]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/ap/sta_info.h
mesh: Avoid use of hardcoded cipher
[thirdparty/hostap.git] / src / ap / sta_info.h
CommitLineData
6fc6879b
JM
1/*
2 * hostapd / Station table
4dc03726 3 * Copyright (c) 2002-2011, Jouni Malinen <j@w1.fi>
6fc6879b 4 *
0f3d578e
JM
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
6fc6879b
JM
7 */
8
9#ifndef STA_INFO_H
10#define STA_INFO_H
11
5f92659d
BC
12#ifdef CONFIG_MESH
13/* needed for mesh_plink_state enum */
14#include "common/defs.h"
b8b499e4 15#include "common/wpa_common.h"
5f92659d
BC
16#endif /* CONFIG_MESH */
17
bd00c431 18#include "list.h"
1889af2e 19#include "vlan.h"
bd00c431 20
9b5d2b8b
JM
21/* STA flags */
22#define WLAN_STA_AUTH BIT(0)
23#define WLAN_STA_ASSOC BIT(1)
9b5d2b8b
JM
24#define WLAN_STA_AUTHORIZED BIT(5)
25#define WLAN_STA_PENDING_POLL BIT(6) /* pending activity poll not ACKed */
26#define WLAN_STA_SHORT_PREAMBLE BIT(7)
27#define WLAN_STA_PREAUTH BIT(8)
28#define WLAN_STA_WMM BIT(9)
29#define WLAN_STA_MFP BIT(10)
30#define WLAN_STA_HT BIT(11)
31#define WLAN_STA_WPS BIT(12)
32#define WLAN_STA_MAYBE_WPS BIT(13)
fbbfcbac 33#define WLAN_STA_WDS BIT(14)
b8281964 34#define WLAN_STA_ASSOC_REQ_OK BIT(15)
17f6b900 35#define WLAN_STA_WPS2 BIT(16)
dca30c3f 36#define WLAN_STA_GAS BIT(17)
de3cdf35 37#define WLAN_STA_VHT BIT(18)
3578e665 38#define WLAN_STA_WNM_SLEEP_MODE BIT(19)
8a458116 39#define WLAN_STA_VHT_OPMODE_ENABLED BIT(20)
e7d0e97b 40#define WLAN_STA_VENDOR_VHT BIT(21)
cc28ad8c
JM
41#define WLAN_STA_PENDING_DISASSOC_CB BIT(29)
42#define WLAN_STA_PENDING_DEAUTH_CB BIT(30)
9b5d2b8b
JM
43#define WLAN_STA_NONERP BIT(31)
44
97234b50
JM
45/* Maximum number of supported rates (from both Supported Rates and Extended
46 * Supported Rates IEs). */
47#define WLAN_SUPP_RATES_MAX 32
48
49
ca911d61
JM
50struct mbo_non_pref_chan_info {
51 struct mbo_non_pref_chan_info *next;
52 u8 op_class;
53 u8 pref;
54 u8 reason_code;
55 u8 reason_detail;
56 u8 num_channels;
57 u8 channels[];
58};
59
f2accfe7
EP
60struct pending_eapol_rx {
61 struct wpabuf *buf;
62 struct os_reltime rx_time;
63};
64
97234b50
JM
65struct sta_info {
66 struct sta_info *next; /* next entry in sta list */
67 struct sta_info *hnext; /* next entry in hash table list */
68 u8 addr[6];
7d597d46 69 be32 ipaddr;
bd00c431 70 struct dl_list ip6addr; /* list head for struct ip6addr */
97234b50 71 u16 aid; /* STA's unique AID (1 .. 2007) or 0 if not yet assigned */
9b5d2b8b 72 u32 flags; /* Bitfield of WLAN_STA_* */
97234b50
JM
73 u16 capability;
74 u16 listen_interval; /* or beacon_int for APs */
75 u8 supported_rates[WLAN_SUPP_RATES_MAX];
76 int supported_rates_len;
5d061637 77 u8 qosinfo; /* Valid when WLAN_STA_WMM is set */
97234b50 78
5f92659d
BC
79#ifdef CONFIG_MESH
80 enum mesh_plink_state plink_state;
81 u16 peer_lid;
82 u16 my_lid;
83 u16 mpm_close_reason;
84 int mpm_retries;
b8b499e4
JM
