92eb00aec2
Extend ACL check to deny Probe Request frames for the client which does not pass ACL check. Skip this check for the case where RADIUS ACL is used to avoid excessive load on the RADIUS authentication server due to Probe Request frames. This patch add wpa_msg event for auth and assoc rejection due to acl reject. Signed-off-by: Tamizh chelvam <tamizhr@codeaurora.org>
33 lines
1 KiB
C
33 lines
1 KiB
C
/*
|
|
* hostapd / IEEE 802.11 authentication (ACL)
|
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#ifndef IEEE802_11_AUTH_H
|
|
#define IEEE802_11_AUTH_H
|
|
|
|
enum {
|
|
HOSTAPD_ACL_REJECT = 0,
|
|
HOSTAPD_ACL_ACCEPT = 1,
|
|
HOSTAPD_ACL_PENDING = 2,
|
|
HOSTAPD_ACL_ACCEPT_TIMEOUT = 3
|
|
};
|
|
|
|
int hostapd_check_acl(struct hostapd_data *hapd, const u8 *addr,
|
|
struct vlan_description *vlan_id);
|
|
int hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr,
|
|
const u8 *msg, size_t len, u32 *session_timeout,
|
|
u32 *acct_interim_interval,
|
|
struct vlan_description *vlan_id,
|
|
struct hostapd_sta_wpa_psk_short **psk,
|
|
char **identity, char **radius_cui,
|
|
int is_probe_req);
|
|
int hostapd_acl_init(struct hostapd_data *hapd);
|
|
void hostapd_acl_deinit(struct hostapd_data *hapd);
|
|
void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
|
void hostapd_acl_expire(struct hostapd_data *hapd);
|
|
|
|
#endif /* IEEE802_11_AUTH_H */
|