mirror of
https://github.com/Telecominfraproject/wlan-ap.git
synced 2025-11-01 02:48:18 +00:00
Compare commits
20 Commits
v1.0.1
...
v1.0.4-rc2
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f3fc398eac | ||
|
|
7aea689d9a | ||
|
|
7a634d80ed | ||
|
|
6021a14426 | ||
|
|
482cfee8d5 | ||
|
|
3fc41fac2c | ||
|
|
8b5e2058f3 | ||
|
|
5815e883a0 | ||
|
|
cc8e30e1d4 | ||
|
|
e5bc8c9550 | ||
|
|
a91e00337c | ||
|
|
b4e20e6289 | ||
|
|
dd86dfceb0 | ||
|
|
42a87e7fa4 | ||
|
|
315e953110 | ||
|
|
fa5c8b06ef | ||
|
|
5d8ce34973 | ||
|
|
b717b1361d | ||
|
|
45dcf6a878 | ||
|
|
0fb8809a28 |
@@ -49,6 +49,7 @@ hostapd_append_wpa_key_mgmt() {
|
|||||||
;;
|
;;
|
||||||
eap192)
|
eap192)
|
||||||
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
||||||
|
[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256"
|
||||||
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
||||||
;;
|
;;
|
||||||
eap-eap192)
|
eap-eap192)
|
||||||
|
|||||||
@@ -0,0 +1,24 @@
|
|||||||
|
--- a/src/ap/ubus.c
|
||||||
|
+++ b/src/ap/ubus.c
|
||||||
|
@@ -722,6 +722,7 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
struct blob_attr *tb[__CSA_MAX];
|
||||||
|
struct hostapd_data *hapd = get_hapd_from_object(obj);
|
||||||
|
struct csa_settings css;
|
||||||
|
+ int i;
|
||||||
|
|
||||||
|
blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg));
|
||||||
|
|
||||||
|
@@ -746,9 +747,10 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
SET_CSA_SETTING(CSA_VHT, freq_params.vht_enabled, bool);
|
||||||
|
SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool);
|
||||||
|
|
||||||
|
-
|
||||||
|
- if (hostapd_switch_channel(hapd, &css) != 0)
|
||||||
|
- return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
|
+ for (i = 0; i < hapd->iface->num_bss; i++) {
|
||||||
|
+ if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||||
|
+ return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
|
+ }
|
||||||
|
return UBUS_STATUS_OK;
|
||||||
|
#undef SET_CSA_SETTING
|
||||||
|
}
|
||||||
@@ -0,0 +1,186 @@
|
|||||||
|
--- a/src/ap/dfs.c
|
||||||
|
+++ b/src/ap/dfs.c
|
||||||
|
@@ -19,7 +19,7 @@
|
||||||
|
#include "dfs.h"
|
||||||
|
#include "beacon.h"
|
||||||
|
#include "eloop.h"
|
||||||
|
-
|
||||||
|
+#include "ubus.h"
|
||||||
|
|
||||||
|
static int dfs_get_used_n_chans(struct hostapd_iface *iface, int *seg1)
|
||||||
|
{
|
||||||
|
@@ -1207,6 +1207,11 @@ static int hostapd_dfs_start_channel_swi
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (!err) {
|
||||||
|
+ wpa_printf(MSG_DEBUG, "Reporting DFS event to ubus");
|
||||||
|
+ hostapd_ubus_handle_channel_switch_event(iface, HOSTAPD_UBUS_DFS_SWITCH, channel->freq);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (err) {
|
||||||
|
wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback",
|
||||||
|
err);
|
||||||
|
--- a/src/ap/ubus.c
|
||||||
|
+++ b/src/ap/ubus.c
|
||||||
|
@@ -29,6 +29,8 @@ static int ctx_ref;
|
||||||
|
static char** bss_lst = NULL;
|
||||||
|
static size_t bss_nr = 0;
|
||||||
|
|
||||||
|
+static LIST_HEAD(chan_events);
|
||||||
|
+
|
||||||
|
static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
|
||||||
|
{
|
||||||
|
return container_of(obj, struct hapd_interfaces, ubus);
|
||||||
|
@@ -714,6 +716,42 @@ static int hostapd_sessions(struct ubus_
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
+static int hostapd_get_chan_switch_events(struct ubus_context *ctx,
|
||||||
|
+ struct ubus_object *obj,
|
||||||
|
+ struct ubus_request_data *req,
|
||||||
|
+ const char *method,
|
||||||
|
+ struct blob_attr *msg)
|
||||||
|
+{
|
||||||
|
+ void *a = NULL;
|
||||||
|
+ void *t = NULL;
|
||||||
|
+ struct hostapd_chan_event_list *entry, *tmp;
|
||||||
|
+
|
||||||
|
+ blob_buf_init(&b_ev, 0);
|
||||||
|
+ a = blobmsg_open_table(&b_ev, "chan_switch_event");
|
||||||
|
+ list_for_each_entry(entry, &chan_events, list) {
|
||||||
|
+ t = blobmsg_open_table(&b_ev, "event");
|
||||||
|
+ blobmsg_add_u32(&b_ev, "radio_name", entry->records.band);
|
||||||
|
+ blobmsg_add_u32(&b_ev, "reason", entry->records.reason);
|
||||||
|
+ blobmsg_add_u64(&b_ev, "timestamp", entry->records.ts);
|
||||||
|
+ blobmsg_add_u32(&b_ev, "frequency", entry->records.freq);
|
||||||
|
+ blobmsg_close_table(&b_ev, t);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ blobmsg_close_table(&b_ev, a);
|
||||||
|
+ ubus_send_reply(ctx, req, b_ev.head);
|
||||||
|
+
|
||||||
|
+ /*delete list*/
|
||||||
|
+
|
||||||
|
+ if (!list_empty(&chan_events)) {
|
||||||
|
+ list_for_each_entry_safe(entry, tmp, &chan_events, list) {
|
||||||
|
+ list_del(&entry->list);
|
||||||
|
+ free(entry);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
static int
|
||||||
|
hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
|
||||||
|
struct ubus_request_data *req, const char *method,
|
||||||
|
@@ -751,6 +789,9 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||||
|
return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+ hostapd_ubus_handle_channel_switch_event(hapd->iface, HOSTAPD_UBUS_HIGH_INTERFERENCE, css.freq_params.freq);
|
||||||
|
+
|
||||||
|
return UBUS_STATUS_OK;
|
||||||
|
#undef SET_CSA_SETTING
|
||||||
|
}
|
||||||
|
@@ -1446,6 +1487,7 @@ static const struct ubus_method daemon_m
|
||||||
|
UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
|
||||||
|
UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
|
||||||
|
UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list),
|
||||||
|
+ UBUS_METHOD_NOARG("get_chan_switch_events", hostapd_get_chan_switch_events),
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct ubus_object_type daemon_object_type =
|
||||||
|
@@ -1509,6 +1551,26 @@ ubus_event_cb(struct ubus_notify_request
|
||||||
|
ureq->resp = ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
+void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface, int reason,
|
||||||
|
+ int freq)
|
||||||
|
+{
|
||||||
|
+ struct hostapd_chan_event_list *rec = NULL;
|
||||||
|
+ struct timespec ts;
|
||||||
|
+ uint64_t timestamp = 0;
|
||||||
|
+
|
||||||
|
+ clock_gettime(CLOCK_REALTIME, &ts);
|
||||||
|
+ timestamp = get_time_in_ms(&ts);
|
||||||
|
+
|
||||||
|
+ rec = os_zalloc(sizeof(struct hostapd_chan_event_list));
|
||||||
|
+
|
||||||
|
+ rec->records.reason = reason;
|
||||||
|
+ rec->records.band = iface->freq;
|
||||||
|
+ rec->records.ts = timestamp;
|
||||||
|
+ rec->records.freq = freq;
|
||||||
|
+
|
||||||
|
+ list_add_tail(&rec->list, &chan_events);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd,
|
||||||
|
struct hostapd_ubus_request *req)
|
||||||
|
{
|
||||||
|
--- a/src/ap/ubus.h
|
||||||
|
+++ b/src/ap/ubus.h
|
||||||
|
@@ -17,9 +17,15 @@ enum hostapd_ubus_event_type {
|
||||||
|
HOSTAPD_UBUS_DEAUTH_REQ,
|
||||||
|
HOSTAPD_UBUS_FDATA_REQ,
|
||||||
|
HOSTAPD_UBUS_IP_REQ,
|
||||||
|
+ HOSTAPD_UBUS_CHAN_SWITCH,
|
||||||
|
HOSTAPD_UBUS_TYPE_MAX
|
||||||
|
};
|
||||||
|
|
||||||
|
+enum hostapd_ubus_chan_event_reason {
|
||||||
|
+ HOSTAPD_UBUS_DFS_SWITCH,
|
||||||
|
+ HOSTAPD_UBUS_HIGH_INTERFERENCE
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
struct hostapd_ubus_request {
|
||||||
|
enum hostapd_ubus_event_type type;
|
||||||
|
const struct ieee80211_mgmt *mgmt_frame;
|
||||||
|
@@ -40,6 +46,7 @@ struct rrm_measurement_beacon_report;
|
||||||
|
|
||||||
|
#include <libubox/avl.h>
|
||||||
|
#include <libubus.h>
|
||||||
|
+#include <libubox/list.h>
|
||||||
|
|
||||||
|
struct hostapd_ubus_bss {
|
||||||
|
struct ubus_object obj;
|
||||||
|
@@ -121,11 +128,24 @@ struct hostapd_event_avl_rec {
|
||||||
|
struct avl_node avl;
|
||||||
|
};
|
||||||
|
|
||||||
|
+struct channel_switch_event {
|
||||||
|
+ int band; /* Radio name*/
|
||||||
|
+ uint8_t reason;
|
||||||
|
+ uint64_t ts;
|
||||||
|
+ uint32_t freq;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+struct hostapd_chan_event_list {
|
||||||
|
+ struct channel_switch_event records;
|
||||||
|
+ struct list_head list;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
void hostapd_ubus_add_iface(struct hostapd_iface *iface);
|
||||||
|
void hostapd_ubus_free_iface(struct hostapd_iface *iface);
|
||||||
|
void hostapd_ubus_add_bss(struct hostapd_data *hapd);
|
||||||
|
void hostapd_ubus_free_bss(struct hostapd_data *hapd);
|
||||||
|
-
|
||||||
|
+void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface,
|
||||||
|
+ int reason, int channel);
|
||||||
|
int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req);
|
||||||
|
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req);
|
||||||
|
void hostapd_ubus_notify(struct hostapd_data *hapd, const char *type, const u8 *mac);
|
||||||
|
@@ -157,6 +177,11 @@ static inline void hostapd_ubus_free_bss
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
+static inline void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface,
|
||||||
|
+ int reason, int channel)
|
||||||
|
+{
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
static inline int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
@@ -8,8 +8,8 @@ PKG_LICENSE_FILES:=
|
|||||||
|
|
||||||
PKG_SOURCE_URL:=https://github.com/greearb/ath10k-ct.git
|
PKG_SOURCE_URL:=https://github.com/greearb/ath10k-ct.git
|
||||||
PKG_SOURCE_PROTO:=git
|
PKG_SOURCE_PROTO:=git
|
||||||
PKG_SOURCE_DATE:=2020-08-26
|
PKG_SOURCE_DATE:=2021-05-22b
|
||||||
PKG_SOURCE_VERSION:=13319ff0b5dc3c86e8313f49fca583b829878736
|
PKG_SOURCE_VERSION:=54a9ac02f1139596ea4361ebbc3e444955d86cfd
|
||||||
#PKG_MIRROR_HASH:=97cf22a4a57381c7eb7a9b8a8b1e347e9711ce51c89db971b4ab9a35af476ece
|
#PKG_MIRROR_HASH:=97cf22a4a57381c7eb7a9b8a8b1e347e9711ce51c89db971b4ab9a35af476ece
|
||||||
|
|
||||||
# Build the 5.4 ath10k-ct driver version. Other option is "-4.19".
|
# Build the 5.4 ath10k-ct driver version. Other option is "-4.19".
|
||||||
|
|||||||
@@ -49,6 +49,7 @@ hostapd_append_wpa_key_mgmt() {
|
|||||||
;;
|
;;
|
||||||
eap192)
|
eap192)
|
||||||
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
||||||
|
[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256"
|
||||||
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
||||||
;;
|
;;
|
||||||
eap-eap192)
|
eap-eap192)
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
--- a/src/ap/dfs.c
|
||||||
===================================================================
|
+++ b/src/ap/dfs.c
|
||||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/dfs.c
|
|
||||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
|
||||||
@@ -18,7 +18,7 @@
|
@@ -18,7 +18,7 @@
|
||||||
#include "drivers/driver.h"
|
#include "drivers/driver.h"
|
||||||
#include "dfs.h"
|
#include "dfs.h"
|
||||||
@@ -23,10 +21,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
|||||||
if (err) {
|
if (err) {
|
||||||
wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback",
|
wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback",
|
||||||
err);
|
err);
|
||||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
--- a/src/ap/ubus.c
|
||||||
===================================================================
|
+++ b/src/ap/ubus.c
|
||||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.c
|
|
||||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|
||||||
@@ -29,6 +29,8 @@ static int ctx_ref;
|
@@ -29,6 +29,8 @@ static int ctx_ref;
|
||||||
static char** bss_lst = NULL;
|
static char** bss_lst = NULL;
|
||||||
static size_t bss_nr = 0;
|
static size_t bss_nr = 0;
|
||||||
@@ -36,7 +32,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
|
static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
|
||||||
{
|
{
|
||||||
return container_of(obj, struct hapd_interfaces, ubus);
|
return container_of(obj, struct hapd_interfaces, ubus);
|
||||||
@@ -714,6 +716,43 @@ static int hostapd_sessions(struct ubus_
|
@@ -714,6 +716,44 @@ static int hostapd_sessions(struct ubus_
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -48,7 +44,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
+{
|
+{
|
||||||
+ void *a = NULL;
|
+ void *a = NULL;
|
||||||
+ void *t = NULL;
|
+ void *t = NULL;
|
||||||
+ struct hostapd_chan_event_list *entry;
|
+ struct hostapd_chan_event_list *entry, *tmp;
|
||||||
+
|
+
|
||||||
+ blob_buf_init(&b_ev, 0);
|
+ blob_buf_init(&b_ev, 0);
|
||||||
+ a = blobmsg_open_table(&b_ev, "chan_switch_event");
|
+ a = blobmsg_open_table(&b_ev, "chan_switch_event");
|
||||||
@@ -68,9 +64,10 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
+ /*delete list*/
|
+ /*delete list*/
|
||||||
+
|
+
|
||||||
+ if (!list_empty(&chan_events)) {
|
+ if (!list_empty(&chan_events)) {
|
||||||
+ list_for_each_entry(entry, &chan_events, list)
|
+ list_for_each_entry_safe(entry, tmp, &chan_events, list)
|
||||||
+ {
|
+ {
|
||||||
+ list_del(&entry->list);
|
+ list_del(&entry->list);
|
||||||
|
+ free(entry);
|
||||||
+ }
|
+ }
|
||||||
+ }
|
+ }
|
||||||
+
|
+
|
||||||
@@ -80,7 +77,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
static int
|
static int
|
||||||
hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
|
hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
|
||||||
struct ubus_request_data *req, const char *method,
|
struct ubus_request_data *req, const char *method,
|
||||||
@@ -749,6 +788,9 @@ hostapd_switch_chan(struct ubus_context
|
@@ -749,6 +789,9 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
|
||||||
if (hostapd_switch_channel(hapd, &css) != 0)
|
if (hostapd_switch_channel(hapd, &css) != 0)
|
||||||
return UBUS_STATUS_NOT_SUPPORTED;
|
return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
@@ -90,7 +87,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
return UBUS_STATUS_OK;
|
return UBUS_STATUS_OK;
|
||||||
#undef SET_CSA_SETTING
|
#undef SET_CSA_SETTING
|
||||||
}
|
}
|
||||||
@@ -1444,6 +1486,7 @@ static const struct ubus_method daemon_m
|
@@ -1444,6 +1487,7 @@ static const struct ubus_method daemon_m
|
||||||
UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
|
UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
|
||||||
UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
|
UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
|
||||||
UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list),
|
UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list),
|
||||||
@@ -98,7 +95,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
};
|
};
|
||||||
|
|
||||||
static struct ubus_object_type daemon_object_type =
|
static struct ubus_object_type daemon_object_type =
|
||||||
@@ -1507,6 +1550,28 @@ ubus_event_cb(struct ubus_notify_request
|
@@ -1507,6 +1551,28 @@ ubus_event_cb(struct ubus_notify_request
|
||||||
ureq->resp = ret;
|
ureq->resp = ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -127,10 +124,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
|||||||
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd,
|
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd,
|
||||||
struct hostapd_ubus_request *req)
|
struct hostapd_ubus_request *req)
|
||||||
{
|
{
|
||||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.h
|
--- a/src/ap/ubus.h
|
||||||
===================================================================
|
+++ b/src/ap/ubus.h
|
||||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.h
|
|
||||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.h
|
|
||||||
@@ -17,9 +17,15 @@ enum hostapd_ubus_event_type {
|
@@ -17,9 +17,15 @@ enum hostapd_ubus_event_type {
|
||||||
HOSTAPD_UBUS_DEAUTH_REQ,
|
HOSTAPD_UBUS_DEAUTH_REQ,
|
||||||
HOSTAPD_UBUS_FDATA_REQ,
|
HOSTAPD_UBUS_FDATA_REQ,
|
||||||
|
|||||||
@@ -0,0 +1,23 @@
|
|||||||
|
--- a/src/ap/ubus.c
|
||||||
|
+++ b/src/ap/ubus.c
|
||||||
|
@@ -762,6 +762,7 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
struct blob_attr *tb[__CSA_MAX];
|
||||||
|
struct hostapd_data *hapd = get_hapd_from_object(obj);
|
||||||
|
struct csa_settings css;
|
||||||
|
+ int i;
|
||||||
|
|
||||||
|
blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg));
|
||||||
|
|
||||||
|
@@ -787,8 +788,10 @@ hostapd_switch_chan(struct ubus_context
|
||||||
|
SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool);
|
||||||
|
|
||||||
|
|
||||||
|
- if (hostapd_switch_channel(hapd, &css) != 0)
|
||||||
|
- return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
|
+ for (i = 0; i < hapd->iface->num_bss; i++) {
|
||||||
|
+ if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||||
|
+ return UBUS_STATUS_NOT_SUPPORTED;
|
||||||
|
+ }
|
||||||
|
|
||||||
|
hostapd_ubus_handle_channel_switch_event(hapd->iface,HOSTAPD_UBUS_HIGH_INTERFERENCE, css.freq_params.freq);
|
||||||
|
|
||||||
@@ -11,7 +11,7 @@ include $(INCLUDE_DIR)/package.mk
|
|||||||
|
|
||||||
define Package/apc
|
define Package/apc
|
||||||
SECTION:=base
|
SECTION:=base
|
||||||
DEPENDS:=+libev +libinterapcomm
|
DEPENDS:=+libev +libinterapcomm +libubus +libubox
|
||||||
CATEGORY:=Base system
|
CATEGORY:=Base system
|
||||||
TITLE:=Access Point Coordinator
|
TITLE:=Access Point Coordinator
|
||||||
endef
|
endef
|
||||||
@@ -33,5 +33,11 @@ endef
|
|||||||
define Package/apc/install
|
define Package/apc/install
|
||||||
$(INSTALL_DIR) $(1)/usr/bin
|
$(INSTALL_DIR) $(1)/usr/bin
|
||||||
$(INSTALL_DATA) $(PKG_BUILD_DIR)/apc $(1)/usr/bin
|
$(INSTALL_DATA) $(PKG_BUILD_DIR)/apc $(1)/usr/bin
|
||||||
|
chmod 0700 $(1)/usr/bin/apc
|
||||||
|
$(INSTALL_DIR) $(1)/etc/init.d
|
||||||
|
$(INSTALL_BIN) ./files/apc.init $(1)/etc/init.d/apc
|
||||||
|
$(INSTALL_DIR) $(1)/etc/config
|
||||||
|
$(INSTALL_BIN) ./files/apc.config $(1)/etc/config/apc
|
||||||
|
|
||||||
endef
|
endef
|
||||||
$(eval $(call BuildPackage,apc))
|
$(eval $(call BuildPackage,apc))
|
||||||
|
|||||||
0
feeds/wlan-ap/apc/files/apc.config
Normal file
0
feeds/wlan-ap/apc/files/apc.config
Normal file
20
feeds/wlan-ap/apc/files/apc.init
Normal file
20
feeds/wlan-ap/apc/files/apc.init
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
#!/bin/sh /etc/rc.common
|
||||||
|
|
||||||
|
USE_PROCD=1
|
||||||
|
START=40
|
||||||
|
STOP=40
|
||||||
|
|
||||||
|
PROG="/usr/bin/apc"
|
||||||
|
|
||||||
|
start_service() {
|
||||||
|
procd_open_instance
|
||||||
|
echo "Starting APC"
|
||||||
|
procd_set_param command ${PROG}
|
||||||
|
procd_set_param respawn
|
||||||
|
procd_close_instance
|
||||||
|
}
|
||||||
|
|
||||||
|
stop_service() {
|
||||||
|
echo "Killing APC"
|
||||||
|
killall -s SIGTERM apc
|
||||||
|
}
|
||||||
@@ -3,19 +3,21 @@ srcdir ?= .
