1 /* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #ifndef HOSTAPD_CONFIG_H 10 #define HOSTAPD_CONFIG_H 11 12 #include "common/defs.h" 13 #include "utils/list.h" 14 #include "ip_addr.h" 15 #include "common/wpa_common.h" 16 #include "common/ieee802_11_defs.h" 17 #include "common/ieee802_11_common.h" 18 #include "wps/wps.h" 19 #include "fst/fst.h" 20 #include "vlan.h" 21 22 /** 23 * mesh_conf - local MBSS state and settings 24 */ 25 struct mesh_conf { 26 u8 meshid[32]; 27 u8 meshid_len; 28 /* Active Path Selection Protocol Identifier */ 29 u8 mesh_pp_id; 30 /* Active Path Selection Metric Identifier */ 31 u8 mesh_pm_id; 32 /* Congestion Control Mode Identifier */ 33 u8 mesh_cc_id; 34 /* Synchronization Protocol Identifier */ 35 u8 mesh_sp_id; 36 /* Authentication Protocol Identifier */ 37 u8 mesh_auth_id; 38 u8 *rsn_ie; 39 int rsn_ie_len; 40 #define MESH_CONF_SEC_NONE BIT(0) 41 #define MESH_CONF_SEC_AUTH BIT(1) 42 #define MESH_CONF_SEC_AMPE BIT(2) 43 unsigned int security; 44 enum mfp_options ieee80211w; 45 unsigned int pairwise_cipher; 46 unsigned int group_cipher; 47 unsigned int mgmt_group_cipher; 48 int dot11MeshMaxRetries; 49 int dot11MeshRetryTimeout; /* msec */ 50 int dot11MeshConfirmTimeout; /* msec */ 51 int dot11MeshHoldingTimeout; /* msec */ 52 }; 53 54 #define MAX_STA_COUNT 2007 55 #define MAX_VLAN_ID 4094 56 57 typedef u8 macaddr[ETH_ALEN]; 58 59 struct mac_acl_entry { 60 macaddr addr; 61 struct vlan_description vlan_id; 62 }; 63 64 struct hostapd_radius_servers; 65 struct ft_remote_r0kh; 66 struct ft_remote_r1kh; 67 68 #define NUM_WEP_KEYS 4 69 struct hostapd_wep_keys { 70 u8 idx; 71 u8 *key[NUM_WEP_KEYS]; 72 size_t len[NUM_WEP_KEYS]; 73 int keys_set; 74 size_t default_len; /* key length used for dynamic key generation */ 75 }; 76 77 typedef enum hostap_security_policy { 78 SECURITY_PLAINTEXT = 0, 79 SECURITY_STATIC_WEP = 1, 80 SECURITY_IEEE_802_1X = 2, 81 SECURITY_WPA_PSK = 3, 82 SECURITY_WPA = 4, 83 SECURITY_OSEN = 5 84 } secpolicy; 85 86 struct hostapd_ssid { 87 u8 ssid[SSID_MAX_LEN]; 88 size_t ssid_len; 89 unsigned int ssid_set:1; 90 unsigned int utf8_ssid:1; 91 unsigned int wpa_passphrase_set:1; 92 unsigned int wpa_psk_set:1; 93 94 char vlan[IFNAMSIZ + 1]; 95 secpolicy security_policy; 96 97 struct hostapd_wpa_psk *wpa_psk; 98 char *wpa_passphrase; 99 char *wpa_psk_file; 100 101 struct hostapd_wep_keys wep; 102 103 #define DYNAMIC_VLAN_DISABLED 0 104 #define DYNAMIC_VLAN_OPTIONAL 1 105 #define DYNAMIC_VLAN_REQUIRED 2 106 int dynamic_vlan; 107 #define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 108 #define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 109 #define DYNAMIC_VLAN_NAMING_END 2 110 int vlan_naming; 111 int per_sta_vif; 112 #ifdef CONFIG_FULL_DYNAMIC_VLAN 113 char *vlan_tagged_interface; 114 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 115 }; 116 117 118 #define VLAN_ID_WILDCARD -1 119 120 struct hostapd_vlan { 121 struct hostapd_vlan *next; 122 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 123 struct vlan_description vlan_desc; 124 char ifname[IFNAMSIZ + 1]; 125 int configured; 126 int dynamic_vlan; 127 #ifdef CONFIG_FULL_DYNAMIC_VLAN 128 129 #define DVLAN_CLEAN_WLAN_PORT 0x8 130 int clean; 131 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 132 }; 133 134 #define PMK_LEN 32 135 #define MIN_PASSPHRASE_LEN 8 136 #define MAX_PASSPHRASE_LEN 63 137 struct hostapd_sta_wpa_psk_short { 138 struct hostapd_sta_wpa_psk_short *next; 139 unsigned int is_passphrase:1; 140 u8 psk[PMK_LEN]; 141 char passphrase[MAX_PASSPHRASE_LEN + 1]; 142 int ref; /* (number of references held) - 1 */ 143 }; 144 145 struct hostapd_wpa_psk { 146 struct hostapd_wpa_psk *next; 147 int group; 148 u8 psk[PMK_LEN]; 149 u8 addr[ETH_ALEN]; 150 u8 p2p_dev_addr[ETH_ALEN]; 151 }; 152 153 struct hostapd_eap_user { 154 struct hostapd_eap_user *next; 155 u8 *identity; 156 size_t identity_len; 157 struct { 158 int vendor; 159 u32 method; 160 } methods[EAP_MAX_METHODS]; 161 u8 *password; 162 size_t password_len; 163 u8 *salt; 164 size_t salt_len; /* non-zero when password is salted */ 165 int phase2; 166 int force_version; 167 unsigned int wildcard_prefix:1; 168 unsigned int password_hash:1; /* whether password is hashed with 169 * nt_password_hash() */ 170 unsigned int remediation:1; 171 unsigned int macacl:1; 172 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 173 struct hostapd_radius_attr *accept_attr; 174 u32 t_c_timestamp; 175 }; 176 177 struct hostapd_radius_attr { 178 u8 type; 179 struct wpabuf *val; 180 struct hostapd_radius_attr *next; 181 }; 182 183 184 #define NUM_TX_QUEUES 4 185 186 struct hostapd_tx_queue_params { 187 int aifs; 188 int cwmin; 189 int cwmax; 190 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 191 }; 192 193 194 #define MAX_ROAMING_CONSORTIUM_LEN 15 195 196 struct hostapd_roaming_consortium { 197 u8 len; 198 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 199 }; 200 201 struct hostapd_lang_string { 202 u8 lang[3]; 203 u8 name_len; 204 u8 name[252]; 205 }; 206 207 struct hostapd_venue_url { 208 u8 venue_number; 209 u8 url_len; 210 u8 url[254]; 211 }; 212 213 #define MAX_NAI_REALMS 10 214 #define MAX_NAI_REALMLEN 255 215 #define MAX_NAI_EAP_METHODS 5 216 #define MAX_NAI_AUTH_TYPES 4 217 struct hostapd_nai_realm_data { 218 u8 encoding; 219 char realm_buf[MAX_NAI_REALMLEN + 1]; 220 char *realm[MAX_NAI_REALMS]; 221 u8 eap_method_count; 222 struct hostapd_nai_realm_eap { 223 u8 eap_method; 224 u8 num_auths; 225 u8 auth_id[MAX_NAI_AUTH_TYPES]; 226 u8 auth_val[MAX_NAI_AUTH_TYPES]; 227 } eap_method[MAX_NAI_EAP_METHODS]; 228 }; 229 230 struct anqp_element { 231 struct dl_list list; 232 u16 infoid; 233 struct wpabuf *payload; 234 }; 235 236 struct fils_realm { 237 struct dl_list list; 238 u8 hash[2]; 239 char realm[]; 240 }; 241 242 struct sae_password_entry { 243 struct sae_password_entry *next; 244 char *password; 245 char *identifier; 246 u8 peer_addr[ETH_ALEN]; 247 }; 248 249 /** 250 * struct hostapd_bss_config - Per-BSS configuration 251 */ 252 struct hostapd_bss_config { 253 char iface[IFNAMSIZ + 1]; 254 char bridge[IFNAMSIZ + 1]; 255 char vlan_bridge[IFNAMSIZ + 1]; 256 char wds_bridge[IFNAMSIZ + 1]; 257 258 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 259 260 unsigned int logger_syslog; /* module bitfield */ 261 unsigned int logger_stdout; /* module bitfield */ 262 263 int max_num_sta; /* maximum number of STAs in station table */ 264 265 int dtim_period; 266 unsigned int bss_load_update_period; 267 unsigned int chan_util_avg_period; 268 269 int ieee802_1x; /* use IEEE 802.1X */ 270 int eapol_version; 271 int eap_server; /* Use internal EAP server instead of external 272 * RADIUS