeout->time; | ||||
|  | ||||
| 	if (timeout->pending) | ||||
| 		timeout->pending = false; | ||||
|  | ||||
| 	gettime(time); | ||||
|  | ||||
| 	time->tv_sec += msecs / 1000; | ||||
| 	time->tv_usec += (msecs % 1000) * 1000; | ||||
|  | ||||
| 	if (time->tv_usec > 1000000) { | ||||
| 		time->tv_sec++; | ||||
| 		time->tv_usec -= 1000000; | ||||
| 	} | ||||
| 	timeout->pending = true; | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| void timer_expiry_check(struct timeout *t) | ||||
| { | ||||
| 	struct timeval tv; | ||||
| 	gettime(&tv); | ||||
| 	if (t->pending && tv_diff(&t->time, &tv) <= 0) { | ||||
| 		t->pending = false; | ||||
| 		LOGI("%s Timer Expired..Executing callback", __func__); | ||||
| 		if (t->cb) | ||||
| 			t->cb(t); | ||||
| 	} | ||||
| } | ||||
| @@ -210,8 +210,10 @@ int uci_section_to_blob(struct uci_context *uci, char *package, char *section, | ||||
|  | ||||
| 	if (uci_load(uci, package, &p)) | ||||
| 		p = uci_lookup_package(uci, package); | ||||
| 	if (!p) | ||||
| 	if (!p) { | ||||
| 		uci_unload(uci, p); | ||||
| 		return -1; | ||||
| 	} | ||||
| 	s = uci_lookup_section(uci, p, section); | ||||
| 	if (!s) | ||||
| 		goto out; | ||||
|   | ||||
| @@ -1,6 +1,7 @@ | ||||
| /* SPDX-License-Identifier: BSD-3-Clause */ | ||||
|  | ||||
| #include <string.h> | ||||
| #include <math.h> | ||||
| #include <glob.h> | ||||
| #include <libgen.h> | ||||
| #include <fcntl.h> | ||||
| @@ -23,41 +24,79 @@ | ||||
| #include "vif.h" | ||||
|  | ||||
| static struct mode_map mode_map[] = { | ||||
| 	{ 0, "11b", "11b", NULL, "NOHT" }, | ||||
| 	{ 0, "11g", "11g", NULL, "NOHT" }, | ||||
| 	{ 1, "11a", "11a", NULL, "NOHT" }, | ||||
| 	{ 0, "11n", "11g", "HT20", "HT20" }, | ||||
| 	{ 0, "11n", "11g", "HT40", "HT40" }, | ||||
| 	{ 0, "11n", "11g", "HT40-", "HT40-" }, | ||||
| 	{ 0, "11n", "11g", "HT40+", "HT40+" }, | ||||
| 	{ 0, "11n", "11g", "HT80", "HT40" }, | ||||
| 	{ 0, "11n", "11g", "HT160", "HT40" }, | ||||
| 	{ 1, "11n", "11a", "HT20", "HT20" }, | ||||
| 	{ 1, "11n", "11a", "HT40", "HT40" }, | ||||
| 	{ 1, "11n", "11a", "HT40-", "HT40-" }, | ||||
| 	{ 1, "11n", "11a", "HT40+", "HT40+" }, | ||||
| 	{ 1, "11n", "11a", "HT80", "HT40" }, | ||||
| 	{ 1, "11n", "11a", "HT160", "HT40" }, | ||||
| 	{ 1, "11ac", "11a", "HT20", "VHT20" }, | ||||
| 	{ 1, "11ac", "11a", "HT40", "VHT40" }, | ||||
| 	{ 1, "11ac", "11a", "HT40-", "VHT40" }, | ||||
| 	{ 1, "11ac", "11a", "HT40+", "VHT40" }, | ||||
| 	{ 1, "11ac", "11a", "HT80", "VHT80" }, | ||||
| 	{ 1, "11ac", "11a", "HT160", "VHT160" }, | ||||
| 	{ 0, "11ax", "11g", "HT20", "HE20" }, | ||||
| 	{ 0, "11ax", "11g", "HT40", "HE40" }, | ||||
| 	{ 0, "11ax", "11g", "HT40-", "HE40" }, | ||||
| 	{ 0, "11ax", "11g", "HT40+", "HE40" }, | ||||
| 	{ 0, "11ax", "11g", "HT80", "HE80" }, | ||||
| 	{ 0, "11ax", "11g", "HT160", "HE80" }, | ||||
| 	{ 1, "11ax", "11a", "HT20", "HE20" }, | ||||
| 	{ 1, "11ax", "11a", "HT40", "HE40" }, | ||||
| 	{ 1, "11ax", "11a", "HT40-", "HE40" }, | ||||
| 	{ 1, "11ax", "11a", "HT40+", "HE40" }, | ||||
| 	{ 1, "11ax", "11a", "HT80", "HE80" }, | ||||
| 	{ 1, "11ax", "11a", "HT160", "HE160" }, | ||||
| 	{ 0, "11b", "11b", NULL, "NOHT", 0 }, | ||||
| 	{ 0, "11g", "11g", NULL, "NOHT", 0 }, | ||||
| 	{ 1, "11a", "11a", NULL, "NOHT", 0 }, | ||||
| 	{ 0, "11n", "11g", "HT20", "HT20", 0 }, | ||||
| 	{ 0, "11n", "11g", "HT40", "HT40", 1 }, | ||||
| 	{ 0, "11n", "11g", "HT40-", "HT40-", 1 }, | ||||
| 	{ 0, "11n", "11g", "HT40+", "HT40+", 1 }, | ||||
| 	{ 0, "11n", "11g", "HT80", "HT40", 1 }, | ||||
| 	{ 0, "11n", "11g", "HT160", "HT40", 1 }, | ||||
| 	{ 1, "11n", "11a", "HT20", "HT20", 0 }, | ||||
| 	{ 1, "11n", "11a", "HT40", "HT40", 1 }, | ||||
| 	{ 1, "11n", "11a", "HT40-", "HT40-", 1 }, | ||||
| 	{ 1, "11n", "11a", "HT40+", "HT40+", 1 }, | ||||
| 	{ 1, "11n", "11a", "HT80", "HT40", 1 }, | ||||
| 	{ 1, "11n", "11a", "HT160", "HT40", 1 }, | ||||
| 	{ 1, "11ac", "11a", "HT20", "VHT20", 0 }, | ||||
| 	{ 1, "11ac", "11a", "HT40", "VHT40", 1 }, | ||||
| 	{ 1, "11ac", "11a", "HT40-", "VHT40", 1 }, | ||||
| 	{ 1, "11ac", "11a", "HT40+", "VHT40", 1 }, | ||||
| 	{ 1, "11ac", "11a", "HT80", "VHT80", 1 }, | ||||
| 	{ 1, "11ac", "11a", "HT160", "VHT160", 1 }, | ||||
| 	{ 0, "11ax", "11g", "HT20", "HE20", 0 }, | ||||
| 	{ 0, "11ax", "11g", "HT40", "HE40", 1 }, | ||||
| 	{ 0, "11ax", "11g", "HT40-", "HE40", 1 }, | ||||
| 	{ 0, "11ax", "11g", "HT40+", "HE40", 1 }, | ||||
| 	{ 0, "11ax", "11g", "HT80", "HE80", 1 }, | ||||
| 	{ 0, "11ax", "11g", "HT160", "HE80", 1 }, | ||||
| 	{ 1, "11ax", "11a", "HT20", "HE20", 0 }, | ||||
| 	{ 1, "11ax", "11a", "HT40", "HE40", 1 }, | ||||
| 	{ 1, "11ax", "11a", "HT40-", "HE40", 1 }, | ||||
| 	{ 1, "11ax", "11a", "HT40+", "HE40", 1 }, | ||||
| 	{ 1, "11ax", "11a", "HT80", "HE80", 1 }, | ||||
| 	{ 1, "11ax", "11a", "HT160", "HE160", 1 }, | ||||
| }; | ||||
|  | ||||
| typedef enum { | ||||
| 	MHz20=0, | ||||
| 	MHz40 = 1, | ||||
| 	MHz80 = 2, | ||||
| 	MHz160 = 4 | ||||
| } bm_AllowedBw; | ||||
|  | ||||
| typedef struct { | ||||
| 	int freq; | ||||
| 	bm_AllowedBw bw; | ||||
| } freqBwListEntry; | ||||
|  | ||||
