1 /* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #ifndef HOSTAPD_CONFIG_H 10 #define HOSTAPD_CONFIG_H 11 12 #include "common/defs.h" 13 #include "utils/list.h" 14 #include "ip_addr.h" 15 #include "common/wpa_common.h" 16 #include "common/ieee802_11_defs.h" 17 #include "common/ieee802_11_common.h" 18 #include "crypto/sha256.h" 19 #include "wps/wps.h" 20 #include "fst/fst.h" 21 #include "vlan.h" 22 23 /** 24 * mesh_conf - local MBSS state and settings 25 */ 26 struct mesh_conf { 27 u8 meshid[32]; 28 u8 meshid_len; 29 /* Active Path Selection Protocol Identifier */ 30 u8 mesh_pp_id; 31 /* Active Path Selection Metric Identifier */ 32 u8 mesh_pm_id; 33 /* Congestion Control Mode Identifier */ 34 u8 mesh_cc_id; 35 /* Synchronization Protocol Identifier */ 36 u8 mesh_sp_id; 37 /* Authentication Protocol Identifier */ 38 u8 mesh_auth_id; 39 u8 *rsn_ie; 40 int rsn_ie_len; 41 #define MESH_CONF_SEC_NONE BIT(0) 42 #define MESH_CONF_SEC_AUTH BIT(1) 43 #define MESH_CONF_SEC_AMPE BIT(2) 44 unsigned int security; 45 enum mfp_options ieee80211w; 46 int ocv; 47 unsigned int pairwise_cipher; 48 unsigned int group_cipher; 49 unsigned int mgmt_group_cipher; 50 int dot11MeshMaxRetries; 51 int dot11MeshRetryTimeout; /* msec */ 52 int dot11MeshConfirmTimeout; /* msec */ 53 int dot11MeshHoldingTimeout; /* msec */ 54 int mesh_fwding; 55 }; 56 57 #define MAX_STA_COUNT 2007 58 #define MAX_VLAN_ID 4094 59 60 typedef u8 macaddr[ETH_ALEN]; 61 62 struct mac_acl_entry { 63 macaddr addr; 64 struct vlan_description vlan_id; 65 }; 66 67 struct hostapd_radius_servers; 68 struct ft_remote_r0kh; 69 struct ft_remote_r1kh; 70 71 #ifdef CONFIG_WEP 72 #define NUM_WEP_KEYS 4 73 struct hostapd_wep_keys { 74 u8 idx; 75 u8 *key[NUM_WEP_KEYS]; 76 size_t len[NUM_WEP_KEYS]; 77 int keys_set; 78 size_t default_len; /* key length used for dynamic key generation */ 79 }; 80 #endif /* CONFIG_WEP */ 81 82 typedef enum hostap_security_policy { 83 SECURITY_PLAINTEXT = 0, 84 #ifdef CONFIG_WEP 85 SECURITY_STATIC_WEP = 1, 86 #endif /* CONFIG_WEP */ 87 SECURITY_IEEE_802_1X = 2, 88 SECURITY_WPA_PSK = 3, 89 SECURITY_WPA = 4, 90 SECURITY_OSEN = 5 91 } secpolicy; 92 93 struct hostapd_ssid { 94 u8 ssid[SSID_MAX_LEN]; 95 size_t ssid_len; 96 u32 short_ssid; 97 unsigned int ssid_set:1; 98 unsigned int utf8_ssid:1; 99 unsigned int wpa_passphrase_set:1; 100 unsigned int wpa_psk_set:1; 101 102 char vlan[IFNAMSIZ + 1]; 103 secpolicy security_policy; 104 105 struct hostapd_wpa_psk *wpa_psk; 106 char *wpa_passphrase; 107 char *wpa_psk_file; 108 struct sae_pt *pt; 109 110 #ifdef CONFIG_WEP 111 struct hostapd_wep_keys wep; 112 #endif /* CONFIG_WEP */ 113 114 #define DYNAMIC_VLAN_DISABLED 0 115 #define DYNAMIC_VLAN_OPTIONAL 1 116 #define DYNAMIC_VLAN_REQUIRED 2 117 int dynamic_vlan; 118 #define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 119 #define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 120 #define DYNAMIC_VLAN_NAMING_END 2 121 int vlan_naming; 122 int per_sta_vif; 123 #ifdef CONFIG_FULL_DYNAMIC_VLAN 124 char *vlan_tagged_interface; 125 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 126 }; 127 128 129 #define VLAN_ID_WILDCARD -1 130 131 struct hostapd_vlan { 132 struct hostapd_vlan *next; 133 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 134 struct vlan_description vlan_desc; 135 char ifname[IFNAMSIZ + 1]; 136 char bridge[IFNAMSIZ + 1]; 137 int configured; 138 int dynamic_vlan; 139 #ifdef CONFIG_FULL_DYNAMIC_VLAN 140 141 #define DVLAN_CLEAN_WLAN_PORT 0x8 142 int clean; 143 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 144 }; 145 146 #define PMK_LEN 32 147 #define KEYID_LEN 32 148 #define MIN_PASSPHRASE_LEN 8 149 #define MAX_PASSPHRASE_LEN 63 150 struct hostapd_sta_wpa_psk_short { 151 struct hostapd_sta_wpa_psk_short *next; 152 unsigned int is_passphrase:1; 153 u8 psk[PMK_LEN]; 154 char passphrase[MAX_PASSPHRASE_LEN + 1]; 155 int ref; /* (number of references held) - 1 */ 156 }; 157 158 struct hostapd_wpa_psk { 159 struct hostapd_wpa_psk *next; 160 int group; 161 char keyid[KEYID_LEN]; 162 int wps; 163 u8 psk[PMK_LEN]; 164 u8 addr[ETH_ALEN]; 165 u8 p2p_dev_addr[ETH_ALEN]; 166 int vlan_id; 167 }; 168 169 