85 u8 my_nonce[WPA_NONCE_LEN];
86 u8 peer_nonce[WPA_NONCE_LEN];
0f950df0 87 u8 aek[32]; /* SHA256 digest length */
b02f4d05
JM
88 u8 mtk[WPA_TK_MAX_LEN];
89 size_t mtk_len;
f868d560 90 u8 mgtk_rsc[6];
3b6deac0 91 u8 mgtk_key_id;
a4eec3c2
JM
92 u8 mgtk[WPA_TK_MAX_LEN];
93 size_t mgtk_len;
f868d560 94 u8 igtk_rsc[6];
4367eec4
JM
95 u8 igtk[WPA_TK_MAX_LEN];
96 size_t igtk_len;
f868d560 97 u16 igtk_key_id;
c596f3f0 98 u8 sae_auth_retry;
5f92659d
BC
99#endif /* CONFIG_MESH */
100
97234b50
JM
101 unsigned int nonerp_set:1;
102 unsigned int no_short_slot_time_set:1;
103 unsigned int no_short_preamble_set:1;
104 unsigned int no_ht_gf_set:1;
105 unsigned int no_ht_set:1;
9c47f6a2 106 unsigned int ht40_intolerant_set:1;
97234b50 107 unsigned int ht_20mhz_set:1;
aefb53bd 108 unsigned int no_p2p_set:1;
c551700f 109 unsigned int qos_map_enabled:1;
6ca0853d 110 unsigned int remediation:1;
8e1146d9 111 unsigned int hs20_deauth_requested:1;
47ea24c1 112 unsigned int session_timeout_set:1;
861beb72 113 unsigned int radius_das_match:1;
98b05081 114 unsigned int ecsa_supported:1;
bb598c3b 115 unsigned int added_unassoc:1;
97234b50
JM
116
117 u16 auth_alg;
97234b50
JM
118
119 enum {
d5b559b6
KP
120 STA_NULLFUNC = 0, STA_DISASSOC, STA_DEAUTH, STA_REMOVE,
121 STA_DISASSOC_FROM_CLI
97234b50
JM
122 } timeout_next;
123
4dc03726
JM
124 u16 deauth_reason;
125 u16 disassoc_reason;
126
97234b50
JM
127 /* IEEE 802.1X related data */
128 struct eapol_state_machine *eapol_sm;
129
f2accfe7
EP
130 struct pending_eapol_rx *pending_eapol_rx;
131
d72a0053 132 u64 acct_session_id;
0fc545ae 133 struct os_reltime acct_session_start;
97234b50
JM
134 int acct_session_started;
135 int acct_terminate_cause; /* Acct-Terminate-Cause */
136 int acct_interim_interval; /* Acct-Interim-Interval */
669b5324 137 unsigned int acct_interim_errors;
97234b50 138
43022abd
NL
139 /* For extending 32-bit driver counters to 64-bit counters */
140 u32 last_rx_bytes_hi;
141 u32 last_rx_bytes_lo;
142 u32 last_tx_bytes_hi;
143 u32 last_tx_bytes_lo;
97234b50
JM
144
145 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */
146
147 struct wpa_state_machine *wpa_sm;
148 struct rsn_preauth_interface *preauth_iface;
149
3ffdeb7a 150 int vlan_id; /* 0: none, >0: VID */
1889af2e 151 struct vlan_description *vlan_desc;
c8e6beab 152 int vlan_id_bound; /* updated by ap_sta_bind_vlan() */
5ee56c4e
MB
153 /* PSKs from RADIUS authentication server */
154 struct hostapd_sta_wpa_psk_short *psk;
97234b50 155
2092597f
MB
156 char *identity; /* User-Name from RADIUS */
157 char *radius_cui; /* Chargeable-User-Identity from RADIUS */
158
df84268a 159 struct ieee80211_ht_capabilities *ht_capabilities;
de3cdf35 160 struct ieee80211_vht_capabilities *vht_capabilities;
8a458116 161 u8 vht_opmode;
97234b50
JM
162
163#ifdef CONFIG_IEEE80211W
164 int sa_query_count; /* number of pending SA Query requests;
165 * 0 = no SA Query in progress */