| freqBwListEntry freqBwList[] ={{2412, MHz20},{2417, MHz20},{2422, MHz20},{2427, MHz20},{2432, MHz20},{2437, MHz20},{2442, MHz20},{2447, MHz20},{2452, MHz20},{2457, MHz20},{2462, MHz20},{2467, MHz20},{2472, MHz20}, {2484, MHz20}, | ||||
| 		{ 5180, MHz20|MHz40|MHz80},{5200, MHz20},{5220, MHz20|MHz40},{5240, MHz20},{5260, MHz20|MHz40|MHz80},{5280, MHz20},{5300,MHz20|MHz40},{5320, MHz20},{5500, MHz20|MHz40|MHz80},{5520, MHz20},{5540,  MHz20|MHz40}, {5560, MHz20}, | ||||
| 		{5580, MHz20|MHz40|MHz80},{5600, MHz20},{5620, MHz20|MHz40},{5640, MHz20},{5660, MHz20|MHz40|MHz80},{5680, MHz20},{5700, MHz20|MHz40},{5720, MHz20},{5745, MHz20|MHz40|MHz80},{5765, MHz20},{5785, MHz20|MHz40},{5805, MHz20},{5825, MHz20}}; | ||||
|  | ||||
| #define REQ_BW(htmode) (!strcmp(htmode, "HT20") ? MHz20 : !strcmp(htmode, "HT40") ? MHz40 : !strcmp(htmode, "HT80") ? MHz80 : !strcmp(htmode, "HT160") ? MHz160 : MHz20) | ||||
| #define REQ_MODE(bw) (bw==MHz20 ? "HT20": bw==MHz40 ? "HT40" : bw==MHz80 ? "HT80" : bw==MHz160 ? "HT160" : "HT20") | ||||
|  | ||||
| char * get_max_channel_bw_channel(int channel_freq, const char* htmode) | ||||
| { | ||||
| 	unsigned int i; | ||||
| 	bm_AllowedBw requestedBw; | ||||
|  | ||||
| 	requestedBw = REQ_BW(htmode); | ||||
|  | ||||
| 	for ( i = 0; i < ARRAY_SIZE(freqBwList); i++) { | ||||
| 		if(freqBwList[i].freq == channel_freq) { | ||||
| 			while (requestedBw) { | ||||
| 				if (freqBwList[i].bw & requestedBw) { | ||||
| 					return REQ_MODE(requestedBw); | ||||
| 				} | ||||
| 				requestedBw >>= 1; | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	return "HT20"; | ||||
| } | ||||
| struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode) | ||||
| { | ||||
| 	unsigned int i; | ||||
| @@ -157,24 +196,36 @@ int phy_from_path(char *_path, char *phy, unsigned int idx) | ||||
| 	return ret; | ||||
| } | ||||
|  | ||||
| int phy_find_hwmon(char *phy, char *hwmon) | ||||
| int phy_find_hwmon_helper(char *dir, char *file, char *hwmon) | ||||
| { | ||||
| 	char tmp[PATH_MAX]; | ||||
| 	glob_t gl; | ||||
|  | ||||
| 	*hwmon = '\0'; | ||||
| 	snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/device/hwmon/*", phy); | ||||
| 	if (glob(tmp, GLOB_NOSORT | GLOB_MARK, NULL, &gl)) | ||||
|                 return -1; | ||||
| 	if (glob(dir, GLOB_NOSORT | GLOB_MARK, NULL, &gl)) | ||||
| 		return -1; | ||||
| 	if (gl.gl_pathc) { | ||||
| 		strcpy(hwmon, gl.gl_pathv[0]); | ||||
| 		strncat(hwmon, "temp1_input", PATH_MAX); | ||||
| 		strncat(hwmon, file, PATH_MAX); | ||||
| 	} | ||||
| 	globfree(&gl); | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| int phy_find_hwmon(char *phy, char *hwmon, bool *DegreesNotMilliDegrees) | ||||
| { | ||||
| 	char tmp[PATH_MAX]; | ||||
| 	*hwmon = '\0'; | ||||
| 	snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/device/hwmon/*", phy); | ||||
| 	if (!phy_find_hwmon_helper(tmp, "temp1_input", hwmon)) { | ||||
| 		*DegreesNotMilliDegrees=false; | ||||
| 		return 0; | ||||
| 	} | ||||
| 	snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/cooling_device/subsystem/thermal_zone0/", phy); | ||||
| 	if (!phy_find_hwmon_helper(tmp, "temp", hwmon)) { | ||||
| 		*DegreesNotMilliDegrees=true; | ||||
| 		return 0; | ||||
| 	} | ||||
| 	return -1; | ||||
| } | ||||
|  | ||||
| int phy_get_mac(char *phy, char *mac) | ||||
| { | ||||
| 	int sz = ETH_ALEN * 3; | ||||
| @@ -258,6 +309,21 @@ int phy_get_channels(const char *name, int *channel) | ||||
| 	return j; | ||||
| } | ||||
|  | ||||
| // Gets all the dfs channels avaible for a radio | ||||
| int phy_get_dfs_channels(const char *name, int *dfs_channels) | ||||
| { | ||||
| 	struct wifi_phy *phy = phy_find(name); | ||||
| 	int i, j = 0; | ||||
|  | ||||
| 	if (!phy) | ||||
| 		return 0; | ||||
|  | ||||
| 	for (i = 0; (i < IEEE80211_CHAN_MAX) && (j < 64); i++) | ||||
| 		if (phy->chandfs[i]) | ||||
| 			dfs_channels[j++] = i; | ||||
| 	return j; | ||||
| } | ||||
|  | ||||
| static void update_channels_state(struct schema_Wifi_Radio_State *rstate, | ||||
| 			int *index, const char *key, int *value, int value_len) | ||||
| { | ||||
| @@ -446,6 +512,17 @@ bool vif_state_to_conf(struct schema_Wifi_VIF_State *vstate, | ||||
| 	} | ||||
| 	vconf->custom_options_len = vstate->custom_options_len; | ||||
|  | ||||
| 	for (i = 0; i < vstate->captive_allowlist_len; i++) | ||||
| 		STRSCPY(vconf->captive_allowlist[i], vstate->captive_allowlist[i]); | ||||
| 	vconf->captive_allowlist_len = vstate->captive_allowlist_len; | ||||
|  | ||||
| 	for (i = 0; i < vstate->captive_portal_len; i++) { | ||||
| 		STRSCPY(vconf->captive_portal_keys[i], | ||||
| 			vstate->captive_portal_keys[i]); | ||||
| 		STRSCPY(vconf->captive_portal[i], vstate->captive_portal[i]); | ||||
| 	} | ||||
| 	vconf->captive_portal_len = vstate->captive_portal_len; | ||||
|  | ||||
| 	return true; | ||||
|  | ||||
| #undef VIF_COPY | ||||
| @@ -624,3 +701,33 @@ bool vif_get_security(struct schema_Wifi_VIF_State *vstate,  char *mode,  char * | ||||
| 	return true; | ||||
|  | ||||
| } | ||||
|  | ||||
| bool vif_get_key_for_key_distr(const char *secret, char *key_str) | ||||
| { | ||||
| 	bool err = false; | ||||
| 	FILE *fp; | ||||
