1 /*
2 * hostapd / Configuration definitions and helpers functions
3 * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #ifndef HOSTAPD_CONFIG_H
10 #define HOSTAPD_CONFIG_H
11
12 #include "common/defs.h"
13 #include "utils/list.h"
14 #include "ip_addr.h"
15 #include "common/wpa_common.h"
16 #include "common/ieee802_11_defs.h"
17 #include "common/ieee802_11_common.h"
18 #include "crypto/sha256.h"
19 #include "wps/wps.h"
20 #include "fst/fst.h"
21 #include "vlan.h"
22
23 /**
24 * mesh_conf - local MBSS state and settings
25 */
26 struct mesh_conf {
27 u8 meshid[32];
28 u8 meshid_len;
29 /* Active Path Selection Protocol Identifier */
30 u8 mesh_pp_id;
31 /* Active Path Selection Metric Identifier */
32 u8 mesh_pm_id;
33 /* Congestion Control Mode Identifier */
34 u8 mesh_cc_id;
35 /* Synchronization Protocol Identifier */
36 u8 mesh_sp_id;
37 /* Authentication Protocol Identifier */
38 u8 mesh_auth_id;
39 u8 *rsn_ie;
40 int rsn_ie_len;
41 #define MESH_CONF_SEC_NONE BIT(0)
42 #define MESH_CONF_SEC_AUTH BIT(1)
43 #define MESH_CONF_SEC_AMPE BIT(2)
44 unsigned int security;
45 enum mfp_options ieee80211w;
46 int ocv;
47 unsigned int pairwise_cipher;
48 unsigned int group_cipher;
49 unsigned int mgmt_group_cipher;
50 int dot11MeshMaxRetries;
51 int dot11MeshRetryTimeout; /* msec */
52 int dot11MeshConfirmTimeout; /* msec */
53 int dot11MeshHoldingTimeout; /* msec */
54 int mesh_fwding;
55 };
56
57 #define MAX_STA_COUNT 2007
58 #define MAX_VLAN_ID 4094
59
60 typedef u8 macaddr[ETH_ALEN];
61
62 struct mac_acl_entry {
63 macaddr addr;
64 struct vlan_description vlan_id;
65 };
66
67 struct hostapd_radius_servers;
68 struct ft_remote_r0kh;
69 struct ft_remote_r1kh;
70
71 #ifdef CONFIG_WEP
72 #define NUM_WEP_KEYS 4
73 struct hostapd_wep_keys {
74 u8 idx;
75 u8 *key[NUM_WEP_KEYS];
76 size_t len[NUM_WEP_KEYS];
77 int keys_set;
78 size_t default_len; /* key length used for dynamic key generation */
79 };
80 #endif /* CONFIG_WEP */
81
82 typedef enum hostap_security_policy {
83 SECURITY_PLAINTEXT = 0,
84 #ifdef CONFIG_WEP
85 SECURITY_STATIC_WEP = 1,
86 #endif /* CONFIG_WEP */
87 SECURITY_IEEE_802_1X = 2,
88 SECURITY_WPA_PSK = 3,
89 SECURITY_WPA = 4,
90 SECURITY_OSEN = 5
91 } secpolicy;
92
93 struct hostapd_ssid {
94 u8 ssid[SSID_MAX_LEN];
95 size_t ssid_len;
96 u32 short_ssid;
97 unsigned int ssid_set:1;
98 unsigned int utf8_ssid:1;
99 unsigned int wpa_passphrase_set:1;
100 unsigned int wpa_psk_set:1;
101
102 char vlan[IFNAMSIZ + 1];
103 secpolicy security_policy;
104
105 struct hostapd_wpa_psk *wpa_psk;
106 char *wpa_passphrase;
107 char *wpa_psk_file;
108 struct sae_pt *pt;
109
110 #ifdef CONFIG_WEP
111 struct hostapd_wep_keys wep;
112 #endif /* CONFIG_WEP */
113
114 #define DYNAMIC_VLAN_DISABLED 0
115 #define DYNAMIC_VLAN_OPTIONAL 1
116 #define DYNAMIC_VLAN_REQUIRED 2
117 int dynamic_vlan;
118 #define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0
119 #define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1
120 #define DYNAMIC_VLAN_NAMING_END 2
121 int vlan_naming;
122 int per_sta_vif;
123 #ifdef CONFIG_FULL_DYNAMIC_VLAN
124 char *vlan_tagged_interface;
125 #endif /* CONFIG_FULL_DYNAMIC_VLAN */
126 };
127
128
129 #define VLAN_ID_WILDCARD -1
130
131 struct hostapd_vlan {
132 struct hostapd_vlan *next;
133 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */
134 struct vlan_description vlan_desc;
135 char ifname[IFNAMSIZ + 1];
136 char bridge[IFNAMSIZ + 1];
137 int configured;
138 int dynamic_vlan;
139 #ifdef CONFIG_FULL_DYNAMIC_VLAN
140
141 #define DVLAN_CLEAN_WLAN_PORT 0x8
142 int clean;
143 #endif /* CONFIG_FULL_DYNAMIC_VLAN */
144 };
145
146 #define PMK_LEN 32
147 #define KEYID_LEN 32
148 #define MIN_PASSPHRASE_LEN 8
149 #define MAX_PASSPHRASE_LEN 63
150 struct hostapd_sta_wpa_psk_short {
151 struct hostapd_sta_wpa_psk_short *next;
152 unsigned int is_passphrase:1;
153 u8 psk[PMK_LEN];
154 char passphrase[MAX_PASSPHRASE_LEN + 1];
155 int ref; /* (number of references held) - 1 */
156 };
157
158 struct hostapd_wpa_psk {
159 struct hostapd_wpa_psk *next;
160 int group;