|
|||||||
VPATH ?= $(srcdir)/src
|
VPATH ?= $(srcdir)/src
|
||||||
|
|
||||||
|
|
||||||
LIBS = -lpthread -lrt -linterapcomm -lev
|
LIBS = -lpthread -lrt -linterapcomm -lev -lubus -lubox
|
||||||
$(call output,usr/sbin/wc-apc)
|
$(call output,usr/sbin/wc-apc)
|
||||||
|
|
||||||
CFLAGS += -I./include/ \
|
CFLAGS += -I./include/ \
|
||||||
-I../include/
|
-I../include/
|
||||||
|
|
||||||
|
CFLAGS += -DUBUS_SUPPORT
|
||||||
|
|
||||||
CFLAGS += -Wall -g
|
CFLAGS += -Wall -g
|
||||||
CFLAGS += -MMD -Wall -g -Wpointer-arith -Wcast-qual -Wshadow \
|
CFLAGS += -MMD -Wall -g -Wpointer-arith -Wcast-qual -Wshadow \
|
||||||
-Waggregate-return -Wnested-externs -Wstrict-prototypes \
|
-Waggregate-return -Wnested-externs -Wstrict-prototypes \
|
||||||
-fno-omit-frame-pointer -g -rdynamic -fexceptions -funwind-tables -funsigned-char
|
-fno-omit-frame-pointer -g -rdynamic -fexceptions -funwind-tables -funsigned-char
|
||||||
|
|
||||||
OBJS := apc_main.o \
|
OBJS := apc_main.o \
|
||||||
hello.o iface.o neighbor.o apc.o
|
hello.o iface.o neighbor.o apc.o ubus.o
|
||||||
|
|
||||||
all: apc
|
all: apc
|
||||||
|
|
||||||
|
|||||||
@@ -262,6 +262,8 @@ struct apc_neighbor
|
|||||||
#define APC_IS_DROTHER 4 /* I'm on BCAST or NBMA and I'm not DR */
|
#define APC_IS_DROTHER 4 /* I'm on BCAST or NBMA and I'm not DR */
|
||||||
#define APC_IS_BACKUP 5 /* I'm BDR */
|
#define APC_IS_BACKUP 5 /* I'm BDR */
|
||||||
#define APC_IS_DR 6 /* I'm DR */
|
#define APC_IS_DR 6 /* I'm DR */
|
||||||
|
#define APC_MAX_MODE 7
|
||||||
|
|
||||||
|
|
||||||
/* Definitions for interface state machine */
|
/* Definitions for interface state machine */
|
||||||
#define ISM_UP 0 /* Interface Up */
|
#define ISM_UP 0 /* Interface Up */
|
||||||
|
|||||||
@@ -30,4 +30,9 @@ static inline timer * tm_new_set( void (*hook)(struct _timer *), void *data, uns
|
|||||||
return t;
|
return t;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline void tm_free(timer *t)
|
||||||
|
{
|
||||||
|
free(t);
|
||||||
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
22
feeds/wlan-ap/apc/src/include/ubus.h
Normal file
22
feeds/wlan-ap/apc/src/include/ubus.h
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
/*
|
||||||
|
* netifd - network interface daemon
|
||||||
|
* Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2
|
||||||
|
* as published by the Free Software Foundation
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*/
|
||||||
|
#ifndef __NETIFD_UBUS_H
|
||||||
|
#define __NETIFD_UBUS_H
|
||||||
|
|
||||||
|
extern struct ubus_context *ubus_ctx;
|
||||||
|
|
||||||
|
int ubus_init();
|
||||||
|
void ubus_done(void);
|
||||||
|
|
||||||
|
#endif
|
||||||
@@ -27,6 +27,7 @@ static struct proto * apc_init(struct proto_config * c)
|
|||||||
{
|
{
|
||||||
struct proto * P = mb_allocz(sizeof(struct apc_proto));
|
struct proto * P = mb_allocz(sizeof(struct apc_proto));
|
||||||
|
|
||||||
|
printf("apc_init\n");
|
||||||
P->cf = c;
|
P->cf = c;
|
||||||
P->debug = c->debug;
|
P->debug = c->debug;
|
||||||
P->mrtdump = c->mrtdump;
|
P->mrtdump = c->mrtdump;
|
||||||
|
|||||||
@@ -21,9 +21,11 @@
|
|||||||
#include <nest/apcn.h>
|
#include <nest/apcn.h>
|
||||||
#include <apc.h>
|
#include <apc.h>
|
||||||
#include <protocol.h>
|
#include <protocol.h>
|
||||||
|
#include <ubus.h>
|
||||||
|
|
||||||
static ev_io iac_io;
|
#include <libubus.h>
|
||||||
static ev_timer check_timer;
|
static struct uloop_timeout check_timer;
|
||||||
|
static void check_timer_handler(struct uloop_timeout *timeout);
|
||||||
static unsigned int CheckIp;
|
static unsigned int CheckIp;
|
||||||
static int CheckCount;
|
static int CheckCount;
|
||||||
|
|
||||||
@@ -228,8 +230,7 @@ int set_socket(void)
|
|||||||
/*************************************/
|
/*************************************/
|
||||||
|
|
||||||
|
|
||||||
static void check_timer_handler(struct ev_loop *loop, ev_timer *timer,
|
static void check_timer_handler(struct uloop_timeout *timeout)
|
||||||
int revents)
|
|
||||||
{
|
{
|
||||||
timers_go();
|
timers_go();
|
||||||
if (WaitingToReelect)
|
if (WaitingToReelect)
|
||||||
@@ -256,25 +257,45 @@ static void check_timer_handler(struct ev_loop *loop, ev_timer *timer,
|
|||||||
}
|
}
|
||||||
|
|
||||||
CheckCount = 0;
|
CheckCount = 0;
|
||||||
if (ApcSpecSaved.IsApc == I_AM_APC)
|
|
||||||
{
|
|
||||||
//Radius stuff
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
uloop_timeout_set(&check_timer, 1000);
|
||||||
|
uloop_timeout_add(&check_timer);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void handle_signal(int signo)
|
||||||
|
{
|
||||||
|
system("/usr/opensync/bin/ovsh u APC_State dr_addr:=0.0.0.0 bdr_addr:=0.0.0.0 enabled:=false mode:=NC");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void set_signals(void)
|
||||||
|
{
|
||||||
|
struct sigaction s;
|
||||||
|
|
||||||
|
memset(&s, 0, sizeof(s));
|
||||||
|
s.sa_handler = handle_signal;
|
||||||
|
s.sa_flags = 0;
|
||||||
|
sigaction(SIGINT, &s, NULL);
|
||||||
|
sigaction(SIGTERM, &s, NULL);
|
||||||
|
sigaction(SIGPIPE, &s, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
extern struct ubus_context *ubus_ctx;
|
||||||
|
|
||||||
int main(int argc, char *const* argv)
|
int main(int argc, char *const* argv)
|
||||||
{
|
{
|
||||||
struct proto_config c;
|
struct proto_config c;
|
||||||
struct proto * apc_proto;
|
struct proto * apc_proto;
|
||||||
struct ev_loop *loop = EV_DEFAULT;
|
uloop_init();
|
||||||
|
/*init term signals*/
|
||||||
|
set_signals();
|
||||||
|
|
||||||
/*Socket*/
|
/*Socket*/
|
||||||
set_socket();
|
set_socket();
|
||||||
|
|
||||||
/*Radius stuff*/
|
/*Radius stuff*/
|
||||||
|
|
||||||
printf("Basic MAC\n");
|
|
||||||
memset(MyBasicMac, 0, 6);
|
memset(MyBasicMac, 0, 6);
|
||||||
if (get_mac_addr("br-wan", MyBasicMac) == 0) {
|
if (get_mac_addr("br-wan", MyBasicMac) == 0) {
|
||||||
printf("APC: br-wan mac:%02X:%02X:%02X:%02X:%02X:%02X\n",
|
printf("APC: br-wan mac:%02X:%02X:%02X:%02X:%02X:%02X\n",
|
||||||
@@ -291,6 +312,7 @@ int main(int argc, char *const* argv)
|
|||||||
|
|
||||||
/*get local ip of br-wan*/
|
/*get local ip of br-wan*/
|
||||||
MyIpAddr = 0;
|
MyIpAddr = 0;
|
||||||
|
printf("Getting br-wan IP\n");
|
||||||
while(1)
|
while(1)
|
||||||
{
|
{
|
||||||
GetLocalIpv4Addr((unsigned char *)&MyIpAddr, "br-wan");
|
GetLocalIpv4Addr((unsigned char *)&MyIpAddr, "br-wan");
|
||||||
@@ -303,10 +325,12 @@ int main(int argc, char *const* argv)
|
|||||||
|
|
||||||
/*listening interAP*/
|
/*listening interAP*/
|
||||||
callback cb = receive_from_socket;
|
callback cb = receive_from_socket;
|
||||||
|
|
||||||
if (interap_recv(IAC_APC_ELECTION_PORT, cb, 1000,
|
if (interap_recv(IAC_APC_ELECTION_PORT, cb, 1000,
|
||||||
loop, &iac_io) < 0)
|
NULL, NULL) < 0)
|
||||||
printf("Error: Failed InterAP receive");
|
printf("Error: Failed InterAP receive");
|
||||||
|
|
||||||
|
|
||||||
memset(Timers, 0, sizeof(Timers));
|
memset(Timers, 0, sizeof(Timers));
|
||||||
|
|
||||||
memset(&c, 0, sizeof(struct proto_config));
|
memset(&c, 0, sizeof(struct proto_config));
|
||||||
@@ -319,11 +343,14 @@ int main(int argc, char *const* argv)
|
|||||||
ApcProto = (struct apc_proto *)apc_proto;
|
ApcProto = (struct apc_proto *)apc_proto;
|
||||||
proto_apc.start(apc_proto);
|
proto_apc.start(apc_proto);
|
||||||
|
|
||||||
ev_timer_init(&check_timer, check_timer_handler, 1, 1);
|
check_timer.cb = check_timer_handler;
|
||||||
|
uloop_timeout_set(&check_timer, 1000);
|
||||||
|
uloop_timeout_add(&check_timer);
|
||||||
|
|
||||||
ev_timer_start(loop, &check_timer);
|
ubus_init();
|
||||||
|
uloop_run();
|
||||||
ev_run(loop, 0);
|
uloop_done();
|
||||||
|
ubus_done();
|
||||||
|
|
||||||
return(1);
|
return(1);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -103,6 +103,7 @@ void apc_send_hello(struct apc_iface * ifa, int kind )
|
|||||||
struct apc_hello2_packet ps;
|
struct apc_hello2_packet ps;
|
||||||
unsigned int length, report = 0;
|
unsigned int length, report = 0;
|
||||||
struct apc_spec ApcSpec;
|
struct apc_spec ApcSpec;
|
||||||
|
char dst_ip[16];
|
||||||
|
|
||||||
if (WaitingToReelect )
|
if (WaitingToReelect )
|
||||||
return;
|
return;
|
||||||
@@ -203,7 +204,6 @@ void apc_send_hello(struct apc_iface * ifa, int kind )
|
|||||||
length += i * sizeof(u32);
|
length += i * sizeof(u32);
|
||||||
|
|
||||||
printf("HELLO packet sent via %s\n", ifa->ifname );
|
printf("HELLO packet sent via %s\n", ifa->ifname );
|
||||||
char *dst_ip = malloc(16);
|
|
||||||
memset(dst_ip, 0, 16);
|
memset(dst_ip, 0, 16);
|
||||||
if ((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
if ((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
||||||
printf("Error: Cannot get IP for %s", IAC_IFACE);
|
printf("Error: Cannot get IP for %s", IAC_IFACE);
|
||||||
|
|||||||
@@ -33,11 +33,10 @@ reset_lists(struct apc_proto *p, struct apc_neighbor *n)
|
|||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa)
|
struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa)
|
||||||
{
|
{
|
||||||
struct apc_neighbor * n = mb_allocz(sizeof(struct apc_neighbor));
|
struct apc_neighbor * n = mb_allocz(sizeof(struct apc_neighbor));
|
||||||
|
printf("apc_new_neighbor\n");
|
||||||
n->ifa = ifa;
|
n->ifa = ifa;
|
||||||
add_tail(&ifa->neigh_list, NODE n);
|
add_tail(&ifa->neigh_list, NODE n);
|
||||||
n->adj = 0;
|
n->adj = 0;
|
||||||
@@ -52,7 +51,6 @@ struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa)
|
|||||||
return(n);
|
return(n);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static void apc_neigh_down(struct apc_neighbor * n)
|
static void apc_neigh_down(struct apc_neighbor * n)
|
||||||
{
|
{
|
||||||
struct apc_iface * ifa = n->ifa;
|
struct apc_iface * ifa = n->ifa;
|
||||||
@@ -60,9 +58,10 @@ static void apc_neigh_down(struct apc_neighbor * n)
|
|||||||
rem_node(NODE n);
|
rem_node(NODE n);
|
||||||
|
|
||||||
printf("Neighbor %x on %s removed", n->rid, ifa->ifname );
|
printf("Neighbor %x on %s removed", n->rid, ifa->ifname );
|
||||||
|
tm_free(n->inactim);
|
||||||
|
mb_free(n);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* apc_neigh_chstate - handles changes related to new or lod state of neighbor
|
* apc_neigh_chstate - handles changes related to new or lod state of neighbor
|
||||||
* @n: APC neighbor
|
* @n: APC neighbor
|
||||||
@@ -81,7 +80,8 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state)
|
|||||||
return;
|
return;
|
||||||
|
|
||||||
printf("Neighbor %x on %s changed state from %s to %s\n",
|
printf("Neighbor %x on %s changed state from %s to %s\n",
|
||||||
n->rid, ifa->ifname, apc_ns_names[old_state], apc_ns_names[state] );
|
n->rid, ifa->ifname, apc_ns_names[old_state],
|
||||||
|
apc_ns_names[state]);
|
||||||
|
|
||||||
n->state = state;
|
n->state = state;
|
||||||
|
|
||||||
@@ -121,7 +121,6 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state)
|
|||||||
apc_iface_sm(ifa, ISM_NEICH);
|
apc_iface_sm(ifa, ISM_NEICH);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* apc_neigh_sm - apc neighbor state machine
|
* apc_neigh_sm - apc neighbor state machine
|
||||||
* @n: neighor
|
* @n: neighor
|
||||||
@@ -218,7 +217,6 @@ void apc_neigh_sm(struct apc_neighbor * n, int event)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static int can_do_adj(struct apc_neighbor * n)
|
static int can_do_adj(struct apc_neighbor * n)
|
||||||
{
|
{
|
||||||
struct apc_iface * ifa = n->ifa;
|
struct apc_iface * ifa = n->ifa;
|
||||||
@@ -257,13 +255,11 @@ static int can_do_adj(struct apc_neighbor * n)
|
|||||||
return i;
|
return i;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static inline u32 neigh_get_id(struct apc_proto *p, struct apc_neighbor *n)
|
static inline u32 neigh_get_id(struct apc_proto *p, struct apc_neighbor *n)
|
||||||
{
|
{
|
||||||
return ipa_to_u32(n->ip);
|
return ipa_to_u32(n->ip);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
||||||
{
|
{
|
||||||
struct apc_neighbor *neigh, *n1, *n2;
|
struct apc_neighbor *neigh, *n1, *n2;
|
||||||
@@ -317,7 +313,6 @@ static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
|||||||
return( n1 );
|
return( n1 );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl )
|
static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl )
|
||||||
{
|
{
|
||||||
struct apc_neighbor *neigh, *n;
|
struct apc_neighbor *neigh, *n;
|
||||||
@@ -351,7 +346,6 @@ static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl )
|
|||||||
return( n );
|
return( n );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* apc_dr_election - (Backup) Designed Router election
|
* apc_dr_election - (Backup) Designed Router election
|
||||||
* @ifa: actual interface
|
* @ifa: actual interface
|
||||||
@@ -450,7 +444,6 @@ void apc_dr_election(struct apc_iface * ifa)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip)
|
struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip)
|
||||||
{
|
{
|
||||||
struct apc_neighbor * n;
|
struct apc_neighbor * n;
|
||||||
@@ -463,7 +456,6 @@ struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip)
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static void inactivity_timer_hook(struct _timer * tmr)
|
static void inactivity_timer_hook(struct _timer * tmr)
|
||||||
{
|
{
|
||||||
struct apc_neighbor * n = (struct apc_neighbor *) tmr->data;
|
struct apc_neighbor * n = (struct apc_neighbor *) tmr->data;
|
||||||
|
|||||||
173
feeds/wlan-ap/apc/src/src/ubus.c
Normal file
173
feeds/wlan-ap/apc/src/src/ubus.c
Normal file
@@ -0,0 +1,173 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
#define _GNU_SOURCE
|
||||||
|
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <ev.h>
|
||||||
|
#include "ubus.h"
|
||||||
|
#include <libubus.h>
|
||||||
|
#include <libubox/blobmsg.h>
|
||||||
|
#include <apc.h>
|
||||||
|
#include <libubox/uloop.h>
|
||||||
|
|
||||||
|
struct ubus_context *ubus_ctx = NULL;
|
||||||
|
static struct blob_buf b;
|
||||||
|
static struct blob_buf nb;
|
||||||
|
static const char *ubus_path;
|
||||||
|
timer *notify_timer;
|
||||||
|
extern struct apc_iface * apc_ifa;
|
||||||
|
#define APC_NOTIFY_INTERVAL 30
|
||||||
|
|
||||||
|
struct apc_state {
|
||||||
|
char mode[4];
|
||||||
|
char dr_addr[17];
|
||||||
|
char bdr_addr[17];
|
||||||
|
bool enabled;
|
||||||
|
} state;
|
||||||
|
|
||||||
|
static int
|
||||||
|
apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj,
|
||||||
|
struct ubus_request_data *req, const char *method,
|
||||||
|
struct blob_attr *msg);
|
||||||
|
|
||||||
|
static void ubus_reconnect_timer(struct uloop_timeout *timeout);
|
||||||
|
static struct uloop_timeout reconnect = {
|
||||||
|
.cb = ubus_reconnect_timer,
|
||||||
|
};
|
||||||
|
|
||||||
|
static void ubus_reconnect_timer(struct uloop_timeout *timeout)
|
||||||
|
{
|
||||||
|
if (ubus_reconnect(ubus_ctx, NULL) != 0) {
|
||||||
|
printf("APC ubus failed to reconnect\n");
|
||||||
|
uloop_timeout_set(&reconnect, 2000);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
printf("APC ubus reconnected\n");
|
||||||
|
#ifdef FD_CLOEXEC
|
||||||
|
fcntl(ubus_ctx->sock.fd, F_SETFD,
|
||||||
|
fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
static void ubus_connection_lost(struct ubus_context *ctx)
|
||||||
|
{
|
||||||
|
printf("APC ubus connection lost\n");
|
||||||
|
ubus_reconnect_timer(NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
static const struct blobmsg_policy apc_policy = {
|
||||||
|
.name = "info",
|
||||||
|
.type = BLOBMSG_TYPE_STRING,
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct ubus_method apc_object_methods[] = {
|
||||||
|
UBUS_METHOD_NOARG("info", apc_info_handle),
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct ubus_object_type apc_object_type =
|
||||||
|
UBUS_OBJECT_TYPE("apc", apc_object_methods);
|
||||||
|
|
||||||
|
static struct ubus_object apc_object = {
|
||||||
|
.name = "apc",
|
||||||
|
.type = &apc_object_type,
|
||||||
|
.methods = apc_object_methods,
|
||||||
|
.n_methods = ARRAY_SIZE(apc_object_methods),
|
||||||
|
};
|
||||||
|
|
||||||
|
static int
|
||||||
|
apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj,
|
||||||
|
struct ubus_request_data *req, const char *method,
|
||||||
|
struct blob_attr *msg)
|
||||||
|
{
|
||||||
|
blob_buf_init(&b, 0);
|
||||||
|
blobmsg_add_string(&b, "mode", state.mode);
|
||||||
|
blobmsg_add_string(&b, "dr_addr", state.dr_addr);
|
||||||
|
blobmsg_add_string(&b, "bdr_addr", state.bdr_addr);
|
||||||
|
blobmsg_add_u8(&b, "enabled", state.enabled);
|
||||||
|
|
||||||
|
ubus_notify(ctx, &apc_object, "apc", b.head, -1);
|
||||||
|
ubus_send_event(ctx, "apc", b.head);
|
||||||
|
ubus_send_reply(ctx, req, b.head);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static char apc_mode[APC_MAX_MODE][8] = {"DOWN", "LOOP", "WAITING", "PTP", "OR", "BDR", "DR"};
|
||||||
|
void apc_update_state()
|
||||||
|
{
|
||||||
|
struct in_addr dr_addr;
|
||||||
|
struct in_addr bdr_addr;
|
||||||
|
dr_addr.s_addr = htonl(apc_ifa->drip);
|
||||||
|
bdr_addr.s_addr = htonl(apc_ifa->bdrip);
|
||||||
|
|
||||||
|
state.enabled = true;
|
||||||
|
if ((apc_ifa->state == APC_IS_DR) ||
|
||||||
|
(apc_ifa->state == APC_IS_BACKUP) ||
|
||||||
|
(apc_ifa->state == APC_IS_DROTHER)) {
|
||||||
|
snprintf(state.mode, sizeof(state.mode), "%s",
|
||||||
|
&apc_mode[apc_ifa->state][0]);
|
||||||
|
snprintf(state.dr_addr, sizeof(state.dr_addr),
|
||||||
|
"%s", inet_ntoa(dr_addr));
|
||||||
|
snprintf(state.bdr_addr, sizeof(state.bdr_addr),
|
||||||
|
"%s", inet_ntoa(bdr_addr));
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
snprintf(state.mode, sizeof(state.mode), "NC");
|
||||||
|
snprintf(state.dr_addr, sizeof(state.dr_addr), "0.0.0.0");
|
||||||
|
snprintf(state.bdr_addr, sizeof(state.bdr_addr), "0.0.0.0");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void apc_send_notification(struct _timer * tmr)
|
||||||
|
{
|
||||||
|
apc_update_state();
|
||||||
|
|
||||||
|
printf("APC send ubus notification\n");
|
||||||
|
blob_buf_init(&nb, 0);
|
||||||
|
blobmsg_add_string(&nb, "mode", state.mode);
|
||||||
|
blobmsg_add_string(&nb, "dr_addr", state.dr_addr);
|
||||||
|
blobmsg_add_string(&nb, "bdr_addr", state.bdr_addr);
|
||||||
|
blobmsg_add_u8(&nb, "enabled", state.enabled);
|
||||||
|