struct hostapd_eap_user { 170 struct hostapd_eap_user *next; 171 u8 *identity; 172 size_t identity_len; 173 struct { 174 int vendor; 175 u32 method; 176 } methods[EAP_MAX_METHODS]; 177 u8 *password; 178 size_t password_len; 179 u8 *salt; 180 size_t salt_len; /* non-zero when password is salted */ 181 int phase2; 182 int force_version; 183 unsigned int wildcard_prefix:1; 184 unsigned int password_hash:1; /* whether password is hashed with 185 * nt_password_hash() */ 186 unsigned int remediation:1; 187 unsigned int macacl:1; 188 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 189 struct hostapd_radius_attr *accept_attr; 190 u32 t_c_timestamp; 191 }; 192 193 struct hostapd_radius_attr { 194 u8 type; 195 struct wpabuf *val; 196 struct hostapd_radius_attr *next; 197 }; 198 199 200 #define NUM_TX_QUEUES 4 201 #define MAX_ROAMING_CONSORTIUM_LEN 15 202 203 struct hostapd_roaming_consortium { 204 u8 len; 205 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 206 }; 207 208 struct hostapd_lang_string { 209 u8 lang[3]; 210 u8 name_len; 211 u8 name[252]; 212 }; 213 214 struct hostapd_venue_url { 215 u8 venue_number; 216 u8 url_len; 217 u8 url[254]; 218 }; 219 220 #define MAX_NAI_REALMS 10 221 #define MAX_NAI_REALMLEN 255 222 #define MAX_NAI_EAP_METHODS 5 223 #define MAX_NAI_AUTH_TYPES 4 224 struct hostapd_nai_realm_data { 225 u8 encoding; 226 char realm_buf[MAX_NAI_REALMLEN + 1]; 227 char *realm[MAX_NAI_REALMS]; 228 u8 eap_method_count; 229 struct hostapd_nai_realm_eap { 230 u8 eap_method; 231 u8 num_auths; 232 u8 auth_id[MAX_NAI_AUTH_TYPES]; 233 u8 auth_val[MAX_NAI_AUTH_TYPES]; 234 } eap_method[MAX_NAI_EAP_METHODS]; 235 }; 236 237 struct anqp_element { 238 struct dl_list list; 239 u16 infoid; 240 struct wpabuf *payload; 241 }; 242 243 struct fils_realm { 244 struct dl_list list; 245 u8 hash[2]; 246 char realm[]; 247 }; 248 249 struct sae_password_entry { 250 struct sae_password_entry *next; 251 char *password; 252 char *identifier; 253 u8 peer_addr[ETH_ALEN]; 254 int vlan_id; 255 struct sae_pt *pt; 256 struct sae_pk *pk; 257 }; 258 259 struct dpp_controller_conf { 260 struct dpp_controller_conf *next; 261 u8 pkhash[SHA256_MAC_LEN]; 262 struct hostapd_ip_addr ipaddr; 263 }; 264 265 struct airtime_sta_weight { 266 struct airtime_sta_weight *next; 267 unsigned int weight; 268 u8 addr[ETH_ALEN]; 269 }; 270 271 #define EXT_CAPA_MAX_LEN 15 272 273 /** 274 * struct hostapd_bss_config - Per-BSS configuration 275 */ 276 struct hostapd_bss_config { 277 char iface[IFNAMSIZ + 1]; 278 char bridge[IFNAMSIZ + 1]; 279 char vlan_bridge[IFNAMSIZ + 1]; 280 char wds_bridge[IFNAMSIZ + 1]; 281 282 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 283 284 unsigned int logger_syslog; /* module bitfield */ 285 unsigned int logger_stdout; /* module bitfield */ 286 287 int max_num_sta; /* maximum number of STAs in station table */ 288 289 int dtim_period; 290 unsigned int bss_load_update_period; 291 unsigned int chan_util_avg_period; 292 293 int ieee802_1x; /* use IEEE 802.1X */ 294 int eapol_version; 295 int eap_server; /* Use internal EAP server instead of external 296 * RADIUS server */ 297 struct hostapd_eap_user *eap_user; 298 char *eap_user_sqlite; 299 char *eap_sim_db; 300 unsigned int eap_sim_db_timeout; 301 int eap_server_erp; /* Whether ERP is enabled on internal EAP server */ 302 struct hostapd_ip_addr own_ip_addr; 303 char *nas_identifier; 304 struct hostapd_radius_servers *radius; 305 int acct_interim_interval; 306 int radius_request_cui; 307 struct hostapd_radius_attr *radius_auth_req_attr; 308 struct hostapd_radius_attr *radius_acct_req_attr; 309 char *radius_req_attr_sqlite; 310 int radius_das_port; 311 unsigned int radius_das_time_window; 312 int radius_das_require_event_timestamp; 313 int radius_das_require_message_authenticator; 314 struct hostapd_ip_addr radius_das_client_addr; 315 u8 *radius_das_shared_secret; 316 size_t radius_das_shared_secret_len; 317 318 struct hostapd_ssid ssid; 319 320 char *eap_req_id_text; /* optional displayable message sent with 321 * EAP Request-Identity */ 322 size_t eap_req_id_text_len; 323 int eapol_key_index_workaround; 324 325 #ifdef CONFIG_WEP 326 