HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP
If the authentication server includes the WFA HS 2.0 Session Info URL AVP in Access-Accept, schedule ESS Disassociation Imminent frame to be transmitted specified warning time prior to session timeout. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
8e1146d9da
commit
97596f8ed4
4 changed files with 86 additions and 2 deletions
|
@ -1286,12 +1286,55 @@ static void ieee802_1x_hs20_deauth_req(struct hostapd_data *hapd,
|
|||
ap_sta_session_timeout(hapd, sta, hapd->conf->hs20_deauth_req_timeout);
|
||||
}
|
||||
|
||||
|
||||
static void ieee802_1x_hs20_session_info(struct hostapd_data *hapd,
|
||||
struct sta_info *sta, u8 *pos,
|
||||
size_t len, int session_timeout)
|
||||
{
|
||||
unsigned int swt;
|
||||
int warning_time, beacon_int;
|
||||
|
||||
if (len < 1)
|
||||
return; /* Malformed information */
|
||||
os_free(sta->hs20_session_info_url);
|
||||
sta->hs20_session_info_url = os_malloc(len);
|
||||
if (sta->hs20_session_info_url == NULL)
|
||||
return;
|
||||
swt = pos[0];
|
||||
os_memcpy(sta->hs20_session_info_url, pos + 1, len - 1);
|
||||
sta->hs20_session_info_url[len - 1] = '\0';
|
||||
wpa_printf(MSG_DEBUG, "HS 2.0: Session Information URL='%s' SWT=%u "
|
||||
"(session_timeout=%d)",
|
||||
sta->hs20_session_info_url, swt, session_timeout);
|
||||
if (session_timeout < 0) {
|
||||
wpa_printf(MSG_DEBUG, "HS 2.0: No Session-Timeout set - ignore session info URL");
|
||||
return;
|
||||
}
|
||||
if (swt == 255)
|
||||
swt = 1; /* Use one minute as the AP selected value */
|
||||
|
||||
if ((unsigned int) session_timeout < swt * 60)
|
||||
warning_time = 0;
|
||||
else
|
||||
warning_time = session_timeout - swt * 60;
|
||||
|
||||
beacon_int = hapd->iconf->beacon_int;
|
||||
if (beacon_int < 1)
|
||||
beacon_int = 100; /* best guess */
|
||||
sta->hs20_disassoc_timer = swt * 60 * 1000 / beacon_int * 125 / 128;
|
||||
if (sta->hs20_disassoc_timer > 65535)
|
||||
sta->hs20_disassoc_timer = 65535;
|
||||
|
||||
ap_sta_session_warning_timeout(hapd, sta, warning_time);
|
||||
}
|
||||
|
||||
#endif /* CONFIG_HS20 */
|
||||
|
||||
|
||||
static void ieee802_1x_check_hs20(struct hostapd_data *hapd,
|
||||
struct sta_info *sta,
|
||||
struct radius_msg *msg)
|
||||
struct radius_msg *msg,
|
||||
int session_timeout)
|
||||
{
|
||||
#ifdef CONFIG_HS20
|
||||
u8 *buf, *pos, *end, type, sublen;
|
||||
|
@ -1328,6 +1371,10 @@ static void ieee802_1x_check_hs20(struct hostapd_data *hapd,
|
|||
case RADIUS_VENDOR_ATTR_WFA_HS20_DEAUTH_REQ:
|
||||
ieee802_1x_hs20_deauth_req(hapd, sta, pos, sublen);
|
||||
break;
|
||||
case RADIUS_VENDOR_ATTR_WFA_HS20_SESSION_INFO_URL:
|
||||
ieee802_1x_hs20_session_info(hapd, sta, pos, sublen,
|
||||
session_timeout);
|
||||
break;
|
||||
}
|
||||
}
|
||||
#endif /* CONFIG_HS20 */
|
||||
|
@ -1492,7 +1539,9 @@ ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
|
|||
ieee802_1x_store_radius_class(hapd, sta, msg);
|
||||
ieee802_1x_update_sta_identity(hapd, sta, msg);
|
||||
ieee802_1x_update_sta_cui(hapd, sta, msg);
|
||||
ieee802_1x_check_hs20(hapd, sta, msg);
|
||||
ieee802_1x_check_hs20(hapd, sta, msg,
|
||||
session_timeout_set ?
|
||||
(int) session_timeout : -1);
|
||||
if (sm->eap_if->eapKeyAvailable && !sta->remediation &&
|
||||
!sta->hs20_deauth_requested &&
|
||||
wpa_auth_pmksa_add(sta->wpa_sm, sm->eapol_key_crypt,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue