| /* |
| * Copyright 2016 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package android.hardware.wifi.supplicant@1.0; |
| |
| /** |
| * Callback Interface exposed by the supplicant service |
| * for each station mode interface (ISupplicantStaIface). |
| * |
| * Clients need to host an instance of this HIDL interface object and |
| * pass a reference of the object to the supplicant via the |
| * corresponding |ISupplicantStaIface.registerCallback| method. |
| */ |
| interface ISupplicantStaIfaceCallback { |
| /** Various states of the interface reported by |onStateChanged|.*/ |
| enum State : uint32_t { |
| /** |
| * This state indicates that client is not associated, but is likely to |
| * start looking for an access point. This state is entered when a |
| * connection is lost. |
| */ |
| DISCONNECTED = 0, |
| /** |
| * This state is entered if the network interface is disabled, e.g., |
| * due to rfkill. the supplicant refuses any new operations that would |
| * use the radio until the interface has been enabled. |
| */ |
| IFACE_DISABLED = 1, |
| /** |
| * This state is entered if there are no enabled networks in the |
| * configuration. the supplicant is not trying to associate with a new |
| * network and external interaction (e.g., ctrl_iface call to add or |
| * enable a network) is needed to start association. |
| */ |
| INACTIVE = 2, |
| /** |
| * This state is entered when the supplicant starts scanning for a |
| * network. |
| */ |
| SCANNING = 3, |
| /** |
| * This state is entered when the supplicant has found a suitable BSS |
| * to authenticate with and the driver is configured to try to |
| * authenticate with this BSS. This state is used only with drivers |
| * that use the supplicant as the SME. |
| */ |
| AUTHENTICATING = 4, |
| /** |
| * This state is entered when the supplicant has found a suitable BSS |
| * to associate with and the driver is configured to try to associate |
| * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this |
| * state is entered when the driver is configured to try to associate |
| * with a network using the configured SSID and security policy. |
| */ |
| ASSOCIATING = 5, |
| /** |
| * This state is entered when the driver reports that association has |
| * been successfully completed with an AP. If IEEE 802.1X is used |
| * (with or without WPA/WPA2), the supplicant remains in this state |
| * until the IEEE 802.1X/EAPOL authentication has been completed. |
| */ |
| ASSOCIATED = 6, |
| /** |
| * This state is entered when WPA/WPA2 4-Way Handshake is started. In |
| * case of WPA-PSK, this happens when receiving the first EAPOL-Key |
| * frame after association. In case of WPA-EAP, this state is entered |
| * when the IEEE 802.1X/EAPOL authentication has been completed. |
| */ |
| FOURWAY_HANDSHAKE = 7, |
| /** |
| * This state is entered when 4-Way Key Handshake has been completed |