size_t default_wep_key_len; 327 int individual_wep_key_len; 328 int wep_rekeying_period; 329 int broadcast_key_idx_min, broadcast_key_idx_max; 330 #endif /* CONFIG_WEP */ 331 int eap_reauth_period; 332 int erp_send_reauth_start; 333 char *erp_domain; 334 335 enum macaddr_acl { 336 ACCEPT_UNLESS_DENIED = 0, 337 DENY_UNLESS_ACCEPTED = 1, 338 USE_EXTERNAL_RADIUS_AUTH = 2 339 } macaddr_acl; 340 struct mac_acl_entry *accept_mac; 341 int num_accept_mac; 342 struct mac_acl_entry *deny_mac; 343 int num_deny_mac; 344 int wds_sta; 345 int isolate; 346 int start_disabled; 347 348 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 349 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 350 351 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 352 int extended_key_id; 353 int wpa_key_mgmt; 354 enum mfp_options ieee80211w; 355 int group_mgmt_cipher; 356 int beacon_prot; 357 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 358 unsigned int assoc_sa_query_max_timeout; 359 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 360 int assoc_sa_query_retry_timeout; 361 #ifdef CONFIG_OCV 362 int ocv; /* Operating Channel Validation */ 363 #endif /* CONFIG_OCV */ 364 enum { 365 PSK_RADIUS_IGNORED = 0, 366 PSK_RADIUS_ACCEPTED = 1, 367 PSK_RADIUS_REQUIRED = 2 368 } wpa_psk_radius; 369 int wpa_pairwise; 370 int group_cipher; /* wpa_group value override from configuation */ 371 int wpa_group; 372 int wpa_group_rekey; 373 int wpa_group_rekey_set; 374 int wpa_strict_rekey; 375 int wpa_gmk_rekey; 376 int wpa_ptk_rekey; 377 enum ptk0_rekey_handling wpa_deny_ptk0_rekey; 378 u32 wpa_group_update_count; 379 u32 wpa_pairwise_update_count; 380 int wpa_disable_eapol_key_retries; 381 int rsn_pairwise; 382 int rsn_preauth; 383 char *rsn_preauth_interfaces; 384 385 #ifdef CONFIG_IEEE80211R_AP 386 /* IEEE 802.11r - Fast BSS Transition */ 387 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 388 u8 r1_key_holder[FT_R1KH_ID_LEN]; 389 u32 r0_key_lifetime; /* PMK-R0 lifetime seconds */ 390 int rkh_pos_timeout; 391 int rkh_neg_timeout; 392 int rkh_pull_timeout; /* ms */ 393 int rkh_pull_retries; 394 u32 reassociation_deadline; 395 struct ft_remote_r0kh *r0kh_list; 396 struct ft_remote_r1kh *r1kh_list; 397 int pmk_r1_push; 398 int ft_over_ds; 399 int ft_psk_generate_local; 400 int r1_max_key_lifetime; 401 #endif /* CONFIG_IEEE80211R_AP */ 402 403 char *ctrl_interface; /* directory for UNIX domain sockets */ 404 #ifndef CONFIG_NATIVE_WINDOWS 405 gid_t ctrl_interface_gid; 406 #endif /* CONFIG_NATIVE_WINDOWS */ 407 int ctrl_interface_gid_set; 408 409 char *ca_cert; 410 char *server_cert; 411 char *server_cert2; 412 char *private_key; 413 char *private_key2; 414 char *private_key_passwd; 415 char *private_key_passwd2; 416 char *check_cert_subject; 417 int check_crl; 418 int check_crl_strict; 419 unsigned int crl_reload_interval; 420 unsigned int tls_session_lifetime; 421 unsigned int tls_flags; 422 unsigned int max_auth_rounds; 423 unsigned int max_auth_rounds_short; 424 char *ocsp_stapling_response; 425 char *ocsp_stapling_response_multi; 426 char *dh_file; 427 char *openssl_ciphers; 428 char *openssl_ecdh_curves; 429 u8 *pac_opaque_encr_key; 430 u8 *eap_fast_a_id; 431 size_t eap_fast_a_id_len; 432 char *eap_fast_a_id_info; 433 int eap_fast_prov; 434 int pac_key_lifetime; 435 int pac_key_refresh_time; 436 int eap_teap_auth; 437 int eap_teap_pac_no_inner; 438 int eap_teap_separate_result; 439 int eap_teap_id; 440 int eap_sim_aka_result_ind; 441 int eap_sim_id; 442 int tnc; 443 int fragment_size; 444 u16 pwd_group; 445 446 char *radius_server_clients; 447 int radius_server_auth_port; 448 int radius_server_acct_port; 449 int radius_server_ipv6; 450 451 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 452 * address instead of individual address 453 * (for driver_wired.c). 454 */ 455 456 int ap_max_inactivity; 457 int ignore_broadcast_ssid; 458 int no_probe_resp_if_max_sta; 459 460 int wmm_enabled; 461 int wmm_uapsd; 462 463 struct hostapd_vlan *vlan; 464 465 macaddr bssid; 466 467 /* 468 * Maximum listen interval that STAs can use when associating with this 469 * BSS. If a STA tries to use larger value, the association will be 470 * denied with status code 51. 