| 	char cmd_buf[256] = "openssl aes-128-cbc -nosalt -k "; | ||||
|  | ||||
| 	strcat(cmd_buf, secret); | ||||
| 	strcat(cmd_buf, " -P 2>/dev/null | grep key | cut -d = -f2"); | ||||
| 	fp = popen(cmd_buf, "r"); | ||||
|  | ||||
| 	 | ||||
| 	if (fp && fscanf(fp, "%s", key_str)) { | ||||
| 		err = true; | ||||
| 	} | ||||
|  | ||||
| 	fclose(fp); | ||||
| 	return err; | ||||
| } | ||||
|  | ||||
| double dBm_to_mwatts(double dBm) | ||||
| { | ||||
| 	return (pow(10,(dBm/10))); | ||||
| } | ||||
|  | ||||
| double mWatts_to_dBm(double mW) | ||||
| { | ||||
| 	return (10*log10(mW)); | ||||
| } | ||||
|  | ||||
|   | ||||
| @@ -26,12 +26,14 @@ | ||||
| #include "ovsdb_table.h" | ||||
| #include "ovsdb_sync.h" | ||||
| #include "rrm_config.h" | ||||
| #include "fixup.h" | ||||
|  | ||||
| #define MODULE_ID LOG_MODULE_ID_VIF | ||||
| #define UCI_BUFFER_SIZE 80 | ||||
|  | ||||
| extern ovsdb_table_t table_Wifi_VIF_Config; | ||||
| extern ovsdb_table_t table_Hotspot20_Icon_Config; | ||||
| extern ovsdb_table_t table_Radius_Proxy_Config; | ||||
|  | ||||
| extern struct blob_buf b; | ||||
| extern struct blob_buf del; | ||||
| @@ -94,6 +96,7 @@ enum { | ||||
| 	WIF_ATTR_VENUE_URL, | ||||
| 	WIF_ATTR_NETWORK_AUTH_TYPE, | ||||
| 	WIF_ATTR_IPADDR_TYPE_AVAILABILITY, | ||||
| 	WIF_ATTR_CONNECTION_CAPABILITY, | ||||
| 	WIF_ATTR_DOMAIN_NAME, | ||||
| 	WIF_ATTR_MCC_MNC, | ||||
| 	WIF_ATTR_NAI_REALM, | ||||
| @@ -129,6 +132,12 @@ enum { | ||||
| 	WIF_ATTR_DVLAN_NAMING, | ||||
| 	WIF_ATTR_DVLAN_BRIDGE, | ||||
| 	WIF_ATTR_MIN_HW_MODE, | ||||
| 	WIF_ATTR_11R_R0KH, | ||||
| 	WIF_ATTR_11R_R1KH, | ||||
| 	WIF_ATTR_RADPROXY, | ||||
| 	WIF_ATTR_PROXY_ARP, | ||||
| 	WIF_ATTR_MCAST_TO_UCAST, | ||||
| 	WIF_ATTR_AUTH_CACHE, | ||||
| 	__WIF_ATTR_MAX, | ||||
| }; | ||||
|  | ||||
| @@ -184,7 +193,8 @@ static const struct blobmsg_policy wifi_iface_policy[__WIF_ATTR_MAX] = { | ||||
| 	[WIF_ATTR_VENUE_TYPE] = { .name = "venue_type", BLOBMSG_TYPE_INT32 }, | ||||
| 	[WIF_ATTR_VENUE_URL] = { .name = "venue_url", BLOBMSG_TYPE_ARRAY }, | ||||
| 	[WIF_ATTR_NETWORK_AUTH_TYPE] = { .name = "network_auth_type", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_IPADDR_TYPE_AVAILABILITY] = { .name = "ipaddr_type_availability", BLOBMSG_TYPE_INT32 }, | ||||
| 	[WIF_ATTR_IPADDR_TYPE_AVAILABILITY] = { .name = "ipaddr_type_availability", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_CONNECTION_CAPABILITY] = { .name = "hs20_conn_capab", BLOBMSG_TYPE_ARRAY }, | ||||
| 	[WIF_ATTR_DOMAIN_NAME] = { .name = "domain_name", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_MCC_MNC] = { .name = "anqp_3gpp_cell_net", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_NAI_REALM] = { .name = "nai_realm", BLOBMSG_TYPE_ARRAY }, | ||||
| @@ -220,6 +230,12 @@ static const struct blobmsg_policy wifi_iface_policy[__WIF_ATTR_MAX] = { | ||||
| 	[WIF_ATTR_DVLAN_NAMING] = { .name = "vlan_naming", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_DVLAN_BRIDGE] = { .name = "vlan_bridge", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_MIN_HW_MODE] = { .name = "min_hw_mode", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_11R_R0KH] = { .name = "r0kh", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_11R_R1KH] = { .name = "r1kh", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_RADPROXY] = { .name = "radproxy", BLOBMSG_TYPE_STRING }, | ||||
| 	[WIF_ATTR_PROXY_ARP] = { .name = "proxy_arp", BLOBMSG_TYPE_BOOL }, | ||||
| 	[WIF_ATTR_MCAST_TO_UCAST] = { .name = "multicast_to_unicast", BLOBMSG_TYPE_BOOL }, | ||||
| 	[WIF_ATTR_AUTH_CACHE] = { .name = "auth_cache", BLOBMSG_TYPE_BOOL }, | ||||
| }; | ||||
|  | ||||
| const struct uci_blob_param_list wifi_iface_param = { | ||||
| @@ -307,10 +323,67 @@ static struct vif_crypto { | ||||
| 	{ "wpa-mixed", OVSDB_SECURITY_ENCRYPTION_WPA_EAP, OVSDB_SECURITY_MODE_MIXED, 1 }, | ||||
| 	{ "sae", OVSDB_SECURITY_ENCRYPTION_WPA_SAE, OVSDB_SECURITY_MODE_WPA3, 0 }, | ||||
| 	{ "sae-mixed", OVSDB_SECURITY_ENCRYPTION_WPA_SAE, OVSDB_SECURITY_MODE_MIXED, 0 }, | ||||
| 	{ "wpa3", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_WPA3, 1 }, | ||||
| 	{ "wpa3-only", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_WPA3, 1 }, | ||||
| 	{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 }, | ||||
| 	{ "wpa3", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP_192, OVSDB_SECURITY_MODE_WPA3, 1 }, | ||||
| }; | ||||
|  | ||||
| extern ovsdb_table_t table_APC_State; | ||||
| extern unsigned int radproxy_apc; | ||||
|  | ||||
| /* Custom options table */ | ||||
| #define SCHEMA_CUSTOM_OPT_SZ            20 | ||||
| #define SCHEMA_CUSTOM_OPTS_MAX          15 | ||||
|  | ||||
| const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] = | ||||
| { | ||||
| 	SCHEMA_CONSTS_RATE_LIMIT, | ||||
| 	SCHEMA_CONSTS_RATE_DL, | ||||
| 	SCHEMA_CONSTS_RATE_UL, | ||||
| 	SCHEMA_CONSTS_CLIENT_RATE_DL, | ||||
| 	SCHEMA_CONSTS_CLIENT_RATE_UL, | ||||
| 	SCHEMA_CONSTS_IEEE80211k, | ||||
| 	SCHEMA_CONSTS_RTS_THRESHOLD, | ||||
| 	SCHEMA_CONSTS_DTIM_PERIOD, | ||||
| 	SCHEMA_CONSTS_RADIUS_OPER_NAME, | ||||
| 	SCHEMA_CONSTS_RADIUS_NAS_ID, | ||||
| 	SCHEMA_CONSTS_RADIUS_NAS_IP, | ||||