ubus_notify(ubus_ctx, &apc_object, "apc", nb.head, -1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void add_object(struct ubus_object *obj)
|
||||||
|
{
|
||||||
|
int ret = ubus_add_object(ubus_ctx, obj);
|
||||||
|
|
||||||
|
if (ret != 0)
|
||||||
|
fprintf(stderr, "Add object fail '%s': %s\n",
|
||||||
|
obj->name, ubus_strerror(ret));
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
ubus_init(void) {
|
||||||
|
ubus_ctx = ubus_connect(NULL);
|
||||||
|
if (!ubus_ctx)
|
||||||
|
return -EIO;
|
||||||
|
|
||||||
|
ubus_add_uloop(ubus_ctx);
|
||||||
|
#ifdef FD_CLOEXEC
|
||||||
|
fcntl(ubus_ctx->sock.fd, F_SETFD,
|
||||||
|
fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC);
|
||||||
|
#endif
|
||||||
|
add_object(&apc_object);
|
||||||
|
notify_timer = tm_new_set(apc_send_notification, NULL,
|
||||||
|
0, APC_NOTIFY_INTERVAL);
|
||||||
|
if (notify_timer) {
|
||||||
|
printf("APC Start notify timer\n");
|
||||||
|
tm_start(notify_timer, APC_NOTIFY_INTERVAL);
|
||||||
|
}
|
||||||
|
|
||||||
|
ubus_ctx->connection_lost = ubus_connection_lost;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
void
|
||||||
|
ubus_done(void)
|
||||||
|
{
|
||||||
|
ubus_free(ubus_ctx);
|
||||||
|
}
|
||||||
@@ -11,6 +11,7 @@ include $(INCLUDE_DIR)/package.mk
|
|||||||
|
|
||||||
define Package/libinterapcomm
|
define Package/libinterapcomm
|
||||||
SECTION:=libs
|
SECTION:=libs
|
||||||
|
DEPENDS:=+libev +libubox +libubus
|
||||||
CATEGORY:=Libraries
|
CATEGORY:=Libraries
|
||||||
TITLE:=Inter AP communication library
|
TITLE:=Inter AP communication library
|
||||||
endef
|
endef
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ subdirs=src/test
|
|||||||
|
|
||||||
CFLAGS += -O -Wall -Werror -Wshadow
|
CFLAGS += -O -Wall -Werror -Wshadow
|
||||||
CFLAGS += -I./include/
|
CFLAGS += -I./include/
|
||||||
LIBS = -lev
|
LIBS = -lev -lubox -lubus
|
||||||
|
|
||||||
all: $(LIBNAME) $(subdirs)
|
all: $(LIBNAME) $(subdirs)
|
||||||
|
|
||||||
|
|||||||
@@ -7,12 +7,29 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <interAPcomm.h>
|
#include <interAPcomm.h>
|
||||||
|
#include <libubox/uloop.h>
|
||||||
|
|
||||||
/*Receiver socket*/
|
/*Receiver socket*/
|
||||||
int recv_sock = -1;
|
int recv_sock = -1;
|
||||||
|
|
||||||
recv_arg ra;
|
recv_arg ra;
|
||||||
|
|
||||||
|
static void receive_data_uloop(struct uloop_fd *fd, unsigned int events)
|
||||||
|
{
|
||||||
|
void *recv_data;
|
||||||
|
ssize_t recv_data_len;
|
||||||
|
|
||||||
|
recv_data = malloc(ra.len);
|
||||||
|
memset(recv_data, 0, ra.len);
|
||||||
|
if ((recv_data_len = recvfrom(recv_sock, recv_data, ra.len,
|
||||||
|
0, NULL, 0)) < 0)
|
||||||
|
printf("recvfrom() failed");
|
||||||
|
|
||||||
|
ra.cb(recv_data, recv_data_len);
|
||||||
|
free(recv_data);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
static void receive_data(struct ev_loop *ev, ev_io *io, int event)
|
static void receive_data(struct ev_loop *ev, ev_io *io, int event)
|
||||||
{
|
{
|
||||||
void *recv_data;
|
void *recv_data;
|
||||||
@@ -25,11 +42,14 @@ static void receive_data(struct ev_loop *ev, ev_io *io, int event)
|
|||||||
printf("recvfrom() failed");
|
printf("recvfrom() failed");
|
||||||
|
|
||||||
ra.cb(recv_data, recv_data_len);
|
ra.cb(recv_data, recv_data_len);
|
||||||
|
free(recv_data);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned int len,
|
static struct uloop_fd server;
|
||||||
struct ev_loop *loop, ev_io *io)
|
|
||||||
|
int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t),
|
||||||
|
unsigned int len, struct ev_loop *loop, ev_io *io)
|
||||||
{
|
{
|
||||||
struct sockaddr_in addr;
|
struct sockaddr_in addr;
|
||||||
int bcast_perm;
|
int bcast_perm;
|
||||||
@@ -65,8 +85,16 @@ int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned
|
|||||||
}
|
}
|
||||||
|
|
||||||
printf("Interap recving: p:%d\n", port);
|
printf("Interap recving: p:%d\n", port);
|
||||||
|
|
||||||
|
if (io && loop) {
|
||||||
ev_io_init(io, receive_data, recv_sock, EV_READ);
|
ev_io_init(io, receive_data, recv_sock, EV_READ);
|
||||||
ev_io_start(loop, io);
|
ev_io_start(loop, io);
|
||||||
|
} else {
|
||||||
|
|
||||||
|
server.cb = receive_data_uloop;
|
||||||
|
server.fd = recv_sock;
|
||||||
|
uloop_fd_add(&server, ULOOP_READ);
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ OBJS = interapcommtest.o
|
|||||||
|
|
||||||
CFLAGS += -Wall $(EXTRA_CFLAGS) $(extra_cflags-y)
|
CFLAGS += -Wall $(EXTRA_CFLAGS) $(extra_cflags-y)
|
||||||
|
|
||||||
LIBS = -L ../../ -linterapcomm -lev
|
LIBS = -L ../../ -linterapcomm -lev -lubox -lubus
|
||||||
|
|
||||||
CFLAGS += -I. \
|
CFLAGS += -I. \
|
||||||
-I../../include/
|
-I../../include/
|
||||||
|
|||||||
@@ -6,6 +6,8 @@
|
|||||||
#include <ev.h>
|
#include <ev.h>
|
||||||
#include <interAPcomm.h>
|
#include <interAPcomm.h>
|
||||||
|
|
||||||
|
#include <libubus.h>
|
||||||
|
|
||||||
struct my_data {
|
struct my_data {
|
||||||
int x;
|
int x;
|
||||||
char y;
|
char y;
|
||||||
@@ -13,7 +15,8 @@ struct my_data {
|
|||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
int recv_process(void *data) {
|
int recv_process(void *data, ssize_t n)
|
||||||
|
{
|
||||||
struct my_data *dat = (struct my_data*) data;
|
struct my_data *dat = (struct my_data*) data;
|
||||||
|
|
||||||
printf("Recv process: %d, %c, %d\n", dat->x, dat->y, dat->z);
|
printf("Recv process: %d, %c, %d\n", dat->x, dat->y, dat->z);
|
||||||
@@ -22,34 +25,37 @@ int recv_process(void *data) {
|
|||||||
|
|
||||||
int main (int argc, char *argv[ ])
|
int main (int argc, char *argv[ ])
|
||||||
{
|
{
|
||||||
unsigned int send = atoi(argv[1]); /* First arg: broadcast port */
|
unsigned int send = atoi(argv[1]);
|
||||||
unsigned short port = 50000;
|
unsigned short port = 50020;
|
||||||
// char *dst_ip = "255.255.255.255";
|
// char *dst_ip = "255.255.255.255";
|
||||||
char *dst_ip = "192.168.9.255";
|
char *dst_ip = "10.42.0.255";
|
||||||
// char *data = "InterAP Hello";
|
// char *data = "InterAP Hello";
|
||||||
struct my_data data;
|
struct my_data data;
|
||||||
data.x = 1001;
|
data.x = 1001;
|
||||||
data.y = 'H';
|
data.y = 'H';
|
||||||
data.z = 3003;
|
data.z = 3003;
|
||||||
|
|
||||||
// callback cb = recv_process;
|
printf("send = %d\n", send);
|
||||||
|
|
||||||
|
|
||||||
printf("arg1 = %d\n", send);
|
|
||||||
|
|
||||||
if (send) {
|
if (send) {
|
||||||
printf("Send");
|
printf("Send");
|
||||||
interap_send(port, dst_ip, &data, sizeof(data));
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
printf("Recieve");
|
|
||||||
// interap_recv(port, cb, sizeof(struct my_data));
|
|
||||||
}
|
|
||||||
|
|
||||||
while (1)
|
while (1)
|
||||||
{
|
{
|
||||||
sleep(3);
|
sleep(3);
|
||||||
printf("In while loop\n");
|
printf("Sending...\n");
|
||||||
|
interap_send(port, dst_ip, &data, sizeof(data));
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
printf("Recieve");
|
||||||
|
uloop_init();
|
||||||
|
callback cb = recv_process;
|
||||||
|
|
||||||
|
interap_recv(port, cb, sizeof(struct my_data), NULL, NULL);
|
||||||
|
uloop_run();
|
||||||
|
uloop_done();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,12 +1,45 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
|
|
||||||
if [ $# -ne 1 ] ; then
|
AP_PRIVATE_KEY_FILE="/usr/opensync/certs/client_dec.key"
|
||||||
echo "Usage: $0 <redirector address>" >&2
|
AP_CERTIFICATE_FILE="/usr/opensync/certs/client.pem"
|
||||||
|
AP_DEVICE_ID_FILE="/usr/opensync/certs/client_deviceid.txt"
|
||||||
|
DIGICERT_API_URI="clientauth.one.digicert.com"
|
||||||
|
|
||||||
|
if [ "$1" = "-h" ]; then
|
||||||
|
echo "Usage: $0 [redirector address]" >&2
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
redirector_addr=$1
|
# Query DigiCert's API if redirector wasn't specified
|
||||||
|
if [ -z "$1" ]; then
|
||||||
|
if [ ! -f "$AP_DEVICE_ID_FILE" ]; then
|
||||||
|
echo "Device ID file $AP_DEVICE_ID_FILE does not exist. Make sure to create it or specify the redirector address manually."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# TODO: this command should be retried if it fails
|
||||||
|
digicert_device_id=`cat ${AP_DEVICE_ID_FILE}`
|
||||||
|
device_data=`curl -s \
|
||||||
|
--key "${AP_PRIVATE_KEY_FILE}" \
|
||||||
|
--cert "${AP_CERTIFICATE_FILE}" \
|
||||||
|
"https://${DIGICERT_API_URI}/iot/api/v2/device/${digicert_device_id}"`
|
||||||
|
|
||||||
|
controller_url=`echo ${device_data} | jsonfilter -e '@.fields[@.name="Redirector"].value'`
|
||||||
|
if [ -z "$controller_url" ]; then
|
||||||
|
echo "No redirector found for this device"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
controller_port=`echo ${controller_url} | cut -d ":" -f2)`
|
||||||
|
if [ -z "$controller_port" ]; then
|
||||||
|
redirector_addr="ssl:${controller_url}:6643"
|
||||||
|
else
|
||||||
|
redirector_addr="ssl:${controller_url}"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
redirector_addr=$1
|
||||||
|
fi
|
||||||
|
|
||||||
uci set system.tip.redirector="${redirector_addr}"
|
uci set system.tip.redirector="${redirector_addr}"
|
||||||
|
uci set system.tip.deployed=0
|
||||||
uci commit system
|
uci commit system
|
||||||
/etc/init.d/opensync restart
|
/etc/init.d/opensync restart
|
||||||
|
|||||||
@@ -10,11 +10,11 @@ hwmode=$(uci get wireless.${radio}.hwmode)
|
|||||||
|
|
||||||
[ "${hwmode}" = "11a" ] && band=5 || band=2
|
[ "${hwmode}" = "11a" ] && band=5 || band=2
|
||||||
|
|
||||||
bcn_rate=$(uci get wireless.${DEVICENAME}.bcn_rate)
|
bcn_rate=$(($(uci get wireless.${DEVICENAME}.bcn_rate)/10))
|
||||||
mcast_rate=$(uci get wireless.${DEVICENAME}.mcast_rate)
|
mcast_rate=$(uci get wireless.${DEVICENAME}.mcast_rate)
|
||||||
|
|
||||||
# ath10k rate-codes: 0x43 1M, 0x42 2M, 0x41 5.5M, 0x40 11M, 0x3 6M, 0x7 9M, 0x2 12M, 0x6 18M, 0x1 24M, 0x5 36M, 0x0 48M, 0x4 54M, 0xFF default
|
# ath10k rate-codes: 0x43 1M, 0x42 2M, 0x41 5.5M, 0x40 11M, 0x3 6M, 0x7 9M, 0x2 12M, 0x6 18M, 0x1 24M, 0x5 36M, 0x0 48M, 0x4 54M, 0xFF default
|
||||||
rate_codes="1:0x43 2:0x42 5.5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4"
|
rate_codes="1:0x43 2:0x42 5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4"
|
||||||
|
|
||||||
# Default codes
|
# Default codes
|
||||||
beacon_code=0xFF
|
beacon_code=0xFF
|
||||||
@@ -33,6 +33,6 @@ done
|
|||||||
|
|
||||||
# set rates
|
# set rates
|
||||||
logger -t hotplug "Set Tx rates for device ${DEVICENAME}"
|
logger -t hotplug "Set Tx rates for device ${DEVICENAME}"
|
||||||
sleep 5
|
sleep 20
|
||||||
echo "${DEVICENAME} beacon ${band} ${beacon_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
echo "${DEVICENAME} beacon ${band} ${beacon_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
||||||
echo "${DEVICENAME} mcast ${band} ${mcast_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
echo "${DEVICENAME} mcast ${band} ${mcast_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
||||||
@@ -0,0 +1,142 @@
|
|||||||
|
Index: opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema
|
||||||
|
+++ opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||||
|
@@ -9368,6 +9368,68 @@
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"isRoot": true
|
||||||
|
+ },
|
||||||
|
+ "APC_Config": {
|
||||||
|
+ "columns": {
|
||||||
|
+ "enabled": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "boolean"
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "isRoot": true,
|
||||||
|
+ "maxRows": 1
|
||||||
|
+ },
|
||||||
|
+ "APC_State": {
|
||||||
|
+ "columns": {
|
||||||
|
+ "dr_addr": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "bdr_addr": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "enabled": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "boolean"
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "mode": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "enum": [
|
||||||
|
+ "set",
|
||||||
|
+ [
|
||||||
|
+ "DR",
|
||||||
|
+ "BDR",
|
||||||
|
+ "OR",
|
||||||
|
+ "NC"
|
||||||
|
+ ]
|
||||||
|
+ ]
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "isRoot": true,
|
||||||
|
+ "maxRows": 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Index: opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||||
|
+++ opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||||
|
@@ -10,6 +10,7 @@
|
||||||
|
extern struct ev_loop *wifihal_evloop;
|
||||||
|
static struct ubus_context *ubus;
|
||||||
|
extern struct ev_loop *wifihal_evloop;
|
||||||
|
+extern void apc_state_set(struct blob_attr *msg);
|
||||||
|
|
||||||
|
int hapd_rrm_enable(char *name, int neighbor, int beacon)
|
||||||
|
{
|
||||||
|
@@ -179,6 +180,7 @@ radio_ubus_add_vif_cb(struct ubus_contex
|
||||||
|
return UBUS_STATUS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
+
|
||||||
|
static const struct ubus_method radio_ubus_methods[] = {
|
||||||
|
UBUS_METHOD("dbg_add_vif", radio_ubus_add_vif_cb, add_vif_policy),
|
||||||
|
UBUS_METHOD("dummy", radio_ubus_dummy_cb, dummy_policy),
|
||||||
|
@@ -201,8 +203,36 @@ static void radio_ubus_connect(struct ub
|
||||||
|
ubus_add_object(ubus, &radio_ubus_object);
|
||||||
|
}
|
||||||
|
|
||||||
|
+static int radio_ubus_notify(struct ubus_context *ctx, struct ubus_object *obj,
|
||||||
|
+ struct ubus_request_data *req, const char *method,
|
||||||
|
+ struct blob_attr *msg)
|
||||||
|
+{
|
||||||
|
+ char *str;
|
||||||
|
+
|
||||||
|
+ str = blobmsg_format_json(msg, true);
|
||||||
|
+ LOGD("ubus: Received ubus notify '%s': %s\n", method, str);
|
||||||
|
+ free(str);
|
||||||
|
+
|
||||||
|
+ if (!strncmp(method, "apc", 3)) {
|
||||||
|
+ LOGD("APC notification Received");
|
||||||
|
+ apc_state_set(msg);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+
|
||||||
|
static struct ubus_instance ubus_instance = {
|
||||||
|
.connect = radio_ubus_connect,
|
||||||
|
+ .notify = radio_ubus_notify,
|
||||||
|
+ .list = {
|
||||||
|
+ {
|
||||||
|
+ .path = "apc",
|
||||||
|
+ },
|
||||||
|
+ },
|
||||||
|
+ .len = 1,
|
||||||
|
+
|
||||||
|
};
|
||||||
|
|
||||||
|
int radio_ubus_init(void)
|
||||||
|
Index: opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/lib/schema/inc/schema_consts.h
|
||||||
|
+++ opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h
|
||||||
|
@@ -154,6 +154,7 @@ typedef enum {
|
||||||
|
#define SCHEMA_CONSTS_DISABLE_B_RATES "disable_b_rates"
|
||||||
|
#define SCHEMA_CONSTS_IEEE80211k "ieee80211k"
|
||||||
|
#define SCHEMA_CONSTS_DYNAMIC_VLAN "dynamic_vlan"
|
||||||
|
+#define SCHEMA_CONSTS_RADPROXY "radproxy"
|
||||||
|
|
||||||
|
/* radio Custom options */
|
||||||
|
#define SCHEMA_CONSTS_LOCAL_PWR_CONSTRAINT "local_pwr_constraint"
|
||||||
@@ -0,0 +1,270 @@
|
|||||||
|
Index: opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema
|
||||||
|
+++ opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||||
|
@@ -199,6 +199,59 @@
|
||||||
|
"type": "integer"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
+ },
|
||||||
|
+ "qr_code": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": "string",
|
||||||
|
+ "value": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "maxLength": 128
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": "unlimited"
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "model_description": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "manufacturer_name": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "manufacturer_date": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "manufacturer_url": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "reference_design": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "certification_region": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"isRoot": true,
|
||||||
|
Index: opensync-2.0.5.0/src/lib/target/inc/target.h
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/lib/target/inc/target.h
|
||||||
|
+++ opensync-2.0.5.0/src/lib/target/inc/target.h
|
||||||
|
@@ -332,6 +332,115 @@ bool target_hw_revision_get(void *buff,
|
||||||
|
*/
|
||||||
|
bool target_platform_version_get(void *buff, size_t buffsz);
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device model revision
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * model revision. The model revision is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_model_revision_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device model description
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * model description. The model description is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_model_description_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device manufacturer name
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * manufacturer name. The manufacturer name is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_manuf_name_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device manufacturer date
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * manufacturer date. The manufacturer date is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_manuf_date_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device manufacturer url
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * manufacturer url. The manufacturer url is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_manuf_url_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device manufacturer name abbreviation
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * manufacturer name abbreviation. This is one of the pieces that form
|
||||||
|
+ * the QR code entry which is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_manuf_abbr_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device reference design
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * reference design. The reference design is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_ref_design_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device certification region
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * certification region. The certification region is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_cert_region_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ * @brief Return device mac address
|
||||||
|
+ *
|
||||||
|
+ * This function provides a null terminated byte string containing the
|
||||||
|
+ * mac address. The mac address is a part of AWLAN_Node table.
