1 /* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #ifndef HOSTAPD_CONFIG_H 10 #define HOSTAPD_CONFIG_H 11 12 #include "common/defs.h" 13 #include "ip_addr.h" 14 #include "common/wpa_common.h" 15 #include "common/ieee802_11_defs.h" 16 #include "common/ieee802_11_common.h" 17 #include "wps/wps.h" 18 19 /** 20 * mesh_conf - local MBSS state and settings 21 */ 22 struct mesh_conf { 23 u8 meshid[32]; 24 u8 meshid_len; 25 /* Active Path Selection Protocol Identifier */ 26 u8 mesh_pp_id; 27 /* Active Path Selection Metric Identifier */ 28 u8 mesh_pm_id; 29 /* Congestion Control Mode Identifier */ 30 u8 mesh_cc_id; 31 /* Synchronization Protocol Identifier */ 32 u8 mesh_sp_id; 33 /* Authentication Protocol Identifier */ 34 u8 mesh_auth_id; 35 u8 *ies; 36 int ie_len; 37 #define MESH_CONF_SEC_NONE BIT(0) 38 #define MESH_CONF_SEC_AUTH BIT(1) 39 #define MESH_CONF_SEC_AMPE BIT(2) 40 unsigned int security; 41 int dot11MeshMaxRetries; 42 int dot11MeshRetryTimeout; /* msec */ 43 int dot11MeshConfirmTimeout; /* msec */ 44 int dot11MeshHoldingTimeout; /* msec */ 45 }; 46 47 #define MAX_STA_COUNT 2007 48 #define MAX_VLAN_ID 4094 49 50 typedef u8 macaddr[ETH_ALEN]; 51 52 struct mac_acl_entry { 53 macaddr addr; 54 int vlan_id; 55 }; 56 57 struct hostapd_radius_servers; 58 struct ft_remote_r0kh; 59 struct ft_remote_r1kh; 60 61 #define NUM_WEP_KEYS 4 62 struct hostapd_wep_keys { 63 u8 idx; 64 u8 *key[NUM_WEP_KEYS]; 65 size_t len[NUM_WEP_KEYS]; 66 int keys_set; 67 size_t default_len; /* key length used for dynamic key generation */ 68 }; 69 70 typedef enum hostap_security_policy { 71 SECURITY_PLAINTEXT = 0, 72 SECURITY_STATIC_WEP = 1, 73 SECURITY_IEEE_802_1X = 2, 74 SECURITY_WPA_PSK = 3, 75 SECURITY_WPA = 4, 76 SECURITY_OSEN = 5 77 } secpolicy; 78 79 struct hostapd_ssid { 80 u8 ssid[SSID_MAX_LEN]; 81 size_t ssid_len; 82 unsigned int ssid_set:1; 83 unsigned int utf8_ssid:1; 84 unsigned int wpa_passphrase_set:1; 85 unsigned int wpa_psk_set:1; 86 87 char vlan[IFNAMSIZ + 1]; 88 secpolicy security_policy; 89 90 struct hostapd_wpa_psk *wpa_psk; 91 char *wpa_passphrase; 92 char *wpa_psk_file; 93 94 struct hostapd_wep_keys wep; 95 96 #define DYNAMIC_VLAN_DISABLED 0 97 #define DYNAMIC_VLAN_OPTIONAL 1 98 #define DYNAMIC_VLAN_REQUIRED 2 99 int dynamic_vlan; 100 #define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 101 #define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 102 #define DYNAMIC_VLAN_NAMING_END 2 103 int vlan_naming; 104 #ifdef CONFIG_FULL_DYNAMIC_VLAN 105 char *vlan_tagged_interface; 106 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 107 }; 108 109 110 #define VLAN_ID_WILDCARD -1 111 112 struct hostapd_vlan { 113 struct hostapd_vlan *next; 114 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 115 char ifname[IFNAMSIZ + 1]; 116 int configured; 117 int dynamic_vlan; 118 #ifdef CONFIG_FULL_DYNAMIC_VLAN 119 120 #define DVLAN_CLEAN_WLAN_PORT 0x8 121 int clean; 122 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 123 }; 124 125 #define PMK_LEN 32 126 struct hostapd_sta_wpa_psk_short { 127 struct hostapd_sta_wpa_psk_short *next; 128 u8 psk[PMK_LEN]; 129 }; 130 131 struct hostapd_wpa_psk { 132 struct hostapd_wpa_psk *next; 133 int group; 134 u8 psk[PMK_LEN]; 135 u8 addr[ETH_ALEN]; 136 u8 p2p_dev_addr[ETH_ALEN]; 137 }; 138 139 struct hostapd_eap_user { 140 struct hostapd_eap_user *next; 141 u8 *identity; 142 size_t identity_len; 143 struct { 144 int vendor; 145 u32 method; 146 } methods[EAP_MAX_METHODS]; 147 u8 *password; 148 size_t password_len; 149 int phase2; 150 int force_version; 151 unsigned int wildcard_prefix:1; 152 unsigned int password_hash:1; /* whether