471 */ 472 u16 max_listen_interval; 473 474 int disable_pmksa_caching; 475 int okc; /* Opportunistic Key Caching */ 476 477 int wps_state; 478 #ifdef CONFIG_WPS 479 int wps_independent; 480 int ap_setup_locked; 481 u8 uuid[16]; 482 char *wps_pin_requests; 483 char *device_name; 484 char *manufacturer; 485 char *model_name; 486 char *model_number; 487 char *serial_number; 488 u8 device_type[WPS_DEV_TYPE_LEN]; 489 char *config_methods; 490 u8 os_version[4]; 491 char *ap_pin; 492 int skip_cred_build; 493 u8 *extra_cred; 494 size_t extra_cred_len; 495 int wps_cred_processing; 496 int wps_cred_add_sae; 497 int force_per_enrollee_psk; 498 u8 *ap_settings; 499 size_t ap_settings_len; 500 struct hostapd_ssid multi_ap_backhaul_ssid; 501 char *upnp_iface; 502 char *friendly_name; 503 char *manufacturer_url; 504 char *model_description; 505 char *model_url; 506 char *upc; 507 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 508 struct wpabuf *wps_application_ext; 509 int wps_nfc_pw_from_config; 510 int wps_nfc_dev_pw_id; 511 struct wpabuf *wps_nfc_dh_pubkey; 512 struct wpabuf *wps_nfc_dh_privkey; 513 struct wpabuf *wps_nfc_dev_pw; 514 #endif /* CONFIG_WPS */ 515 int pbc_in_m1; 516 char *server_id; 517 518 #define P2P_ENABLED BIT(0) 519 #define P2P_GROUP_OWNER BIT(1) 520 #define P2P_GROUP_FORMATION BIT(2) 521 #define P2P_MANAGE BIT(3) 522 #define P2P_ALLOW_CROSS_CONNECTION BIT(4) 523 int p2p; 524 #ifdef CONFIG_P2P 525 u8 ip_addr_go[4]; 526 u8 ip_addr_mask[4]; 527 u8 ip_addr_start[4]; 528 u8 ip_addr_end[4]; 529 #endif /* CONFIG_P2P */ 530 531 int disassoc_low_ack; 532 int skip_inactivity_poll; 533 534 #define TDLS_PROHIBIT BIT(0) 535 #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 536 int tdls; 537 bool disable_11n; 538 bool disable_11ac; 539 bool disable_11ax; 540 541 /* IEEE 802.11v */ 542 int time_advertisement; 543 char *time_zone; 544 int wnm_sleep_mode; 545 int wnm_sleep_mode_no_keys; 546 int bss_transition; 547 548 /* IEEE 802.11u - Interworking */ 549 int interworking; 550 int access_network_type; 551 int internet; 552 int asra; 553 int esr; 554 int uesa; 555 int venue_info_set; 556 u8 venue_group; 557 u8 venue_type; 558 u8 hessid[ETH_ALEN]; 559 560 /* IEEE 802.11u - Roaming Consortium list */ 561 unsigned int roaming_consortium_count; 562 struct hostapd_roaming_consortium *roaming_consortium; 563 564 /* IEEE 802.11u - Venue Name duples */ 565 unsigned int venue_name_count; 566 struct hostapd_lang_string *venue_name; 567 568 /* Venue URL duples */ 569 unsigned int venue_url_count; 570 struct hostapd_venue_url *venue_url; 571 572 /* IEEE 802.11u - Network Authentication Type */ 573 u8 *network_auth_type; 574 size_t network_auth_type_len; 575 576 /* IEEE 802.11u - IP Address Type Availability */ 577 u8 ipaddr_type_availability; 578 u8 ipaddr_type_configured; 579 580 /* IEEE 802.11u - 3GPP Cellular Network */ 581 u8 *anqp_3gpp_cell_net; 582 size_t anqp_3gpp_cell_net_len; 583 584 /* IEEE 802.11u - Domain Name */ 585 u8 *domain_name; 586 size_t domain_name_len; 587 588 unsigned int nai_realm_count; 589 struct hostapd_nai_realm_data *nai_realm_data; 590 591 struct dl_list anqp_elem; /* list of struct anqp_element */ 592 593 u16 gas_comeback_delay; 594 size_t gas_frag_limit; 595 int gas_address3; 596 597 u8 qos_map_set[16 + 2 * 21]; 598 unsigned int qos_map_set_len; 599 600 int osen; 601 int proxy_arp; 602 int na_mcast_to_ucast; 603 604 #ifdef CONFIG_HS20 605 int hs20; 606 int hs20_release; 607 int disable_dgaf; 608 u16 anqp_domain_id; 609 unsigned int hs20_oper_friendly_name_count; 610 struct hostapd_lang_string *hs20_oper_friendly_name; 611 u8 *hs20_wan_metrics; 612 u8 *hs20_connection_capability; 613 size_t hs20_connection_capability_len; 614 u8 *hs20_operating_class; 615 u8 hs20_operating_class_len; 616 struct hs20_icon { 617 u16 width; 618 u16 height; 619 char language[3]; 620 char type[256]; 621 char name[256]; 622 char file[256]; 623 } *hs20_icons; 624 size_t hs20_icons_count; 625 u8 osu_ssid[SSID_MAX_LEN]; 626 size_t osu_ssid_len; 627 struct hs20_osu_provider { 628 unsigned int friendly_name_count; 629 struct hostapd_lang_string *friendly_name; 630 char *server_uri; 631 int *method_list; 632 char **icons; 633 size_t icons_count; 634 char *osu_nai; 635 char *osu_nai2; 636 unsigned int service_desc_count; 637 struct hostapd_lang_string *service_desc; 638 } *hs20_osu_providers, *last_osu; 639 size_t hs20_osu_providers_count; 640 size_t hs20_osu_providers_nai_count; 641 char **hs20_operator_icon; 642 size_t hs20_operator_icon_count; 643 unsigned int hs20_deauth_req_timeout; 644 char *subscr_remediation_url; 645 u8 subscr_remediation_method; 646 char *hs20_sim_provisioning_url; 647 char *t_c_filename; 648 u32 t_c_timestamp; 649 char *t_c_server_url; 650 #endif /* CONFIG_HS20 */ 651 652 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 653 654 #ifdef CONFIG_RADIUS_TEST 655 char *dump_msk_file; 656 #endif /* CONFIG_RADIUS_TEST */ 657 658 struct wpabuf *vendor_elements; 659 struct wpabuf *assocresp_elements; 660 661 unsigned int anti_clogging_threshold; 662 unsigned int sae_sync; 663 int sae_require_mfp; 664 int sae_confirm_immediate; 665 int sae_pwe; 666 int *sae_groups; 667 struct sae_password_entry *sae_passwords; 668 669 char *wowlan_triggers; /* Wake-on-WLAN triggers */ 670 671 #ifdef CONFIG_TESTING_OPTIONS 672 u8 bss_load_test[5]; 673 u8 bss_load_test_set; 674 struct wpabuf *own_ie_override; 675 int sae_reflection_attack; 676 int sae_commit_status; 677 int sae_pk_omit; 678 int sae_pk_password_check_skip; 679 struct wpabuf *sae_commit_override; 680 struct wpabuf *rsne_override_eapol; 681 struct wpabuf *rsnxe_override_eapol; 682 struct wpabuf *rsne_override_ft; 683 struct wpabuf *rsnxe_override_ft; 684 struct wpabuf *gtk_rsc_override; 685 struct wpabuf *igtk_rsc_override; 686 int no_beacon_rsnxe; 687 int skip_prune_assoc; 688 int ft_rsnxe_used; 689 unsigned int oci_freq_override_eapol_m3; 690 unsigned int oci_freq_override_eapol_g1; 691 unsigned int oci_freq_override_saquery_req; 692 unsigned int oci_freq_override_saquery_resp; 693 unsigned int oci_freq_override_ft_assoc; 694 unsigned int oci_freq_override_fils_assoc; 695 unsigned int oci_freq_override_wnm_sleep; 696 #endif /* CONFIG_TESTING_OPTIONS */ 697 698 #define MESH_ENABLED BIT(0) 699 int mesh; 700 int mesh_fwding; 701 702 u8 radio_measurements[RRM_CAPABILITIES_IE_LEN]; 703 704 int vendor_vht; 705 int use_sta_nsts; 706 707 char *no_probe_resp_if_seen_on; 708 char *no_auth_if_seen_on; 709 710 int pbss; 711 712 #ifdef CONFIG_MBO 713 int mbo_enabled; 714 /** 715 * oce - Enable OCE in AP and/or STA-CFON mode 716 * - BIT(0) is Reserved 717 * - Set BIT(1) to enable OCE in STA-CFON mode 718 * - Set BIT(2) to enable OCE in AP mode 719 */ 720 unsigned int oce; 721 int mbo_cell_data_conn_pref; 722 #endif /* CONFIG_MBO */ 723 724 int ftm_responder; 725 int ftm_initiator; 726 727 #ifdef CONFIG_FILS 728 u8 fils_cache_id[FILS_CACHE_ID_LEN]; 729 int fils_cache_id_set; 730 struct dl_list fils_realms; /* list of struct fils_realm */ 731 int fils_dh_group; 732 struct hostapd_ip_addr dhcp_server; 733 int dhcp_rapid_commit_proxy; 734 unsigned int fils_hlp_wait_time; 735 u16 dhcp_server_port; 736 u16 dhcp_relay_port; 737 u32 fils_discovery_min_int; 738 u32 fils_discovery_max_int; 739 #endif /* CONFIG_FILS */ 740 741 int multicast_to_unicast; 742 743 int broadcast_deauth; 744 745 int notify_mgmt_frames; 746 747 #ifdef CONFIG_DPP 748 char *dpp_name; 749 char *dpp_mud_url; 750 char *dpp_connector; 751 struct wpabuf *dpp_netaccesskey; 752 unsigned int dpp_netaccesskey_expiry; 753 struct wpabuf *dpp_csign; 754 #ifdef CONFIG_DPP2 755 struct dpp_controller_conf *dpp_controller; 756 int dpp_configurator_connectivity; 757 int dpp_pfs; 758 #endif /* CONFIG_DPP2 */ 759 #endif /* CONFIG_DPP */ 760 761 #ifdef CONFIG_OWE 762 macaddr owe_transition_bssid; 763 u8 owe_transition_ssid[SSID_MAX_LEN]; 764 size_t owe_transition_ssid_len; 765 char owe_transition_ifname[IFNAMSIZ + 1]; 766 int *owe_groups; 767 int owe_ptk_workaround; 768 #endif /* CONFIG_OWE */ 769 770 int coloc_intf_reporting; 771 772 u8 send_probe_response; 773 774 u8 transition_disable; 775 776 #define BACKHAUL_BSS 1 777 #define FRONTHAUL_BSS 2 778 int multi_ap; /* bitmap of BACKHAUL_BSS, FRONTHAUL_BSS */ 779 780 #ifdef