|
||||||
|
+ *
|
||||||
|
+ * @param buff pointer to a string buffer
|
||||||
|
+ * @param buffsz size of string buffer
|
||||||
|
+ * @return true on success
|
||||||
|
+ */
|
||||||
|
+bool target_mac_addr_get(void *buff, size_t buffsz);
|
||||||
|
+
|
||||||
|
/// @} LIB_TARGET_ENTITY
|
||||||
|
|
||||||
|
/// @defgroup LIB_TARGET_MAP Interface Mapping API
|
||||||
|
Index: opensync-2.0.5.0/src/dm/src/dm_ovsdb.c
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/dm/src/dm_ovsdb.c
|
||||||
|
+++ opensync-2.0.5.0/src/dm/src/dm_ovsdb.c
|
||||||
|
@@ -326,7 +326,7 @@ void fill_entity_data(struct schema_AWLA
|
||||||
|
s_awlan_node->sku_number_exists = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
- if (true == target_hw_revision_get(buff, sizeof(buff)))
|
||||||
|
+ if (true == target_model_revision_get(buff, sizeof(buff)))
|
||||||
|
{
|
||||||
|
STRSCPY(s_awlan_node->revision, buff);
|
||||||
|
}
|
||||||
|
@@ -359,6 +359,58 @@ void fill_entity_data(struct schema_AWLA
|
||||||
|
}
|
||||||
|
s_awlan_node->model_exists = true;
|
||||||
|
|
||||||
|
+ if (true == target_model_description_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->model_description, buff);
|
||||||
|
+ s_awlan_node->model_description_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_manuf_name_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->manufacturer_name, buff);
|
||||||
|
+ s_awlan_node->manufacturer_name_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_manuf_date_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->manufacturer_date, buff);
|
||||||
|
+ s_awlan_node->manufacturer_date_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_manuf_url_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->manufacturer_url, buff);
|
||||||
|
+ s_awlan_node->manufacturer_url_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_ref_design_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->reference_design, buff);
|
||||||
|
+ s_awlan_node->reference_design_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_cert_region_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->certification_region, buff);
|
||||||
|
+ s_awlan_node->certification_region_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (true == target_mac_addr_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ STRSCPY(s_awlan_node->id, buff);
|
||||||
|
+ s_awlan_node->id_exists = true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DT", "AP");
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DM", s_awlan_node->id);
|
||||||
|
+ if (true == target_manuf_abbr_get(buff, sizeof(buff)))
|
||||||
|
+ {
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "VN", buff);
|
||||||
|
+ }
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "SN", s_awlan_node->serial_number);
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "MN", s_awlan_node->model);
|
||||||
|
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "HW", s_awlan_node->revision);
|
||||||
|
+
|
||||||
|
LOG(NOTICE, "Device entity {serial=%s id=%s version=%s platform=%s sku=%s}",
|
||||||
|
s_awlan_node->serial_number,
|
||||||
|
s_awlan_node->id,
|
||||||
|
@@ -422,6 +474,13 @@ bool act_update_entity (void)
|
||||||
|
"sku_number",
|
||||||
|
"upgrade_status",
|
||||||
|
"upgrade_timer",
|
||||||
|
+ "qr_code",
|
||||||
|
+ "model_description",
|
||||||
|
+ "manufacturer_name",
|
||||||
|
+ "manufacturer_date",
|
||||||
|
+ "manufacturer_url",
|
||||||
|
+ "reference_design",
|
||||||
|
+ "certification_region",
|
||||||
|
NULL)
|
||||||
|
);
|
||||||
|
|
||||||
113
feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
Normal file
113
feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
--- a/interfaces/opensync.ovsschema
|
||||||
|
+++ b/interfaces/opensync.ovsschema
|
||||||
|
@@ -9439,6 +9439,110 @@
|
||||||
|
},
|
||||||
|
"isRoot": true,
|
||||||
|
"maxRows": 1
|
||||||
|
+ },
|
||||||
|
+ "Radius_Proxy_Config": {
|
||||||
|
+ "columns": {
|
||||||
|
+ "radius_config_name": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "radsec": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "boolean"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "server": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "port": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "integer"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "secret": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "ca_cert": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "minLength": 1,
|
||||||
|
+ "maxLength": 256
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "client_cert": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "minLength": 1,
|
||||||
|
+ "maxLength": 256
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "client_key": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "minLength": 1,
|
||||||
|
+ "maxLength": 256
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "passphrase": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "minLength": 0,
|
||||||
|
+ "maxLength": 128
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "realm": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "string",
|
||||||
|
+ "maxLength": 256
|
||||||
|
+ },
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": 16
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
|
+ "isRoot": true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
34
feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
Normal file
34
feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
Index: opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/lib/datapipeline/src/dppline.c
|
||||||
|
+++ opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c
|
||||||
|
@@ -652,8 +652,8 @@ static bool dppline_copysts(dppline_stat
|
||||||
|
dst->u.events.client_event_qty++;
|
||||||
|
}
|
||||||
|
|
||||||
|
- size = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t);
|
||||||
|
- dst->u.events.client_event_list = calloc(1, size);
|
||||||
|
+ int size_cl = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t);
|
||||||
|
+ dst->u.events.client_event_list = calloc(1, size_cl);
|
||||||
|
int count = 0;
|
||||||
|
ds_dlist_foreach(&report_data->client_event_list, result)
|
||||||
|
{
|
||||||
|
@@ -671,8 +671,8 @@ static bool dppline_copysts(dppline_stat
|
||||||
|
dst->u.events.channel_event_qty++;
|
||||||
|
}
|
||||||
|
|
||||||
|
- size = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t);
|
||||||
|
- dst->u.events.channel_event_list = calloc(1, size);
|
||||||
|
+ int size_ch = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t);
|
||||||
|
+ dst->u.events.channel_event_list = calloc(1, size_ch);
|
||||||
|
ds_dlist_foreach(&report_data->channel_switch_list, channel_result)
|
||||||
|
{
|
||||||
|
assert(count < (int)dst->u.events.channel_event_qty);
|
||||||
|
@@ -680,6 +680,7 @@ static bool dppline_copysts(dppline_stat
|
||||||
|
sizeof(dpp_event_record_channel_switch_t));
|
||||||
|
count++;
|
||||||
|
}
|
||||||
|
+ size = size_cl + size_ch;
|
||||||
|
|
||||||
|
} break;
|
||||||
|
|
||||||
@@ -37,6 +37,14 @@ start_service() {
|
|||||||
echo "Setting certificates"
|
echo "Setting certificates"
|
||||||
mkdir -p ${CERTS_DEST_PATH}
|
mkdir -p ${CERTS_DEST_PATH}
|
||||||
cp ${CERTS_SRC_PATH}/* ${CERTS_DEST_PATH}/
|
cp ${CERTS_SRC_PATH}/* ${CERTS_DEST_PATH}/
|
||||||
|
echo "Checking Redirector"
|
||||||
|
redirector=$(uci get system.tip.redirector)
|
||||||
|
if [ -z "$redirector" ]; then
|
||||||
|
logger -t opensync "Contacting DigiCert for redirector address"
|
||||||
|
wlan_ap_redirector.sh
|
||||||
|
else
|
||||||
|
logger -t opensync "Redirector address is ${redirector}"
|
||||||
|
fi
|
||||||
echo "Starting OpenSync"
|
echo "Starting OpenSync"
|
||||||
procd_set_param command ${PROG}
|
procd_set_param command ${PROG}
|
||||||
procd_close_instance
|
procd_close_instance
|
||||||
|
|||||||
@@ -21,4 +21,6 @@ extern int hapd_rrm_set_neighbors(char *name, struct rrm_neighbor *neigh, int co
|
|||||||
|
|
||||||
extern void radio_maverick(void *arg);
|
extern void radio_maverick(void *arg);
|
||||||
|
|
||||||
|
int nl80211_channel_get(char *name, unsigned int *chan);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -0,0 +1,38 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#ifndef RADIUS_PROXY_H_INCLUDED
|
||||||
|
#define RADIUS_PROXY_H_INCLUDED
|
||||||
|
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <jansson.h>
|
||||||
|
#include <ev.h>
|
||||||
|
#include <sys/time.h>
|
||||||
|
#include <syslog.h>
|
||||||
|
|
||||||
|
#include "log.h"
|
||||||
|
#include "os_nif.h"
|
||||||
|
|
||||||
|
#include "target.h"
|
||||||
|
#include "dppline.h"
|
||||||
|
|
||||||
|
#include "os.h"
|
||||||
|
#include "util.h"
|
||||||
|
#include "ovsdb.h"
|
||||||
|
#include "ovsdb_update.h"
|
||||||
|
#include "ovsdb_sync.h"
|
||||||
|
#include "ovsdb_table.h"
|
||||||
|
#include "ovsdb_cache.h"
|
||||||
|
#include "schema.h"
|
||||||
|
#include "target.h"
|
||||||
|
|
||||||
|
#include "utils.h"
|
||||||
|
#include <libubox/list.h>
|
||||||
|
#include <evsched.h>
|
||||||
|
|
||||||
|
extern ovsdb_table_t table_Radius_Proxy_Config;
|
||||||
|
|
||||||
|
void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *mon,
|
||||||
|
struct schema_Radius_Proxy_Config *old, struct schema_Radius_Proxy_Config *conf);
|
||||||
|
|
||||||
|
#endif /* RADIUS_PROXY_H_INCLUDED */
|
||||||
|
|
||||||
@@ -13,6 +13,7 @@ struct mode_map {
|
|||||||
char *ucihwmode;
|
char *ucihwmode;
|
||||||
char *htmode;
|
char *htmode;
|
||||||
char *ucihtmode;
|
char *ucihtmode;
|
||||||
|
int sec_channel_offset;
|
||||||
};
|
};
|
||||||
|
|
||||||
extern struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode);
|
extern struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode);
|
||||||
@@ -20,6 +21,7 @@ extern struct mode_map *mode_map_get_cloud(const char *htmode, const char *hwmod
|
|||||||
|
|
||||||
extern int vif_get_mac(char *vap, char *mac);
|
extern int vif_get_mac(char *vap, char *mac);
|
||||||
extern int vif_is_ready(const char *name);
|
extern int vif_is_ready(const char *name);
|
||||||
|
bool vif_get_key_for_key_distr(const char *secret, char *key_str);
|
||||||
|
|
||||||
#define blobmsg_add_bool blobmsg_add_u8
|
#define blobmsg_add_bool blobmsg_add_u8
|
||||||
extern int blobmsg_add_hex16(struct blob_buf *buf, const char *name, uint16_t val);
|
extern int blobmsg_add_hex16(struct blob_buf *buf, const char *name, uint16_t val);
|
||||||
@@ -38,4 +40,5 @@ extern int iface_is_up(const char *ifname);
|
|||||||
extern int net_get_mtu(char *iface);
|
extern int net_get_mtu(char *iface);
|
||||||
extern int net_get_mac(char *iface, char *mac);
|
extern int net_get_mac(char *iface, char *mac);
|
||||||
extern int net_is_bridge(char *iface);
|
extern int net_is_bridge(char *iface);
|
||||||
|
extern char* get_max_channel_bw_channel(int channel_freq, const char* htmode);
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -46,6 +46,7 @@ UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/sysupgrade.c
|
|||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/dhcpdiscovery.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/dhcpdiscovery.c
|
||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c
|
||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c
|
||||||
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_proxy.c
|
||||||
|
|
||||||
CONFIG_USE_KCONFIG=y
|
CONFIG_USE_KCONFIG=y
|
||||||
CONFIG_INET_ETH_LINUX=y
|
CONFIG_INET_ETH_LINUX=y
|
||||||
|
|||||||
@@ -258,12 +258,8 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate)
|
|||||||
} else if (!strcmp(opt, "authentication")) {
|
} else if (!strcmp(opt, "authentication")) {
|
||||||
if(tc[NDS_ATTR_AUTHENTICATION]) {
|
if(tc[NDS_ATTR_AUTHENTICATION]) {
|
||||||
buf = blobmsg_get_string(tc[NDS_ATTR_AUTHENTICATION]);
|
buf = blobmsg_get_string(tc[NDS_ATTR_AUTHENTICATION]);
|
||||||
if (!strcmp(buf, "None")) {
|
if (!strcmp(buf, "None") || !strcmp(buf, "username") || !strcmp(buf, "radius")) {
|
||||||
|
|
||||||
set_captive_portal_state(vstate, &index,
|
|
||||||
captive_portal_options_table[i],
|
|
||||||
buf);
|
|
||||||
} else if (!strcmp(buf,"username")) {
|
|
||||||
set_captive_portal_state(vstate, &index,
|
set_captive_portal_state(vstate, &index,
|
||||||
captive_portal_options_table[i],
|
captive_portal_options_table[i],
|
||||||
buf);
|
buf);
|
||||||
@@ -596,7 +592,7 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, "enabled", "1");
|
blobmsg_add_string(&cap, "enabled", "1");
|
||||||
blobmsg_add_string(&cap, "gatewayinterface","br-lan");
|
blobmsg_add_string(&cap, "gatewayinterface","br-lan");
|
||||||
blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh");
|
blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh");
|
||||||
ipset_create(ifname);
|
ipset_create("opennds");
|
||||||
d = blobmsg_open_array(&cap, "preauthenticated_users");
|
d = blobmsg_open_array(&cap, "preauthenticated_users");
|
||||||
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
||||||
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
||||||
@@ -616,8 +612,12 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
else if (strcmp(opt, "radius_server_secret") == 0)
|
else if (strcmp(opt, "radius_server_secret") == 0)
|
||||||
blobmsg_add_string(&cap, "radius_server_secret", value);
|
blobmsg_add_string(&cap, "radius_server_secret", value);
|
||||||
|
|
||||||
else if (strcmp(opt, "radius_auth_type") == 0)
|
else if (strcmp(opt, "radius_auth_type") == 0) {
|
||||||
|
if(!strcmp(value, "MSCHAPv2"))
|
||||||
|
blobmsg_add_string(&cap, "radius_auth_type", "MSCHAPV2");
|
||||||
|
else
|
||||||
blobmsg_add_string(&cap, "radius_auth_type", value);
|
blobmsg_add_string(&cap, "radius_auth_type", value);
|
||||||
|
}
|
||||||
|
|
||||||
else if (strcmp(opt, "session_timeout") == 0)
|
else if (strcmp(opt, "session_timeout") == 0)
|
||||||
blobmsg_add_string(&cap, "sessiontimeout", value);
|
blobmsg_add_string(&cap, "sessiontimeout", value);
|
||||||
|
|||||||
@@ -26,11 +26,16 @@
|
|||||||
#include "captive.h"
|
#include "captive.h"
|
||||||
#include "rrm_config.h"
|
#include "rrm_config.h"
|
||||||
#include "vlan.h"
|
#include "vlan.h"
|
||||||
|
#include "radius_proxy.h"
|
||||||
|
|
||||||
ovsdb_table_t table_Hotspot20_Config;
|
ovsdb_table_t table_Hotspot20_Config;
|
||||||
ovsdb_table_t table_Hotspot20_OSU_Providers;
|
ovsdb_table_t table_Hotspot20_OSU_Providers;
|
||||||
ovsdb_table_t table_Hotspot20_Icon_Config;
|
ovsdb_table_t table_Hotspot20_Icon_Config;
|
||||||
|
|
||||||
|
ovsdb_table_t table_APC_Config;
|
||||||
|
ovsdb_table_t table_APC_State;
|
||||||
|
unsigned int radproxy_apc;
|
||||||
|
|
||||||
static struct uci_package *wireless;
|
static struct uci_package *wireless;
|
||||||
struct uci_context *uci;
|
struct uci_context *uci;
|
||||||
struct blob_buf b = { };
|
struct blob_buf b = { };
|
||||||
@@ -186,7 +191,7 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C
|
|||||||
struct schema_Wifi_Radio_State rstate;
|
struct schema_Wifi_Radio_State rstate;
|
||||||
char phy[6];
|
char phy[6];
|
||||||
int antenna;
|
int antenna;
|
||||||
int32_t chan;
|
uint32_t chan = 0;
|
||||||
|
|
||||||
LOGT("%s: get state", s->e.name);
|
LOGT("%s: get state", s->e.name);
|
||||||
|
|
||||||
@@ -211,7 +216,7 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (tb[WDEV_ATTR_CHANNEL]) {
|
if (tb[WDEV_ATTR_CHANNEL]) {
|
||||||
chan = get_current_channel(phy);
|
nl80211_channel_get(phy, &chan);
|
||||||
if(chan)
|
if(chan)
|
||||||
SCHEMA_SET_INT(rstate.channel, chan);
|
SCHEMA_SET_INT(rstate.channel, chan);
|
||||||
else
|
else
|
||||||
@@ -401,8 +406,9 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) {
|
if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) {
|
||||||
struct mode_map *m = mode_map_get_uci(rconf->freq_band, rconf->ht_mode,
|
int channel_freq;
|
||||||
rconf->hw_mode);
|
channel_freq = ieee80211_channel_to_frequency(rconf->channel);
|
||||||
|
struct mode_map *m = mode_map_get_uci(rconf->freq_band, get_max_channel_bw_channel(channel_freq, rconf->ht_mode), rconf->hw_mode);
|
||||||
if (m) {
|
if (m) {
|
||||||
blobmsg_add_string(&b, "htmode", m->ucihtmode);
|
blobmsg_add_string(&b, "htmode", m->ucihtmode);
|
||||||
blobmsg_add_string(&b, "hwmode", m->ucihwmode);
|
blobmsg_add_string(&b, "hwmode", m->ucihwmode);
|
||||||
@@ -669,6 +675,157 @@ static void callback_Hotspot20_Icon_Config(ovsdb_update_monitor_t *mon,
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
enum {
|
||||||
|
WIF_APC_ENABLE,
|
||||||
|
__WIF_APC_MAX,
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy apc_enpolicy[__WIF_APC_MAX] = {
|
||||||
|
[WIF_APC_ENABLE] = { .name = "enabled", BLOBMSG_TYPE_BOOL },
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list apc_param = {
|
||||||
|
.n_params = __WIF_APC_MAX,
|
||||||
|
.params = apc_enpolicy,
|
||||||
|
};
|
||||||
|
|
||||||
|
void APC_config_update(struct schema_APC_Config *conf)
|
||||||
|
{
|
||||||
|
struct uci_package *apc;
|
||||||
|
struct blob_buf apcb = { };
|
||||||
|
int rc = 0;
|
||||||
|
|
||||||
|
LOGD("APC: APC_config_update");
|
||||||
|
|
||||||
|
rc = uci_load(uci, "apc", &apc);
|
||||||
|
if (rc)
|
||||||
|
{
|
||||||
|
LOGD("%s: uci_load failed with rc %d", __func__, rc);
|
||||||
|
}
|
||||||
|
|
||||||
|
blob_buf_init(&apcb, 0);
|
||||||
|
|
||||||
|
if (conf->enabled_changed) {
|
||||||
|
if (conf->enabled == true) {
|
||||||
|
blobmsg_add_bool(&apcb, "enabled", 1);
|
||||||
|
system("/etc/init.d/apc start");
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
blobmsg_add_bool(&apcb, "enabled", 0);
|
||||||
|
system("/etc/init.d/apc stop");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
blob_to_uci_section(uci, "apc", "apc", "apc",
|
||||||
|
apcb.head, &apc_param, NULL);
|
||||||
|
|
||||||
|
uci_commit(uci, &apc, false);
|
||||||
|