server */ 273 struct hostapd_eap_user *eap_user; 274 char *eap_user_sqlite; 275 char *eap_sim_db; 276 unsigned int eap_sim_db_timeout; 277 int eap_server_erp; /* Whether ERP is enabled on internal EAP server */ 278 struct hostapd_ip_addr own_ip_addr; 279 char *nas_identifier; 280 struct hostapd_radius_servers *radius; 281 int acct_interim_interval; 282 int radius_request_cui; 283 struct hostapd_radius_attr *radius_auth_req_attr; 284 struct hostapd_radius_attr *radius_acct_req_attr; 285 int radius_das_port; 286 unsigned int radius_das_time_window; 287 int radius_das_require_event_timestamp; 288 int radius_das_require_message_authenticator; 289 struct hostapd_ip_addr radius_das_client_addr; 290 u8 *radius_das_shared_secret; 291 size_t radius_das_shared_secret_len; 292 293 struct hostapd_ssid ssid; 294 295 char *eap_req_id_text; /* optional displayable message sent with 296 * EAP Request-Identity */ 297 size_t eap_req_id_text_len; 298 int eapol_key_index_workaround; 299 300 size_t default_wep_key_len; 301 int individual_wep_key_len; 302 int wep_rekeying_period; 303 int broadcast_key_idx_min, broadcast_key_idx_max; 304 int eap_reauth_period; 305 int erp_send_reauth_start; 306 char *erp_domain; 307 308 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 309 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 310 * frames */ 311 312 enum macaddr_acl { 313 ACCEPT_UNLESS_DENIED = 0, 314 DENY_UNLESS_ACCEPTED = 1, 315 USE_EXTERNAL_RADIUS_AUTH = 2 316 } macaddr_acl; 317 struct mac_acl_entry *accept_mac; 318 int num_accept_mac; 319 struct mac_acl_entry *deny_mac; 320 int num_deny_mac; 321 int wds_sta; 322 int isolate; 323 int start_disabled; 324 325 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 326 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 327 328 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 329 int wpa_key_mgmt; 330 #ifdef CONFIG_IEEE80211W 331 enum mfp_options ieee80211w; 332 int group_mgmt_cipher; 333 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 334 unsigned int assoc_sa_query_max_timeout; 335 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 336 int assoc_sa_query_retry_timeout; 337 #endif /* CONFIG_IEEE80211W */ 338 enum { 339 PSK_RADIUS_IGNORED = 0, 340 PSK_RADIUS_ACCEPTED = 1, 341 PSK_RADIUS_REQUIRED = 2 342 } wpa_psk_radius; 343 int wpa_pairwise; 344 int group_cipher; /* wpa_group value override from configuation */ 345 int wpa_group; 346 int wpa_group_rekey; 347 int wpa_group_rekey_set; 348 int wpa_strict_rekey; 349 int wpa_gmk_rekey; 350 int wpa_ptk_rekey; 351 u32 wpa_group_update_count; 352 u32 wpa_pairwise_update_count; 353 int wpa_disable_eapol_key_retries; 354 int rsn_pairwise; 355 int rsn_preauth; 356 char *rsn_preauth_interfaces; 357 358 #ifdef CONFIG_IEEE80211R_AP 359 /* IEEE 802.11r - Fast BSS Transition */ 360 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 361 u8 r1_key_holder[FT_R1KH_ID_LEN]; 362 u32 r0_key_lifetime; /* PMK-R0 lifetime seconds */ 363 int rkh_pos_timeout; 364 int rkh_neg_timeout; 365 int rkh_pull_timeout; /* ms */ 366 int rkh_pull_retries; 367 u32 reassociation_deadline; 368 struct ft_remote_r0kh *r0kh_list; 369 struct ft_remote_r1kh *r1kh_list; 370 int pmk_r1_push; 371 int ft_over_ds; 372 int ft_psk_generate_local; 373 int r1_max_key_lifetime; 374 #endif /* CONFIG_IEEE80211R_AP */ 375 376 char *ctrl_interface; /* directory for UNIX domain sockets */ 377 #ifndef CONFIG_NATIVE_WINDOWS 378 gid_t ctrl_interface_gid; 379 #endif /* CONFIG_NATIVE_WINDOWS */ 380 int ctrl_interface_gid_set; 381 382 char *ca_cert; 383 char *server_cert; 384 char *private_key; 385 char *private_key_passwd; 386 int check_crl; 387 unsigned int tls_session_lifetime; 388 unsigned int tls_flags; 389 char *ocsp_stapling_response; 390 char *ocsp_stapling_response_multi; 391 char *dh_file; 392 char *openssl_ciphers; 393 u8 *pac_opaque_encr_key; 394 u8 *eap_fast_a_id; 395 size_t eap_fast_a_id_len; 396 char *eap_fast_a_id_info; 397 int eap_fast_prov; 398 int pac_key_lifetime; 399 int pac_key_refresh_time; 400 int eap_sim_aka_result_ind; 401 int tnc; 402 int fragment_size; 403 u16 pwd_group; 404 405 char *radius_server_clients; 406 int radius_server_auth_port; 407 int radius_server_acct_port; 408 int radius_server_ipv6; 409 410 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 411 * address instead of individual address 412 * (for driver_wired.c). 413 */ 414 415 int ap_max_inactivity; 416 int ignore_broadcast_ssid; 417 int no_probe_resp_if_max_sta; 418 419 int wmm_enabled; 420 int wmm_uapsd; 421 422 struct hostapd_vlan *vlan; 423 424 macaddr bssid; 425 426 /* 427 * Maximum listen interval that STAs can use when associating with this 428 * BSS. If a STA tries to use larger value, the association will be 429 * denied with status code 51. 430 */ 431 u16 max_listen_interval; 432 433 int disable_pmksa_caching; 434 int okc; /* Opportunistic Key Caching */ 435 436 int wps_state; 437 #ifdef CONFIG_WPS 438 int wps_independent; 439 int ap_setup_locked; 440 u8 uuid[16]; 441 char *wps_pin_requests; 442 char *device_name; 443 char *manufacturer; 444 char *model_name; 445 char *model_number; 446 char *serial_number; 447 u8 device_type[WPS_DEV_TYPE_LEN]; 448 char *config_methods; 449 u8 os_version[4]; 450 char *ap_pin; 451 int skip_cred_build; 452 u8 *extra_cred; 453 size_t extra_cred_len; 454 int wps_cred_processing; 455 int force_per_enrollee_psk; 456 u8 *ap_settings; 457 size_t ap_settings_len; 458 char *upnp_iface; 459 char *friendly_name; 460 char *manufacturer_url; 461 char *model_description; 462 char *model_url; 463 char *upc; 464 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 465 int wps_nfc_pw_from_config; 466 int wps_nfc_dev_pw_id; 467 struct wpabuf *wps_nfc_dh_pubkey; 468 struct wpabuf *wps_nfc_dh_privkey; 469 struct wpabuf *wps_nfc_dev_pw; 470 #endif /* CONFIG_WPS */ 471 int pbc_in_m1; 472 char *server_id; 473 474 #define P2P_ENABLED BIT(0) 475 #define P2P_GROUP_OWNER BIT(1) 476 #define P2P_GROUP_FORMATION BIT(2) 477 #define P2P_MANAGE BIT(3) 478 #define P2P_ALLOW_CROSS_CONNECTION BIT(4) 479 int p2p; 480 #ifdef CONFIG_P2P 481 u8 ip_addr_go[4]; 482 u8 ip_addr_mask[4]; 483 u8 ip_addr_start[4]; 484 u8 ip_addr_end[4]; 485 #endif /* CONFIG_P2P */ 486 487 int disassoc_low_ack; 488 int skip_inactivity_poll; 489 490 #define TDLS_PROHIBIT BIT(0) 491 #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 492 int tdls; 493 int disable_11n; 494 int disable_11ac; 495 496 /* IEEE 802.11v */ 497 int time_advertisement; 498 char *time_zone; 499 int wnm_sleep_mode; 500 int wnm_sleep_mode_no_keys; 501 int bss_transition; 502 503 /* IEEE 802.11u - Interworking */ 504 int interworking; 505 int access_network_type; 506 int internet; 