| * (i.e., when the supplicant sends out message 4/4) and when Group |
| * Key rekeying is started by the AP (i.e., when supplicant receives |
| * message 1/2). |
| */ |
| GROUP_HANDSHAKE = 8, |
| /** |
| * This state is entered when the full authentication process is |
| * completed. In case of WPA2, this happens when the 4-Way Handshake is |
| * successfully completed. With WPA, this state is entered after the |
| * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is |
| * completed after dynamic keys are received (or if not used, after |
| * the EAP authentication has been completed). With static WEP keys and |
| * plaintext connections, this state is entered when an association |
| * has been completed. |
| * |
| * This state indicates that the supplicant has completed its |
| * processing for the association phase and that data connection is |
| * fully configured. |
| */ |
| COMPLETED = 9 |
| }; |
| |
| /** |
| * OSU Method. Refer to section 4.8.1.3 of the Hotspot 2.0 spec. |
| */ |
| enum OsuMethod : uint8_t { |
| OMA_DM = 0, |
| SOAP_XML_SPP = 1 |
| }; |
| |
| /** |
| * ANQP data for IEEE Std 802.11u-2011. |
| * The format of the data within these elements follows the IEEE |
| * Std 802.11u-2011 standard. |
| */ |
| struct AnqpData { |
| vec<uint8_t> venueName; |
| vec<uint8_t> roamingConsortium; |
| vec<uint8_t> ipAddrTypeAvailability; |
| vec<uint8_t> naiRealm; |
| vec<uint8_t> anqp3gppCellularNetwork; |
| vec<uint8_t> domainName; |
| }; |
| |
| /** |
| * ANQP data for Hotspot 2.0. |
| * The format of the data within these elements follows the Hotspot 2.0 |
| * standard. |
| */ |
| struct Hs20AnqpData { |
| vec<uint8_t> operatorFriendlyName; |
| vec<uint8_t> wanMetrics; |
| vec<uint8_t> connectionCapability; |
| vec<uint8_t> osuProvidersList; |
| }; |
| |
| /** |
| * WPS Configuration Error. |
| */ |
| enum WpsConfigError : uint16_t { |
| NO_ERROR = 0, |
| OOB_IFACE_READ_ERROR = 1, |
| DECRYPTION_CRC_FAILURE = 2, |
| CHAN_24_NOT_SUPPORTED = 3, |
| CHAN_50_NOT_SUPPORTED = 4, |
| SIGNAL_TOO_WEAK = 5, |
| NETWORK_AUTH_FAILURE = 6, |
| NETWORK_ASSOC_FAILURE = 7, |
| NO_DHCP_RESPONSE = 8, |
| FAILED_DHCP_CONFIG = 9, |
| IP_ADDR_CONFLICT = 10, |
| NO_CONN_TO_REGISTRAR = 11, |
| MULTIPLE_PBC_DETECTED = 12, |
| ROGUE_SUSPECTED = 13, |
| DEVICE_BUSY = 14, |
| SETUP_LOCKED = 15, |
| MSG_TIMEOUT = 16, |
| REG_SESS_TIMEOUT = 17, |
| DEV_PASSWORD_AUTH_FAILURE = 18, |
| CHAN_60G_NOT_SUPPORTED = 19, |
| PUBLIC_KEY_HASH_MISMATCH = 20 |
| }; |
| |
| /** |
| * Vendor specific Error Indication for WPS event messages. |
| */ |
| enum WpsErrorIndication : uint16_t { |
| NO_ERROR = 0, |
| SECURITY_TKIP_ONLY_PROHIBITED = 1, |
| SECURITY_WEP_PROHIBITED = 2, |
| AUTH_FAILURE = 3 |
| }; |
| |
| /** |
| * Status codes (IEEE Std 802.11-2016, 9.4.1.9, Table 9-46). |
| */ |
| enum StatusCode : uint32_t { |
| SUCCESS = 0, |