uci_unload(uci, apc);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void callback_APC_Config(ovsdb_update_monitor_t *mon,
|
||||||
|
struct schema_APC_Config *old,
|
||||||
|
struct schema_APC_Config *conf)
|
||||||
|
{
|
||||||
|
if (mon->mon_type != OVSDB_UPDATE_DEL)
|
||||||
|
APC_config_update(conf);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static void callback_APC_State(ovsdb_update_monitor_t *mon,
|
||||||
|
struct schema_APC_State *old,
|
||||||
|
struct schema_APC_State *conf)
|
||||||
|
{
|
||||||
|
LOGN("APC_state: enabled:%s dr_addr:%s bdr_addr:%s mode:%s",
|
||||||
|
(conf->enabled_changed)? "changed":"unchanged",
|
||||||
|
(conf->dr_addr_changed)? "changed":"unchanged",
|
||||||
|
(conf->bdr_addr_changed)? "changed":"unchanged",
|
||||||
|
(conf->mode_changed)? "changed":"unchanged");
|
||||||
|
|
||||||
|
/* APC changed: if radproxy enabled then restart wireless */
|
||||||
|
if (radproxy_apc) {
|
||||||
|
radproxy_apc = 0;
|
||||||
|
system("ubus call service event '{\"type\": \"config.change\", \"data\": { \"package\": \"wireless\" }}'");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
struct schema_APC_State apc_state;
|
||||||
|
enum {
|
||||||
|
APC_ATTR_MODE,
|
||||||
|
APC_ATTR_DR_ADDR,
|
||||||
|
APC_ATTR_BDR_ADDR,
|
||||||
|
APC_ATTR_ENABLED,
|
||||||
|
__APC_ATTR_MAX,
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy apc_policy[__APC_ATTR_MAX] = {
|
||||||
|
[APC_ATTR_MODE] = { .name = "mode", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[APC_ATTR_DR_ADDR] = { .name = "dr_addr", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[APC_ATTR_BDR_ADDR] = { .name = "bdr_addr", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[APC_ATTR_ENABLED] = { .name = "enabled", .type = BLOBMSG_TYPE_BOOL },
|
||||||
|
};
|
||||||
|
|
||||||
|
struct schema_APC_Config apc_conf;
|
||||||
|
|
||||||
|
void apc_state_set(struct blob_attr *msg)
|
||||||
|
{
|
||||||
|
struct blob_attr *tb[__APC_ATTR_MAX] = { };
|
||||||
|
|
||||||
|
blobmsg_parse(apc_policy, __APC_ATTR_MAX, tb,
|
||||||
|
blob_data(msg), blob_len(msg));
|
||||||
|
|
||||||
|
if (tb[APC_ATTR_MODE]) {
|
||||||
|
LOGD("APC mode: %s", blobmsg_get_string(tb[APC_ATTR_MODE]));
|
||||||
|
SCHEMA_SET_STR(apc_state.mode,
|
||||||
|
blobmsg_get_string(tb[APC_ATTR_MODE]));
|
||||||
|
}
|
||||||
|
if (tb[APC_ATTR_DR_ADDR]) {
|
||||||
|
LOGD("APC br-addr: %s", blobmsg_get_string(tb[APC_ATTR_DR_ADDR]));
|
||||||
|
SCHEMA_SET_STR(apc_state.dr_addr,
|
||||||
|
blobmsg_get_string(tb[APC_ATTR_DR_ADDR]));
|
||||||
|
}
|
||||||
|
if (tb[APC_ATTR_BDR_ADDR]) {
|
||||||
|
LOGD("APC dbr-addr: %s", blobmsg_get_string(tb[APC_ATTR_BDR_ADDR]));
|
||||||
|
SCHEMA_SET_STR(apc_state.bdr_addr,
|
||||||
|
blobmsg_get_string(tb[APC_ATTR_BDR_ADDR]));
|
||||||
|
}
|
||||||
|
if (tb[APC_ATTR_ENABLED]) {
|
||||||
|
LOGD("APC enabled: %d", blobmsg_get_bool(tb[APC_ATTR_ENABLED]));
|
||||||
|
if (blobmsg_get_bool(tb[APC_ATTR_ENABLED])) {
|
||||||
|
SCHEMA_SET_INT(apc_state.enabled, true);
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
LOGD("APC_state Updating");
|
||||||
|
if (!ovsdb_table_update(&table_APC_State, &apc_state))
|
||||||
|
LOG(ERR, "APC_state: failed to update");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void apc_init()
|
||||||
|
{
|
||||||
|
/* APC Config */
|
||||||
|
OVSDB_TABLE_INIT(APC_Config, _uuid);
|
||||||
|
OVSDB_TABLE_MONITOR(APC_Config, false);
|
||||||
|
SCHEMA_SET_INT(apc_conf.enabled, true);
|
||||||
|
LOGI("APC state/config Initialize");
|
||||||
|
if (!ovsdb_table_insert(&table_APC_Config, &apc_conf))
|
||||||
|
LOG(ERR, "APC_Config: failed to initialize");
|
||||||
|
|
||||||
|
/* APC State */
|
||||||
|
OVSDB_TABLE_INIT_NO_KEY(APC_State);
|
||||||
|
OVSDB_TABLE_MONITOR(APC_State, false);
|
||||||
|
SCHEMA_SET_STR(apc_state.mode, "NC");
|
||||||
|
SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||||
|
if (!ovsdb_table_insert(&table_APC_State, &apc_state))
|
||||||
|
LOG(ERR, "APC_state: failed to initialize");
|
||||||
|
}
|
||||||
|
|
||||||
bool target_radio_init(const struct target_radio_ops *ops)
|
bool target_radio_init(const struct target_radio_ops *ops)
|
||||||
{
|
{
|
||||||
uci = uci_alloc_context();
|
uci = uci_alloc_context();
|
||||||
@@ -694,6 +851,11 @@ bool target_radio_init(const struct target_radio_ops *ops)
|
|||||||
OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid);
|
OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid);
|
||||||
OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false);
|
OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false);
|
||||||
|
|
||||||
|
OVSDB_TABLE_INIT(Radius_Proxy_Config, _uuid);
|
||||||
|
OVSDB_TABLE_MONITOR(Radius_Proxy_Config, false);
|
||||||
|
|
||||||
|
apc_init();
|
||||||
|
|
||||||
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
||||||
|
|
||||||
radio_nl80211_init();
|
radio_nl80211_init();
|
||||||
|
|||||||
@@ -430,15 +430,55 @@ static void nl80211_del_phy(struct nlattr **tb, char *name)
|
|||||||
free(phy);
|
free(phy);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void nl80211_update_current_channel(struct nlattr **tb, char *name, int freq)
|
static int nl80211_channel_recv(struct nl_msg *msg, void *arg)
|
||||||
{
|
{
|
||||||
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
||||||
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
||||||
|
unsigned int *chan = (unsigned int *)arg;
|
||||||
|
|
||||||
|
memset(tb, 0, sizeof(tb));
|
||||||
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
||||||
|
genlmsg_attrlen(gnlh, 0), NULL);
|
||||||
|
|
||||||
|
if (tb[NL80211_ATTR_WIPHY_FREQ]) {
|
||||||
|
*chan = ieee80211_frequency_to_channel(nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]));
|
||||||
|
}
|
||||||
|
|
||||||
|
return NL_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
int nl80211_channel_get(char *name, unsigned int *chan)
|
||||||
|
{
|
||||||
|
struct nl_msg *msg;
|
||||||
struct wifi_phy *phy;
|
struct wifi_phy *phy;
|
||||||
|
struct wifi_iface *wif=NULL;
|
||||||
|
int idx = 0;
|
||||||
|
|
||||||
phy = avl_find_element(&phy_tree, name, phy, avl);
|
phy = avl_find_element(&phy_tree, name, phy, avl);
|
||||||
if (!phy)
|
if (!phy)
|
||||||
return;
|
return -1;
|
||||||
|
|
||||||
phy->current_channel = ieee80211_frequency_to_channel(freq);
|
if (list_empty(&phy->wifs))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
wif = list_first_entry(&phy->wifs, struct wifi_iface, phy);
|
||||||
|
|
||||||
|
if (!wif)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
idx = if_nametoindex(wif->name);
|
||||||
|
|
||||||
|
if (!idx)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
msg = unl_genl_msg(&unl, NL80211_CMD_GET_INTERFACE, true);
|
||||||
|
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
||||||
|
|
||||||
|
unl_genl_request(&unl, msg, nl80211_channel_recv, chan);
|
||||||
|
|
||||||
|
phy->current_channel = *chan;
|
||||||
|
|
||||||
|
return NL_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int nl80211_recv(struct nl_msg *msg, void *arg)
|
static int nl80211_recv(struct nl_msg *msg, void *arg)
|
||||||
@@ -449,7 +489,6 @@ static int nl80211_recv(struct nl_msg *msg, void *arg)
|
|||||||
char *pif_name=NULL;
|
char *pif_name=NULL;
|
||||||
char phyname[IFNAMSIZ] = {};
|
char phyname[IFNAMSIZ] = {};
|
||||||
int ifidx = -1, phy = -1;
|
int ifidx = -1, phy = -1;
|
||||||
int freq = 0;
|
|
||||||
memset(tb, 0, sizeof(tb));
|
memset(tb, 0, sizeof(tb));
|
||||||
|
|
||||||
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
||||||
@@ -465,18 +504,13 @@ static int nl80211_recv(struct nl_msg *msg, void *arg)
|
|||||||
|
|
||||||
if (tb[NL80211_ATTR_WIPHY]) {
|
if (tb[NL80211_ATTR_WIPHY]) {
|
||||||
phy = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
|
phy = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
|
||||||
if (tb[NL80211_ATTR_WIPHY_NAME])
|
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
||||||
|
} else if (tb[NL80211_ATTR_WIPHY_NAME]) {
|
||||||
strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ);
|
strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ);
|
||||||
else
|
} else if (sscanf(ifname, "wlan%d", &phy)) {
|
||||||
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
||||||
}
|
}
|
||||||
|
|
||||||
if(tb[NL80211_ATTR_WIPHY_FREQ]) {
|
|
||||||
freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
|
|
||||||
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
|
||||||
nl80211_update_current_channel(tb, phyname, freq);
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (gnlh->cmd) {
|
switch (gnlh->cmd) {
|
||||||
case NL80211_CMD_NEW_STATION:
|
case NL80211_CMD_NEW_STATION:
|
||||||
nl80211_add_station(tb, ifname);
|
nl80211_add_station(tb, ifname);
|
||||||
|
|||||||
@@ -0,0 +1,357 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <time.h>
|
||||||
|
|
||||||
|
#include <uci.h>
|
||||||
|
#include <uci_blob.h>
|
||||||
|
|
||||||
|
#include <target.h>
|
||||||
|
|
||||||
|
#include <curl/curl.h>
|
||||||
|
|
||||||
|
#include "ovsdb.h"
|
||||||
|
#include "ovsdb_update.h"
|
||||||
|
#include "ovsdb_sync.h"
|
||||||
|
#include "ovsdb_table.h"
|
||||||
|
#include "ovsdb_cache.h"
|
||||||
|
|
||||||
|
#include "nl80211.h"
|
||||||
|
#include "radio.h"
|
||||||
|
#include "vif.h"
|
||||||
|
#include "phy.h"
|
||||||
|
#include "log.h"
|
||||||
|
#include "evsched.h"
|
||||||
|
#include "uci.h"
|
||||||
|
#include "utils.h"
|
||||||
|
#include "radius_proxy.h"
|
||||||
|
|
||||||
|
ovsdb_table_t table_Radius_Proxy_Config;
|
||||||
|
struct blob_buf uci_buf = {};
|
||||||
|
struct blob_attr *n;
|
||||||
|
extern ovsdb_table_t table_APC_State;
|
||||||
|
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
||||||
|
|
||||||
|
enum {
|
||||||
|
RADIUS_PROXY_OPTIONS_LISTEN_UDP,
|
||||||
|
__RADIUS_PROXY_OPTIONS_MAX
|
||||||
|
};
|
||||||
|
|
||||||
|
enum {
|
||||||
|
RADIUS_PROXY_CLIENT_NAME,
|
||||||
|
RADIUS_PROXY_CLIENT_TYPE,
|
||||||
|
RADIUS_PROXY_CLIENT_SECRET,
|
||||||
|
__RADIUS_PROXY_CLIENT_MAX
|
||||||
|
};
|
||||||
|
|
||||||
|
enum {
|
||||||
|
RADIUS_PROXY_SERVER_NAME,
|
||||||
|
RADIUS_PROXY_SERVER_TYPE,
|
||||||
|
RADIUS_PROXY_SERVER_SECRET,
|
||||||
|
RADIUS_PROXY_SERVER_STATUS,
|
||||||
|
RADIUS_PROXY_SERVER_TLS,
|
||||||
|
RADIUS_PROXY_SERVER_CERT_NAME_CHECK,
|
||||||
|
__RADIUS_PROXY_SERVER_MAX
|
||||||
|
};
|
||||||
|
|
||||||
|
enum {
|
||||||
|
RADIUS_PROXY_TLS_NAME,
|
||||||
|
RADIUS_PROXY_TLS_CA_CERT,
|
||||||
|
RADIUS_PROXY_TLS_CLIENT_CERT,
|
||||||
|
RADIUS_PROXY_TLS_CLIENT_KEY,
|
||||||
|
RADIUS_PROXY_TLS_CERT_PASSWORD,
|
||||||
|
__RADIUS_PROXY_TLS_MAX,
|
||||||
|
};
|
||||||
|
|
||||||
|
enum {
|
||||||
|
RADIUS_PROXY_REALM_NAME,
|
||||||
|
RADIUS_PROXY_REALM_AUTH_SERVER,
|
||||||
|
RADIUS_PROXY_REALM_ACCT_SERVER,
|
||||||
|
__RADIUS_PROXY_REALM_MAX
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
static const struct blobmsg_policy radius_proxy_options_policy[__RADIUS_PROXY_OPTIONS_MAX] = {
|
||||||
|
[RADIUS_PROXY_OPTIONS_LISTEN_UDP] = { .name = "ListenUDP", BLOBMSG_TYPE_ARRAY },
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy radius_proxy_client_policy[__RADIUS_PROXY_CLIENT_MAX] = {
|
||||||
|
[RADIUS_PROXY_CLIENT_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_CLIENT_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_CLIENT_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING },
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy radius_proxy_tls_policy[__RADIUS_PROXY_TLS_MAX] = {
|
||||||
|
[RADIUS_PROXY_TLS_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_TLS_CA_CERT] = { .name = "CACertificateFile", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_TLS_CLIENT_CERT] = { .name = "certificateFile", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_TLS_CLIENT_KEY] = { .name = "certificateKeyFile", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_TLS_CERT_PASSWORD] = { .name = "certificateKeyPassword", BLOBMSG_TYPE_STRING },
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy radius_proxy_server_policy[__RADIUS_PROXY_SERVER_MAX] = {
|
||||||
|
[RADIUS_PROXY_SERVER_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_SERVER_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_SERVER_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_SERVER_STATUS] = { .name = "statusServer", BLOBMSG_TYPE_BOOL },
|
||||||
|
[RADIUS_PROXY_SERVER_TLS] = { .name = "tls", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_SERVER_CERT_NAME_CHECK] = { .name = "certificateNameCheck", BLOBMSG_TYPE_BOOL },
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy radius_proxy_realm_policy[__RADIUS_PROXY_REALM_MAX] = {
|
||||||
|
[RADIUS_PROXY_REALM_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||||
|
[RADIUS_PROXY_REALM_AUTH_SERVER] = { .name = "server", BLOBMSG_TYPE_ARRAY },
|
||||||
|
[RADIUS_PROXY_REALM_ACCT_SERVER] = { .name = "accountingServer", BLOBMSG_TYPE_ARRAY },
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list radius_proxy_options_param = {
|
||||||
|
.n_params = __RADIUS_PROXY_OPTIONS_MAX,
|
||||||
|
.params = radius_proxy_options_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list radius_proxy_client_param = {
|
||||||
|
.n_params = __RADIUS_PROXY_CLIENT_MAX,
|
||||||
|
.params = radius_proxy_client_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list radius_proxy_tls_param = {
|
||||||
|
.n_params = __RADIUS_PROXY_TLS_MAX,
|
||||||
|
.params = radius_proxy_tls_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list radius_proxy_server_param = {
|
||||||
|
.n_params = __RADIUS_PROXY_SERVER_MAX,
|
||||||
|
.params = radius_proxy_server_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct uci_blob_param_list radius_proxy_realm_param = {
|
||||||
|
.n_params = __RADIUS_PROXY_REALM_MAX,
|
||||||
|
.params = radius_proxy_realm_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
size_t file_write(void *ptr, size_t size, size_t nmemb, FILE *stream) {
|
||||||
|
size_t written = fwrite(ptr, size, nmemb, stream);
|
||||||
|
return written;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool radsec_download_cert(char *cert_name, char *dir_name, char *cert_url)
|
||||||
|
{
|
||||||
|
CURL *curl;
|
||||||
|
FILE *fp;
|
||||||
|
CURLcode res;
|
||||||
|
char path[200];
|
||||||
|
char name[32];
|
||||||
|
char dir[32];
|
||||||
|
char *gw_clientcert = "/usr/opensync/certs/client.pem";
|
||||||
|
char *gw_clientkey = "/usr/opensync/certs/client_dec.key";
|
||||||
|
|
||||||
|
strcpy(name, cert_name);
|
||||||
|
strcpy(dir, dir_name);
|
||||||
|
sprintf(path, "/tmp/radsec/certs/%s/%s", dir, name);
|
||||||
|
|
||||||
|
curl = curl_easy_init();
|
||||||
|
if (curl)
|
||||||
|
{
|
||||||
|
fp = fopen(path,"wb");
|
||||||
|
|
||||||
|
if (fp == NULL)
|
||||||
|
{
|
||||||
|
curl_easy_cleanup(curl);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (cert_url == NULL)
|
||||||
|
{
|
||||||
|
curl_easy_cleanup(curl);
|
||||||
|
fclose(fp);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
curl_easy_setopt(curl, CURLOPT_SSLCERT, gw_clientcert);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_SSLKEY, gw_clientkey);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_HEADER, 0L);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_URL, cert_url);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, file_write);
|
||||||
|
curl_easy_setopt(curl, CURLOPT_WRITEDATA, fp);
|
||||||
|
res = curl_easy_perform(curl);
|
||||||
|
curl_easy_cleanup(curl);
|
||||||
|
fclose(fp);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf )
|
||||||
|
{
|
||||||
|
int i=0;
|
||||||
|
char path[200];
|
||||||
|
char name[256];
|
||||||
|
struct schema_APC_State apc_conf;
|
||||||
|
|
||||||
|
/* Configure only if APC selects this as master AP (DR) */
|
||||||
|
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||||
|
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
||||||
|
where, &apc_conf)) {
|
||||||
|
LOG(INFO, "APC_State read failed");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!strncmp(apc_conf.mode, "OR", 2) || !strncmp(apc_conf.mode, "BDR", 2))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
/* Configure options block */
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
n = blobmsg_open_array(&uci_buf,"ListenUDP");
|
||||||
|
blobmsg_add_string(&uci_buf, NULL, "127.0.0.1:1812");
|
||||||
|
blobmsg_add_string(&uci_buf, NULL, "127.0.0.1:1813");
|
||||||
|
blobmsg_close_array(&uci_buf, n);
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s", conf->radius_config_name, "options");
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name, "options",
|
||||||
|
uci_buf.head, &radius_proxy_options_param, NULL);
|
||||||
|
|
||||||
|
/* Configure client block */
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
blobmsg_add_string(&uci_buf, "name", "localhost");
|
||||||
|
blobmsg_add_string(&uci_buf, "type", "udp");
|
||||||
|
blobmsg_add_string(&uci_buf, "secret", "secret");
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s", conf->radius_config_name, "client");
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name, "client",
|
||||||
|
uci_buf.head, &radius_proxy_client_param, NULL);
|
||||||
|
|
||||||
|
/* Configure TLS/non-TLS and server blocks */
|
||||||
|
if (conf->radsec)
|
||||||
|
{
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
radsec_download_cert("cacert.pem",
|
||||||
|
conf->radius_config_name, conf->ca_cert);
|
||||||
|
radsec_download_cert("clientcert.pem",
|
||||||
|
conf->radius_config_name, conf->client_cert);
|
||||||
|
radsec_download_cert("clientdec.key",
|
||||||
|
conf->radius_config_name, conf->client_key);
|
||||||
|
|
||||||
|
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||||
|
|
||||||
|
memset(path, '\0', sizeof(path));
|
||||||
|
sprintf(path, "/tmp/radsec/certs/%s/cacert.pem",
|
||||||
|
conf->radius_config_name);
|
||||||
|
