ap_config.h revision 9866086a955d00e237cc8df3722e7dff75c02532
1/* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#ifndef HOSTAPD_CONFIG_H 10#define HOSTAPD_CONFIG_H 11 12#include "common/defs.h" 13#include "ip_addr.h" 14#include "common/wpa_common.h" 15#include "common/ieee802_11_common.h" 16#include "wps/wps.h" 17 18#define MAX_STA_COUNT 2007 19#define MAX_VLAN_ID 4094 20 21typedef u8 macaddr[ETH_ALEN]; 22 23struct mac_acl_entry { 24 macaddr addr; 25 int vlan_id; 26}; 27 28struct hostapd_radius_servers; 29struct ft_remote_r0kh; 30struct ft_remote_r1kh; 31 32#define HOSTAPD_MAX_SSID_LEN 32 33 34#define NUM_WEP_KEYS 4 35struct hostapd_wep_keys { 36 u8 idx; 37 u8 *key[NUM_WEP_KEYS]; 38 size_t len[NUM_WEP_KEYS]; 39 int keys_set; 40 size_t default_len; /* key length used for dynamic key generation */ 41}; 42 43typedef enum hostap_security_policy { 44 SECURITY_PLAINTEXT = 0, 45 SECURITY_STATIC_WEP = 1, 46 SECURITY_IEEE_802_1X = 2, 47 SECURITY_WPA_PSK = 3, 48 SECURITY_WPA = 4, 49 SECURITY_OSEN = 5 50} secpolicy; 51 52struct hostapd_ssid { 53 u8 ssid[HOSTAPD_MAX_SSID_LEN]; 54 size_t ssid_len; 55 unsigned int ssid_set:1; 56 unsigned int utf8_ssid:1; 57 unsigned int wpa_passphrase_set:1; 58 unsigned int wpa_psk_set:1; 59 60 char vlan[IFNAMSIZ + 1]; 61 secpolicy security_policy; 62 63 struct hostapd_wpa_psk *wpa_psk; 64 char *wpa_passphrase; 65 char *wpa_psk_file; 66 67 struct hostapd_wep_keys wep; 68 69#define DYNAMIC_VLAN_DISABLED 0 70#define DYNAMIC_VLAN_OPTIONAL 1 71#define DYNAMIC_VLAN_REQUIRED 2 72 int dynamic_vlan; 73#define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 74#define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 75#define DYNAMIC_VLAN_NAMING_END 2 76 int vlan_naming; 77#ifdef CONFIG_FULL_DYNAMIC_VLAN 78 char *vlan_tagged_interface; 79#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 80}; 81 82 83#define VLAN_ID_WILDCARD -1 84 85struct hostapd_vlan { 86 struct hostapd_vlan *next; 87 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 88 char ifname[IFNAMSIZ + 1]; 89 int dynamic_vlan; 90#ifdef CONFIG_FULL_DYNAMIC_VLAN 91 92#define DVLAN_CLEAN_BR 0x1 93#define DVLAN_CLEAN_VLAN 0x2 94#define DVLAN_CLEAN_VLAN_PORT 0x4 95#define DVLAN_CLEAN_WLAN_PORT 0x8 96 int clean; 97#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 98}; 99 100#define PMK_LEN 32 101struct hostapd_sta_wpa_psk_short { 102 struct hostapd_sta_wpa_psk_short *next; 103 u8 psk[PMK_LEN]; 104}; 105 106struct hostapd_wpa_psk { 107 struct hostapd_wpa_psk *next; 108 int group; 109 u8 psk[PMK_LEN]; 110 u8 addr[ETH_ALEN]; 111 u8 p2p_dev_addr[ETH_ALEN]; 112}; 113 114struct hostapd_eap_user { 115 struct hostapd_eap_user *next; 116 u8 *identity; 117 size_t identity_len; 118 struct { 119 int vendor; 120 u32 method; 121 } methods[EAP_MAX_METHODS]; 122 u8 *password; 123 size_t password_len; 124 int phase2; 125 int force_version; 126 unsigned int wildcard_prefix:1; 127 unsigned int password_hash:1; /* whether password is hashed with 128 * nt_password_hash() */ 129 unsigned int remediation:1; 130 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 131 struct hostapd_radius_attr *accept_attr; 132}; 133 134struct hostapd_radius_attr { 135 u8 type; 136 struct wpabuf *val; 137 struct hostapd_radius_attr *next; 138}; 139 140 141#define NUM_TX_QUEUES 4 142 143struct hostapd_tx_queue_params { 