| UNSPECIFIED_FAILURE = 1, |
| TDLS_WAKEUP_ALTERNATE = 2, |
| TDLS_WAKEUP_REJECT = 3, |
| SECURITY_DISABLED = 5, |
| UNACCEPTABLE_LIFETIME = 6, |
| NOT_IN_SAME_BSS = 7, |
| CAPS_UNSUPPORTED = 10, |
| REASSOC_NO_ASSOC = 11, |
| ASSOC_DENIED_UNSPEC = 12, |
| NOT_SUPPORTED_AUTH_ALG = 13, |
| UNKNOWN_AUTH_TRANSACTION = 14, |
| CHALLENGE_FAIL = 15, |
| AUTH_TIMEOUT = 16, |
| AP_UNABLE_TO_HANDLE_NEW_STA = 17, |
| ASSOC_DENIED_RATES = 18, |
| ASSOC_DENIED_NOSHORT = 19, |
| SPEC_MGMT_REQUIRED = 22, |
| PWR_CAPABILITY_NOT_VALID = 23, |
| SUPPORTED_CHANNEL_NOT_VALID = 24, |
| ASSOC_DENIED_NO_SHORT_SLOT_TIME = 25, |
| ASSOC_DENIED_NO_HT = 27, |
| R0KH_UNREACHABLE = 28, |
| ASSOC_DENIED_NO_PCO = 29, |
| ASSOC_REJECTED_TEMPORARILY = 30, |
| ROBUST_MGMT_FRAME_POLICY_VIOLATION = 31, |
| UNSPECIFIED_QOS_FAILURE = 32, |
| DENIED_INSUFFICIENT_BANDWIDTH = 33, |
| DENIED_POOR_CHANNEL_CONDITIONS = 34, |
| DENIED_QOS_NOT_SUPPORTED = 35, |
| REQUEST_DECLINED = 37, |
| INVALID_PARAMETERS = 38, |
| REJECTED_WITH_SUGGESTED_CHANGES = 39, |
| INVALID_IE = 40, |
| GROUP_CIPHER_NOT_VALID = 41, |
| PAIRWISE_CIPHER_NOT_VALID = 42, |
| AKMP_NOT_VALID = 43, |
| UNSUPPORTED_RSN_IE_VERSION = 44, |
| INVALID_RSN_IE_CAPAB = 45, |
| CIPHER_REJECTED_PER_POLICY = 46, |
| TS_NOT_CREATED = 47, |
| DIRECT_LINK_NOT_ALLOWED = 48, |
| DEST_STA_NOT_PRESENT = 49, |
| DEST_STA_NOT_QOS_STA = 50, |
| ASSOC_DENIED_LISTEN_INT_TOO_LARGE = 51, |
| INVALID_FT_ACTION_FRAME_COUNT = 52, |
| INVALID_PMKID = 53, |
| INVALID_MDIE = 54, |
| INVALID_FTIE = 55, |
| REQUESTED_TCLAS_NOT_SUPPORTED = 56, |
| INSUFFICIENT_TCLAS_PROCESSING_RESOURCES = 57, |
| TRY_ANOTHER_BSS = 58, |
| GAS_ADV_PROTO_NOT_SUPPORTED = 59, |
| NO_OUTSTANDING_GAS_REQ = 60, |
| GAS_RESP_NOT_RECEIVED = 61, |
| STA_TIMED_OUT_WAITING_FOR_GAS_RESP = 62, |
| GAS_RESP_LARGER_THAN_LIMIT = 63, |
| REQ_REFUSED_HOME = 64, |
| ADV_SRV_UNREACHABLE = 65, |
| REQ_REFUSED_SSPN = 67, |
| REQ_REFUSED_UNAUTH_ACCESS = 68, |
| INVALID_RSNIE = 72, |
| U_APSD_COEX_NOT_SUPPORTED = 73, |
| U_APSD_COEX_MODE_NOT_SUPPORTED = 74, |
| BAD_INTERVAL_WITH_U_APSD_COEX = 75, |
| ANTI_CLOGGING_TOKEN_REQ = 76, |
| FINITE_CYCLIC_GROUP_NOT_SUPPORTED = 77, |
| CANNOT_FIND_ALT_TBTT = 78, |
| TRANSMISSION_FAILURE = 79, |
| REQ_TCLAS_NOT_SUPPORTED = 80, |
| TCLAS_RESOURCES_EXCHAUSTED = 81, |
| REJECTED_WITH_SUGGESTED_BSS_TRANSITION = 82, |
| REJECT_WITH_SCHEDULE = 83, |
| REJECT_NO_WAKEUP_SPECIFIED = 84, |
| SUCCESS_POWER_SAVE_MODE = 85, |
| PENDING_ADMITTING_FST_SESSION = 86, |
| PERFORMING_FST_NOW = 87, |
| PENDING_GAP_IN_BA_WINDOW = 88, |
| REJECT_U_PID_SETTING = 89, |
| REFUSED_EXTERNAL_REASON = 92, |
| REFUSED_AP_OUT_OF_MEMORY = 93, |
| REJECTED_EMERGENCY_SERVICE_NOT_SUPPORTED = 94, |
| QUERY_RESP_OUTSTANDING = 95, |
| REJECT_DSE_BAND = 96, |
| TCLAS_PROCESSING_TERMINATED = 97, |
| TS_SCHEDULE_CONFLICT = 98, |
| DENIED_WITH_SUGGESTED_BAND_AND_CHANNEL = 99, |