blobmsg_add_string(&uci_buf, "CACertificateFile", path);
|
||||||
|
|
||||||
|
memset(path, '\0', sizeof(path));
|
||||||
|
sprintf(path, "/tmp/radsec/certs/%s/clientcert.pem",
|
||||||
|
conf->radius_config_name);
|
||||||
|
blobmsg_add_string(&uci_buf, "certificateFile", path);
|
||||||
|
|
||||||
|
memset(path, '\0', sizeof(path));
|
||||||
|
sprintf(path, "/tmp/radsec/certs/%s/clientdec.key",
|
||||||
|
conf->radius_config_name);
|
||||||
|
blobmsg_add_string(&uci_buf, "certificateKeyFile", path);
|
||||||
|
|
||||||
|
if (strlen(conf->passphrase) > 0)
|
||||||
|
blobmsg_add_string(&uci_buf, "certificateKeyPassword", conf->passphrase);
|
||||||
|
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s", conf->radius_config_name, "tls");
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name,
|
||||||
|
"tls", uci_buf.head, &radius_proxy_tls_param, NULL);
|
||||||
|
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||||
|
blobmsg_add_string(&uci_buf, "type", "tls");
|
||||||
|
blobmsg_add_string(&uci_buf, "tls", conf->server);
|
||||||
|
blobmsg_add_string(&uci_buf, "secret", "radsec");
|
||||||
|
blobmsg_add_bool(&uci_buf, "statusServer", 0);
|
||||||
|
blobmsg_add_bool(&uci_buf, "certificateNameCheck", 0);
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s", conf->radius_config_name, "server");
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name, "server",
|
||||||
|
uci_buf.head, &radius_proxy_server_param, NULL);
|
||||||
|
}
|
||||||
|
else /* non-TLS block */
|
||||||
|
{
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||||
|
blobmsg_add_string(&uci_buf, "type", "udp");
|
||||||
|
if (strlen(conf->secret) > 0)
|
||||||
|
blobmsg_add_string(&uci_buf, "secret", conf->secret);
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s", conf->radius_config_name, "server");
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name, "server",
|
||||||
|
uci_buf.head, &radius_proxy_server_param, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Configure realm block */
|
||||||
|
for (i = 0; i < conf->realm_len; i++)
|
||||||
|
{
|
||||||
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
blobmsg_add_string(&uci_buf, "name", conf->realm[i]);
|
||||||
|
n = blobmsg_open_array(&uci_buf,"server");
|
||||||
|
blobmsg_add_string(&uci_buf, NULL, conf->server);
|
||||||
|
blobmsg_close_array(&uci_buf, n);
|
||||||
|
n = blobmsg_open_array(&uci_buf,"accountingServer");
|
||||||
|
blobmsg_add_string(&uci_buf, NULL, conf->server);
|
||||||
|
blobmsg_close_array(&uci_buf, n);
|
||||||
|
memset(name, '\0', sizeof(name));
|
||||||
|
sprintf(name, "%s%s%d", conf->radius_config_name, "realm", i);
|
||||||
|
blob_to_uci_section(uci, "radsecproxy", name, "realm",
|
||||||
|
uci_buf.head, &radius_proxy_realm_param, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
uci_commit_all(uci);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool radius_proxy_config_delete()
|
||||||
|
{
|
||||||
|
struct uci_package *radsecproxy;
|
||||||
|
struct uci_element *e = NULL, *tmp = NULL;
|
||||||
|
int ret=0;
|
||||||
|
|
||||||
|
ret= uci_load(uci, "radsecproxy", &radsecproxy);
|
||||||
|
if (ret) {
|
||||||
|
LOGD("%s: uci_load() failed with rc %d", __func__, ret);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
uci_foreach_element_safe(&radsecproxy->sections, tmp, e) {
|
||||||
|
struct uci_section *s = uci_to_section(e);
|
||||||
|
if ((s == NULL) || (s->type == NULL)) continue;
|
||||||
|
uci_section_del(uci, "radsecproxy", "radsecproxy",
|
||||||
|
(char *)s->e.name, s->type);
|
||||||
|
}
|
||||||
|
uci_commit(uci, &radsecproxy, false);
|
||||||
|
uci_unload(uci, radsecproxy);
|
||||||
|
reload_config = 1;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *self,
|
||||||
|
struct schema_Radius_Proxy_Config *old,
|
||||||
|
struct schema_Radius_Proxy_Config *conf)
|
||||||
|
{
|
||||||
|
switch (self->mon_type)
|
||||||
|
{
|
||||||
|
case OVSDB_UPDATE_NEW:
|
||||||
|
case OVSDB_UPDATE_MODIFY:
|
||||||
|
(void) radius_proxy_config_set(conf);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case OVSDB_UPDATE_DEL:
|
||||||
|
(void) radius_proxy_config_delete();
|
||||||
|
(void) radius_proxy_config_set(conf);
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
LOG(ERR, "Radius_Proxy_Config: unexpected mon_type %d %s",
|
||||||
|
self->mon_type, self->mon_uuid);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -23,41 +23,79 @@
|
|||||||
#include "vif.h"
|
#include "vif.h"
|
||||||
|
|
||||||
static struct mode_map mode_map[] = {
|
static struct mode_map mode_map[] = {
|
||||||
{ 0, "11b", "11b", NULL, "NOHT" },
|
{ 0, "11b", "11b", NULL, "NOHT", 0 },
|
||||||
{ 0, "11g", "11g", NULL, "NOHT" },
|
{ 0, "11g", "11g", NULL, "NOHT", 0 },
|
||||||
{ 1, "11a", "11a", NULL, "NOHT" },
|
{ 1, "11a", "11a", NULL, "NOHT", 0 },
|
||||||
{ 0, "11n", "11g", "HT20", "HT20" },
|
{ 0, "11n", "11g", "HT20", "HT20", 0 },
|
||||||
{ 0, "11n", "11g", "HT40", "HT40" },
|
{ 0, "11n", "11g", "HT40", "HT40", 1 },
|
||||||
{ 0, "11n", "11g", "HT40-", "HT40-" },
|
{ 0, "11n", "11g", "HT40-", "HT40-", 1 },
|
||||||
{ 0, "11n", "11g", "HT40+", "HT40+" },
|
{ 0, "11n", "11g", "HT40+", "HT40+", 1 },
|
||||||
{ 0, "11n", "11g", "HT80", "HT40" },
|
{ 0, "11n", "11g", "HT80", "HT40", 1 },
|
||||||
{ 0, "11n", "11g", "HT160", "HT40" },
|
{ 0, "11n", "11g", "HT160", "HT40", 1 },
|
||||||
{ 1, "11n", "11a", "HT20", "HT20" },
|
{ 1, "11n", "11a", "HT20", "HT20", 0 },
|
||||||
{ 1, "11n", "11a", "HT40", "HT40" },
|
{ 1, "11n", "11a", "HT40", "HT40", 1 },
|
||||||
{ 1, "11n", "11a", "HT40-", "HT40-" },
|
{ 1, "11n", "11a", "HT40-", "HT40-", 1 },
|
||||||
{ 1, "11n", "11a", "HT40+", "HT40+" },
|
{ 1, "11n", "11a", "HT40+", "HT40+", 1 },
|
||||||
{ 1, "11n", "11a", "HT80", "HT40" },
|
{ 1, "11n", "11a", "HT80", "HT40", 1 },
|
||||||
{ 1, "11n", "11a", "HT160", "HT40" },
|
{ 1, "11n", "11a", "HT160", "HT40", 1 },
|
||||||
{ 1, "11ac", "11a", "HT20", "VHT20" },
|
{ 1, "11ac", "11a", "HT20", "VHT20", 0 },
|
||||||
{ 1, "11ac", "11a", "HT40", "VHT40" },
|
{ 1, "11ac", "11a", "HT40", "VHT40", 1 },
|
||||||
{ 1, "11ac", "11a", "HT40-", "VHT40" },
|
{ 1, "11ac", "11a", "HT40-", "VHT40", 1 },
|
||||||
{ 1, "11ac", "11a", "HT40+", "VHT40" },
|
{ 1, "11ac", "11a", "HT40+", "VHT40", 1 },
|
||||||
{ 1, "11ac", "11a", "HT80", "VHT80" },
|
{ 1, "11ac", "11a", "HT80", "VHT80", 1 },
|
||||||
{ 1, "11ac", "11a", "HT160", "VHT160" },
|
{ 1, "11ac", "11a", "HT160", "VHT160", 1 },
|
||||||
{ 0, "11ax", "11g", "HT20", "HE20" },
|
{ 0, "11ax", "11g", "HT20", "HE20", 0 },
|
||||||
{ 0, "11ax", "11g", "HT40", "HE40" },
|
{ 0, "11ax", "11g", "HT40", "HE40", 1 },
|
||||||
{ 0, "11ax", "11g", "HT40-", "HE40" },
|
{ 0, "11ax", "11g", "HT40-", "HE40", 1 },
|
||||||
{ 0, "11ax", "11g", "HT40+", "HE40" },
|
{ 0, "11ax", "11g", "HT40+", "HE40", 1 },
|
||||||
{ 0, "11ax", "11g", "HT80", "HE80" },
|
{ 0, "11ax", "11g", "HT80", "HE80", 1 },
|
||||||
{ 0, "11ax", "11g", "HT160", "HE80" },
|
{ 0, "11ax", "11g", "HT160", "HE80", 1 },
|
||||||
{ 1, "11ax", "11a", "HT20", "HE20" },
|
{ 1, "11ax", "11a", "HT20", "HE20", 0 },
|
||||||
{ 1, "11ax", "11a", "HT40", "HE40" },
|
{ 1, "11ax", "11a", "HT40", "HE40", 1 },
|
||||||
{ 1, "11ax", "11a", "HT40-", "HE40" },
|
{ 1, "11ax", "11a", "HT40-", "HE40", 1 },
|
||||||
{ 1, "11ax", "11a", "HT40+", "HE40" },
|
{ 1, "11ax", "11a", "HT40+", "HE40", 1 },
|
||||||
{ 1, "11ax", "11a", "HT80", "HE80" },
|
{ 1, "11ax", "11a", "HT80", "HE80", 1 },
|
||||||
{ 1, "11ax", "11a", "HT160", "HE160" },
|
{ 1, "11ax", "11a", "HT160", "HE160", 1 },
|
||||||
};
|
};
|
||||||
|
|
||||||
|
typedef enum {
|
||||||
|
MHz20=0,
|
||||||
|
MHz40 = 1,
|
||||||
|
MHz80 = 2,
|
||||||
|
MHz160 = 4
|
||||||
|
} bm_AllowedBw;
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
int freq;
|
||||||
|
bm_AllowedBw bw;
|
||||||
|
} freqBwListEntry;
|
||||||
|
|
||||||
|
freqBwListEntry freqBwList[] ={{2412, MHz20},{2417, MHz20},{2422, MHz20},{2427, MHz20},{2432, MHz20},{2437, MHz20},{2442, MHz20},{2447, MHz20},{2452, MHz20},{2457, MHz20},{2462, MHz20},{2467, MHz20},{2472, MHz20}, {2484, MHz20},
|
||||||
|
{ 5180, MHz20|MHz40|MHz80},{5200, MHz20},{5220, MHz20|MHz40},{5240, MHz20},{5260, MHz20|MHz40|MHz80},{5280, MHz20},{5300,MHz20|MHz40},{5320, MHz20},{5500, MHz20|MHz40|MHz80},{5520, MHz20},{5540, MHz20|MHz40}, {5560, MHz20},
|
||||||
|
{5580, MHz20|MHz40|MHz80},{5600, MHz20},{5620, MHz20|MHz40},{5640, MHz20},{5660, MHz20|MHz40|MHz80},{5680, MHz20},{5700, MHz20|MHz40},{5720, MHz20},{5745, MHz20|MHz40|MHz80},{5765, MHz20},{5785, MHz20|MHz40},{5805, MHz20},{5825, MHz20}};
|
||||||
|
|
||||||
|
#define REQ_BW(htmode) (!strcmp(htmode, "HT20") ? MHz20 : !strcmp(htmode, "HT40") ? MHz40 : !strcmp(htmode, "HT80") ? MHz80 : !strcmp(htmode, "HT160") ? MHz160 : MHz20)
|
||||||
|
#define REQ_MODE(bw) (bw==MHz20 ? "HT20": bw==MHz40 ? "HT40" : bw==MHz80 ? "HT80" : bw==MHz160 ? "HT160" : "HT20")
|
||||||
|
|
||||||
|
char * get_max_channel_bw_channel(int channel_freq, const char* htmode)
|
||||||
|
{
|
||||||
|
unsigned int i;
|
||||||
|
bm_AllowedBw requestedBw;
|
||||||
|
|
||||||
|
requestedBw = REQ_BW(htmode);
|
||||||
|
|
||||||
|
for ( i = 0; i < ARRAY_SIZE(freqBwList); i++) {
|
||||||
|
if(freqBwList[i].freq == channel_freq) {
|
||||||
|
while (requestedBw) {
|
||||||
|
if (freqBwList[i].bw & requestedBw) {
|
||||||
|
return REQ_MODE(requestedBw);
|
||||||
|
}
|
||||||
|
requestedBw >>= 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return "HT20";
|
||||||
|
}
|
||||||
struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode)
|
struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode)
|
||||||
{
|
{
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
@@ -624,3 +662,22 @@ bool vif_get_security(struct schema_Wifi_VIF_State *vstate, char *mode, char *
|
|||||||
return true;
|
return true;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool vif_get_key_for_key_distr(const char *secret, char *key_str)
|
||||||
|
{
|
||||||
|
bool err = false;
|
||||||
|
FILE *fp;
|
||||||
|
char cmd_buf[256] = "openssl aes-128-cbc -nosalt -k ";
|
||||||
|
|
||||||
|
strcat(cmd_buf, secret);
|
||||||
|
strcat(cmd_buf, " -P 2>/dev/null | grep key | cut -d = -f2");
|
||||||
|
fp = popen(cmd_buf, "r");
|
||||||
|
|
||||||
|
|
||||||
|
if (fp && fscanf(fp, "%s", key_str)) {
|
||||||
|
err = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
fclose(fp);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
|||||||
@@ -129,6 +129,9 @@ enum {
|
|||||||
WIF_ATTR_DVLAN_NAMING,
|
WIF_ATTR_DVLAN_NAMING,
|
||||||
WIF_ATTR_DVLAN_BRIDGE,
|
WIF_ATTR_DVLAN_BRIDGE,
|
||||||
WIF_ATTR_MIN_HW_MODE,
|
WIF_ATTR_MIN_HW_MODE,
|
||||||
|
WIF_ATTR_11R_R0KH,
|
||||||
|
WIF_ATTR_11R_R1KH,
|
||||||
|
WIF_ATTR_RADPROXY,
|
||||||
__WIF_ATTR_MAX,
|
__WIF_ATTR_MAX,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -220,6 +223,9 @@ static const struct blobmsg_policy wifi_iface_policy[__WIF_ATTR_MAX] = {
|
|||||||
[WIF_ATTR_DVLAN_NAMING] = { .name = "vlan_naming", BLOBMSG_TYPE_STRING },
|
[WIF_ATTR_DVLAN_NAMING] = { .name = "vlan_naming", BLOBMSG_TYPE_STRING },
|
||||||
[WIF_ATTR_DVLAN_BRIDGE] = { .name = "vlan_bridge", BLOBMSG_TYPE_STRING },
|
[WIF_ATTR_DVLAN_BRIDGE] = { .name = "vlan_bridge", BLOBMSG_TYPE_STRING },
|
||||||
[WIF_ATTR_MIN_HW_MODE] = { .name = "min_hw_mode", BLOBMSG_TYPE_STRING },
|
[WIF_ATTR_MIN_HW_MODE] = { .name = "min_hw_mode", BLOBMSG_TYPE_STRING },
|
||||||
|
[WIF_ATTR_11R_R0KH] = { .name = "r0kh", BLOBMSG_TYPE_STRING },
|
||||||
|
[WIF_ATTR_11R_R1KH] = { .name = "r1kh", BLOBMSG_TYPE_STRING },
|
||||||
|
[WIF_ATTR_RADPROXY] = { .name = "radproxy", BLOBMSG_TYPE_STRING },
|
||||||
};
|
};
|
||||||
|
|
||||||
const struct uci_blob_param_list wifi_iface_param = {
|
const struct uci_blob_param_list wifi_iface_param = {
|
||||||
@@ -311,6 +317,61 @@ static struct vif_crypto {
|
|||||||
{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 },
|
{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 },
|
||||||
};
|
};
|
||||||
|
|
||||||
|
extern ovsdb_table_t table_APC_State;
|
||||||
|
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
||||||
|
extern unsigned int radproxy_apc;
|
||||||
|
|
||||||
|
/* Custom options table */
|
||||||
|
#define SCHEMA_CUSTOM_OPT_SZ 20
|
||||||
|
#define SCHEMA_CUSTOM_OPTS_MAX 13
|
||||||
|
|
||||||
|
const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] =
|
||||||
|
{
|
||||||
|
SCHEMA_CONSTS_RATE_LIMIT,
|
||||||
|
SCHEMA_CONSTS_RATE_DL,
|
||||||
|
SCHEMA_CONSTS_RATE_UL,
|
||||||
|
SCHEMA_CONSTS_CLIENT_RATE_DL,
|
||||||
|
SCHEMA_CONSTS_CLIENT_RATE_UL,
|
||||||
|
SCHEMA_CONSTS_IEEE80211k,
|
||||||
|
SCHEMA_CONSTS_RTS_THRESHOLD,
|
||||||
|
SCHEMA_CONSTS_DTIM_PERIOD,
|
||||||
|
SCHEMA_CONSTS_RADIUS_OPER_NAME,
|
||||||
|
SCHEMA_CONSTS_RADIUS_NAS_ID,
|
||||||
|
SCHEMA_CONSTS_RADIUS_NAS_IP,
|
||||||
|
SCHEMA_CONSTS_DYNAMIC_VLAN,
|
||||||
|
SCHEMA_CONSTS_RADPROXY,
|
||||||
|
};
|
||||||
|
|
||||||
|
static bool vif_config_custom_opt_get_proxy(
|
||||||
|
const struct schema_Wifi_VIF_Config *vconf)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
const char *opt;
|
||||||
|
const char *val;
|
||||||
|
char value[20];
|
||||||
|
|
||||||
|
for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) {
|
||||||
|
opt = custom_options_table[i];
|
||||||
|
val = SCHEMA_KEY_VAL(vconf->custom_options, opt);
|
||||||
|
if (!val)
|
||||||
|
strncpy(value, "0", 20);
|
||||||
|
else
|
||||||
|
strncpy(value, val, 20);
|
||||||
|
|
||||||
|
if (strcmp(opt, "radproxy") == 0) {
|
||||||
|
if (strcmp(value, "1") == 0) {
|
||||||
|
radproxy_apc |= 1;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
radproxy_apc |= 0;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
static int vif_config_security_set(struct blob_buf *b,
|
static int vif_config_security_set(struct blob_buf *b,
|
||||||
const struct schema_Wifi_VIF_Config *vconf)
|
const struct schema_Wifi_VIF_Config *vconf)
|
||||||
{
|
{
|
||||||
@@ -318,7 +379,10 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
const char *mode = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_MODE);
|
const char *mode = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_MODE);
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
unsigned int acct_interval;
|
unsigned int acct_interval;
|
||||||
const char *auth_server, *auth_port, *auth_secret, *security_key;
|
const char *auth_server, *auth_port, *auth_secret, *security_key, *acct_server;
|
||||||
|
char key_str[64], key_holder_str[128];
|
||||||
|
struct schema_APC_State apc_conf;
|
||||||
|
const char *local_server = "127.0.0.1";
|
||||||
|
|
||||||
if (!strcmp(encryption, OVSDB_SECURITY_ENCRYPTION_OPEN) || !mode)
|
if (!strcmp(encryption, OVSDB_SECURITY_ENCRYPTION_OPEN) || !mode)
|
||||||
goto open;
|
goto open;
|
||||||
@@ -336,20 +400,48 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (vif_crypto[i].enterprise) {
|
if (vif_crypto[i].enterprise) {
|
||||||
acct_interval = 0;
|
|
||||||
|
if (vif_config_custom_opt_get_proxy(vconf)) {
|
||||||
|
LOGN("%s: Apply Proxy Security Settings", vconf->if_name);
|
||||||
|
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||||
|
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
||||||
|
where, &apc_conf)) {
|
||||||
|
LOG(INFO, "APC_State read failed");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
if (!strncmp(apc_conf.mode, "DR", 2)) {
|
||||||
|
auth_server = local_server;
|
||||||
|
acct_server = local_server;
|
||||||
|
} else if (!strncmp(apc_conf.mode, "OR", 2) ||
|
||||||
|
!strncmp(apc_conf.mode, "BDR", 2)) {
|
||||||
|
auth_server = apc_conf.dr_addr;
|
||||||
|
acct_server = apc_conf.dr_addr;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
auth_server = local_server;
|
||||||
|
acct_server = local_server;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
||||||
|
acct_server = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP);
|
||||||
|
}
|
||||||
|
|
||||||
|
acct_interval = 0;
|
||||||
auth_port = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT);
|
auth_port = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT);
|
||||||
auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET);
|
auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET);
|
||||||
|
|
||||||
LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret);
|
LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret);
|
||||||
if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) {
|
if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) {
|
||||||
LOGI("%s: Incomplete RADIUS security config - SSID not created", vconf->if_name);
|
LOGI("%s: Incomplete RADIUS security config - SSID not created", vconf->if_name);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
blobmsg_add_string(b, "auth_server", auth_server);
|
blobmsg_add_string(b, "auth_server", auth_server);
|
||||||
blobmsg_add_string(b, "auth_port", auth_port );
|
blobmsg_add_string(b, "auth_port", auth_port );
|
||||||
blobmsg_add_string(b, "auth_secret", auth_secret );
|
blobmsg_add_string(b, "auth_secret", auth_secret );
|
||||||
blobmsg_add_string(b, "acct_server",
|
blobmsg_add_string(b, "acct_server", acct_server);
|
||||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP));
|
|
||||||
blobmsg_add_string(b, "acct_port",
|
blobmsg_add_string(b, "acct_port",
|
||||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT));
|
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT));
|
||||||
blobmsg_add_string(b, "acct_secret",
|
blobmsg_add_string(b, "acct_secret",
|
||||||
@@ -361,6 +453,26 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
{
|
{
|
||||||
blobmsg_add_u32(b, "acct_interval", acct_interval);
|
blobmsg_add_u32(b, "acct_interval", acct_interval);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If Radius is configured and Roaming is enabled,
|
||||||
|
* - disable ft_psk_generate_local. This is required for hostapd to populate R0/R1.