161 char keyid[KEYID_LEN];
162 int wps;
163 u8 psk[PMK_LEN];
164 u8 addr[ETH_ALEN];
165 u8 p2p_dev_addr[ETH_ALEN];
166 int vlan_id;
167 };
168
169 struct hostapd_eap_user {
170 struct hostapd_eap_user *next;
171 u8 *identity;
172 size_t identity_len;
173 struct {
174 int vendor;
175 u32 method;
176 } methods[EAP_MAX_METHODS];
177 u8 *password;
178 size_t password_len;
179 u8 *salt;
180 size_t salt_len; /* non-zero when password is salted */
181 int phase2;
182 int force_version;
183 unsigned int wildcard_prefix:1;
184 unsigned int password_hash:1; /* whether password is hashed with
185 * nt_password_hash() */
186 unsigned int remediation:1;
187 unsigned int macacl:1;
188 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */
189 struct hostapd_radius_attr *accept_attr;
190 u32 t_c_timestamp;
191 };
192
193 struct hostapd_radius_attr {
194 u8 type;
195 struct wpabuf *val;
196 struct hostapd_radius_attr *next;
197 };
198
199
200 #define NUM_TX_QUEUES 4
201 #define MAX_ROAMING_CONSORTIUM_LEN 15
202
203 struct hostapd_roaming_consortium {
204 u8 len;
205 u8 oi[MAX_ROAMING_CONSORTIUM_LEN];
206 };
207
208 struct hostapd_lang_string {
209 u8 lang[3];
210 u8 name_len;
211 u8 name[252];
212 };
213
214 struct hostapd_venue_url {
215 u8 venue_number;
216 u8 url_len;
217 u8 url[254];
218 };
219
220 #define MAX_NAI_REALMS 10
221 #define MAX_NAI_REALMLEN 255
222 #define MAX_NAI_EAP_METHODS 5
223 #define MAX_NAI_AUTH_TYPES 4
224 struct hostapd_nai_realm_data {
225 u8 encoding;
226 char realm_buf[MAX_NAI_REALMLEN + 1];
227 char *realm[MAX_NAI_REALMS];
228 u8 eap_method_count;
229 struct hostapd_nai_realm_eap {
230 u8 eap_method;
231 u8 num_auths;
232 u8 auth_id[MAX_NAI_AUTH_TYPES];
233 u8 auth_val[MAX_NAI_AUTH_TYPES];
234 } eap_method[MAX_NAI_EAP_METHODS];
235 };
236
237 struct anqp_element {
238 struct dl_list list;
239 u16 infoid;
240 struct wpabuf *payload;
241 };
242
243 struct fils_realm {
244 struct dl_list list;
245 u8 hash[2];
246 char realm[];
247 };
248
249 struct sae_password_entry {
250 struct sae_password_entry *next;
251 char *password;
252 char *identifier;
253 u8 peer_addr[ETH_ALEN];
254 int vlan_id;
255 struct sae_pt *pt;
256 struct sae_pk *pk;
257 };
258
259 struct dpp_controller_conf {
260 struct dpp_controller_conf *next;
261 u8 pkhash[SHA256_MAC_LEN];
262 struct hostapd_ip_addr ipaddr;
263 };
264
265 struct airtime_sta_weight {
266 struct airtime_sta_weight *next;
267 unsigned int weight;
268 u8 addr[ETH_ALEN];
269 };
270
271 #define EXT_CAPA_MAX_LEN 15
272
273 /**
274 * struct hostapd_bss_config - Per-BSS configuration
275 */
276 struct hostapd_bss_config {
277 char iface[IFNAMSIZ + 1];
278 char bridge[IFNAMSIZ + 1];
279 char vlan_bridge[IFNAMSIZ + 1];
280 char wds_bridge[IFNAMSIZ + 1];
281
282 enum hostapd_logger_level logger_syslog_level, logger_stdout_level;
283
284 unsigned int logger_syslog; /* module bitfield */
285 unsigned int logger_stdout; /* module bitfield */
286
287 int max_num_sta; /* maximum number of STAs in station table */
288
289 int dtim_period;
290 unsigned int bss_load_update_period;
291 unsigned int chan_util_avg_period;
292
293 int ieee802_1x; /* use IEEE 802.1X */
294 int eapol_version;
295 int eap_server; /* Use internal EAP server instead of external
296 * RADIUS server */
297 struct hostapd_eap_user *eap_user;
298 char *eap_user_sqlite;
299 char *eap_sim_db;
300 unsigned int eap_sim_db_timeout;
301 int eap_server_erp; /* Whether ERP is enabled on internal EAP server */
302 struct hostapd_ip_addr own_ip_addr;
303 char *nas_identifier;
304 struct hostapd_radius_servers *radius;
305 int acct_interim_interval;
306 int radius_request_cui;
307 struct hostapd_radius_attr *radius_auth_req_attr;
308 struct hostapd_radius_attr *radius_acct_req_attr;
309 char *radius_req_attr_sqlite;
310 int radius_das_port;
311 unsigned int radius_das_time_window;
312 int radius_das_require_event_timestamp;
313 int radius_das_require_message_authenticator;
314 struct hostapd_ip_addr radius_das_client_addr;
315 u8 *radius_das_shared_secret;
316 size_t radius_das_shared_secret_len;