| MCCAOP_RESERVATION_CONFLICT = 100, |
| MAF_LIMIT_EXCEEDED = 101, |
| MCCA_TRACK_LIMIT_EXCEEDED = 102, |
| DENIED_DUE_TO_SPECTRUM_MANAGEMENT = 103, |
| ASSOC_DENIED_NO_VHT = 104, |
| ENABLEMENT_DENIED = 105, |
| RESTRICTION_FROM_AUTHORIZED_GDB = 106, |
| AUTHORIZATION_DEENABLED = 107, |
| FILS_AUTHENTICATION_FAILURE = 112, |
| UNKNOWN_AUTHENTICATION_SERVER = 113 |
| }; |
| |
| /** |
| * Reason codes (IEEE Std 802.11-2016, 9.4.1.7, Table 9-45). |
| */ |
| enum ReasonCode : uint32_t { |
| UNSPECIFIED = 1, |
| PREV_AUTH_NOT_VALID = 2, |
| DEAUTH_LEAVING = 3, |
| DISASSOC_DUE_TO_INACTIVITY = 4, |
| DISASSOC_AP_BUSY = 5, |
| CLASS2_FRAME_FROM_NONAUTH_STA = 6, |
| CLASS3_FRAME_FROM_NONASSOC_STA = 7, |
| DISASSOC_STA_HAS_LEFT = 8, |
| STA_REQ_ASSOC_WITHOUT_AUTH = 9, |
| PWR_CAPABILITY_NOT_VALID = 10, |
| SUPPORTED_CHANNEL_NOT_VALID = 11, |
| BSS_TRANSITION_DISASSOC = 12, |
| INVALID_IE = 13, |
| MICHAEL_MIC_FAILURE = 14, |
| FOURWAY_HANDSHAKE_TIMEOUT = 15, |
| GROUP_KEY_UPDATE_TIMEOUT = 16, |
| IE_IN_4WAY_DIFFERS = 17, |
| GROUP_CIPHER_NOT_VALID = 18, |
| PAIRWISE_CIPHER_NOT_VALID = 19, |
| AKMP_NOT_VALID = 20, |
| UNSUPPORTED_RSN_IE_VERSION = 21, |
| INVALID_RSN_IE_CAPAB = 22, |
| IEEE_802_1X_AUTH_FAILED = 23, |
| CIPHER_SUITE_REJECTED = 24, |
| TDLS_TEARDOWN_UNREACHABLE = 25, |
| TDLS_TEARDOWN_UNSPECIFIED = 26, |
| SSP_REQUESTED_DISASSOC = 27, |
| NO_SSP_ROAMING_AGREEMENT = 28, |
| BAD_CIPHER_OR_AKM = 29, |
| NOT_AUTHORIZED_THIS_LOCATION = 30, |
| SERVICE_CHANGE_PRECLUDES_TS = 31, |
| UNSPECIFIED_QOS_REASON = 32, |
| NOT_ENOUGH_BANDWIDTH = 33, |
| DISASSOC_LOW_ACK = 34, |
| EXCEEDED_TXOP = 35, |
| STA_LEAVING = 36, |
| END_TS_BA_DLS = 37, |
| UNKNOWN_TS_BA = 38, |
| TIMEOUT = 39, |
| PEERKEY_MISMATCH = 45, |
| AUTHORIZED_ACCESS_LIMIT_REACHED = 46, |
| EXTERNAL_SERVICE_REQUIREMENTS = 47, |
| INVALID_FT_ACTION_FRAME_COUNT = 48, |
| INVALID_PMKID = 49, |
| INVALID_MDE = 50, |
| INVALID_FTE = 51, |
| MESH_PEERING_CANCELLED = 52, |
| MESH_MAX_PEERS = 53, |
| MESH_CONFIG_POLICY_VIOLATION = 54, |
| MESH_CLOSE_RCVD = 55, |
| MESH_MAX_RETRIES = 56, |
| MESH_CONFIRM_TIMEOUT = 57, |
| MESH_INVALID_GTK = 58, |
| MESH_INCONSISTENT_PARAMS = 59, |
| MESH_INVALID_SECURITY_CAP = 60, |
| MESH_PATH_ERROR_NO_PROXY_INFO = 61, |
| MESH_PATH_ERROR_NO_FORWARDING_INFO = 62, |
| MESH_PATH_ERROR_DEST_UNREACHABLE = 63, |
| MAC_ADDRESS_ALREADY_EXISTS_IN_MBSS = 64, |
| MESH_CHANNEL_SWITCH_REGULATORY_REQ = 65, |
| MESH_CHANNEL_SWITCH_UNSPECIFIED = 66 |
| }; |
| |
| /** |
| * BSSID change Reasons. |
| */ |
| enum BssidChangeReason : uint8_t { |
| /** |
| * Started association with new bssid. |
| */ |
| ASSOC_START = 0, |
| /** |
| * Completed association with new bssid. |
| */ |
| ASSOC_COMPLETE = 1, |
| /** |
| * Dis-association with current bssid. |
| */ |
| DISASSOC = 2 |
| }; |
| |
| /** |
| * Used to indicate that a new network has been added. |