| 	SCHEMA_CONSTS_DYNAMIC_VLAN, | ||||
| 	SCHEMA_CONSTS_RADPROXY, | ||||
| 	SCHEMA_CONSTS_PROXY_ARP, | ||||
| 	SCHEMA_CONSTS_MCAST_TO_UCAST, | ||||
| }; | ||||
|  | ||||
| static bool vif_config_custom_opt_get_proxy( | ||||
| 		const struct schema_Wifi_VIF_Config *vconf) | ||||
| { | ||||
| 	int i; | ||||
| 	const char *opt; | ||||
| 	const char *val; | ||||
| 	char value[20]; | ||||
|  | ||||
| 	for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) { | ||||
| 		opt = custom_options_table[i]; | ||||
| 		val = SCHEMA_KEY_VAL(vconf->custom_options, opt); | ||||
| 		if (!val) | ||||
| 			strncpy(value, "0", 20); | ||||
| 		else | ||||
| 			strncpy(value, val, 20); | ||||
|  | ||||
| 		if (strcmp(opt, "radproxy") == 0) { | ||||
| 			if (strcmp(value, "1") == 0) { | ||||
| 				radproxy_apc |= 1; | ||||
| 				return true; | ||||
| 			} | ||||
| 			else { | ||||
| 				radproxy_apc |= 0; | ||||
| 				return false; | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	return false; | ||||
| } | ||||
|  | ||||
| static int vif_config_security_set(struct blob_buf *b, | ||||
| 				    const struct schema_Wifi_VIF_Config *vconf) | ||||
| { | ||||
| @@ -319,6 +392,10 @@ static int vif_config_security_set(struct blob_buf *b, | ||||
| 	unsigned int i; | ||||
| 	unsigned int acct_interval; | ||||
| 	const char *auth_server, *auth_port, *auth_secret, *security_key; | ||||
| 	const char *acct_server, *acct_port, *acct_secret; | ||||
| 	char key_str[64], key_holder_str[128]; | ||||
| 	struct schema_APC_State apc_conf; | ||||
| 	const char *local_server = "127.0.0.1"; | ||||
|  | ||||
| 	if (!strcmp(encryption, OVSDB_SECURITY_ENCRYPTION_OPEN) || !mode) | ||||
| 		goto open; | ||||
| @@ -336,24 +413,56 @@ static int vif_config_security_set(struct blob_buf *b, | ||||
| 		} | ||||
|  | ||||
| 		if (vif_crypto[i].enterprise) { | ||||
|  | ||||
| 			if (vif_config_custom_opt_get_proxy(vconf)) { /* Radius Proxy Enabled */ | ||||
| 				LOGN("%s: Apply Proxy Security Settings", vconf->if_name); | ||||
| 				if(apc_read_state(&apc_conf) == false) | ||||
| 				{ | ||||
| 					LOGI("APC_State read failed"); | ||||
| 					return -1; | ||||
| 				} | ||||
|  | ||||
| 				if (!strncmp(apc_conf.mode, "DR", 2)) { | ||||
| 					auth_server = local_server; | ||||
| 					acct_server = local_server; | ||||
| 				} else if (!strncmp(apc_conf.mode, "OR", 2) || | ||||
| 					   !strncmp(apc_conf.mode, "BDR", 2)) { | ||||
| 					auth_server = apc_conf.dr_addr; | ||||
| 					acct_server = apc_conf.dr_addr; | ||||
| 				} | ||||
| 				else { | ||||
| 					auth_server = local_server; | ||||
| 					acct_server = local_server; | ||||
| 				} | ||||
| 				auth_port = "1812"; | ||||
| 				auth_secret = "secret"; | ||||
| 				acct_port = "1813"; | ||||
| 				acct_secret = "secret"; | ||||
| 			} | ||||
| 			else /* Radius Proxy Disabled */ | ||||
| 			{ | ||||
| 				auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP); | ||||
| 				acct_server = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP); | ||||
| 				auth_port   = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT); | ||||
| 				auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET); | ||||
| 				acct_port = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT); | ||||
| 				acct_secret = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_SECRET); | ||||
| 			} | ||||
|  | ||||
| 			acct_interval = 0; | ||||
| 			auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP); | ||||
| 			auth_port   = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT); | ||||
| 			auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET); | ||||
|  | ||||
| 			LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret); | ||||
| 			if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) { | ||||
| 				LOGI("%s: Incomplete RADIUS security config - SSID not created", vconf->if_name); | ||||
| 				return -1; | ||||
| 			} | ||||
|  | ||||
| 			blobmsg_add_string(b, "auth_server", auth_server); | ||||
| 			blobmsg_add_string(b, "auth_port",   auth_port ); | ||||
| 			blobmsg_add_string(b, "auth_secret", auth_secret ); | ||||
| 			blobmsg_add_string(b, "acct_server", | ||||
| 					   SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP)); | ||||
| 			blobmsg_add_string(b, "acct_port", | ||||
| 					   SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT)); | ||||
| 			blobmsg_add_string(b, "acct_secret", | ||||
| 					   SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_SECRET)); | ||||
| 			blobmsg_add_string(b, "acct_server", acct_server); | ||||
| 			blobmsg_add_string(b, "acct_port", acct_port); | ||||
| 			blobmsg_add_string(b, "acct_secret", acct_secret); | ||||
| 			blobmsg_add_bool(b, "request_cui", 1); | ||||
| 			acct_interval = atoi(SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_INTERVAL)); | ||||
|  | ||||
| @@ -361,6 +470,27 @@ static int vif_config_security_set(struct blob_buf *b, | ||||
| 			{ | ||||
| 				blobmsg_add_u32(b, "acct_interval", acct_interval); | ||||
| 			} | ||||
|  | ||||
| 			/* | ||||
| 			 * If Radius is configured and Roaming is enabled, | ||||
| 			 * - disable ft_psk_generate_local. This is required for hostapd to populate R0/R1. | ||||
