mirror of
https://github.com/Telecominfraproject/wlan-ap.git
synced 2025-10-30 18:07:52 +00:00
Compare commits
19 Commits
v1.0.1
...
v1.0.4-rc1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
7aea689d9a | ||
|
|
7a634d80ed | ||
|
|
6021a14426 | ||
|
|
482cfee8d5 | ||
|
|
3fc41fac2c | ||
|
|
8b5e2058f3 | ||
|
|
5815e883a0 | ||
|
|
cc8e30e1d4 | ||
|
|
e5bc8c9550 | ||
|
|
a91e00337c | ||
|
|
b4e20e6289 | ||
|
|
dd86dfceb0 | ||
|
|
42a87e7fa4 | ||
|
|
315e953110 | ||
|
|
fa5c8b06ef | ||
|
|
5d8ce34973 | ||
|
|
b717b1361d | ||
|
|
45dcf6a878 | ||
|
|
0fb8809a28 |
@@ -49,6 +49,7 @@ hostapd_append_wpa_key_mgmt() {
|
||||
;;
|
||||
eap192)
|
||||
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
||||
[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256"
|
||||
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
||||
;;
|
||||
eap-eap192)
|
||||
|
||||
@@ -0,0 +1,24 @@
|
||||
--- a/src/ap/ubus.c
|
||||
+++ b/src/ap/ubus.c
|
||||
@@ -722,6 +722,7 @@ hostapd_switch_chan(struct ubus_context
|
||||
struct blob_attr *tb[__CSA_MAX];
|
||||
struct hostapd_data *hapd = get_hapd_from_object(obj);
|
||||
struct csa_settings css;
|
||||
+ int i;
|
||||
|
||||
blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg));
|
||||
|
||||
@@ -746,9 +747,10 @@ hostapd_switch_chan(struct ubus_context
|
||||
SET_CSA_SETTING(CSA_VHT, freq_params.vht_enabled, bool);
|
||||
SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool);
|
||||
|
||||
-
|
||||
- if (hostapd_switch_channel(hapd, &css) != 0)
|
||||
- return UBUS_STATUS_NOT_SUPPORTED;
|
||||
+ for (i = 0; i < hapd->iface->num_bss; i++) {
|
||||
+ if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||
+ return UBUS_STATUS_NOT_SUPPORTED;
|
||||
+ }
|
||||
return UBUS_STATUS_OK;
|
||||
#undef SET_CSA_SETTING
|
||||
}
|
||||
@@ -0,0 +1,186 @@
|
||||
--- a/src/ap/dfs.c
|
||||
+++ b/src/ap/dfs.c
|
||||
@@ -19,7 +19,7 @@
|
||||
#include "dfs.h"
|
||||
#include "beacon.h"
|
||||
#include "eloop.h"
|
||||
-
|
||||
+#include "ubus.h"
|
||||
|
||||
static int dfs_get_used_n_chans(struct hostapd_iface *iface, int *seg1)
|
||||
{
|
||||
@@ -1207,6 +1207,11 @@ static int hostapd_dfs_start_channel_swi
|
||||
break;
|
||||
}
|
||||
|
||||
+ if (!err) {
|
||||
+ wpa_printf(MSG_DEBUG, "Reporting DFS event to ubus");
|
||||
+ hostapd_ubus_handle_channel_switch_event(iface, HOSTAPD_UBUS_DFS_SWITCH, channel->freq);
|
||||
+ }
|
||||
+
|
||||
if (err) {
|
||||
wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback",
|
||||
err);
|
||||
--- a/src/ap/ubus.c
|
||||
+++ b/src/ap/ubus.c
|
||||
@@ -29,6 +29,8 @@ static int ctx_ref;
|
||||
static char** bss_lst = NULL;
|
||||
static size_t bss_nr = 0;
|
||||
|
||||
+static LIST_HEAD(chan_events);
|
||||
+
|
||||
static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
|
||||
{
|
||||
return container_of(obj, struct hapd_interfaces, ubus);
|
||||
@@ -714,6 +716,42 @@ static int hostapd_sessions(struct ubus_
|
||||
return 0;
|
||||
}
|
||||
|
||||
+static int hostapd_get_chan_switch_events(struct ubus_context *ctx,
|
||||
+ struct ubus_object *obj,
|
||||
+ struct ubus_request_data *req,
|
||||
+ const char *method,
|
||||
+ struct blob_attr *msg)
|
||||
+{
|
||||
+ void *a = NULL;
|
||||
+ void *t = NULL;
|
||||
+ struct hostapd_chan_event_list *entry, *tmp;
|
||||
+
|
||||
+ blob_buf_init(&b_ev, 0);
|
||||
+ a = blobmsg_open_table(&b_ev, "chan_switch_event");
|
||||
+ list_for_each_entry(entry, &chan_events, list) {
|
||||
+ t = blobmsg_open_table(&b_ev, "event");
|
||||
+ blobmsg_add_u32(&b_ev, "radio_name", entry->records.band);
|
||||
+ blobmsg_add_u32(&b_ev, "reason", entry->records.reason);
|
||||
+ blobmsg_add_u64(&b_ev, "timestamp", entry->records.ts);
|
||||
+ blobmsg_add_u32(&b_ev, "frequency", entry->records.freq);
|
||||
+ blobmsg_close_table(&b_ev, t);
|
||||
+ }
|
||||
+
|
||||
+ blobmsg_close_table(&b_ev, a);
|
||||
+ ubus_send_reply(ctx, req, b_ev.head);
|
||||
+
|
||||
+ /*delete list*/
|
||||
+
|
||||
+ if (!list_empty(&chan_events)) {
|
||||
+ list_for_each_entry_safe(entry, tmp, &chan_events, list) {
|
||||
+ list_del(&entry->list);
|
||||
+ free(entry);
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
static int
|
||||
hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
|
||||
struct ubus_request_data *req, const char *method,
|
||||
@@ -751,6 +789,9 @@ hostapd_switch_chan(struct ubus_context
|
||||
if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||
return UBUS_STATUS_NOT_SUPPORTED;
|
||||
}
|
||||
+
|
||||
+ hostapd_ubus_handle_channel_switch_event(hapd->iface, HOSTAPD_UBUS_HIGH_INTERFERENCE, css.freq_params.freq);
|
||||
+
|
||||
return UBUS_STATUS_OK;
|
||||
#undef SET_CSA_SETTING
|
||||
}
|
||||
@@ -1446,6 +1487,7 @@ static const struct ubus_method daemon_m
|
||||
UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
|
||||
UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
|
||||
UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list),
|
||||
+ UBUS_METHOD_NOARG("get_chan_switch_events", hostapd_get_chan_switch_events),
|
||||
};
|
||||
|
||||
static struct ubus_object_type daemon_object_type =
|
||||
@@ -1509,6 +1551,26 @@ ubus_event_cb(struct ubus_notify_request
|
||||
ureq->resp = ret;
|
||||
}
|
||||
|
||||
+void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface, int reason,
|
||||
+ int freq)
|
||||
+{
|
||||
+ struct hostapd_chan_event_list *rec = NULL;
|
||||
+ struct timespec ts;
|
||||
+ uint64_t timestamp = 0;
|
||||
+
|
||||
+ clock_gettime(CLOCK_REALTIME, &ts);
|
||||
+ timestamp = get_time_in_ms(&ts);
|
||||
+
|
||||
+ rec = os_zalloc(sizeof(struct hostapd_chan_event_list));
|
||||
+
|
||||
+ rec->records.reason = reason;
|
||||
+ rec->records.band = iface->freq;
|
||||
+ rec->records.ts = timestamp;
|
||||
+ rec->records.freq = freq;
|
||||
+
|
||||
+ list_add_tail(&rec->list, &chan_events);
|
||||
+}
|
||||
+
|
||||
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd,
|
||||
struct hostapd_ubus_request *req)
|
||||
{
|
||||
--- a/src/ap/ubus.h
|
||||
+++ b/src/ap/ubus.h
|
||||
@@ -17,9 +17,15 @@ enum hostapd_ubus_event_type {
|
||||
HOSTAPD_UBUS_DEAUTH_REQ,
|
||||
HOSTAPD_UBUS_FDATA_REQ,
|
||||
HOSTAPD_UBUS_IP_REQ,
|
||||
+ HOSTAPD_UBUS_CHAN_SWITCH,
|
||||
HOSTAPD_UBUS_TYPE_MAX
|
||||
};
|
||||
|
||||
+enum hostapd_ubus_chan_event_reason {
|
||||
+ HOSTAPD_UBUS_DFS_SWITCH,
|
||||
+ HOSTAPD_UBUS_HIGH_INTERFERENCE
|
||||
+};
|
||||
+
|
||||
struct hostapd_ubus_request {
|
||||
enum hostapd_ubus_event_type type;
|
||||
const struct ieee80211_mgmt *mgmt_frame;
|
||||
@@ -40,6 +46,7 @@ struct rrm_measurement_beacon_report;
|
||||
|
||||
#include <libubox/avl.h>
|
||||
#include <libubus.h>
|
||||
+#include <libubox/list.h>
|
||||
|
||||
struct hostapd_ubus_bss {
|
||||
struct ubus_object obj;
|
||||
@@ -121,11 +128,24 @@ struct hostapd_event_avl_rec {
|
||||
struct avl_node avl;
|
||||
};
|
||||
|
||||
+struct channel_switch_event {
|
||||
+ int band; /* Radio name*/
|
||||
+ uint8_t reason;
|
||||
+ uint64_t ts;
|
||||
+ uint32_t freq;
|
||||
+};
|
||||
+
|
||||
+struct hostapd_chan_event_list {
|
||||
+ struct channel_switch_event records;
|
||||
+ struct list_head list;
|
||||
+};
|
||||
+
|
||||
void hostapd_ubus_add_iface(struct hostapd_iface *iface);
|
||||
void hostapd_ubus_free_iface(struct hostapd_iface *iface);
|
||||
void hostapd_ubus_add_bss(struct hostapd_data *hapd);
|
||||
void hostapd_ubus_free_bss(struct hostapd_data *hapd);
|
||||
-
|
||||
+void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface,
|
||||
+ int reason, int channel);
|
||||
int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req);
|
||||
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req);
|
||||
void hostapd_ubus_notify(struct hostapd_data *hapd, const char *type, const u8 *mac);
|
||||
@@ -157,6 +177,11 @@ static inline void hostapd_ubus_free_bss
|
||||
{
|
||||
}
|
||||
|
||||
+static inline void hostapd_ubus_handle_channel_switch_event(struct hostapd_iface *iface,
|
||||
+ int reason, int channel)
|
||||
+{
|
||||
+}
|
||||
+
|
||||
static inline int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req)
|
||||
{
|
||||
return 0;
|
||||
@@ -8,8 +8,8 @@ PKG_LICENSE_FILES:=
|
||||
|
||||
PKG_SOURCE_URL:=https://github.com/greearb/ath10k-ct.git
|
||||
PKG_SOURCE_PROTO:=git
|
||||
PKG_SOURCE_DATE:=2020-08-26
|
||||
PKG_SOURCE_VERSION:=13319ff0b5dc3c86e8313f49fca583b829878736
|
||||
PKG_SOURCE_DATE:=2021-05-22b
|
||||
PKG_SOURCE_VERSION:=54a9ac02f1139596ea4361ebbc3e444955d86cfd
|
||||
#PKG_MIRROR_HASH:=97cf22a4a57381c7eb7a9b8a8b1e347e9711ce51c89db971b4ab9a35af476ece
|
||||
|
||||
# Build the 5.4 ath10k-ct driver version. Other option is "-4.19".
|
||||
|
||||
@@ -49,6 +49,7 @@ hostapd_append_wpa_key_mgmt() {
|
||||
;;
|
||||
eap192)
|
||||
append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
|
||||
[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-EAP-SHA256"
|
||||
[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
|
||||
;;
|
||||
eap-eap192)
|
||||
|
||||
@@ -1,7 +1,5 @@
|
||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
||||
===================================================================
|
||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/dfs.c
|
||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
||||
--- a/src/ap/dfs.c
|
||||
+++ b/src/ap/dfs.c
|
||||
@@ -18,7 +18,7 @@
|
||||
#include "drivers/driver.h"
|
||||
#include "dfs.h"
|
||||
@@ -23,10 +21,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/dfs.c
|
||||
if (err) {
|
||||
wpa_printf(MSG_WARNING, "DFS failed to schedule CSA (%d) - trying fallback",
|
||||
err);
|
||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
===================================================================
|
||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.c
|
||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
--- a/src/ap/ubus.c
|
||||
+++ b/src/ap/ubus.c
|
||||
@@ -29,6 +29,8 @@ static int ctx_ref;
|
||||
static char** bss_lst = NULL;
|
||||
static size_t bss_nr = 0;
|
||||
@@ -36,7 +32,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
|
||||
{
|
||||
return container_of(obj, struct hapd_interfaces, ubus);
|
||||
@@ -714,6 +716,43 @@ static int hostapd_sessions(struct ubus_
|
||||
@@ -714,6 +716,44 @@ static int hostapd_sessions(struct ubus_
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -48,7 +44,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
+{
|
||||
+ void *a = NULL;
|
||||
+ void *t = NULL;
|
||||
+ struct hostapd_chan_event_list *entry;
|
||||
+ struct hostapd_chan_event_list *entry, *tmp;
|
||||
+
|
||||
+ blob_buf_init(&b_ev, 0);
|
||||
+ a = blobmsg_open_table(&b_ev, "chan_switch_event");
|
||||
@@ -68,9 +64,10 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
+ /*delete list*/
|
||||
+
|
||||
+ if (!list_empty(&chan_events)) {
|
||||
+ list_for_each_entry(entry, &chan_events, list)
|
||||
+ list_for_each_entry_safe(entry, tmp, &chan_events, list)
|
||||
+ {
|
||||
+ list_del(&entry->list);
|
||||
+ free(entry);
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
@@ -80,7 +77,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
static int
|
||||
hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
|
||||
struct ubus_request_data *req, const char *method,
|
||||
@@ -749,6 +788,9 @@ hostapd_switch_chan(struct ubus_context
|
||||
@@ -749,6 +789,9 @@ hostapd_switch_chan(struct ubus_context
|
||||
|
||||
if (hostapd_switch_channel(hapd, &css) != 0)
|
||||
return UBUS_STATUS_NOT_SUPPORTED;
|
||||
@@ -90,7 +87,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
return UBUS_STATUS_OK;
|
||||
#undef SET_CSA_SETTING
|
||||
}
|
||||
@@ -1444,6 +1486,7 @@ static const struct ubus_method daemon_m
|
||||
@@ -1444,6 +1487,7 @@ static const struct ubus_method daemon_m
|
||||
UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
|
||||
UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
|
||||
UBUS_METHOD_NOARG("get_bss_list", hostapd_get_bss_list),
|
||||
@@ -98,7 +95,7 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
};
|
||||
|
||||
static struct ubus_object_type daemon_object_type =
|
||||
@@ -1507,6 +1550,28 @@ ubus_event_cb(struct ubus_notify_request
|
||||
@@ -1507,6 +1551,28 @@ ubus_event_cb(struct ubus_notify_request
|
||||
ureq->resp = ret;
|
||||
}
|
||||
|
||||
@@ -127,10 +124,8 @@ Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.c
|
||||
int hostapd_ubus_handle_rt_event(struct hostapd_data *hapd,
|
||||
struct hostapd_ubus_request *req)
|
||||
{
|
||||
Index: hostapd-2020-06-08-5a8b3662/src/ap/ubus.h
|
||||
===================================================================
|
||||
--- hostapd-2020-06-08-5a8b3662.orig/src/ap/ubus.h
|
||||
+++ hostapd-2020-06-08-5a8b3662/src/ap/ubus.h
|
||||
--- a/src/ap/ubus.h
|
||||
+++ b/src/ap/ubus.h
|
||||
@@ -17,9 +17,15 @@ enum hostapd_ubus_event_type {
|
||||
HOSTAPD_UBUS_DEAUTH_REQ,
|
||||
HOSTAPD_UBUS_FDATA_REQ,
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
--- a/src/ap/ubus.c
|
||||
+++ b/src/ap/ubus.c
|
||||
@@ -762,6 +762,7 @@ hostapd_switch_chan(struct ubus_context
|
||||
struct blob_attr *tb[__CSA_MAX];
|
||||
struct hostapd_data *hapd = get_hapd_from_object(obj);
|
||||
struct csa_settings css;
|
||||
+ int i;
|
||||
|
||||
blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg));
|
||||
|
||||
@@ -787,8 +788,10 @@ hostapd_switch_chan(struct ubus_context
|
||||
SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool);
|
||||
|
||||
|
||||
- if (hostapd_switch_channel(hapd, &css) != 0)
|
||||
- return UBUS_STATUS_NOT_SUPPORTED;
|
||||
+ for (i = 0; i < hapd->iface->num_bss; i++) {
|
||||
+ if (hostapd_switch_channel(hapd->iface->bss[i], &css) != 0)
|
||||
+ return UBUS_STATUS_NOT_SUPPORTED;
|
||||
+ }
|
||||
|
||||
hostapd_ubus_handle_channel_switch_event(hapd->iface,HOSTAPD_UBUS_HIGH_INTERFERENCE, css.freq_params.freq);
|
||||
|
||||
@@ -11,7 +11,7 @@ include $(INCLUDE_DIR)/package.mk
|
||||
|
||||
define Package/apc
|
||||
SECTION:=base
|
||||
DEPENDS:=+libev +libinterapcomm
|
||||
DEPENDS:=+libev +libinterapcomm +libubus +libubox
|
||||
CATEGORY:=Base system
|
||||
TITLE:=Access Point Coordinator
|
||||
endef
|
||||
@@ -33,5 +33,11 @@ endef
|
||||
define Package/apc/install
|
||||
$(INSTALL_DIR) $(1)/usr/bin
|
||||
$(INSTALL_DATA) $(PKG_BUILD_DIR)/apc $(1)/usr/bin
|
||||
chmod 0700 $(1)/usr/bin/apc
|
||||
$(INSTALL_DIR) $(1)/etc/init.d
|
||||
$(INSTALL_BIN) ./files/apc.init $(1)/etc/init.d/apc
|
||||
$(INSTALL_DIR) $(1)/etc/config
|
||||
$(INSTALL_BIN) ./files/apc.config $(1)/etc/config/apc
|
||||
|
||||
endef
|
||||
$(eval $(call BuildPackage,apc))
|
||||
|
||||
0
feeds/wlan-ap/apc/files/apc.config
Normal file
0
feeds/wlan-ap/apc/files/apc.config
Normal file
20
feeds/wlan-ap/apc/files/apc.init
Normal file
20
feeds/wlan-ap/apc/files/apc.init
Normal file
@@ -0,0 +1,20 @@
|
||||
#!/bin/sh /etc/rc.common
|
||||
|
||||
USE_PROCD=1
|
||||
START=40
|
||||
STOP=40
|
||||
|
||||
PROG="/usr/bin/apc"
|
||||
|
||||
start_service() {
|
||||
procd_open_instance
|
||||
echo "Starting APC"
|
||||
procd_set_param command ${PROG}
|
||||
procd_set_param respawn
|
||||
procd_close_instance
|
||||
}
|
||||
|
||||
stop_service() {
|
||||
echo "Killing APC"
|
||||
killall -s SIGTERM apc
|
||||
}
|
||||
@@ -3,19 +3,21 @@ srcdir ?= .
