Commit Graph

412 Commits

Author SHA1 Message Date
Daniel Golle 6ce434bc9b package: improve init script 2016-08-23 17:10:44 +02:00
Daniel Golle 85b3088c55 package: add PACKAGE_MAC80211_CAPWAP_WTP 2016-08-23 15:11:45 +02:00
Daniel Golle 8d594903f5 package: build-depend on mac80211
headers are not in place if building in parallel. try to address that
by adding PKG_BUILD_DEPENDS:=mac80211
2016-08-23 14:14:50 +02:00
Daniel Golle ec1fea6930 package: fixes for uci config and init script 2016-08-23 12:52:19 +02:00
Daniel Golle f571f4b2f7 package: create directories properly 2016-08-23 12:07:47 +02:00
Daniel Golle fc2149e345 package: update source reference 2016-08-23 12:02:43 +02:00
Daniel Golle a631f89729 package: add procd initscript and default uci config 2016-08-23 10:37:23 +02:00
Daniel Golle 63b4dbe91d package: remove obsolete files 2016-08-23 10:35:13 +02:00
Daniel Golle a500f104e1 package: move package into directory 2016-08-23 10:34:32 +02:00
Andreas Schultz 3869271509 rename kernel modules to wtp.ko 2016-08-23 09:18:16 +02:00
Andreas Schultz f4a2bae666 move kmod to top level directory 2016-08-23 09:08:46 +02:00
Andreas Schultz 7bb46f9927 update packet tunnel support patches 2016-08-23 08:55:15 +02:00
Andreas Schultz a6d5b88a1b prepare v1.4.0 release 2016-08-23 08:55:15 +02:00
Andreas Schultz 0101ea6e56 fork SmartCAWPAP as FreeWTP 2016-08-23 08:55:15 +02:00
Andreas Schultz 8cc6559f08 report supported Split MAC profiles and validate it in AC requests 2016-08-17 16:01:53 +02:00
Andreas Schultz de0ffd5153 properly handle a DTLS handshake failure
early DTLS handshake failures would not terminate the read
loop and cause the remaining handshake bytes to be feed to
packet reader, causing an error assertion.

Rework the main read loop to terminate it when the read
event is not longer active and stop the read event on
handshake failure.

Also, make the DTLS handshake erorr message a bit more readable
by appending the WolfSSL error message to it.

Fixes issue #8.
2016-08-17 15:18:35 +02:00
Andreas Schultz 627ecd5a9e rework MAC type handling so that split, local and both MAC's are possible 2016-08-17 14:10:04 +02:00
Andreas Schultz 0df59ddaad fix missing element declaration from ff290d80b5 2016-08-17 14:10:04 +02:00
Tobias Hintze 9b7e282d52 finally fix that typo 2016-08-17 14:06:56 +02:00
Andreas Schultz ff290d80b5 add RFC 7494 CAPWAP elements 2016-08-17 11:55:56 +02:00
Tobias Hintze c57eaca805 [openwrt] use git instead of local copies 2016-08-17 09:43:46 +02:00
Andreas Schultz 76cd5d7484 release 1.3.2 2016-08-15 15:39:06 +02:00
Andreas Schultz a488af66cf add vendor VSA to set additional key and IGTK support
IGTK == Management Frame Protection
2016-08-15 15:30:29 +02:00
Andreas Schultz ac135e16c4 add VSA to report supported ciphers per radio 2016-08-12 12:08:06 +02:00
Andreas Schultz 6f7c26d0af release 1.3.1 2016-08-11 16:03:57 +02:00
Andreas Schultz fdf256553c [mac80211] remove obsolete debugging output 2016-08-11 16:00:41 +02:00
Andreas Schultz ecf7a24eac [wtp-kmod] replace some printk based tracing with ftrace events 2016-08-11 15:43:19 +02:00
Andreas Schultz 57bcb0e183 fix hw queue selection for 802.11 raw frame injection
Update mac80211 support patch:
 * remove obsolte monitor sdata handling (we don't use
   a monitor interface, so accessing that data is a bug)
 * initialize the skb queue mapping to match the tid,
   at least ath9k does not like it when the tid and
   queue mapping disagree
2016-08-11 12:35:11 +02:00
Andreas Schultz 9fbf441896 release 1.3.0 2016-08-08 09:28:18 +02:00
Andreas Schultz 01919fffd9 update support for group key updates with Update WLAN 2016-08-08 09:25:01 +02:00
Andreas Schultz 02e8d534b5 preserve QoS tid for injected QoS data frames
The TX path will overwrite the TID based on the SKB
priority. Load the QoS TID from 802.11 frames into
the skb priority to preserve it during TX handling.
2016-08-02 15:46:07 +02:00
Andreas Schultz 3626927722 reset timeout_action on assoc response frame
Assoziation is complete when we get a response frame. We need to
reset the timeout action here, otherwise the client gets detached
as soon as the timer fires.
2016-08-01 18:14:00 +02:00
Andreas Schultz 2ac3944e7a implement WPA2 Stations Key handling
Implement the required support for extrace the cipher
suite settings from the the RS Information Element and
set the station key based on the 802.11 Station Key
CAPWAP message element.

Group Key update handling is currently not implemented nor is
Station Key update handling.
2016-07-27 12:36:34 +02:00
Andreas Schultz a131e17a6e fix 802.11 Station Key IE handling
memsetting the data to zero right after assigning them
is obviously wrong
2016-07-27 12:17:00 +02:00
Andreas Schultz 0e19b53e28 forward PAE (IEEE 802.1X Authentication) frames as raw 802.11 frames to AC 2016-05-10 17:07:46 +02:00
Andreas Schultz 9ded0bb87b release 1.2.1 2016-05-06 17:58:27 +02:00
Andreas Schultz b0aaaa4436 replace memcmp on message id struct with direct compare
cset 3761122c fixed one place, but a few others remained.
This should take care of them all and fix a missing
IE in Add WLAN responses.
2016-05-06 17:52:39 +02:00
Andreas Schultz 6024cc15cf fix interpretation of Add WLAN's capability field
RFC 5416 copies the order of the capability flags from the
IEEE 802.11 capability IE. However, the bit ordering assumtions
in RFC 5416 differ from IEEE 802.11 (in the RFC the MSB is
numbered 0, in IEEE 802.11 the MSB is numbere 15).

RFC 5416 therefore specifies the capability flags bit reversed
compared to IEEE 802.11.
2016-05-03 10:28:38 +02:00
Andreas Schultz d51873dd4b adjust OpenWRT package for v1.2.0 and OpenWRT HEAD 2016-04-29 09:04:52 +02:00
Andreas Schultz 480f5d8782 update README and NEWS for 1.2.0 release 2016-04-29 08:58:26 +02:00
Andreas Schultz 651ccc0d33 rework debug output to be more helpful for radio config failures 2016-04-29 08:32:49 +02:00
Andreas Schultz baf1ccbc73 add Vendor TP WTP Timestamp to Echo Request 2016-04-08 15:18:53 +02:00
Tobias Hintze 4f3fe0c339 fix error-condition for invalid WLAN ID 2016-04-08 13:16:19 +02:00
Andreas Schultz 813f24b8ac implement station inactivity timeout
After the max station inactivity has expired, a probe request
(a data null frame) is sent to the station. It the station does
not ACK this frame, it is removed from the WTP.

Note: inactivity timeout is not the same as the CAPWAP Idle Timeout.
The CAPWAP Idle Timeout would remove a station due to inactivity
even when it is still reachable from the WTP. In contrast, the
inactivity timeout probes whether the station is still present
and only removes it when not.
2016-04-07 15:15:50 +02:00
Andreas Schultz bca5c91ae1 fix spelling of Deauthentication 2016-04-07 14:41:39 +02:00
Andreas Schultz 619c40d5be move nlmsg_free into nl send_and_recv
Simplify resource cleanup and return handling for all
callers of nl send_and_recv.
2016-04-07 11:54:07 +02:00
Andreas Schultz 7b4e386057 add nl80211_wlan_send_and_recv_msg helper 2016-04-07 11:31:11 +02:00
Andreas Schultz 5195ea9e37 rework nl80211_wlan_event in preparation of more events to handle 2016-04-07 11:31:11 +02:00
Andreas Schultz 8f03ecca9b add support functions to handle station inactivity
Detect support for AP side inactivity timer and reading
to the inactivity time for a station.
2016-04-07 11:31:11 +02:00
Andreas Schultz 4b1caad54b consolidate nl msg generation into helper and add more error handling to it 2016-04-07 11:31:04 +02:00