317
318 struct hostapd_ssid ssid;
319
320 char *eap_req_id_text; /* optional displayable message sent with
321 * EAP Request-Identity */
322 size_t eap_req_id_text_len;
323 int eapol_key_index_workaround;
324
325 #ifdef CONFIG_WEP
326 size_t default_wep_key_len;
327 int individual_wep_key_len;
328 int wep_rekeying_period;
329 int broadcast_key_idx_min, broadcast_key_idx_max;
330 #endif /* CONFIG_WEP */
331 int eap_reauth_period;
332 int erp_send_reauth_start;
333 char *erp_domain;
334
335 enum macaddr_acl {
336 ACCEPT_UNLESS_DENIED = 0,
337 DENY_UNLESS_ACCEPTED = 1,
338 USE_EXTERNAL_RADIUS_AUTH = 2
339 } macaddr_acl;
340 struct mac_acl_entry *accept_mac;
341 int num_accept_mac;
342 struct mac_acl_entry *deny_mac;
343 int num_deny_mac;
344 int wds_sta;
345 int isolate;
346 int start_disabled;
347
348 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
349 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
350
351 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */
352 int extended_key_id;
353 int wpa_key_mgmt;
354 enum mfp_options ieee80211w;
355 int group_mgmt_cipher;
356 int beacon_prot;
357 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */
358 unsigned int assoc_sa_query_max_timeout;
359 /* dot11AssociationSAQueryRetryTimeout (in TUs) */
360 int assoc_sa_query_retry_timeout;
361 #ifdef CONFIG_OCV
362 int ocv; /* Operating Channel Validation */
363 #endif /* CONFIG_OCV */
364 enum {
365 PSK_RADIUS_IGNORED = 0,
366 PSK_RADIUS_ACCEPTED = 1,
367 PSK_RADIUS_REQUIRED = 2
368 } wpa_psk_radius;
369 int wpa_pairwise;
370 int group_cipher; /* wpa_group value override from configuation */
371 int wpa_group;
372 int wpa_group_rekey;
373 int wpa_group_rekey_set;
374 int wpa_strict_rekey;
375 int wpa_gmk_rekey;
376 int wpa_ptk_rekey;
377 enum ptk0_rekey_handling wpa_deny_ptk0_rekey;
378 u32 wpa_group_update_count;
379 u32 wpa_pairwise_update_count;
380 int wpa_disable_eapol_key_retries;
381 int rsn_pairwise;
382 int rsn_preauth;
383 char *rsn_preauth_interfaces;
384
385 #ifdef CONFIG_IEEE80211R_AP
386 /* IEEE 802.11r - Fast BSS Transition */
387 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
388 u8 r1_key_holder[FT_R1KH_ID_LEN];
389 u32 r0_key_lifetime; /* PMK-R0 lifetime seconds */
390 int rkh_pos_timeout;
391 int rkh_neg_timeout;
392 int rkh_pull_timeout; /* ms */
393 int rkh_pull_retries;
394 u32 reassociation_deadline;
395 struct ft_remote_r0kh *r0kh_list;
396 struct ft_remote_r1kh *r1kh_list;
397 int pmk_r1_push;
398 int ft_over_ds;
399 int ft_psk_generate_local;
400 int r1_max_key_lifetime;
401 #endif /* CONFIG_IEEE80211R_AP */
402
403 char *ctrl_interface; /* directory for UNIX domain sockets */
404 #ifndef CONFIG_NATIVE_WINDOWS
405 gid_t ctrl_interface_gid;
406 #endif /* CONFIG_NATIVE_WINDOWS */
407 int ctrl_interface_gid_set;
408
409 char *ca_cert;
410 char *server_cert;
411 char *server_cert2;
412 char *private_key;
413 char *private_key2;
414 char *private_key_passwd;
415 char *private_key_passwd2;
416 char *check_cert_subject;
417 int check_crl;
418 int check_crl_strict;
419 unsigned int crl_reload_interval;
420 unsigned int tls_session_lifetime;
421 unsigned int tls_flags;
422 unsigned int max_auth_rounds;
423 unsigned int max_auth_rounds_short;
424 char *ocsp_stapling_response;
425 char *ocsp_stapling_response_multi;
426 char *dh_file;
427 char *openssl_ciphers;
428 char *openssl_ecdh_curves;
429 u8 *pac_opaque_encr_key;
430 u8 *eap_fast_a_id;
431 size_t eap_fast_a_id_len;
432 char *eap_fast_a_id_info;
433 int eap_fast_prov;
434 int pac_key_lifetime;
435 int pac_key_refresh_time;
436 int eap_teap_auth;
437 int eap_teap_pac_no_inner;
438 int eap_teap_separate_result;
439 int eap_teap_id;
440 int eap_sim_aka_result_ind;
441 int eap_sim_id;
442 int tnc;
443 int fragment_size;
444 u16 pwd_group;
445
446 char *radius_server_clients;
447 int radius_server_auth_port;
448 int radius_server_acct_port;
449 int radius_server_ipv6;
450
451 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group
452 * address instead of individual address
453 * (for driver_wired.c).
