xref: /freebsd/contrib/wpa/src/ap/ap_config.c (revision a90b9d0159070121c221b966469c3e36d912bf82)
1e28a4053SRui Paulo /*
2e28a4053SRui Paulo  * hostapd / Configuration helper functions
3*a90b9d01SCy Schubert  * Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi>
4e28a4053SRui Paulo  *
5f05cddf9SRui Paulo  * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo  * See README for more details.
7e28a4053SRui Paulo  */
8e28a4053SRui Paulo 
9e28a4053SRui Paulo #include "utils/includes.h"
10e28a4053SRui Paulo 
11e28a4053SRui Paulo #include "utils/common.h"
12e28a4053SRui Paulo #include "crypto/sha1.h"
1385732ac8SCy Schubert #include "crypto/tls.h"
14e28a4053SRui Paulo #include "radius/radius_client.h"
15e28a4053SRui Paulo #include "common/ieee802_11_defs.h"
16206b73d0SCy Schubert #include "common/ieee802_1x_defs.h"
17e28a4053SRui Paulo #include "common/eapol_common.h"
1885732ac8SCy Schubert #include "common/dhcp.h"
19c1d255d3SCy Schubert #include "common/sae.h"
20e28a4053SRui Paulo #include "eap_common/eap_wsc_common.h"
21e28a4053SRui Paulo #include "eap_server/eap.h"
22e28a4053SRui Paulo #include "wpa_auth.h"
23e28a4053SRui Paulo #include "sta_info.h"
24206b73d0SCy Schubert #include "airtime_policy.h"
25e28a4053SRui Paulo #include "ap_config.h"
26e28a4053SRui Paulo 
27e28a4053SRui Paulo 
hostapd_config_free_vlan(struct hostapd_bss_config * bss)28e28a4053SRui Paulo static void hostapd_config_free_vlan(struct hostapd_bss_config *bss)
29e28a4053SRui Paulo {
30e28a4053SRui Paulo 	struct hostapd_vlan *vlan, *prev;
31e28a4053SRui Paulo 
32e28a4053SRui Paulo 	vlan = bss->vlan;
33e28a4053SRui Paulo 	prev = NULL;
34e28a4053SRui Paulo 	while (vlan) {
35e28a4053SRui Paulo 		prev = vlan;
36e28a4053SRui Paulo 		vlan = vlan->next;
37e28a4053SRui Paulo 		os_free(prev);
38e28a4053SRui Paulo 	}
39e28a4053SRui Paulo 
40e28a4053SRui Paulo 	bss->vlan = NULL;
41e28a4053SRui Paulo }
42e28a4053SRui Paulo 
43e28a4053SRui Paulo 
4485732ac8SCy Schubert #ifndef DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES
4585732ac8SCy Schubert #define DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES 0
4685732ac8SCy Schubert #endif /* DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES */
4785732ac8SCy Schubert 
hostapd_config_defaults_bss(struct hostapd_bss_config * bss)48e28a4053SRui Paulo void hostapd_config_defaults_bss(struct hostapd_bss_config *bss)
49e28a4053SRui Paulo {
50780fb4a2SCy Schubert 	dl_list_init(&bss->anqp_elem);
51780fb4a2SCy Schubert 
52e28a4053SRui Paulo 	bss->logger_syslog_level = HOSTAPD_LEVEL_INFO;
53e28a4053SRui Paulo 	bss->logger_stdout_level = HOSTAPD_LEVEL_INFO;
54e28a4053SRui Paulo 	bss->logger_syslog = (unsigned int) -1;
55e28a4053SRui Paulo 	bss->logger_stdout = (unsigned int) -1;
56e28a4053SRui Paulo 
57c1d255d3SCy Schubert #ifdef CONFIG_WEP
58e28a4053SRui Paulo 	bss->auth_algs = WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED;
59e28a4053SRui Paulo 
60e28a4053SRui Paulo 	bss->wep_rekeying_period = 300;
61e28a4053SRui Paulo 	/* use key0 in individual key and key1 in broadcast key */
62e28a4053SRui Paulo 	bss->broadcast_key_idx_min = 1;
63e28a4053SRui Paulo 	bss->broadcast_key_idx_max = 2;
64c1d255d3SCy Schubert #else /* CONFIG_WEP */
65c1d255d3SCy Schubert 	bss->auth_algs = WPA_AUTH_ALG_OPEN;
66c1d255d3SCy Schubert #endif /* CONFIG_WEP */
67e28a4053SRui Paulo 	bss->eap_reauth_period = 3600;
68e28a4053SRui Paulo 
69e28a4053SRui Paulo 	bss->wpa_group_rekey = 600;
70e28a4053SRui Paulo 	bss->wpa_gmk_rekey = 86400;
71c1d255d3SCy Schubert 	bss->wpa_deny_ptk0_rekey = PTK0_REKEY_ALLOW_ALWAYS;
7285732ac8SCy Schubert 	bss->wpa_group_update_count = 4;
7385732ac8SCy Schubert 	bss->wpa_pairwise_update_count = 4;
7485732ac8SCy Schubert 	bss->wpa_disable_eapol_key_retries =
7585732ac8SCy Schubert 		DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES;
76e28a4053SRui Paulo 	bss->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
77c1d255d3SCy Schubert #ifdef CONFIG_NO_TKIP
78c1d255d3SCy Schubert 	bss->wpa_pairwise = WPA_CIPHER_CCMP;
79c1d255d3SCy Schubert 	bss->wpa_group = WPA_CIPHER_CCMP;
80c1d255d3SCy Schubert #else /* CONFIG_NO_TKIP */
81e28a4053SRui Paulo 	bss->wpa_pairwise = WPA_CIPHER_TKIP;
82e28a4053SRui Paulo 	bss->wpa_group = WPA_CIPHER_TKIP;
83c1d255d3SCy Schubert #endif /* CONFIG_NO_TKIP */
84e28a4053SRui Paulo 	bss->rsn_pairwise = 0;
85e28a4053SRui Paulo 
86e28a4053SRui Paulo 	bss->max_num_sta = MAX_STA_COUNT;
87e28a4053SRui Paulo 
88e28a4053SRui Paulo 	bss->dtim_period = 2;
89e28a4053SRui Paulo 
90e28a4053SRui Paulo 	bss->radius_server_auth_port = 1812;
91780fb4a2SCy Schubert 	bss->eap_sim_db_timeout = 1;
92206b73d0SCy Schubert 	bss->eap_sim_id = 3;
93*a90b9d01SCy Schubert 	bss->eap_sim_aka_fast_reauth_limit = 1000;
94e28a4053SRui Paulo 	bss->ap_max_inactivity = AP_MAX_INACTIVITY;
95*a90b9d01SCy Schubert 	bss->bss_max_idle = 1;
96e28a4053SRui Paulo 	bss->eapol_version = EAPOL_VERSION;
97e28a4053SRui Paulo 
98e28a4053SRui Paulo 	bss->max_listen_interval = 65535;
99e28a4053SRui Paulo 
100f05cddf9SRui Paulo 	bss->pwd_group = 19; /* ECC: GF(p=256) */
101f05cddf9SRui Paulo 
102e28a4053SRui Paulo 	bss->assoc_sa_query_max_timeout = 1000;
103e28a4053SRui Paulo 	bss->assoc_sa_query_retry_timeout = 201;
1045b9c547cSRui Paulo 	bss->group_mgmt_cipher = WPA_CIPHER_AES_128_CMAC;
105e28a4053SRui Paulo #ifdef EAP_SERVER_FAST
106e28a4053SRui Paulo 	 /* both anonymous and authenticated provisioning */
107e28a4053SRui Paulo 	bss->eap_fast_prov = 3;
108e28a4053SRui Paulo 	bss->pac_key_lifetime = 7 * 24 * 60 * 60;
109e28a4053SRui Paulo 	bss->pac_key_refresh_time = 1 * 24 * 60 * 60;
110e28a4053SRui Paulo #endif /* EAP_SERVER_FAST */
111f05cddf9SRui Paulo 
112f05cddf9SRui Paulo 	/* Set to -1 as defaults depends on HT in setup */
113f05cddf9SRui Paulo 	bss->wmm_enabled = -1;
114f05cddf9SRui Paulo 
11585732ac8SCy Schubert #ifdef CONFIG_IEEE80211R_AP
116f05cddf9SRui Paulo 	bss->ft_over_ds = 1;
11785732ac8SCy Schubert 	bss->rkh_pos_timeout = 86400;
11885732ac8SCy Schubert 	bss->rkh_neg_timeout = 60;
11985732ac8SCy Schubert 	bss->rkh_pull_timeout = 1000;
12085732ac8SCy Schubert 	bss->rkh_pull_retries = 4;
12185732ac8SCy Schubert 	bss->r0_key_lifetime = 1209600;
12285732ac8SCy Schubert #endif /* CONFIG_IEEE80211R_AP */
123f05cddf9SRui Paulo 
124f05cddf9SRui Paulo 	bss->radius_das_time_window = 300;
125*a90b9d01SCy Schubert 	bss->radius_require_message_authenticator = 1;
1265b9c547cSRui Paulo 
127c1d255d3SCy Schubert 	bss->anti_clogging_threshold = 5;
128*a90b9d01SCy Schubert 	bss->sae_sync = 3;
12985732ac8SCy Schubert 
13085732ac8SCy Schubert 	bss->gas_frag_limit = 1400;
13185732ac8SCy Schubert 
13285732ac8SCy Schubert #ifdef CONFIG_FILS
13385732ac8SCy Schubert 	dl_list_init(&bss->fils_realms);
13485732ac8SCy Schubert 	bss->fils_hlp_wait_time = 30;
13585732ac8SCy Schubert 	bss->dhcp_server_port = DHCP_SERVER_PORT;
13685732ac8SCy Schubert 	bss->dhcp_relay_port = DHCP_SERVER_PORT;
137c1d255d3SCy Schubert 	bss->fils_discovery_min_int = 20;
13885732ac8SCy Schubert #endif /* CONFIG_FILS */
13985732ac8SCy Schubert 
14085732ac8SCy Schubert 	bss->broadcast_deauth = 1;
14185732ac8SCy Schubert 
14285732ac8SCy Schubert #ifdef CONFIG_MBO
14385732ac8SCy Schubert 	bss->mbo_cell_data_conn_pref = -1;
14485732ac8SCy Schubert #endif /* CONFIG_MBO */
14585732ac8SCy Schubert 
14685732ac8SCy Schubert 	/* Disable TLS v1.3 by default for now to avoid interoperability issue.
14785732ac8SCy Schubert 	 * This can be enabled by default once the implementation has been fully
14885732ac8SCy Schubert 	 * completed and tested with other implementations. */
14985732ac8SCy Schubert 	bss->tls_flags = TLS_CONN_DISABLE_TLSv1_3;
1504bc52338SCy Schubert 
151c1d255d3SCy Schubert 	bss->max_auth_rounds = 100;
152c1d255d3SCy Schubert 	bss->max_auth_rounds_short = 50;
153c1d255d3SCy Schubert 
1544bc52338SCy Schubert 	bss->send_probe_response = 1;
1554bc52338SCy Schubert 
1564bc52338SCy Schubert #ifdef CONFIG_HS20
1574bc52338SCy Schubert 	bss->hs20_release = (HS20_VERSION >> 4) + 1;
1584bc52338SCy Schubert #endif /* CONFIG_HS20 */
1594bc52338SCy Schubert 
160206b73d0SCy Schubert #ifdef CONFIG_MACSEC
161206b73d0SCy Schubert 	bss->mka_priority = DEFAULT_PRIO_NOT_KEY_SERVER;
162206b73d0SCy Schubert 	bss->macsec_port = 1;
163206b73d0SCy Schubert #endif /* CONFIG_MACSEC */
164206b73d0SCy Schubert 
1654bc52338SCy Schubert 	/* Default to strict CRL checking. */
1664bc52338SCy Schubert 	bss->check_crl_strict = 1;
167c1d255d3SCy Schubert 
168*a90b9d01SCy Schubert 	bss->multi_ap_profile = MULTI_AP_PROFILE_2;
169*a90b9d01SCy Schubert 
170c1d255d3SCy Schubert #ifdef CONFIG_TESTING_OPTIONS
171c1d255d3SCy Schubert 	bss->sae_commit_status = -1;
172*a90b9d01SCy Schubert 	bss->test_assoc_comeback_type = -1;
173c1d255d3SCy Schubert #endif /* CONFIG_TESTING_OPTIONS */
174c1d255d3SCy Schubert 
175c1d255d3SCy Schubert #ifdef CONFIG_PASN
176c1d255d3SCy Schubert 	/* comeback after 10 TUs */
177c1d255d3SCy Schubert 	bss->pasn_comeback_after = 10;
178*a90b9d01SCy Schubert 	bss->pasn_noauth = 1;
179c1d255d3SCy Schubert #endif /* CONFIG_PASN */
180e28a4053SRui Paulo }
181e28a4053SRui Paulo 
182e28a4053SRui Paulo 
hostapd_config_defaults(void)183e28a4053SRui Paulo struct hostapd_config * hostapd_config_defaults(void)
184e28a4053SRui Paulo {
185f05cddf9SRui Paulo #define ecw2cw(ecw) ((1 << (ecw)) - 1)
186f05cddf9SRui Paulo 
187e28a4053SRui Paulo 	struct hostapd_config *conf;
188e28a4053SRui Paulo 	struct hostapd_bss_config *bss;
189e28a4053SRui Paulo 	const int aCWmin = 4, aCWmax = 10;
190e28a4053SRui Paulo 	const struct hostapd_wmm_ac_params ac_bk =
191e28a4053SRui Paulo 		{ aCWmin, aCWmax, 7, 0, 0 }; /* background traffic */
192e28a4053SRui Paulo 	const struct hostapd_wmm_ac_params ac_be =
193e28a4053SRui Paulo 		{ aCWmin, aCWmax, 3, 0, 0 }; /* best effort traffic */
194e28a4053SRui Paulo 	const struct hostapd_wmm_ac_params ac_vi = /* video traffic */
1955b9c547cSRui Paulo 		{ aCWmin - 1, aCWmin, 2, 3008 / 32, 0 };
196e28a4053SRui Paulo 	const struct hostapd_wmm_ac_params ac_vo = /* voice traffic */
1975b9c547cSRui Paulo 		{ aCWmin - 2, aCWmin - 1, 2, 1504 / 32, 0 };
198f05cddf9SRui Paulo 	const struct hostapd_tx_queue_params txq_bk =
199f05cddf9SRui Paulo 		{ 7, ecw2cw(aCWmin), ecw2cw(aCWmax), 0 };
200f05cddf9SRui Paulo 	const struct hostapd_tx_queue_params txq_be =
201f05cddf9SRui Paulo 		{ 3, ecw2cw(aCWmin), 4 * (ecw2cw(aCWmin) + 1) - 1, 0};
202f05cddf9SRui Paulo 	const struct hostapd_tx_queue_params txq_vi =
203f05cddf9SRui Paulo 		{ 1, (ecw2cw(aCWmin) + 1) / 2 - 1, ecw2cw(aCWmin), 30};
204f05cddf9SRui Paulo 	const struct hostapd_tx_queue_params txq_vo =
205f05cddf9SRui Paulo 		{ 1, (ecw2cw(aCWmin) + 1) / 4 - 1,
206f05cddf9SRui Paulo 		  (ecw2cw(aCWmin) + 1) / 2 - 1, 15};
207f05cddf9SRui Paulo 
208f05cddf9SRui Paulo #undef ecw2cw
209e28a4053SRui Paulo 
210e28a4053SRui Paulo 	conf = os_zalloc(sizeof(*conf));
211e28a4053SRui Paulo 	bss = os_zalloc(sizeof(*bss));
212e28a4053SRui Paulo 	if (conf == NULL || bss == NULL) {
213e28a4053SRui Paulo 		wpa_printf(MSG_ERROR, "Failed to allocate memory for "
214e28a4053SRui Paulo 			   "configuration data.");
215e28a4053SRui Paulo 		os_free(conf);
216e28a4053SRui Paulo 		os_free(bss);
217e28a4053SRui Paulo 		return NULL;
218e28a4053SRui Paulo 	}
2195b9c547cSRui Paulo 	conf->bss = os_calloc(1, sizeof(struct hostapd_bss_config *));
2205b9c547cSRui Paulo 	if (conf->bss == NULL) {
2215b9c547cSRui Paulo 		os_free(conf);
2225b9c547cSRui Paulo 		os_free(bss);
2235b9c547cSRui Paulo 		return NULL;
2245b9c547cSRui Paulo 	}
2255b9c547cSRui Paulo 	conf->bss[0] = bss;
226e28a4053SRui Paulo 
227e28a4053SRui Paulo 	bss->radius = os_zalloc(sizeof(*bss->radius));