password is hashed with 153 * nt_password_hash() */ 154 unsigned int remediation:1; 155 unsigned int macacl:1; 156 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 157 struct hostapd_radius_attr *accept_attr; 158 }; 159 160 struct hostapd_radius_attr { 161 u8 type; 162 struct wpabuf *val; 163 struct hostapd_radius_attr *next; 164 }; 165 166 167 #define NUM_TX_QUEUES 4 168 169 struct hostapd_tx_queue_params { 170 int aifs; 171 int cwmin; 172 int cwmax; 173 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 174 }; 175 176 177 #define MAX_ROAMING_CONSORTIUM_LEN 15 178 179 struct hostapd_roaming_consortium { 180 u8 len; 181 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 182 }; 183 184 struct hostapd_lang_string { 185 u8 lang[3]; 186 u8 name_len; 187 u8 name[252]; 188 }; 189 190 #define MAX_NAI_REALMS 10 191 #define MAX_NAI_REALMLEN 255 192 #define MAX_NAI_EAP_METHODS 5 193 #define MAX_NAI_AUTH_TYPES 4 194 struct hostapd_nai_realm_data { 195 u8 encoding; 196 char realm_buf[MAX_NAI_REALMLEN + 1]; 197 char *realm[MAX_NAI_REALMS]; 198 u8 eap_method_count; 199 struct hostapd_nai_realm_eap { 200 u8 eap_method; 201 u8 num_auths; 202 u8 auth_id[MAX_NAI_AUTH_TYPES]; 203 u8 auth_val[MAX_NAI_AUTH_TYPES]; 204 } eap_method[MAX_NAI_EAP_METHODS]; 205 }; 206 207 /** 208 * struct hostapd_bss_config - Per-BSS configuration 209 */ 210 struct hostapd_bss_config { 211 char iface[IFNAMSIZ + 1]; 212 char bridge[IFNAMSIZ + 1]; 213 char vlan_bridge[IFNAMSIZ + 1]; 214 char wds_bridge[IFNAMSIZ + 1]; 215 216 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 217 218 unsigned int logger_syslog; /* module bitfield */ 219 unsigned int logger_stdout; /* module bitfield */ 220 221 int max_num_sta; /* maximum number of STAs in station table */ 222 223 int dtim_period; 224 int bss_load_update_period; 225 226 int ieee802_1x; /* use IEEE 802.1X */ 227 int eapol_version; 228 int eap_server; /* Use internal EAP server instead of external 229 * RADIUS server */ 230 struct hostapd_eap_user *eap_user; 231 char *eap_user_sqlite; 232 char *eap_sim_db; 233 int eap_server_erp; /* Whether ERP is enabled on internal EAP server */ 234 struct hostapd_ip_addr own_ip_addr; 235 char *nas_identifier; 236 struct hostapd_radius_servers *radius; 237 int acct_interim_interval; 238 int radius_request_cui; 239 struct hostapd_radius_attr *radius_auth_req_attr; 240 struct hostapd_radius_attr *radius_acct_req_attr; 241 int radius_das_port; 242 unsigned int radius_das_time_window; 243 int radius_das_require_event_timestamp; 244 struct hostapd_ip_addr radius_das_client_addr; 245 u8 *radius_das_shared_secret; 246 size_t radius_das_shared_secret_len; 247 248 struct hostapd_ssid ssid; 249 250 char *eap_req_id_text; /* optional displayable message sent with 251 * EAP Request-Identity */ 252 size_t eap_req_id_text_len; 253 int eapol_key_index_workaround; 254 255 size_t default_wep_key_len; 256 int individual_wep_key_len; 257 int wep_rekeying_period; 258 int broadcast_key_idx_min, broadcast_key_idx_max; 259 int eap_reauth_period; 260 int erp_send_reauth_start; 261 char *erp_domain; 262 263 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 264 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 265 * frames */ 266 267 enum { 268 ACCEPT_UNLESS_DENIED = 0, 269 DENY_UNLESS_ACCEPTED = 1, 270 USE_EXTERNAL_RADIUS_AUTH = 2 271 } macaddr_acl; 272 struct mac_acl_entry *accept_mac; 273 int num_accept_mac; 274 struct mac_acl_entry *deny_mac; 275 int num_deny_mac; 276 int wds_sta; 277 int isolate; 278 int start_disabled; 279 280 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 281 