| * |
| * @param id Network ID allocated to the corresponding network. |
| */ |
| oneway onNetworkAdded(SupplicantNetworkId id); |
| |
| /** |
| * Used to indicate that a network has been removed. |
| * |
| * @param id Network ID allocated to the corresponding network. |
| */ |
| oneway onNetworkRemoved(SupplicantNetworkId id); |
| |
| /** |
| * Used to indicate a state change event on this particular iface. If this |
| * event is triggered by a particular network, the |SupplicantNetworkId|, |
| * |ssid|, |bssid| parameters must indicate the parameters of the network/AP |
| * which cased this state transition. |
| * |
| * @param newState New State of the interface. This must be one of the |State| |
| * values above. |
| * @param bssid BSSID of the corresponding AP which caused this state |
| * change event. This must be zero'ed if this event is not |
| * specific to a particular network. |
| * @param id ID of the corresponding network which caused this |
| * state change event. This must be invalid (UINT32_MAX) if this |
| * event is not specific to a particular network. |
| * @param ssid SSID of the corresponding network which caused this state |
| * change event. This must be empty if this event is not specific |
| * to a particular network. |
| */ |
| oneway onStateChanged( |
| State newState, Bssid bssid, SupplicantNetworkId id, Ssid ssid); |
| |
| /** |
| * Used to indicate the result of ANQP (either for IEEE 802.11u Interworking |
| * or Hotspot 2.0) query. |
| * |
| * @param bssid BSSID of the access point. |
| * @param data ANQP data fetched from the access point. |
| * All the fields in this struct must be empty if the query failed. |
| * @param hs20Data ANQP data fetched from the Hotspot 2.0 access point. |
| * All the fields in this struct must be empty if the query failed. |
| */ |
| oneway onAnqpQueryDone(Bssid bssid, AnqpData data, Hs20AnqpData hs20Data); |
| |
| /** |
| * Used to indicate the result of Hotspot 2.0 Icon query. |
| * |
| * @param bssid BSSID of the access point. |
| * @param fileName Name of the file that was requested. |
| * @param data Icon data fetched from the access point. |
| * Must be empty if the query failed. |
| */ |
| oneway onHs20IconQueryDone(Bssid bssid, string fileName, vec<uint8_t> data); |
| |
| /** |
| * Used to indicate a Hotspot 2.0 subscription remediation event. |
| * |
| * @param bssid BSSID of the access point. |
| * @param osuMethod OSU method. |
| * @param url URL of the server. |
| */ |
| oneway onHs20SubscriptionRemediation(Bssid bssid, |
| OsuMethod osuMethod, |
| string url); |
| |
| /** |
| * Used to indicate a Hotspot 2.0 imminent deauth notice. |
| * |
| * @param bssid BSSID of the access point. |
| * @param reasonCode Code to indicate the deauth reason. |
| * Refer to section 3.2.1.2 of the Hotspot 2.0 spec. |
| * @param reAuthDelayInSec Delay before reauthenticating. |