166 int sa_query_timed_out;
167 u8 *sa_query_trans_id; /* buffer of WLAN_SA_QUERY_TR_ID_LEN *
168 * sa_query_count octets of pending SA Query
169 * transaction identifiers */
10e694a6 170 struct os_reltime sa_query_start;
97234b50
JM
171#endif /* CONFIG_IEEE80211W */
172
dca30c3f
JK
173#ifdef CONFIG_INTERWORKING
174#define GAS_DIALOG_MAX 8 /* Max concurrent dialog number */
175 struct gas_dialog_info *gas_dialog;
176 u8 gas_dialog_next;
177#endif /* CONFIG_INTERWORKING */
178
97234b50 179 struct wpabuf *wps_ie; /* WPS IE from (Re)Association Request */
b305c684 180 struct wpabuf *p2p_ie; /* P2P IE from (Re)Association Request */
f403dcd6 181 struct wpabuf *hs20_ie; /* HS 2.0 IE from (Re)Association Request */
6ca0853d
JM
182 u8 remediation_method;
183 char *remediation_url; /* HS 2.0 Subscription Remediation Server URL */
8e1146d9 184 struct wpabuf *hs20_deauth_req;
97596f8e
JM
185 char *hs20_session_info_url;
186 int hs20_disassoc_timer;
ae667c08
AN
187#ifdef CONFIG_FST
188 struct wpabuf *mb_ies; /* MB IEs from (Re)Association Request */
189#endif /* CONFIG_FST */
39b1572c 190
b3493fa1 191 struct os_reltime connected_time;
c10347f2
JM
192
193#ifdef CONFIG_SAE
98efcc41 194 struct sae_data *sae;
9f2cf23e 195 unsigned int mesh_sae_pmksa_caching:1;
c10347f2 196#endif /* CONFIG_SAE */
47ea24c1
JM
197
198 u32 session_timeout; /* valid only if session_timeout_set == 1 */
38cb0a2d
IP
199
200 /* Last Authentication/(Re)Association Request/Action frame sequence
201 * control */
202 u16 last_seq_ctrl;
203 /* Last Authentication/(Re)Association Request/Action frame subtype */
204 u8 last_subtype;
6332aaf3
JM
205
206#ifdef CONFIG_MBO
207 u8 cell_capa; /* 0 = unknown (not an MBO STA); otherwise,
208 * enum mbo_cellular_capa values */
ca911d61 209 struct mbo_non_pref_chan_info *non_pref_chan;
6332aaf3 210#endif /* CONFIG_MBO */
adf0478e
JM
211
212 u8 *supp_op_classes; /* Supported Operating Classes element, if
213 * received, starting from the Length field */
629e1804
DS
214
215 u8 rrm_enabled_capa[5];
97234b50
JM
216};
217
218
219/* Default value for maximum station inactivity. After AP_MAX_INACTIVITY has
220 * passed since last received frame from the station, a nullfunc data frame is
221 * sent to the station. If this frame is not acknowledged and no other frames
222 * have been received, the station will be disassociated after
ffbf1eaa 223 * AP_DISASSOC_DELAY seconds. Similarly, the station will be deauthenticated
97234b50
JM
224 * after AP_DEAUTH_DELAY seconds has passed after disassociation. */
225#define AP_MAX_INACTIVITY (5 * 60)
9b285081 226#define AP_DISASSOC_DELAY (3)
97234b50
JM
227#define AP_DEAUTH_DELAY (1)
228/* Number of seconds to keep STA entry with Authenticated flag after it has
229 * been disassociated. */
230#define AP_MAX_INACTIVITY_AFTER_DISASSOC (1 * 30)
231/* Number of seconds to keep STA entry after it has been deauthenticated. */