| 			 * - populate r0KH and r1KH with broadcast addressing so that the corresponding | ||||
| 			 * Key Holders are auto-generated | ||||
| 			 */ | ||||
| 			if (vconf->ft_mobility_domain) { | ||||
| 				blobmsg_add_bool(b, "ft_psk_generate_local", 0); | ||||
|  | ||||
| 				vif_get_key_for_key_distr(auth_secret, key_str); | ||||
|  | ||||
| 				strcpy(key_holder_str, "ff:ff:ff:ff:ff:ff,*,"); | ||||
| 				strcat(key_holder_str, key_str); | ||||
| 				blobmsg_add_string(b, "r0kh", key_holder_str); | ||||
|  | ||||
| 				strcpy(key_holder_str, "00:00:00:00:00:00,00:00:00:00:00:00,"); | ||||
| 				strcat(key_holder_str, key_str); | ||||
| 				blobmsg_add_string(b, "r1kh", key_holder_str); | ||||
| 			} | ||||
| 			blobmsg_add_bool(b, "auth_cache", 1); | ||||
| 		} else { | ||||
| 			security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY); | ||||
| 			if (security_key == NULL) { | ||||
| @@ -368,6 +498,8 @@ static int vif_config_security_set(struct blob_buf *b, | ||||
| 				return -1; | ||||
| 			} | ||||
| 			blobmsg_add_string(b, "key", security_key); | ||||
| 			if (vconf->ft_mobility_domain) | ||||
| 				blobmsg_add_bool(b, "ft_psk_generate_local", vconf->ft_psk); | ||||
| 		} | ||||
| 	} | ||||
| 	return 0; | ||||
| @@ -454,25 +586,6 @@ out_none: | ||||
| 				  OVSDB_SECURITY_ENCRYPTION_OPEN); | ||||
| } | ||||
|  | ||||
| /* Custom options table */ | ||||
| #define SCHEMA_CUSTOM_OPT_SZ            20 | ||||
| #define SCHEMA_CUSTOM_OPTS_MAX          12 | ||||
|  | ||||
| const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] = | ||||
| { | ||||
| 	SCHEMA_CONSTS_RATE_LIMIT, | ||||
| 	SCHEMA_CONSTS_RATE_DL, | ||||
| 	SCHEMA_CONSTS_RATE_UL, | ||||
| 	SCHEMA_CONSTS_CLIENT_RATE_DL, | ||||
| 	SCHEMA_CONSTS_CLIENT_RATE_UL, | ||||
| 	SCHEMA_CONSTS_IEEE80211k, | ||||
| 	SCHEMA_CONSTS_RTS_THRESHOLD, | ||||
| 	SCHEMA_CONSTS_DTIM_PERIOD, | ||||
| 	SCHEMA_CONSTS_RADIUS_OPER_NAME, | ||||
| 	SCHEMA_CONSTS_RADIUS_NAS_ID, | ||||
| 	SCHEMA_CONSTS_RADIUS_NAS_IP, | ||||
| 	SCHEMA_CONSTS_DYNAMIC_VLAN, | ||||
| }; | ||||
|  | ||||
| static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del, | ||||
|                                       const struct schema_Wifi_VIF_Config *vconf) | ||||
| @@ -483,6 +596,9 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del, | ||||
| 	const char *opt; | ||||
| 	const char *val; | ||||
| 	struct blob_attr *n; | ||||
| 	bool found_nasid = false; | ||||
| 	char mac[ETH_ALEN * 3]; | ||||
| 	struct blob_attr *tb[__WIF_ATTR_MAX] = { }; | ||||
|  | ||||
| 	for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) { | ||||
| 		opt = custom_options_table[i]; | ||||
| @@ -517,8 +633,12 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del, | ||||
| 			blobmsg_add_string(b, "rts_threshold", value); | ||||
| 		else if (strcmp(opt, "dtim_period") == 0) | ||||
| 			blobmsg_add_string(b, "dtim_period", value); | ||||
| 		else if (strcmp(opt, "radius_nas_id") == 0) | ||||
| 			blobmsg_add_string(b, "nasid", value); | ||||
| 		else if (strcmp(opt, "radius_nas_id") == 0) { | ||||
| 			if (strcmp(value, "\0") != 0) { | ||||
| 				blobmsg_add_string(b, "nasid", value); | ||||
| 				found_nasid = true; | ||||
| 			} | ||||
| 		} | ||||
| 		else if (strcmp(opt, "radius_nas_ip") == 0) | ||||
| 			blobmsg_add_string(b, "ownip", value); | ||||
| 		else if (strcmp(opt, "radius_oper_name") == 0 && strlen(value) > 0) | ||||
| @@ -552,8 +672,29 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del, | ||||
| 				strncpy(value, "br-wan.", 20); | ||||
| 				blobmsg_add_string(del, "vlan_bridge", value); | ||||
| 			} | ||||
| 		} else if (strcmp(opt, "radproxy") == 0) { | ||||
| 			blobmsg_add_string(b, "radproxy", value); | ||||
| 		} else if (strcmp(opt, "proxy_arp") == 0) { | ||||
| 			if (strcmp(value, "1") == 0) | ||||
| 				blobmsg_add_bool(b, "proxy_arp", 1); | ||||
| 			else if (strcmp(value, "0") == 0) | ||||
| 				blobmsg_add_bool(del, "proxy_arp", 1); | ||||
| 		} else if (strcmp(opt, "mcast_to_ucast") == 0) { | ||||
| 			if (strcmp(value, "1") == 0) | ||||
| 				blobmsg_add_bool(b, "multicast_to_unicast", 1); | ||||
| 			else if (strcmp(value, "0") == 0) | ||||
| 				blobmsg_add_bool(del, "multicast_to_unicast", 1); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	/* No NASID was found from blob, so use BSSID as NASID */ | ||||
| 	if (found_nasid == false) { | ||||
| 		blobmsg_parse(wifi_iface_policy, __WIF_ATTR_MAX, tb, blob_data(b->head), blob_len(b->head)); | ||||
| 		if (tb[WIF_ATTR_IFNAME] && !vif_get_mac(blobmsg_get_string(tb[WIF_ATTR_IFNAME]), mac)) | ||||
| 			blobmsg_add_string(b, "nasid", mac); | ||||
| 		else | ||||
| 			LOGE("Failed to get base BSSID (mac)\n"); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| static void set_custom_option_state(struct schema_Wifi_VIF_State *vstate, | ||||
| @@ -686,6 +827,39 @@ static void vif_state_custom_options_get(struct schema_Wifi_VIF_State *vstate, | ||||
| 							custom_options_table[i], | ||||
| 							buf); | ||||
| 			} | ||||
| 		} else if (strcmp(opt, "radproxy") == 0) { | ||||
| 			if (tb[WIF_ATTR_RADPROXY]) { | ||||