|
||||
VPATH ?= $(srcdir)/src
|
||||
|
||||
|
||||
LIBS = -lpthread -lrt -linterapcomm -lev
|
||||
LIBS = -lpthread -lrt -linterapcomm -lev -lubus -lubox
|
||||
$(call output,usr/sbin/wc-apc)
|
||||
|
||||
CFLAGS += -I./include/ \
|
||||
-I../include/
|
||||
|
||||
CFLAGS += -DUBUS_SUPPORT
|
||||
|
||||
CFLAGS += -Wall -g
|
||||
CFLAGS += -MMD -Wall -g -Wpointer-arith -Wcast-qual -Wshadow \
|
||||
-Waggregate-return -Wnested-externs -Wstrict-prototypes \
|
||||
-fno-omit-frame-pointer -g -rdynamic -fexceptions -funwind-tables -funsigned-char
|
||||
|
||||
OBJS := apc_main.o \
|
||||
hello.o iface.o neighbor.o apc.o
|
||||
hello.o iface.o neighbor.o apc.o ubus.o
|
||||
|
||||
all: apc
|
||||
|
||||
|
||||
@@ -262,6 +262,8 @@ struct apc_neighbor
|
||||
#define APC_IS_DROTHER 4 /* I'm on BCAST or NBMA and I'm not DR */
|
||||
#define APC_IS_BACKUP 5 /* I'm BDR */
|
||||
#define APC_IS_DR 6 /* I'm DR */
|
||||
#define APC_MAX_MODE 7
|
||||
|
||||
|
||||
/* Definitions for interface state machine */
|
||||
#define ISM_UP 0 /* Interface Up */
|
||||
|
||||
@@ -30,4 +30,9 @@ static inline timer * tm_new_set( void (*hook)(struct _timer *), void *data, uns
|
||||
return t;
|
||||
}
|
||||
|
||||
static inline void tm_free(timer *t)
|
||||
{
|
||||
free(t);
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
22
feeds/wlan-ap/apc/src/include/ubus.h
Normal file
22
feeds/wlan-ap/apc/src/include/ubus.h
Normal file
@@ -0,0 +1,22 @@
|
||||
/*
|
||||
* netifd - network interface daemon
|
||||
* Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2
|
||||
* as published by the Free Software Foundation
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*/
|
||||
#ifndef __NETIFD_UBUS_H
|
||||
#define __NETIFD_UBUS_H
|
||||
|
||||
extern struct ubus_context *ubus_ctx;
|
||||
|
||||
int ubus_init();
|
||||
void ubus_done(void);
|
||||
|
||||
#endif
|
||||
@@ -26,7 +26,8 @@ static void apc_dump( struct proto * P )
|
||||
static struct proto * apc_init(struct proto_config * c)
|
||||
{
|
||||
struct proto * P = mb_allocz(sizeof(struct apc_proto));
|
||||
|
||||
|
||||
printf("apc_init\n");
|
||||
P->cf = c;
|
||||
P->debug = c->debug;
|
||||
P->mrtdump = c->mrtdump;
|
||||
|
||||
@@ -21,9 +21,11 @@
|
||||
#include <nest/apcn.h>
|
||||
#include <apc.h>
|
||||
#include <protocol.h>
|
||||
#include <ubus.h>
|
||||
|
||||
static ev_io iac_io;
|
||||
static ev_timer check_timer;
|
||||
#include <libubus.h>
|
||||
static struct uloop_timeout check_timer;
|
||||
static void check_timer_handler(struct uloop_timeout *timeout);
|
||||
static unsigned int CheckIp;
|
||||
static int CheckCount;
|
||||
|
||||
@@ -228,8 +230,7 @@ int set_socket(void)
|
||||
/*************************************/
|
||||
|
||||
|
||||
static void check_timer_handler(struct ev_loop *loop, ev_timer *timer,
|
||||
int revents)
|
||||
static void check_timer_handler(struct uloop_timeout *timeout)
|
||||
{
|
||||
timers_go();
|
||||
if (WaitingToReelect)
|
||||
@@ -256,25 +257,45 @@ static void check_timer_handler(struct ev_loop *loop, ev_timer *timer,
|
||||
}
|
||||
|
||||
CheckCount = 0;
|
||||
if (ApcSpecSaved.IsApc == I_AM_APC)
|
||||
{
|
||||
//Radius stuff
|
||||
}
|
||||
}
|
||||
|
||||
uloop_timeout_set(&check_timer, 1000);
|
||||
uloop_timeout_add(&check_timer);
|
||||
|
||||
}
|
||||
|
||||
static void handle_signal(int signo)
|
||||
{
|
||||
system("/usr/opensync/bin/ovsh u APC_State dr_addr:=0.0.0.0 bdr_addr:=0.0.0.0 enabled:=false mode:=NC");
|
||||
}
|
||||
|
||||
static void set_signals(void)
|
||||
{
|
||||
struct sigaction s;
|
||||
|
||||
memset(&s, 0, sizeof(s));
|
||||
s.sa_handler = handle_signal;
|
||||
s.sa_flags = 0;
|
||||
sigaction(SIGINT, &s, NULL);
|
||||
sigaction(SIGTERM, &s, NULL);
|
||||
sigaction(SIGPIPE, &s, NULL);
|
||||
}
|
||||
|
||||
extern struct ubus_context *ubus_ctx;
|
||||
|
||||
int main(int argc, char *const* argv)
|
||||
{
|
||||
struct proto_config c;
|
||||
struct proto * apc_proto;
|
||||
struct ev_loop *loop = EV_DEFAULT;
|
||||
uloop_init();
|
||||
/*init term signals*/
|
||||
set_signals();
|
||||
|
||||
/*Socket*/
|
||||
set_socket();
|
||||
|
||||
/*Radius stuff*/
|
||||
|
||||
printf("Basic MAC\n");
|
||||
memset(MyBasicMac, 0, 6);
|
||||
if (get_mac_addr("br-wan", MyBasicMac) == 0) {
|
||||
printf("APC: br-wan mac:%02X:%02X:%02X:%02X:%02X:%02X\n",
|
||||
@@ -291,6 +312,7 @@ int main(int argc, char *const* argv)
|
||||
|
||||
/*get local ip of br-wan*/
|
||||
MyIpAddr = 0;
|
||||
printf("Getting br-wan IP\n");
|
||||
while(1)
|
||||
{
|
||||
GetLocalIpv4Addr((unsigned char *)&MyIpAddr, "br-wan");
|
||||
@@ -303,10 +325,12 @@ int main(int argc, char *const* argv)
|
||||
|
||||
/*listening interAP*/
|
||||
callback cb = receive_from_socket;
|
||||
|
||||
if (interap_recv(IAC_APC_ELECTION_PORT, cb, 1000,
|
||||
loop, &iac_io) < 0)
|
||||
NULL, NULL) < 0)
|
||||
printf("Error: Failed InterAP receive");
|
||||
|
||||
|
||||
memset(Timers, 0, sizeof(Timers));
|
||||
|
||||
memset(&c, 0, sizeof(struct proto_config));
|
||||
@@ -319,11 +343,14 @@ int main(int argc, char *const* argv)
|
||||
ApcProto = (struct apc_proto *)apc_proto;
|
||||
proto_apc.start(apc_proto);
|
||||
|
||||
ev_timer_init(&check_timer, check_timer_handler, 1, 1);
|
||||
check_timer.cb = check_timer_handler;
|
||||
uloop_timeout_set(&check_timer, 1000);
|
||||
uloop_timeout_add(&check_timer);
|
||||
|
||||
ev_timer_start(loop, &check_timer);
|
||||
|
||||
ev_run(loop, 0);
|
||||
ubus_init();
|
||||
uloop_run();
|
||||
uloop_done();
|
||||
ubus_done();
|
||||
|
||||
return(1);
|
||||
}
|
||||
|
||||
@@ -103,6 +103,7 @@ void apc_send_hello(struct apc_iface * ifa, int kind )
|
||||
struct apc_hello2_packet ps;
|
||||
unsigned int length, report = 0;
|
||||
struct apc_spec ApcSpec;
|
||||
char dst_ip[16];
|
||||
|
||||
if (WaitingToReelect )
|
||||
return;
|
||||
@@ -202,8 +203,7 @@ void apc_send_hello(struct apc_iface * ifa, int kind )
|
||||
|
||||
length += i * sizeof(u32);
|
||||
|
||||
printf("HELLO packet sent via %s\n", ifa->ifname );
|
||||
char *dst_ip = malloc(16);
|
||||
printf("HELLO packet sent via %s\n", ifa->ifname );
|
||||
memset(dst_ip, 0, 16);
|
||||
if ((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
||||
printf("Error: Cannot get IP for %s", IAC_IFACE);
|
||||
|
||||
@@ -65,7 +65,7 @@ void apc_iface_chstate(struct apc_iface * ifa, u8 state)
|
||||
|
||||
if (state == oldstate)
|
||||
return;
|
||||
|
||||
|
||||
printf("Interface %s changed state from %s to %s\n",
|
||||
ifa->ifname, apc_is_names[oldstate], apc_is_names[state]);
|
||||
|
||||
|
||||
@@ -33,11 +33,10 @@ reset_lists(struct apc_proto *p, struct apc_neighbor *n)
|
||||
{
|
||||
}
|
||||
|
||||
|
||||
struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa)
|
||||
{
|
||||
struct apc_neighbor * n = mb_allocz(sizeof(struct apc_neighbor));
|
||||
|
||||
printf("apc_new_neighbor\n");
|
||||
n->ifa = ifa;
|
||||
add_tail(&ifa->neigh_list, NODE n);
|
||||
n->adj = 0;
|
||||
@@ -52,7 +51,6 @@ struct apc_neighbor * apc_neighbor_new(struct apc_iface * ifa)
|
||||
return(n);
|
||||
}
|
||||
|
||||
|
||||
static void apc_neigh_down(struct apc_neighbor * n)
|
||||
{
|
||||
struct apc_iface * ifa = n->ifa;
|
||||
@@ -60,9 +58,10 @@ static void apc_neigh_down(struct apc_neighbor * n)
|
||||
rem_node(NODE n);
|
||||
|
||||
printf("Neighbor %x on %s removed", n->rid, ifa->ifname );
|
||||
tm_free(n->inactim);
|
||||
mb_free(n);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* apc_neigh_chstate - handles changes related to new or lod state of neighbor
|
||||
* @n: APC neighbor
|
||||
@@ -81,7 +80,8 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state)
|
||||
return;
|
||||
|
||||
printf("Neighbor %x on %s changed state from %s to %s\n",
|
||||
n->rid, ifa->ifname, apc_ns_names[old_state], apc_ns_names[state] );
|
||||
n->rid, ifa->ifname, apc_ns_names[old_state],
|
||||
apc_ns_names[state]);
|
||||
|
||||
n->state = state;
|
||||
|
||||
@@ -121,7 +121,6 @@ static void apc_neigh_chstate(struct apc_neighbor * n, u8 state)
|
||||
apc_iface_sm(ifa, ISM_NEICH);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* apc_neigh_sm - apc neighbor state machine
|
||||
* @n: neighor
|
||||
@@ -218,7 +217,6 @@ void apc_neigh_sm(struct apc_neighbor * n, int event)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static int can_do_adj(struct apc_neighbor * n)
|
||||
{
|
||||
struct apc_iface * ifa = n->ifa;
|
||||
@@ -257,13 +255,11 @@ static int can_do_adj(struct apc_neighbor * n)
|
||||
return i;
|
||||
}
|
||||
|
||||
|
||||
static inline u32 neigh_get_id(struct apc_proto *p, struct apc_neighbor *n)
|
||||
{
|
||||
return ipa_to_u32(n->ip);
|
||||
}
|
||||
|
||||
|
||||
static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
||||
{
|
||||
struct apc_neighbor *neigh, *n1, *n2;
|
||||
@@ -271,7 +267,7 @@ static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
||||
|
||||
n1 = NULL;
|
||||
n2 = NULL;
|
||||
WALK_LIST( neigh, nl ) /* First try those decl. themselves */
|
||||
WALK_LIST( neigh, nl ) /* First try those decl. themselves */
|
||||
{
|
||||
nid = neigh_get_id( p, neigh );
|
||||
|
||||
@@ -317,7 +313,6 @@ static struct apc_neighbor * elect_bdr( struct apc_proto * p, list nl)
|
||||
return( n1 );
|
||||
}
|
||||
|
||||
|
||||
static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl )
|
||||
{
|
||||
struct apc_neighbor *neigh, *n;
|
||||
@@ -351,7 +346,6 @@ static struct apc_neighbor * elect_dr( struct apc_proto * p, list nl )
|
||||
return( n );
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* apc_dr_election - (Backup) Designed Router election
|
||||
* @ifa: actual interface
|
||||
@@ -450,7 +444,6 @@ void apc_dr_election(struct apc_iface * ifa)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip)
|
||||
{
|
||||
struct apc_neighbor * n;
|
||||
@@ -463,7 +456,6 @@ struct apc_neighbor * find_neigh_by_ip(struct apc_iface * ifa, ip_addr ip)
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
static void inactivity_timer_hook(struct _timer * tmr)
|
||||
{
|
||||
struct apc_neighbor * n = (struct apc_neighbor *) tmr->data;
|
||||
|
||||
173
feeds/wlan-ap/apc/src/src/ubus.c
Normal file
173
feeds/wlan-ap/apc/src/src/ubus.c
Normal file
@@ -0,0 +1,173 @@
|
||||
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||
#define _GNU_SOURCE
|
||||
|
||||
#include <arpa/inet.h>
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
#include <ev.h>
|
||||
#include "ubus.h"
|
||||
#include <libubus.h>
|
||||
#include <libubox/blobmsg.h>
|
||||
#include <apc.h>
|
||||
#include <libubox/uloop.h>
|
||||
|
||||
struct ubus_context *ubus_ctx = NULL;
|
||||
static struct blob_buf b;
|
||||
static struct blob_buf nb;
|
||||
static const char *ubus_path;
|
||||
timer *notify_timer;
|
||||
extern struct apc_iface * apc_ifa;
|
||||
#define APC_NOTIFY_INTERVAL 30
|
||||
|
||||
struct apc_state {
|
||||
char mode[4];
|
||||
char dr_addr[17];
|
||||
char bdr_addr[17];
|
||||
bool enabled;
|
||||
} state;
|
||||
|
||||
static int
|
||||
apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj,
|
||||
struct ubus_request_data *req, const char *method,
|
||||
struct blob_attr *msg);
|
||||
|
||||
static void ubus_reconnect_timer(struct uloop_timeout *timeout);
|
||||
static struct uloop_timeout reconnect = {
|
||||
.cb = ubus_reconnect_timer,
|
||||
};
|
||||
|
||||
static void ubus_reconnect_timer(struct uloop_timeout *timeout)
|
||||
{
|
||||
if (ubus_reconnect(ubus_ctx, NULL) != 0) {
|
||||
printf("APC ubus failed to reconnect\n");
|
||||
uloop_timeout_set(&reconnect, 2000);
|
||||
return;
|
||||
}
|
||||
|
||||
printf("APC ubus reconnected\n");
|
||||
#ifdef FD_CLOEXEC
|
||||
fcntl(ubus_ctx->sock.fd, F_SETFD,
|
||||
fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC);
|
||||
#endif
|
||||
}
|
||||
|
||||
static void ubus_connection_lost(struct ubus_context *ctx)
|
||||
{
|
||||
printf("APC ubus connection lost\n");
|
||||
ubus_reconnect_timer(NULL);
|
||||
}
|
||||
|
||||
static const struct blobmsg_policy apc_policy = {
|
||||
.name = "info",
|
||||
.type = BLOBMSG_TYPE_STRING,
|
||||
};
|
||||
|
||||
static struct ubus_method apc_object_methods[] = {
|
||||
UBUS_METHOD_NOARG("info", apc_info_handle),
|
||||
};
|
||||
|
||||
static struct ubus_object_type apc_object_type =
|
||||
UBUS_OBJECT_TYPE("apc", apc_object_methods);
|
||||
|
||||
static struct ubus_object apc_object = {
|
||||
.name = "apc",
|
||||
.type = &apc_object_type,
|
||||
.methods = apc_object_methods,
|
||||
.n_methods = ARRAY_SIZE(apc_object_methods),
|
||||
};
|
||||
|
||||
static int
|
||||
apc_info_handle(struct ubus_context *ctx, struct ubus_object *obj,
|
||||
struct ubus_request_data *req, const char *method,
|
||||
struct blob_attr *msg)
|
||||
{
|
||||
blob_buf_init(&b, 0);
|
||||
blobmsg_add_string(&b, "mode", state.mode);
|
||||
blobmsg_add_string(&b, "dr_addr", state.dr_addr);
|
||||
blobmsg_add_string(&b, "bdr_addr", state.bdr_addr);
|
||||
blobmsg_add_u8(&b, "enabled", state.enabled);
|
||||
|
||||
ubus_notify(ctx, &apc_object, "apc", b.head, -1);
|
||||
ubus_send_event(ctx, "apc", b.head);
|
||||
ubus_send_reply(ctx, req, b.head);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static char apc_mode[APC_MAX_MODE][8] = {"DOWN", "LOOP", "WAITING", "PTP", "OR", "BDR", "DR"};
|
||||
void apc_update_state()
|
||||
{
|
||||
struct in_addr dr_addr;
|
||||
struct in_addr bdr_addr;
|
||||
dr_addr.s_addr = htonl(apc_ifa->drip);
|
||||
bdr_addr.s_addr = htonl(apc_ifa->bdrip);
|
||||
|
||||
state.enabled = true;
|
||||
if ((apc_ifa->state == APC_IS_DR) ||
|
||||
(apc_ifa->state == APC_IS_BACKUP) ||
|
||||
(apc_ifa->state == APC_IS_DROTHER)) {
|
||||
snprintf(state.mode, sizeof(state.mode), "%s",
|
||||
&apc_mode[apc_ifa->state][0]);
|
||||
snprintf(state.dr_addr, sizeof(state.dr_addr),
|
||||
"%s", inet_ntoa(dr_addr));
|
||||
snprintf(state.bdr_addr, sizeof(state.bdr_addr),
|
||||
"%s", inet_ntoa(bdr_addr));
|
||||
}
|
||||
else {
|
||||
snprintf(state.mode, sizeof(state.mode), "NC");
|
||||
snprintf(state.dr_addr, sizeof(state.dr_addr), "0.0.0.0");
|
||||
snprintf(state.bdr_addr, sizeof(state.bdr_addr), "0.0.0.0");
|
||||
}
|
||||
}
|
||||
|
||||
void apc_send_notification(struct _timer * tmr)
|
||||
{
|
||||
apc_update_state();
|
||||
|
||||
printf("APC send ubus notification\n");
|
||||
blob_buf_init(&nb, 0);
|
||||
blobmsg_add_string(&nb, "mode", state.mode);
|
||||
blobmsg_add_string(&nb, "dr_addr", state.dr_addr);
|
||||
blobmsg_add_string(&nb, "bdr_addr", state.bdr_addr);
|
||||
blobmsg_add_u8(&nb, "enabled", state.enabled);
|
||||
ubus_notify(ubus_ctx, &apc_object, "apc", nb.head, -1);
|
||||
}
|
||||
|
||||
static void add_object(struct ubus_object *obj)
|
||||
{
|
||||
int ret = ubus_add_object(ubus_ctx, obj);
|
||||
|
||||
if (ret != 0)
|
||||
fprintf(stderr, "Add object fail '%s': %s\n",
|
||||
obj->name, ubus_strerror(ret));