|
||||||
|
* - populate r0KH and r1KH with broadcast addressing so that the corresponding
|
||||||
|
* Key Holders are auto-generated
|
||||||
|
*/
|
||||||
|
if (vconf->ft_mobility_domain) {
|
||||||
|
blobmsg_add_bool(b, "ft_psk_generate_local", 0);
|
||||||
|
|
||||||
|
vif_get_key_for_key_distr(auth_secret, key_str);
|
||||||
|
|
||||||
|
strcpy(key_holder_str, "ff:ff:ff:ff:ff:ff,*,");
|
||||||
|
strcat(key_holder_str, key_str);
|
||||||
|
blobmsg_add_string(b, "r0kh", key_holder_str);
|
||||||
|
|
||||||
|
strcpy(key_holder_str, "00:00:00:00:00:00,00:00:00:00:00:00,");
|
||||||
|
strcat(key_holder_str, key_str);
|
||||||
|
blobmsg_add_string(b, "r1kh", key_holder_str);
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY);
|
security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY);
|
||||||
if (security_key == NULL) {
|
if (security_key == NULL) {
|
||||||
@@ -368,6 +480,8 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
blobmsg_add_string(b, "key", security_key);
|
blobmsg_add_string(b, "key", security_key);
|
||||||
|
if (vconf->ft_mobility_domain)
|
||||||
|
blobmsg_add_bool(b, "ft_psk_generate_local", vconf->ft_psk);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@@ -454,25 +568,6 @@ out_none:
|
|||||||
OVSDB_SECURITY_ENCRYPTION_OPEN);
|
OVSDB_SECURITY_ENCRYPTION_OPEN);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Custom options table */
|
|
||||||
#define SCHEMA_CUSTOM_OPT_SZ 20
|
|
||||||
#define SCHEMA_CUSTOM_OPTS_MAX 12
|
|
||||||
|
|
||||||
const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] =
|
|
||||||
{
|
|
||||||
SCHEMA_CONSTS_RATE_LIMIT,
|
|
||||||
SCHEMA_CONSTS_RATE_DL,
|
|
||||||
SCHEMA_CONSTS_RATE_UL,
|
|
||||||
SCHEMA_CONSTS_CLIENT_RATE_DL,
|
|
||||||
SCHEMA_CONSTS_CLIENT_RATE_UL,
|
|
||||||
SCHEMA_CONSTS_IEEE80211k,
|
|
||||||
SCHEMA_CONSTS_RTS_THRESHOLD,
|
|
||||||
SCHEMA_CONSTS_DTIM_PERIOD,
|
|
||||||
SCHEMA_CONSTS_RADIUS_OPER_NAME,
|
|
||||||
SCHEMA_CONSTS_RADIUS_NAS_ID,
|
|
||||||
SCHEMA_CONSTS_RADIUS_NAS_IP,
|
|
||||||
SCHEMA_CONSTS_DYNAMIC_VLAN,
|
|
||||||
};
|
|
||||||
|
|
||||||
static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
||||||
const struct schema_Wifi_VIF_Config *vconf)
|
const struct schema_Wifi_VIF_Config *vconf)
|
||||||
@@ -483,6 +578,9 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
|||||||
const char *opt;
|
const char *opt;
|
||||||
const char *val;
|
const char *val;
|
||||||
struct blob_attr *n;
|
struct blob_attr *n;
|
||||||
|
bool found_nasid = false;
|
||||||
|
char mac[ETH_ALEN * 3];
|
||||||
|
struct blob_attr *tb[__WIF_ATTR_MAX] = { };
|
||||||
|
|
||||||
for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) {
|
for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) {
|
||||||
opt = custom_options_table[i];
|
opt = custom_options_table[i];
|
||||||
@@ -517,8 +615,12 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
|||||||
blobmsg_add_string(b, "rts_threshold", value);
|
blobmsg_add_string(b, "rts_threshold", value);
|
||||||
else if (strcmp(opt, "dtim_period") == 0)
|
else if (strcmp(opt, "dtim_period") == 0)
|
||||||
blobmsg_add_string(b, "dtim_period", value);
|
blobmsg_add_string(b, "dtim_period", value);
|
||||||
else if (strcmp(opt, "radius_nas_id") == 0)
|
else if (strcmp(opt, "radius_nas_id") == 0) {
|
||||||
|
if (strcmp(value, "\0") != 0) {
|
||||||
blobmsg_add_string(b, "nasid", value);
|
blobmsg_add_string(b, "nasid", value);
|
||||||
|
found_nasid = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
else if (strcmp(opt, "radius_nas_ip") == 0)
|
else if (strcmp(opt, "radius_nas_ip") == 0)
|
||||||
blobmsg_add_string(b, "ownip", value);
|
blobmsg_add_string(b, "ownip", value);
|
||||||
else if (strcmp(opt, "radius_oper_name") == 0 && strlen(value) > 0)
|
else if (strcmp(opt, "radius_oper_name") == 0 && strlen(value) > 0)
|
||||||
@@ -552,7 +654,17 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
|||||||
strncpy(value, "br-wan.", 20);
|
strncpy(value, "br-wan.", 20);
|
||||||
blobmsg_add_string(del, "vlan_bridge", value);
|
blobmsg_add_string(del, "vlan_bridge", value);
|
||||||
}
|
}
|
||||||
|
} else if (strcmp(opt, "radproxy") == 0)
|
||||||
|
blobmsg_add_string(b, "radproxy", value);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* No NASID was found from blob, so use BSSID as NASID */
|
||||||
|
if (found_nasid == false) {
|
||||||
|
blobmsg_parse(wifi_iface_policy, __WIF_ATTR_MAX, tb, blob_data(b->head), blob_len(b->head));
|
||||||
|
if (tb[WIF_ATTR_IFNAME] && !vif_get_mac(blobmsg_get_string(tb[WIF_ATTR_IFNAME]), mac))
|
||||||
|
blobmsg_add_string(b, "nasid", mac);
|
||||||
|
else
|
||||||
|
LOGE("Failed to get base BSSID (mac)\n");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -686,8 +798,16 @@ static void vif_state_custom_options_get(struct schema_Wifi_VIF_State *vstate,
|
|||||||
custom_options_table[i],
|
custom_options_table[i],
|
||||||
buf);
|
buf);
|
||||||
}
|
}
|
||||||
|
} else if (strcmp(opt, "radproxy") == 0) {
|
||||||
|
if (tb[WIF_ATTR_RADPROXY]) {
|
||||||
|
buf = blobmsg_get_string(tb[WIF_ATTR_RADPROXY]);
|
||||||
|
set_custom_option_state(vstate, &index,
|
||||||
|
custom_options_table[i],
|
||||||
|
buf);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bool vif_state_update(struct uci_section *s, struct schema_Wifi_VIF_Config *vconf)
|
bool vif_state_update(struct uci_section *s, struct schema_Wifi_VIF_Config *vconf)
|
||||||
@@ -882,6 +1002,70 @@ void vif_section_del(char *section_name)
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void vif_check_radius_proxy()
|
||||||
|
{
|
||||||
|
struct uci_context *uci_ctx;
|
||||||
|
struct uci_package *wireless;
|
||||||
|
struct schema_APC_State apc_conf;
|
||||||
|
struct uci_element *e = NULL, *tmp = NULL;
|
||||||
|
char *buf = NULL;
|
||||||
|
int rc = 0;
|
||||||
|
|
||||||
|
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||||
|
if (false == ovsdb_table_select_one_where(&table_APC_State, where, &apc_conf))
|
||||||
|
{
|
||||||
|
LOGI("APC_State read failed");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
uci_ctx = uci_alloc_context();
|
||||||
|
|
||||||
|
rc = uci_load(uci_ctx, "wireless", &wireless);
|
||||||
|
|
||||||
|
if (rc)
|
||||||
|
{
|
||||||
|
LOGD("%s: uci_load() failed with rc %d", __func__, rc);
|
||||||
|
goto free;
|
||||||
|
}
|
||||||
|
|
||||||
|
uci_foreach_element_safe(&wireless->sections, tmp, e)
|
||||||
|
{
|
||||||
|
struct blob_attr *tb[__WIF_ATTR_MAX];
|
||||||
|
struct uci_section *s = uci_to_section(e);
|
||||||
|
if ((s == NULL) || (s->type == NULL))
|
||||||
|
continue;
|
||||||
|
|
||||||
|
if (strcmp(s->type, "wifi-iface"))
|
||||||
|
continue;
|
||||||
|
|
||||||
|
blob_buf_init(&b, 0);
|
||||||
|
uci_to_blob(&b, s, &wifi_iface_param);
|
||||||
|
blobmsg_parse(wifi_iface_policy, __WIF_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head));
|
||||||
|
|
||||||
|
if (tb[WIF_ATTR_RADPROXY])
|
||||||
|
{
|
||||||
|
buf = blobmsg_get_string(tb[WIF_ATTR_RADPROXY]);
|
||||||
|
|
||||||
|
if (!strcmp(buf, "1") && !strcmp(apc_conf.mode, "DR"))
|
||||||
|
{
|
||||||
|
if (!system("pidof radsecproxy"))
|
||||||
|
goto free;
|
||||||
|
|
||||||
|
system("/etc/init.d/radsecproxy start");
|
||||||
|
|
||||||
|
goto free;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
system("/etc/init.d/radsecproxy stop");
|
||||||
|
|
||||||
|
free:
|
||||||
|
uci_unload(uci_ctx, wireless);
|
||||||
|
uci_free_context(uci_ctx);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
static bool hs20_download_icon(char *icon_name, char *icon_url)
|
static bool hs20_download_icon(char *icon_name, char *icon_url)
|
||||||
{
|
{
|
||||||
CURL *curl;
|
CURL *curl;
|
||||||
@@ -1335,10 +1519,9 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
blobmsg_add_string(&b, "min_hw_mode", vconf->min_hw_mode);
|
blobmsg_add_string(&b, "min_hw_mode", vconf->min_hw_mode);
|
||||||
|
|
||||||
if (changed->ft_psk || changed->ft_mobility_domain) {
|
if (changed->ft_psk || changed->ft_mobility_domain) {
|
||||||
if (vconf->ft_psk && vconf->ft_mobility_domain) {
|
if (vconf->ft_mobility_domain) {
|
||||||
blobmsg_add_bool(&b, "ieee80211r", 1);
|
blobmsg_add_bool(&b, "ieee80211r", 1);
|
||||||
blobmsg_add_hex16(&b, "mobility_domain", vconf->ft_mobility_domain);
|
blobmsg_add_hex16(&b, "mobility_domain", vconf->ft_mobility_domain);
|
||||||
blobmsg_add_bool(&b, "ft_psk_generate_local", vconf->ft_psk);
|
|
||||||
blobmsg_add_bool(&b, "ft_over_ds", 0);
|
blobmsg_add_bool(&b, "ft_over_ds", 0);
|
||||||
blobmsg_add_bool(&b, "reassociation_deadline", 1);
|
blobmsg_add_bool(&b, "reassociation_deadline", 1);
|
||||||
} else {
|
} else {
|
||||||
@@ -1385,9 +1568,8 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
blobmsg_add_bool(&b, "wpa_disable_eapol_key_retries", 1);
|
blobmsg_add_bool(&b, "wpa_disable_eapol_key_retries", 1);
|
||||||
blobmsg_add_u32(&b, "channel", rconf->channel);
|
blobmsg_add_u32(&b, "channel", rconf->channel);
|
||||||
|
|
||||||
if (vif_config_security_set(&b, vconf)) {
|
if (vif_config_security_set(&b, vconf))
|
||||||
return -1;
|
return -1;
|
||||||
}
|
|
||||||
|
|
||||||
if (changed->custom_options)
|
if (changed->custom_options)
|
||||||
vif_config_custom_opt_set(&b, &del, vconf);
|
vif_config_custom_opt_set(&b, &del, vconf);
|
||||||
@@ -1410,6 +1592,9 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name);
|
vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (changed->custom_options)
|
||||||
|
vif_check_radius_proxy();
|
||||||
|
|
||||||
reload_config = 1;
|
reload_config = 1;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -75,7 +75,7 @@ int rrm_setup_monitor(void);
|
|||||||
void rrm_channel_init(void);
|
void rrm_channel_init(void);
|
||||||
int rrm_ubus_init(struct ev_loop *loop);
|
int rrm_ubus_init(struct ev_loop *loop);
|
||||||
int ubus_get_noise(const char *if_name, uint32_t *noise);
|
int ubus_get_noise(const char *if_name, uint32_t *noise);
|
||||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency);
|
int ubus_set_channel_switch(const char *if_name, uint32_t frequency, int channel_bandwidth, int sec_chan_offset);
|
||||||
void set_rrm_parameters(rrm_entry_t *rrm_data);
|
void set_rrm_parameters(rrm_entry_t *rrm_data);
|
||||||
ds_tree_t* rrm_get_rrm_config_list(void);
|
ds_tree_t* rrm_get_rrm_config_list(void);
|
||||||
ds_tree_t* rrm_get_radio_list(void);
|
ds_tree_t* rrm_get_radio_list(void);
|
||||||
|
|||||||
@@ -94,6 +94,15 @@ radio_entry_t* rrm_get_radio_config(radio_type_t band)
|
|||||||
}
|
}
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
void get_channel_bandwidth(const char* htmode, int *channel_bandwidth)
|
||||||
|
{
|
||||||
|
if(!strcmp(htmode, "HT20"))
|
||||||
|
*channel_bandwidth=20;
|
||||||
|
else if (!strcmp(htmode, "HT40"))
|
||||||
|
*channel_bandwidth=40;
|
||||||
|
else if(!strcmp(htmode, "HT80"))
|
||||||
|
*channel_bandwidth=80;
|
||||||
|
}
|
||||||
|
|
||||||
void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
||||||
{
|
{
|
||||||
@@ -154,16 +163,26 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
|||||||
|
|
||||||
if (nf > nf_drop_threshold)
|
if (nf > nf_drop_threshold)
|
||||||
{
|
{
|
||||||
LOGD("[%s] backup=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
LOGI("Interference detected on [%s], switching to backup_channel=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
||||||
radio->config.if_name,
|
radio->config.if_name,
|
||||||
rrm_config->rrm_data.backup_channel,
|
rrm_config->rrm_data.backup_channel,
|
||||||
nf,
|
nf,
|
||||||
rrm_config->rrm_data.noise_lwm,
|
rrm_config->rrm_data.noise_lwm,
|
||||||
rrm_config->rrm_data.snr_percentage_drop,
|
rrm_config->rrm_data.snr_percentage_drop,
|
||||||
nf_drop_threshold);
|
nf_drop_threshold);
|
||||||
|
int channel_bandwidth;
|
||||||
|
int sec_chan_offset=0;
|
||||||
|
struct mode_map *m = mode_map_get_uci(radio->schema.freq_band, get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
||||||
|
radio->schema.ht_mode), radio->schema.hw_mode);
|
||||||
|
if (m) {
|
||||||
|
sec_chan_offset = m->sec_channel_offset;
|
||||||
|
} else
|
||||||
|
LOGE("failed to get channel offset");
|
||||||
|
|
||||||
|
get_channel_bandwidth(get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
||||||
|
radio->schema.ht_mode), &channel_bandwidth);
|
||||||
ubus_set_channel_switch(radio->config.if_name,
|
ubus_set_channel_switch(radio->config.if_name,
|
||||||
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel));
|
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel), channel_bandwidth, sec_chan_offset);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ int ubus_get_noise(const char *if_name, uint32_t *noise)
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency)
|
int ubus_set_channel_switch(const char *if_name, uint32_t frequency, int channel_bandwidth, int sec_chan_offset)
|
||||||
{
|
{
|
||||||
uint32_t id;
|
uint32_t id;
|
||||||
static struct blob_buf b;
|
static struct blob_buf b;
|
||||||
@@ -61,10 +61,21 @@ int ubus_set_channel_switch(const char *if_name, uint32_t frequency)
|
|||||||
|
|
||||||
if (ubus_lookup_id(ubus, path, &id))
|
if (ubus_lookup_id(ubus, path, &id))
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
blob_buf_init(&b, 0);
|
blob_buf_init(&b, 0);
|
||||||
|
|
||||||
|
if (channel_bandwidth == 20 || channel_bandwidth == 40) {
|
||||||
|
blobmsg_add_bool(&b, "ht", 1);
|
||||||
|
} else if (channel_bandwidth == 80) {
|
||||||
|
blobmsg_add_bool(&b, "vht", 1);
|
||||||
|
}
|
||||||
|
if (channel_bandwidth == 40 || channel_bandwidth == 80) {
|
||||||
|
blobmsg_add_u32(&b, "center_freq1", frequency+30);
|
||||||
|
}
|
||||||
|
|
||||||
blobmsg_add_u32(&b, "freq", frequency);
|
blobmsg_add_u32(&b, "freq", frequency);
|
||||||
blobmsg_add_u32(&b, "bcn_count", 1);
|
blobmsg_add_u32(&b, "bcn_count", 5);
|
||||||
|
blobmsg_add_u32(&b, "bandwidth", channel_bandwidth);
|
||||||
|
blobmsg_add_u32(&b, "sec_channel_offset", sec_chan_offset);
|
||||||
return ubus_invoke(ubus, id, "switch_chan", b.head, NULL, NULL, 1000);
|
return ubus_invoke(ubus, id, "switch_chan", b.head, NULL, NULL, 1000);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -130,6 +130,7 @@ static int rx_msg(struct nl_msg *msg, void* arg)
|
|||||||
struct nlattr *attr[GENL_UCC_ATTR_MAX+1];
|
struct nlattr *attr[GENL_UCC_ATTR_MAX+1];
|
||||||
|
|
||||||
struct voip_session *data;
|
struct voip_session *data;
|
||||||
|
char dst_ip[16];
|
||||||
genlmsg_parse(nlmsg_hdr(msg), 0, attr,
|
genlmsg_parse(nlmsg_hdr(msg), 0, attr,
|
||||||
GENL_UCC_ATTR_MAX, genl_ucc_policy);
|
GENL_UCC_ATTR_MAX, genl_ucc_policy);
|
||||||
|
|
||||||
@@ -140,7 +141,6 @@ static int rx_msg(struct nl_msg *msg, void* arg)
|
|||||||
return NL_OK;
|
return NL_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
char *dst_ip = malloc(16);
|
|
||||||
memset(dst_ip, 0, 16);
|
memset(dst_ip, 0, 16);
|
||||||
if((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
if((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
||||||
LOGI("Error: Cannot get IP for %s", IAC_IFACE);
|
LOGI("Error: Cannot get IP for %s", IAC_IFACE);
|
||||||
|
|||||||
@@ -463,6 +463,19 @@ dpp_event_record_alloc()
|
|||||||
return record;
|
return record;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline dpp_event_channel_switch_t *
|
||||||
|
dpp_event_channel_switch_alloc()
|
||||||
|
{
|
||||||
|
dpp_event_channel_switch_t *record = NULL;
|
||||||
|
|
||||||
|
record = calloc(1, sizeof(dpp_event_channel_switch_t));
|
||||||
|
if (record) {
|
||||||
|
memset(record, 0, sizeof(dpp_event_channel_switch_t));
|
||||||
|
}
|
||||||
|
return record;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
static inline void
|
static inline void
|
||||||
dpp_event_channel_record_free(dpp_event_channel_switch_t *record)
|
dpp_event_channel_record_free(dpp_event_channel_switch_t *record)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -105,7 +105,6 @@ static void sm_events_report_clear_client(ds_dlist_t *report_list)
|
|||||||
static void sm_events_report_clear_channel(ds_dlist_t *report_list)
|
static void sm_events_report_clear_channel(ds_dlist_t *report_list)
|
||||||
{
|
{
|
||||||
if (!ds_dlist_is_empty(report_list)) {
|
if (!ds_dlist_is_empty(report_list)) {
|
||||||
|
|
||||||
dpp_event_channel_switch_t *record = NULL;
|
dpp_event_channel_switch_t *record = NULL;
|
||||||
ds_dlist_iter_t record_iter;
|
ds_dlist_iter_t record_iter;
|
||||||
|
|
||||||
@@ -129,6 +128,8 @@ static void sm_events_report(EV_P_ ev_timer *w, int revents)
|
|||||||
/* Event Record */
|
/* Event Record */
|
||||||
dpp_event_record_t *dpp_record = NULL;
|
dpp_event_record_t *dpp_record = NULL;
|
||||||
dpp_event_record_t *sm_record = NULL;
|
dpp_event_record_t *sm_record = NULL;
|
||||||
|
dpp_event_channel_switch_t *dpp_record_cs = NULL;
|
||||||
|
dpp_event_channel_switch_t *sm_record_cs = NULL;
|
||||||
ds_dlist_iter_t record_iter;
|
ds_dlist_iter_t record_iter;
|
||||||
|
|
||||||
dpp_events_report_timer_restart(report_timer);
|
dpp_events_report_timer_restart(report_timer);
|
||||||
@@ -153,8 +154,23 @@ static void sm_events_report(EV_P_ ev_timer *w, int revents)
|
|||||||
ds_dlist_insert_tail(&report_ctx->client_event_list, dpp_record);
|
ds_dlist_insert_tail(&report_ctx->client_event_list, dpp_record);
|
||||||
}
|
}
|
||||||
|
|
||||||
if(!ds_dlist_is_empty(&g_event_report.channel_switch_list))
|
for (sm_record_cs = ds_dlist_ifirst(&record_iter, &g_event_report.channel_switch_list); sm_record_cs != NULL; sm_record_cs = ds_dlist_inext(&record_iter)) {
|
||||||
report_ctx->channel_switch_list = g_event_report.channel_switch_list;
|
dpp_record_cs = dpp_event_channel_switch_alloc();
|
||||||
|
|
||||||
|
dpp_record_cs->channel_event.band = sm_record_cs->channel_event.band;
|
||||||
|
dpp_record_cs->channel_event.reason = sm_record_cs->channel_event.reason;
|
||||||
|
dpp_record_cs->channel_event.freq = sm_record_cs->channel_event.freq;