| 				buf = blobmsg_get_string(tb[WIF_ATTR_RADPROXY]); | ||||
| 				set_custom_option_state(vstate, &index, | ||||
| 							custom_options_table[i], | ||||
| 							buf); | ||||
| 			} | ||||
|  | ||||
|  | ||||
| 		} else if (strcmp(opt, "proxy_arp") == 0) { | ||||
| 			if (tb[WIF_ATTR_PROXY_ARP]) { | ||||
| 				if (blobmsg_get_bool(tb[WIF_ATTR_PROXY_ARP])) { | ||||
| 					set_custom_option_state(vstate, &index, | ||||
| 								custom_options_table[i], | ||||
| 								"1"); | ||||
| 				} else { | ||||
| 					set_custom_option_state(vstate, &index, | ||||
| 								custom_options_table[i], | ||||
| 								"0"); | ||||
| 				} | ||||
| 			} | ||||
| 		} else if (strcmp(opt, "mcast_to_ucast") == 0) { | ||||
| 			if (tb[WIF_ATTR_MCAST_TO_UCAST]) { | ||||
| 				if (blobmsg_get_bool(tb[WIF_ATTR_MCAST_TO_UCAST])) { | ||||
| 					set_custom_option_state(vstate, &index, | ||||
| 								custom_options_table[i], | ||||
| 								"1"); | ||||
| 				} else { | ||||
| 					set_custom_option_state(vstate, &index, | ||||
| 								custom_options_table[i], | ||||
| 								"0"); | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -697,7 +871,7 @@ bool vif_state_update(struct uci_section *s, struct schema_Wifi_VIF_Config *vcon | ||||
| 	char mac[ETH_ALEN * 3]; | ||||
| 	char *ifname, radio[IF_NAMESIZE]; | ||||
| 	bool vifIsActive = false; | ||||
| 	char network_name[8]; | ||||
| 	char network_name[IF_NAMESIZE]; | ||||
|  | ||||
| 	LOGT("%s: get state", s->e.name); | ||||
|  | ||||
| @@ -766,8 +940,8 @@ bool vif_state_update(struct uci_section *s, struct schema_Wifi_VIF_Config *vcon | ||||
| //		SCHEMA_SET_INT(vstate.uapsd_enable, false); | ||||
|  | ||||
| 	if (tb[WIF_ATTR_NETWORK]) { | ||||
| 		SCHEMA_SET_STR(vstate.bridge, blobmsg_get_string(tb[WIF_ATTR_NETWORK])); | ||||
| 		strcpy(network_name, blobmsg_get_string(tb[WIF_ATTR_NETWORK])); | ||||
| 		strncpy(network_name, blobmsg_get_string(tb[WIF_ATTR_NETWORK]), IF_NAMESIZE); | ||||
| 		SCHEMA_SET_STR(vstate.bridge, network_name); | ||||
| 	} | ||||
| 	else | ||||
| 		LOGW("%s: unknown bridge/network", s->e.name); | ||||
| @@ -856,30 +1030,70 @@ size_t write_file(void *ptr, size_t size, size_t nmemb, FILE *stream) { | ||||
|  | ||||
| void vif_section_del(char *section_name) | ||||
| { | ||||
|  | ||||
| 	struct uci_package *wireless; | ||||
| 	struct uci_context *sec_ctx; | ||||
| 	struct uci_element *e = NULL, *tmp = NULL; | ||||
| 	int ret=0; | ||||
|  | ||||
| 	ret= uci_load(uci, "wireless", &wireless); | ||||
| 	sec_ctx = uci_alloc_context(); | ||||
| 	ret= uci_load(sec_ctx, "wireless", &wireless); | ||||
| 	if (ret) { | ||||
| 		LOGD("%s: uci_load() failed with rc %d", section_name, ret); | ||||
| 		LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret); | ||||
| 		if (sec_ctx) | ||||
| 			uci_free_context(sec_ctx); | ||||
| 		return; | ||||
| 	} | ||||
| 	uci_foreach_element_safe(&wireless->sections, tmp, e) { | ||||
| 		struct uci_section *s = uci_to_section(e); | ||||
| 		if ((s == NULL) || (s->type == NULL)) continue; | ||||
| 		if (!strcmp(s->type, section_name)) { | ||||
| 			uci_section_del(uci, "vif", "wireless", (char *)s->e.name, section_name); | ||||
| 			uci_section_del(sec_ctx, "vif", "wireless", (char *)s->e.name, section_name); | ||||
| 		} | ||||
| 		else { | ||||
| 			continue; | ||||
| 		} | ||||
| 	} | ||||
| 	uci_commit(uci, &wireless, false); | ||||
| 	uci_unload(uci, wireless); | ||||
| 	reload_config = 1; | ||||
| 	uci_commit(sec_ctx, &wireless, false); | ||||
| 	uci_unload(sec_ctx, wireless); | ||||
| 	if (sec_ctx) | ||||
| 		uci_free_context(sec_ctx); | ||||
| } | ||||
|  | ||||
| void vif_check_radius_proxy() | ||||
| { | ||||
| 	struct schema_APC_State apc_conf; | ||||
| 	int n = 0; | ||||
| 	void *buf = NULL; | ||||
|  | ||||
| 	if(apc_read_state(&apc_conf) == false) | ||||
| 	{ | ||||
| 		LOGI("APC_State read failed"); | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	buf = ovsdb_table_select_where(&table_Radius_Proxy_Config, NULL, &n); | ||||
| 	if (!buf) | ||||
| 	{ | ||||
| 		LOGI("Radius_Proxy_Config table doesn't exist.  Stop radsecproxy service."); | ||||
| 		system("/etc/init.d/radsecproxy stop"); | ||||
| 		return; | ||||
| 	} | ||||
| 	else if (!strcmp(apc_conf.mode, "DR")) | ||||
| 	{ | ||||
| 		if (!system("pidof radsecproxy")) | ||||
| 			goto out; | ||||
|  | ||||
| 		LOGI("Start radsecproxy service."); | ||||
| 		system("/etc/init.d/radsecproxy start"); | ||||
| 	} | ||||
| 	else | ||||
| 	{ | ||||
| 		LOGI("Not DR. Stop radsecproxy service."); | ||||
| 		system("/etc/init.d/radsecproxy stop"); | ||||
| 	} | ||||
|  | ||||
| out: | ||||
| 	free(buf); | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| static bool hs20_download_icon(char *icon_name, char *icon_url) | ||||
| @@ -936,6 +1150,7 @@ static void hs20_vif_config(struct blob_buf *b, | ||||
| 	int i = 0; | ||||
| 	unsigned int len = 0; | ||||
| 	char domain_name[256]; | ||||
| 	char str[3] = {}; | ||||
|  | ||||
| 	if (hs2conf->enable) { | ||||
| 		blobmsg_add_bool(b, "interworking", 1); | ||||
| @@ -1048,6 +1263,20 @@ static void hs20_vif_config(struct blob_buf *b, | ||||