|
||||
}
|
||||
|
||||
int
|
||||
ubus_init(void) {
|
||||
ubus_ctx = ubus_connect(NULL);
|
||||
if (!ubus_ctx)
|
||||
return -EIO;
|
||||
|
||||
ubus_add_uloop(ubus_ctx);
|
||||
#ifdef FD_CLOEXEC
|
||||
fcntl(ubus_ctx->sock.fd, F_SETFD,
|
||||
fcntl(ubus_ctx->sock.fd, F_GETFD) | FD_CLOEXEC);
|
||||
#endif
|
||||
add_object(&apc_object);
|
||||
notify_timer = tm_new_set(apc_send_notification, NULL,
|
||||
0, APC_NOTIFY_INTERVAL);
|
||||
if (notify_timer) {
|
||||
printf("APC Start notify timer\n");
|
||||
tm_start(notify_timer, APC_NOTIFY_INTERVAL);
|
||||
}
|
||||
|
||||
ubus_ctx->connection_lost = ubus_connection_lost;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void
|
||||
ubus_done(void)
|
||||
{
|
||||
ubus_free(ubus_ctx);
|
||||
}
|
||||
@@ -11,6 +11,7 @@ include $(INCLUDE_DIR)/package.mk
|
||||
|
||||
define Package/libinterapcomm
|
||||
SECTION:=libs
|
||||
DEPENDS:=+libev +libubox +libubus
|
||||
CATEGORY:=Libraries
|
||||
TITLE:=Inter AP communication library
|
||||
endef
|
||||
|
||||
@@ -6,7 +6,7 @@ subdirs=src/test
|
||||
|
||||
CFLAGS += -O -Wall -Werror -Wshadow
|
||||
CFLAGS += -I./include/
|
||||
LIBS = -lev
|
||||
LIBS = -lev -lubox -lubus
|
||||
|
||||
all: $(LIBNAME) $(subdirs)
|
||||
|
||||
|
||||
@@ -7,12 +7,29 @@
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <interAPcomm.h>
|
||||
#include <libubox/uloop.h>
|
||||
|
||||
/*Receiver socket*/
|
||||
int recv_sock = -1;
|
||||
|
||||
recv_arg ra;
|
||||
|
||||
static void receive_data_uloop(struct uloop_fd *fd, unsigned int events)
|
||||
{
|
||||
void *recv_data;
|
||||
ssize_t recv_data_len;
|
||||
|
||||
recv_data = malloc(ra.len);
|
||||
memset(recv_data, 0, ra.len);
|
||||
if ((recv_data_len = recvfrom(recv_sock, recv_data, ra.len,
|
||||
0, NULL, 0)) < 0)
|
||||
printf("recvfrom() failed");
|
||||
|
||||
ra.cb(recv_data, recv_data_len);
|
||||
free(recv_data);
|
||||
|
||||
}
|
||||
|
||||
static void receive_data(struct ev_loop *ev, ev_io *io, int event)
|
||||
{
|
||||
void *recv_data;
|
||||
@@ -25,11 +42,14 @@ static void receive_data(struct ev_loop *ev, ev_io *io, int event)
|
||||
printf("recvfrom() failed");
|
||||
|
||||
ra.cb(recv_data, recv_data_len);
|
||||
free(recv_data);
|
||||
|
||||
}
|
||||
|
||||
int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned int len,
|
||||
struct ev_loop *loop, ev_io *io)
|
||||
static struct uloop_fd server;
|
||||
|
||||
int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t),
|
||||
unsigned int len, struct ev_loop *loop, ev_io *io)
|
||||
{
|
||||
struct sockaddr_in addr;
|
||||
int bcast_perm;
|
||||
@@ -65,8 +85,16 @@ int interap_recv(unsigned short port, int (*recv_cb)(void *, ssize_t), unsigned
|
||||
}
|
||||
|
||||
printf("Interap recving: p:%d\n", port);
|
||||
ev_io_init(io, receive_data, recv_sock, EV_READ);
|
||||
ev_io_start(loop, io);
|
||||
|
||||
if (io && loop) {
|
||||
ev_io_init(io, receive_data, recv_sock, EV_READ);
|
||||
ev_io_start(loop, io);
|
||||
} else {
|
||||
|
||||
server.cb = receive_data_uloop;
|
||||
server.fd = recv_sock;
|
||||
uloop_fd_add(&server, ULOOP_READ);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -3,7 +3,7 @@ OBJS = interapcommtest.o
|
||||
|
||||
CFLAGS += -Wall $(EXTRA_CFLAGS) $(extra_cflags-y)
|
||||
|
||||
LIBS = -L ../../ -linterapcomm -lev
|
||||
LIBS = -L ../../ -linterapcomm -lev -lubox -lubus
|
||||
|
||||
CFLAGS += -I. \
|
||||
-I../../include/
|
||||
|
||||
@@ -6,6 +6,8 @@
|
||||
#include <ev.h>
|
||||
#include <interAPcomm.h>
|
||||
|
||||
#include <libubus.h>
|
||||
|
||||
struct my_data {
|
||||
int x;
|
||||
char y;
|
||||
@@ -13,7 +15,8 @@ struct my_data {
|
||||
};
|
||||
|
||||
|
||||
int recv_process(void *data) {
|
||||
int recv_process(void *data, ssize_t n)
|
||||
{
|
||||
struct my_data *dat = (struct my_data*) data;
|
||||
|
||||
printf("Recv process: %d, %c, %d\n", dat->x, dat->y, dat->z);
|
||||
@@ -22,34 +25,37 @@ int recv_process(void *data) {
|
||||
|
||||
int main (int argc, char *argv[ ])
|
||||
{
|
||||
unsigned int send = atoi(argv[1]); /* First arg: broadcast port */
|
||||
unsigned short port = 50000;
|
||||
unsigned int send = atoi(argv[1]);
|
||||
unsigned short port = 50020;
|
||||
// char *dst_ip = "255.255.255.255";
|
||||
char *dst_ip = "192.168.9.255";
|
||||
char *dst_ip = "10.42.0.255";
|
||||
// char *data = "InterAP Hello";
|
||||
struct my_data data;
|
||||
data.x = 1001;
|
||||
data.y = 'H';
|
||||
data.z = 3003;
|
||||
|
||||
// callback cb = recv_process;
|
||||
|
||||
|
||||
printf("arg1 = %d\n", send);
|
||||
printf("send = %d\n", send);
|
||||
|
||||
if (send) {
|
||||
printf("Send");
|
||||
interap_send(port, dst_ip, &data, sizeof(data));
|
||||
while (1)
|
||||
{
|
||||
sleep(3);
|
||||
printf("Sending...\n");
|
||||
interap_send(port, dst_ip, &data, sizeof(data));
|
||||
}
|
||||
}
|
||||
else {
|
||||
printf("Recieve");
|
||||
// interap_recv(port, cb, sizeof(struct my_data));
|
||||
uloop_init();
|
||||
callback cb = recv_process;
|
||||
|
||||
interap_recv(port, cb, sizeof(struct my_data), NULL, NULL);
|
||||
uloop_run();
|
||||
uloop_done();
|
||||
|
||||
}
|
||||
|
||||
while (1)
|
||||
{
|
||||
sleep(3);
|
||||
printf("In while loop\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -1,11 +1,35 @@
|
||||
#!/bin/sh
|
||||
|
||||
if [ $# -ne 1 ] ; then
|
||||
echo "Usage: $0 <redirector address>" >&2
|
||||
exit 1
|
||||
AP_PRIVATE_KEY_FILE="/usr/opensync/certs/client_dec.key"
|
||||
AP_CERTIFICATE_FILE="/usr/opensync/certs/client.pem"
|
||||
AP_DEVICE_ID_FILE="/usr/opensync/certs/client_deviceid.txt"
|
||||
DIGICERT_API_URI="clientauth.one.digicert.com"
|
||||
|
||||
if [ "$1" = "-h" ]; then
|
||||
echo "Usage: $0 [redirector address]" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
redirector_addr=$1
|
||||
# Query DigiCert's API if redirector wasn't specified
|
||||
if [ -z "$1" ]; then
|
||||
if [ ! -f "$AP_DEVICE_ID_FILE" ]; then
|
||||
echo "Device ID file $AP_DEVICE_ID_FILE does not exist. Make sure to create it or specify the redirector address manually."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# TODO: this command should be retried if it fails
|
||||
digicert_device_id=`cat ${AP_DEVICE_ID_FILE}`
|
||||
device_data=`curl -s \
|
||||
--key "${AP_PRIVATE_KEY_FILE}" \
|
||||
--cert "${AP_CERTIFICATE_FILE}" \
|
||||
"https://${DIGICERT_API_URI}/iot/api/v2/device/${digicert_device_id}"`
|
||||
|
||||
controller_url=`echo ${device_data} | jsonfilter -e '@.fields[@.name="Redirector"].value'`
|
||||
# TODO: we should get the port with the redirector record and only default to 6643 if no port was specified
|
||||
redirector_addr="ssl:${controller_url}:6643"
|
||||
else
|
||||
redirector_addr=$1
|
||||
fi
|
||||
|
||||
uci set system.tip.redirector="${redirector_addr}"
|
||||
uci commit system
|
||||
|
||||
@@ -10,11 +10,11 @@ hwmode=$(uci get wireless.${radio}.hwmode)
|
||||
|
||||
[ "${hwmode}" = "11a" ] && band=5 || band=2
|
||||
|
||||
bcn_rate=$(uci get wireless.${DEVICENAME}.bcn_rate)
|
||||
bcn_rate=$(($(uci get wireless.${DEVICENAME}.bcn_rate)/10))
|
||||
mcast_rate=$(uci get wireless.${DEVICENAME}.mcast_rate)
|
||||
|
||||
# ath10k rate-codes: 0x43 1M, 0x42 2M, 0x41 5.5M, 0x40 11M, 0x3 6M, 0x7 9M, 0x2 12M, 0x6 18M, 0x1 24M, 0x5 36M, 0x0 48M, 0x4 54M, 0xFF default
|
||||
rate_codes="1:0x43 2:0x42 5.5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4"
|
||||
rate_codes="1:0x43 2:0x42 5:0x41 11:0x40 6:0x3 9:0x7 12:0x2 18:0x6 24:0x1 36:0x5 48:0x0 54:0x4"
|
||||
|
||||
# Default codes
|
||||
beacon_code=0xFF
|
||||
@@ -33,6 +33,6 @@ done
|
||||
|
||||
# set rates
|
||||
logger -t hotplug "Set Tx rates for device ${DEVICENAME}"
|
||||
sleep 5
|
||||
sleep 20
|
||||
echo "${DEVICENAME} beacon ${band} ${beacon_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
||||
echo "${DEVICENAME} mcast ${band} ${mcast_code}" > /sys/kernel/debug/ieee80211/${phy}/ath10k/set_rates
|
||||
@@ -0,0 +1,142 @@
|
||||
Index: opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema
|
||||
+++ opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||
@@ -9368,6 +9368,68 @@
|
||||
}
|
||||
},
|
||||
"isRoot": true
|
||||
+ },
|
||||
+ "APC_Config": {
|
||||
+ "columns": {
|
||||
+ "enabled": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "boolean"
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "isRoot": true,
|
||||
+ "maxRows": 1
|
||||
+ },
|
||||
+ "APC_State": {
|
||||
+ "columns": {
|
||||
+ "dr_addr": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "bdr_addr": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "enabled": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "boolean"
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "mode": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "enum": [
|
||||
+ "set",
|
||||
+ [
|
||||
+ "DR",
|
||||
+ "BDR",
|
||||
+ "OR",
|
||||
+ "NC"
|
||||
+ ]
|
||||
+ ]
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "isRoot": true,
|
||||
+ "maxRows": 1
|
||||
}
|
||||
}
|
||||
}
|
||||
Index: opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||
+++ opensync-2.0.5.0/platform/openwrt/src/lib/target/src/radio_ubus.c
|
||||
@@ -10,6 +10,7 @@
|
||||
extern struct ev_loop *wifihal_evloop;
|
||||
static struct ubus_context *ubus;
|
||||
extern struct ev_loop *wifihal_evloop;
|
||||
+extern void apc_state_set(struct blob_attr *msg);
|
||||
|
||||
int hapd_rrm_enable(char *name, int neighbor, int beacon)
|
||||
{
|
||||
@@ -179,6 +180,7 @@ radio_ubus_add_vif_cb(struct ubus_contex
|
||||
return UBUS_STATUS_OK;
|
||||
}
|
||||
|
||||
+
|
||||
static const struct ubus_method radio_ubus_methods[] = {
|
||||
UBUS_METHOD("dbg_add_vif", radio_ubus_add_vif_cb, add_vif_policy),
|
||||
UBUS_METHOD("dummy", radio_ubus_dummy_cb, dummy_policy),
|
||||
@@ -201,8 +203,36 @@ static void radio_ubus_connect(struct ub
|
||||
ubus_add_object(ubus, &radio_ubus_object);
|
||||
}
|
||||
|
||||
+static int radio_ubus_notify(struct ubus_context *ctx, struct ubus_object *obj,
|
||||
+ struct ubus_request_data *req, const char *method,
|
||||
+ struct blob_attr *msg)
|
||||
+{
|
||||
+ char *str;
|
||||
+
|
||||
+ str = blobmsg_format_json(msg, true);
|
||||
+ LOGD("ubus: Received ubus notify '%s': %s\n", method, str);
|
||||
+ free(str);
|
||||
+
|
||||
+ if (!strncmp(method, "apc", 3)) {
|
||||
+ LOGD("APC notification Received");
|
||||
+ apc_state_set(msg);
|
||||
+ }
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+
|
||||
+
|
||||
static struct ubus_instance ubus_instance = {
|
||||
.connect = radio_ubus_connect,
|
||||
+ .notify = radio_ubus_notify,
|
||||
+ .list = {
|
||||
+ {
|
||||
+ .path = "apc",
|
||||
+ },
|
||||
+ },
|
||||
+ .len = 1,
|
||||
+
|
||||
};
|
||||
|
||||
int radio_ubus_init(void)
|
||||
Index: opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/src/lib/schema/inc/schema_consts.h
|
||||
+++ opensync-2.0.5.0/src/lib/schema/inc/schema_consts.h
|
||||
@@ -154,6 +154,7 @@ typedef enum {
|
||||
#define SCHEMA_CONSTS_DISABLE_B_RATES "disable_b_rates"
|
||||
#define SCHEMA_CONSTS_IEEE80211k "ieee80211k"
|
||||
#define SCHEMA_CONSTS_DYNAMIC_VLAN "dynamic_vlan"
|
||||
+#define SCHEMA_CONSTS_RADPROXY "radproxy"
|
||||
|
||||
/* radio Custom options */
|
||||
#define SCHEMA_CONSTS_LOCAL_PWR_CONSTRAINT "local_pwr_constraint"
|
||||
@@ -0,0 +1,270 @@
|
||||
Index: opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/interfaces/opensync.ovsschema
|
||||
+++ opensync-2.0.5.0/interfaces/opensync.ovsschema
|
||||
@@ -199,6 +199,59 @@
|
||||
"type": "integer"
|
||||
}
|
||||
}
|
||||
+ },
|
||||
+ "qr_code": {
|
||||
+ "type": {
|
||||
+ "key": "string",
|
||||
+ "value": {
|
||||
+ "type": "string",
|
||||
+ "maxLength": 128
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": "unlimited"
|
||||
+ }
|
||||
+ },
|
||||
+ "model_description": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "manufacturer_name": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "manufacturer_date": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "manufacturer_url": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "reference_design": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "certification_region": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
},
|
||||
"isRoot": true,
|
||||
Index: opensync-2.0.5.0/src/lib/target/inc/target.h
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/src/lib/target/inc/target.h
|
||||
+++ opensync-2.0.5.0/src/lib/target/inc/target.h
|
||||
@@ -332,6 +332,115 @@ bool target_hw_revision_get(void *buff,
|
||||
*/
|
||||
bool target_platform_version_get(void *buff, size_t buffsz);
|
||||
|
||||
+/**
|
||||
+ * @brief Return device model revision
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * model revision. The model revision is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_model_revision_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device model description
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * model description. The model description is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_model_description_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device manufacturer name
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * manufacturer name. The manufacturer name is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_manuf_name_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device manufacturer date
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * manufacturer date. The manufacturer date is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_manuf_date_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device manufacturer url
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * manufacturer url. The manufacturer url is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_manuf_url_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device manufacturer name abbreviation
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * manufacturer name abbreviation. This is one of the pieces that form
|
||||
+ * the QR code entry which is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_manuf_abbr_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device reference design
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * reference design. The reference design is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_ref_design_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device certification region
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * certification region. The certification region is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_cert_region_get(void *buff, size_t buffsz);
|
||||
+
|
||||
+/**
|
||||
+ * @brief Return device mac address
|
||||
+ *
|
||||
+ * This function provides a null terminated byte string containing the
|
||||
+ * mac address. The mac address is a part of AWLAN_Node table.