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 282 283 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 284 int wpa_key_mgmt; 285 #ifdef CONFIG_IEEE80211W 286 enum mfp_options ieee80211w; 287 int group_mgmt_cipher; 288 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 289 unsigned int assoc_sa_query_max_timeout; 290 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 291 int assoc_sa_query_retry_timeout; 292 #endif /* CONFIG_IEEE80211W */ 293 enum { 294 PSK_RADIUS_IGNORED = 0, 295 PSK_RADIUS_ACCEPTED = 1, 296 PSK_RADIUS_REQUIRED = 2 297 } wpa_psk_radius; 298 int wpa_pairwise; 299 int wpa_group; 300 int wpa_group_rekey; 301 int wpa_strict_rekey; 302 int wpa_gmk_rekey; 303 int wpa_ptk_rekey; 304 int rsn_pairwise; 305 int rsn_preauth; 306 char *rsn_preauth_interfaces; 307 int peerkey; 308 309 #ifdef CONFIG_IEEE80211R 310 /* IEEE 802.11r - Fast BSS Transition */ 311 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 312 u8 r1_key_holder[FT_R1KH_ID_LEN]; 313 u32 r0_key_lifetime; 314 u32 reassociation_deadline; 315 struct ft_remote_r0kh *r0kh_list; 316 struct ft_remote_r1kh *r1kh_list; 317 int pmk_r1_push; 318 int ft_over_ds; 319 #endif /* CONFIG_IEEE80211R */ 320 321 char *ctrl_interface; /* directory for UNIX domain sockets */ 322 #ifndef CONFIG_NATIVE_WINDOWS 323 gid_t ctrl_interface_gid; 324 #endif /* CONFIG_NATIVE_WINDOWS */ 325 int ctrl_interface_gid_set; 326 327 char *ca_cert; 328 char *server_cert; 329 char *private_key; 330 char *private_key_passwd; 331 int check_crl; 332 char *ocsp_stapling_response; 333 char *dh_file; 334 char *openssl_ciphers; 335 u8 *pac_opaque_encr_key; 336 u8 *eap_fast_a_id; 337 size_t eap_fast_a_id_len; 338 char *eap_fast_a_id_info; 339 int eap_fast_prov; 340 int pac_key_lifetime; 341 int pac_key_refresh_time; 342 int eap_sim_aka_result_ind; 343 int tnc; 344 int fragment_size; 345 u16 pwd_group; 346 347 char *radius_server_clients; 348 int radius_server_auth_port; 349 int radius_server_acct_port; 350 int radius_server_ipv6; 351 352 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 353 * address instead of individual address 354 * (for driver_wired.c). 355 */ 356 357 int ap_max_inactivity; 358 int ignore_broadcast_ssid; 359 360 int wmm_enabled; 361 int wmm_uapsd; 362 363 struct hostapd_vlan *vlan; 364 365 macaddr bssid; 366 367 /* 368 * Maximum listen interval that STAs can use when associating with this 369 * BSS. If a STA tries to use larger value, the association will be 370 * denied with status code 51. 371 */ 372 u16 max_listen_interval; 373 374 int disable_pmksa_caching; 375 int okc; /* Opportunistic Key Caching */ 376 377 int wps_state; 378 #ifdef CONFIG_WPS 379 int wps_independent; 380 int ap_setup_locked; 381 u8 uuid[16]; 382 char *wps_pin_requests; 383 char *device_name; 384 char *manufacturer; 385 char *model_name; 386 char *model_number; 387 char *serial_number; 388 u8 device_type[WPS_DEV_TYPE_LEN]; 389 char *config_methods; 390 u8 os_version[4]; 391 char *ap_pin; 392 int skip_cred_build; 393 u8 *extra_cred; 394 size_t extra_cred_len; 395 int wps_cred_processing; 396 int force_per_enrollee_psk; 397 u8 *ap_settings; 398 size_t ap_settings_len; 399 char *upnp_iface; 400 char *friendly_name; 401 char *manufacturer_url; 402 char *model_description; 403 char *model_url; 404 char *upc; 405 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 406 int wps_nfc_pw_from_config; 407 int wps_nfc_dev_pw_id; 408 struct wpabuf *wps_nfc_dh_pubkey; 409 struct wpabuf *wps_nfc_dh_privkey; 410 struct wpabuf *wps_nfc_dev_pw; 411 #endif /* CONFIG_WPS */ 412 int pbc_in_m1; 413 char *server_id; 414 415 #define P2P_ENABLED BIT(0) 416 #define