| 	if (strlen(hs2conf->wan_metrics)) | ||||
| 		blobmsg_add_string(b, "hs20_wan_metrics", hs2conf->wan_metrics); | ||||
|  | ||||
| 	len = strlen(hs2conf->ipaddr_type_availability); | ||||
| 	if (len) | ||||
| 	{ | ||||
| 		if (len == 1) | ||||
| 		{ | ||||
| 			snprintf(str, sizeof(str), "0%s", hs2conf->ipaddr_type_availability); | ||||
| 			blobmsg_add_string(b, "ipaddr_type_availability", str); | ||||
| 		} | ||||
| 		else | ||||
| 		{ | ||||
| 			blobmsg_add_string(b, "ipaddr_type_availability", hs2conf->ipaddr_type_availability); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	n = blobmsg_open_array(b, "hs20_oper_friendly_name"); | ||||
| 	for (i = 0; i < hs2conf->operator_friendly_name_len; i++) | ||||
| 	{ | ||||
| @@ -1064,6 +1293,13 @@ static void hs20_vif_config(struct blob_buf *b, | ||||
| 		blobmsg_add_u32(b, "venue_type", venue_type); | ||||
| 	} | ||||
|  | ||||
| 	n = blobmsg_open_array(b, "hs20_conn_capab"); | ||||
| 	for (i = 0; i < hs2conf->connection_capability_len; i++) | ||||
| 	{ | ||||
| 		blobmsg_add_string(b, NULL, hs2conf->connection_capability[i]); | ||||
| 	} | ||||
| 	blobmsg_close_array(b, n); | ||||
|  | ||||
| 	if (hs2conf->operator_icons_len) | ||||
| 	{ | ||||
| 		n = blobmsg_open_array(b, "operator_icon"); | ||||
| @@ -1084,14 +1320,19 @@ static void hs20_vif_config(struct blob_buf *b, | ||||
| bool target_vif_config_del(const struct schema_Wifi_VIF_Config *vconf) | ||||
| { | ||||
| 	struct uci_package *wireless; | ||||
| 	struct uci_context *vif_ctx; | ||||
| 	struct uci_element *e = NULL, *tmp = NULL; | ||||
| 	const char *ifname; | ||||
| 	int ret=0; | ||||
| 	int ret = 0; | ||||
|  | ||||
| 	vif_fixup_del((char *)vconf->if_name); | ||||
| 	vlan_del((char *)vconf->if_name); | ||||
| 	ret= uci_load(uci, "wireless", &wireless); | ||||
| 	vif_ctx = uci_alloc_context(); | ||||
| 	ret= uci_load(vif_ctx, "wireless", &wireless); | ||||
| 	if (ret) { | ||||
| 		LOGD("%s: uci_load() failed with rc %d", vconf->if_name, ret); | ||||
| 		LOGE("%s: %s uci_load() failed with rc %d", vconf->if_name, __func__, ret); | ||||
| 		if (vif_ctx) | ||||
| 			uci_free_context(vif_ctx); | ||||
| 		return false; | ||||
| 	} | ||||
| 	uci_foreach_element_safe(&wireless->sections, tmp, e) { | ||||
| @@ -1099,15 +1340,20 @@ bool target_vif_config_del(const struct schema_Wifi_VIF_Config *vconf) | ||||
| 		if ((s == NULL) || (s->type == NULL)) continue;  | ||||
| 		if (strcmp(s->type, "wifi-iface")) continue; | ||||
|  | ||||
| 		ifname = uci_lookup_option_string( uci, s, "ifname" ); | ||||
| 		if (!strcmp(ifname,vconf->if_name)) { | ||||
| 			uci_section_del(uci, "vif", "wireless", (char *)s->e.name, "wifi-iface"); | ||||
| 		ifname = uci_lookup_option_string( vif_ctx, s, "ifname" ); | ||||
| 		if (ifname == NULL) { | ||||
| 			/* Delete this section because it doesn't have an ifname - it is invalid */ | ||||
| 			uci_section_del(vif_ctx, "vif", "wireless", (char *)s->e.name, "wifi-iface"); | ||||
| 		} else if (!strcmp(ifname,vconf->if_name)) { | ||||
| 			/* Delete this section because it matches the if_name we are trying to delete */ | ||||
| 			uci_section_del(vif_ctx, "vif", "wireless", (char *)s->e.name, "wifi-iface"); | ||||
| 			break; | ||||
| 		} | ||||
| 	} | ||||
| 	uci_commit(uci, &wireless, false); | ||||
| 	uci_unload(uci, wireless); | ||||
| 	reload_config = 1; | ||||
| 	uci_commit(vif_ctx, &wireless, false); | ||||
| 	uci_unload(vif_ctx, wireless); | ||||
| 	if (vif_ctx) | ||||
| 		uci_free_context(vif_ctx); | ||||
| 	return true; | ||||
| } | ||||
|  | ||||
| @@ -1162,7 +1408,7 @@ void vif_hs20_osu_update(struct schema_Hotspot20_OSU_Providers *osuconf) | ||||
|  | ||||
| 	blob_to_uci_section(uci, "wireless", osuconf->osu_provider_name, "osu-provider", | ||||
| 			osu.head, &wifi_hs20_osu_param, NULL); | ||||
| 	reload_config = 1; | ||||
| 	uci_commit_all(uci); | ||||
| } | ||||
|  | ||||
|  | ||||
| @@ -1193,7 +1439,7 @@ void vif_hs20_icon_update(struct schema_Hotspot20_Icon_Config *iconconf) | ||||
|  | ||||
| 		blob_to_uci_section(uci, "wireless", iconconf->icon_config_name, "hs20-icon", | ||||
| 				hs20.head, &wifi_hs20_icon_param, NULL); | ||||
| 		reload_config = 1; | ||||
| 		uci_commit_all(uci); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| @@ -1216,9 +1462,9 @@ void vif_hs20_update(struct schema_Hotspot20_Config *hs2conf) | ||||
| 			hs20_vif_config(&b, hs2conf); | ||||
| 			blob_to_uci_section(uci, "wireless", vconf.if_name, "wifi-iface", | ||||
| 					b.head, &wifi_iface_param, NULL); | ||||
| 			reload_config = 1; | ||||
| 		} | ||||
| 	} | ||||
| 	uci_commit_all(uci); | ||||
| } | ||||
|  | ||||
| /* Mesh options table */ | ||||
| @@ -1286,8 +1532,7 @@ static int mesh_vif_config_set(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 	blobmsg_add_string(&mesh, "master", "bat0"); | ||||
| 	blob_to_uci_section(uci, "network", vconf->if_name, "interface", | ||||
| 			mesh.head, &wifi_mesh_param, NULL); | ||||
|  | ||||
| 	reload_config = 1; | ||||
| 	uci_commit_all(uci); | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| @@ -1299,7 +1544,6 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf, | ||||