228e28a4053SRui Paulo 	if (bss->radius == NULL) {
2295b9c547cSRui Paulo 		os_free(conf->bss);
230e28a4053SRui Paulo 		os_free(conf);
231e28a4053SRui Paulo 		os_free(bss);
232e28a4053SRui Paulo 		return NULL;
233e28a4053SRui Paulo 	}
234e28a4053SRui Paulo 
235e28a4053SRui Paulo 	hostapd_config_defaults_bss(bss);
236e28a4053SRui Paulo 
237e28a4053SRui Paulo 	conf->num_bss = 1;
238e28a4053SRui Paulo 
239e28a4053SRui Paulo 	conf->beacon_int = 100;
2404bc52338SCy Schubert 	conf->rts_threshold = -2; /* use driver default: 2347 */
2414bc52338SCy Schubert 	conf->fragm_threshold = -2; /* user driver default: 2346 */
2425b9c547cSRui Paulo 	/* Set to invalid value means do not add Power Constraint IE */
2435b9c547cSRui Paulo 	conf->local_pwr_constraint = -1;
244e28a4053SRui Paulo 
245e28a4053SRui Paulo 	conf->wmm_ac_params[0] = ac_be;
246e28a4053SRui Paulo 	conf->wmm_ac_params[1] = ac_bk;
247e28a4053SRui Paulo 	conf->wmm_ac_params[2] = ac_vi;
248e28a4053SRui Paulo 	conf->wmm_ac_params[3] = ac_vo;
249e28a4053SRui Paulo 
250f05cddf9SRui Paulo 	conf->tx_queue[0] = txq_vo;
251f05cddf9SRui Paulo 	conf->tx_queue[1] = txq_vi;
252f05cddf9SRui Paulo 	conf->tx_queue[2] = txq_be;
253f05cddf9SRui Paulo 	conf->tx_queue[3] = txq_bk;
254f05cddf9SRui Paulo 
255e28a4053SRui Paulo 	conf->ht_capab = HT_CAP_INFO_SMPS_DISABLED;
256e28a4053SRui Paulo 
257f05cddf9SRui Paulo 	conf->ap_table_max_size = 255;
258f05cddf9SRui Paulo 	conf->ap_table_expiration_time = 60;
259325151a3SRui Paulo 	conf->track_sta_max_age = 180;
260f05cddf9SRui Paulo 
2615b9c547cSRui Paulo #ifdef CONFIG_TESTING_OPTIONS
2625b9c547cSRui Paulo 	conf->ignore_probe_probability = 0.0;
2635b9c547cSRui Paulo 	conf->ignore_auth_probability = 0.0;
2645b9c547cSRui Paulo 	conf->ignore_assoc_probability = 0.0;
2655b9c547cSRui Paulo 	conf->ignore_reassoc_probability = 0.0;
2665b9c547cSRui Paulo 	conf->corrupt_gtk_rekey_mic_probability = 0.0;
267780fb4a2SCy Schubert 	conf->ecsa_ie_only = 0;
2685b9c547cSRui Paulo #endif /* CONFIG_TESTING_OPTIONS */
2695b9c547cSRui Paulo 
270325151a3SRui Paulo 	conf->acs = 0;
271325151a3SRui Paulo 	conf->acs_ch_list.num = 0;
2725b9c547cSRui Paulo #ifdef CONFIG_ACS
2735b9c547cSRui Paulo 	conf->acs_num_scans = 5;
2745b9c547cSRui Paulo #endif /* CONFIG_ACS */
2755b9c547cSRui Paulo 
276206b73d0SCy Schubert #ifdef CONFIG_IEEE80211AX
277206b73d0SCy Schubert 	conf->he_op.he_rts_threshold = HE_OPERATION_RTS_THRESHOLD_MASK >>
278206b73d0SCy Schubert 		HE_OPERATION_RTS_THRESHOLD_OFFSET;
279206b73d0SCy Schubert 	/* Set default basic MCS/NSS set to single stream MCS 0-7 */
280206b73d0SCy Schubert 	conf->he_op.he_basic_mcs_nss_set = 0xfffc;
281c1d255d3SCy Schubert 	conf->he_op.he_bss_color_disabled = 1;
282c1d255d3SCy Schubert 	conf->he_op.he_bss_color_partial = 0;
2834b72b91aSCy Schubert 	conf->he_op.he_bss_color = os_random() % 63 + 1;
284c1d255d3SCy Schubert 	conf->he_op.he_twt_responder = 1;
285c1d255d3SCy Schubert 	conf->he_6ghz_max_mpdu = 2;
286c1d255d3SCy Schubert 	conf->he_6ghz_max_ampdu_len_exp = 7;
287c1d255d3SCy Schubert 	conf->he_6ghz_rx_ant_pat = 1;
288c1d255d3SCy Schubert 	conf->he_6ghz_tx_ant_pat = 1;
289*a90b9d01SCy Schubert 	conf->he_6ghz_reg_pwr_type = HE_REG_INFO_6GHZ_AP_TYPE_VLP;
290*a90b9d01SCy Schubert 	conf->reg_def_cli_eirp_psd = -1;
291*a90b9d01SCy Schubert 	conf->reg_sub_cli_eirp_psd = -1;
292*a90b9d01SCy Schubert 	conf->reg_def_cli_eirp = -1;
293206b73d0SCy Schubert #endif /* CONFIG_IEEE80211AX */
294206b73d0SCy Schubert 
29585732ac8SCy Schubert 	/* The third octet of the country string uses an ASCII space character
29685732ac8SCy Schubert 	 * by default to indicate that the regulations encompass all
29785732ac8SCy Schubert 	 * environments for the current frequency band in the country. */
29885732ac8SCy Schubert 	conf->country[2] = ' ';
29985732ac8SCy Schubert 
3004bc52338SCy Schubert 	conf->rssi_reject_assoc_rssi = 0;
3014bc52338SCy Schubert 	conf->rssi_reject_assoc_timeout = 30;
3024bc52338SCy Schubert 
303206b73d0SCy Schubert #ifdef CONFIG_AIRTIME_POLICY
304206b73d0SCy Schubert 	conf->airtime_update_interval = AIRTIME_DEFAULT_UPDATE_INTERVAL;
305206b73d0SCy Schubert #endif /* CONFIG_AIRTIME_POLICY */
306206b73d0SCy Schubert 
307*a90b9d01SCy Schubert 	hostapd_set_and_check_bw320_offset(conf, 0);
308*a90b9d01SCy Schubert 
309e28a4053SRui Paulo 	return conf;
310e28a4053SRui Paulo }
311e28a4053SRui Paulo 
312e28a4053SRui Paulo 
hostapd_mac_comp(const void * a,const void * b)313e28a4053SRui Paulo int hostapd_mac_comp(const void *a, const void *b)
314e28a4053SRui Paulo {
315e28a4053SRui Paulo 	return os_memcmp(a, b, sizeof(macaddr));
316e28a4053SRui Paulo }
317e28a4053SRui Paulo 
318e28a4053SRui Paulo 
hostapd_config_read_wpa_psk(const char * fname,struct hostapd_ssid * ssid)319e28a4053SRui Paulo static int hostapd_config_read_wpa_psk(const char *fname,
320e28a4053SRui Paulo 				       struct hostapd_ssid *ssid)
321e28a4053SRui Paulo {
322e28a4053SRui Paulo 	FILE *f;
323e28a4053SRui Paulo 	char buf[128], *pos;
3244bc52338SCy Schubert 	const char *keyid;
3254bc52338SCy Schubert 	char *context;
3264bc52338SCy Schubert 	char *context2;
3274bc52338SCy Schubert 	char *token;
3284bc52338SCy Schubert 	char *name;
3294bc52338SCy Schubert 	char *value;
330e28a4053SRui Paulo 	int line = 0, ret = 0, len, ok;
331e28a4053SRui Paulo 	u8 addr[ETH_ALEN];
332e28a4053SRui Paulo 	struct hostapd_wpa_psk *psk;
333e28a4053SRui Paulo 
334e28a4053SRui Paulo 	if (!fname)
335e28a4053SRui Paulo 		return 0;
336e28a4053SRui Paulo 
337e28a4053SRui Paulo 	f = fopen(fname, "r");
338e28a4053SRui Paulo 	if (!f) {
339e28a4053SRui Paulo 		wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
340e28a4053SRui Paulo 		return -1;
341e28a4053SRui Paulo 	}
342e28a4053SRui Paulo 
343e28a4053SRui Paulo 	while (fgets(buf, sizeof(buf), f)) {
3444bc52338SCy Schubert 		int vlan_id = 0;
345c1d255d3SCy Schubert 		int wps = 0;
3464bc52338SCy Schubert 
347e28a4053SRui Paulo 		line++;
348e28a4053SRui Paulo 
349e28a4053SRui Paulo 		if (buf[0] == '#')
350e28a4053SRui Paulo 			continue;
351e28a4053SRui Paulo 		pos = buf;
352e28a4053SRui Paulo 		while (*pos != '\0') {
353e28a4053SRui Paulo 			if (*pos == '\n') {
354e28a4053SRui Paulo 				*pos = '\0';
355e28a4053SRui Paulo 				break;
356e28a4053SRui Paulo 			}
357e28a4053SRui Paulo 			pos++;
358e28a4053SRui Paulo 		}
359e28a4053SRui Paulo 		if (buf[0] == '\0')
360e28a4053SRui Paulo 			continue;
361e28a4053SRui Paulo 
3624bc52338SCy Schubert 		context = NULL;
3634bc52338SCy Schubert 		keyid = NULL;
3644bc52338SCy Schubert 		while ((token = str_token(buf, " ", &context))) {
3654bc52338SCy Schubert 			if (!os_strchr(token, '='))
3664bc52338SCy Schubert 				break;
3674bc52338SCy Schubert 			context2 = NULL;
3684bc52338SCy Schubert 			name = str_token(token, "=", &context2);
3694bc52338SCy Schubert 			if (!name)
3704bc52338SCy Schubert 				break;
3714bc52338SCy Schubert 			value = str_token(token, "", &context2);
3724bc52338SCy Schubert 			if (!value)
3734bc52338SCy Schubert 				value = "";
3744bc52338SCy Schubert 			if (!os_strcmp(name, "keyid")) {
3754bc52338SCy Schubert 				keyid = value;
376c1d255d3SCy Schubert 			} else if (!os_strcmp(name, "wps")) {
377c1d255d3SCy Schubert 				wps = atoi(value);
3784bc52338SCy Schubert 			} else if (!os_strcmp(name, "vlanid")) {
3794bc52338SCy Schubert 				vlan_id = atoi(value);
3804bc52338SCy Schubert 			} else {
3814bc52338SCy Schubert 				wpa_printf(MSG_ERROR,
3824bc52338SCy Schubert 					   "Unrecognized '%s=%s' on line %d in '%s'",
3834bc52338SCy Schubert 					   name, value, line, fname);
3844bc52338SCy Schubert 				ret = -1;
3854bc52338SCy Schubert 				break;
3864bc52338SCy Schubert 			}
3874bc52338SCy Schubert 		}
3884bc52338SCy Schubert 
3894bc52338SCy Schubert 		if (ret == -1)
3904bc52338SCy Schubert 			break;
3914bc52338SCy Schubert 
3924bc52338SCy Schubert 		if (!token)
3934bc52338SCy Schubert 			token = "";
3944bc52338SCy Schubert 		if (hwaddr_aton(token, addr)) {
395c1d255d3SCy Schubert 			wpa_printf(MSG_ERROR,
396c1d255d3SCy Schubert 				   "Invalid MAC address '%s' on line %d in '%s'",
397c1d255d3SCy Schubert 				   token, line, fname);
398e28a4053SRui Paulo 			ret = -1;
399e28a4053SRui Paulo 			break;
400e28a4053SRui Paulo 		}
401e28a4053SRui Paulo 
402e28a4053SRui Paulo 		psk = os_zalloc(sizeof(*psk));
403e28a4053SRui Paulo 		if (psk == NULL) {
404e28a4053SRui Paulo 			wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
405e28a4053SRui Paulo 			ret = -1;
406e28a4053SRui Paulo 			break;
407e28a4053SRui Paulo 		}
4084bc52338SCy Schubert 		psk->vlan_id = vlan_id;
409e28a4053SRui Paulo 		if (is_zero_ether_addr(addr))
410e28a4053SRui Paulo 			psk->group = 1;
411e28a4053SRui Paulo 		else
412e28a4053SRui Paulo 			os_memcpy(psk->addr, addr, ETH_ALEN);
413e28a4053SRui Paulo 
4144bc52338SCy Schubert 		pos = str_token(buf, "", &context);
4154bc52338SCy Schubert 		if (!pos) {
416e28a4053SRui Paulo 			wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
417e28a4053SRui Paulo 				   line, fname);
418e28a4053SRui Paulo 			os_free(psk);
419e28a4053SRui Paulo 			ret = -1;
420e28a4053SRui Paulo 			break;
421e28a4053SRui Paulo 		}
422e28a4053SRui Paulo 
423e28a4053SRui Paulo 		ok = 0;
424e28a4053SRui Paulo 		len = os_strlen(pos);
425c1d255d3SCy Schubert 		if (len == 2 * PMK_LEN &&
426c1d255d3SCy Schubert 		    hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
427e28a4053SRui Paulo 			ok = 1;
428c1d255d3SCy Schubert 		else if (len >= 8 && len < 64 &&
429e28a4053SRui Paulo 			 pbkdf2_sha1(pos, ssid->ssid, ssid->ssid_len,
430c1d255d3SCy Schubert 				     4096, psk->psk, PMK_LEN) == 0)
431e28a4053SRui Paulo 			ok = 1;
432e28a4053SRui Paulo 		if (!ok) {
433c1d255d3SCy Schubert 			wpa_printf(MSG_ERROR,
434c1d255d3SCy Schubert 				   "Invalid PSK '%s' on line %d in '%s'",
435c1d255d3SCy Schubert 				   pos, line, fname);
436e28a4053SRui Paulo 			os_free(psk);
437e28a4053SRui Paulo 			ret = -1;
438e28a4053SRui Paulo 			break;
439e28a4053SRui Paulo 		}
440e28a4053SRui Paulo 
4414bc52338SCy Schubert 		if (keyid) {
4424bc52338SCy Schubert 			len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid));
4434bc52338SCy Schubert 			if ((size_t) len >= sizeof(psk->keyid)) {
4444bc52338SCy Schubert 				wpa_printf(MSG_ERROR,
4454bc52338SCy Schubert 					   "PSK keyid too long on line %d in '%s'",
4464bc52338SCy Schubert 					   line, fname);
4474bc52338SCy Schubert 				os_free(psk);
4484bc52338SCy Schubert 				ret = -1;
4494bc52338SCy Schubert 				break;
4504bc52338SCy Schubert 			}
4514bc52338SCy Schubert 		}
4524bc52338SCy Schubert 
453c1d255d3SCy Schubert 		psk->wps = wps;
454c1d255d3SCy Schubert 
455e28a4053SRui Paulo 		psk->next = ssid->wpa_psk;
456e28a4053SRui Paulo 		ssid->wpa_psk = psk;
457e28a4053SRui Paulo 	}
458e28a4053SRui Paulo 
459e28a4053SRui Paulo 	fclose(f);
460e28a4053SRui Paulo 
461e28a4053SRui Paulo 	return ret;
462e28a4053SRui Paulo }
463e28a4053SRui Paulo 
464e28a4053SRui Paulo 
hostapd_derive_psk(struct hostapd_ssid * ssid)465e28a4053SRui Paulo static int hostapd_derive_psk(struct hostapd_ssid *ssid)
466e28a4053SRui Paulo {
467e28a4053SRui Paulo 	ssid->wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
468e28a4053SRui Paulo 	if (ssid->wpa_psk == NULL) {
469e28a4053SRui Paulo 		wpa_printf(MSG_ERROR, "Unable to alloc space for PSK");
470e28a4053SRui Paulo 		return -1;
471e28a4053SRui Paulo 	}
472e28a4053SRui Paulo 	wpa_hexdump_ascii(MSG_DEBUG, "SSID",
473e28a4053SRui Paulo 			  (u8 *) ssid->ssid, ssid->ssid_len);
474e28a4053SRui Paulo 	wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)",
475e28a4053SRui Paulo 			      (u8 *) ssid->wpa_passphrase,
476e28a4053SRui Paulo 			      os_strlen(ssid->wpa_passphrase));