P2P_GROUP_OWNER BIT(1) 417 #define P2P_GROUP_FORMATION BIT(2) 418 #define P2P_MANAGE BIT(3) 419 #define P2P_ALLOW_CROSS_CONNECTION BIT(4) 420 int p2p; 421 #ifdef CONFIG_P2P 422 u8 ip_addr_go[4]; 423 u8 ip_addr_mask[4]; 424 u8 ip_addr_start[4]; 425 u8 ip_addr_end[4]; 426 #endif /* CONFIG_P2P */ 427 428 int disassoc_low_ack; 429 int skip_inactivity_poll; 430 431 #define TDLS_PROHIBIT BIT(0) 432 #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 433 int tdls; 434 int disable_11n; 435 int disable_11ac; 436 437 /* IEEE 802.11v */ 438 int time_advertisement; 439 char *time_zone; 440 int wnm_sleep_mode; 441 int bss_transition; 442 443 /* IEEE 802.11u - Interworking */ 444 int interworking; 445 int access_network_type; 446 int internet; 447 int asra; 448 int esr; 449 int uesa; 450 int venue_info_set; 451 u8 venue_group; 452 u8 venue_type; 453 u8 hessid[ETH_ALEN]; 454 455 /* IEEE 802.11u - Roaming Consortium list */ 456 unsigned int roaming_consortium_count; 457 struct hostapd_roaming_consortium *roaming_consortium; 458 459 /* IEEE 802.11u - Venue Name duples */ 460 unsigned int venue_name_count; 461 struct hostapd_lang_string *venue_name; 462 463 /* IEEE 802.11u - Network Authentication Type */ 464 u8 *network_auth_type; 465 size_t network_auth_type_len; 466 467 /* IEEE 802.11u - IP Address Type Availability */ 468 u8 ipaddr_type_availability; 469 u8 ipaddr_type_configured; 470 471 /* IEEE 802.11u - 3GPP Cellular Network */ 472 u8 *anqp_3gpp_cell_net; 473 size_t anqp_3gpp_cell_net_len; 474 475 /* IEEE 802.11u - Domain Name */ 476 u8 *domain_name; 477 size_t domain_name_len; 478 479 unsigned int nai_realm_count; 480 struct hostapd_nai_realm_data *nai_realm_data; 481 482 u16 gas_comeback_delay; 483 int gas_frag_limit; 484 485 u8 qos_map_set[16 + 2 * 21]; 486 unsigned int qos_map_set_len; 487 488 int osen; 489 int proxy_arp; 490 int na_mcast_to_ucast; 491 #ifdef CONFIG_HS20 492 int hs20; 493 int disable_dgaf; 494 u16 anqp_domain_id; 495 unsigned int hs20_oper_friendly_name_count; 496 struct hostapd_lang_string *hs20_oper_friendly_name; 497 u8 *hs20_wan_metrics; 498 u8 *hs20_connection_capability; 499 size_t hs20_connection_capability_len; 500 u8 *hs20_operating_class; 501 u8 hs20_operating_class_len; 502 struct hs20_icon { 503 u16 width; 504 u16 height; 505 char language[3]; 506 char type[256]; 507 char name[256]; 508 char file[256]; 509 } *hs20_icons; 510 size_t hs20_icons_count; 511 u8 osu_ssid[SSID_MAX_LEN]; 512 size_t osu_ssid_len; 513 struct hs20_osu_provider { 514 unsigned int friendly_name_count; 515 struct hostapd_lang_string *friendly_name; 516 char *server_uri; 517 int *method_list; 518 char **icons; 519 size_t icons_count; 520 char *osu_nai; 521 unsigned int service_desc_count; 522 struct hostapd_lang_string *service_desc; 523 } *hs20_osu_providers, *last_osu; 524 size_t hs20_osu_providers_count; 525 unsigned int hs20_deauth_req_timeout; 526 char *subscr_remediation_url; 527 u8 subscr_remediation_method; 528 #endif /* CONFIG_HS20 */ 529 530 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 531 532 #ifdef CONFIG_RADIUS_TEST 533 char *dump_msk_file; 534 #endif /* CONFIG_RADIUS_TEST */ 535 536 struct wpabuf *vendor_elements; 537 538 unsigned int sae_anti_clogging_threshold; 539 int *sae_groups; 540 541 char *wowlan_triggers; /* Wake-on-WLAN triggers */ 542 543 #ifdef CONFIG_TESTING_OPTIONS 544 u8 bss_load_test[5]; 545 u8 bss_load_test_set; 546 #endif /* CONFIG_TESTING_OPTIONS */ 547 548 #define MESH_ENABLED BIT(0) 549 int mesh; 550 551 int radio_measurements; 552 553 int vendor_vht; 554 }; 555 556 557 /** 558 * struct hostapd_config - Per-radio interface