CONFIG_AIRTIME_POLICY 781 unsigned int airtime_weight; 782 int airtime_limit; 783 struct airtime_sta_weight *airtime_weight_list; 784 #endif /* CONFIG_AIRTIME_POLICY */ 785 786 #ifdef CONFIG_MACSEC 787 /** 788 * macsec_policy - Determines the policy for MACsec secure session 789 * 790 * 0: MACsec not in use (default) 791 * 1: MACsec enabled - Should secure, accept key server's advice to 792 * determine whether to use a secure session or not. 793 */ 794 int macsec_policy; 795 796 /** 797 * macsec_integ_only - Determines how MACsec are transmitted 798 * 799 * This setting applies only when MACsec is in use, i.e., 800 * - macsec_policy is enabled 801 * - the key server has decided to enable MACsec 802 * 803 * 0: Encrypt traffic (default) 804 * 1: Integrity only 805 */ 806 int macsec_integ_only; 807 808 /** 809 * macsec_replay_protect - Enable MACsec replay protection 810 * 811 * This setting applies only when MACsec is in use, i.e., 812 * - macsec_policy is enabled 813 * - the key server has decided to enable MACsec 814 * 815 * 0: Replay protection disabled (default) 816 * 1: Replay protection enabled 817 */ 818 int macsec_replay_protect; 819 820 /** 821 * macsec_replay_window - MACsec replay protection window 822 * 823 * A window in which replay is tolerated, to allow receipt of frames 824 * that have been misordered by the network. 825 * 826 * This setting applies only when MACsec replay protection active, i.e., 827 * - macsec_replay_protect is enabled 828 * - the key server has decided to enable MACsec 829 * 830 * 0: No replay window, strict check (default) 831 * 1..2^32-1: number of packets that could be misordered 832 */ 833 u32 macsec_replay_window; 834 835 /** 836 * macsec_port - MACsec port (in SCI) 837 * 838 * Port component of the SCI. 839 * 840 * Range: 1-65534 (default: 1) 841 */ 842 int macsec_port; 843 844 /** 845 * mka_priority - Priority of MKA Actor 846 * 847 * Range: 0-255 (default: 255) 848 */ 849 int mka_priority; 850 851 /** 852 * mka_ckn - MKA pre-shared CKN 853 */ 854 #define MACSEC_CKN_MAX_LEN 32 855 size_t mka_ckn_len; 856 u8 mka_ckn[MACSEC_CKN_MAX_LEN]; 857 858 /** 859 * mka_cak - MKA pre-shared CAK 860 */ 861 #define MACSEC_CAK_MAX_LEN 32 862 size_t mka_cak_len; 863 u8 mka_cak[MACSEC_CAK_MAX_LEN]; 864 865 #define MKA_PSK_SET_CKN BIT(0) 866 #define MKA_PSK_SET_CAK BIT(1) 867 #define MKA_PSK_SET (MKA_PSK_SET_CKN | MKA_PSK_SET_CAK) 868 /** 869 * mka_psk_set - Whether mka_ckn and mka_cak are set 870 */ 871 u8 mka_psk_set; 872 #endif /* CONFIG_MACSEC */ 873 874 #ifdef CONFIG_PASN 875 #ifdef CONFIG_TESTING_OPTIONS 876 /* 877 * Normally, KDK should be derived if and only if both sides support 878 * secure LTF. Allow forcing KDK derivation for testing purposes. 879 */ 880 int force_kdk_derivation; 881 882 /* If set, corrupt the MIC in the 2nd Authentication frame of PASN */ 883 int pasn_corrupt_mic; 884 #endif /* CONFIG_TESTING_OPTIONS */ 885 886 int *pasn_groups; 887 888 /* 889 * The time in TUs after which the non-AP STA is requested to retry the 890 * PASN authentication in case there are too many parallel operations. 891 */ 892 u16 pasn_comeback_after; 893 #endif /* CONFIG_PASN */ 894 895 unsigned int unsol_bcast_probe_resp_interval; 896 897 u8 ext_capa_mask[EXT_CAPA_MAX_LEN]; 898 u8 ext_capa[EXT_CAPA_MAX_LEN]; 899 900 u8 rnr; 901 }; 902 903 /** 904 * struct he_phy_capabilities_info - HE PHY capabilities 905 */ 906 struct he_phy_capabilities_info { 907 bool he_su_beamformer; 908 bool he_su_beamformee; 909 bool he_mu_beamformer; 910 }; 911 912 /** 913 * struct he_operation - HE operation 914 */ 915 struct he_operation { 916 u8 he_bss_color; 917 u8 he_bss_color_disabled; 918 u8 he_bss_color_partial; 919 u8 he_default_pe_duration; 920 u8 he_twt_required; 921 u8 he_twt_responder; 922 u16 he_rts_threshold; 923 u8 he_er_su_disable; 924 u16 he_basic_mcs_nss_set; 925 }; 926 927 /** 928 * struct spatial_reuse - Spatial reuse 929 */ 930 struct spatial_reuse { 931 u8 sr_control; 932 u8 non_srg_obss_pd_max_offset; 933 u8 srg_obss_pd_min_offset; 934 u8 srg_obss_pd_max_offset; 935 u8 srg_bss_color_bitmap[8]; 936 u8 srg_partial_bssid_bitmap[8]; 937 }; 938 939 /** 940 * struct