| * @param url URL of the server. |
| */ |
| oneway onHs20DeauthImminentNotice(Bssid bssid, |
| uint32_t reasonCode, |
| uint32_t reAuthDelayInSec, |
| string url); |
| |
| /** |
| * Used to indicate the disconnection from the currently connected |
| * network on this iface. |
| * |
| * @param bssid BSSID of the AP from which we disconnected. |
| * @param locallyGenerated If the disconnect was triggered by |
| * wpa_supplicant. |
| * @param reasonCode 802.11 code to indicate the disconnect reason |
| * from access point. Refer to section 8.4.1.7 of IEEE802.11 spec. |
| */ |
| oneway onDisconnected( |
| Bssid bssid, bool locallyGenerated, ReasonCode reasonCode); |
| |
| /** |
| * Used to indicate an association rejection recieved from the AP |
| * to which the connection is being attempted. |
| * |
| * @param bssid BSSID of the corresponding AP which sent this |
| * reject. |
| * @param statusCode 802.11 code to indicate the reject reason. |
| * Refer to section 8.4.1.9 of IEEE 802.11 spec. |
| * @param timedOut Whether failure is due to timeout rather |
| * than explicit rejection response from the AP. |
| */ |
| oneway onAssociationRejected(Bssid bssid, StatusCode statusCode, bool timedOut); |
| |
| /** |
| * Used to indicate the timeout of authentication to an AP. |
| * |
| * @param bssid BSSID of the corresponding AP. |
| */ |
| oneway onAuthenticationTimeout(Bssid bssid); |
| |
| /** |
| * Used to indicate an EAP authentication failure. |
| */ |
| oneway onEapFailure(); |
| |
| /** |
| * Used to indicate the change of active bssid. |
| * This is useful to figure out when the driver/firmware roams to a bssid |
| * on its own. |
| * |
| * @param reason Reason why the bssid changed. |
| * @param bssid BSSID of the corresponding AP. |
| */ |
| oneway onBssidChanged(BssidChangeReason reason, Bssid bssid); |
| |
| /** |
| * Used to indicate the success of a WPS connection attempt. |
| */ |
| oneway onWpsEventSuccess(); |
| |
| /** |
| * Used to indicate the failure of a WPS connection attempt. |
| * |
| * @param bssid BSSID of the AP to which we initiated WPS |
| * connection. |
| * @param configError Configuration error code. |
| * @param errorInd Error indication code. |
| */ |
| oneway onWpsEventFail( |
| Bssid bssid, WpsConfigError configError, WpsErrorIndication errorInd); |
| |
| /** |
| * Used to indicate the overlap of a WPS PBC connection attempt. |
| */ |
| oneway onWpsEventPbcOverlap(); |
| |
| /** |
| * Used to indicate that the external radio work can start now. |
| * |
| * @return id Identifier generated for the radio work request. |
| */ |
| oneway onExtRadioWorkStart(uint32_t id); |
| |
| /** |
| * Used to indicate that the external radio work request has timed out. |
| * |
| * @return id Identifier generated for the radio work request. |
| */ |
| oneway onExtRadioWorkTimeout(uint32_t id); |
| }; |