|
||||
+ *
|
||||
+ * @param buff pointer to a string buffer
|
||||
+ * @param buffsz size of string buffer
|
||||
+ * @return true on success
|
||||
+ */
|
||||
+bool target_mac_addr_get(void *buff, size_t buffsz);
|
||||
+
|
||||
/// @} LIB_TARGET_ENTITY
|
||||
|
||||
/// @defgroup LIB_TARGET_MAP Interface Mapping API
|
||||
Index: opensync-2.0.5.0/src/dm/src/dm_ovsdb.c
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/src/dm/src/dm_ovsdb.c
|
||||
+++ opensync-2.0.5.0/src/dm/src/dm_ovsdb.c
|
||||
@@ -326,7 +326,7 @@ void fill_entity_data(struct schema_AWLA
|
||||
s_awlan_node->sku_number_exists = true;
|
||||
}
|
||||
|
||||
- if (true == target_hw_revision_get(buff, sizeof(buff)))
|
||||
+ if (true == target_model_revision_get(buff, sizeof(buff)))
|
||||
{
|
||||
STRSCPY(s_awlan_node->revision, buff);
|
||||
}
|
||||
@@ -359,6 +359,58 @@ void fill_entity_data(struct schema_AWLA
|
||||
}
|
||||
s_awlan_node->model_exists = true;
|
||||
|
||||
+ if (true == target_model_description_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->model_description, buff);
|
||||
+ s_awlan_node->model_description_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_manuf_name_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->manufacturer_name, buff);
|
||||
+ s_awlan_node->manufacturer_name_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_manuf_date_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->manufacturer_date, buff);
|
||||
+ s_awlan_node->manufacturer_date_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_manuf_url_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->manufacturer_url, buff);
|
||||
+ s_awlan_node->manufacturer_url_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_ref_design_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->reference_design, buff);
|
||||
+ s_awlan_node->reference_design_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_cert_region_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->certification_region, buff);
|
||||
+ s_awlan_node->certification_region_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ if (true == target_mac_addr_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ STRSCPY(s_awlan_node->id, buff);
|
||||
+ s_awlan_node->id_exists = true;
|
||||
+ }
|
||||
+
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DT", "AP");
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "DM", s_awlan_node->id);
|
||||
+ if (true == target_manuf_abbr_get(buff, sizeof(buff)))
|
||||
+ {
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "VN", buff);
|
||||
+ }
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "SN", s_awlan_node->serial_number);
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "MN", s_awlan_node->model);
|
||||
+ SCHEMA_KEY_VAL_APPEND(s_awlan_node->qr_code, "HW", s_awlan_node->revision);
|
||||
+
|
||||
LOG(NOTICE, "Device entity {serial=%s id=%s version=%s platform=%s sku=%s}",
|
||||
s_awlan_node->serial_number,
|
||||
s_awlan_node->id,
|
||||
@@ -422,6 +474,13 @@ bool act_update_entity (void)
|
||||
"sku_number",
|
||||
"upgrade_status",
|
||||
"upgrade_timer",
|
||||
+ "qr_code",
|
||||
+ "model_description",
|
||||
+ "manufacturer_name",
|
||||
+ "manufacturer_date",
|
||||
+ "manufacturer_url",
|
||||
+ "reference_design",
|
||||
+ "certification_region",
|
||||
NULL)
|
||||
);
|
||||
|
||||
113
feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
Normal file
113
feeds/wlan-ap/opensync/patches/34-radsec-schema-consts.patch
Normal file
@@ -0,0 +1,113 @@
|
||||
--- a/interfaces/opensync.ovsschema
|
||||
+++ b/interfaces/opensync.ovsschema
|
||||
@@ -9439,6 +9439,110 @@
|
||||
},
|
||||
"isRoot": true,
|
||||
"maxRows": 1
|
||||
+ },
|
||||
+ "Radius_Proxy_Config": {
|
||||
+ "columns": {
|
||||
+ "radius_config_name": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ },
|
||||
+ "min": 1,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "radsec": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "boolean"
|
||||
+ },
|
||||
+ "min": 1,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "server": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ },
|
||||
+ "min": 1,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "port": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "integer"
|
||||
+ },
|
||||
+ "min": 1,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "secret": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string"
|
||||
+ },
|
||||
+ "min": 1,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "ca_cert": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "minLength": 1,
|
||||
+ "maxLength": 256
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "client_cert": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "minLength": 1,
|
||||
+ "maxLength": 256
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "client_key": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "minLength": 1,
|
||||
+ "maxLength": 256
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "passphrase": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "minLength": 0,
|
||||
+ "maxLength": 128
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 1
|
||||
+ }
|
||||
+ },
|
||||
+ "realm": {
|
||||
+ "type": {
|
||||
+ "key": {
|
||||
+ "type": "string",
|
||||
+ "maxLength": 256
|
||||
+ },
|
||||
+ "min": 0,
|
||||
+ "max": 16
|
||||
+ }
|
||||
+ }
|
||||
+ },
|
||||
+ "isRoot": true
|
||||
}
|
||||
}
|
||||
}
|
||||
34
feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
Normal file
34
feeds/wlan-ap/opensync/patches/35-channel-switch-fix.patch
Normal file
@@ -0,0 +1,34 @@
|
||||
Index: opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c
|
||||
===================================================================
|
||||
--- opensync-2.0.5.0.orig/src/lib/datapipeline/src/dppline.c
|
||||
+++ opensync-2.0.5.0/src/lib/datapipeline/src/dppline.c
|
||||
@@ -652,8 +652,8 @@ static bool dppline_copysts(dppline_stat
|
||||
dst->u.events.client_event_qty++;
|
||||
}
|
||||
|
||||
- size = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t);
|
||||
- dst->u.events.client_event_list = calloc(1, size);
|
||||
+ int size_cl = dst->u.events.client_event_qty * sizeof(dpp_event_record_session_t);
|
||||
+ dst->u.events.client_event_list = calloc(1, size_cl);
|
||||
int count = 0;
|
||||
ds_dlist_foreach(&report_data->client_event_list, result)
|
||||
{
|
||||
@@ -671,8 +671,8 @@ static bool dppline_copysts(dppline_stat
|
||||
dst->u.events.channel_event_qty++;
|
||||
}
|
||||
|
||||
- size = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t);
|
||||
- dst->u.events.channel_event_list = calloc(1, size);
|
||||
+ int size_ch = dst->u.events.channel_event_qty * sizeof(dpp_event_record_channel_switch_t);
|
||||
+ dst->u.events.channel_event_list = calloc(1, size_ch);
|
||||
ds_dlist_foreach(&report_data->channel_switch_list, channel_result)
|
||||
{
|
||||
assert(count < (int)dst->u.events.channel_event_qty);
|
||||
@@ -680,6 +680,7 @@ static bool dppline_copysts(dppline_stat
|
||||
sizeof(dpp_event_record_channel_switch_t));
|
||||
count++;
|
||||
}
|
||||
+ size = size_cl + size_ch;
|
||||
|
||||
} break;
|
||||
|
||||
@@ -21,4 +21,6 @@ extern int hapd_rrm_set_neighbors(char *name, struct rrm_neighbor *neigh, int co
|
||||
|
||||
extern void radio_maverick(void *arg);
|
||||
|
||||
int nl80211_channel_get(char *name, unsigned int *chan);
|
||||
|
||||
#endif
|
||||
|
||||
@@ -0,0 +1,38 @@
|
||||
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||
|
||||
#ifndef RADIUS_PROXY_H_INCLUDED
|
||||
#define RADIUS_PROXY_H_INCLUDED
|
||||
|
||||
#include <stdbool.h>
|
||||
#include <jansson.h>
|
||||
#include <ev.h>
|
||||
#include <sys/time.h>
|
||||
#include <syslog.h>
|
||||
|
||||
#include "log.h"
|
||||
#include "os_nif.h"
|
||||
|
||||
#include "target.h"
|
||||
#include "dppline.h"
|
||||
|
||||
#include "os.h"
|
||||
#include "util.h"
|
||||
#include "ovsdb.h"
|
||||
#include "ovsdb_update.h"
|
||||
#include "ovsdb_sync.h"
|
||||
#include "ovsdb_table.h"
|
||||
#include "ovsdb_cache.h"
|
||||
#include "schema.h"
|
||||
#include "target.h"
|
||||
|
||||
#include "utils.h"
|
||||
#include <libubox/list.h>
|
||||
#include <evsched.h>
|
||||
|
||||
extern ovsdb_table_t table_Radius_Proxy_Config;
|
||||
|
||||
void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *mon,
|
||||
struct schema_Radius_Proxy_Config *old, struct schema_Radius_Proxy_Config *conf);
|
||||
|
||||
#endif /* RADIUS_PROXY_H_INCLUDED */
|
||||
|
||||
@@ -13,6 +13,7 @@ struct mode_map {
|
||||
char *ucihwmode;
|
||||
char *htmode;
|
||||
char *ucihtmode;
|
||||
int sec_channel_offset;
|
||||
};
|
||||
|
||||
extern struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode);
|
||||
@@ -20,6 +21,7 @@ extern struct mode_map *mode_map_get_cloud(const char *htmode, const char *hwmod
|
||||
|
||||
extern int vif_get_mac(char *vap, char *mac);
|
||||
extern int vif_is_ready(const char *name);
|
||||
bool vif_get_key_for_key_distr(const char *secret, char *key_str);
|
||||
|
||||
#define blobmsg_add_bool blobmsg_add_u8
|
||||
extern int blobmsg_add_hex16(struct blob_buf *buf, const char *name, uint16_t val);
|
||||
@@ -38,4 +40,5 @@ extern int iface_is_up(const char *ifname);
|
||||
extern int net_get_mtu(char *iface);
|
||||
extern int net_get_mac(char *iface, char *mac);
|
||||
extern int net_is_bridge(char *iface);
|
||||
extern char* get_max_channel_bw_channel(int channel_freq, const char* htmode);
|
||||
#endif
|
||||
|
||||
@@ -46,6 +46,7 @@ UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/sysupgrade.c
|
||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/dhcpdiscovery.c
|
||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c
|
||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c
|
||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_proxy.c
|
||||
|
||||
CONFIG_USE_KCONFIG=y
|
||||
CONFIG_INET_ETH_LINUX=y
|
||||
|
||||
@@ -258,12 +258,8 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate)
|
||||
} else if (!strcmp(opt, "authentication")) {
|
||||
if(tc[NDS_ATTR_AUTHENTICATION]) {
|
||||
buf = blobmsg_get_string(tc[NDS_ATTR_AUTHENTICATION]);
|
||||
if (!strcmp(buf, "None")) {
|
||||
if (!strcmp(buf, "None") || !strcmp(buf, "username") || !strcmp(buf, "radius")) {
|
||||
|
||||
set_captive_portal_state(vstate, &index,
|
||||
captive_portal_options_table[i],
|
||||
buf);
|
||||
} else if (!strcmp(buf,"username")) {
|
||||
set_captive_portal_state(vstate, &index,
|
||||
captive_portal_options_table[i],
|
||||
buf);
|
||||
@@ -596,7 +592,7 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
||||
blobmsg_add_string(&cap, "enabled", "1");
|
||||
blobmsg_add_string(&cap, "gatewayinterface","br-lan");
|
||||
blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh");
|
||||
ipset_create(ifname);
|
||||
ipset_create("opennds");
|
||||
d = blobmsg_open_array(&cap, "preauthenticated_users");
|
||||
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
||||
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
||||
@@ -616,8 +612,12 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
||||
else if (strcmp(opt, "radius_server_secret") == 0)
|
||||
blobmsg_add_string(&cap, "radius_server_secret", value);
|
||||
|
||||
else if (strcmp(opt, "radius_auth_type") == 0)
|
||||
blobmsg_add_string(&cap, "radius_auth_type", value);
|
||||
else if (strcmp(opt, "radius_auth_type") == 0) {
|
||||
if(!strcmp(value, "MSCHAPv2"))
|
||||
blobmsg_add_string(&cap, "radius_auth_type", "MSCHAPV2");
|
||||
else
|
||||
blobmsg_add_string(&cap, "radius_auth_type", value);
|
||||
}
|
||||
|
||||
else if (strcmp(opt, "session_timeout") == 0)
|
||||
blobmsg_add_string(&cap, "sessiontimeout", value);
|
||||
|
||||
@@ -26,11 +26,16 @@
|
||||
#include "captive.h"
|
||||
#include "rrm_config.h"
|
||||
#include "vlan.h"
|
||||
#include "radius_proxy.h"
|
||||
|
||||
ovsdb_table_t table_Hotspot20_Config;
|
||||
ovsdb_table_t table_Hotspot20_OSU_Providers;
|
||||
ovsdb_table_t table_Hotspot20_Icon_Config;
|
||||
|
||||
ovsdb_table_t table_APC_Config;
|
||||
ovsdb_table_t table_APC_State;
|
||||
unsigned int radproxy_apc;
|
||||
|
||||
static struct uci_package *wireless;
|
||||
struct uci_context *uci;
|
||||
struct blob_buf b = { };
|
||||
@@ -186,7 +191,7 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C
|
||||
struct schema_Wifi_Radio_State rstate;
|
||||
char phy[6];
|
||||
int antenna;
|
||||
int32_t chan;
|
||||
uint32_t chan = 0;
|
||||
|
||||
LOGT("%s: get state", s->e.name);
|
||||
|
||||
@@ -211,7 +216,7 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C
|
||||
}
|
||||
|
||||
if (tb[WDEV_ATTR_CHANNEL]) {
|
||||
chan = get_current_channel(phy);
|
||||
nl80211_channel_get(phy, &chan);
|
||||
if(chan)
|
||||
SCHEMA_SET_INT(rstate.channel, chan);
|
||||
else
|
||||
@@ -401,8 +406,9 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf,
|
||||
}
|
||||
|
||||
if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) {
|
||||
struct mode_map *m = mode_map_get_uci(rconf->freq_band, rconf->ht_mode,
|
||||
rconf->hw_mode);
|
||||
int channel_freq;
|
||||
channel_freq = ieee80211_channel_to_frequency(rconf->channel);
|
||||
struct mode_map *m = mode_map_get_uci(rconf->freq_band, get_max_channel_bw_channel(channel_freq, rconf->ht_mode), rconf->hw_mode);
|
||||
if (m) {
|
||||
blobmsg_add_string(&b, "htmode", m->ucihtmode);
|
||||
blobmsg_add_string(&b, "hwmode", m->ucihwmode);
|
||||
@@ -669,6 +675,157 @@ static void callback_Hotspot20_Icon_Config(ovsdb_update_monitor_t *mon,
|
||||
|
||||
}
|
||||
|
||||
enum {
|
||||
WIF_APC_ENABLE,
|
||||
__WIF_APC_MAX,
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy apc_enpolicy[__WIF_APC_MAX] = {
|
||||
[WIF_APC_ENABLE] = { .name = "enabled", BLOBMSG_TYPE_BOOL },
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list apc_param = {
|
||||
.n_params = __WIF_APC_MAX,
|
||||
.params = apc_enpolicy,
|
||||
};
|
||||
|
||||
void APC_config_update(struct schema_APC_Config *conf)
|
||||
{
|
||||
struct uci_package *apc;
|
||||
struct blob_buf apcb = { };
|
||||
int rc = 0;
|
||||
|
||||
LOGD("APC: APC_config_update");
|
||||
|
||||
rc = uci_load(uci, "apc", &apc);
|
||||
if (rc)
|
||||
{
|
||||
LOGD("%s: uci_load failed with rc %d", __func__, rc);
|
||||
}
|
||||
|
||||
blob_buf_init(&apcb, 0);
|
||||
|
||||
if (conf->enabled_changed) {
|
||||
if (conf->enabled == true) {
|
||||
blobmsg_add_bool(&apcb, "enabled", 1);
|
||||
system("/etc/init.d/apc start");
|
||||
}
|
||||
else {
|
||||
blobmsg_add_bool(&apcb, "enabled", 0);
|
||||
system("/etc/init.d/apc stop");
|
||||
}
|
||||
}
|
||||
|
||||
blob_to_uci_section(uci, "apc", "apc", "apc",
|
||||
apcb.head, &apc_param, NULL);
|
||||
|
||||
uci_commit(uci, &apc, false);
|
||||
uci_unload(uci, apc);
|
||||
}
|
||||
|
||||
static void callback_APC_Config(ovsdb_update_monitor_t *mon,
|
||||
struct schema_APC_Config *old,
|
||||
struct schema_APC_Config *conf)
|
||||
{
|
||||
if (mon->mon_type != OVSDB_UPDATE_DEL)
|
||||
APC_config_update(conf);
|
||||
|
||||
}
|
||||
|
||||
static void callback_APC_State(ovsdb_update_monitor_t *mon,
|
||||
struct schema_APC_State *old,
|
||||
struct schema_APC_State *conf)
|
||||
{
|
||||
LOGN("APC_state: enabled:%s dr_addr:%s bdr_addr:%s mode:%s",
|
||||
(conf->enabled_changed)? "changed":"unchanged",
|
||||
(conf->dr_addr_changed)? "changed":"unchanged",
|
||||
(conf->bdr_addr_changed)? "changed":"unchanged",