hostapd_config - Per-radio interface configuration 941 */ 942 struct hostapd_config { 943 struct hostapd_bss_config **bss, *last_bss; 944 size_t num_bss; 945 946 u16 beacon_int; 947 int rts_threshold; 948 int fragm_threshold; 949 u8 op_class; 950 u8 channel; 951 int enable_edmg; 952 u8 edmg_channel; 953 u8 acs; 954 struct wpa_freq_range_list acs_ch_list; 955 struct wpa_freq_range_list acs_freq_list; 956 u8 acs_freq_list_present; 957 int acs_exclude_dfs; 958 u8 min_tx_power; 959 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 960 int acs_exclude_6ghz_non_psc; 961 enum { 962 LONG_PREAMBLE = 0, 963 SHORT_PREAMBLE = 1 964 } preamble; 965 966 int *supported_rates; 967 int *basic_rates; 968 unsigned int beacon_rate; 969 enum beacon_rate_type rate_type; 970 971 const struct wpa_driver_ops *driver; 972 char *driver_params; 973 974 int ap_table_max_size; 975 int ap_table_expiration_time; 976 977 unsigned int track_sta_max_num; 978 unsigned int track_sta_max_age; 979 980 char country[3]; /* first two octets: country code as described in 981 * ISO/IEC 3166-1. Third octet: 982 * ' ' (ascii 32): all environments 983 * 'O': Outdoor environemnt only 984 * 'I': Indoor environment only 985 * 'X': Used with noncountry entity ("XXX") 986 * 0x00..0x31: identifying IEEE 802.11 standard 987 * Annex E table (0x04 = global table) 988 */ 989 990 int ieee80211d; 991 992 int ieee80211h; /* DFS */ 993 994 /* 995 * Local power constraint is an octet encoded as an unsigned integer in 996 * units of decibels. Invalid value -1 indicates that Power Constraint 997 * element will not be added. 998 */ 999 int local_pwr_constraint; 1000 1001 /* Control Spectrum Management bit */ 1002 int spectrum_mgmt_required; 1003 1004 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 1005 1006 /* 1007 * WMM AC parameters, in same order as 802.1D, i.e. 1008 * 0 = BE (best effort) 1009 * 1 = BK (background) 1010 * 2 = VI (video) 1011 * 3 = VO (voice) 1012 */ 1013 struct hostapd_wmm_ac_params wmm_ac_params[4]; 1014 1015 int ht_op_mode_fixed; 1016 u16 ht_capab; 1017 int ieee80211n; 1018 int secondary_channel; 1019 int no_pri_sec_switch; 1020 int require_ht; 1021 int obss_interval; 1022 u32 vht_capab; 1023 int ieee80211ac; 1024 int require_vht; 1025 u8 vht_oper_chwidth; 1026 u8 vht_oper_centr_freq_seg0_idx; 1027 u8 vht_oper_centr_freq_seg1_idx; 1028 u8 ht40_plus_minus_allowed; 1029 1030 /* Use driver-generated interface addresses when adding multiple BSSs */ 1031 u8 use_driver_iface_addr; 1032 1033 #ifdef CONFIG_FST 1034 struct fst_iface_cfg fst_cfg; 1035 #endif /* CONFIG_FST */ 1036 1037 #ifdef CONFIG_P2P 1038 u8 p2p_go_ctwindow; 1039 #endif /* CONFIG_P2P */ 1040 1041 #ifdef CONFIG_TESTING_OPTIONS 1042 double ignore_probe_probability; 1043 double ignore_auth_probability; 1044 double ignore_assoc_probability; 1045 double ignore_reassoc_probability; 1046 double corrupt_gtk_rekey_mic_probability; 1047 int ecsa_ie_only; 1048 #endif /* CONFIG_TESTING_OPTIONS */ 1049 1050 #ifdef CONFIG_ACS 1051 unsigned int acs_num_scans; 1052 struct acs_bias { 1053 int channel; 1054 double bias; 1055 } *acs_chan_bias; 1056 unsigned int num_acs_chan_bias; 1057 #endif /* CONFIG_ACS */ 1058 1059 struct wpabuf *lci; 1060 struct wpabuf *civic; 1061 int stationary_ap; 1062 1063 int ieee80211ax; 1064 #ifdef CONFIG_IEEE80211AX 1065 struct he_phy_capabilities_info he_phy_capab; 1066 struct he_operation he_op; 1067 struct ieee80211_he_mu_edca_parameter_set he_mu_edca; 1068 struct spatial_reuse spr; 1069 u8 he_oper_chwidth; 1070 u8 he_oper_centr_freq_seg0_idx; 1071 u8 he_oper_centr_freq_seg1_idx; 1072 u8 he_6ghz_max_mpdu; 1073 u8 he_6ghz_max_ampdu_len_exp; 1074 u8 he_6ghz_rx_ant_pat; 1075 u8 he_6ghz_tx_ant_pat; 1076 #endif /* CONFIG_IEEE80211AX */ 1077 1078 /* VHT enable/disable config from CHAN_SWITCH */ 1079 #define CH_SWITCH_VHT_ENABLED BIT(0) 1080 #define CH_SWITCH_VHT_DISABLED BIT(1) 1081 unsigned int ch_switch_vht_config; 1082 1083 /* HE enable/disable config from CHAN_SWITCH */ 1084 #define CH_SWITCH_HE_ENABLED BIT(0) 1085 #define CH_SWITCH_HE_DISABLED BIT(1) 1086 unsigned int ch_switch_he_config; 1087 1088 int rssi_reject_assoc_rssi; 1089 int