454 */
455
456 int ap_max_inactivity;
457 int ignore_broadcast_ssid;
458 int no_probe_resp_if_max_sta;
459
460 int wmm_enabled;
461 int wmm_uapsd;
462
463 struct hostapd_vlan *vlan;
464
465 macaddr bssid;
466
467 /*
468 * Maximum listen interval that STAs can use when associating with this
469 * BSS. If a STA tries to use larger value, the association will be
470 * denied with status code 51.
471 */
472 u16 max_listen_interval;
473
474 int disable_pmksa_caching;
475 int okc; /* Opportunistic Key Caching */
476
477 int wps_state;
478 #ifdef CONFIG_WPS
479 int wps_independent;
480 int ap_setup_locked;
481 u8 uuid[16];
482 char *wps_pin_requests;
483 char *device_name;
484 char *manufacturer;
485 char *model_name;
486 char *model_number;
487 char *serial_number;
488 u8 device_type[WPS_DEV_TYPE_LEN];
489 char *config_methods;
490 u8 os_version[4];
491 char *ap_pin;
492 int skip_cred_build;
493 u8 *extra_cred;
494 size_t extra_cred_len;
495 int wps_cred_processing;
496 int wps_cred_add_sae;
497 int force_per_enrollee_psk;
498 u8 *ap_settings;
499 size_t ap_settings_len;
500 struct hostapd_ssid multi_ap_backhaul_ssid;
501 char *upnp_iface;
502 char *friendly_name;
503 char *manufacturer_url;
504 char *model_description;
505 char *model_url;
506 char *upc;
507 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS];
508 struct wpabuf *wps_application_ext;
509 int wps_nfc_pw_from_config;
510 int wps_nfc_dev_pw_id;
511 struct wpabuf *wps_nfc_dh_pubkey;
512 struct wpabuf *wps_nfc_dh_privkey;
513 struct wpabuf *wps_nfc_dev_pw;
514 #endif /* CONFIG_WPS */
515 int pbc_in_m1;
516 char *server_id;
517
518 #define P2P_ENABLED BIT(0)
519 #define P2P_GROUP_OWNER BIT(1)
520 #define P2P_GROUP_FORMATION BIT(2)
521 #define P2P_MANAGE BIT(3)
522 #define P2P_ALLOW_CROSS_CONNECTION BIT(4)
523 int p2p;
524 #ifdef CONFIG_P2P
525 u8 ip_addr_go[4];
526 u8 ip_addr_mask[4];
527 u8 ip_addr_start[4];
528 u8 ip_addr_end[4];
529 #endif /* CONFIG_P2P */
530
531 int disassoc_low_ack;
532 int skip_inactivity_poll;
533
534 #define TDLS_PROHIBIT BIT(0)
535 #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1)
536 int tdls;
537 bool disable_11n;
538 bool disable_11ac;
539 bool disable_11ax;
540
541 /* IEEE 802.11v */
542 int time_advertisement;
543 char *time_zone;
544 int wnm_sleep_mode;
545 int wnm_sleep_mode_no_keys;
546 int bss_transition;
547
548 /* IEEE 802.11u - Interworking */
549 int interworking;
550 int access_network_type;
551 int internet;
552 int asra;
553 int esr;
554 int uesa;
555 int venue_info_set;
556 u8 venue_group;
557 u8 venue_type;
558 u8 hessid[ETH_ALEN];
559
560 /* IEEE 802.11u - Roaming Consortium list */
561 unsigned int roaming_consortium_count;
562 struct hostapd_roaming_consortium *roaming_consortium;
563
564 /* IEEE 802.11u - Venue Name duples */
565 unsigned int venue_name_count;
566 struct hostapd_lang_string *venue_name;
567
568 /* Venue URL duples */
569 unsigned int venue_url_count;
570 struct hostapd_venue_url *venue_url;
571
572 /* IEEE 802.11u - Network Authentication Type */
573 u8 *network_auth_type;
574 size_t network_auth_type_len;
575
576 /* IEEE 802.11u - IP Address Type Availability */
577 u8 ipaddr_type_availability;
578 u8 ipaddr_type_configured;
579
580 /* IEEE 802.11u - 3GPP Cellular Network */
581 u8 *anqp_3gpp_cell_net;
582 size_t anqp_3gpp_cell_net_len;
583
584 /* IEEE 802.11u - Domain Name */
585 u8 *domain_name;
586 size_t domain_name_len;
587
588 unsigned int nai_realm_count;
589 struct hostapd_nai_realm_data *nai_realm_data;
590
591 struct dl_list anqp_elem; /* list of struct anqp_element */
592
593 u16 gas_comeback_delay;
594 size_t gas_frag_limit;
595 int gas_address3;
596
597 u8 qos_map_set[16 + 2 * 21];
598 unsigned int qos_map_set_len;
599
600 int osen;
601 int proxy_arp;
602 int na_mcast_to_ucast;
603
604 #ifdef CONFIG_HS20
605 int hs20;
606 int hs20_release;
607 int disable_dgaf;
608 u16 anqp_domain_id;
609 unsigned int hs20_oper_friendly_name_count;
610 struct hostapd_lang_string *hs20_oper_friendly_name;
611 u8 *hs20_wan_metrics;
612 u8 *hs20_connection_capability;
613 size_t hs20_connection_capability_len;
614 u8 *hs20_operating_class;
615 u8 hs20_operating_class_len;
616 struct hs20_icon {
617 u16 width;
618 u16 height;
619 char language[3];
620 char type[256];
621 char name[256];
622 char file[256];
623 } *hs20_icons;
624 size_t hs20_icons_count;
625 u8 osu_ssid[SSID_MAX_LEN];
626 size_t osu_ssid_len;
627 struct hs20_osu_provider {
628 unsigned int friendly_name_count;
629 struct hostapd_lang_string *friendly_name;
630 char *server_uri;