144 int aifs; 145 int cwmin; 146 int cwmax; 147 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 148}; 149 150 151#define MAX_ROAMING_CONSORTIUM_LEN 15 152 153struct hostapd_roaming_consortium { 154 u8 len; 155 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 156}; 157 158struct hostapd_lang_string { 159 u8 lang[3]; 160 u8 name_len; 161 u8 name[252]; 162}; 163 164#define MAX_NAI_REALMS 10 165#define MAX_NAI_REALMLEN 255 166#define MAX_NAI_EAP_METHODS 5 167#define MAX_NAI_AUTH_TYPES 4 168struct hostapd_nai_realm_data { 169 u8 encoding; 170 char realm_buf[MAX_NAI_REALMLEN + 1]; 171 char *realm[MAX_NAI_REALMS]; 172 u8 eap_method_count; 173 struct hostapd_nai_realm_eap { 174 u8 eap_method; 175 u8 num_auths; 176 u8 auth_id[MAX_NAI_AUTH_TYPES]; 177 u8 auth_val[MAX_NAI_AUTH_TYPES]; 178 } eap_method[MAX_NAI_EAP_METHODS]; 179}; 180 181/** 182 * struct hostapd_bss_config - Per-BSS configuration 183 */ 184struct hostapd_bss_config { 185 char iface[IFNAMSIZ + 1]; 186 char bridge[IFNAMSIZ + 1]; 187 char vlan_bridge[IFNAMSIZ + 1]; 188 char wds_bridge[IFNAMSIZ + 1]; 189 190 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 191 192 unsigned int logger_syslog; /* module bitfield */ 193 unsigned int logger_stdout; /* module bitfield */ 194 195 int max_num_sta; /* maximum number of STAs in station table */ 196 197 int dtim_period; 198 199 int ieee802_1x; /* use IEEE 802.1X */ 200 int eapol_version; 201 int eap_server; /* Use internal EAP server instead of external 202 * RADIUS server */ 203 struct hostapd_eap_user *eap_user; 204 char *eap_user_sqlite; 205 char *eap_sim_db; 206 struct hostapd_ip_addr own_ip_addr; 207 char *nas_identifier; 208 struct hostapd_radius_servers *radius; 209 int acct_interim_interval; 210 int radius_request_cui; 211 struct hostapd_radius_attr *radius_auth_req_attr; 212 struct hostapd_radius_attr *radius_acct_req_attr; 213 int radius_das_port; 214 unsigned int radius_das_time_window; 215 int radius_das_require_event_timestamp; 216 struct hostapd_ip_addr radius_das_client_addr; 217 u8 *radius_das_shared_secret; 218 size_t radius_das_shared_secret_len; 219 220 struct hostapd_ssid ssid; 221 222 char *eap_req_id_text; /* optional displayable message sent with 223 * EAP Request-Identity */ 224 size_t eap_req_id_text_len; 225 int eapol_key_index_workaround; 226 227 size_t default_wep_key_len; 228 int individual_wep_key_len; 229 int wep_rekeying_period; 230 int broadcast_key_idx_min, broadcast_key_idx_max; 231 int eap_reauth_period; 232 233 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 234 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 235 * frames */ 236 237 enum { 238 ACCEPT_UNLESS_DENIED = 0, 239 DENY_UNLESS_ACCEPTED = 1, 240 USE_EXTERNAL_RADIUS_AUTH = 2 241 } macaddr_acl; 242 struct mac_acl_entry *accept_mac; 243 int num_accept_mac; 244 struct mac_acl_entry *deny_mac; 245 int num_deny_mac; 246 int wds_sta; 247 int isolate; 248 int start_disabled; 249 250 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 251 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 252 253 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 254 int wpa_key_mgmt; 255#ifdef CONFIG_IEEE80211W 256 enum mfp_options ieee80211w; 257 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 258 unsigned int assoc_sa_query_max_timeout; 259 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 