ap_config.h revision 5460547a121207cf7a99eac45e05fcdd83be3161
1/* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#ifndef HOSTAPD_CONFIG_H 10#define HOSTAPD_CONFIG_H 11 12#include "common/defs.h" 13#include "ip_addr.h" 14#include "common/wpa_common.h" 15#include "common/ieee802_11_common.h" 16#include "wps/wps.h" 17 18#define MAX_STA_COUNT 2007 19#define MAX_VLAN_ID 4094 20 21typedef u8 macaddr[ETH_ALEN]; 22 23struct mac_acl_entry { 24 macaddr addr; 25 int vlan_id; 26}; 27 28struct hostapd_radius_servers; 29struct ft_remote_r0kh; 30struct ft_remote_r1kh; 31 32#define HOSTAPD_MAX_SSID_LEN 32 33 34#define NUM_WEP_KEYS 4 35struct hostapd_wep_keys { 36 u8 idx; 37 u8 *key[NUM_WEP_KEYS]; 38 size_t len[NUM_WEP_KEYS]; 39 int keys_set; 40 size_t default_len; /* key length used for dynamic key generation */ 41}; 42 43typedef enum hostap_security_policy { 44 SECURITY_PLAINTEXT = 0, 45 SECURITY_STATIC_WEP = 1, 46 SECURITY_IEEE_802_1X = 2, 47 SECURITY_WPA_PSK = 3, 48 SECURITY_WPA = 4 49} secpolicy; 50 51struct hostapd_ssid { 52 u8 ssid[HOSTAPD_MAX_SSID_LEN]; 53 size_t ssid_len; 54 unsigned int ssid_set:1; 55 unsigned int utf8_ssid:1; 56 unsigned int wpa_passphrase_set:1; 57 unsigned int wpa_psk_set:1; 58 59 char vlan[IFNAMSIZ + 1]; 60 secpolicy security_policy; 61 62 struct hostapd_wpa_psk *wpa_psk; 63 char *wpa_passphrase; 64 char *wpa_psk_file; 65 66 struct hostapd_wep_keys wep; 67 68#define DYNAMIC_VLAN_DISABLED 0 69#define DYNAMIC_VLAN_OPTIONAL 1 70#define DYNAMIC_VLAN_REQUIRED 2 71 int dynamic_vlan; 72#define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 73#define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 74#define DYNAMIC_VLAN_NAMING_END 2 75 int vlan_naming; 76#ifdef CONFIG_FULL_DYNAMIC_VLAN 77 char *vlan_tagged_interface; 78#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 79}; 80 81 82#define VLAN_ID_WILDCARD -1 83 84struct hostapd_vlan { 85 struct hostapd_vlan *next; 86 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 87 char ifname[IFNAMSIZ + 1]; 88 int dynamic_vlan; 89#ifdef CONFIG_FULL_DYNAMIC_VLAN 90 91#define DVLAN_CLEAN_BR 0x1 92#define DVLAN_CLEAN_VLAN 0x2 93#define DVLAN_CLEAN_VLAN_PORT 0x4 94#define DVLAN_CLEAN_WLAN_PORT 0x8 95 int clean; 96#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 97}; 98 99#define PMK_LEN 32 100struct hostapd_sta_wpa_psk_short { 101 struct hostapd_sta_wpa_psk_short *next; 102 u8 psk[PMK_LEN]; 103}; 104 105struct hostapd_wpa_psk { 106 struct hostapd_wpa_psk *next; 107 int group; 108 u8 psk[PMK_LEN]; 109 u8 addr[ETH_ALEN]; 110 u8 p2p_dev_addr[ETH_ALEN]; 111}; 112 113struct hostapd_eap_user { 114 struct hostapd_eap_user *next; 115 u8 *identity; 116 size_t identity_len; 117 struct { 118 int vendor; 119 u32 method; 120 } methods[EAP_MAX_METHODS]; 121 u8 *password; 122 size_t password_len; 123 int phase2; 124 int force_version; 125 unsigned int wildcard_prefix:1; 126 unsigned int password_hash:1; /* whether password is hashed with 127 * nt_password_hash() */ 128 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 129}; 130 131struct hostapd_radius_attr { 132 u8 type; 133 struct wpabuf *val; 134 struct hostapd_radius_attr *next; 135}; 136 137 138#define NUM_TX_QUEUES 4 139 140struct hostapd_tx_queue_params { 141 int aifs; 142 int cwmin; 143 int cwmax; 144 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 145}; 146 147 148#define MAX_ROAMING_CONSORTIUM_LEN 15 149 150struct hostapd_roaming_consortium { 151 u8 len; 152 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 153}; 154 155struct hostapd_lang_string { 156 u8 lang[3]; 157 u8 name_len; 158 u8 name[252]; 159}; 160 161#define MAX_NAI_REALMS 10 162#define MAX_NAI_REALMLEN 255 163#define MAX_NAI_EAP_METHODS 5 164#define MAX_NAI_AUTH_TYPES 4 165struct hostapd_nai_realm_data { 166 u8 encoding; 167 char realm_buf[MAX_NAI_REALMLEN + 1]; 168 char *realm[MAX_NAI_REALMS]; 169 u8 eap_method_count; 170 struct hostapd_nai_realm_eap { 171 u8 eap_method; 172 u8 num_auths; 173 u8 auth_id[MAX_NAI_AUTH_TYPES]; 174 u8 auth_val[MAX_NAI_AUTH_TYPES]; 175 } eap_method[MAX_NAI_EAP_METHODS]; 176}; 177 178/** 179 * struct hostapd_bss_config - Per-BSS configuration 180 */ 181struct hostapd_bss_config { 182 char iface[IFNAMSIZ + 1]; 183 char bridge[IFNAMSIZ + 1]; 184 char vlan_bridge[IFNAMSIZ + 1]; 185 char wds_bridge[IFNAMSIZ + 1]; 186 187 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 188 189 unsigned int logger_syslog; /* module bitfield */ 190 unsigned int logger_stdout; /* module bitfield */ 191 192 char *dump_log_name; /* file name for state dump (SIGUSR1) */ 193 194 int max_num_sta; /* maximum number of STAs in station table */ 195 196 int dtim_period; 197 198 int ieee802_1x; /* use IEEE 802.1X */ 199 int eapol_version; 200 int eap_server; /* Use internal EAP server instead of external 201 * RADIUS server */ 202 struct hostapd_eap_user *eap_user; 203 char *eap_user_sqlite; 204 char *eap_sim_db; 205 struct hostapd_ip_addr own_ip_addr; 206 char *nas_identifier; 207 struct hostapd_radius_servers *radius; 208 int acct_interim_interval; 209 int radius_request_cui; 210 struct hostapd_radius_attr *radius_auth_req_attr; 211 struct hostapd_radius_attr *radius_acct_req_attr; 212 int radius_das_port; 213 unsigned int radius_das_time_window; 214 int radius_das_require_event_timestamp; 215 struct hostapd_ip_addr radius_das_client_addr; 216 u8 *radius_das_shared_secret; 217 size_t radius_das_shared_secret_len; 218 219 struct hostapd_ssid ssid; 220 221 char *eap_req_id_text; /* optional displayable message sent with 222 * EAP Request-Identity */ 223 size_t eap_req_id_text_len; 224 int eapol_key_index_workaround; 225 226 size_t default_wep_key_len; 227 int individual_wep_key_len; 228 int wep_rekeying_period; 229 int broadcast_key_idx_min, broadcast_key_idx_max; 230 int eap_reauth_period; 231 232 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 233 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 234 * frames */ 235 236 enum { 237 ACCEPT_UNLESS_DENIED = 0, 238 DENY_UNLESS_ACCEPTED = 1, 239 USE_EXTERNAL_RADIUS_AUTH = 2 240 } macaddr_acl; 241 struct mac_acl_entry *accept_mac; 242 int num_accept_mac; 243 struct mac_acl_entry *deny_mac; 244 int num_deny_mac; 245 int wds_sta; 246 int isolate; 247 int start_disabled; 248 249 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 250 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 251 252 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 253 int wpa_key_mgmt; 254#ifdef CONFIG_IEEE80211W 255 enum mfp_options ieee80211w; 256 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 257 unsigned int assoc_sa_query_max_timeout; 258 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 259 int assoc_sa_query_retry_timeout; 260#endif /* CONFIG_IEEE80211W */ 261 enum { 262 PSK_RADIUS_IGNORED = 0, 263 PSK_RADIUS_ACCEPTED = 1, 264 PSK_RADIUS_REQUIRED = 2 265 } wpa_psk_radius; 266 int wpa_pairwise; 267 int wpa_group; 268 int wpa_group_rekey; 269 int wpa_strict_rekey; 270 int wpa_gmk_rekey; 271 int wpa_ptk_rekey; 272 int rsn_pairwise; 273 int rsn_preauth; 274 char *rsn_preauth_interfaces; 275 int peerkey; 276 277#ifdef CONFIG_IEEE80211R 278 /* IEEE 802.11r - Fast BSS Transition */ 279 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 280 u8 r1_key_holder[FT_R1KH_ID_LEN]; 281 u32 r0_key_lifetime; 282 u32 reassociation_deadline; 283 struct ft_remote_r0kh *r0kh_list; 284 struct ft_remote_r1kh *r1kh_list; 285 int pmk_r1_push; 286 int ft_over_ds; 287#endif /* CONFIG_IEEE80211R */ 288 289 char *ctrl_interface; /* directory for UNIX domain sockets */ 290#ifndef CONFIG_NATIVE_WINDOWS 291 gid_t ctrl_interface_gid; 292#endif /* CONFIG_NATIVE_WINDOWS */ 293 int ctrl_interface_gid_set; 294 295 char *ca_cert; 296 char *server_cert; 297 char *private_key; 298 char *private_key_passwd; 299 int check_crl; 300 char *ocsp_stapling_response; 301 char *dh_file; 302 u8 *pac_opaque_encr_key; 303 u8 *eap_fast_a_id; 304 size_t eap_fast_a_id_len; 305 char *eap_fast_a_id_info; 306 int eap_fast_prov; 307 int pac_key_lifetime; 308 int pac_key_refresh_time; 309 int eap_sim_aka_result_ind; 310 int tnc; 311 int fragment_size; 312 u16 pwd_group; 313 314 char *radius_server_clients; 315 int radius_server_auth_port; 316 int radius_server_ipv6; 317 318 char *test_socket; /* UNIX domain socket path for driver_test */ 319 320 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 321 * address instead of individual address 322 * (for driver_wired.c). 323 */ 324 325 int ap_max_inactivity; 326 int ignore_broadcast_ssid; 327 328 int wmm_enabled; 329 int wmm_uapsd; 330 331 struct hostapd_vlan *vlan; 332 333 macaddr bssid; 334 335 /* 336 * Maximum listen interval that STAs can use when associating with this 337 * BSS. If a STA tries to use larger value, the association will be 338 * denied with status code 51. 339 */ 340 u16 max_listen_interval; 341 342 int disable_pmksa_caching; 343 int okc; /* Opportunistic Key Caching */ 344 345 int wps_state; 346#ifdef CONFIG_WPS 347 int wps_independent; 348 int ap_setup_locked; 349 u8 uuid[16]; 350 char *wps_pin_requests; 351 char *device_name; 352 char *manufacturer; 353 char *model_name; 354 char *model_number; 355 char *serial_number; 356 u8 device_type[WPS_DEV_TYPE_LEN]; 357 char *config_methods; 358 u8 os_version[4]; 359 char *ap_pin; 360 int skip_cred_build; 361 u8 *extra_cred; 362 size_t extra_cred_len; 363 int wps_cred_processing; 364 int force_per_enrollee_psk; 365 u8 *ap_settings; 366 size_t ap_settings_len; 367 char *upnp_iface; 368 char *friendly_name; 369 char *manufacturer_url; 370 char *model_description; 371 char *model_url; 372 char *upc; 373 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 374 int wps_nfc_pw_from_config; 375 int wps_nfc_dev_pw_id; 376 struct wpabuf *wps_nfc_dh_pubkey; 377 struct wpabuf *wps_nfc_dh_privkey; 378 struct wpabuf *wps_nfc_dev_pw; 379#endif /* CONFIG_WPS */ 380 int pbc_in_m1; 381 char *server_id; 382 383#define P2P_ENABLED BIT(0) 384#define P2P_GROUP_OWNER BIT(1) 385#define P2P_GROUP_FORMATION BIT(2) 386#define P2P_MANAGE BIT(3) 387#define P2P_ALLOW_CROSS_CONNECTION BIT(4) 388 int p2p; 389 390 int disassoc_low_ack; 391 int skip_inactivity_poll; 392 393#define TDLS_PROHIBIT BIT(0) 394#define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 395 int tdls; 396 int disable_11n; 397 int disable_11ac; 398 399 /* IEEE 802.11v */ 400 int time_advertisement; 401 char *time_zone; 402 int wnm_sleep_mode; 403 int bss_transition; 404 405 /* IEEE 802.11u - Interworking */ 406 int interworking; 407 int access_network_type; 408 int internet; 409 int asra; 410 int esr; 411 int uesa; 412 int venue_info_set; 413 u8 venue_group; 414 u8 venue_type; 415 u8 hessid[ETH_ALEN]; 416 417 /* IEEE 802.11u - Roaming Consortium list */ 418 unsigned int roaming_consortium_count; 419 struct hostapd_roaming_consortium *roaming_consortium; 420 421 /* IEEE 802.11u - Venue Name duples */ 422 unsigned int venue_name_count; 423 struct hostapd_lang_string *venue_name; 424 425 /* IEEE 802.11u - Network Authentication Type */ 426 u8 *network_auth_type; 427 size_t network_auth_type_len; 428 429 /* IEEE 802.11u - IP Address Type Availability */ 430 u8 ipaddr_type_availability; 431 u8 ipaddr_type_configured; 432 433 /* IEEE 802.11u - 3GPP Cellular Network */ 434 u8 *anqp_3gpp_cell_net; 435 size_t anqp_3gpp_cell_net_len; 436 437 /* IEEE 802.11u - Domain Name */ 438 u8 *domain_name; 439 size_t domain_name_len; 440 441 unsigned int nai_realm_count; 442 struct hostapd_nai_realm_data *nai_realm_data; 443 444 u16 gas_comeback_delay; 445 int gas_frag_limit; 446 447 u8 qos_map_set[16 + 2 * 21]; 448 unsigned int qos_map_set_len; 449 450#ifdef CONFIG_HS20 451 int hs20; 452 int disable_dgaf; 453 unsigned int hs20_oper_friendly_name_count; 454 struct hostapd_lang_string *hs20_oper_friendly_name; 455 u8 *hs20_wan_metrics; 456 u8 *hs20_connection_capability; 457 size_t hs20_connection_capability_len; 458 u8 *hs20_operating_class; 459 u8 hs20_operating_class_len; 460#endif /* CONFIG_HS20 */ 461 462 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 463 464#ifdef CONFIG_RADIUS_TEST 465 char *dump_msk_file; 466#endif /* CONFIG_RADIUS_TEST */ 467 468 struct wpabuf *vendor_elements; 469 470 unsigned int sae_anti_clogging_threshold; 471 int *sae_groups; 472 473#ifdef CONFIG_TESTING_OPTIONS 474 u8 bss_load_test[5]; 475 u8 bss_load_test_set; 476#endif /* CONFIG_TESTING_OPTIONS */ 477}; 478 479 480/** 481 * struct hostapd_config - Per-radio interface configuration 482 */ 483struct hostapd_config { 484 struct hostapd_bss_config **bss, *last_bss; 485 size_t num_bss; 486 487 u16 beacon_int; 488 int rts_threshold; 489 int fragm_threshold; 490 u8 send_probe_response; 491 u8 channel; 492 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 493 enum { 494 LONG_PREAMBLE = 0, 495 SHORT_PREAMBLE = 1 496 } preamble; 497 498 int *supported_rates; 499 int *basic_rates; 500 501 const struct wpa_driver_ops *driver; 502 503 int ap_table_max_size; 504 int ap_table_expiration_time; 505 506 char country[3]; /* first two octets: country code as described in 507 * ISO/IEC 3166-1. Third octet: 508 * ' ' (ascii 32): all environments 509 * 'O': Outdoor environemnt only 510 * 'I': Indoor environment only 511 */ 512 513 int ieee80211d; 514 515 int ieee80211h; /* DFS */ 516 517 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 518 519 /* 520 * WMM AC parameters, in same order as 802.1D, i.e. 521 * 0 = BE (best effort) 522 * 1 = BK (background) 523 * 2 = VI (video) 524 * 3 = VO (voice) 525 */ 526 struct hostapd_wmm_ac_params wmm_ac_params[4]; 527 528 int ht_op_mode_fixed; 529 u16 ht_capab; 530 int ieee80211n; 531 int secondary_channel; 532 int require_ht; 533 int obss_interval; 534 u32 vht_capab; 535 int ieee80211ac; 536 int require_vht; 537 u8 vht_oper_chwidth; 538 u8 vht_oper_centr_freq_seg0_idx; 539 u8 vht_oper_centr_freq_seg1_idx; 540 541#ifdef CONFIG_TESTING_OPTIONS 542 double ignore_probe_probability; 543 double ignore_auth_probability; 544 double ignore_assoc_probability; 545 double ignore_reassoc_probability; 546 double corrupt_gtk_rekey_mic_probability; 547#endif /* CONFIG_TESTING_OPTIONS */ 548 549#ifdef CONFIG_ACS 550 unsigned int acs_num_scans; 551#endif /* CONFIG_ACS */ 552}; 553 554 555int hostapd_mac_comp(const void *a, const void *b); 556int hostapd_mac_comp_empty(const void *a); 557struct hostapd_config * hostapd_config_defaults(void); 558void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 559void hostapd_config_free_bss(struct hostapd_bss_config *conf); 560void hostapd_config_free(struct hostapd_config *conf); 561int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 562 const u8 *addr, int *vlan_id); 563int hostapd_rate_found(int *list, int rate); 564int hostapd_wep_key_cmp(struct hostapd_wep_keys *a, 565 struct hostapd_wep_keys *b); 566const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 567 const u8 *addr, const u8 *p2p_dev_addr, 568 const u8 *prev_psk); 569int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 570int hostapd_vlan_id_valid(struct hostapd_vlan *vlan, int vlan_id); 571const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 572 int vlan_id); 573struct hostapd_radius_attr * 574hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 575int hostapd_config_check(struct hostapd_config *conf); 576void hostapd_set_security_params(struct hostapd_bss_config *bss); 577 578#endif /* HOSTAPD_CONFIG_H */ 579