rssi_reject_assoc_timeout; 1090 int rssi_ignore_probe_request; 1091 1092 #ifdef CONFIG_AIRTIME_POLICY 1093 enum { 1094 AIRTIME_MODE_OFF = 0, 1095 AIRTIME_MODE_STATIC = 1, 1096 AIRTIME_MODE_DYNAMIC = 2, 1097 AIRTIME_MODE_LIMIT = 3, 1098 __AIRTIME_MODE_MAX, 1099 } airtime_mode; 1100 unsigned int airtime_update_interval; 1101 #define AIRTIME_MODE_MAX (__AIRTIME_MODE_MAX - 1) 1102 #endif /* CONFIG_AIRTIME_POLICY */ 1103 }; 1104 1105 1106 static inline u8 hostapd_get_oper_chwidth(struct hostapd_config *conf) 1107 { 1108 #ifdef CONFIG_IEEE80211AX 1109 if (conf->ieee80211ax) 1110 return conf->he_oper_chwidth; 1111 #endif /* CONFIG_IEEE80211AX */ 1112 return conf->vht_oper_chwidth; 1113 } 1114 1115 static inline void 1116 hostapd_set_oper_chwidth(struct hostapd_config *conf, u8 oper_chwidth) 1117 { 1118 #ifdef CONFIG_IEEE80211AX 1119 if (conf->ieee80211ax) 1120 conf->he_oper_chwidth = oper_chwidth; 1121 #endif /* CONFIG_IEEE80211AX */ 1122 conf->vht_oper_chwidth = oper_chwidth; 1123 } 1124 1125 static inline u8 1126 hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config *conf) 1127 { 1128 #ifdef CONFIG_IEEE80211AX 1129 if (conf->ieee80211ax) 1130 return conf->he_oper_centr_freq_seg0_idx; 1131 #endif /* CONFIG_IEEE80211AX */ 1132 return conf->vht_oper_centr_freq_seg0_idx; 1133 } 1134 1135 static inline void 1136 hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config *conf, 1137 u8 oper_centr_freq_seg0_idx) 1138 { 1139 #ifdef CONFIG_IEEE80211AX 1140 if (conf->ieee80211ax) 1141 conf->he_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx; 1142 #endif /* CONFIG_IEEE80211AX */ 1143 conf->vht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx; 1144 } 1145 1146 static inline u8 1147 hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config *conf) 1148 { 1149 #ifdef CONFIG_IEEE80211AX 1150 if (conf->ieee80211ax) 1151 return conf->he_oper_centr_freq_seg1_idx; 1152 #endif /* CONFIG_IEEE80211AX */ 1153 return conf->vht_oper_centr_freq_seg1_idx; 1154 } 1155 1156 static inline void 1157 hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config *conf, 1158 u8 oper_centr_freq_seg1_idx) 1159 { 1160 #ifdef CONFIG_IEEE80211AX 1161 if (conf->ieee80211ax) 1162 conf->he_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx; 1163 #endif /* CONFIG_IEEE80211AX */ 1164 conf->vht_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx; 1165 } 1166 1167 1168 int hostapd_mac_comp(const void *a, const void *b); 1169 struct hostapd_config * hostapd_config_defaults(void); 1170 void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 1171 void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr); 1172 void hostapd_config_free_eap_user(struct hostapd_eap_user *user); 1173 void hostapd_config_free_eap_users(struct hostapd_eap_user *user); 1174 void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p); 1175 void hostapd_config_free_bss(struct hostapd_bss_config *conf); 1176 void hostapd_config_free(struct hostapd_config *conf); 1177 int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 1178 const u8 *addr, struct vlan_description *vlan_id); 1179 int hostapd_rate_found(int *list, int rate); 1180 const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 1181 const u8 *addr, const u8 *p2p_dev_addr, 1182 const u8 *prev_psk, int *vlan_id); 1183 int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 1184 int hostapd_vlan_valid(struct hostapd_vlan *vlan, 1185 struct vlan_description *vlan_desc); 1186 const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 1187 int vlan_id); 1188 struct hostapd_radius_attr * 1189 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 1190 struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value); 1191 int hostapd_config_check(struct hostapd_config *conf, int full_config); 1192 void hostapd_set_security_params(struct hostapd_bss_config *bss, 1193 int full_config); 1194 int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf); 1195 bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf); 1196 bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf); 1197 int hostapd_setup_sae_pt(struct hostapd_bss_config *conf); 1198 1199 #endif /* HOSTAPD_CONFIG_H */ 1200