260 int assoc_sa_query_retry_timeout; 261#endif /* CONFIG_IEEE80211W */ 262 enum { 263 PSK_RADIUS_IGNORED = 0, 264 PSK_RADIUS_ACCEPTED = 1, 265 PSK_RADIUS_REQUIRED = 2 266 } wpa_psk_radius; 267 int wpa_pairwise; 268 int wpa_group; 269 int wpa_group_rekey; 270 int wpa_strict_rekey; 271 int wpa_gmk_rekey; 272 int wpa_ptk_rekey; 273 int rsn_pairwise; 274 int rsn_preauth; 275 char *rsn_preauth_interfaces; 276 int peerkey; 277 278#ifdef CONFIG_IEEE80211R 279 /* IEEE 802.11r - Fast BSS Transition */ 280 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 281 u8 r1_key_holder[FT_R1KH_ID_LEN]; 282 u32 r0_key_lifetime; 283 u32 reassociation_deadline; 284 struct ft_remote_r0kh *r0kh_list; 285 struct ft_remote_r1kh *r1kh_list; 286 int pmk_r1_push; 287 int ft_over_ds; 288#endif /* CONFIG_IEEE80211R */ 289 290 char *ctrl_interface; /* directory for UNIX domain sockets */ 291#ifndef CONFIG_NATIVE_WINDOWS 292 gid_t ctrl_interface_gid; 293#endif /* CONFIG_NATIVE_WINDOWS */ 294 int ctrl_interface_gid_set; 295 296 char *ca_cert; 297 char *server_cert; 298 char *private_key; 299 char *private_key_passwd; 300 int check_crl; 301 char *ocsp_stapling_response; 302 char *dh_file; 303 u8 *pac_opaque_encr_key; 304 u8 *eap_fast_a_id; 305 size_t eap_fast_a_id_len; 306 char *eap_fast_a_id_info; 307 int eap_fast_prov; 308 int pac_key_lifetime; 309 int pac_key_refresh_time; 310 int eap_sim_aka_result_ind; 311 int tnc; 312 int fragment_size; 313 u16 pwd_group; 314 315 char *radius_server_clients; 316 int radius_server_auth_port; 317 int radius_server_acct_port; 318 int radius_server_ipv6; 319 320 char *test_socket; /* UNIX domain socket path for driver_test */ 321 322 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 323 * address instead of individual address 324 * (for driver_wired.c). 325 */ 326 327 int ap_max_inactivity; 328 int ignore_broadcast_ssid; 329 330 int wmm_enabled; 331 int wmm_uapsd; 332 333 struct hostapd_vlan *vlan; 334 335 macaddr bssid; 336 337 /* 338 * Maximum listen interval that STAs can use when associating with this 339 * BSS. If a STA tries to use larger value, the association will be 340 * denied with status code 51. 341 */ 342 u16 max_listen_interval; 343 344 int disable_pmksa_caching; 345 int okc; /* Opportunistic Key Caching */ 346 347 int wps_state; 348#ifdef CONFIG_WPS 349 int wps_independent; 350 int ap_setup_locked; 351 u8 uuid[16]; 352 char *wps_pin_requests; 353 char *device_name; 354 char *manufacturer; 355 char *model_name; 356 char *model_number; 357 char *serial_number; 358 u8 device_type[WPS_DEV_TYPE_LEN]; 359 char *config_methods; 360 u8 os_version[4]; 361 char *ap_pin; 362 int skip_cred_build; 363 u8 *extra_cred; 364 size_t extra_cred_len; 365 int wps_cred_processing; 366 int force_per_enrollee_psk; 367 u8 *ap_settings; 368 size_t ap_settings_len; 369 char *upnp_iface; 370 char *friendly_name; 371 char *manufacturer_url; 372 char *model_description; 373 char *model_url; 374 char *upc; 375 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 376 int wps_nfc_pw_from_config; 377 int wps_nfc_dev_pw_id; 378 struct wpabuf *wps_nfc_dh_pubkey; 379 struct wpabuf *wps_nfc_dh_privkey; 380 struct wpabuf *wps_nfc_dev_pw; 381#endif /* CONFIG_WPS */ 382 int pbc_in_m1; 383 char *server_id; 384 385#define P2P_ENABLED BIT(0) 386#define P2P_GROUP_OWNER BIT(1) 387#define P2P_GROUP_FORMATION BIT(2) 388#define P2P_MANAGE BIT(3) 389#define P2P_ALLOW_CROSS_CONNECTION BIT(4) 390 int p2p; 391#ifdef CONFIG_P2P 392 u8 ip_addr_go[4]; 393 u8 ip_addr_mask[4]; 394 u8 ip_addr_start[4]; 395 u8 ip_addr_end[4]; 396#endif /* CONFIG_P2P */ 397 398 int disassoc_low_ack; 399 int skip_inactivity_poll; 400 401#define TDLS_PROHIBIT BIT(0) 402#define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 403 int tdls; 404 int disable_11n; 405 int disable_11ac; 406 407 /* IEEE 802.11v */ 408 int time_advertisement; 409 char *time_zone; 410 int wnm_sleep_mode; 411 int bss_transition; 412 413 /* IEEE 802.11u - Interworking */ 414 int interworking; 415 int access_network_type; 416 int internet; 417 int asra; 418 int esr; 419 int uesa; 420 int venue_info_set; 421 u8 venue_group; 422 u8 venue_type; 423 u8 hessid[ETH_ALEN]; 424 425 /* IEEE 802.11u - Roaming Consortium list */ 426 unsigned int roaming_consortium_count; 427 struct hostapd_roaming_consortium *roaming_consortium; 428 429 /* IEEE 802.11u - Venue Name duples */ 430 unsigned int venue_name_count; 431 struct hostapd_lang_string *venue_name; 432 433 /* IEEE 802.11u - Network Authentication Type */ 434 u8 *network_auth_type; 435 size_t network_auth_type_len; 436 437 /* IEEE 802.11u - IP Address Type Availability */ 438 u8 ipaddr_type_availability; 439 u8 ipaddr_type_configured; 440 441 /* IEEE 802.11u - 3GPP Cellular Network */ 442 u8 *anqp_3gpp_cell_net; 443 size_t anqp_3gpp_cell_net_len; 444 445 /* IEEE 802.11u - Domain Name */ 446 u8 *domain_name; 447 size_t domain_name_len; 448 449 unsigned int nai_realm_count; 450 struct hostapd_nai_realm_data *nai_realm_data; 451 452 u16 gas_comeback_delay; 453 int gas_frag_limit; 454 455 u8 qos_map_set[16 + 2 * 21]; 456 unsigned int qos_map_set_len; 457 458 int osen; 459#ifdef CONFIG_HS20 460 int hs20; 461 int disable_dgaf; 462 u16 anqp_domain_id; 463 unsigned int hs20_oper_friendly_name_count; 464 struct hostapd_lang_string *hs20_oper_friendly_name; 465 u8 *hs20_wan_metrics; 466 u8 *hs20_connection_capability; 467 size_t hs20_connection_capability_len; 468 u8 *hs20_operating_class; 469 u8 hs20_operating_class_len; 470 struct hs20_icon { 471 u16 width; 472 u16 height; 473 char language[3]; 474 char type[256]; 475 char name[256]; 476 char file[256]; 477 } *hs20_icons; 478 size_t hs20_icons_count; 479 u8 osu_ssid[HOSTAPD_MAX_SSID_LEN]; 480 size_t osu_ssid_len; 481 struct hs20_osu_provider { 482 unsigned int friendly_name_count; 483 struct hostapd_lang_string *friendly_name; 484 char *server_uri; 485 int *method_list; 486 char **icons; 487 size_t icons_count; 488 char *osu_nai; 489 unsigned int service_desc_count; 490 struct hostapd_lang_string *service_desc; 491 } *hs20_osu_providers, *last_osu; 492 size_t hs20_osu_providers_count; 493 unsigned int hs20_deauth_req_timeout; 494 char *subscr_remediation_url; 495 u8 subscr_remediation_method; 496#endif /* CONFIG_HS20 */ 497 498 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 499 500#ifdef CONFIG_RADIUS_TEST 501 char *dump_msk_file; 502#endif /* CONFIG_RADIUS_TEST */ 503 504 struct wpabuf *vendor_elements; 505 506 unsigned int sae_anti_clogging_threshold; 507 int *sae_groups; 508 509#ifdef CONFIG_TESTING_OPTIONS 510 u8 bss_load_test[5]; 511 u8 bss_load_test_set; 512#endif /* CONFIG_TESTING_OPTIONS */ 513}; 514 515 516/** 517 * struct hostapd_config - Per-radio interface configuration 518 */ 519struct hostapd_config { 520 struct hostapd_bss_config **bss, *last_bss; 521 size_t num_bss; 522 523 u16 beacon_int; 524 int rts_threshold; 525 int fragm_threshold; 526 u8 send_probe_response; 527 u8 channel; 528 int *chanlist; 529 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 530 enum { 531 LONG_PREAMBLE = 0, 532 SHORT_PREAMBLE = 1 533 } preamble; 534 535 int *supported_rates; 536 int *basic_rates; 537 538 const struct wpa_driver_ops *driver; 539 540 int ap_table_max_size; 541 int ap_table_expiration_time; 542 543 char country[3]; /* first two octets: country code as described in 544 * ISO/IEC 3166-1. Third octet: 545 * ' ' (ascii 32): all environments 546 * 'O': Outdoor environemnt only 547 * 'I': Indoor environment only 548 */ 549 550 int ieee80211d; 551 552 int ieee80211h; /* DFS */ 553 554 /* 555 * Local power constraint is an octet encoded as an unsigned integer in 556 * units of decibels. Invalid value -1 indicates that Power Constraint 557 * element will not be added. 558 */ 559 int local_pwr_constraint; 560 561 /* Control Spectrum Management bit */ 562 int spectrum_mgmt_required; 563 564 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 565 566 /* 567 * WMM AC parameters, in same order as 802.1D, i.e. 568 * 0 = BE (best effort) 569 * 1 = BK (background) 570 * 2 = VI (video) 571 * 3 = VO (voice) 572 */ 573 struct hostapd_wmm_ac_params wmm_ac_params[4]; 574 575 int ht_op_mode_fixed; 576 u16 ht_capab; 577 int ieee80211n; 578 int secondary_channel; 579 int require_ht; 580 int obss_interval; 581 u32 vht_capab; 582 int ieee80211ac; 583 int require_vht; 584 u8 vht_oper_chwidth; 585 u8 vht_oper_centr_freq_seg0_idx; 586 u8 vht_oper_centr_freq_seg1_idx; 587 588#ifdef CONFIG_TESTING_OPTIONS 589 double ignore_probe_probability; 590 double ignore_auth_probability; 591 double ignore_assoc_probability; 592 double ignore_reassoc_probability; 593 double corrupt_gtk_rekey_mic_probability; 594#endif /* CONFIG_TESTING_OPTIONS */ 595 596#ifdef CONFIG_ACS 597 unsigned int acs_num_scans; 598#endif /* CONFIG_ACS */ 599}; 600 601 602int hostapd_mac_comp(const void *a, const void *b); 603int hostapd_mac_comp_empty(const void *a); 604struct hostapd_config * hostapd_config_defaults(void); 605void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 606void hostapd_config_free_eap_user(struct hostapd_eap_user *user); 607void hostapd_config_free_bss(struct hostapd_bss_config *conf); 608void hostapd_config_free(struct hostapd_config *conf); 609int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 610 const u8 *addr, int *vlan_id); 611int hostapd_rate_found(int *list, int rate); 612const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 613 const u8 *addr, const u8 *p2p_dev_addr, 614 const u8 *prev_psk); 615int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 616int hostapd_vlan_id_valid(struct hostapd_vlan *vlan, int vlan_id); 617const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 618 int vlan_id); 619struct hostapd_radius_attr * 620hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 621int hostapd_config_check(struct hostapd_config *conf, int full_config); 622void hostapd_set_security_params(struct hostapd_bss_config *bss); 623 624#endif /* HOSTAPD_CONFIG_H */ 625