|
||||
(conf->mode_changed)? "changed":"unchanged");
|
||||
|
||||
/* APC changed: if radproxy enabled then restart wireless */
|
||||
if (radproxy_apc) {
|
||||
radproxy_apc = 0;
|
||||
system("ubus call service event '{\"type\": \"config.change\", \"data\": { \"package\": \"wireless\" }}'");
|
||||
}
|
||||
}
|
||||
|
||||
struct schema_APC_State apc_state;
|
||||
enum {
|
||||
APC_ATTR_MODE,
|
||||
APC_ATTR_DR_ADDR,
|
||||
APC_ATTR_BDR_ADDR,
|
||||
APC_ATTR_ENABLED,
|
||||
__APC_ATTR_MAX,
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy apc_policy[__APC_ATTR_MAX] = {
|
||||
[APC_ATTR_MODE] = { .name = "mode", .type = BLOBMSG_TYPE_STRING },
|
||||
[APC_ATTR_DR_ADDR] = { .name = "dr_addr", .type = BLOBMSG_TYPE_STRING },
|
||||
[APC_ATTR_BDR_ADDR] = { .name = "bdr_addr", .type = BLOBMSG_TYPE_STRING },
|
||||
[APC_ATTR_ENABLED] = { .name = "enabled", .type = BLOBMSG_TYPE_BOOL },
|
||||
};
|
||||
|
||||
struct schema_APC_Config apc_conf;
|
||||
|
||||
void apc_state_set(struct blob_attr *msg)
|
||||
{
|
||||
struct blob_attr *tb[__APC_ATTR_MAX] = { };
|
||||
|
||||
blobmsg_parse(apc_policy, __APC_ATTR_MAX, tb,
|
||||
blob_data(msg), blob_len(msg));
|
||||
|
||||
if (tb[APC_ATTR_MODE]) {
|
||||
LOGD("APC mode: %s", blobmsg_get_string(tb[APC_ATTR_MODE]));
|
||||
SCHEMA_SET_STR(apc_state.mode,
|
||||
blobmsg_get_string(tb[APC_ATTR_MODE]));
|
||||
}
|
||||
if (tb[APC_ATTR_DR_ADDR]) {
|
||||
LOGD("APC br-addr: %s", blobmsg_get_string(tb[APC_ATTR_DR_ADDR]));
|
||||
SCHEMA_SET_STR(apc_state.dr_addr,
|
||||
blobmsg_get_string(tb[APC_ATTR_DR_ADDR]));
|
||||
}
|
||||
if (tb[APC_ATTR_BDR_ADDR]) {
|
||||
LOGD("APC dbr-addr: %s", blobmsg_get_string(tb[APC_ATTR_BDR_ADDR]));
|
||||
SCHEMA_SET_STR(apc_state.bdr_addr,
|
||||
blobmsg_get_string(tb[APC_ATTR_BDR_ADDR]));
|
||||
}
|
||||
if (tb[APC_ATTR_ENABLED]) {
|
||||
LOGD("APC enabled: %d", blobmsg_get_bool(tb[APC_ATTR_ENABLED]));
|
||||
if (blobmsg_get_bool(tb[APC_ATTR_ENABLED])) {
|
||||
SCHEMA_SET_INT(apc_state.enabled, true);
|
||||
}
|
||||
else {
|
||||
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||
}
|
||||
}
|
||||
|
||||
LOGD("APC_state Updating");
|
||||
if (!ovsdb_table_update(&table_APC_State, &apc_state))
|
||||
LOG(ERR, "APC_state: failed to update");
|
||||
}
|
||||
|
||||
|
||||
void apc_init()
|
||||
{
|
||||
/* APC Config */
|
||||
OVSDB_TABLE_INIT(APC_Config, _uuid);
|
||||
OVSDB_TABLE_MONITOR(APC_Config, false);
|
||||
SCHEMA_SET_INT(apc_conf.enabled, true);
|
||||
LOGI("APC state/config Initialize");
|
||||
if (!ovsdb_table_insert(&table_APC_Config, &apc_conf))
|
||||
LOG(ERR, "APC_Config: failed to initialize");
|
||||
|
||||
/* APC State */
|
||||
OVSDB_TABLE_INIT_NO_KEY(APC_State);
|
||||
OVSDB_TABLE_MONITOR(APC_State, false);
|
||||
SCHEMA_SET_STR(apc_state.mode, "NC");
|
||||
SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0");
|
||||
SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0");
|
||||
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||
if (!ovsdb_table_insert(&table_APC_State, &apc_state))
|
||||
LOG(ERR, "APC_state: failed to initialize");
|
||||
}
|
||||
|
||||
bool target_radio_init(const struct target_radio_ops *ops)
|
||||
{
|
||||
uci = uci_alloc_context();
|
||||
@@ -691,8 +848,13 @@ bool target_radio_init(const struct target_radio_ops *ops)
|
||||
OVSDB_TABLE_INIT(Hotspot20_Icon_Config, _uuid);
|
||||
OVSDB_TABLE_MONITOR(Hotspot20_Icon_Config, false);
|
||||
|
||||
OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid);
|
||||
OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false);
|
||||
OVSDB_TABLE_INIT(Wifi_RRM_Config, _uuid);
|
||||
OVSDB_TABLE_MONITOR(Wifi_RRM_Config, false);
|
||||
|
||||
OVSDB_TABLE_INIT(Radius_Proxy_Config, _uuid);
|
||||
OVSDB_TABLE_MONITOR(Radius_Proxy_Config, false);
|
||||
|
||||
apc_init();
|
||||
|
||||
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
||||
|
||||
|
||||
@@ -430,15 +430,55 @@ static void nl80211_del_phy(struct nlattr **tb, char *name)
|
||||
free(phy);
|
||||
}
|
||||
|
||||
static void nl80211_update_current_channel(struct nlattr **tb, char *name, int freq)
|
||||
static int nl80211_channel_recv(struct nl_msg *msg, void *arg)
|
||||
{
|
||||
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
||||
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
||||
unsigned int *chan = (unsigned int *)arg;
|
||||
|
||||
memset(tb, 0, sizeof(tb));
|
||||
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
||||
genlmsg_attrlen(gnlh, 0), NULL);
|
||||
|
||||
if (tb[NL80211_ATTR_WIPHY_FREQ]) {
|
||||
*chan = ieee80211_frequency_to_channel(nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]));
|
||||
}
|
||||
|
||||
return NL_OK;
|
||||
}
|
||||
|
||||
int nl80211_channel_get(char *name, unsigned int *chan)
|
||||
{
|
||||
struct nl_msg *msg;
|
||||
struct wifi_phy *phy;
|
||||
struct wifi_iface *wif=NULL;
|
||||
int idx = 0;
|
||||
|
||||
phy = avl_find_element(&phy_tree, name, phy, avl);
|
||||
if (!phy)
|
||||
return;
|
||||
return -1;
|
||||
|
||||
phy->current_channel = ieee80211_frequency_to_channel(freq);
|
||||
if (list_empty(&phy->wifs))
|
||||
return -1;
|
||||
|
||||
wif = list_first_entry(&phy->wifs, struct wifi_iface, phy);
|
||||
|
||||
if (!wif)
|
||||
return -1;
|
||||
|
||||
idx = if_nametoindex(wif->name);
|
||||
|
||||
if (!idx)
|
||||
return -1;
|
||||
|
||||
msg = unl_genl_msg(&unl, NL80211_CMD_GET_INTERFACE, true);
|
||||
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
||||
|
||||
unl_genl_request(&unl, msg, nl80211_channel_recv, chan);
|
||||
|
||||
phy->current_channel = *chan;
|
||||
|
||||
return NL_OK;
|
||||
}
|
||||
|
||||
static int nl80211_recv(struct nl_msg *msg, void *arg)
|
||||
@@ -449,7 +489,6 @@ static int nl80211_recv(struct nl_msg *msg, void *arg)
|
||||
char *pif_name=NULL;
|
||||
char phyname[IFNAMSIZ] = {};
|
||||
int ifidx = -1, phy = -1;
|
||||
int freq = 0;
|
||||
memset(tb, 0, sizeof(tb));
|
||||
|
||||
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
||||
@@ -465,16 +504,11 @@ static int nl80211_recv(struct nl_msg *msg, void *arg)
|
||||
|
||||
if (tb[NL80211_ATTR_WIPHY]) {
|
||||
phy = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
|
||||
if (tb[NL80211_ATTR_WIPHY_NAME])
|
||||
strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ);
|
||||
else
|
||||
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
||||
}
|
||||
|
||||
if(tb[NL80211_ATTR_WIPHY_FREQ]) {
|
||||
freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
|
||||
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
||||
nl80211_update_current_channel(tb, phyname, freq);
|
||||
} else if (tb[NL80211_ATTR_WIPHY_NAME]) {
|
||||
strncpy(phyname, nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]), IFNAMSIZ);
|
||||
} else if (sscanf(ifname, "wlan%d", &phy)) {
|
||||
snprintf(phyname, sizeof(phyname), "phy%d", phy);
|
||||
}
|
||||
|
||||
switch (gnlh->cmd) {
|
||||
|
||||
@@ -0,0 +1,357 @@
|
||||
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdbool.h>
|
||||
#include <time.h>
|
||||
|
||||
#include <uci.h>
|
||||
#include <uci_blob.h>
|
||||
|
||||
#include <target.h>
|
||||
|
||||
#include <curl/curl.h>
|
||||
|
||||
#include "ovsdb.h"
|
||||
#include "ovsdb_update.h"
|
||||
#include "ovsdb_sync.h"
|
||||
#include "ovsdb_table.h"
|
||||
#include "ovsdb_cache.h"
|
||||
|
||||
#include "nl80211.h"
|
||||
#include "radio.h"
|
||||
#include "vif.h"
|
||||
#include "phy.h"
|
||||
#include "log.h"
|
||||
#include "evsched.h"
|
||||
#include "uci.h"
|
||||
#include "utils.h"
|
||||
#include "radius_proxy.h"
|
||||
|
||||
ovsdb_table_t table_Radius_Proxy_Config;
|
||||
struct blob_buf uci_buf = {};
|
||||
struct blob_attr *n;
|
||||
extern ovsdb_table_t table_APC_State;
|
||||
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
||||
|
||||
enum {
|
||||
RADIUS_PROXY_OPTIONS_LISTEN_UDP,
|
||||
__RADIUS_PROXY_OPTIONS_MAX
|
||||
};
|
||||
|
||||
enum {
|
||||
RADIUS_PROXY_CLIENT_NAME,
|
||||
RADIUS_PROXY_CLIENT_TYPE,
|
||||
RADIUS_PROXY_CLIENT_SECRET,
|
||||
__RADIUS_PROXY_CLIENT_MAX
|
||||
};
|
||||
|
||||
enum {
|
||||
RADIUS_PROXY_SERVER_NAME,
|
||||
RADIUS_PROXY_SERVER_TYPE,
|
||||
RADIUS_PROXY_SERVER_SECRET,
|
||||
RADIUS_PROXY_SERVER_STATUS,
|
||||
RADIUS_PROXY_SERVER_TLS,
|
||||
RADIUS_PROXY_SERVER_CERT_NAME_CHECK,
|
||||
__RADIUS_PROXY_SERVER_MAX
|
||||
};
|
||||
|
||||
enum {
|
||||
RADIUS_PROXY_TLS_NAME,
|
||||
RADIUS_PROXY_TLS_CA_CERT,
|
||||
RADIUS_PROXY_TLS_CLIENT_CERT,
|
||||
RADIUS_PROXY_TLS_CLIENT_KEY,
|
||||
RADIUS_PROXY_TLS_CERT_PASSWORD,
|
||||
__RADIUS_PROXY_TLS_MAX,
|
||||
};
|
||||
|
||||
enum {
|
||||
RADIUS_PROXY_REALM_NAME,
|
||||
RADIUS_PROXY_REALM_AUTH_SERVER,
|
||||
RADIUS_PROXY_REALM_ACCT_SERVER,
|
||||
__RADIUS_PROXY_REALM_MAX
|
||||
};
|
||||
|
||||
|
||||
static const struct blobmsg_policy radius_proxy_options_policy[__RADIUS_PROXY_OPTIONS_MAX] = {
|
||||
[RADIUS_PROXY_OPTIONS_LISTEN_UDP] = { .name = "ListenUDP", BLOBMSG_TYPE_ARRAY },
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy radius_proxy_client_policy[__RADIUS_PROXY_CLIENT_MAX] = {
|
||||
[RADIUS_PROXY_CLIENT_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_CLIENT_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_CLIENT_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING },
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy radius_proxy_tls_policy[__RADIUS_PROXY_TLS_MAX] = {
|
||||
[RADIUS_PROXY_TLS_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_TLS_CA_CERT] = { .name = "CACertificateFile", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_TLS_CLIENT_CERT] = { .name = "certificateFile", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_TLS_CLIENT_KEY] = { .name = "certificateKeyFile", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_TLS_CERT_PASSWORD] = { .name = "certificateKeyPassword", BLOBMSG_TYPE_STRING },
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy radius_proxy_server_policy[__RADIUS_PROXY_SERVER_MAX] = {
|
||||
[RADIUS_PROXY_SERVER_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_SERVER_TYPE] = { .name = "type", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_SERVER_SECRET] = { .name = "secret", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_SERVER_STATUS] = { .name = "statusServer", BLOBMSG_TYPE_BOOL },
|
||||
[RADIUS_PROXY_SERVER_TLS] = { .name = "tls", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_SERVER_CERT_NAME_CHECK] = { .name = "certificateNameCheck", BLOBMSG_TYPE_BOOL },
|
||||
};
|
||||
|
||||
static const struct blobmsg_policy radius_proxy_realm_policy[__RADIUS_PROXY_REALM_MAX] = {
|
||||
[RADIUS_PROXY_REALM_NAME] = { .name = "name", BLOBMSG_TYPE_STRING },
|
||||
[RADIUS_PROXY_REALM_AUTH_SERVER] = { .name = "server", BLOBMSG_TYPE_ARRAY },
|
||||
[RADIUS_PROXY_REALM_ACCT_SERVER] = { .name = "accountingServer", BLOBMSG_TYPE_ARRAY },
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list radius_proxy_options_param = {
|
||||
.n_params = __RADIUS_PROXY_OPTIONS_MAX,
|
||||
.params = radius_proxy_options_policy,
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list radius_proxy_client_param = {
|
||||
.n_params = __RADIUS_PROXY_CLIENT_MAX,
|
||||
.params = radius_proxy_client_policy,
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list radius_proxy_tls_param = {
|
||||
.n_params = __RADIUS_PROXY_TLS_MAX,
|
||||
.params = radius_proxy_tls_policy,
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list radius_proxy_server_param = {
|
||||
.n_params = __RADIUS_PROXY_SERVER_MAX,
|
||||
.params = radius_proxy_server_policy,
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list radius_proxy_realm_param = {
|
||||
.n_params = __RADIUS_PROXY_REALM_MAX,
|
||||
.params = radius_proxy_realm_policy,
|
||||
};
|
||||
|
||||
|
||||
size_t file_write(void *ptr, size_t size, size_t nmemb, FILE *stream) {
|
||||
size_t written = fwrite(ptr, size, nmemb, stream);
|
||||
return written;
|
||||
}
|
||||
|
||||
static bool radsec_download_cert(char *cert_name, char *dir_name, char *cert_url)
|
||||
{
|
||||
CURL *curl;
|
||||
FILE *fp;
|
||||
CURLcode res;
|
||||
char path[200];
|
||||
char name[32];
|
||||
char dir[32];
|
||||
char *gw_clientcert = "/usr/opensync/certs/client.pem";
|
||||
char *gw_clientkey = "/usr/opensync/certs/client_dec.key";
|
||||
|
||||
strcpy(name, cert_name);
|
||||
strcpy(dir, dir_name);
|
||||
sprintf(path, "/tmp/radsec/certs/%s/%s", dir, name);
|
||||
|
||||
curl = curl_easy_init();
|
||||
if (curl)
|
||||
{
|
||||
fp = fopen(path,"wb");
|
||||
|
||||
if (fp == NULL)
|
||||
{
|
||||
curl_easy_cleanup(curl);
|
||||
return false;
|
||||
}
|
||||
|
||||
if (cert_url == NULL)
|
||||
{
|
||||
curl_easy_cleanup(curl);
|
||||
fclose(fp);
|
||||
return false;
|
||||
}
|
||||
|
||||
curl_easy_setopt(curl, CURLOPT_SSLCERT, gw_clientcert);
|
||||
curl_easy_setopt(curl, CURLOPT_SSLKEY, gw_clientkey);
|
||||
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
|
||||
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);
|
||||
curl_easy_setopt(curl, CURLOPT_HEADER, 0L);
|
||||
curl_easy_setopt(curl, CURLOPT_URL, cert_url);
|
||||
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, file_write);
|
||||
curl_easy_setopt(curl, CURLOPT_WRITEDATA, fp);
|
||||
res = curl_easy_perform(curl);
|
||||
curl_easy_cleanup(curl);
|
||||
fclose(fp);
|
||||
return res;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf )
|
||||
{
|
||||
int i=0;
|
||||
char path[200];
|
||||
char name[256];
|
||||
struct schema_APC_State apc_conf;
|
||||
|
||||
/* Configure only if APC selects this as master AP (DR) */
|
||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
||||
where, &apc_conf)) {
|
||||
LOG(INFO, "APC_State read failed");
|
||||
return false;
|
||||
}
|
||||
|
||||
if (!strncmp(apc_conf.mode, "OR", 2) || !strncmp(apc_conf.mode, "BDR", 2))
|
||||
return false;
|
||||
|
||||
/* Configure options block */
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
n = blobmsg_open_array(&uci_buf,"ListenUDP");
|
||||
blobmsg_add_string(&uci_buf, NULL, "127.0.0.1:1812");
|
||||
blobmsg_add_string(&uci_buf, NULL, "127.0.0.1:1813");
|
||||
blobmsg_close_array(&uci_buf, n);
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s", conf->radius_config_name, "options");
|
||||
blob_to_uci_section(uci, "radsecproxy", name, "options",
|
||||
uci_buf.head, &radius_proxy_options_param, NULL);
|
||||
|
||||
/* Configure client block */
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
blobmsg_add_string(&uci_buf, "name", "localhost");
|
||||
blobmsg_add_string(&uci_buf, "type", "udp");
|
||||
blobmsg_add_string(&uci_buf, "secret", "secret");
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s", conf->radius_config_name, "client");
|
||||
blob_to_uci_section(uci, "radsecproxy", name, "client",
|
||||
uci_buf.head, &radius_proxy_client_param, NULL);
|
||||
|
||||
/* Configure TLS/non-TLS and server blocks */
|
||||
if (conf->radsec)
|
||||
{
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
radsec_download_cert("cacert.pem",
|
||||
conf->radius_config_name, conf->ca_cert);
|
||||
radsec_download_cert("clientcert.pem",
|
||||
conf->radius_config_name, conf->client_cert);
|
||||
radsec_download_cert("clientdec.key",
|
||||
conf->radius_config_name, conf->client_key);
|
||||
|
||||
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||
|
||||
memset(path, '\0', sizeof(path));
|
||||
sprintf(path, "/tmp/radsec/certs/%s/cacert.pem",
|
||||