477*a90b9d01SCy Schubert 	if (pbkdf2_sha1(ssid->wpa_passphrase,
478e28a4053SRui Paulo 			ssid->ssid, ssid->ssid_len,
479*a90b9d01SCy Schubert 			4096, ssid->wpa_psk->psk, PMK_LEN) != 0) {
480*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR, "Error in pbkdf2_sha1()");
481*a90b9d01SCy Schubert 		return -1;
482*a90b9d01SCy Schubert 	}
483e28a4053SRui Paulo 	wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)",
484e28a4053SRui Paulo 			ssid->wpa_psk->psk, PMK_LEN);
485e28a4053SRui Paulo 	return 0;
486e28a4053SRui Paulo }
487e28a4053SRui Paulo 
488e28a4053SRui Paulo 
hostapd_setup_sae_pt(struct hostapd_bss_config * conf)489c1d255d3SCy Schubert int hostapd_setup_sae_pt(struct hostapd_bss_config *conf)
490c1d255d3SCy Schubert {
491c1d255d3SCy Schubert #ifdef CONFIG_SAE
492c1d255d3SCy Schubert 	struct hostapd_ssid *ssid = &conf->ssid;
493c1d255d3SCy Schubert 	struct sae_password_entry *pw;
494c1d255d3SCy Schubert 
495*a90b9d01SCy Schubert 	if ((conf->sae_pwe == SAE_PWE_HUNT_AND_PECK &&
496*a90b9d01SCy Schubert 	     !hostapd_sae_pw_id_in_use(conf) &&
497*a90b9d01SCy Schubert 	     !wpa_key_mgmt_sae_ext_key(conf->wpa_key_mgmt) &&
498c1d255d3SCy Schubert 	     !hostapd_sae_pk_in_use(conf)) ||
499*a90b9d01SCy Schubert 	    conf->sae_pwe == SAE_PWE_FORCE_HUNT_AND_PECK ||
500c1d255d3SCy Schubert 	    !wpa_key_mgmt_sae(conf->wpa_key_mgmt))
501c1d255d3SCy Schubert 		return 0; /* PT not needed */
502c1d255d3SCy Schubert 
503c1d255d3SCy Schubert 	sae_deinit_pt(ssid->pt);
504c1d255d3SCy Schubert 	ssid->pt = NULL;
505c1d255d3SCy Schubert 	if (ssid->wpa_passphrase) {
506c1d255d3SCy Schubert 		ssid->pt = sae_derive_pt(conf->sae_groups, ssid->ssid,
507c1d255d3SCy Schubert 					 ssid->ssid_len,
508c1d255d3SCy Schubert 					 (const u8 *) ssid->wpa_passphrase,
509c1d255d3SCy Schubert 					 os_strlen(ssid->wpa_passphrase),
510c1d255d3SCy Schubert 					 NULL);
511c1d255d3SCy Schubert 		if (!ssid->pt)
512c1d255d3SCy Schubert 			return -1;
513c1d255d3SCy Schubert 	}
514c1d255d3SCy Schubert 
515c1d255d3SCy Schubert 	for (pw = conf->sae_passwords; pw; pw = pw->next) {
516c1d255d3SCy Schubert 		sae_deinit_pt(pw->pt);
517c1d255d3SCy Schubert 		pw->pt = sae_derive_pt(conf->sae_groups, ssid->ssid,
518c1d255d3SCy Schubert 				       ssid->ssid_len,
519c1d255d3SCy Schubert 				       (const u8 *) pw->password,
520c1d255d3SCy Schubert 				       os_strlen(pw->password),
521c1d255d3SCy Schubert 				       pw->identifier);
522c1d255d3SCy Schubert 		if (!pw->pt)
523c1d255d3SCy Schubert 			return -1;
524c1d255d3SCy Schubert 	}
525c1d255d3SCy Schubert #endif /* CONFIG_SAE */
526c1d255d3SCy Schubert 
527c1d255d3SCy Schubert 	return 0;
528c1d255d3SCy Schubert }
529c1d255d3SCy Schubert 
530c1d255d3SCy Schubert 
hostapd_setup_wpa_psk(struct hostapd_bss_config * conf)531e28a4053SRui Paulo int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf)
532e28a4053SRui Paulo {
533e28a4053SRui Paulo 	struct hostapd_ssid *ssid = &conf->ssid;
534e28a4053SRui Paulo 
535c1d255d3SCy Schubert 	if (hostapd_setup_sae_pt(conf) < 0)
536c1d255d3SCy Schubert 		return -1;
537c1d255d3SCy Schubert 
538e28a4053SRui Paulo 	if (ssid->wpa_passphrase != NULL) {
539e28a4053SRui Paulo 		if (ssid->wpa_psk != NULL) {
540e28a4053SRui Paulo 			wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
541e28a4053SRui Paulo 				   "instead of passphrase");
542e28a4053SRui Paulo 		} else {
543e28a4053SRui Paulo 			wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
544e28a4053SRui Paulo 				   "passphrase");
545e28a4053SRui Paulo 			if (hostapd_derive_psk(ssid) < 0)
546e28a4053SRui Paulo 				return -1;
547e28a4053SRui Paulo 		}
548e28a4053SRui Paulo 		ssid->wpa_psk->group = 1;
549e28a4053SRui Paulo 	}
550e28a4053SRui Paulo 
55185732ac8SCy Schubert 	return hostapd_config_read_wpa_psk(ssid->wpa_psk_file, &conf->ssid);
552e28a4053SRui Paulo }
553e28a4053SRui Paulo 
554e28a4053SRui Paulo 
hostapd_config_free_radius(struct hostapd_radius_server * servers,int num_servers)555e28a4053SRui Paulo static void hostapd_config_free_radius(struct hostapd_radius_server *servers,
556e28a4053SRui Paulo 				       int num_servers)
557e28a4053SRui Paulo {
558e28a4053SRui Paulo 	int i;
559e28a4053SRui Paulo 
560e28a4053SRui Paulo 	for (i = 0; i < num_servers; i++) {
561e28a4053SRui Paulo 		os_free(servers[i].shared_secret);
562*a90b9d01SCy Schubert 		os_free(servers[i].ca_cert);
563*a90b9d01SCy Schubert 		os_free(servers[i].client_cert);
564*a90b9d01SCy Schubert 		os_free(servers[i].private_key);
565*a90b9d01SCy Schubert 		os_free(servers[i].private_key_passwd);
566e28a4053SRui Paulo 	}
567e28a4053SRui Paulo 	os_free(servers);
568e28a4053SRui Paulo }
569e28a4053SRui Paulo 
570e28a4053SRui Paulo 
571f05cddf9SRui Paulo struct hostapd_radius_attr *
hostapd_config_get_radius_attr(struct hostapd_radius_attr * attr,u8 type)572f05cddf9SRui Paulo hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type)
573f05cddf9SRui Paulo {
574f05cddf9SRui Paulo 	for (; attr; attr = attr->next) {
575f05cddf9SRui Paulo 		if (attr->type == type)
576f05cddf9SRui Paulo 			return attr;
577f05cddf9SRui Paulo 	}
578f05cddf9SRui Paulo 	return NULL;
579f05cddf9SRui Paulo }
580f05cddf9SRui Paulo 
581f05cddf9SRui Paulo 
hostapd_parse_radius_attr(const char * value)582206b73d0SCy Schubert struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value)
583206b73d0SCy Schubert {
584206b73d0SCy Schubert 	const char *pos;
585206b73d0SCy Schubert 	char syntax;
586206b73d0SCy Schubert 	struct hostapd_radius_attr *attr;
587206b73d0SCy Schubert 	size_t len;
588206b73d0SCy Schubert 
589206b73d0SCy Schubert 	attr = os_zalloc(sizeof(*attr));
590206b73d0SCy Schubert 	if (!attr)
591206b73d0SCy Schubert 		return NULL;
592206b73d0SCy Schubert 
593206b73d0SCy Schubert 	attr->type = atoi(value);
594206b73d0SCy Schubert 
595206b73d0SCy Schubert 	pos = os_strchr(value, ':');
596206b73d0SCy Schubert 	if (!pos) {
597206b73d0SCy Schubert 		attr->val = wpabuf_alloc(1);
598206b73d0SCy Schubert 		if (!attr->val) {
599206b73d0SCy Schubert 			os_free(attr);
600206b73d0SCy Schubert 			return NULL;
601206b73d0SCy Schubert 		}
602206b73d0SCy Schubert 		wpabuf_put_u8(attr->val, 0);
603206b73d0SCy Schubert 		return attr;
604206b73d0SCy Schubert 	}
605206b73d0SCy Schubert 
606206b73d0SCy Schubert 	pos++;
607206b73d0SCy Schubert 	if (pos[0] == '\0' || pos[1] != ':') {
608206b73d0SCy Schubert 		os_free(attr);
609206b73d0SCy Schubert 		return NULL;
610206b73d0SCy Schubert 	}
611206b73d0SCy Schubert 	syntax = *pos++;
612206b73d0SCy Schubert 	pos++;
613206b73d0SCy Schubert 
614206b73d0SCy Schubert 	switch (syntax) {
615206b73d0SCy Schubert 	case 's':
616206b73d0SCy Schubert 		attr->val = wpabuf_alloc_copy(pos, os_strlen(pos));
617206b73d0SCy Schubert 		break;
618206b73d0SCy Schubert 	case 'x':
619206b73d0SCy Schubert 		len = os_strlen(pos);
620206b73d0SCy Schubert 		if (len & 1)
621206b73d0SCy Schubert 			break;
622206b73d0SCy Schubert 		len /= 2;
623206b73d0SCy Schubert 		attr->val = wpabuf_alloc(len);
624206b73d0SCy Schubert 		if (!attr->val)
625206b73d0SCy Schubert 			break;
626206b73d0SCy Schubert 		if (hexstr2bin(pos, wpabuf_put(attr->val, len), len) < 0) {
627206b73d0SCy Schubert 			wpabuf_free(attr->val);
628206b73d0SCy Schubert 			os_free(attr);
629206b73d0SCy Schubert 			return NULL;
630206b73d0SCy Schubert 		}
631206b73d0SCy Schubert 		break;
632206b73d0SCy Schubert 	case 'd':
633206b73d0SCy Schubert 		attr->val = wpabuf_alloc(4);
634206b73d0SCy Schubert 		if (attr->val)
635206b73d0SCy Schubert 			wpabuf_put_be32(attr->val, atoi(pos));
636206b73d0SCy Schubert 		break;
637206b73d0SCy Schubert 	default:
638206b73d0SCy Schubert 		os_free(attr);
639206b73d0SCy Schubert 		return NULL;
640206b73d0SCy Schubert 	}
641206b73d0SCy Schubert 
642206b73d0SCy Schubert 	if (!attr->val) {
643206b73d0SCy Schubert 		os_free(attr);
644206b73d0SCy Schubert 		return NULL;
645206b73d0SCy Schubert 	}
646206b73d0SCy Schubert 
647206b73d0SCy Schubert 	return attr;
648206b73d0SCy Schubert }
649206b73d0SCy Schubert 
650206b73d0SCy Schubert 
hostapd_config_free_radius_attr(struct hostapd_radius_attr * attr)651206b73d0SCy Schubert void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr)
652f05cddf9SRui Paulo {
653f05cddf9SRui Paulo 	struct hostapd_radius_attr *prev;
654f05cddf9SRui Paulo 
655f05cddf9SRui Paulo 	while (attr) {
656f05cddf9SRui Paulo 		prev = attr;
657f05cddf9SRui Paulo 		attr = attr->next;
658f05cddf9SRui Paulo 		wpabuf_free(prev->val);
659f05cddf9SRui Paulo 		os_free(prev);
660f05cddf9SRui Paulo 	}
661f05cddf9SRui Paulo }
662f05cddf9SRui Paulo 
663f05cddf9SRui Paulo 
hostapd_config_free_eap_user(struct hostapd_eap_user * user)6645b9c547cSRui Paulo void hostapd_config_free_eap_user(struct hostapd_eap_user *user)
665e28a4053SRui Paulo {
6665b9c547cSRui Paulo 	hostapd_config_free_radius_attr(user->accept_attr);
667e28a4053SRui Paulo 	os_free(user->identity);
6685b9c547cSRui Paulo 	bin_clear_free(user->password, user->password_len);
66985732ac8SCy Schubert 	bin_clear_free(user->salt, user->salt_len);
670e28a4053SRui Paulo 	os_free(user);
671e28a4053SRui Paulo }
672e28a4053SRui Paulo 
673e28a4053SRui Paulo 
hostapd_config_free_eap_users(struct hostapd_eap_user * user)67485732ac8SCy Schubert void hostapd_config_free_eap_users(struct hostapd_eap_user *user)
67585732ac8SCy Schubert {
67685732ac8SCy Schubert 	struct hostapd_eap_user *prev_user;
67785732ac8SCy Schubert 
67885732ac8SCy Schubert 	while (user) {
67985732ac8SCy Schubert 		prev_user = user;
68085732ac8SCy Schubert 		user = user->next;
68185732ac8SCy Schubert 		hostapd_config_free_eap_user(prev_user);
68285732ac8SCy Schubert 	}
68385732ac8SCy Schubert }
68485732ac8SCy Schubert 
68585732ac8SCy Schubert 
686c1d255d3SCy Schubert #ifdef CONFIG_WEP
hostapd_config_free_wep(struct hostapd_wep_keys * keys)687e28a4053SRui Paulo static void hostapd_config_free_wep(struct hostapd_wep_keys *keys)
688e28a4053SRui Paulo {
689e28a4053SRui Paulo 	int i;
690e28a4053SRui Paulo 	for (i = 0; i < NUM_WEP_KEYS; i++) {
6915b9c547cSRui Paulo 		bin_clear_free(keys->key[i], keys->len[i]);
692e28a4053SRui Paulo 		keys->key[i] = NULL;
693e28a4053SRui Paulo 	}
694e28a4053SRui Paulo }
695c1d255d3SCy Schubert #endif /* CONFIG_WEP */
696e28a4053SRui Paulo 
697e28a4053SRui Paulo 
hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk ** l)6985b9c547cSRui Paulo void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **l)
699e28a4053SRui Paulo {
7005b9c547cSRui Paulo 	struct hostapd_wpa_psk *psk, *tmp;
7015b9c547cSRui Paulo 
7025b9c547cSRui Paulo 	for (psk = *l; psk;) {
7035b9c547cSRui Paulo 		tmp = psk;
7045b9c547cSRui Paulo 		psk = psk->next;
7055b9c547cSRui Paulo 		bin_clear_free(tmp, sizeof(*tmp));
7065b9c547cSRui Paulo 	}
7075b9c547cSRui Paulo 	*l = NULL;
7085b9c547cSRui Paulo }
7095b9c547cSRui Paulo 
7105b9c547cSRui Paulo 
711*a90b9d01SCy Schubert #ifdef CONFIG_IEEE80211R_AP
712*a90b9d01SCy Schubert 
hostapd_config_clear_rxkhs(struct hostapd_bss_config * conf)713*a90b9d01SCy Schubert void hostapd_config_clear_rxkhs(struct hostapd_bss_config *conf)
714*a90b9d01SCy Schubert {
715*a90b9d01SCy Schubert 	struct ft_remote_r0kh *r0kh, *r0kh_prev;
716*a90b9d01SCy Schubert 	struct ft_remote_r1kh *r1kh, *r1kh_prev;
717*a90b9d01SCy Schubert 
718*a90b9d01SCy Schubert 	r0kh = conf->r0kh_list;
719*a90b9d01SCy Schubert 	conf->r0kh_list = NULL;
720*a90b9d01SCy Schubert 	while (r0kh) {
721*a90b9d01SCy Schubert 		r0kh_prev = r0kh;
722*a90b9d01SCy Schubert 		r0kh = r0kh->next;
723*a90b9d01SCy Schubert 		os_free(r0kh_prev);
724*a90b9d01SCy Schubert 	}
725*a90b9d01SCy Schubert 
726*a90b9d01SCy Schubert 	r1kh = conf->r1kh_list;
727*a90b9d01SCy Schubert 	conf->r1kh_list = NULL;
728*a90b9d01SCy Schubert 	while (r1kh) {