|
||||||
|
dpp_record_cs->channel_event.timestamp = sm_record_cs->channel_event.timestamp;
|
||||||
|
|
||||||
|
ds_dlist_iremove(&record_iter);
|
||||||
|
dpp_event_channel_record_free(sm_record_cs);
|
||||||
|
sm_record_cs = NULL;
|
||||||
|
|
||||||
|
if (ds_dlist_is_empty(&report_ctx->channel_switch_list)) {
|
||||||
|
ds_dlist_init(&report_ctx->channel_switch_list, dpp_event_channel_switch_t, node);
|
||||||
|
}
|
||||||
|
ds_dlist_insert_tail(&report_ctx->channel_switch_list, dpp_record_cs);
|
||||||
|
}
|
||||||
|
|
||||||
if (!ds_dlist_is_empty(&report_ctx->client_event_list) || !ds_dlist_is_empty(&report_ctx->channel_switch_list)) {
|
if (!ds_dlist_is_empty(&report_ctx->client_event_list) || !ds_dlist_is_empty(&report_ctx->channel_switch_list)) {
|
||||||
LOG(DEBUG, "Sending events report...");
|
LOG(DEBUG, "Sending events report...");
|
||||||
|
|||||||
@@ -19,6 +19,16 @@ enum {
|
|||||||
SYSTEM_ATTR_FIRMWARE,
|
SYSTEM_ATTR_FIRMWARE,
|
||||||
SYSTEM_ATTR_REDIRECTOR,
|
SYSTEM_ATTR_REDIRECTOR,
|
||||||
SYSTEM_ATTR_INACTIVEFW,
|
SYSTEM_ATTR_INACTIVEFW,
|
||||||
|
SYSTEM_ATTR_SKU,
|
||||||
|
SYSTEM_ATTR_MODEL_REV,
|
||||||
|
SYSTEM_ATTR_MODEL_DESCR,
|
||||||
|
SYSTEM_ATTR_MANUFACT_NAME,
|
||||||
|
SYSTEM_ATTR_MANUFACT_DATE,
|
||||||
|
SYSTEM_ATTR_MANUFACT_URL,
|
||||||
|
SYSTEM_ATTR_MANUF_ABBR,
|
||||||
|
SYSTEM_ATTR_REF_DESIGN,
|
||||||
|
SYSTEM_ATTR_CERT_REGION,
|
||||||
|
SYSTEM_ATTR_MAC_ADDR,
|
||||||
__SYSTEM_ATTR_MAX,
|
__SYSTEM_ATTR_MAX,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -29,6 +39,16 @@ static const struct blobmsg_policy system_policy[__SYSTEM_ATTR_MAX] = {
|
|||||||
[SYSTEM_ATTR_FIRMWARE] = { .name = "firmware", .type = BLOBMSG_TYPE_STRING },
|
[SYSTEM_ATTR_FIRMWARE] = { .name = "firmware", .type = BLOBMSG_TYPE_STRING },
|
||||||
[SYSTEM_ATTR_REDIRECTOR] = { .name = "redirector", .type = BLOBMSG_TYPE_STRING },
|
[SYSTEM_ATTR_REDIRECTOR] = { .name = "redirector", .type = BLOBMSG_TYPE_STRING },
|
||||||
[SYSTEM_ATTR_INACTIVEFW] = { .name = "inactivefw", .type = BLOBMSG_TYPE_STRING },
|
[SYSTEM_ATTR_INACTIVEFW] = { .name = "inactivefw", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_SKU] = { .name = "sku_number", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MODEL_REV] = { .name = "revision", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MODEL_DESCR] = { .name = "model_description", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MANUFACT_NAME] = { .name = "manufacturer_name", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MANUFACT_DATE] = { .name = "manufacturer_date", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MANUFACT_URL] = { .name = "manufacturer_url", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MANUF_ABBR] = { .name = "manuf_abbr", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_REF_DESIGN] = { .name = "reference_design", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_CERT_REGION] = { .name = "certification_region", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[SYSTEM_ATTR_MAC_ADDR] = { .name = "id", .type = BLOBMSG_TYPE_STRING },
|
||||||
};
|
};
|
||||||
|
|
||||||
const struct uci_blob_param_list system_param = {
|
const struct uci_blob_param_list system_param = {
|
||||||
@@ -110,6 +130,56 @@ bool target_platform_version_get(void *buf, size_t len)
|
|||||||
return copy_data(SYSTEM_ATTR_PLATFORM, buf, len);
|
return copy_data(SYSTEM_ATTR_PLATFORM, buf, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool target_sku_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_SKU, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_model_revision_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MODEL_REV, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_model_description_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MODEL_DESCR, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_manuf_name_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MANUFACT_NAME, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_manuf_date_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MANUFACT_DATE, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_manuf_url_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MANUFACT_URL, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_manuf_abbr_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MANUF_ABBR, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_ref_design_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_REF_DESIGN, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_cert_region_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_CERT_REGION, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool target_mac_addr_get(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return copy_data(SYSTEM_ATTR_MAC_ADDR, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
bool target_device_config_register(void *awlan_cb)
|
bool target_device_config_register(void *awlan_cb)
|
||||||
{
|
{
|
||||||
struct schema_AWLAN_Node awlan;
|
struct schema_AWLAN_Node awlan;
|
||||||
|
|||||||
@@ -2,22 +2,117 @@
|
|||||||
|
|
||||||
. /lib/functions.sh
|
. /lib/functions.sh
|
||||||
|
|
||||||
|
SKU="unknown"
|
||||||
|
MODEL="unknown"
|
||||||
|
PLATFORM="unknown"
|
||||||
|
SERIAL="unknown"
|
||||||
|
MODEL_REV="unknown"
|
||||||
|
MODEL_DESCR="unknown"
|
||||||
|
MANUF_NAME="unknown"
|
||||||
|
MANUF_DATE="unknown"
|
||||||
|
MANUF_URL="unknown"
|
||||||
|
MANUF_DESIGN="unknown"
|
||||||
|
REF_DESIGN="unknown"
|
||||||
|
CERT_REGION="unknown"
|
||||||
|
ID=""
|
||||||
|
|
||||||
case "$(board_name)" in
|
case "$(board_name)" in
|
||||||
edgecore,ecw5211|\
|
edgecore,ecw5211|\
|
||||||
edgecore,ecw5410)
|
edgecore,ecw5410)
|
||||||
MODEL=$(cat /tmp/sysinfo/board_name | sed "s/edgecore,//" | tr [a-z] [A-Z])
|
MODEL=$(cat /tmp/sysinfo/board_name | sed "s/edgecore,//" | tr [a-z] [A-Z])
|
||||||
SERIAL=$(cat /sys/class/net/eth0/address | tr -d :)
|
|
||||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||||
|
SERIAL=$(cat /dev/mtd5 | grep serial_number | cut -d "=" -f2)
|
||||||
|
SKU=$(cat /dev/mtd5 | grep sku | cut -d "=" -f2)
|
||||||
|
CERT_REGION=$(cat /dev/mtd5 | grep certification_region | cut -d "=" -f2)
|
||||||
|
ID=$(cat /dev/mtd5 | grep mac_address | cut -d "=" -f2)
|
||||||
|
MANUF_DATE=$(cat /dev/mtd5 | grep manufacturer_date | cut -d "=" -f2)
|
||||||
|
MANUF_NAME=$(cat /dev/mtd5 | grep manufacturer_name | cut -d "=" -f2)
|
||||||
|
if [ ! $MANUF_NAME ]; then
|
||||||
|
MANUF_NAME="Edge-Core"
|
||||||
|
fi
|
||||||
|
MANUF_ABBR="EC"
|
||||||
|
MANUF_URL=$(cat /dev/mtd5 | grep manufacturer_url | cut -d "=" -f2)
|
||||||
|
MODEL_DESCR=$(cat /dev/mtd5 | grep model_description | cut -d "=" -f2)
|
||||||
|
MODEL_REV=$(cat /dev/mtd5 | grep model_revision | cut -d "=" -f2)
|
||||||
|
REF_DESIGN=$(cat /dev/mtd5 | grep reference_design | cut -d "=" -f2)
|
||||||
;;
|
;;
|
||||||
cig,wf194c)
|
cig,wf194c)
|
||||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||||
SERIAL=$(cat cat /dev/mtd14 | grep BaseMacAddress | cut -dx -f2 | tr -d '\r\n')
|
|
||||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||||
|
SERIAL=$(cat /dev/mtd14 | grep serial_number | cut -d "=" -f2)
|
||||||
|
if [ ! $SERIAL ]; then
|
||||||
|
SERIAL=$(cat /dev/mtd14 | grep BaseMacAddress | cut -dx -f2)
|
||||||
|
fi
|
||||||
|
SKU=$(cat /dev/mtd14 | grep sku | cut -d "=" -f2)
|
||||||
|
CERT_REGION=$(cat /dev/mtd14 | grep certification_region | cut -d "=" -f2)
|
||||||
|
ID=$(cat /dev/mtd14 | grep mac_address | cut -d "=" -f2)
|
||||||
|
MANUF_DATE=$(cat /dev/mtd14 | grep manufacturer_date | cut -d "=" -f2)
|
||||||
|
MANUF_NAME=$(cat /dev/mtd14 | grep manufacturer_name | cut -d "=" -f2)
|
||||||
|
if [ ! $MANUF_NAME ]; then
|
||||||
|
MANUF_NAME="CIG"
|
||||||
|
fi
|
||||||
|
MANUF_ABBR="CIG"
|
||||||
|
MANUF_URL=$(cat /dev/mtd14 | grep manufacturer_url | cut -d "=" -f2)
|
||||||
|
MODEL_DESCR=$(cat /dev/mtd14 | grep model_description | cut -d "=" -f2)
|
||||||
|
MODEL_REV=$(cat /dev/mtd14 | grep model_revision | cut -d "=" -f2)
|
||||||
|
REF_DESIGN=$(cat /dev/mtd14 | grep reference_design | cut -d "=" -f2)
|
||||||
|
;;
|
||||||
|
cig,wf188n)
|
||||||
|
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||||
|
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||||
|
SERIAL=$(cat /dev/mtd12 | grep serial_number | cut -d "=" -f2)
|
||||||
|
SKU=$(cat /dev/mtd12 | grep sku | cut -d "=" -f2)
|
||||||
|
CERT_REGION=$(cat /dev/mtd12 | grep certification_region | cut -d "=" -f2)
|
||||||
|
ID=$(cat /dev/mtd12 | grep mac_address | cut -d "=" -f2)
|
||||||
|
MANUF_DATE=$(cat /dev/mtd12 | grep manufacturer_date | cut -d "=" -f2)
|
||||||
|
MANUF_NAME=$(cat /dev/mtd12 | grep manufacturer_name | cut -d "=" -f2)
|
||||||
|
if [ ! $MANUF_NAME ]; then
|
||||||
|
MANUF_NAME="CIG"
|
||||||
|
fi
|
||||||
|
MANUF_ABBR="CIG"
|
||||||
|
MANUF_URL=$(cat /dev/mtd12 | grep manufacturer_url | cut -d "=" -f2)
|
||||||
|
MODEL_DESCR=$(cat /dev/mtd12 | grep model_description | cut -d "=" -f2)
|
||||||
|
MODEL_REV=$(cat /dev/mtd12 | grep model_revision | cut -d "=" -f2)
|
||||||
|
REF_DESIGN=$(cat /dev/mtd12 | grep reference_design | cut -d "=" -f2)
|
||||||
;;
|
;;
|
||||||
linksys,ea8300)
|
linksys,ea8300)
|
||||||
MODEL=$(grep modelNumber= /dev/mtd9 | tr -d '\r\n' | sed "s/modelNumber=//")
|
MODEL=$(grep modelNumber= /dev/mtd9 | tr -d '\r\n' | sed "s/modelNumber=//")
|
||||||
SERIAL=$(grep serial_number= /dev/mtd9 | tr -d '\r\n' | sed "s/serial_number=//")
|
SERIAL=$(grep serial_number= /dev/mtd9 | tr -d '\r\n' | sed "s/serial_number=//")
|
||||||
PLATFORM=OPENWRT_EA8300
|
PLATFORM="OPENWRT_EA8300"
|
||||||
|
MODEL_REV=$(cat /dev/mtd9 | grep hw_revision | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
MODEL_DESCR=$(cat /dev/mtd9 | grep modelDescription | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
MANUF_URL=$(cat /dev/mtd9 | grep manufacturerURL | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
CERT_REGION=$(cat /dev/mtd9 | grep cert_region | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
ID=$(cat /dev/mtd9 | grep hw_mac_addr | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
MANUF_NAME=$(cat /dev/mtd9 | grep "manufacturer=" | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
if [ ! $MANUF_NAME ]; then
|
||||||
|
MANUF_NAME="Linksys"
|
||||||
|
fi
|
||||||
|
MANUF_ABBR="LS"
|
||||||
|
|
||||||
|
MANUF_DATE=$(cat /dev/mtd9 | grep manufacturer_date | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
|
YEAR=$(echo "$MANUF_DATE" | cut -d "/" -f1)
|
||||||
|
MONTH=$(echo "$MANUF_DATE" | cut -d "/" -f2)
|
||||||
|
DAY=$(echo "$MANUF_DATE" | cut -d "/" -f3)
|
||||||
|
MANUF_DATE="$DAY-$MONTH-$YEAR"
|
||||||
|
;;
|
||||||
|
tp-link,ec420-g1)
|
||||||
|
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||||
|
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||||
|
SERIAL=$(cat /dev/mtd9 | grep serial_number | cut -d "=" -f2)
|
||||||
|
SKU=$(cat /dev/mtd9 | grep sku | cut -d "=" -f2)
|
||||||
|
CERT_REGION=$(cat /dev/mtd9 | grep certification_region | cut -d "=" -f2)
|
||||||
|
ID=$(cat /dev/mtd9 | grep mac_address | cut -d "=" -f2)
|
||||||
|
MANUF_DATE=$(cat /dev/mtd9 | grep manufacturer_date | cut -d "=" -f2)
|
||||||
|
MANUF_NAME=$(cat /dev/mtd9 | grep manufacturer_name | cut -d "=" -f2)
|
||||||
|
if [ ! $MANUF_NAME ]; then
|
||||||
|
MANUF_NAME="Proware (TP-Link)"
|
||||||
|
fi
|
||||||
|
MANUF_ABBR="PW"
|
||||||
|
MANUF_URL=$(cat /dev/mtd9 | grep manufacturer_url | cut -d "=" -f2)
|
||||||
|
MODEL_DESCR=$(cat /dev/mtd9 | grep model_description | cut -d "=" -f2)
|
||||||
|
MODEL_REV=$(cat /dev/mtd9 | grep model_revision | cut -d "=" -f2)
|
||||||
|
REF_DESIGN=$(cat /dev/mtd9 | grep reference_design | cut -d "=" -f2)
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||||
@@ -28,9 +123,30 @@ esac
|
|||||||
|
|
||||||
MODEL=$(echo $MODEL | sed "s/.*,//" | tr [a-z] [A-Z])
|
MODEL=$(echo $MODEL | sed "s/.*,//" | tr [a-z] [A-Z])
|
||||||
|
|
||||||
|
# fallback check to get the serial number from mac address if flash does not contain this info.
|
||||||
|
if [ ! $SERIAL ]; then
|
||||||
|
SERIAL=$(cat /sys/class/net/eth0/address | tr -d :)
|
||||||
|
fi
|
||||||
|
|
||||||
|
# fallback check to get the id from mac address if flash does not contain this info.
|
||||||
|
if [ ! $ID ]; then
|
||||||
|
ID=$(cat /sys/class/net/eth0/address)
|
||||||
|
fi
|
||||||
|
|
||||||
uci set system.tip=tip
|
uci set system.tip=tip
|
||||||
uci set system.tip.serial="${SERIAL}"
|
uci set system.tip.serial="${SERIAL}"
|
||||||
uci set system.tip.model="${MODEL}"
|
uci set system.tip.model="${MODEL}"
|
||||||
uci set system.tip.platform="${PLATFORM}"
|
uci set system.tip.platform="${PLATFORM}"
|
||||||
uci set system.tip.firmware='0.1.0'
|
uci set system.tip.firmware='0.1.0'
|
||||||
|
uci set system.tip.sku_number="${SKU}"
|
||||||
|
uci set system.tip.revision="${MODEL_REV}"
|
||||||
|
uci set system.tip.model_description="${MODEL_DESCR}"
|
||||||
|
uci set system.tip.manufacturer_name="${MANUF_NAME}"
|
||||||
|
uci set system.tip.manufacturer_date="${MANUF_DATE}"
|
||||||
|
uci set system.tip.manufacturer_url="${MANUF_URL}"
|
||||||
|
uci set system.tip.reference_design="${REF_DESIGN}"
|
||||||
|
uci set system.tip.certification_region="${CERT_REGION}"
|
||||||
|
uci set system.tip.id="${ID}"
|
||||||
|
uci set system.tip.manuf_abbr="${MANUF_ABBR}"
|
||||||
|
|
||||||
uci commit
|
uci commit
|
||||||
|
|||||||
@@ -0,0 +1,46 @@
|
|||||||
|
From 5380b0204d97a79669243b46a8750e038e6a0a19 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Chaitanya Godavarthi <chaitanya.kiran@netexperience.com>
|
||||||
|
Date: Wed, 14 Apr 2021 11:14:45 -0400
|
||||||
|
Subject: [PATCH] netifd: Dont renew dhcp on bridge topo change
|
||||||
|
|
||||||
|
Do not renew the dhcp on bridge topology change
|
||||||
|
as this causes some of the dhcp servers to fail.
|
||||||
|
This occurs when many interfaces are added on to
|
||||||
|
a bridge and for every interface there is a dhcp
|
||||||
|
renew. The server considers receiving renew many
|
||||||
|
times in a quick succession as a DOS attack. So for
|
||||||
|
now we disable dhcp lease renew when a new interface
|
||||||
|
is added.
|
||||||
|
|
||||||
|
Signed-off-by: Chaitanya Godavarthi <chaitanya.kiran@netexperience.com>
|
||||||
|
---
|
||||||
|
.../netifd/patches/0104-fix-dhcp-issue.patch | 17 +++++++++++++++++
|
||||||
|
1 file changed, 17 insertions(+)
|
||||||
|
create mode 100644 package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||||
|
|
||||||
|
diff --git a/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch b/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..6f1d2e708e
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||||
|
@@ -0,0 +1,17 @@
|
||||||
|
+Index: netifd-2019-08-05-5e02f944/interface.c
|
||||||
|
+===================================================================
|
||||||
|
+--- netifd-2019-08-05-5e02f944.orig/interface.c
|
||||||
|
++++ netifd-2019-08-05-5e02f944/interface.c
|
||||||
|
+@@ -424,7 +424,11 @@ interface_main_dev_cb(struct device_user
|
||||||
|
+ interface_set_link_state(iface, false);
|
||||||
|
+ break;
|
||||||
|
+ case DEV_EVENT_TOPO_CHANGE:
|
||||||
|
+- interface_proto_event(iface->proto, PROTO_CMD_RENEW, false);
|
||||||
|
++ /* This renews the dhcp lease when the bridge adds/deletes a
|
||||||
|
++ * new interface. It causes some dhcp servers to fail in
|
||||||
|
++ * case where there are many interfaces being added to the
|
||||||
|
++ * bridge frequently. Disabling this for now. */
|
||||||
|
++ /* interface_proto_event(iface->proto, PROTO_CMD_RENEW, false); */
|
||||||
|
+ return;
|
||||||
|
+ default:
|
||||||
|
+ break;
|
||||||
|
--
|
||||||
|
2.25.1
|
||||||
|
|
||||||
@@ -0,0 +1,31 @@
|
|||||||
|
From 4a85624a667c4027bf09f6155fbb046ac588a20a Mon Sep 17 00:00:00 2001
|
||||||
|
From: ravi vaishnav <ravi.vaishnav@netexperience.com>
|
||||||
|
Date: Thu, 22 Apr 2021 16:36:52 -0400
|
||||||
|
Subject: [PATCH] base-files: Increase Socket buffer memory size
|
||||||
|
|
||||||
|
When configuring 16 VLAN, we see hostapd complaining
|
||||||
|
about No buffer space available while handling receive
|
||||||
|
events. Hence, increasing the socket buffer memory size
|
||||||
|
to 512KB.
|
||||||
|
|
||||||
|
Signed-off-by: ravi vaishnav <ravi.vaishnav@netexperience.com>
|
||||||
|
---
|
||||||
|
package/base-files/files/etc/sysctl.d/10-default.conf | 5 +++++
|
||||||
|
1 file changed, 5 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/package/base-files/files/etc/sysctl.d/10-default.conf b/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||||
|
index bc8c579695..aeda9153a8 100644
|
||||||
|
--- a/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||||
|
+++ b/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||||
|
@@ -25,3 +25,8 @@ net.ipv4.tcp_dsack=1
|
||||||
|
|
||||||
|
net.ipv6.conf.default.forwarding=1
|
||||||
|
net.ipv6.conf.all.forwarding=1
|
||||||
|
+
|
||||||
|
+net.core.wmem_default = 524288
|
||||||
|
+net.core.rmem_default = 524288
|
||||||
|
+net.core.wmem_max = 524288
|
||||||
|
+net.core.rmem_max = 524288
|
||||||
|
--
|
||||||
|
2.25.1
|
||||||
|
|
||||||
@@ -39,6 +39,7 @@ packages:
|
|||||||
- luci-mod-simple
|
- luci-mod-simple
|
||||||
- luci-theme-tip
|
- luci-theme-tip
|
||||||
- nft-qos
|
- nft-qos
|
||||||
|
- openssl-util
|
||||||
- openvswitch
|
- openvswitch
|
||||||
- openvswitch-common
|
- openvswitch-common
|
||||||
- openvswitch-libofproto
|
- openvswitch-libofproto
|
||||||
@@ -77,6 +78,8 @@ packages:
|
|||||||
- kmod-iptunnel
|
- kmod-iptunnel
|
||||||
- kmod-iptunnel6
|
- kmod-iptunnel6
|
||||||
- eapol-test
|
- eapol-test
|
||||||
|
- apc
|
||||||
|
- radsecproxy
|
||||||
|
|
||||||
diffconfig: |
|
diffconfig: |
|
||||||
CONFIG_OPENSSL_ENGINE=y
|
CONFIG_OPENSSL_ENGINE=y
|
||||||
|
|||||||
Reference in New Issue
Block a user