configuration 559 */ 560 struct hostapd_config { 561 struct hostapd_bss_config **bss, *last_bss; 562 size_t num_bss; 563 564 u16 beacon_int; 565 int rts_threshold; 566 int fragm_threshold; 567 u8 send_probe_response; 568 u8 channel; 569 u8 acs; 570 struct wpa_freq_range_list acs_ch_list; 571 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 572 enum { 573 LONG_PREAMBLE = 0, 574 SHORT_PREAMBLE = 1 575 } preamble; 576 577 int *supported_rates; 578 int *basic_rates; 579 580 const struct wpa_driver_ops *driver; 581 char *driver_params; 582 583 int ap_table_max_size; 584 int ap_table_expiration_time; 585 586 char country[3]; /* first two octets: country code as described in 587 * ISO/IEC 3166-1. Third octet: 588 * ' ' (ascii 32): all environments 589 * 'O': Outdoor environemnt only 590 * 'I': Indoor environment only 591 */ 592 593 int ieee80211d; 594 595 int ieee80211h; /* DFS */ 596 597 /* 598 * Local power constraint is an octet encoded as an unsigned integer in 599 * units of decibels. Invalid value -1 indicates that Power Constraint 600 * element will not be added. 601 */ 602 int local_pwr_constraint; 603 604 /* Control Spectrum Management bit */ 605 int spectrum_mgmt_required; 606 607 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 608 609 /* 610 * WMM AC parameters, in same order as 802.1D, i.e. 611 * 0 = BE (best effort) 612 * 1 = BK (background) 613 * 2 = VI (video) 614 * 3 = VO (voice) 615 */ 616 struct hostapd_wmm_ac_params wmm_ac_params[4]; 617 618 int ht_op_mode_fixed; 619 u16 ht_capab; 620 int ieee80211n; 621 int secondary_channel; 622 int require_ht; 623 int obss_interval; 624 u32 vht_capab; 625 int ieee80211ac; 626 int require_vht; 627 u8 vht_oper_chwidth; 628 u8 vht_oper_centr_freq_seg0_idx; 629 u8 vht_oper_centr_freq_seg1_idx; 630 631 #ifdef CONFIG_P2P 632 u8 p2p_go_ctwindow; 633 #endif /* CONFIG_P2P */ 634 635 #ifdef CONFIG_TESTING_OPTIONS 636 double ignore_probe_probability; 637 double ignore_auth_probability; 638 double ignore_assoc_probability; 639 double ignore_reassoc_probability; 640 double corrupt_gtk_rekey_mic_probability; 641 #endif /* CONFIG_TESTING_OPTIONS */ 642 643 #ifdef CONFIG_ACS 644 unsigned int acs_num_scans; 645 struct acs_bias { 646 int channel; 647 double bias; 648 } *acs_chan_bias; 649 unsigned int num_acs_chan_bias; 650 #endif /* CONFIG_ACS */ 651 }; 652 653 654 int hostapd_mac_comp(const void *a, const void *b); 655 int hostapd_mac_comp_empty(const void *a); 656 struct hostapd_config * hostapd_config_defaults(void); 657 void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 658 void hostapd_config_free_eap_user(struct hostapd_eap_user *user); 659 void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p); 660 void hostapd_config_free_bss(struct hostapd_bss_config *conf); 661 void hostapd_config_free(struct hostapd_config *conf); 662 int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 663 const u8 *addr, int *vlan_id); 664 int hostapd_rate_found(int *list, int rate); 665 const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 666 const u8 *addr, const u8 *p2p_dev_addr, 667 const u8 *prev_psk); 668 int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 669 int hostapd_vlan_id_valid(struct hostapd_vlan *vlan, int vlan_id); 670 const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 671 int vlan_id); 672 struct hostapd_radius_attr * 673 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 674 int hostapd_config_check(struct hostapd_config *conf, int full_config); 675 void hostapd_set_security_params(struct hostapd_bss_config *bss, 676 int full_config); 677 678 #endif /* HOSTAPD_CONFIG_H */ 679