729*a90b9d01SCy Schubert 		r1kh_prev = r1kh;
730*a90b9d01SCy Schubert 		r1kh = r1kh->next;
731*a90b9d01SCy Schubert 		os_free(r1kh_prev);
732*a90b9d01SCy Schubert 	}
733*a90b9d01SCy Schubert }
734*a90b9d01SCy Schubert 
735*a90b9d01SCy Schubert #endif /* CONFIG_IEEE80211R_AP */
736*a90b9d01SCy Schubert 
737*a90b9d01SCy Schubert 
hostapd_config_free_anqp_elem(struct hostapd_bss_config * conf)738780fb4a2SCy Schubert static void hostapd_config_free_anqp_elem(struct hostapd_bss_config *conf)
739780fb4a2SCy Schubert {
740780fb4a2SCy Schubert 	struct anqp_element *elem;
741780fb4a2SCy Schubert 
742780fb4a2SCy Schubert 	while ((elem = dl_list_first(&conf->anqp_elem, struct anqp_element,
743780fb4a2SCy Schubert 				     list))) {
744780fb4a2SCy Schubert 		dl_list_del(&elem->list);
745780fb4a2SCy Schubert 		wpabuf_free(elem->payload);
746780fb4a2SCy Schubert 		os_free(elem);
747780fb4a2SCy Schubert 	}
748780fb4a2SCy Schubert }
749780fb4a2SCy Schubert 
750780fb4a2SCy Schubert 
hostapd_config_free_fils_realms(struct hostapd_bss_config * conf)75185732ac8SCy Schubert static void hostapd_config_free_fils_realms(struct hostapd_bss_config *conf)
75285732ac8SCy Schubert {
75385732ac8SCy Schubert #ifdef CONFIG_FILS
75485732ac8SCy Schubert 	struct fils_realm *realm;
75585732ac8SCy Schubert 
75685732ac8SCy Schubert 	while ((realm = dl_list_first(&conf->fils_realms, struct fils_realm,
75785732ac8SCy Schubert 				      list))) {
75885732ac8SCy Schubert 		dl_list_del(&realm->list);
75985732ac8SCy Schubert 		os_free(realm);
76085732ac8SCy Schubert 	}
76185732ac8SCy Schubert #endif /* CONFIG_FILS */
76285732ac8SCy Schubert }
76385732ac8SCy Schubert 
76485732ac8SCy Schubert 
hostapd_config_free_sae_passwords(struct hostapd_bss_config * conf)76585732ac8SCy Schubert static void hostapd_config_free_sae_passwords(struct hostapd_bss_config *conf)
76685732ac8SCy Schubert {
76785732ac8SCy Schubert 	struct sae_password_entry *pw, *tmp;
76885732ac8SCy Schubert 
76985732ac8SCy Schubert 	pw = conf->sae_passwords;
77085732ac8SCy Schubert 	conf->sae_passwords = NULL;
77185732ac8SCy Schubert 	while (pw) {
77285732ac8SCy Schubert 		tmp = pw;
77385732ac8SCy Schubert 		pw = pw->next;
77485732ac8SCy Schubert 		str_clear_free(tmp->password);
77585732ac8SCy Schubert 		os_free(tmp->identifier);
776c1d255d3SCy Schubert #ifdef CONFIG_SAE
777c1d255d3SCy Schubert 		sae_deinit_pt(tmp->pt);
778c1d255d3SCy Schubert #endif /* CONFIG_SAE */
779c1d255d3SCy Schubert #ifdef CONFIG_SAE_PK
780c1d255d3SCy Schubert 		sae_deinit_pk(tmp->pk);
781c1d255d3SCy Schubert #endif /* CONFIG_SAE_PK */
78285732ac8SCy Schubert 		os_free(tmp);
78385732ac8SCy Schubert 	}
78485732ac8SCy Schubert }
78585732ac8SCy Schubert 
78685732ac8SCy Schubert 
787206b73d0SCy Schubert #ifdef CONFIG_DPP2
hostapd_dpp_controller_conf_free(struct dpp_controller_conf * conf)788206b73d0SCy Schubert static void hostapd_dpp_controller_conf_free(struct dpp_controller_conf *conf)
789206b73d0SCy Schubert {
790206b73d0SCy Schubert 	struct dpp_controller_conf *prev;
791206b73d0SCy Schubert 
792206b73d0SCy Schubert 	while (conf) {
793206b73d0SCy Schubert 		prev = conf;
794206b73d0SCy Schubert 		conf = conf->next;
795206b73d0SCy Schubert 		os_free(prev);
796206b73d0SCy Schubert 	}
797206b73d0SCy Schubert }
798206b73d0SCy Schubert #endif /* CONFIG_DPP2 */
799206b73d0SCy Schubert 
800206b73d0SCy Schubert 
hostapd_config_free_bss(struct hostapd_bss_config * conf)8015b9c547cSRui Paulo void hostapd_config_free_bss(struct hostapd_bss_config *conf)
8025b9c547cSRui Paulo {
803206b73d0SCy Schubert #if defined(CONFIG_WPS) || defined(CONFIG_HS20)
804206b73d0SCy Schubert 	size_t i;
805206b73d0SCy Schubert #endif
806206b73d0SCy Schubert 
807e28a4053SRui Paulo 	if (conf == NULL)
808e28a4053SRui Paulo 		return;
809e28a4053SRui Paulo 
8105b9c547cSRui Paulo 	hostapd_config_clear_wpa_psk(&conf->ssid.wpa_psk);
811e28a4053SRui Paulo 
8125b9c547cSRui Paulo 	str_clear_free(conf->ssid.wpa_passphrase);
813e28a4053SRui Paulo 	os_free(conf->ssid.wpa_psk_file);
814c1d255d3SCy Schubert #ifdef CONFIG_WEP
815e28a4053SRui Paulo 	hostapd_config_free_wep(&conf->ssid.wep);
816c1d255d3SCy Schubert #endif /* CONFIG_WEP */
817e28a4053SRui Paulo #ifdef CONFIG_FULL_DYNAMIC_VLAN
818e28a4053SRui Paulo 	os_free(conf->ssid.vlan_tagged_interface);
819e28a4053SRui Paulo #endif /* CONFIG_FULL_DYNAMIC_VLAN */
820c1d255d3SCy Schubert #ifdef CONFIG_SAE
821c1d255d3SCy Schubert 	sae_deinit_pt(conf->ssid.pt);
822c1d255d3SCy Schubert #endif /* CONFIG_SAE */
823e28a4053SRui Paulo 
82485732ac8SCy Schubert 	hostapd_config_free_eap_users(conf->eap_user);
825f05cddf9SRui Paulo 	os_free(conf->eap_user_sqlite);
826e28a4053SRui Paulo 
827e28a4053SRui Paulo 	os_free(conf->eap_req_id_text);
8285b9c547cSRui Paulo 	os_free(conf->erp_domain);
829e28a4053SRui Paulo 	os_free(conf->accept_mac);
830e28a4053SRui Paulo 	os_free(conf->deny_mac);
831e28a4053SRui Paulo 	os_free(conf->nas_identifier);
8325b9c547cSRui Paulo 	if (conf->radius) {
833e28a4053SRui Paulo 		hostapd_config_free_radius(conf->radius->auth_servers,
834e28a4053SRui Paulo 					   conf->radius->num_auth_servers);
835e28a4053SRui Paulo 		hostapd_config_free_radius(conf->radius->acct_servers,
836e28a4053SRui Paulo 					   conf->radius->num_acct_servers);
837c1d255d3SCy Schubert 		os_free(conf->radius->force_client_dev);
8385b9c547cSRui Paulo 	}
839f05cddf9SRui Paulo 	hostapd_config_free_radius_attr(conf->radius_auth_req_attr);
840f05cddf9SRui Paulo 	hostapd_config_free_radius_attr(conf->radius_acct_req_attr);
841206b73d0SCy Schubert 	os_free(conf->radius_req_attr_sqlite);
842e28a4053SRui Paulo 	os_free(conf->rsn_preauth_interfaces);
843e28a4053SRui Paulo 	os_free(conf->ctrl_interface);
844*a90b9d01SCy Schubert 	os_free(conf->config_id);
845e28a4053SRui Paulo 	os_free(conf->ca_cert);
846e28a4053SRui Paulo 	os_free(conf->server_cert);
847206b73d0SCy Schubert 	os_free(conf->server_cert2);
848e28a4053SRui Paulo 	os_free(conf->private_key);
849206b73d0SCy Schubert 	os_free(conf->private_key2);
850e28a4053SRui Paulo 	os_free(conf->private_key_passwd);
851206b73d0SCy Schubert 	os_free(conf->private_key_passwd2);
8524bc52338SCy Schubert 	os_free(conf->check_cert_subject);
8535b9c547cSRui Paulo 	os_free(conf->ocsp_stapling_response);
854780fb4a2SCy Schubert 	os_free(conf->ocsp_stapling_response_multi);
855e28a4053SRui Paulo 	os_free(conf->dh_file);
8565b9c547cSRui Paulo 	os_free(conf->openssl_ciphers);
8574bc52338SCy Schubert 	os_free(conf->openssl_ecdh_curves);
858e28a4053SRui Paulo 	os_free(conf->pac_opaque_encr_key);
859e28a4053SRui Paulo 	os_free(conf->eap_fast_a_id);
860e28a4053SRui Paulo 	os_free(conf->eap_fast_a_id_info);
861e28a4053SRui Paulo 	os_free(conf->eap_sim_db);
862*a90b9d01SCy Schubert 	os_free(conf->imsi_privacy_key);
863e28a4053SRui Paulo 	os_free(conf->radius_server_clients);
864e28a4053SRui Paulo 	os_free(conf->radius);
865f05cddf9SRui Paulo 	os_free(conf->radius_das_shared_secret);
866e28a4053SRui Paulo 	hostapd_config_free_vlan(conf);
867f05cddf9SRui Paulo 	os_free(conf->time_zone);
868f05cddf9SRui Paulo 
86985732ac8SCy Schubert #ifdef CONFIG_IEEE80211R_AP
870*a90b9d01SCy Schubert 	hostapd_config_clear_rxkhs(conf);
871*a90b9d01SCy Schubert 	os_free(conf->rxkh_file);
872*a90b9d01SCy Schubert 	conf->rxkh_file = NULL;
87385732ac8SCy Schubert #endif /* CONFIG_IEEE80211R_AP */
874e28a4053SRui Paulo 
875e28a4053SRui Paulo #ifdef CONFIG_WPS
876e28a4053SRui Paulo 	os_free(conf->wps_pin_requests);
877e28a4053SRui Paulo 	os_free(conf->device_name);
878e28a4053SRui Paulo 	os_free(conf->manufacturer);
879e28a4053SRui Paulo 	os_free(conf->model_name);
880e28a4053SRui Paulo 	os_free(conf->model_number);
881e28a4053SRui Paulo 	os_free(conf->serial_number);
882e28a4053SRui Paulo 	os_free(conf->config_methods);
883e28a4053SRui Paulo 	os_free(conf->ap_pin);
884e28a4053SRui Paulo 	os_free(conf->extra_cred);
885e28a4053SRui Paulo 	os_free(conf->ap_settings);
8864bc52338SCy Schubert 	hostapd_config_clear_wpa_psk(&conf->multi_ap_backhaul_ssid.wpa_psk);
8874bc52338SCy Schubert 	str_clear_free(conf->multi_ap_backhaul_ssid.wpa_passphrase);
888e28a4053SRui Paulo 	os_free(conf->upnp_iface);
889e28a4053SRui Paulo 	os_free(conf->friendly_name);
890e28a4053SRui Paulo 	os_free(conf->manufacturer_url);
891e28a4053SRui Paulo 	os_free(conf->model_description);
892e28a4053SRui Paulo 	os_free(conf->model_url);
893e28a4053SRui Paulo 	os_free(conf->upc);
8945b9c547cSRui Paulo 	for (i = 0; i < MAX_WPS_VENDOR_EXTENSIONS; i++)
8955b9c547cSRui Paulo 		wpabuf_free(conf->wps_vendor_ext[i]);
896c1d255d3SCy Schubert 	wpabuf_free(conf->wps_application_ext);
897f05cddf9SRui Paulo 	wpabuf_free(conf->wps_nfc_dh_pubkey);
898f05cddf9SRui Paulo 	wpabuf_free(conf->wps_nfc_dh_privkey);
899f05cddf9SRui Paulo 	wpabuf_free(conf->wps_nfc_dev_pw);
900e28a4053SRui Paulo #endif /* CONFIG_WPS */
901f05cddf9SRui Paulo 
902f05cddf9SRui Paulo 	os_free(conf->roaming_consortium);
903f05cddf9SRui Paulo 	os_free(conf->venue_name);
90485732ac8SCy Schubert 	os_free(conf->venue_url);
905f05cddf9SRui Paulo 	os_free(conf->nai_realm_data);
906f05cddf9SRui Paulo 	os_free(conf->network_auth_type);
907f05cddf9SRui Paulo 	os_free(conf->anqp_3gpp_cell_net);
908f05cddf9SRui Paulo 	os_free(conf->domain_name);
909780fb4a2SCy Schubert 	hostapd_config_free_anqp_elem(conf);
910f05cddf9SRui Paulo 
911f05cddf9SRui Paulo #ifdef CONFIG_RADIUS_TEST
912f05cddf9SRui Paulo 	os_free(conf->dump_msk_file);
913f05cddf9SRui Paulo #endif /* CONFIG_RADIUS_TEST */
914f05cddf9SRui Paulo 
915f05cddf9SRui Paulo #ifdef CONFIG_HS20
916f05cddf9SRui Paulo 	os_free(conf->hs20_oper_friendly_name);
917f05cddf9SRui Paulo 	os_free(conf->hs20_wan_metrics);
918f05cddf9SRui Paulo 	os_free(conf->hs20_connection_capability);
919f05cddf9SRui Paulo 	os_free(conf->hs20_operating_class);
9205b9c547cSRui Paulo 	os_free(conf->hs20_icons);
9215b9c547cSRui Paulo 	if (conf->hs20_osu_providers) {
9225b9c547cSRui Paulo 		for (i = 0; i < conf->hs20_osu_providers_count; i++) {
9235b9c547cSRui Paulo 			struct hs20_osu_provider *p;
9245b9c547cSRui Paulo 			size_t j;
9255b9c547cSRui Paulo 			p = &conf->hs20_osu_providers[i];
9265b9c547cSRui Paulo 			os_free(p->friendly_name);
9275b9c547cSRui Paulo 			os_free(p->server_uri);
9285b9c547cSRui Paulo 			os_free(p->method_list);
9295b9c547cSRui Paulo 			for (j = 0; j < p->icons_count; j++)
9305b9c547cSRui Paulo 				os_free(p->icons[j]);
9315b9c547cSRui Paulo 			os_free(p->icons);
9325b9c547cSRui Paulo 			os_free(p->osu_nai);
93385732ac8SCy Schubert 			os_free(p->osu_nai2);
9345b9c547cSRui Paulo 			os_free(p->service_desc);
9355b9c547cSRui Paulo 		}
9365b9c547cSRui Paulo 		os_free(conf->hs20_osu_providers);
9375b9c547cSRui Paulo 	}
93885732ac8SCy Schubert 	if (conf->hs20_operator_icon) {
93985732ac8SCy Schubert 		for (i = 0; i < conf->hs20_operator_icon_count; i++)
94085732ac8SCy Schubert 			os_free(conf->hs20_operator_icon[i]);
94185732ac8SCy Schubert 		os_free(conf->hs20_operator_icon);
94285732ac8SCy Schubert 	}
9435b9c547cSRui Paulo 	os_free(conf->subscr_remediation_url);
9444bc52338SCy Schubert 	os_free(conf->hs20_sim_provisioning_url);
94585732ac8SCy Schubert 	os_free(conf->t_c_filename);
94685732ac8SCy Schubert 	os_free(conf->t_c_server_url);
947f05cddf9SRui Paulo #endif /* CONFIG_HS20 */
948f05cddf9SRui Paulo 
949f05cddf9SRui Paulo 	wpabuf_free(conf->vendor_elements);
950780fb4a2SCy Schubert 	wpabuf_free(conf->assocresp_elements);
9515b9c547cSRui Paulo 
9525b9c547cSRui Paulo 	os_free(conf->sae_groups);
95385732ac8SCy Schubert #ifdef CONFIG_OWE
95485732ac8SCy Schubert 	os_free(conf->owe_groups);
95585732ac8SCy Schubert #endif /* CONFIG_OWE */
9565b9c547cSRui Paulo 
9575b9c547cSRui Paulo 	os_free(conf->wowlan_triggers);