conf->radius_config_name);
|
||||
blobmsg_add_string(&uci_buf, "CACertificateFile", path);
|
||||
|
||||
memset(path, '\0', sizeof(path));
|
||||
sprintf(path, "/tmp/radsec/certs/%s/clientcert.pem",
|
||||
conf->radius_config_name);
|
||||
blobmsg_add_string(&uci_buf, "certificateFile", path);
|
||||
|
||||
memset(path, '\0', sizeof(path));
|
||||
sprintf(path, "/tmp/radsec/certs/%s/clientdec.key",
|
||||
conf->radius_config_name);
|
||||
blobmsg_add_string(&uci_buf, "certificateKeyFile", path);
|
||||
|
||||
if (strlen(conf->passphrase) > 0)
|
||||
blobmsg_add_string(&uci_buf, "certificateKeyPassword", conf->passphrase);
|
||||
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s", conf->radius_config_name, "tls");
|
||||
blob_to_uci_section(uci, "radsecproxy", name,
|
||||
"tls", uci_buf.head, &radius_proxy_tls_param, NULL);
|
||||
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||
blobmsg_add_string(&uci_buf, "type", "tls");
|
||||
blobmsg_add_string(&uci_buf, "tls", conf->server);
|
||||
blobmsg_add_string(&uci_buf, "secret", "radsec");
|
||||
blobmsg_add_bool(&uci_buf, "statusServer", 0);
|
||||
blobmsg_add_bool(&uci_buf, "certificateNameCheck", 0);
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s", conf->radius_config_name, "server");
|
||||
blob_to_uci_section(uci, "radsecproxy", name, "server",
|
||||
uci_buf.head, &radius_proxy_server_param, NULL);
|
||||
}
|
||||
else /* non-TLS block */
|
||||
{
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
blobmsg_add_string(&uci_buf, "name", conf->server);
|
||||
blobmsg_add_string(&uci_buf, "type", "udp");
|
||||
if (strlen(conf->secret) > 0)
|
||||
blobmsg_add_string(&uci_buf, "secret", conf->secret);
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s", conf->radius_config_name, "server");
|
||||
blob_to_uci_section(uci, "radsecproxy", name, "server",
|
||||
uci_buf.head, &radius_proxy_server_param, NULL);
|
||||
}
|
||||
|
||||
/* Configure realm block */
|
||||
for (i = 0; i < conf->realm_len; i++)
|
||||
{
|
||||
blob_buf_init(&uci_buf, 0);
|
||||
blobmsg_add_string(&uci_buf, "name", conf->realm[i]);
|
||||
n = blobmsg_open_array(&uci_buf,"server");
|
||||
blobmsg_add_string(&uci_buf, NULL, conf->server);
|
||||
blobmsg_close_array(&uci_buf, n);
|
||||
n = blobmsg_open_array(&uci_buf,"accountingServer");
|
||||
blobmsg_add_string(&uci_buf, NULL, conf->server);
|
||||
blobmsg_close_array(&uci_buf, n);
|
||||
memset(name, '\0', sizeof(name));
|
||||
sprintf(name, "%s%s%d", conf->radius_config_name, "realm", i);
|
||||
blob_to_uci_section(uci, "radsecproxy", name, "realm",
|
||||
uci_buf.head, &radius_proxy_realm_param, NULL);
|
||||
}
|
||||
|
||||
uci_commit_all(uci);
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool radius_proxy_config_delete()
|
||||
{
|
||||
struct uci_package *radsecproxy;
|
||||
struct uci_element *e = NULL, *tmp = NULL;
|
||||
int ret=0;
|
||||
|
||||
ret= uci_load(uci, "radsecproxy", &radsecproxy);
|
||||
if (ret) {
|
||||
LOGD("%s: uci_load() failed with rc %d", __func__, ret);
|
||||
return false;
|
||||
}
|
||||
uci_foreach_element_safe(&radsecproxy->sections, tmp, e) {
|
||||
struct uci_section *s = uci_to_section(e);
|
||||
if ((s == NULL) || (s->type == NULL)) continue;
|
||||
uci_section_del(uci, "radsecproxy", "radsecproxy",
|
||||
(char *)s->e.name, s->type);
|
||||
}
|
||||
uci_commit(uci, &radsecproxy, false);
|
||||
uci_unload(uci, radsecproxy);
|
||||
reload_config = 1;
|
||||
return true;
|
||||
}
|
||||
|
||||
void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *self,
|
||||
struct schema_Radius_Proxy_Config *old,
|
||||
struct schema_Radius_Proxy_Config *conf)
|
||||
{
|
||||
switch (self->mon_type)
|
||||
{
|
||||
case OVSDB_UPDATE_NEW:
|
||||
case OVSDB_UPDATE_MODIFY:
|
||||
(void) radius_proxy_config_set(conf);
|
||||
break;
|
||||
|
||||
case OVSDB_UPDATE_DEL:
|
||||
(void) radius_proxy_config_delete();
|
||||
(void) radius_proxy_config_set(conf);
|
||||
break;
|
||||
|
||||
default:
|
||||
LOG(ERR, "Radius_Proxy_Config: unexpected mon_type %d %s",
|
||||
self->mon_type, self->mon_uuid);
|
||||
break;
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
|
||||
@@ -23,41 +23,79 @@
|
||||
#include "vif.h"
|
||||
|
||||
static struct mode_map mode_map[] = {
|
||||
{ 0, "11b", "11b", NULL, "NOHT" },
|
||||
{ 0, "11g", "11g", NULL, "NOHT" },
|
||||
{ 1, "11a", "11a", NULL, "NOHT" },
|
||||
{ 0, "11n", "11g", "HT20", "HT20" },
|
||||
{ 0, "11n", "11g", "HT40", "HT40" },
|
||||
{ 0, "11n", "11g", "HT40-", "HT40-" },
|
||||
{ 0, "11n", "11g", "HT40+", "HT40+" },
|
||||
{ 0, "11n", "11g", "HT80", "HT40" },
|
||||
{ 0, "11n", "11g", "HT160", "HT40" },
|
||||
{ 1, "11n", "11a", "HT20", "HT20" },
|
||||
{ 1, "11n", "11a", "HT40", "HT40" },
|
||||
{ 1, "11n", "11a", "HT40-", "HT40-" },
|
||||
{ 1, "11n", "11a", "HT40+", "HT40+" },
|
||||
{ 1, "11n", "11a", "HT80", "HT40" },
|
||||
{ 1, "11n", "11a", "HT160", "HT40" },
|
||||
{ 1, "11ac", "11a", "HT20", "VHT20" },
|
||||
{ 1, "11ac", "11a", "HT40", "VHT40" },
|
||||
{ 1, "11ac", "11a", "HT40-", "VHT40" },
|
||||
{ 1, "11ac", "11a", "HT40+", "VHT40" },
|
||||
{ 1, "11ac", "11a", "HT80", "VHT80" },
|
||||
{ 1, "11ac", "11a", "HT160", "VHT160" },
|
||||
{ 0, "11ax", "11g", "HT20", "HE20" },
|
||||
{ 0, "11ax", "11g", "HT40", "HE40" },
|
||||
{ 0, "11ax", "11g", "HT40-", "HE40" },
|
||||
{ 0, "11ax", "11g", "HT40+", "HE40" },
|
||||
{ 0, "11ax", "11g", "HT80", "HE80" },
|
||||
{ 0, "11ax", "11g", "HT160", "HE80" },
|
||||
{ 1, "11ax", "11a", "HT20", "HE20" },
|
||||
{ 1, "11ax", "11a", "HT40", "HE40" },
|
||||
{ 1, "11ax", "11a", "HT40-", "HE40" },
|
||||
{ 1, "11ax", "11a", "HT40+", "HE40" },
|
||||
{ 1, "11ax", "11a", "HT80", "HE80" },
|
||||
{ 1, "11ax", "11a", "HT160", "HE160" },
|
||||
{ 0, "11b", "11b", NULL, "NOHT", 0 },
|
||||
{ 0, "11g", "11g", NULL, "NOHT", 0 },
|
||||
{ 1, "11a", "11a", NULL, "NOHT", 0 },
|
||||
{ 0, "11n", "11g", "HT20", "HT20", 0 },
|
||||
{ 0, "11n", "11g", "HT40", "HT40", 1 },
|
||||
{ 0, "11n", "11g", "HT40-", "HT40-", 1 },
|
||||
{ 0, "11n", "11g", "HT40+", "HT40+", 1 },
|
||||
{ 0, "11n", "11g", "HT80", "HT40", 1 },
|
||||
{ 0, "11n", "11g", "HT160", "HT40", 1 },
|
||||
{ 1, "11n", "11a", "HT20", "HT20", 0 },
|
||||
{ 1, "11n", "11a", "HT40", "HT40", 1 },
|
||||
{ 1, "11n", "11a", "HT40-", "HT40-", 1 },
|
||||
{ 1, "11n", "11a", "HT40+", "HT40+", 1 },
|
||||
{ 1, "11n", "11a", "HT80", "HT40", 1 },
|
||||
{ 1, "11n", "11a", "HT160", "HT40", 1 },
|
||||
{ 1, "11ac", "11a", "HT20", "VHT20", 0 },
|
||||
{ 1, "11ac", "11a", "HT40", "VHT40", 1 },
|
||||
{ 1, "11ac", "11a", "HT40-", "VHT40", 1 },
|
||||
{ 1, "11ac", "11a", "HT40+", "VHT40", 1 },
|
||||
{ 1, "11ac", "11a", "HT80", "VHT80", 1 },
|
||||
{ 1, "11ac", "11a", "HT160", "VHT160", 1 },
|
||||
{ 0, "11ax", "11g", "HT20", "HE20", 0 },
|
||||
{ 0, "11ax", "11g", "HT40", "HE40", 1 },
|
||||
{ 0, "11ax", "11g", "HT40-", "HE40", 1 },
|
||||
{ 0, "11ax", "11g", "HT40+", "HE40", 1 },
|
||||
{ 0, "11ax", "11g", "HT80", "HE80", 1 },
|
||||
{ 0, "11ax", "11g", "HT160", "HE80", 1 },
|
||||
{ 1, "11ax", "11a", "HT20", "HE20", 0 },
|
||||
{ 1, "11ax", "11a", "HT40", "HE40", 1 },
|
||||
{ 1, "11ax", "11a", "HT40-", "HE40", 1 },
|
||||
{ 1, "11ax", "11a", "HT40+", "HE40", 1 },
|
||||
{ 1, "11ax", "11a", "HT80", "HE80", 1 },
|
||||
{ 1, "11ax", "11a", "HT160", "HE160", 1 },
|
||||
};
|
||||
|
||||
typedef enum {
|
||||
MHz20=0,
|
||||
MHz40 = 1,
|
||||
MHz80 = 2,
|
||||
MHz160 = 4
|
||||
} bm_AllowedBw;
|
||||
|
||||
typedef struct {
|
||||
int freq;
|
||||
bm_AllowedBw bw;
|
||||
} freqBwListEntry;
|
||||
|
||||
freqBwListEntry freqBwList[] ={{2412, MHz20},{2417, MHz20},{2422, MHz20},{2427, MHz20},{2432, MHz20},{2437, MHz20},{2442, MHz20},{2447, MHz20},{2452, MHz20},{2457, MHz20},{2462, MHz20},{2467, MHz20},{2472, MHz20}, {2484, MHz20},
|
||||
{ 5180, MHz20|MHz40|MHz80},{5200, MHz20},{5220, MHz20|MHz40},{5240, MHz20},{5260, MHz20|MHz40|MHz80},{5280, MHz20},{5300,MHz20|MHz40},{5320, MHz20},{5500, MHz20|MHz40|MHz80},{5520, MHz20},{5540, MHz20|MHz40}, {5560, MHz20},
|
||||
{5580, MHz20|MHz40|MHz80},{5600, MHz20},{5620, MHz20|MHz40},{5640, MHz20},{5660, MHz20|MHz40|MHz80},{5680, MHz20},{5700, MHz20|MHz40},{5720, MHz20},{5745, MHz20|MHz40|MHz80},{5765, MHz20},{5785, MHz20|MHz40},{5805, MHz20},{5825, MHz20}};
|
||||
|
||||
#define REQ_BW(htmode) (!strcmp(htmode, "HT20") ? MHz20 : !strcmp(htmode, "HT40") ? MHz40 : !strcmp(htmode, "HT80") ? MHz80 : !strcmp(htmode, "HT160") ? MHz160 : MHz20)
|
||||
#define REQ_MODE(bw) (bw==MHz20 ? "HT20": bw==MHz40 ? "HT40" : bw==MHz80 ? "HT80" : bw==MHz160 ? "HT160" : "HT20")
|
||||
|
||||
char * get_max_channel_bw_channel(int channel_freq, const char* htmode)
|
||||
{
|
||||
unsigned int i;
|
||||
bm_AllowedBw requestedBw;
|
||||
|
||||
requestedBw = REQ_BW(htmode);
|
||||
|
||||
for ( i = 0; i < ARRAY_SIZE(freqBwList); i++) {
|
||||
if(freqBwList[i].freq == channel_freq) {
|
||||
while (requestedBw) {
|
||||
if (freqBwList[i].bw & requestedBw) {
|
||||
return REQ_MODE(requestedBw);
|
||||
}
|
||||
requestedBw >>= 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
return "HT20";
|
||||
}
|
||||
struct mode_map *mode_map_get_uci(const char *band, const char *htmode, const char *hwmode)
|
||||
{
|
||||
unsigned int i;
|
||||
@@ -624,3 +662,22 @@ bool vif_get_security(struct schema_Wifi_VIF_State *vstate, char *mode, char *
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool vif_get_key_for_key_distr(const char *secret, char *key_str)
|
||||
{
|
||||
bool err = false;
|
||||
FILE *fp;
|
||||
char cmd_buf[256] = "openssl aes-128-cbc -nosalt -k ";
|
||||
|
||||
strcat(cmd_buf, secret);
|
||||
strcat(cmd_buf, " -P 2>/dev/null | grep key | cut -d = -f2");
|
||||
fp = popen(cmd_buf, "r");
|
||||
|
||||
|
||||
if (fp && fscanf(fp, "%s", key_str)) {
|
||||
err = true;
|
||||
}
|
||||
|
||||
fclose(fp);
|
||||
return err;
|
||||
}
|
||||
|
||||
@@ -129,6 +129,9 @@ enum {
|
||||
WIF_ATTR_DVLAN_NAMING,
|
||||
WIF_ATTR_DVLAN_BRIDGE,
|
||||
WIF_ATTR_MIN_HW_MODE,
|
||||
WIF_ATTR_11R_R0KH,
|
||||
WIF_ATTR_11R_R1KH,
|
||||
WIF_ATTR_RADPROXY,
|
||||
__WIF_ATTR_MAX,
|
||||
};
|
||||
|
||||
@@ -220,6 +223,9 @@ static const struct blobmsg_policy wifi_iface_policy[__WIF_ATTR_MAX] = {
|
||||
[WIF_ATTR_DVLAN_NAMING] = { .name = "vlan_naming", BLOBMSG_TYPE_STRING },
|
||||
[WIF_ATTR_DVLAN_BRIDGE] = { .name = "vlan_bridge", BLOBMSG_TYPE_STRING },
|
||||
[WIF_ATTR_MIN_HW_MODE] = { .name = "min_hw_mode", BLOBMSG_TYPE_STRING },
|
||||
[WIF_ATTR_11R_R0KH] = { .name = "r0kh", BLOBMSG_TYPE_STRING },
|
||||
[WIF_ATTR_11R_R1KH] = { .name = "r1kh", BLOBMSG_TYPE_STRING },
|
||||
[WIF_ATTR_RADPROXY] = { .name = "radproxy", BLOBMSG_TYPE_STRING },
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list wifi_iface_param = {
|
||||
@@ -311,6 +317,61 @@ static struct vif_crypto {
|
||||
{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 },
|
||||
};
|
||||
|
||||
extern ovsdb_table_t table_APC_State;
|
||||
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
||||
extern unsigned int radproxy_apc;
|
||||
|
||||
/* Custom options table */
|
||||
#define SCHEMA_CUSTOM_OPT_SZ 20
|
||||
#define SCHEMA_CUSTOM_OPTS_MAX 13
|
||||
|
||||
const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] =
|
||||
{
|
||||
SCHEMA_CONSTS_RATE_LIMIT,
|
||||
SCHEMA_CONSTS_RATE_DL,
|
||||
SCHEMA_CONSTS_RATE_UL,
|
||||
SCHEMA_CONSTS_CLIENT_RATE_DL,
|
||||
SCHEMA_CONSTS_CLIENT_RATE_UL,
|
||||
SCHEMA_CONSTS_IEEE80211k,
|
||||
SCHEMA_CONSTS_RTS_THRESHOLD,
|
||||
SCHEMA_CONSTS_DTIM_PERIOD,
|
||||
SCHEMA_CONSTS_RADIUS_OPER_NAME,
|
||||
SCHEMA_CONSTS_RADIUS_NAS_ID,
|
||||
SCHEMA_CONSTS_RADIUS_NAS_IP,
|
||||
SCHEMA_CONSTS_DYNAMIC_VLAN,
|
||||
SCHEMA_CONSTS_RADPROXY,
|
||||
};
|
||||
|
||||
static bool vif_config_custom_opt_get_proxy(
|
||||
const struct schema_Wifi_VIF_Config *vconf)
|
||||
{
|
||||
int i;
|
||||
const char *opt;
|
||||
const char *val;
|
||||
char value[20];
|
||||
|
||||
for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) {
|
||||
opt = custom_options_table[i];
|
||||
val = SCHEMA_KEY_VAL(vconf->custom_options, opt);
|
||||
if (!val)
|
||||
strncpy(value, "0", 20);
|
||||
else
|
||||
strncpy(value, val, 20);
|
||||
|
||||
if (strcmp(opt, "radproxy") == 0) {
|
||||
if (strcmp(value, "1") == 0) {
|
||||
radproxy_apc |= 1;
|
||||
return true;
|
||||
}
|
||||
else {
|
||||
radproxy_apc |= 0;
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
static int vif_config_security_set(struct blob_buf *b,
|
||||
const struct schema_Wifi_VIF_Config *vconf)
|
||||
{
|
||||
@@ -318,7 +379,10 @@ static int vif_config_security_set(struct blob_buf *b,
|
||||
const char *mode = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_MODE);
|
||||
unsigned int i;
|
||||
unsigned int acct_interval;
|
||||
const char *auth_server, *auth_port, *auth_secret, *security_key;
|
||||
const char *auth_server, *auth_port, *auth_secret, *security_key, *acct_server;
|
||||
char key_str[64], key_holder_str[128];
|
||||
struct schema_APC_State apc_conf;
|
||||
const char *local_server = "127.0.0.1";
|
||||
|
||||
if (!strcmp(encryption, OVSDB_SECURITY_ENCRYPTION_OPEN) || !mode)
|
||||
goto open;
|
||||
@@ -336,20 +400,48 @@ static int vif_config_security_set(struct blob_buf *b,
|
||||
}
|
||||
|
||||
if (vif_crypto[i].enterprise) {
|
||||
|
||||
if (vif_config_custom_opt_get_proxy(vconf)) {
|
||||
LOGN("%s: Apply Proxy Security Settings", vconf->if_name);
|
||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
||||
where, &apc_conf)) {
|
||||
LOG(INFO, "APC_State read failed");
|
||||
return -1;
|
||||
}
|
||||
if (!strncmp(apc_conf.mode, "DR", 2)) {
|
||||
auth_server = local_server;
|
||||
acct_server = local_server;
|
||||
} else if (!strncmp(apc_conf.mode, "OR", 2) ||
|
||||
!strncmp(apc_conf.mode, "BDR", 2)) {
|
||||
auth_server = apc_conf.dr_addr;
|
||||
acct_server = apc_conf.dr_addr;
|
||||
}
|
||||
else {
|
||||
auth_server = local_server;
|
||||
acct_server = local_server;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
||||
acct_server = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP);
|
||||
}
|
||||
|
||||
acct_interval = 0;
|
||||
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
||||
auth_port = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT);
|
||||
auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET);
|
||||
|
||||
LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret);
|
||||
if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) {
|
||||
LOGI("%s: Incomplete RADIUS security config - SSID not created", vconf->if_name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
blobmsg_add_string(b, "auth_server", auth_server);
|
||||
blobmsg_add_string(b, "auth_port", auth_port );
|
||||
blobmsg_add_string(b, "auth_secret", auth_secret );
|
||||
blobmsg_add_string(b, "acct_server",
|
||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP));
|
||||
blobmsg_add_string(b, "acct_server", acct_server);
|
||||
blobmsg_add_string(b, "acct_port",
|
||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT));
|
||||
blobmsg_add_string(b, "acct_secret",
|
||||
@@ -361,6 +453,26 @@ static int vif_config_security_set(struct blob_buf *b,
|
||||
{
|
||||
blobmsg_add_u32(b, "acct_interval", acct_interval);
|
||||
}
|
||||
|
||||
/*
|
||||
* If Radius is configured and Roaming is enabled,
|
||||
* - disable ft_psk_generate_local. This is required for hostapd to populate R0/R1.