631 int *method_list;
632 char **icons;
633 size_t icons_count;
634 char *osu_nai;
635 char *osu_nai2;
636 unsigned int service_desc_count;
637 struct hostapd_lang_string *service_desc;
638 } *hs20_osu_providers, *last_osu;
639 size_t hs20_osu_providers_count;
640 size_t hs20_osu_providers_nai_count;
641 char **hs20_operator_icon;
642 size_t hs20_operator_icon_count;
643 unsigned int hs20_deauth_req_timeout;
644 char *subscr_remediation_url;
645 u8 subscr_remediation_method;
646 char *hs20_sim_provisioning_url;
647 char *t_c_filename;
648 u32 t_c_timestamp;
649 char *t_c_server_url;
650 #endif /* CONFIG_HS20 */
651
652 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */
653
654 #ifdef CONFIG_RADIUS_TEST
655 char *dump_msk_file;
656 #endif /* CONFIG_RADIUS_TEST */
657
658 struct wpabuf *vendor_elements;
659 struct wpabuf *assocresp_elements;
660
661 unsigned int anti_clogging_threshold;
662 unsigned int sae_sync;
663 int sae_require_mfp;
664 int sae_confirm_immediate;
665 int sae_pwe;
666 int *sae_groups;
667 struct sae_password_entry *sae_passwords;
668
669 char *wowlan_triggers; /* Wake-on-WLAN triggers */
670
671 #ifdef CONFIG_TESTING_OPTIONS
672 u8 bss_load_test[5];
673 u8 bss_load_test_set;
674 struct wpabuf *own_ie_override;
675 int sae_reflection_attack;
676 int sae_commit_status;
677 int sae_pk_omit;
678 int sae_pk_password_check_skip;
679 struct wpabuf *sae_commit_override;
680 struct wpabuf *rsne_override_eapol;
681 struct wpabuf *rsnxe_override_eapol;
682 struct wpabuf *rsne_override_ft;
683 struct wpabuf *rsnxe_override_ft;
684 struct wpabuf *gtk_rsc_override;
685 struct wpabuf *igtk_rsc_override;
686 int no_beacon_rsnxe;
687 int skip_prune_assoc;
688 int ft_rsnxe_used;
689 unsigned int oci_freq_override_eapol_m3;
690 unsigned int oci_freq_override_eapol_g1;
691 unsigned int oci_freq_override_saquery_req;
692 unsigned int oci_freq_override_saquery_resp;
693 unsigned int oci_freq_override_ft_assoc;
694 unsigned int oci_freq_override_fils_assoc;
695 unsigned int oci_freq_override_wnm_sleep;
696 #endif /* CONFIG_TESTING_OPTIONS */
697
698 #define MESH_ENABLED BIT(0)
699 int mesh;
700 int mesh_fwding;
701
702 u8 radio_measurements[RRM_CAPABILITIES_IE_LEN];
703
704 int vendor_vht;
705 int use_sta_nsts;
706
707 char *no_probe_resp_if_seen_on;
708 char *no_auth_if_seen_on;
709
710 int pbss;
711
712 #ifdef CONFIG_MBO
713 int mbo_enabled;
714 /**
715 * oce - Enable OCE in AP and/or STA-CFON mode
716 * - BIT(0) is Reserved
717 * - Set BIT(1) to enable OCE in STA-CFON mode
718 * - Set BIT(2) to enable OCE in AP mode
719 */
720 unsigned int oce;
721 int mbo_cell_data_conn_pref;
722 #endif /* CONFIG_MBO */
723
724 int ftm_responder;
725 int ftm_initiator;
726
727 #ifdef CONFIG_FILS
728 u8 fils_cache_id[FILS_CACHE_ID_LEN];
729 int fils_cache_id_set;
730 struct dl_list fils_realms; /* list of struct fils_realm */
731 int fils_dh_group;
732 struct hostapd_ip_addr dhcp_server;
733 int dhcp_rapid_commit_proxy;
734 unsigned int fils_hlp_wait_time;
735 u16 dhcp_server_port;
736 u16 dhcp_relay_port;
737 u32 fils_discovery_min_int;
738 u32 fils_discovery_max_int;
739 #endif /* CONFIG_FILS */
740
741 int multicast_to_unicast;
742
743 int broadcast_deauth;
744
745 int notify_mgmt_frames;
746
747 #ifdef CONFIG_DPP
748 char *dpp_name;
749 char *dpp_mud_url;
750 char *dpp_connector;
751 struct wpabuf *dpp_netaccesskey;
752 unsigned int dpp_netaccesskey_expiry;
753 struct wpabuf *dpp_csign;
754 #ifdef CONFIG_DPP2
755 struct dpp_controller_conf *dpp_controller;
756 int dpp_configurator_connectivity;
757 int dpp_pfs;
758 #endif /* CONFIG_DPP2 */
759 #endif /* CONFIG_DPP */
760
761 #ifdef CONFIG_OWE
762 macaddr owe_transition_bssid;
763 u8 owe_transition_ssid[SSID_MAX_LEN];
764 size_t owe_transition_ssid_len;
765 char owe_transition_ifname[IFNAMSIZ + 1];
766 int *owe_groups;
767 int owe_ptk_workaround;
768 #endif /* CONFIG_OWE */
769
770 int coloc_intf_reporting;
771
772 u8 send_probe_response;
773
774 u8 transition_disable;
775
776 #define BACKHAUL_BSS 1
777 #define FRONTHAUL_BSS 2
778 int multi_ap; /* bitmap of BACKHAUL_BSS, FRONTHAUL_BSS */
779
780 #ifdef CONFIG_AIRTIME_POLICY
781 unsigned int airtime_weight;
782 int airtime_limit;
783 struct airtime_sta_weight *airtime_weight_list;
784 #endif /* CONFIG_AIRTIME_POLICY */
785
786 #ifdef CONFIG_MACSEC
787 /**
788 * macsec_policy - Determines the policy for MACsec secure session
789 *
790 * 0: MACsec not in use (default)
791 * 1: MACsec enabled - Should secure, accept key server's advice to
792 * determine whether to use a secure session or not.