9585b9c547cSRui Paulo 
9595b9c547cSRui Paulo 	os_free(conf->server_id);
9605b9c547cSRui Paulo 
961325151a3SRui Paulo #ifdef CONFIG_TESTING_OPTIONS
962325151a3SRui Paulo 	wpabuf_free(conf->own_ie_override);
96385732ac8SCy Schubert 	wpabuf_free(conf->sae_commit_override);
964c1d255d3SCy Schubert 	wpabuf_free(conf->rsne_override_eapol);
965c1d255d3SCy Schubert 	wpabuf_free(conf->rsnxe_override_eapol);
966c1d255d3SCy Schubert 	wpabuf_free(conf->rsne_override_ft);
967c1d255d3SCy Schubert 	wpabuf_free(conf->rsnxe_override_ft);
968c1d255d3SCy Schubert 	wpabuf_free(conf->gtk_rsc_override);
969c1d255d3SCy Schubert 	wpabuf_free(conf->igtk_rsc_override);
970*a90b9d01SCy Schubert 	wpabuf_free(conf->eapol_m1_elements);
971*a90b9d01SCy Schubert 	wpabuf_free(conf->eapol_m3_elements);
972*a90b9d01SCy Schubert 	wpabuf_free(conf->presp_elements);
973325151a3SRui Paulo #endif /* CONFIG_TESTING_OPTIONS */
974325151a3SRui Paulo 
975325151a3SRui Paulo 	os_free(conf->no_probe_resp_if_seen_on);
976325151a3SRui Paulo 	os_free(conf->no_auth_if_seen_on);
977325151a3SRui Paulo 
97885732ac8SCy Schubert 	hostapd_config_free_fils_realms(conf);
97985732ac8SCy Schubert 
98085732ac8SCy Schubert #ifdef CONFIG_DPP
981c1d255d3SCy Schubert 	os_free(conf->dpp_name);
982c1d255d3SCy Schubert 	os_free(conf->dpp_mud_url);
983*a90b9d01SCy Schubert 	os_free(conf->dpp_extra_conf_req_name);
984*a90b9d01SCy Schubert 	os_free(conf->dpp_extra_conf_req_value);
98585732ac8SCy Schubert 	os_free(conf->dpp_connector);
98685732ac8SCy Schubert 	wpabuf_free(conf->dpp_netaccesskey);
98785732ac8SCy Schubert 	wpabuf_free(conf->dpp_csign);
988206b73d0SCy Schubert #ifdef CONFIG_DPP2
989206b73d0SCy Schubert 	hostapd_dpp_controller_conf_free(conf->dpp_controller);
990206b73d0SCy Schubert #endif /* CONFIG_DPP2 */
99185732ac8SCy Schubert #endif /* CONFIG_DPP */
99285732ac8SCy Schubert 
99385732ac8SCy Schubert 	hostapd_config_free_sae_passwords(conf);
99485732ac8SCy Schubert 
995206b73d0SCy Schubert #ifdef CONFIG_AIRTIME_POLICY
996206b73d0SCy Schubert 	{
997206b73d0SCy Schubert 		struct airtime_sta_weight *wt, *wt_prev;
998206b73d0SCy Schubert 
999206b73d0SCy Schubert 		wt = conf->airtime_weight_list;
1000206b73d0SCy Schubert 		conf->airtime_weight_list = NULL;
1001206b73d0SCy Schubert 		while (wt) {
1002206b73d0SCy Schubert 			wt_prev = wt;
1003206b73d0SCy Schubert 			wt = wt->next;
1004206b73d0SCy Schubert 			os_free(wt_prev);
1005206b73d0SCy Schubert 		}
1006206b73d0SCy Schubert 	}
1007206b73d0SCy Schubert #endif /* CONFIG_AIRTIME_POLICY */
1008206b73d0SCy Schubert 
1009c1d255d3SCy Schubert #ifdef CONFIG_PASN
1010c1d255d3SCy Schubert 	os_free(conf->pasn_groups);
1011c1d255d3SCy Schubert #endif /* CONFIG_PASN */
1012c1d255d3SCy Schubert 
10135b9c547cSRui Paulo 	os_free(conf);
1014e28a4053SRui Paulo }
1015e28a4053SRui Paulo 
1016e28a4053SRui Paulo 
1017e28a4053SRui Paulo /**
1018e28a4053SRui Paulo  * hostapd_config_free - Free hostapd configuration
1019e28a4053SRui Paulo  * @conf: Configuration data from hostapd_config_read().
1020e28a4053SRui Paulo  */
hostapd_config_free(struct hostapd_config * conf)1021e28a4053SRui Paulo void hostapd_config_free(struct hostapd_config *conf)
1022e28a4053SRui Paulo {
1023e28a4053SRui Paulo 	size_t i;
1024e28a4053SRui Paulo 
1025e28a4053SRui Paulo 	if (conf == NULL)
1026e28a4053SRui Paulo 		return;
1027e28a4053SRui Paulo 
1028e28a4053SRui Paulo 	for (i = 0; i < conf->num_bss; i++)
10295b9c547cSRui Paulo 		hostapd_config_free_bss(conf->bss[i]);
1030e28a4053SRui Paulo 	os_free(conf->bss);
1031e28a4053SRui Paulo 	os_free(conf->supported_rates);
1032e28a4053SRui Paulo 	os_free(conf->basic_rates);
1033325151a3SRui Paulo 	os_free(conf->acs_ch_list.range);
1034c1d255d3SCy Schubert 	os_free(conf->acs_freq_list.range);
10355b9c547cSRui Paulo 	os_free(conf->driver_params);
10365b9c547cSRui Paulo #ifdef CONFIG_ACS
10375b9c547cSRui Paulo 	os_free(conf->acs_chan_bias);
10385b9c547cSRui Paulo #endif /* CONFIG_ACS */
1039780fb4a2SCy Schubert 	wpabuf_free(conf->lci);
1040780fb4a2SCy Schubert 	wpabuf_free(conf->civic);
1041e28a4053SRui Paulo 
1042e28a4053SRui Paulo 	os_free(conf);
1043e28a4053SRui Paulo }
1044e28a4053SRui Paulo 
1045e28a4053SRui Paulo 
1046e28a4053SRui Paulo /**
1047e28a4053SRui Paulo  * hostapd_maclist_found - Find a MAC address from a list
1048e28a4053SRui Paulo  * @list: MAC address list
1049e28a4053SRui Paulo  * @num_entries: Number of addresses in the list
1050e28a4053SRui Paulo  * @addr: Address to search for
1051e28a4053SRui Paulo  * @vlan_id: Buffer for returning VLAN ID or %NULL if not needed
1052e28a4053SRui Paulo  * Returns: 1 if address is in the list or 0 if not.
1053e28a4053SRui Paulo  *
1054e28a4053SRui Paulo  * Perform a binary search for given MAC address from a pre-sorted list.
1055e28a4053SRui Paulo  */
hostapd_maclist_found(struct mac_acl_entry * list,int num_entries,const u8 * addr,struct vlan_description * vlan_id)1056e28a4053SRui Paulo int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
1057780fb4a2SCy Schubert 			  const u8 *addr, struct vlan_description *vlan_id)
1058e28a4053SRui Paulo {
1059e28a4053SRui Paulo 	int start, end, middle, res;
1060e28a4053SRui Paulo 
1061e28a4053SRui Paulo 	start = 0;
1062e28a4053SRui Paulo 	end = num_entries - 1;
1063e28a4053SRui Paulo 
1064e28a4053SRui Paulo 	while (start <= end) {
1065e28a4053SRui Paulo 		middle = (start + end) / 2;
1066e28a4053SRui Paulo 		res = os_memcmp(list[middle].addr, addr, ETH_ALEN);
1067e28a4053SRui Paulo 		if (res == 0) {
1068e28a4053SRui Paulo 			if (vlan_id)
1069e28a4053SRui Paulo 				*vlan_id = list[middle].vlan_id;
1070e28a4053SRui Paulo 			return 1;
1071e28a4053SRui Paulo 		}
1072e28a4053SRui Paulo 		if (res < 0)
1073e28a4053SRui Paulo 			start = middle + 1;
1074e28a4053SRui Paulo 		else
1075e28a4053SRui Paulo 			end = middle - 1;
1076e28a4053SRui Paulo 	}
1077e28a4053SRui Paulo 
1078e28a4053SRui Paulo 	return 0;
1079e28a4053SRui Paulo }
1080e28a4053SRui Paulo 
1081e28a4053SRui Paulo 
hostapd_rate_found(int * list,int rate)1082e28a4053SRui Paulo int hostapd_rate_found(int *list, int rate)
1083e28a4053SRui Paulo {
1084e28a4053SRui Paulo 	int i;
1085e28a4053SRui Paulo 
1086e28a4053SRui Paulo 	if (list == NULL)
1087e28a4053SRui Paulo 		return 0;
1088e28a4053SRui Paulo 
1089e28a4053SRui Paulo 	for (i = 0; list[i] >= 0; i++)
1090e28a4053SRui Paulo 		if (list[i] == rate)
1091e28a4053SRui Paulo 			return 1;
1092e28a4053SRui Paulo 
1093e28a4053SRui Paulo 	return 0;
1094e28a4053SRui Paulo }
1095e28a4053SRui Paulo 
1096e28a4053SRui Paulo 
hostapd_vlan_valid(struct hostapd_vlan * vlan,struct vlan_description * vlan_desc)1097780fb4a2SCy Schubert int hostapd_vlan_valid(struct hostapd_vlan *vlan,
1098780fb4a2SCy Schubert 		       struct vlan_description *vlan_desc)
1099e28a4053SRui Paulo {
1100e28a4053SRui Paulo 	struct hostapd_vlan *v = vlan;
1101780fb4a2SCy Schubert 	int i;
1102780fb4a2SCy Schubert 
1103780fb4a2SCy Schubert 	if (!vlan_desc->notempty || vlan_desc->untagged < 0 ||
1104780fb4a2SCy Schubert 	    vlan_desc->untagged > MAX_VLAN_ID)
1105780fb4a2SCy Schubert 		return 0;
1106780fb4a2SCy Schubert 	for (i = 0; i < MAX_NUM_TAGGED_VLAN; i++) {
1107780fb4a2SCy Schubert 		if (vlan_desc->tagged[i] < 0 ||
1108780fb4a2SCy Schubert 		    vlan_desc->tagged[i] > MAX_VLAN_ID)
1109780fb4a2SCy Schubert 			return 0;
1110780fb4a2SCy Schubert 	}
1111780fb4a2SCy Schubert 	if (!vlan_desc->untagged && !vlan_desc->tagged[0])
1112780fb4a2SCy Schubert 		return 0;
1113780fb4a2SCy Schubert 
1114e28a4053SRui Paulo 	while (v) {
1115780fb4a2SCy Schubert 		if (!vlan_compare(&v->vlan_desc, vlan_desc) ||
1116780fb4a2SCy Schubert 		    v->vlan_id == VLAN_ID_WILDCARD)
11175b9c547cSRui Paulo 			return 1;
11185b9c547cSRui Paulo 		v = v->next;
11195b9c547cSRui Paulo 	}
11205b9c547cSRui Paulo 	return 0;
11215b9c547cSRui Paulo }
11225b9c547cSRui Paulo 
11235b9c547cSRui Paulo 
hostapd_get_vlan_id_ifname(struct hostapd_vlan * vlan,int vlan_id)11245b9c547cSRui Paulo const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, int vlan_id)
11255b9c547cSRui Paulo {
11265b9c547cSRui Paulo 	struct hostapd_vlan *v = vlan;
11275b9c547cSRui Paulo 	while (v) {
11285b9c547cSRui Paulo 		if (v->vlan_id == vlan_id)
1129e28a4053SRui Paulo 			return v->ifname;
1130e28a4053SRui Paulo 		v = v->next;
1131e28a4053SRui Paulo 	}
1132e28a4053SRui Paulo 	return NULL;
1133e28a4053SRui Paulo }
1134e28a4053SRui Paulo 
1135e28a4053SRui Paulo 
hostapd_get_psk(const struct hostapd_bss_config * conf,const u8 * addr,const u8 * p2p_dev_addr,const u8 * prev_psk,int * vlan_id)1136e28a4053SRui Paulo const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
11375b9c547cSRui Paulo 			   const u8 *addr, const u8 *p2p_dev_addr,
11384bc52338SCy Schubert 			   const u8 *prev_psk, int *vlan_id)
1139e28a4053SRui Paulo {
1140e28a4053SRui Paulo 	struct hostapd_wpa_psk *psk;
1141e28a4053SRui Paulo 	int next_ok = prev_psk == NULL;
1142e28a4053SRui Paulo 
11434bc52338SCy Schubert 	if (vlan_id)
11444bc52338SCy Schubert 		*vlan_id = 0;
11454bc52338SCy Schubert 
11465b9c547cSRui Paulo 	if (p2p_dev_addr && !is_zero_ether_addr(p2p_dev_addr)) {
11475b9c547cSRui Paulo 		wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
11485b9c547cSRui Paulo 			   " p2p_dev_addr=" MACSTR " prev_psk=%p",
11495b9c547cSRui Paulo 			   MAC2STR(addr), MAC2STR(p2p_dev_addr), prev_psk);
11505b9c547cSRui Paulo 		addr = NULL; /* Use P2P Device Address for matching */
11515b9c547cSRui Paulo 	} else {
11525b9c547cSRui Paulo 		wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
11535b9c547cSRui Paulo 			   " prev_psk=%p",
11545b9c547cSRui Paulo 			   MAC2STR(addr), prev_psk);
11555b9c547cSRui Paulo 	}
11565b9c547cSRui Paulo 
1157e28a4053SRui Paulo 	for (psk = conf->ssid.wpa_psk; psk != NULL; psk = psk->next) {
1158e28a4053SRui Paulo 		if (next_ok &&
11595b9c547cSRui Paulo 		    (psk->group ||
1160*a90b9d01SCy Schubert 		     (addr && ether_addr_equal(psk->addr, addr)) ||
11615b9c547cSRui Paulo 		     (!addr && p2p_dev_addr &&
1162*a90b9d01SCy Schubert 		      ether_addr_equal(psk->p2p_dev_addr, p2p_dev_addr)))) {
11634bc52338SCy Schubert 			if (vlan_id)
11644bc52338SCy Schubert 				*vlan_id = psk->vlan_id;
1165e28a4053SRui Paulo 			return psk->psk;
11664bc52338SCy Schubert 		}
1167e28a4053SRui Paulo 
1168e28a4053SRui Paulo 		if (psk->psk == prev_psk)
1169e28a4053SRui Paulo 			next_ok = 1;
1170e28a4053SRui Paulo 	}
1171e28a4053SRui Paulo 
1172e28a4053SRui Paulo 	return NULL;
1173e28a4053SRui Paulo }
11745b9c547cSRui Paulo 
11755b9c547cSRui Paulo 
1176c1d255d3SCy Schubert #ifdef CONFIG_SAE_PK
hostapd_sae_pk_password_without_pk(struct hostapd_bss_config * bss)1177c1d255d3SCy Schubert static bool hostapd_sae_pk_password_without_pk(struct hostapd_bss_config *bss)
1178c1d255d3SCy Schubert {
1179c1d255d3SCy Schubert 	struct sae_password_entry *pw;
1180c1d255d3SCy Schubert 	bool res = false;
1181c1d255d3SCy Schubert 
1182c1d255d3SCy Schubert 	if (bss->ssid.wpa_passphrase &&
1183c1d255d3SCy Schubert #ifdef CONFIG_TESTING_OPTIONS
1184c1d255d3SCy Schubert 	    !bss->sae_pk_password_check_skip &&
1185c1d255d3SCy Schubert #endif /* CONFIG_TESTING_OPTIONS */
1186c1d255d3SCy Schubert 	    sae_pk_valid_password(bss->ssid.wpa_passphrase))
1187c1d255d3SCy Schubert 		res = true;
1188c1d255d3SCy Schubert 
1189c1d255d3SCy Schubert 	for (pw = bss->sae_passwords; pw; pw = pw->next) {
1190c1d255d3SCy Schubert 		if (!pw->pk &&
1191c1d255d3SCy Schubert #ifdef CONFIG_TESTING_OPTIONS
1192c1d255d3SCy Schubert 		    !bss->sae_pk_password_check_skip &&
1193c1d255d3SCy Schubert #endif /* CONFIG_TESTING_OPTIONS */
1194c1d255d3SCy Schubert 		    sae_pk_valid_password(pw->password))
1195c1d255d3SCy Schubert 			return true;