507 int asra; 508 int esr; 509 int uesa; 510 int venue_info_set; 511 u8 venue_group; 512 u8 venue_type; 513 u8 hessid[ETH_ALEN]; 514 515 /* IEEE 802.11u - Roaming Consortium list */ 516 unsigned int roaming_consortium_count; 517 struct hostapd_roaming_consortium *roaming_consortium; 518 519 /* IEEE 802.11u - Venue Name duples */ 520 unsigned int venue_name_count; 521 struct hostapd_lang_string *venue_name; 522 523 /* Venue URL duples */ 524 unsigned int venue_url_count; 525 struct hostapd_venue_url *venue_url; 526 527 /* IEEE 802.11u - Network Authentication Type */ 528 u8 *network_auth_type; 529 size_t network_auth_type_len; 530 531 /* IEEE 802.11u - IP Address Type Availability */ 532 u8 ipaddr_type_availability; 533 u8 ipaddr_type_configured; 534 535 /* IEEE 802.11u - 3GPP Cellular Network */ 536 u8 *anqp_3gpp_cell_net; 537 size_t anqp_3gpp_cell_net_len; 538 539 /* IEEE 802.11u - Domain Name */ 540 u8 *domain_name; 541 size_t domain_name_len; 542 543 unsigned int nai_realm_count; 544 struct hostapd_nai_realm_data *nai_realm_data; 545 546 struct dl_list anqp_elem; /* list of struct anqp_element */ 547 548 u16 gas_comeback_delay; 549 size_t gas_frag_limit; 550 int gas_address3; 551 552 u8 qos_map_set[16 + 2 * 21]; 553 unsigned int qos_map_set_len; 554 555 int osen; 556 int proxy_arp; 557 int na_mcast_to_ucast; 558 #ifdef CONFIG_HS20 559 int hs20; 560 int disable_dgaf; 561 u16 anqp_domain_id; 562 unsigned int hs20_oper_friendly_name_count; 563 struct hostapd_lang_string *hs20_oper_friendly_name; 564 u8 *hs20_wan_metrics; 565 u8 *hs20_connection_capability; 566 size_t hs20_connection_capability_len; 567 u8 *hs20_operating_class; 568 u8 hs20_operating_class_len; 569 struct hs20_icon { 570 u16 width; 571 u16 height; 572 char language[3]; 573 char type[256]; 574 char name[256]; 575 char file[256]; 576 } *hs20_icons; 577 size_t hs20_icons_count; 578 u8 osu_ssid[SSID_MAX_LEN]; 579 size_t osu_ssid_len; 580 struct hs20_osu_provider { 581 unsigned int friendly_name_count; 582 struct hostapd_lang_string *friendly_name; 583 char *server_uri; 584 int *method_list; 585 char **icons; 586 size_t icons_count; 587 char *osu_nai; 588 char *osu_nai2; 589 unsigned int service_desc_count; 590 struct hostapd_lang_string *service_desc; 591 } *hs20_osu_providers, *last_osu; 592 size_t hs20_osu_providers_count; 593 size_t hs20_osu_providers_nai_count; 594 char **hs20_operator_icon; 595 size_t hs20_operator_icon_count; 596 unsigned int hs20_deauth_req_timeout; 597 char *subscr_remediation_url; 598 u8 subscr_remediation_method; 599 char *t_c_filename; 600 u32 t_c_timestamp; 601 char *t_c_server_url; 602 #endif /* CONFIG_HS20 */ 603 604 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 605 606 #ifdef CONFIG_RADIUS_TEST 607 char *dump_msk_file; 608 #endif /* CONFIG_RADIUS_TEST */ 609 610 struct wpabuf *vendor_elements; 611 struct wpabuf *assocresp_elements; 612 613 unsigned int sae_anti_clogging_threshold; 614 unsigned int sae_sync; 615 int sae_require_mfp; 616 int *sae_groups; 617 struct sae_password_entry *sae_passwords; 618 619 char *wowlan_triggers; /* Wake-on-WLAN triggers */ 620 621 #ifdef CONFIG_TESTING_OPTIONS 622 u8 bss_load_test[5]; 623 u8 bss_load_test_set; 624 struct wpabuf *own_ie_override; 625 int sae_reflection_attack; 626 struct wpabuf *sae_commit_override; 627 #endif /* CONFIG_TESTING_OPTIONS */ 628 629 #define MESH_ENABLED BIT(0) 630 int mesh; 631 632 u8 radio_measurements[RRM_CAPABILITIES_IE_LEN]; 633 634 int vendor_vht; 635 int use_sta_nsts; 636 637 char *no_probe_resp_if_seen_on; 638 char *no_auth_if_seen_on; 639 640 int pbss; 641 642 #ifdef CONFIG_MBO 643 int mbo_enabled; 644 /** 645 * oce - Enable OCE in AP and/or STA-CFON mode 646 * - BIT(0) is Reserved 647 * - Set BIT(1) to enable OCE in STA-CFON mode 648 * - Set BIT(2) to enable OCE in AP mode 649 */ 650 unsigned int oce; 651 int mbo_cell_data_conn_pref; 652 #endif /* CONFIG_MBO */ 653 654 int ftm_responder; 655 int ftm_initiator; 656 657 #ifdef CONFIG_FILS 658 u8 fils_cache_id[FILS_CACHE_ID_LEN]; 659 int fils_cache_id_set; 660 struct dl_list fils_realms; /* list of struct fils_realm */ 661 int fils_dh_group; 662 struct hostapd_ip_addr dhcp_server; 663 int dhcp_rapid_commit_proxy; 664 unsigned int fils_hlp_wait_time; 665 u16 dhcp_server_port; 666 u16 dhcp_relay_port; 667 #endif /* CONFIG_FILS */ 668 669 int multicast_to_unicast; 670 671 int broadcast_deauth; 672 673 #ifdef CONFIG_DPP 674 char *dpp_connector; 675 struct wpabuf *dpp_netaccesskey; 676 unsigned int dpp_netaccesskey_expiry; 677 struct wpabuf *dpp_csign; 678 #endif /* CONFIG_DPP */ 679 680 #ifdef CONFIG_OWE 681 macaddr owe_transition_bssid; 682 u8 owe_transition_ssid[SSID_MAX_LEN]; 683 size_t owe_transition_ssid_len; 684 char owe_transition_ifname[IFNAMSIZ + 1]; 685 int *owe_groups; 686 #endif /* CONFIG_OWE */ 687 688 int coloc_intf_reporting; 689 }; 690 691 /** 692 * struct he_phy_capabilities_info - HE PHY capabilities 693 */ 694 struct he_phy_capabilities_info { 695 Boolean he_su_beamformer; 696 Boolean he_su_beamformee; 697 Boolean he_mu_beamformer; 698 }; 699 700 /** 701 * struct he_operation - HE operation 702 */ 703 struct he_operation { 704 u8 he_bss_color; 705 u8 he_default_pe_duration; 706 u8 he_twt_required; 707 u8 he_rts_threshold; 708 }; 709 710 /** 711 * struct hostapd_config - Per-radio interface configuration 712 */ 713 struct hostapd_config { 714 struct hostapd_bss_config **bss, *last_bss; 715 size_t num_bss; 716 717 u16 beacon_int; 718 int rts_threshold; 719 int fragm_threshold; 720 u8 send_probe_response; 721 u8 channel; 722 u8 acs; 723 struct wpa_freq_range_list acs_ch_list; 724 int acs_exclude_dfs; 725 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 726 enum { 727 LONG_PREAMBLE = 0, 728 SHORT_PREAMBLE = 1 729 } preamble; 730 731 int *supported_rates; 732 int *basic_rates; 733 unsigned int beacon_rate; 734 enum beacon_rate_type rate_type; 735 736 const struct wpa_driver_ops *driver; 737 char *driver_params; 738 739 int ap_table_max_size; 740 int ap_table_expiration_time; 741 742 unsigned int track_sta_max_num; 743 unsigned int track_sta_max_age; 744 745 char country[3]; /* first two octets: country code as described in 746 * ISO/IEC 3166-1. Third octet: 747 * ' ' (ascii 32): all environments 748 * 'O': Outdoor environemnt only 749 * 'I': Indoor environment only 750 * 'X': Used with noncountry entity ("XXX") 751 * 0x00..0x31: identifying IEEE 802.11 standard 752 * Annex E table (0x04 = global table) 753 */ 754 755 int ieee80211d; 756 757 int ieee80211h; /* DFS */ 758 759 /* 760 * Local power constraint is an octet encoded as an unsigned integer in 761 * units of decibels. Invalid value -1 indicates that Power Constraint 762 * element will not be added. 