793 */
794 int macsec_policy;
795
796 /**
797 * macsec_integ_only - Determines how MACsec are transmitted
798 *
799 * This setting applies only when MACsec is in use, i.e.,
800 * - macsec_policy is enabled
801 * - the key server has decided to enable MACsec
802 *
803 * 0: Encrypt traffic (default)
804 * 1: Integrity only
805 */
806 int macsec_integ_only;
807
808 /**
809 * macsec_replay_protect - Enable MACsec replay protection
810 *
811 * This setting applies only when MACsec is in use, i.e.,
812 * - macsec_policy is enabled
813 * - the key server has decided to enable MACsec
814 *
815 * 0: Replay protection disabled (default)
816 * 1: Replay protection enabled
817 */
818 int macsec_replay_protect;
819
820 /**
821 * macsec_replay_window - MACsec replay protection window
822 *
823 * A window in which replay is tolerated, to allow receipt of frames
824 * that have been misordered by the network.
825 *
826 * This setting applies only when MACsec replay protection active, i.e.,
827 * - macsec_replay_protect is enabled
828 * - the key server has decided to enable MACsec
829 *
830 * 0: No replay window, strict check (default)
831 * 1..2^32-1: number of packets that could be misordered
832 */
833 u32 macsec_replay_window;
834
835 /**
836 * macsec_port - MACsec port (in SCI)
837 *
838 * Port component of the SCI.
839 *
840 * Range: 1-65534 (default: 1)
841 */
842 int macsec_port;
843
844 /**
845 * mka_priority - Priority of MKA Actor
846 *
847 * Range: 0-255 (default: 255)
848 */
849 int mka_priority;
850
851 /**
852 * mka_ckn - MKA pre-shared CKN
853 */
854 #define MACSEC_CKN_MAX_LEN 32
855 size_t mka_ckn_len;
856 u8 mka_ckn[MACSEC_CKN_MAX_LEN];
857
858 /**
859 * mka_cak - MKA pre-shared CAK
860 */
861 #define MACSEC_CAK_MAX_LEN 32
862 size_t mka_cak_len;
863 u8 mka_cak[MACSEC_CAK_MAX_LEN];
864
865 #define MKA_PSK_SET_CKN BIT(0)
866 #define MKA_PSK_SET_CAK BIT(1)
867 #define MKA_PSK_SET (MKA_PSK_SET_CKN | MKA_PSK_SET_CAK)
868 /**
869 * mka_psk_set - Whether mka_ckn and mka_cak are set
870 */
871 u8 mka_psk_set;
872 #endif /* CONFIG_MACSEC */
873
874 #ifdef CONFIG_PASN
875 #ifdef CONFIG_TESTING_OPTIONS
876 /*
877 * Normally, KDK should be derived if and only if both sides support
878 * secure LTF. Allow forcing KDK derivation for testing purposes.
879 */
880 int force_kdk_derivation;
881
882 /* If set, corrupt the MIC in the 2nd Authentication frame of PASN */
883 int pasn_corrupt_mic;
884 #endif /* CONFIG_TESTING_OPTIONS */
885
886 int *pasn_groups;
887
888 /*
889 * The time in TUs after which the non-AP STA is requested to retry the
890 * PASN authentication in case there are too many parallel operations.