232#define AP_MAX_INACTIVITY_AFTER_DEAUTH (1 * 5)
233
234
235struct hostapd_data;
236
6fc6879b
JM
237int ap_for_each_sta(struct hostapd_data *hapd,
238 int (*cb)(struct hostapd_data *hapd, struct sta_info *sta,
239 void *ctx),
240 void *ctx);
241struct sta_info * ap_get_sta(struct hostapd_data *hapd, const u8 *sta);
f2c56602 242struct sta_info * ap_get_sta_p2p(struct hostapd_data *hapd, const u8 *addr);
6fc6879b
JM
243void ap_sta_hash_add(struct hostapd_data *hapd, struct sta_info *sta);
244void ap_free_sta(struct hostapd_data *hapd, struct sta_info *sta);
bd00c431 245void ap_sta_ip6addr_del(struct hostapd_data *hapd, struct sta_info *sta);
6fc6879b
JM
246void hostapd_free_stas(struct hostapd_data *hapd);
247void ap_handle_timer(void *eloop_ctx, void *timeout_ctx);
91f9e607
KP
248void ap_sta_replenish_timeout(struct hostapd_data *hapd, struct sta_info *sta,
249 u32 session_timeout);
6fc6879b
JM
250void ap_sta_session_timeout(struct hostapd_data *hapd, struct sta_info *sta,
251 u32 session_timeout);
252void ap_sta_no_session_timeout(struct hostapd_data *hapd,
253 struct sta_info *sta);
97596f8e
JM
254void ap_sta_session_warning_timeout(struct hostapd_data *hapd,
255 struct sta_info *sta, int warning_time);
6fc6879b
JM
256struct sta_info * ap_sta_add(struct hostapd_data *hapd, const u8 *addr);
257void ap_sta_disassociate(struct hostapd_data *hapd, struct sta_info *sta,
258 u16 reason);
259void ap_sta_deauthenticate(struct hostapd_data *hapd, struct sta_info *sta,
260 u16 reason);
4c374cde
AS
261#ifdef CONFIG_WPS
262int ap_sta_wps_cancel(struct hostapd_data *hapd,
263 struct sta_info *sta, void *ctx);
264#endif /* CONFIG_WPS */
c8e6beab 265int ap_sta_bind_vlan(struct hostapd_data *hapd, struct sta_info *sta);
1889af2e
MB
266int ap_sta_set_vlan(struct hostapd_data *hapd, struct sta_info *sta,
267 struct vlan_description *vlan_desc);
93b76319
JM
268void ap_sta_start_sa_query(struct hostapd_data *hapd, struct sta_info *sta);
269void ap_sta_stop_sa_query(struct hostapd_data *hapd, struct sta_info *sta);
45c94154 270int ap_check_sa_query_timeout(struct hostapd_data *hapd, struct sta_info *sta);
45cefa0b
JM
271void ap_sta_disconnect(struct hostapd_data *hapd, struct sta_info *sta,
272 const u8 *addr, u16 reason);
6fc6879b 273
6905dcb1
JB
274void ap_sta_set_authorized(struct hostapd_data *hapd,
275 struct sta_info *sta, int authorized);
276static inline int ap_sta_is_authorized(struct sta_info *sta)
277{
278 return sta->flags & WLAN_STA_AUTHORIZED;
279}
280
4dc03726
JM
281void ap_sta_deauth_cb(struct hostapd_data *hapd, struct sta_info *sta);
282void ap_sta_disassoc_cb(struct hostapd_data *hapd, struct sta_info *sta);
9e8fde21
JM
283void ap_sta_clear_disconnect_timeouts(struct hostapd_data *hapd,
284 struct sta_info *sta);
4dc03726 285
b76f4c27
JM
286int ap_sta_flags_txt(u32 flags, char *buf, size_t buflen);
287
6fc6879b 288#endif /* STA_INFO_H */