|  | ||||
| 	blob_buf_init(&b, 0); | ||||
| 	blob_buf_init(&del,0); | ||||
|  | ||||
| 	blobmsg_add_string(&b, "ifname", vconf->if_name); | ||||
| 	blobmsg_add_string(&b, "device", rconf->if_name); | ||||
| 	blobmsg_add_string(&b, "mode", "ap"); | ||||
| @@ -1335,10 +1579,9 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 		blobmsg_add_string(&b, "min_hw_mode", vconf->min_hw_mode); | ||||
|  | ||||
| 	if (changed->ft_psk || changed->ft_mobility_domain) { | ||||
| 		if (vconf->ft_psk && vconf->ft_mobility_domain) { | ||||
| 		if (vconf->ft_mobility_domain) { | ||||
| 			blobmsg_add_bool(&b, "ieee80211r", 1); | ||||
| 			blobmsg_add_hex16(&b, "mobility_domain", vconf->ft_mobility_domain); | ||||
| 			blobmsg_add_bool(&b, "ft_psk_generate_local", vconf->ft_psk); | ||||
| 			blobmsg_add_bool(&b, "ft_over_ds", 0); | ||||
| 			blobmsg_add_bool(&b, "reassociation_deadline", 1); | ||||
| 		} else { | ||||
| @@ -1385,9 +1628,8 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 	blobmsg_add_bool(&b, "wpa_disable_eapol_key_retries", 1); | ||||
| 	blobmsg_add_u32(&b, "channel", rconf->channel); | ||||
|  | ||||
| 	if (vif_config_security_set(&b, vconf)) { | ||||
|                 return -1; | ||||
|         } | ||||
| 	if (vif_config_security_set(&b, vconf)) | ||||
| 		return -1; | ||||
|  | ||||
| 	if (changed->custom_options) | ||||
| 		vif_config_custom_opt_set(&b, &del, vconf); | ||||
| @@ -1409,8 +1651,7 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf, | ||||
| 	{ | ||||
| 		vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name); | ||||
| 	} | ||||
|  | ||||
| 	reload_config = 1; | ||||
| 	uci_commit_all(uci); | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
|   | ||||
| @@ -75,7 +75,6 @@ const struct uci_blob_param_list network_param = { | ||||
| 	.params = network_policy, | ||||
| }; | ||||
|  | ||||
| int reload_config = 0; | ||||
| ovsdb_table_t table_Wifi_Inet_Config; | ||||
| struct blob_buf b = { }; | ||||
| struct blob_buf del = { }; | ||||
| @@ -342,7 +341,6 @@ static int wifi_inet_conf_add(struct schema_Wifi_Inet_Config *iconf) | ||||
| 	} | ||||
|  | ||||
| 	uci_commit_all(uci); | ||||
| 	reload_config = 1; | ||||
|  | ||||
| 	return 0; | ||||
| } | ||||
| @@ -361,7 +359,6 @@ static void wifi_inet_conf_del(struct schema_Wifi_Inet_Config *iconf) | ||||
|  | ||||
| 	uci_section_del(uci, "network", "network", iconf->if_name, "interface"); | ||||
| 	uci_commit_all(uci); | ||||
| 	reload_config = 1; | ||||
| } | ||||
|  | ||||
| static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon, | ||||
| @@ -388,17 +385,6 @@ static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon, | ||||
| 	return; | ||||
| } | ||||
|  | ||||
| static void periodic_task(void *arg) | ||||
| { | ||||
| 	if (reload_config) { | ||||
| 		uci_commit_all(uci); | ||||
| 		system("reload_config"); | ||||
| 		reload_config = 0; | ||||
| 	} | ||||
|  | ||||
| 	evsched_task_reschedule_ms(EVSCHED_SEC(5)); | ||||
| } | ||||
|  | ||||
| void wifi_inet_config_init(void) | ||||
| { | ||||
| 	struct uci_element *e = NULL; | ||||
| @@ -418,7 +404,6 @@ void wifi_inet_config_init(void) | ||||
| 	} | ||||
| 	uci_unload(uci, network); | ||||
| 	OVSDB_TABLE_MONITOR(Wifi_Inet_Config, false); | ||||
| 	evsched_task(&periodic_task, NULL, EVSCHED_SEC(5)); | ||||
|  | ||||
| 	return; | ||||
| } | ||||
|   | ||||
| @@ -48,6 +48,12 @@ typedef struct | ||||
| 	ds_tree_node_t                  node; | ||||
| } rrm_vif_state_t; | ||||
|  | ||||
| #define RRM_CHANNEL_INTERVAL     15 | ||||
|  | ||||
| #define RRM_MAX_NF_SAMPLES 100 | ||||
| #define RRM_OBSS_HOP_MODE_NON_WIFI		1 | ||||
| #define RRM_OBSS_HOP_MODE_NON_WIFI_AND_OBSS	2 | ||||
|  | ||||
| typedef struct | ||||
| { | ||||
| 	// Cached data | ||||
| @@ -59,9 +65,17 @@ typedef struct | ||||
| 	uint32_t min_load; | ||||
| 	uint32_t beacon_rate; | ||||
| 	uint32_t mcast_rate; | ||||
| 	int32_t noise_floor_thresh; | ||||
| 	uint32_t noise_floor_time; | ||||
| 	int32_t non_wifi_thresh; | ||||
| 	uint32_t non_wifi_time; | ||||
| 	uint32_t obss_hop_mode; | ||||
|  | ||||
| 	// Internal state data | ||||
| 	int32_t noise_lwm; | ||||
| 	int32_t avg_nf; | ||||
| 	int32_t rrm_chan_nf_next_el; | ||||
| 	int32_t rrm_chan_nf_num_el; | ||||
| 	double rrm_chan_nf_samples[RRM_MAX_NF_SAMPLES]; | ||||
| } rrm_entry_t; | ||||
|  | ||||
| typedef struct | ||||
| @@ -75,10 +89,11 @@ int rrm_setup_monitor(void); | ||||
| void rrm_channel_init(void); | ||||
| int rrm_ubus_init(struct ev_loop *loop); | ||||
| int ubus_get_noise(const char *if_name, uint32_t *noise); | ||||
| int ubus_set_channel_switch(const char *if_name, uint32_t frequency); | ||||
| int ubus_set_channel_switch(const char *if_name, uint32_t frequency, int channel_bandwidth, int sec_chan_offset); | ||||
| void set_rrm_parameters(rrm_entry_t *rrm_data); | ||||
| ds_tree_t* rrm_get_rrm_config_list(void); | ||||
| ds_tree_t* rrm_get_radio_list(void); | ||||
| ds_tree_t* rrm_get_vif_list(void); | ||||
| void rrm_reset_noise_floor_samples(rrm_entry_t *rrm_data); | ||||
|  | ||||
| #endif /* RRM_H_INCLUDED */ | ||||
|   | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user