891 */
892 u16 pasn_comeback_after;
893 #endif /* CONFIG_PASN */
894
895 unsigned int unsol_bcast_probe_resp_interval;
896
897 u8 ext_capa_mask[EXT_CAPA_MAX_LEN];
898 u8 ext_capa[EXT_CAPA_MAX_LEN];
899
900 u8 rnr;
901 };
902
903 /**
904 * struct he_phy_capabilities_info - HE PHY capabilities
905 */
906 struct he_phy_capabilities_info {
907 bool he_su_beamformer;
908 bool he_su_beamformee;
909 bool he_mu_beamformer;
910 };
911
912 /**
913 * struct he_operation - HE operation
914 */
915 struct he_operation {
916 u8 he_bss_color;
917 u8 he_bss_color_disabled;
918 u8 he_bss_color_partial;
919 u8 he_default_pe_duration;
920 u8 he_twt_required;
921 u8 he_twt_responder;
922 u16 he_rts_threshold;
923 u8 he_er_su_disable;
924 u16 he_basic_mcs_nss_set;
925 };
926
927 /**
928 * struct spatial_reuse - Spatial reuse
929 */
930 struct spatial_reuse {
931 u8 sr_control;
932 u8 non_srg_obss_pd_max_offset;
933 u8 srg_obss_pd_min_offset;
934 u8 srg_obss_pd_max_offset;
935 u8 srg_bss_color_bitmap[8];
936 u8 srg_partial_bssid_bitmap[8];
937 };
938
939 /**
940 * struct hostapd_config - Per-radio interface configuration
941 */
942 struct hostapd_config {
943 struct hostapd_bss_config **bss, *last_bss;
944 size_t num_bss;
945
946 u16 beacon_int;
947 int rts_threshold;
948 int fragm_threshold;
949 u8 op_class;
950 u8 channel;
951 int enable_edmg;
952 u8 edmg_channel;
953 u8 acs;
954 struct wpa_freq_range_list acs_ch_list;
955 struct wpa_freq_range_list acs_freq_list;
956 u8 acs_freq_list_present;
957 int acs_exclude_dfs;
958 u8 min_tx_power;
959 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */
960 int acs_exclude_6ghz_non_psc;
961 enum {
962 LONG_PREAMBLE = 0,
963 SHORT_PREAMBLE = 1
964 } preamble;
965
966 int *supported_rates;
967 int *basic_rates;
968 unsigned int beacon_rate;
969 enum beacon_rate_type rate_type;
970
971 const struct wpa_driver_ops *driver;
972 char *driver_params;
973
974 int ap_table_max_size;
975 int ap_table_expiration_time;
976
977 unsigned int track_sta_max_num;
978 unsigned int track_sta_max_age;
979
980 char country[3]; /* first two octets: country code as described in
981 * ISO/IEC 3166-1. Third octet:
982 * ' ' (ascii 32): all environments
983 * 'O': Outdoor environemnt only
984 * 'I': Indoor environment only
985 * 'X': Used with noncountry entity ("XXX")
986 * 0x00..0x31: identifying IEEE 802.11 standard
987 * Annex E table (0x04 = global table)
988 */
989
990 int ieee80211d;
991
992 int ieee80211h; /* DFS */
993
994 /*
995 * Local power constraint is an octet encoded as an unsigned integer in
996 * units of decibels. Invalid value -1 indicates that Power Constraint
997 * element will not be added.
998 */
999 int local_pwr_constraint;
1000
1001 /* Control Spectrum Management bit */
1002 int spectrum_mgmt_required;
1003
1004 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES];
1005
1006 /*
1007 * WMM AC parameters, in same order as 802.1D, i.e.
1008 * 0 = BE (best effort)
1009 * 1 = BK (background)
1010 * 2 = VI (video)
1011 * 3 = VO (voice)
1012 */
1013 struct hostapd_wmm_ac_params wmm_ac_params[4];
1014
1015 int ht_op_mode_fixed;
1016 u16 ht_capab;
1017 int ieee80211n;
1018 int secondary_channel;
1019 int no_pri_sec_switch;
1020 int require_ht;
1021 int obss_interval;
1022 u32 vht_capab;
1023 int ieee80211ac;
1024 int require_vht;
1025 u8 vht_oper_chwidth;
1026 u8 vht_oper_centr_freq_seg0_idx;
1027 u8 vht_oper_centr_freq_seg1_idx;
1028 u8 ht40_plus_minus_allowed;
1029
1030 /* Use driver-generated interface addresses when adding multiple BSSs */
1031 u8 use_driver_iface_addr;
1032
1033 #ifdef CONFIG_FST
1034 struct fst_iface_cfg fst_cfg;
1035 #endif /* CONFIG_FST */
1036
1037 #ifdef CONFIG_P2P
1038 u8 p2p_go_ctwindow;
1039 #endif /* CONFIG_P2P */
1040
1041 #ifdef CONFIG_TESTING_OPTIONS
1042 double ignore_probe_probability;
1043 double ignore_auth_probability;
1044 double ignore_assoc_probability;
1045 double ignore_reassoc_probability;
1046 double corrupt_gtk_rekey_mic_probability;
1047 int ecsa_ie_only;
1048 #endif /* CONFIG_TESTING_OPTIONS */
1049
1050 #ifdef CONFIG_ACS
1051 unsigned int acs_num_scans;
1052 struct acs_bias {
1053 int channel;
1054 double bias;
1055 } *acs_chan_bias;
1056 unsigned int num_acs_chan_bias;
1057 #endif /* CONFIG_ACS */
1058
1059 struct wpabuf *lci;
1060 struct wpabuf *civic;
1061 int stationary_ap;
1062
1063 int ieee80211ax;
1064 #ifdef CONFIG_IEEE80211AX
1065 struct he_phy_capabilities_info he_phy_capab;
1066 struct he_operation he_op;
1067 struct ieee80211_he_mu_edca_parameter_set he_mu_edca;
1068 struct spatial_reuse spr;
1069 u8 he_oper_chwidth;
1070 u8 he_oper_centr_freq_seg0_idx;
1071 u8 he_oper_centr_freq_seg1_idx;
1072 u8 he_6ghz_max_mpdu;
1073 u8 he_6ghz_max_ampdu_len_exp;
1074 u8 he_6ghz_rx_ant_pat;
1075 u8 he_6ghz_tx_ant_pat;
1076 #endif /* CONFIG_IEEE80211AX */
1077
1078 /* VHT enable/disable config from CHAN_SWITCH */
1079 #define CH_SWITCH_VHT_ENABLED BIT(0)