1196c1d255d3SCy Schubert 
1197c1d255d3SCy Schubert 		if (bss->ssid.wpa_passphrase && res && pw->pk &&
1198c1d255d3SCy Schubert 		    os_strcmp(bss->ssid.wpa_passphrase, pw->password) == 0)
1199c1d255d3SCy Schubert 			res = false;
1200c1d255d3SCy Schubert 	}
1201c1d255d3SCy Schubert 
1202c1d255d3SCy Schubert 	return res;
1203c1d255d3SCy Schubert }
1204c1d255d3SCy Schubert #endif /* CONFIG_SAE_PK */
1205c1d255d3SCy Schubert 
1206c1d255d3SCy Schubert 
hostapd_config_check_bss_6g(struct hostapd_bss_config * bss)1207c1d255d3SCy Schubert static bool hostapd_config_check_bss_6g(struct hostapd_bss_config *bss)
1208c1d255d3SCy Schubert {
1209c1d255d3SCy Schubert 	if (bss->wpa != WPA_PROTO_RSN) {
1210c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1211c1d255d3SCy Schubert 			   "Pre-RSNA security methods are not allowed in 6 GHz");
1212c1d255d3SCy Schubert 		return false;
1213c1d255d3SCy Schubert 	}
1214c1d255d3SCy Schubert 
1215c1d255d3SCy Schubert 	if (bss->ieee80211w != MGMT_FRAME_PROTECTION_REQUIRED) {
1216c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1217c1d255d3SCy Schubert 			   "Management frame protection is required in 6 GHz");
1218c1d255d3SCy Schubert 		return false;
1219c1d255d3SCy Schubert 	}
1220c1d255d3SCy Schubert 
1221c1d255d3SCy Schubert 	if (bss->wpa_key_mgmt & (WPA_KEY_MGMT_PSK |
1222c1d255d3SCy Schubert 				 WPA_KEY_MGMT_FT_PSK |
1223c1d255d3SCy Schubert 				 WPA_KEY_MGMT_PSK_SHA256)) {
1224c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR, "Invalid AKM suite for 6 GHz");
1225c1d255d3SCy Schubert 		return false;
1226c1d255d3SCy Schubert 	}
1227c1d255d3SCy Schubert 
1228c1d255d3SCy Schubert 	if (bss->rsn_pairwise & (WPA_CIPHER_WEP40 |
1229c1d255d3SCy Schubert 				 WPA_CIPHER_WEP104 |
1230c1d255d3SCy Schubert 				 WPA_CIPHER_TKIP)) {
1231c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1232c1d255d3SCy Schubert 			   "Invalid pairwise cipher suite for 6 GHz");
1233c1d255d3SCy Schubert 		return false;
1234c1d255d3SCy Schubert 	}
1235c1d255d3SCy Schubert 
1236c1d255d3SCy Schubert 	if (bss->wpa_group & (WPA_CIPHER_WEP40 |
1237c1d255d3SCy Schubert 			      WPA_CIPHER_WEP104 |
1238c1d255d3SCy Schubert 			      WPA_CIPHER_TKIP)) {
1239c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR, "Invalid group cipher suite for 6 GHz");
1240c1d255d3SCy Schubert 		return false;
1241c1d255d3SCy Schubert 	}
1242c1d255d3SCy Schubert 
1243*a90b9d01SCy Schubert #ifdef CONFIG_SAE
1244*a90b9d01SCy Schubert 	if (wpa_key_mgmt_sae(bss->wpa_key_mgmt) &&
1245*a90b9d01SCy Schubert 	    bss->sae_pwe == SAE_PWE_HUNT_AND_PECK) {
1246*a90b9d01SCy Schubert 		wpa_printf(MSG_INFO, "SAE: Enabling SAE H2E on 6 GHz");
1247*a90b9d01SCy Schubert 		bss->sae_pwe = SAE_PWE_BOTH;
1248*a90b9d01SCy Schubert 	}
1249*a90b9d01SCy Schubert #endif /* CONFIG_SAE */
1250*a90b9d01SCy Schubert 
1251c1d255d3SCy Schubert 	return true;
1252c1d255d3SCy Schubert }
1253c1d255d3SCy Schubert 
1254c1d255d3SCy Schubert 
hostapd_config_check_bss(struct hostapd_bss_config * bss,struct hostapd_config * conf,int full_config)12555b9c547cSRui Paulo static int hostapd_config_check_bss(struct hostapd_bss_config *bss,
12565b9c547cSRui Paulo 				    struct hostapd_config *conf,
12575b9c547cSRui Paulo 				    int full_config)
12585b9c547cSRui Paulo {
1259c1d255d3SCy Schubert 	if (full_config && is_6ghz_op_class(conf->op_class) &&
1260c1d255d3SCy Schubert 	    !hostapd_config_check_bss_6g(bss))
1261c1d255d3SCy Schubert 		return -1;
1262c1d255d3SCy Schubert 
12635b9c547cSRui Paulo 	if (full_config && bss->ieee802_1x && !bss->eap_server &&
12645b9c547cSRui Paulo 	    !bss->radius->auth_servers) {
12655b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "Invalid IEEE 802.1X configuration (no "
12665b9c547cSRui Paulo 			   "EAP authenticator configured).");
12675b9c547cSRui Paulo 		return -1;
12685b9c547cSRui Paulo 	}
12695b9c547cSRui Paulo 
1270c1d255d3SCy Schubert #ifdef CONFIG_WEP
12715b9c547cSRui Paulo 	if (bss->wpa) {
12725b9c547cSRui Paulo 		int wep, i;
12735b9c547cSRui Paulo 
12745b9c547cSRui Paulo 		wep = bss->default_wep_key_len > 0 ||
12755b9c547cSRui Paulo 		       bss->individual_wep_key_len > 0;
12765b9c547cSRui Paulo 		for (i = 0; i < NUM_WEP_KEYS; i++) {
12775b9c547cSRui Paulo 			if (bss->ssid.wep.keys_set) {
12785b9c547cSRui Paulo 				wep = 1;
12795b9c547cSRui Paulo 				break;
12805b9c547cSRui Paulo 			}
12815b9c547cSRui Paulo 		}
12825b9c547cSRui Paulo 
12835b9c547cSRui Paulo 		if (wep) {
12845b9c547cSRui Paulo 			wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported");
12855b9c547cSRui Paulo 			return -1;
12865b9c547cSRui Paulo 		}
12875b9c547cSRui Paulo 	}
1288c1d255d3SCy Schubert #endif /* CONFIG_WEP */
12895b9c547cSRui Paulo 
12905b9c547cSRui Paulo 	if (full_config && bss->wpa &&
12915b9c547cSRui Paulo 	    bss->wpa_psk_radius != PSK_RADIUS_IGNORED &&
1292*a90b9d01SCy Schubert 	    bss->wpa_psk_radius != PSK_RADIUS_DURING_4WAY_HS &&
12935b9c547cSRui Paulo 	    bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH) {
12945b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no "
12955b9c547cSRui Paulo 			   "RADIUS checking (macaddr_acl=2) enabled.");
12965b9c547cSRui Paulo 		return -1;
12975b9c547cSRui Paulo 	}
12985b9c547cSRui Paulo 
1299*a90b9d01SCy Schubert 	if (full_config && bss->wpa &&
1300*a90b9d01SCy Schubert 	    wpa_key_mgmt_wpa_psk_no_sae(bss->wpa_key_mgmt) &&
13015b9c547cSRui Paulo 	    bss->ssid.wpa_psk == NULL && bss->ssid.wpa_passphrase == NULL &&
13025b9c547cSRui Paulo 	    bss->ssid.wpa_psk_file == NULL &&
1303*a90b9d01SCy Schubert 	    bss->wpa_psk_radius != PSK_RADIUS_DURING_4WAY_HS &&
13045b9c547cSRui Paulo 	    (bss->wpa_psk_radius != PSK_RADIUS_REQUIRED ||
13055b9c547cSRui Paulo 	     bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH)) {
13065b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
13075b9c547cSRui Paulo 			   "is not configured.");
13085b9c547cSRui Paulo 		return -1;
13095b9c547cSRui Paulo 	}
13105b9c547cSRui Paulo 
1311780fb4a2SCy Schubert 	if (full_config && !is_zero_ether_addr(bss->bssid)) {
13125b9c547cSRui Paulo 		size_t i;
13135b9c547cSRui Paulo 
13145b9c547cSRui Paulo 		for (i = 0; i < conf->num_bss; i++) {
13155b9c547cSRui Paulo 			if (conf->bss[i] != bss &&
13165b9c547cSRui Paulo 			    (hostapd_mac_comp(conf->bss[i]->bssid,
13175b9c547cSRui Paulo 					      bss->bssid) == 0)) {
13185b9c547cSRui Paulo 				wpa_printf(MSG_ERROR, "Duplicate BSSID " MACSTR
13195b9c547cSRui Paulo 					   " on interface '%s' and '%s'.",
13205b9c547cSRui Paulo 					   MAC2STR(bss->bssid),
13215b9c547cSRui Paulo 					   conf->bss[i]->iface, bss->iface);
13225b9c547cSRui Paulo 				return -1;
13235b9c547cSRui Paulo 			}
13245b9c547cSRui Paulo 		}
13255b9c547cSRui Paulo 	}
13265b9c547cSRui Paulo 
132785732ac8SCy Schubert #ifdef CONFIG_IEEE80211R_AP
13285b9c547cSRui Paulo 	if (full_config && wpa_key_mgmt_ft(bss->wpa_key_mgmt) &&
13295b9c547cSRui Paulo 	    (bss->nas_identifier == NULL ||
13305b9c547cSRui Paulo 	     os_strlen(bss->nas_identifier) < 1 ||
13315b9c547cSRui Paulo 	     os_strlen(bss->nas_identifier) > FT_R0KH_ID_MAX_LEN)) {
13325b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "FT (IEEE 802.11r) requires "
13335b9c547cSRui Paulo 			   "nas_identifier to be configured as a 1..48 octet "
13345b9c547cSRui Paulo 			   "string");
13355b9c547cSRui Paulo 		return -1;
13365b9c547cSRui Paulo 	}
133785732ac8SCy Schubert #endif /* CONFIG_IEEE80211R_AP */
13385b9c547cSRui Paulo 
13395b9c547cSRui Paulo 	if (full_config && conf->ieee80211n &&
13405b9c547cSRui Paulo 	    conf->hw_mode == HOSTAPD_MODE_IEEE80211B) {
1341c1d255d3SCy Schubert 		bss->disable_11n = true;
13425b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) in 11b mode is not "
13435b9c547cSRui Paulo 			   "allowed, disabling HT capabilities");
13445b9c547cSRui Paulo 	}
13455b9c547cSRui Paulo 
1346c1d255d3SCy Schubert #ifdef CONFIG_WEP
13475b9c547cSRui Paulo 	if (full_config && conf->ieee80211n &&
13485b9c547cSRui Paulo 	    bss->ssid.security_policy == SECURITY_STATIC_WEP) {
1349c1d255d3SCy Schubert 		bss->disable_11n = true;
13505b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WEP is not "
13515b9c547cSRui Paulo 			   "allowed, disabling HT capabilities");
13525b9c547cSRui Paulo 	}
1353c1d255d3SCy Schubert #endif /* CONFIG_WEP */
13545b9c547cSRui Paulo 
13555b9c547cSRui Paulo 	if (full_config && conf->ieee80211n && bss->wpa &&
13565b9c547cSRui Paulo 	    !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
13575b9c547cSRui Paulo 	    !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
13585b9c547cSRui Paulo 				   WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
13595b9c547cSRui Paulo 	{
1360c1d255d3SCy Schubert 		bss->disable_11n = true;
13615b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WPA/WPA2 "
13625b9c547cSRui Paulo 			   "requires CCMP/GCMP to be enabled, disabling HT "
13635b9c547cSRui Paulo 			   "capabilities");
13645b9c547cSRui Paulo 	}
13655b9c547cSRui Paulo 
1366780fb4a2SCy Schubert #ifdef CONFIG_IEEE80211AC
1367c1d255d3SCy Schubert #ifdef CONFIG_WEP
1368780fb4a2SCy Schubert 	if (full_config && conf->ieee80211ac &&
1369780fb4a2SCy Schubert 	    bss->ssid.security_policy == SECURITY_STATIC_WEP) {
1370c1d255d3SCy Schubert 		bss->disable_11ac = true;
1371780fb4a2SCy Schubert 		wpa_printf(MSG_ERROR,
1372780fb4a2SCy Schubert 			   "VHT (IEEE 802.11ac) with WEP is not allowed, disabling VHT capabilities");
1373780fb4a2SCy Schubert 	}
1374c1d255d3SCy Schubert #endif /* CONFIG_WEP */
137585732ac8SCy Schubert 
137685732ac8SCy Schubert 	if (full_config && conf->ieee80211ac && bss->wpa &&
137785732ac8SCy Schubert 	    !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
137885732ac8SCy Schubert 	    !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
137985732ac8SCy Schubert 				   WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
138085732ac8SCy Schubert 	{
1381c1d255d3SCy Schubert 		bss->disable_11ac = true;
138285732ac8SCy Schubert 		wpa_printf(MSG_ERROR,
138385732ac8SCy Schubert 			   "VHT (IEEE 802.11ac) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling VHT capabilities");
138485732ac8SCy Schubert 	}
1385780fb4a2SCy Schubert #endif /* CONFIG_IEEE80211AC */
1386780fb4a2SCy Schubert 
1387c1d255d3SCy Schubert #ifdef CONFIG_IEEE80211AX
1388c1d255d3SCy Schubert #ifdef CONFIG_WEP
1389c1d255d3SCy Schubert 	if (full_config && conf->ieee80211ax &&
1390c1d255d3SCy Schubert 	    bss->ssid.security_policy == SECURITY_STATIC_WEP) {
1391c1d255d3SCy Schubert 		bss->disable_11ax = true;
1392c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1393c1d255d3SCy Schubert 			   "HE (IEEE 802.11ax) with WEP is not allowed, disabling HE capabilities");
1394c1d255d3SCy Schubert 	}
1395c1d255d3SCy Schubert #endif /* CONFIG_WEP */
1396c1d255d3SCy Schubert 
1397c1d255d3SCy Schubert 	if (full_config && conf->ieee80211ax && bss->wpa &&
1398c1d255d3SCy Schubert 	    !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
1399c1d255d3SCy Schubert 	    !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
1400c1d255d3SCy Schubert 				   WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
1401c1d255d3SCy Schubert 	{
1402c1d255d3SCy Schubert 		bss->disable_11ax = true;
1403c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1404c1d255d3SCy Schubert 			   "HE (IEEE 802.11ax) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling HE capabilities");
1405c1d255d3SCy Schubert 	}
1406c1d255d3SCy Schubert #endif /* CONFIG_IEEE80211AX */
1407c1d255d3SCy Schubert 
14085b9c547cSRui Paulo #ifdef CONFIG_WPS
14095b9c547cSRui Paulo 	if (full_config && bss->wps_state && bss->ignore_broadcast_ssid) {
14105b9c547cSRui Paulo 		wpa_printf(MSG_INFO, "WPS: ignore_broadcast_ssid "
14115b9c547cSRui Paulo 			   "configuration forced WPS to be disabled");
14125b9c547cSRui Paulo 		bss->wps_state = 0;
14135b9c547cSRui Paulo 	}
14145b9c547cSRui Paulo 
1415c1d255d3SCy Schubert #ifdef CONFIG_WEP
14165b9c547cSRui Paulo 	if (full_config && bss->wps_state &&
14175b9c547cSRui Paulo 	    bss->ssid.wep.keys_set && bss->wpa == 0) {
14185b9c547cSRui Paulo 		wpa_printf(MSG_INFO, "WPS: WEP configuration forced WPS to be "
14195b9c547cSRui Paulo 			   "disabled");
14205b9c547cSRui Paulo 		bss->wps_state = 0;
14215b9c547cSRui Paulo 	}
1422c1d255d3SCy Schubert #endif /* CONFIG_WEP */
14235b9c547cSRui Paulo 
14245b9c547cSRui Paulo 	if (full_config && bss->wps_state && bss->wpa &&
14255b9c547cSRui Paulo 	    (!(bss->wpa & 2) ||
142685732ac8SCy Schubert 	     !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
142785732ac8SCy Schubert 				    WPA_CIPHER_CCMP_256 |
142885732ac8SCy Schubert 				    WPA_CIPHER_GCMP_256)))) {
14295b9c547cSRui Paulo 		wpa_printf(MSG_INFO, "WPS: WPA/TKIP configuration without "
1430325151a3SRui Paulo 			   "WPA2/CCMP/GCMP forced WPS to be disabled");
14315b9c547cSRui Paulo 		bss->wps_state = 0;
14325b9c547cSRui Paulo 	}
14335b9c547cSRui Paulo #endif /* CONFIG_WPS */
14345b9c547cSRui Paulo 
14355b9c547cSRui Paulo #ifdef CONFIG_HS20
14365b9c547cSRui Paulo 	if (full_config && bss->hs20 &&
14375b9c547cSRui Paulo 	    (!(bss->wpa & 2) ||
14385b9c547cSRui Paulo 	     !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
14395b9c547cSRui Paulo 				    WPA_CIPHER_CCMP_256 |
14405b9c547cSRui Paulo 				    WPA_CIPHER_GCMP_256)))) {
14415b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "HS 2.0: WPA2-Enterprise/CCMP "
14425b9c547cSRui Paulo 			   "configuration is required for Hotspot 2.0 "
14435b9c547cSRui Paulo 			   "functionality");
14445b9c547cSRui Paulo 		return -1;
14455b9c547cSRui Paulo 	}
14465b9c547cSRui Paulo #endif /* CONFIG_HS20 */
14475b9c547cSRui Paulo 
1448780fb4a2SCy Schubert #ifdef CONFIG_MBO
1449780fb4a2SCy Schubert 	if (full_config && bss->mbo_enabled && (bss->wpa & 2) &&
1450780fb4a2SCy Schubert 	    bss->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
1451780fb4a2SCy Schubert 		wpa_printf(MSG_ERROR,
1452780fb4a2SCy Schubert 			   "MBO: PMF needs to be enabled whenever using WPA2 with MBO");
1453780fb4a2SCy Schubert 		return -1;
1454780fb4a2SCy Schubert 	}
1455780fb4a2SCy Schubert #endif /* CONFIG_MBO */
1456780fb4a2SCy Schubert 
14574bc52338SCy Schubert #ifdef CONFIG_OCV
14584bc52338SCy Schubert 	if (full_config && bss->ieee80211w == NO_MGMT_FRAME_PROTECTION &&
14594bc52338SCy Schubert 	    bss->ocv) {
14604bc52338SCy Schubert 		wpa_printf(MSG_ERROR,
14614bc52338SCy Schubert 			   "OCV: PMF needs to be enabled whenever using OCV");
14624bc52338SCy Schubert 		return -1;
14634bc52338SCy Schubert 	}
14644bc52338SCy Schubert #endif /* CONFIG_OCV */
14654bc52338SCy Schubert 
1466c1d255d3SCy Schubert #ifdef CONFIG_SAE_PK
1467c1d255d3SCy Schubert 	if (full_config && hostapd_sae_pk_in_use(bss) &&
1468c1d255d3SCy Schubert 	    hostapd_sae_pk_password_without_pk(bss)) {
1469c1d255d3SCy Schubert 		wpa_printf(MSG_ERROR,
1470c1d255d3SCy Schubert 			   "SAE-PK: SAE password uses SAE-PK style, but does not have PK configured");
1471c1d255d3SCy Schubert 		return -1;
1472c1d255d3SCy Schubert 	}
1473c1d255d3SCy Schubert #endif /* CONFIG_SAE_PK */
1474c1d255d3SCy Schubert 
14754b72b91aSCy Schubert #ifdef CONFIG_FILS
1476*a90b9d01SCy Schubert 	if (full_config && bss->fils_discovery_max_int &&
1477*a90b9d01SCy Schubert 	    (!conf->ieee80211ax || bss->disable_11ax)) {
1478*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR,
1479*a90b9d01SCy Schubert 			   "Currently IEEE 802.11ax support is mandatory to enable FILS discovery transmission.");
1480*a90b9d01SCy Schubert 		return -1;
1481*a90b9d01SCy Schubert 	}
1482*a90b9d01SCy Schubert 
1483*a90b9d01SCy Schubert 	if (full_config && bss->fils_discovery_max_int &&
14844b72b91aSCy Schubert 	    bss->unsol_bcast_probe_resp_interval) {
14854b72b91aSCy Schubert 		wpa_printf(MSG_ERROR,
14864b72b91aSCy Schubert 			   "Cannot enable both FILS discovery and unsolicited broadcast Probe Response at the same time");
14874b72b91aSCy Schubert 		return -1;
14884b72b91aSCy Schubert 	}
14894b72b91aSCy Schubert #endif /* CONFIG_FILS */
14904b72b91aSCy Schubert 
1491*a90b9d01SCy Schubert #ifdef CONFIG_IEEE80211BE
1492*a90b9d01SCy Schubert 	if (full_config && !bss->disable_11be && bss->disable_11ax) {
1493*a90b9d01SCy Schubert 		bss->disable_11be = true;
1494*a90b9d01SCy Schubert 		wpa_printf(MSG_INFO,
1495*a90b9d01SCy Schubert 			   "Disabling IEEE 802.11be as IEEE 802.11ax is disabled for this BSS");
1496*a90b9d01SCy Schubert 	}
1497*a90b9d01SCy Schubert #endif /* CONFIG_IEEE80211BE */
1498*a90b9d01SCy Schubert 
1499*a90b9d01SCy Schubert 	if (full_config && bss->ignore_broadcast_ssid && conf->mbssid) {
1500*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR,
1501*a90b9d01SCy Schubert 			   "Hidden SSID is not suppored when MBSSID is enabled");
1502*a90b9d01SCy Schubert 		return -1;
1503*a90b9d01SCy Schubert 	}
1504*a90b9d01SCy Schubert 
15055b9c547cSRui Paulo 	return 0;
15065b9c547cSRui Paulo }
15075b9c547cSRui Paulo 
15085b9c547cSRui Paulo 
hostapd_config_check_cw(struct hostapd_config * conf,int queue)1509325151a3SRui Paulo static int hostapd_config_check_cw(struct hostapd_config *conf, int queue)
1510325151a3SRui Paulo {
1511325151a3SRui Paulo 	int tx_cwmin = conf->tx_queue[queue].cwmin;
1512325151a3SRui Paulo 	int tx_cwmax = conf->tx_queue[queue].cwmax;
1513325151a3SRui Paulo 	int ac_cwmin = conf->wmm_ac_params[queue].cwmin;
1514325151a3SRui Paulo 	int ac_cwmax = conf->wmm_ac_params[queue].cwmax;
1515325151a3SRui Paulo 
1516325151a3SRui Paulo 	if (tx_cwmin > tx_cwmax) {
1517325151a3SRui Paulo 		wpa_printf(MSG_ERROR,
1518325151a3SRui Paulo 			   "Invalid TX queue cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
1519325151a3SRui Paulo 			   tx_cwmin, tx_cwmax);
1520325151a3SRui Paulo 		return -1;
1521325151a3SRui Paulo 	}
1522325151a3SRui Paulo 	if (ac_cwmin > ac_cwmax) {
1523325151a3SRui Paulo 		wpa_printf(MSG_ERROR,
1524325151a3SRui Paulo 			   "Invalid WMM AC cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
1525325151a3SRui Paulo 			   ac_cwmin, ac_cwmax);
1526325151a3SRui Paulo 		return -1;
1527325151a3SRui Paulo 	}
1528325151a3SRui Paulo 	return 0;
1529325151a3SRui Paulo }
1530325151a3SRui Paulo 
1531325151a3SRui Paulo 
hostapd_config_check(struct hostapd_config * conf,int full_config)15325b9c547cSRui Paulo int hostapd_config_check(struct hostapd_config *conf, int full_config)
15335b9c547cSRui Paulo {
15345b9c547cSRui Paulo 	size_t i;
15355b9c547cSRui Paulo 
1536*a90b9d01SCy Schubert 	if (full_config && is_6ghz_op_class(conf->op_class) &&
1537*a90b9d01SCy Schubert 	    !conf->hw_mode_set) {
1538*a90b9d01SCy Schubert 		/* Use the appropriate hw_mode value automatically when the
1539*a90b9d01SCy Schubert 		 * op_class parameter has been set, but hw_mode was not. */
1540*a90b9d01SCy Schubert 		conf->hw_mode = HOSTAPD_MODE_IEEE80211A;
1541*a90b9d01SCy Schubert 	}
1542*a90b9d01SCy Schubert 
15435b9c547cSRui Paulo 	if (full_config && conf->ieee80211d &&
15445b9c547cSRui Paulo 	    (!conf->country[0] || !conf->country[1])) {
15455b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11d without "
15465b9c547cSRui Paulo 			   "setting the country_code");
15475b9c547cSRui Paulo 		return -1;
15485b9c547cSRui Paulo 	}
15495b9c547cSRui Paulo 
15505b9c547cSRui Paulo 	if (full_config && conf->ieee80211h && !conf->ieee80211d) {
15515b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11h without "
15525b9c547cSRui Paulo 			   "IEEE 802.11d enabled");
15535b9c547cSRui Paulo 		return -1;
15545b9c547cSRui Paulo 	}
15555b9c547cSRui Paulo 
15565b9c547cSRui Paulo 	if (full_config && conf->local_pwr_constraint != -1 &&
15575b9c547cSRui Paulo 	    !conf->ieee80211d) {
15585b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "Cannot add Power Constraint element without Country element");
15595b9c547cSRui Paulo 		return -1;
15605b9c547cSRui Paulo 	}
15615b9c547cSRui Paulo 
15625b9c547cSRui Paulo 	if (full_config && conf->spectrum_mgmt_required &&
15635b9c547cSRui Paulo 	    conf->local_pwr_constraint == -1) {
15645b9c547cSRui Paulo 		wpa_printf(MSG_ERROR, "Cannot set Spectrum Management bit without Country and Power Constraint elements");
15655b9c547cSRui Paulo 		return -1;
15665b9c547cSRui Paulo 	}
15675b9c547cSRui Paulo 
1568206b73d0SCy Schubert #ifdef CONFIG_AIRTIME_POLICY
1569206b73d0SCy Schubert 	if (full_config && conf->airtime_mode > AIRTIME_MODE_STATIC &&
1570206b73d0SCy Schubert 	    !conf->airtime_update_interval) {
1571206b73d0SCy Schubert 		wpa_printf(MSG_ERROR, "Airtime update interval cannot be zero");
1572206b73d0SCy Schubert 		return -1;
1573206b73d0SCy Schubert 	}
1574206b73d0SCy Schubert #endif /* CONFIG_AIRTIME_POLICY */
1575325151a3SRui Paulo 	for (i = 0; i < NUM_TX_QUEUES; i++) {
1576325151a3SRui Paulo 		if (hostapd_config_check_cw(conf, i))
1577325151a3SRui Paulo 			return -1;
1578325151a3SRui Paulo 	}
1579325151a3SRui Paulo 
1580*a90b9d01SCy Schubert #ifdef CONFIG_IEEE80211BE
1581*a90b9d01SCy Schubert 	if (full_config && conf->ieee80211be && !conf->ieee80211ax) {
1582*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR,
1583*a90b9d01SCy Schubert 			   "Cannot set ieee80211be without ieee80211ax");
1584*a90b9d01SCy Schubert 		return -1;
1585*a90b9d01SCy Schubert 	}
1586*a90b9d01SCy Schubert 
1587*a90b9d01SCy Schubert 	if (full_config)
1588*a90b9d01SCy Schubert 		hostapd_set_and_check_bw320_offset(conf,
1589*a90b9d01SCy Schubert 						   conf->eht_bw320_offset);
1590*a90b9d01SCy Schubert #endif /* CONFIG_IEEE80211BE */
1591*a90b9d01SCy Schubert 
1592*a90b9d01SCy Schubert 	if (full_config && conf->mbssid && !conf->ieee80211ax) {
1593*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR,
1594*a90b9d01SCy Schubert 			   "Cannot enable multiple BSSID support without ieee80211ax");
1595*a90b9d01SCy Schubert 		return -1;
1596*a90b9d01SCy Schubert 	}
1597*a90b9d01SCy Schubert 
15985b9c547cSRui Paulo 	for (i = 0; i < conf->num_bss; i++) {
15995b9c547cSRui Paulo 		if (hostapd_config_check_bss(conf->bss[i], conf, full_config))
16005b9c547cSRui Paulo 			return -1;
16015b9c547cSRui Paulo 	}
16025b9c547cSRui Paulo 
16035b9c547cSRui Paulo 	return 0;
16045b9c547cSRui Paulo }
16055b9c547cSRui Paulo 
16065b9c547cSRui Paulo 
hostapd_set_security_params(struct hostapd_bss_config * bss,int full_config)16075b9c547cSRui Paulo void hostapd_set_security_params(struct hostapd_bss_config *bss,
16085b9c547cSRui Paulo 				 int full_config)
16095b9c547cSRui Paulo {
1610c1d255d3SCy Schubert #ifdef CONFIG_WEP
16115b9c547cSRui Paulo 	if (bss->individual_wep_key_len == 0) {
16125b9c547cSRui Paulo 		/* individual keys are not use; can use key idx0 for
16135b9c547cSRui Paulo 		 * broadcast keys */
16145b9c547cSRui Paulo 		bss->broadcast_key_idx_min = 0;
16155b9c547cSRui Paulo 	}
1616c1d255d3SCy Schubert #endif /* CONFIG_WEP */
16175b9c547cSRui Paulo 
16185b9c547cSRui Paulo 	if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
16195b9c547cSRui Paulo 		bss->rsn_pairwise = bss->wpa_pairwise;
162085732ac8SCy Schubert 	if (bss->group_cipher)
162185732ac8SCy Schubert 		bss->wpa_group = bss->group_cipher;
162285732ac8SCy Schubert 	else
162385732ac8SCy Schubert 		bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
162485732ac8SCy Schubert 							    bss->wpa_pairwise,
16255b9c547cSRui Paulo 							    bss->rsn_pairwise);
162685732ac8SCy Schubert 	if (!bss->wpa_group_rekey_set)
162785732ac8SCy Schubert 		bss->wpa_group_rekey = bss->wpa_group == WPA_CIPHER_TKIP ?
162885732ac8SCy Schubert 			600 : 86400;
16295b9c547cSRui Paulo 
16305b9c547cSRui Paulo 	if (full_config) {
16315b9c547cSRui Paulo 		bss->radius->auth_server = bss->radius->auth_servers;
16325b9c547cSRui Paulo 		bss->radius->acct_server = bss->radius->acct_servers;
16335b9c547cSRui Paulo 	}
16345b9c547cSRui Paulo 
16355b9c547cSRui Paulo 	if (bss->wpa && bss->ieee802_1x) {
16365b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_WPA;
16375b9c547cSRui Paulo 	} else if (bss->wpa) {
16385b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_WPA_PSK;
16395b9c547cSRui Paulo 	} else if (bss->ieee802_1x) {
16405b9c547cSRui Paulo 		int cipher = WPA_CIPHER_NONE;
16415b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_IEEE_802_1X;
1642c1d255d3SCy Schubert #ifdef CONFIG_WEP
16435b9c547cSRui Paulo 		bss->ssid.wep.default_len = bss->default_wep_key_len;
16445b9c547cSRui Paulo 		if (full_config && bss->default_wep_key_len) {
16455b9c547cSRui Paulo 			cipher = bss->default_wep_key_len >= 13 ?
16465b9c547cSRui Paulo 				WPA_CIPHER_WEP104 : WPA_CIPHER_WEP40;
16475b9c547cSRui Paulo 		} else if (full_config && bss->ssid.wep.keys_set) {
16485b9c547cSRui Paulo 			if (bss->ssid.wep.len[0] >= 13)
16495b9c547cSRui Paulo 				cipher = WPA_CIPHER_WEP104;
16505b9c547cSRui Paulo 			else
16515b9c547cSRui Paulo 				cipher = WPA_CIPHER_WEP40;
16525b9c547cSRui Paulo 		}
1653c1d255d3SCy Schubert #endif /* CONFIG_WEP */
16545b9c547cSRui Paulo 		bss->wpa_group = cipher;
16555b9c547cSRui Paulo 		bss->wpa_pairwise = cipher;
16565b9c547cSRui Paulo 		bss->rsn_pairwise = cipher;
16575b9c547cSRui Paulo 		if (full_config)
16585b9c547cSRui Paulo 			bss->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA;
1659c1d255d3SCy Schubert #ifdef CONFIG_WEP
16605b9c547cSRui Paulo 	} else if (bss->ssid.wep.keys_set) {
16615b9c547cSRui Paulo 		int cipher = WPA_CIPHER_WEP40;
16625b9c547cSRui Paulo 		if (bss->ssid.wep.len[0] >= 13)
16635b9c547cSRui Paulo 			cipher = WPA_CIPHER_WEP104;
16645b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_STATIC_WEP;
16655b9c547cSRui Paulo 		bss->wpa_group = cipher;
16665b9c547cSRui Paulo 		bss->wpa_pairwise = cipher;
16675b9c547cSRui Paulo 		bss->rsn_pairwise = cipher;
16685b9c547cSRui Paulo 		if (full_config)
16695b9c547cSRui Paulo 			bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
1670c1d255d3SCy Schubert #endif /* CONFIG_WEP */
16715b9c547cSRui Paulo 	} else if (bss->osen) {
16725b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_OSEN;
16735b9c547cSRui Paulo 		bss->wpa_group = WPA_CIPHER_CCMP;
16745b9c547cSRui Paulo 		bss->wpa_pairwise = 0;
16755b9c547cSRui Paulo 		bss->rsn_pairwise = WPA_CIPHER_CCMP;
16765b9c547cSRui Paulo 	} else {
16775b9c547cSRui Paulo 		bss->ssid.security_policy = SECURITY_PLAINTEXT;
1678325151a3SRui Paulo 		if (full_config) {
16795b9c547cSRui Paulo 			bss->wpa_group = WPA_CIPHER_NONE;
16805b9c547cSRui Paulo 			bss->wpa_pairwise = WPA_CIPHER_NONE;
16815b9c547cSRui Paulo 			bss->rsn_pairwise = WPA_CIPHER_NONE;
16825b9c547cSRui Paulo 			bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
16835b9c547cSRui Paulo 		}
16845b9c547cSRui Paulo 	}
1685325151a3SRui Paulo }
16864bc52338SCy Schubert 
16874bc52338SCy Schubert 
hostapd_sae_pw_id_in_use(struct hostapd_bss_config * conf)16884bc52338SCy Schubert int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf)
16894bc52338SCy Schubert {
16904bc52338SCy Schubert 	int with_id = 0, without_id = 0;
16914bc52338SCy Schubert 	struct sae_password_entry *pw;
16924bc52338SCy Schubert 
16934bc52338SCy Schubert 	if (conf->ssid.wpa_passphrase)
16944bc52338SCy Schubert 		without_id = 1;
16954bc52338SCy Schubert 
16964bc52338SCy Schubert 	for (pw = conf->sae_passwords; pw; pw = pw->next) {
16974bc52338SCy Schubert 		if (pw->identifier)
16984bc52338SCy Schubert 			with_id = 1;
16994bc52338SCy Schubert 		else
17004bc52338SCy Schubert 			without_id = 1;
17014bc52338SCy Schubert 		if (with_id && without_id)
17024bc52338SCy Schubert 			break;
17034bc52338SCy Schubert 	}
17044bc52338SCy Schubert 
17054bc52338SCy Schubert 	if (with_id && !without_id)
17064bc52338SCy Schubert 		return 2;
17074bc52338SCy Schubert 	return with_id;
17084bc52338SCy Schubert }
1709c1d255d3SCy Schubert 
1710c1d255d3SCy Schubert 
hostapd_sae_pk_in_use(struct hostapd_bss_config * conf)1711c1d255d3SCy Schubert bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf)
1712c1d255d3SCy Schubert {
1713c1d255d3SCy Schubert #ifdef CONFIG_SAE_PK
1714c1d255d3SCy Schubert 	struct sae_password_entry *pw;
1715c1d255d3SCy Schubert 
1716c1d255d3SCy Schubert 	for (pw = conf->sae_passwords; pw; pw = pw->next) {
1717c1d255d3SCy Schubert 		if (pw->pk)
1718c1d255d3SCy Schubert 			return true;
1719c1d255d3SCy Schubert 	}
1720c1d255d3SCy Schubert #endif /* CONFIG_SAE_PK */
1721c1d255d3SCy Schubert 
1722c1d255d3SCy Schubert 	return false;
1723c1d255d3SCy Schubert }
1724c1d255d3SCy Schubert 
1725c1d255d3SCy Schubert 
1726c1d255d3SCy Schubert #ifdef CONFIG_SAE_PK
hostapd_sae_pk_exclusively(struct hostapd_bss_config * conf)1727c1d255d3SCy Schubert bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf)
1728c1d255d3SCy Schubert {
1729c1d255d3SCy Schubert 	bool with_pk = false;
1730c1d255d3SCy Schubert 	struct sae_password_entry *pw;
1731c1d255d3SCy Schubert 
1732c1d255d3SCy Schubert 	if (conf->ssid.wpa_passphrase)
1733c1d255d3SCy Schubert 		return false;
1734c1d255d3SCy Schubert 
1735c1d255d3SCy Schubert 	for (pw = conf->sae_passwords; pw; pw = pw->next) {
1736c1d255d3SCy Schubert 		if (!pw->pk)
1737c1d255d3SCy Schubert 			return false;
1738c1d255d3SCy Schubert 		with_pk = true;
1739c1d255d3SCy Schubert 	}
1740c1d255d3SCy Schubert 
1741c1d255d3SCy Schubert 	return with_pk;
1742c1d255d3SCy Schubert }
1743c1d255d3SCy Schubert #endif /* CONFIG_SAE_PK */
1744*a90b9d01SCy Schubert 
1745*a90b9d01SCy Schubert 
hostapd_acl_comp(const void * a,const void * b)1746*a90b9d01SCy Schubert int hostapd_acl_comp(const void *a, const void *b)
1747*a90b9d01SCy Schubert {
1748*a90b9d01SCy Schubert 	const struct mac_acl_entry *aa = a;
1749*a90b9d01SCy Schubert 	const struct mac_acl_entry *bb = b;
1750*a90b9d01SCy Schubert 	return os_memcmp(aa->addr, bb->addr, sizeof(macaddr));
1751*a90b9d01SCy Schubert }
1752*a90b9d01SCy Schubert 
1753*a90b9d01SCy Schubert 
hostapd_add_acl_maclist(struct mac_acl_entry ** acl,int * num,int vlan_id,const u8 * addr)1754*a90b9d01SCy Schubert int hostapd_add_acl_maclist(struct mac_acl_entry **acl, int *num,
1755*a90b9d01SCy Schubert 			    int vlan_id, const u8 *addr)
1756*a90b9d01SCy Schubert {
1757*a90b9d01SCy Schubert 	struct mac_acl_entry *newacl;
1758*a90b9d01SCy Schubert 
1759*a90b9d01SCy Schubert 	newacl = os_realloc_array(*acl, *num + 1, sizeof(**acl));
1760*a90b9d01SCy Schubert 	if (!newacl) {
1761*a90b9d01SCy Schubert 		wpa_printf(MSG_ERROR, "MAC list reallocation failed");
1762*a90b9d01SCy Schubert 		return -1;
1763*a90b9d01SCy Schubert 	}
1764*a90b9d01SCy Schubert 
1765*a90b9d01SCy Schubert 	*acl = newacl;
1766*a90b9d01SCy Schubert 	os_memcpy((*acl)[*num].addr, addr, ETH_ALEN);
1767*a90b9d01SCy Schubert 	os_memset(&(*acl)[*num].vlan_id, 0, sizeof((*acl)[*num].vlan_id));
1768*a90b9d01SCy Schubert 	(*acl)[*num].vlan_id.untagged = vlan_id;
1769*a90b9d01SCy Schubert 	(*acl)[*num].vlan_id.notempty = !!vlan_id;
1770*a90b9d01SCy Schubert 	(*num)++;
1771*a90b9d01SCy Schubert 
1772*a90b9d01SCy Schubert 	return 0;
1773*a90b9d01SCy Schubert }
1774*a90b9d01SCy Schubert 
1775*a90b9d01SCy Schubert 
hostapd_remove_acl_mac(struct mac_acl_entry ** acl,int * num,const u8 * addr)1776*a90b9d01SCy Schubert void hostapd_remove_acl_mac(struct mac_acl_entry **acl, int *num,
1777*a90b9d01SCy Schubert 			    const u8 *addr)
1778*a90b9d01SCy Schubert {
1779*a90b9d01SCy Schubert 	int i = 0;
1780*a90b9d01SCy Schubert 
1781*a90b9d01SCy Schubert 	while (i < *num) {
1782*a90b9d01SCy Schubert 		if (ether_addr_equal((*acl)[i].addr, addr)) {
1783*a90b9d01SCy Schubert 			os_remove_in_array(*acl, *num, sizeof(**acl), i);
1784*a90b9d01SCy Schubert 			(*num)--;
1785*a90b9d01SCy Schubert 		} else {
1786*a90b9d01SCy Schubert 			i++;
1787*a90b9d01SCy Schubert 		}
1788*a90b9d01SCy Schubert 	}
1789*a90b9d01SCy Schubert }
1790