763 */ 764 int local_pwr_constraint; 765 766 /* Control Spectrum Management bit */ 767 int spectrum_mgmt_required; 768 769 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 770 771 /* 772 * WMM AC parameters, in same order as 802.1D, i.e. 773 * 0 = BE (best effort) 774 * 1 = BK (background) 775 * 2 = VI (video) 776 * 3 = VO (voice) 777 */ 778 struct hostapd_wmm_ac_params wmm_ac_params[4]; 779 780 int ht_op_mode_fixed; 781 u16 ht_capab; 782 int ieee80211n; 783 int secondary_channel; 784 int no_pri_sec_switch; 785 int require_ht; 786 int obss_interval; 787 u32 vht_capab; 788 int ieee80211ac; 789 int require_vht; 790 u8 vht_oper_chwidth; 791 u8 vht_oper_centr_freq_seg0_idx; 792 u8 vht_oper_centr_freq_seg1_idx; 793 u8 ht40_plus_minus_allowed; 794 795 /* Use driver-generated interface addresses when adding multiple BSSs */ 796 u8 use_driver_iface_addr; 797 798 #ifdef CONFIG_FST 799 struct fst_iface_cfg fst_cfg; 800 #endif /* CONFIG_FST */ 801 802 #ifdef CONFIG_P2P 803 u8 p2p_go_ctwindow; 804 #endif /* CONFIG_P2P */ 805 806 #ifdef CONFIG_TESTING_OPTIONS 807 double ignore_probe_probability; 808 double ignore_auth_probability; 809 double ignore_assoc_probability; 810 double ignore_reassoc_probability; 811 double corrupt_gtk_rekey_mic_probability; 812 int ecsa_ie_only; 813 #endif /* CONFIG_TESTING_OPTIONS */ 814 815 #ifdef CONFIG_ACS 816 unsigned int acs_num_scans; 817 struct acs_bias { 818 int channel; 819 double bias; 820 } *acs_chan_bias; 821 unsigned int num_acs_chan_bias; 822 #endif /* CONFIG_ACS */ 823 824 struct wpabuf *lci; 825 struct wpabuf *civic; 826 int stationary_ap; 827 828 int ieee80211ax; 829 #ifdef CONFIG_IEEE80211AX 830 struct he_phy_capabilities_info he_phy_capab; 831 struct he_operation he_op; 832 #endif /* CONFIG_IEEE80211AX */ 833 834 /* VHT enable/disable config from CHAN_SWITCH */ 835 #define CH_SWITCH_VHT_ENABLED BIT(0) 836 #define CH_SWITCH_VHT_DISABLED BIT(1) 837 unsigned int ch_switch_vht_config; 838 }; 839 840 841 int hostapd_mac_comp(const void *a, const void *b); 842 struct hostapd_config * hostapd_config_defaults(void); 843 void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 844 void hostapd_config_free_eap_user(struct hostapd_eap_user *user); 845 void hostapd_config_free_eap_users(struct hostapd_eap_user *user); 846 void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p); 847 void hostapd_config_free_bss(struct hostapd_bss_config *conf); 848 void hostapd_config_free(struct hostapd_config *conf); 849 int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 850 const u8 *addr, struct vlan_description *vlan_id); 851 int hostapd_rate_found(int *list, int rate); 852 const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 853 const u8 *addr, const u8 *p2p_dev_addr, 854 const u8 *prev_psk); 855 int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 856 int hostapd_vlan_valid(struct hostapd_vlan *vlan, 857 struct vlan_description *vlan_desc); 858 const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 859 int vlan_id); 860 struct hostapd_radius_attr * 861 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 862 int hostapd_config_check(struct hostapd_config *conf, int full_config); 863 void hostapd_set_security_params(struct hostapd_bss_config *bss, 864 int full_config); 865 866 #endif /* HOSTAPD_CONFIG_H */ 867