1080 #define CH_SWITCH_VHT_DISABLED BIT(1)
1081 unsigned int ch_switch_vht_config;
1082
1083 /* HE enable/disable config from CHAN_SWITCH */
1084 #define CH_SWITCH_HE_ENABLED BIT(0)
1085 #define CH_SWITCH_HE_DISABLED BIT(1)
1086 unsigned int ch_switch_he_config;
1087
1088 int rssi_reject_assoc_rssi;
1089 int rssi_reject_assoc_timeout;
1090 int rssi_ignore_probe_request;
1091
1092 #ifdef CONFIG_AIRTIME_POLICY
1093 enum {
1094 AIRTIME_MODE_OFF = 0,
1095 AIRTIME_MODE_STATIC = 1,
1096 AIRTIME_MODE_DYNAMIC = 2,
1097 AIRTIME_MODE_LIMIT = 3,
1098 __AIRTIME_MODE_MAX,
1099 } airtime_mode;
1100 unsigned int airtime_update_interval;
1101 #define AIRTIME_MODE_MAX (__AIRTIME_MODE_MAX - 1)
1102 #endif /* CONFIG_AIRTIME_POLICY */
1103 };
1104
1105
hostapd_get_oper_chwidth(struct hostapd_config * conf)1106 static inline u8 hostapd_get_oper_chwidth(struct hostapd_config *conf)
1107 {
1108 #ifdef CONFIG_IEEE80211AX
1109 if (conf->ieee80211ax)
1110 return conf->he_oper_chwidth;
1111 #endif /* CONFIG_IEEE80211AX */
1112 return conf->vht_oper_chwidth;
1113 }
1114
1115 static inline void
hostapd_set_oper_chwidth(struct hostapd_config * conf,u8 oper_chwidth)1116 hostapd_set_oper_chwidth(struct hostapd_config *conf, u8 oper_chwidth)
1117 {
1118 #ifdef CONFIG_IEEE80211AX
1119 if (conf->ieee80211ax)
1120 conf->he_oper_chwidth = oper_chwidth;
1121 #endif /* CONFIG_IEEE80211AX */
1122 conf->vht_oper_chwidth = oper_chwidth;
1123 }
1124
1125 static inline u8
hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config * conf)1126 hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config *conf)
1127 {
1128 #ifdef CONFIG_IEEE80211AX
1129 if (conf->ieee80211ax)
1130 return conf->he_oper_centr_freq_seg0_idx;
1131 #endif /* CONFIG_IEEE80211AX */
1132 return conf->vht_oper_centr_freq_seg0_idx;
1133 }
1134
1135 static inline void
hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config * conf,u8 oper_centr_freq_seg0_idx)1136 hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config *conf,
1137 u8 oper_centr_freq_seg0_idx)
1138 {
1139 #ifdef CONFIG_IEEE80211AX
1140 if (conf->ieee80211ax)
1141 conf->he_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
1142 #endif /* CONFIG_IEEE80211AX */
1143 conf->vht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
1144 }
1145
1146 static inline u8
hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config * conf)1147 hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config *conf)
1148 {
1149 #ifdef CONFIG_IEEE80211AX
1150 if (conf->ieee80211ax)
1151 return conf->he_oper_centr_freq_seg1_idx;
1152 #endif /* CONFIG_IEEE80211AX */
1153 return conf->vht_oper_centr_freq_seg1_idx;
1154 }
1155
1156 static inline void
hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config * conf,u8 oper_centr_freq_seg1_idx)1157 hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config *conf,
1158 u8 oper_centr_freq_seg1_idx)
1159 {
1160 #ifdef CONFIG_IEEE80211AX
1161 if (conf->ieee80211ax)
1162 conf->he_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
1163 #endif /* CONFIG_IEEE80211AX */
1164 conf->vht_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
1165 }
1166
1167
1168 int hostapd_mac_comp(const void *a, const void *b);
1169 struct hostapd_config * hostapd_config_defaults(void);
1170 void hostapd_config_defaults_bss(struct hostapd_bss_config *bss);
1171 void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr);
1172 void hostapd_config_free_eap_user(struct hostapd_eap_user *user);
1173 void hostapd_config_free_eap_users(struct hostapd_eap_user *user);
1174 void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p);
1175 void hostapd_config_free_bss(struct hostapd_bss_config *conf);
1176 void hostapd_config_free(struct hostapd_config *conf);
1177 int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
1178 const u8 *addr, struct vlan_description *vlan_id);
1179 int hostapd_rate_found(int *list, int rate);
1180 const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
1181 const u8 *addr, const u8 *p2p_dev_addr,
1182 const u8 *prev_psk, int *vlan_id);
1183 int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf);
1184 int hostapd_vlan_valid(struct hostapd_vlan *vlan,
1185 struct vlan_description *vlan_desc);
1186 const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan,
1187 int vlan_id);
1188 struct hostapd_radius_attr *
1189 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type);
1190 struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value);
1191 int hostapd_config_check(struct hostapd_config *conf, int full_config);
1192 void hostapd_set_security_params(struct hostapd_bss_config *bss,
1193 int full_config);
1194 int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf);
1195 bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf);
1196 bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf);
1197 int hostapd_setup_sae_pt(struct hostapd_bss_config *conf);
1198
1199 #endif /* HOSTAPD_CONFIG_H */
1200