|
||||
* - populate r0KH and r1KH with broadcast addressing so that the corresponding
|
||||
* Key Holders are auto-generated
|
||||
*/
|
||||
if (vconf->ft_mobility_domain) {
|
||||
blobmsg_add_bool(b, "ft_psk_generate_local", 0);
|
||||
|
||||
vif_get_key_for_key_distr(auth_secret, key_str);
|
||||
|
||||
strcpy(key_holder_str, "ff:ff:ff:ff:ff:ff,*,");
|
||||
strcat(key_holder_str, key_str);
|
||||
blobmsg_add_string(b, "r0kh", key_holder_str);
|
||||
|
||||
strcpy(key_holder_str, "00:00:00:00:00:00,00:00:00:00:00:00,");
|
||||
strcat(key_holder_str, key_str);
|
||||
blobmsg_add_string(b, "r1kh", key_holder_str);
|
||||
}
|
||||
} else {
|
||||
security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY);
|
||||
if (security_key == NULL) {
|
||||
@@ -368,6 +480,8 @@ static int vif_config_security_set(struct blob_buf *b,
|
||||
return -1;
|
||||
}
|
||||
blobmsg_add_string(b, "key", security_key);
|
||||
if (vconf->ft_mobility_domain)
|
||||
blobmsg_add_bool(b, "ft_psk_generate_local", vconf->ft_psk);
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
@@ -454,25 +568,6 @@ out_none:
|
||||
OVSDB_SECURITY_ENCRYPTION_OPEN);
|
||||
}
|
||||
|
||||
/* Custom options table */
|
||||
#define SCHEMA_CUSTOM_OPT_SZ 20
|
||||
#define SCHEMA_CUSTOM_OPTS_MAX 12
|
||||
|
||||
const char custom_options_table[SCHEMA_CUSTOM_OPTS_MAX][SCHEMA_CUSTOM_OPT_SZ] =
|
||||
{
|
||||
SCHEMA_CONSTS_RATE_LIMIT,
|
||||
SCHEMA_CONSTS_RATE_DL,
|
||||
SCHEMA_CONSTS_RATE_UL,
|
||||
SCHEMA_CONSTS_CLIENT_RATE_DL,
|
||||
SCHEMA_CONSTS_CLIENT_RATE_UL,
|
||||
SCHEMA_CONSTS_IEEE80211k,
|
||||
SCHEMA_CONSTS_RTS_THRESHOLD,
|
||||
SCHEMA_CONSTS_DTIM_PERIOD,
|
||||
SCHEMA_CONSTS_RADIUS_OPER_NAME,
|
||||
SCHEMA_CONSTS_RADIUS_NAS_ID,
|
||||
SCHEMA_CONSTS_RADIUS_NAS_IP,
|
||||
SCHEMA_CONSTS_DYNAMIC_VLAN,
|
||||
};
|
||||
|
||||
static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
||||
const struct schema_Wifi_VIF_Config *vconf)
|
||||
@@ -483,6 +578,9 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
||||
const char *opt;
|
||||
const char *val;
|
||||
struct blob_attr *n;
|
||||
bool found_nasid = false;
|
||||
char mac[ETH_ALEN * 3];
|
||||
struct blob_attr *tb[__WIF_ATTR_MAX] = { };
|
||||
|
||||
for (i = 0; i < SCHEMA_CUSTOM_OPTS_MAX; i++) {
|
||||
opt = custom_options_table[i];
|
||||
@@ -517,8 +615,12 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
||||
blobmsg_add_string(b, "rts_threshold", value);
|
||||
else if (strcmp(opt, "dtim_period") == 0)
|
||||
blobmsg_add_string(b, "dtim_period", value);
|
||||
else if (strcmp(opt, "radius_nas_id") == 0)
|
||||
blobmsg_add_string(b, "nasid", value);
|
||||
else if (strcmp(opt, "radius_nas_id") == 0) {
|
||||
if (strcmp(value, "\0") != 0) {
|
||||
blobmsg_add_string(b, "nasid", value);
|
||||
found_nasid = true;
|
||||
}
|
||||
}
|
||||
else if (strcmp(opt, "radius_nas_ip") == 0)
|
||||
blobmsg_add_string(b, "ownip", value);
|
||||
else if (strcmp(opt, "radius_oper_name") == 0 && strlen(value) > 0)
|
||||
@@ -552,7 +654,17 @@ static void vif_config_custom_opt_set(struct blob_buf *b, struct blob_buf *del,
|
||||
strncpy(value, "br-wan.", 20);
|
||||
blobmsg_add_string(del, "vlan_bridge", value);
|
||||
}
|
||||
}
|
||||
} else if (strcmp(opt, "radproxy") == 0)
|
||||
blobmsg_add_string(b, "radproxy", value);
|
||||
}
|
||||
|
||||
/* No NASID was found from blob, so use BSSID as NASID */
|
||||
if (found_nasid == false) {
|
||||
blobmsg_parse(wifi_iface_policy, __WIF_ATTR_MAX, tb, blob_data(b->head), blob_len(b->head));
|
||||
if (tb[WIF_ATTR_IFNAME] && !vif_get_mac(blobmsg_get_string(tb[WIF_ATTR_IFNAME]), mac))
|
||||
blobmsg_add_string(b, "nasid", mac);
|
||||
else
|
||||
LOGE("Failed to get base BSSID (mac)\n");
|
||||
}
|
||||
}
|
||||
|
||||
@@ -686,7 +798,15 @@ static void vif_state_custom_options_get(struct schema_Wifi_VIF_State *vstate,
|
||||
custom_options_table[i],
|
||||
buf);
|
||||
}
|
||||
} else if (strcmp(opt, "radproxy") == 0) {
|
||||
if (tb[WIF_ATTR_RADPROXY]) {
|
||||
buf = blobmsg_get_string(tb[WIF_ATTR_RADPROXY]);
|
||||
set_custom_option_state(vstate, &index,
|
||||
custom_options_table[i],
|
||||
buf);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
@@ -882,6 +1002,70 @@ void vif_section_del(char *section_name)
|
||||
|
||||
}
|
||||
|
||||
static void vif_check_radius_proxy()
|
||||
{
|
||||
struct uci_context *uci_ctx;
|
||||
struct uci_package *wireless;
|
||||
struct schema_APC_State apc_conf;
|
||||
struct uci_element *e = NULL, *tmp = NULL;
|
||||
char *buf = NULL;
|
||||
int rc = 0;
|
||||
|
||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
||||
if (false == ovsdb_table_select_one_where(&table_APC_State, where, &apc_conf))
|
||||
{
|
||||
LOGI("APC_State read failed");
|
||||
return;
|
||||
}
|
||||
|
||||
uci_ctx = uci_alloc_context();
|
||||
|
||||
rc = uci_load(uci_ctx, "wireless", &wireless);
|
||||
|
||||
if (rc)
|
||||
{
|
||||
LOGD("%s: uci_load() failed with rc %d", __func__, rc);
|
||||
goto free;
|
||||
}
|
||||
|
||||
uci_foreach_element_safe(&wireless->sections, tmp, e)
|
||||
{
|
||||
struct blob_attr *tb[__WIF_ATTR_MAX];
|
||||
struct uci_section *s = uci_to_section(e);
|
||||
if ((s == NULL) || (s->type == NULL))
|
||||
continue;
|
||||
|
||||
if (strcmp(s->type, "wifi-iface"))
|
||||
continue;
|
||||
|
||||
blob_buf_init(&b, 0);
|
||||
uci_to_blob(&b, s, &wifi_iface_param);
|
||||
blobmsg_parse(wifi_iface_policy, __WIF_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head));
|
||||
|
||||
if (tb[WIF_ATTR_RADPROXY])
|
||||
{
|
||||
buf = blobmsg_get_string(tb[WIF_ATTR_RADPROXY]);
|
||||
|
||||
if (!strcmp(buf, "1") && !strcmp(apc_conf.mode, "DR"))
|
||||
{
|
||||
if (!system("pidof radsecproxy"))
|
||||
goto free;
|
||||
|
||||
system("/etc/init.d/radsecproxy start");
|
||||
|
||||
goto free;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
system("/etc/init.d/radsecproxy stop");
|
||||
|
||||
free:
|
||||
uci_unload(uci_ctx, wireless);
|
||||
uci_free_context(uci_ctx);
|
||||
return;
|
||||
}
|
||||
|
||||
static bool hs20_download_icon(char *icon_name, char *icon_url)
|
||||
{
|
||||
CURL *curl;
|
||||
@@ -1335,10 +1519,9 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
||||
blobmsg_add_string(&b, "min_hw_mode", vconf->min_hw_mode);
|
||||
|
||||
if (changed->ft_psk || changed->ft_mobility_domain) {
|
||||
if (vconf->ft_psk && vconf->ft_mobility_domain) {
|
||||
if (vconf->ft_mobility_domain) {
|
||||
blobmsg_add_bool(&b, "ieee80211r", 1);
|
||||
blobmsg_add_hex16(&b, "mobility_domain", vconf->ft_mobility_domain);
|
||||
blobmsg_add_bool(&b, "ft_psk_generate_local", vconf->ft_psk);
|
||||
blobmsg_add_bool(&b, "ft_over_ds", 0);
|
||||
blobmsg_add_bool(&b, "reassociation_deadline", 1);
|
||||
} else {
|
||||
@@ -1385,9 +1568,8 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
||||
blobmsg_add_bool(&b, "wpa_disable_eapol_key_retries", 1);
|
||||
blobmsg_add_u32(&b, "channel", rconf->channel);
|
||||
|
||||
if (vif_config_security_set(&b, vconf)) {
|
||||
return -1;
|
||||
}
|
||||
if (vif_config_security_set(&b, vconf))
|
||||
return -1;
|
||||
|
||||
if (changed->custom_options)
|
||||
vif_config_custom_opt_set(&b, &del, vconf);
|
||||
@@ -1410,6 +1592,9 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
||||
vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name);
|
||||
}
|
||||
|
||||
if (changed->custom_options)
|
||||
vif_check_radius_proxy();
|
||||
|
||||
reload_config = 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -75,7 +75,7 @@ int rrm_setup_monitor(void);
|
||||
void rrm_channel_init(void);
|
||||
int rrm_ubus_init(struct ev_loop *loop);
|
||||
int ubus_get_noise(const char *if_name, uint32_t *noise);
|
||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency);
|
||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency, int channel_bandwidth, int sec_chan_offset);
|
||||
void set_rrm_parameters(rrm_entry_t *rrm_data);
|
||||
ds_tree_t* rrm_get_rrm_config_list(void);
|
||||
ds_tree_t* rrm_get_radio_list(void);
|
||||
|
||||
@@ -94,6 +94,15 @@ radio_entry_t* rrm_get_radio_config(radio_type_t band)
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
void get_channel_bandwidth(const char* htmode, int *channel_bandwidth)
|
||||
{
|
||||
if(!strcmp(htmode, "HT20"))
|
||||
*channel_bandwidth=20;
|
||||
else if (!strcmp(htmode, "HT40"))
|
||||
*channel_bandwidth=40;
|
||||
else if(!strcmp(htmode, "HT80"))
|
||||
*channel_bandwidth=80;
|
||||
}
|
||||
|
||||
void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
||||
{
|
||||
@@ -154,16 +163,26 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
||||
|
||||
if (nf > nf_drop_threshold)
|
||||
{
|
||||
LOGD("[%s] backup=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
||||
LOGI("Interference detected on [%s], switching to backup_channel=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
||||
radio->config.if_name,
|
||||
rrm_config->rrm_data.backup_channel,
|
||||
nf,
|
||||
rrm_config->rrm_data.noise_lwm,
|
||||
rrm_config->rrm_data.snr_percentage_drop,
|
||||
nf_drop_threshold);
|
||||
int channel_bandwidth;
|
||||
int sec_chan_offset=0;
|
||||
struct mode_map *m = mode_map_get_uci(radio->schema.freq_band, get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
||||
radio->schema.ht_mode), radio->schema.hw_mode);
|
||||
if (m) {
|
||||
sec_chan_offset = m->sec_channel_offset;
|
||||
} else
|
||||
LOGE("failed to get channel offset");
|
||||
|
||||
get_channel_bandwidth(get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
||||
radio->schema.ht_mode), &channel_bandwidth);
|
||||
ubus_set_channel_switch(radio->config.if_name,
|
||||
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel));
|
||||
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel), channel_bandwidth, sec_chan_offset);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -51,7 +51,7 @@ int ubus_get_noise(const char *if_name, uint32_t *noise)
|
||||
|
||||
}
|
||||
|
||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency)
|
||||
int ubus_set_channel_switch(const char *if_name, uint32_t frequency, int channel_bandwidth, int sec_chan_offset)
|
||||
{
|
||||
uint32_t id;
|
||||
static struct blob_buf b;
|
||||
@@ -61,10 +61,21 @@ int ubus_set_channel_switch(const char *if_name, uint32_t frequency)
|
||||
|
||||
if (ubus_lookup_id(ubus, path, &id))
|
||||
return -1;
|
||||
|
||||
blob_buf_init(&b, 0);
|
||||
|
||||
if (channel_bandwidth == 20 || channel_bandwidth == 40) {
|
||||
blobmsg_add_bool(&b, "ht", 1);
|
||||
} else if (channel_bandwidth == 80) {
|
||||
blobmsg_add_bool(&b, "vht", 1);
|
||||
}
|
||||
if (channel_bandwidth == 40 || channel_bandwidth == 80) {
|
||||
blobmsg_add_u32(&b, "center_freq1", frequency+30);
|
||||
}
|
||||
|
||||
blobmsg_add_u32(&b, "freq", frequency);
|
||||
blobmsg_add_u32(&b, "bcn_count", 1);
|
||||
blobmsg_add_u32(&b, "bcn_count", 5);
|
||||
blobmsg_add_u32(&b, "bandwidth", channel_bandwidth);
|
||||
blobmsg_add_u32(&b, "sec_channel_offset", sec_chan_offset);
|
||||
return ubus_invoke(ubus, id, "switch_chan", b.head, NULL, NULL, 1000);
|
||||
}
|
||||
|
||||
|
||||
@@ -130,6 +130,7 @@ static int rx_msg(struct nl_msg *msg, void* arg)
|
||||
struct nlattr *attr[GENL_UCC_ATTR_MAX+1];
|
||||
|
||||
struct voip_session *data;
|
||||
char dst_ip[16];
|
||||
genlmsg_parse(nlmsg_hdr(msg), 0, attr,
|
||||
GENL_UCC_ATTR_MAX, genl_ucc_policy);
|
||||
|
||||
@@ -140,7 +141,6 @@ static int rx_msg(struct nl_msg *msg, void* arg)
|
||||
return NL_OK;
|
||||
}
|
||||
|
||||
char *dst_ip = malloc(16);
|
||||
memset(dst_ip, 0, 16);
|
||||
if((get_current_ip(dst_ip, IAC_IFACE)) < 0) {
|
||||
LOGI("Error: Cannot get IP for %s", IAC_IFACE);
|
||||
|
||||
@@ -463,6 +463,19 @@ dpp_event_record_alloc()
|
||||
return record;
|
||||
}
|
||||
|
||||
static inline dpp_event_channel_switch_t *
|
||||
dpp_event_channel_switch_alloc()
|
||||
{
|
||||
dpp_event_channel_switch_t *record = NULL;
|
||||
|
||||
record = calloc(1, sizeof(dpp_event_channel_switch_t));
|
||||
if (record) {
|
||||
memset(record, 0, sizeof(dpp_event_channel_switch_t));
|
||||
}
|
||||
return record;
|
||||
}
|
||||
|
||||
|
||||
static inline void
|
||||
dpp_event_channel_record_free(dpp_event_channel_switch_t *record)
|
||||
{
|
||||
|
||||
@@ -105,7 +105,6 @@ static void sm_events_report_clear_client(ds_dlist_t *report_list)
|
||||
static void sm_events_report_clear_channel(ds_dlist_t *report_list)
|
||||
{
|
||||
if (!ds_dlist_is_empty(report_list)) {
|
||||
|
||||
dpp_event_channel_switch_t *record = NULL;
|
||||
ds_dlist_iter_t record_iter;
|
||||
|
||||
@@ -129,6 +128,8 @@ static void sm_events_report(EV_P_ ev_timer *w, int revents)
|
||||
/* Event Record */
|
||||
dpp_event_record_t *dpp_record = NULL;
|
||||
dpp_event_record_t *sm_record = NULL;
|
||||
dpp_event_channel_switch_t *dpp_record_cs = NULL;
|
||||
dpp_event_channel_switch_t *sm_record_cs = NULL;
|
||||
ds_dlist_iter_t record_iter;
|
||||
|
||||
dpp_events_report_timer_restart(report_timer);
|
||||
@@ -153,8 +154,23 @@ static void sm_events_report(EV_P_ ev_timer *w, int revents)
|
||||
ds_dlist_insert_tail(&report_ctx->client_event_list, dpp_record);
|
||||
}
|
||||
|
||||
if(!ds_dlist_is_empty(&g_event_report.channel_switch_list))
|
||||
report_ctx->channel_switch_list = g_event_report.channel_switch_list;
|
||||
for (sm_record_cs = ds_dlist_ifirst(&record_iter, &g_event_report.channel_switch_list); sm_record_cs != NULL; sm_record_cs = ds_dlist_inext(&record_iter)) {
|
||||
dpp_record_cs = dpp_event_channel_switch_alloc();
|
||||
|
||||
dpp_record_cs->channel_event.band = sm_record_cs->channel_event.band;
|
||||
dpp_record_cs->channel_event.reason = sm_record_cs->channel_event.reason;
|
||||
dpp_record_cs->channel_event.freq = sm_record_cs->channel_event.freq;
|
||||
dpp_record_cs->channel_event.timestamp = sm_record_cs->channel_event.timestamp;
|
||||
|
||||
ds_dlist_iremove(&record_iter);
|
||||
dpp_event_channel_record_free(sm_record_cs);
|
||||
sm_record_cs = NULL;
|
||||
|
||||
if (ds_dlist_is_empty(&report_ctx->channel_switch_list)) {
|
||||
ds_dlist_init(&report_ctx->channel_switch_list, dpp_event_channel_switch_t, node);
|
||||
}
|
||||
ds_dlist_insert_tail(&report_ctx->channel_switch_list, dpp_record_cs);
|
||||
}
|
||||
|
||||
if (!ds_dlist_is_empty(&report_ctx->client_event_list) || !ds_dlist_is_empty(&report_ctx->channel_switch_list)) {
|
||||
LOG(DEBUG, "Sending events report...");
|
||||
|
||||
@@ -19,6 +19,16 @@ enum {
|
||||
SYSTEM_ATTR_FIRMWARE,
|
||||
SYSTEM_ATTR_REDIRECTOR,
|
||||
SYSTEM_ATTR_INACTIVEFW,
|
||||
SYSTEM_ATTR_SKU,
|
||||
SYSTEM_ATTR_MODEL_REV,
|
||||
SYSTEM_ATTR_MODEL_DESCR,
|
||||
SYSTEM_ATTR_MANUFACT_NAME,
|
||||
SYSTEM_ATTR_MANUFACT_DATE,
|
||||
SYSTEM_ATTR_MANUFACT_URL,
|
||||
SYSTEM_ATTR_MANUF_ABBR,
|
||||
SYSTEM_ATTR_REF_DESIGN,
|
||||
SYSTEM_ATTR_CERT_REGION,
|
||||
SYSTEM_ATTR_MAC_ADDR,
|
||||
__SYSTEM_ATTR_MAX,
|
||||
};
|
||||
|
||||
@@ -29,6 +39,16 @@ static const struct blobmsg_policy system_policy[__SYSTEM_ATTR_MAX] = {
|
||||
[SYSTEM_ATTR_FIRMWARE] = { .name = "firmware", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_REDIRECTOR] = { .name = "redirector", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_INACTIVEFW] = { .name = "inactivefw", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_SKU] = { .name = "sku_number", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MODEL_REV] = { .name = "revision", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MODEL_DESCR] = { .name = "model_description", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MANUFACT_NAME] = { .name = "manufacturer_name", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MANUFACT_DATE] = { .name = "manufacturer_date", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MANUFACT_URL] = { .name = "manufacturer_url", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MANUF_ABBR] = { .name = "manuf_abbr", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_REF_DESIGN] = { .name = "reference_design", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_CERT_REGION] = { .name = "certification_region", .type = BLOBMSG_TYPE_STRING },
|
||||
[SYSTEM_ATTR_MAC_ADDR] = { .name = "id", .type = BLOBMSG_TYPE_STRING },
|
||||
};
|
||||
|
||||
const struct uci_blob_param_list system_param = {
|
||||
@@ -110,6 +130,56 @@ bool target_platform_version_get(void *buf, size_t len)
|
||||
return copy_data(SYSTEM_ATTR_PLATFORM, buf, len);
|
||||
}
|
||||
|
||||
bool target_sku_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_SKU, buf, len);
|
||||
}
|
||||
|
||||
bool target_model_revision_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MODEL_REV, buf, len);
|
||||
}
|
||||
|
||||
bool target_model_description_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MODEL_DESCR, buf, len);
|
||||
}
|
||||
|
||||
bool target_manuf_name_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MANUFACT_NAME, buf, len);
|
||||
}
|
||||
|
||||
bool target_manuf_date_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MANUFACT_DATE, buf, len);
|
||||
}
|
||||
|
||||
bool target_manuf_url_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MANUFACT_URL, buf, len);
|
||||
}
|
||||
|
||||
bool target_manuf_abbr_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MANUF_ABBR, buf, len);
|
||||
}
|
||||
|
||||
bool target_ref_design_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_REF_DESIGN, buf, len);
|
||||
}
|
||||
|
||||
bool target_cert_region_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_CERT_REGION, buf, len);
|
||||
}
|
||||
|
||||
bool target_mac_addr_get(void *buf, size_t len)
|
||||
{
|
||||
return copy_data(SYSTEM_ATTR_MAC_ADDR, buf, len);
|
||||
}
|
||||
|
||||
bool target_device_config_register(void *awlan_cb)
|
||||
{
|
||||
struct schema_AWLAN_Node awlan;
|
||||
|
||||
@@ -2,22 +2,117 @@
|
||||
|
||||
. /lib/functions.sh
|
||||
|
||||
SKU="unknown"
|
||||
MODEL="unknown"
|
||||
PLATFORM="unknown"
|
||||
SERIAL="unknown"
|
||||
MODEL_REV="unknown"
|
||||
MODEL_DESCR="unknown"
|
||||
MANUF_NAME="unknown"
|
||||
MANUF_DATE="unknown"
|
||||
MANUF_URL="unknown"
|
||||
MANUF_DESIGN="unknown"
|
||||
REF_DESIGN="unknown"
|
||||
CERT_REGION="unknown"
|
||||
ID=""
|
||||
|
||||
case "$(board_name)" in
|
||||
edgecore,ecw5211|\
|
||||
edgecore,ecw5410)
|
||||
MODEL=$(cat /tmp/sysinfo/board_name | sed "s/edgecore,//" | tr [a-z] [A-Z])
|
||||
SERIAL=$(cat /sys/class/net/eth0/address | tr -d :)
|
||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||
SERIAL=$(cat /dev/mtd5 | grep serial_number | cut -d "=" -f2)
|
||||
SKU=$(cat /dev/mtd5 | grep sku | cut -d "=" -f2)
|
||||
CERT_REGION=$(cat /dev/mtd5 | grep certification_region | cut -d "=" -f2)
|
||||
ID=$(cat /dev/mtd5 | grep mac_address | cut -d "=" -f2)
|
||||
MANUF_DATE=$(cat /dev/mtd5 | grep manufacturer_date | cut -d "=" -f2)
|
||||
MANUF_NAME=$(cat /dev/mtd5 | grep manufacturer_name | cut -d "=" -f2)
|
||||
if [ ! $MANUF_NAME ]; then
|
||||
MANUF_NAME="Edge-Core"
|
||||
fi
|
||||
MANUF_ABBR="EC"
|
||||
MANUF_URL=$(cat /dev/mtd5 | grep manufacturer_url | cut -d "=" -f2)
|
||||
MODEL_DESCR=$(cat /dev/mtd5 | grep model_description | cut -d "=" -f2)
|
||||
MODEL_REV=$(cat /dev/mtd5 | grep model_revision | cut -d "=" -f2)
|
||||
REF_DESIGN=$(cat /dev/mtd5 | grep reference_design | cut -d "=" -f2)
|
||||
;;
|
||||
cig,wf194c)
|
||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||
SERIAL=$(cat cat /dev/mtd14 | grep BaseMacAddress | cut -dx -f2 | tr -d '\r\n')
|
||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||
SERIAL=$(cat /dev/mtd14 | grep serial_number | cut -d "=" -f2)
|
||||
if [ ! $SERIAL ]; then
|
||||
SERIAL=$(cat /dev/mtd14 | grep BaseMacAddress | cut -dx -f2)
|
||||
fi
|
||||
SKU=$(cat /dev/mtd14 | grep sku | cut -d "=" -f2)
|
||||
CERT_REGION=$(cat /dev/mtd14 | grep certification_region | cut -d "=" -f2)
|
||||
ID=$(cat /dev/mtd14 | grep mac_address | cut -d "=" -f2)
|
||||
MANUF_DATE=$(cat /dev/mtd14 | grep manufacturer_date | cut -d "=" -f2)
|
||||
MANUF_NAME=$(cat /dev/mtd14 | grep manufacturer_name | cut -d "=" -f2)
|
||||
if [ ! $MANUF_NAME ]; then
|
||||
MANUF_NAME="CIG"
|
||||
fi
|
||||
MANUF_ABBR="CIG"
|
||||
MANUF_URL=$(cat /dev/mtd14 | grep manufacturer_url | cut -d "=" -f2)
|
||||
MODEL_DESCR=$(cat /dev/mtd14 | grep model_description | cut -d "=" -f2)
|
||||
MODEL_REV=$(cat /dev/mtd14 | grep model_revision | cut -d "=" -f2)
|
||||
REF_DESIGN=$(cat /dev/mtd14 | grep reference_design | cut -d "=" -f2)
|
||||
;;
|
||||
cig,wf188n)
|
||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||
SERIAL=$(cat /dev/mtd12 | grep serial_number | cut -d "=" -f2)
|
||||
SKU=$(cat /dev/mtd12 | grep sku | cut -d "=" -f2)
|
||||
CERT_REGION=$(cat /dev/mtd12 | grep certification_region | cut -d "=" -f2)
|
||||
ID=$(cat /dev/mtd12 | grep mac_address | cut -d "=" -f2)
|
||||
MANUF_DATE=$(cat /dev/mtd12 | grep manufacturer_date | cut -d "=" -f2)
|
||||
MANUF_NAME=$(cat /dev/mtd12 | grep manufacturer_name | cut -d "=" -f2)
|
||||
if [ ! $MANUF_NAME ]; then
|
||||
MANUF_NAME="CIG"
|
||||
fi
|
||||
MANUF_ABBR="CIG"
|
||||
MANUF_URL=$(cat /dev/mtd12 | grep manufacturer_url | cut -d "=" -f2)
|
||||
MODEL_DESCR=$(cat /dev/mtd12 | grep model_description | cut -d "=" -f2)
|
||||
MODEL_REV=$(cat /dev/mtd12 | grep model_revision | cut -d "=" -f2)
|
||||
REF_DESIGN=$(cat /dev/mtd12 | grep reference_design | cut -d "=" -f2)
|
||||
;;
|
||||
linksys,ea8300)
|
||||
MODEL=$(grep modelNumber= /dev/mtd9 | tr -d '\r\n' | sed "s/modelNumber=//")
|
||||
SERIAL=$(grep serial_number= /dev/mtd9 | tr -d '\r\n' | sed "s/serial_number=//")
|
||||
PLATFORM=OPENWRT_EA8300
|
||||
PLATFORM="OPENWRT_EA8300"
|
||||
MODEL_REV=$(cat /dev/mtd9 | grep hw_revision | cut -d "=" -f2 | tr -d '\r\n')
|
||||
MODEL_DESCR=$(cat /dev/mtd9 | grep modelDescription | cut -d "=" -f2 | tr -d '\r\n')
|
||||
MANUF_URL=$(cat /dev/mtd9 | grep manufacturerURL | cut -d "=" -f2 | tr -d '\r\n')
|
||||
CERT_REGION=$(cat /dev/mtd9 | grep cert_region | cut -d "=" -f2 | tr -d '\r\n')
|
||||
ID=$(cat /dev/mtd9 | grep hw_mac_addr | cut -d "=" -f2 | tr -d '\r\n')
|
||||
MANUF_NAME=$(cat /dev/mtd9 | grep "manufacturer=" | cut -d "=" -f2 | tr -d '\r\n')
|
||||
if [ ! $MANUF_NAME ]; then
|
||||
MANUF_NAME="Linksys"
|
||||
fi
|
||||
MANUF_ABBR="LS"
|
||||
|
||||
MANUF_DATE=$(cat /dev/mtd9 | grep manufacturer_date | cut -d "=" -f2 | tr -d '\r\n')
|
||||
YEAR=$(echo "$MANUF_DATE" | cut -d "/" -f1)
|
||||
MONTH=$(echo "$MANUF_DATE" | cut -d "/" -f2)
|
||||
DAY=$(echo "$MANUF_DATE" | cut -d "/" -f3)
|
||||
MANUF_DATE="$DAY-$MONTH-$YEAR"
|
||||
;;
|
||||
tp-link,ec420-g1)
|
||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||
PLATFORM=$(cat /tmp/sysinfo/model)
|
||||
SERIAL=$(cat /dev/mtd9 | grep serial_number | cut -d "=" -f2)
|
||||
SKU=$(cat /dev/mtd9 | grep sku | cut -d "=" -f2)
|
||||
CERT_REGION=$(cat /dev/mtd9 | grep certification_region | cut -d "=" -f2)
|
||||
ID=$(cat /dev/mtd9 | grep mac_address | cut -d "=" -f2)
|
||||
MANUF_DATE=$(cat /dev/mtd9 | grep manufacturer_date | cut -d "=" -f2)
|
||||
MANUF_NAME=$(cat /dev/mtd9 | grep manufacturer_name | cut -d "=" -f2)
|
||||
if [ ! $MANUF_NAME ]; then
|
||||
MANUF_NAME="Proware (TP-Link)"
|
||||
fi
|
||||
MANUF_ABBR="PW"
|
||||
MANUF_URL=$(cat /dev/mtd9 | grep manufacturer_url | cut -d "=" -f2)
|
||||
MODEL_DESCR=$(cat /dev/mtd9 | grep model_description | cut -d "=" -f2)
|
||||
MODEL_REV=$(cat /dev/mtd9 | grep model_revision | cut -d "=" -f2)
|
||||
REF_DESIGN=$(cat /dev/mtd9 | grep reference_design | cut -d "=" -f2)
|
||||
;;
|
||||
*)
|
||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
||||
@@ -28,9 +123,30 @@ esac
|
||||
|
||||
MODEL=$(echo $MODEL | sed "s/.*,//" | tr [a-z] [A-Z])
|
||||
|
||||
# fallback check to get the serial number from mac address if flash does not contain this info.
|
||||
if [ ! $SERIAL ]; then
|
||||
SERIAL=$(cat /sys/class/net/eth0/address | tr -d :)
|
||||
fi
|
||||
|
||||
# fallback check to get the id from mac address if flash does not contain this info.
|
||||
if [ ! $ID ]; then
|
||||
ID=$(cat /sys/class/net/eth0/address)
|
||||
fi
|
||||
|
||||
uci set system.tip=tip
|
||||
uci set system.tip.serial="${SERIAL}"
|
||||
uci set system.tip.model="${MODEL}"
|
||||
uci set system.tip.platform="${PLATFORM}"
|
||||
uci set system.tip.firmware='0.1.0'
|
||||
uci set system.tip.sku_number="${SKU}"
|
||||
uci set system.tip.revision="${MODEL_REV}"
|
||||
uci set system.tip.model_description="${MODEL_DESCR}"
|
||||
uci set system.tip.manufacturer_name="${MANUF_NAME}"
|
||||
uci set system.tip.manufacturer_date="${MANUF_DATE}"
|
||||
uci set system.tip.manufacturer_url="${MANUF_URL}"
|
||||
uci set system.tip.reference_design="${REF_DESIGN}"
|
||||
uci set system.tip.certification_region="${CERT_REGION}"
|
||||
uci set system.tip.id="${ID}"
|
||||
uci set system.tip.manuf_abbr="${MANUF_ABBR}"
|
||||
|
||||
uci commit
|
||||
|
||||
@@ -0,0 +1,46 @@
|
||||
From 5380b0204d97a79669243b46a8750e038e6a0a19 Mon Sep 17 00:00:00 2001
|
||||
From: Chaitanya Godavarthi <chaitanya.kiran@netexperience.com>
|
||||
Date: Wed, 14 Apr 2021 11:14:45 -0400
|
||||
Subject: [PATCH] netifd: Dont renew dhcp on bridge topo change
|
||||
|
||||
Do not renew the dhcp on bridge topology change
|
||||
as this causes some of the dhcp servers to fail.
|
||||
This occurs when many interfaces are added on to
|
||||
a bridge and for every interface there is a dhcp
|
||||
renew. The server considers receiving renew many
|
||||
times in a quick succession as a DOS attack. So for
|
||||
now we disable dhcp lease renew when a new interface
|
||||
is added.
|
||||
|
||||
Signed-off-by: Chaitanya Godavarthi <chaitanya.kiran@netexperience.com>
|
||||
---
|
||||
.../netifd/patches/0104-fix-dhcp-issue.patch | 17 +++++++++++++++++
|
||||
1 file changed, 17 insertions(+)
|
||||
create mode 100644 package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||
|
||||
diff --git a/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch b/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||
new file mode 100644
|
||||
index 0000000000..6f1d2e708e
|
||||
--- /dev/null
|
||||
+++ b/package/network/config/netifd/patches/0104-fix-dhcp-issue.patch
|
||||
@@ -0,0 +1,17 @@
|
||||
+Index: netifd-2019-08-05-5e02f944/interface.c
|
||||
+===================================================================
|
||||
+--- netifd-2019-08-05-5e02f944.orig/interface.c
|
||||
++++ netifd-2019-08-05-5e02f944/interface.c
|
||||
+@@ -424,7 +424,11 @@ interface_main_dev_cb(struct device_user
|
||||
+ interface_set_link_state(iface, false);
|
||||
+ break;
|
||||
+ case DEV_EVENT_TOPO_CHANGE:
|
||||
+- interface_proto_event(iface->proto, PROTO_CMD_RENEW, false);
|
||||
++ /* This renews the dhcp lease when the bridge adds/deletes a
|
||||
++ * new interface. It causes some dhcp servers to fail in
|
||||
++ * case where there are many interfaces being added to the
|
||||
++ * bridge frequently. Disabling this for now. */
|
||||
++ /* interface_proto_event(iface->proto, PROTO_CMD_RENEW, false); */
|
||||
+ return;
|
||||
+ default:
|
||||
+ break;
|
||||
--
|
||||
2.25.1
|
||||
|
||||
@@ -0,0 +1,31 @@
|
||||
From 4a85624a667c4027bf09f6155fbb046ac588a20a Mon Sep 17 00:00:00 2001
|
||||
From: ravi vaishnav <ravi.vaishnav@netexperience.com>
|
||||
Date: Thu, 22 Apr 2021 16:36:52 -0400
|
||||
Subject: [PATCH] base-files: Increase Socket buffer memory size
|
||||
|
||||
When configuring 16 VLAN, we see hostapd complaining
|
||||
about No buffer space available while handling receive
|
||||
events. Hence, increasing the socket buffer memory size
|
||||
to 512KB.
|
||||
|
||||
Signed-off-by: ravi vaishnav <ravi.vaishnav@netexperience.com>
|
||||
---
|
||||
package/base-files/files/etc/sysctl.d/10-default.conf | 5 +++++
|
||||
1 file changed, 5 insertions(+)
|
||||
|
||||
diff --git a/package/base-files/files/etc/sysctl.d/10-default.conf b/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||
index bc8c579695..aeda9153a8 100644
|
||||
--- a/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||
+++ b/package/base-files/files/etc/sysctl.d/10-default.conf
|
||||
@@ -25,3 +25,8 @@ net.ipv4.tcp_dsack=1
|
||||
|
||||
net.ipv6.conf.default.forwarding=1
|
||||
net.ipv6.conf.all.forwarding=1
|
||||
+
|
||||
+net.core.wmem_default = 524288
|
||||
+net.core.rmem_default = 524288
|
||||
+net.core.wmem_max = 524288
|
||||
+net.core.rmem_max = 524288
|
||||
--
|
||||
2.25.1
|
||||
|
||||
@@ -39,6 +39,7 @@ packages:
|
||||
- luci-mod-simple
|
||||
- luci-theme-tip
|
||||
- nft-qos
|
||||
- openssl-util
|
||||
- openvswitch
|
||||
- openvswitch-common
|
||||
- openvswitch-libofproto
|
||||
@@ -77,6 +78,8 @@ packages:
|
||||
- kmod-iptunnel
|
||||
- kmod-iptunnel6
|
||||
- eapol-test
|
||||
- apc
|
||||
- radsecproxy
|
||||
|
||||
diffconfig: |
|
||||
CONFIG_OPENSSL_ENGINE=y
|
||||
|
||||
Reference in New Issue
Block a user