ap_config.h revision bd14a57187b024f49f5b9ace55ef457d8d04650a
1/* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#ifndef HOSTAPD_CONFIG_H 10#define HOSTAPD_CONFIG_H 11 12#include "common/defs.h" 13#include "ip_addr.h" 14#include "common/wpa_common.h" 15#include "common/ieee802_11_common.h" 16#include "wps/wps.h" 17 18#define MAX_STA_COUNT 2007 19#define MAX_VLAN_ID 4094 20 21typedef u8 macaddr[ETH_ALEN]; 22 23struct mac_acl_entry { 24 macaddr addr; 25 int vlan_id; 26}; 27 28struct hostapd_radius_servers; 29struct ft_remote_r0kh; 30struct ft_remote_r1kh; 31 32#define HOSTAPD_MAX_SSID_LEN 32 33 34#define NUM_WEP_KEYS 4 35struct hostapd_wep_keys { 36 u8 idx; 37 u8 *key[NUM_WEP_KEYS]; 38 size_t len[NUM_WEP_KEYS]; 39 int keys_set; 40 size_t default_len; /* key length used for dynamic key generation */ 41}; 42 43typedef enum hostap_security_policy { 44 SECURITY_PLAINTEXT = 0, 45 SECURITY_STATIC_WEP = 1, 46 SECURITY_IEEE_802_1X = 2, 47 SECURITY_WPA_PSK = 3, 48 SECURITY_WPA = 4 49} secpolicy; 50 51struct hostapd_ssid { 52 u8 ssid[HOSTAPD_MAX_SSID_LEN]; 53 size_t ssid_len; 54 unsigned int ssid_set:1; 55 unsigned int utf8_ssid:1; 56 unsigned int wpa_passphrase_set:1; 57 unsigned int wpa_psk_set:1; 58 59 char vlan[IFNAMSIZ + 1]; 60 secpolicy security_policy; 61 62 struct hostapd_wpa_psk *wpa_psk; 63 char *wpa_passphrase; 64 char *wpa_psk_file; 65 66 struct hostapd_wep_keys wep; 67 68#define DYNAMIC_VLAN_DISABLED 0 69#define DYNAMIC_VLAN_OPTIONAL 1 70#define DYNAMIC_VLAN_REQUIRED 2 71 int dynamic_vlan; 72#define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0 73#define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1 74#define DYNAMIC_VLAN_NAMING_END 2 75 int vlan_naming; 76#ifdef CONFIG_FULL_DYNAMIC_VLAN 77 char *vlan_tagged_interface; 78#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 79}; 80 81 82#define VLAN_ID_WILDCARD -1 83 84struct hostapd_vlan { 85 struct hostapd_vlan *next; 86 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 87 char ifname[IFNAMSIZ + 1]; 88 int dynamic_vlan; 89#ifdef CONFIG_FULL_DYNAMIC_VLAN 90 91#define DVLAN_CLEAN_BR 0x1 92#define DVLAN_CLEAN_VLAN 0x2 93#define DVLAN_CLEAN_VLAN_PORT 0x4 94#define DVLAN_CLEAN_WLAN_PORT 0x8 95 int clean; 96#endif /* CONFIG_FULL_DYNAMIC_VLAN */ 97}; 98 99#define PMK_LEN 32 100struct hostapd_sta_wpa_psk_short { 101 struct hostapd_sta_wpa_psk_short *next; 102 u8 psk[PMK_LEN]; 103}; 104 105struct hostapd_wpa_psk { 106 struct hostapd_wpa_psk *next; 107 int group; 108 u8 psk[PMK_LEN]; 109 u8 addr[ETH_ALEN]; 110 u8 p2p_dev_addr[ETH_ALEN]; 111}; 112 113struct hostapd_eap_user { 114 struct hostapd_eap_user *next; 115 u8 *identity; 116 size_t identity_len; 117 struct { 118 int vendor; 119 u32 method; 120 } methods[EAP_MAX_METHODS]; 121 u8 *password; 122 size_t password_len; 123 int phase2; 124 int force_version; 125 unsigned int wildcard_prefix:1; 126 unsigned int password_hash:1; /* whether password is hashed with 127 * nt_password_hash() */ 128 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 129}; 130 131struct hostapd_radius_attr { 132 u8 type; 133 struct wpabuf *val; 134 struct hostapd_radius_attr *next; 135}; 136 137 138#define NUM_TX_QUEUES 4 139 140struct hostapd_tx_queue_params { 141 int aifs; 142 int cwmin; 143 int cwmax; 144 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 145}; 146 147 148#define MAX_ROAMING_CONSORTIUM_LEN 15 149 150struct hostapd_roaming_consortium { 151 u8 len; 152 u8 oi[MAX_ROAMING_CONSORTIUM_LEN]; 153}; 154 155struct hostapd_lang_string { 156 u8 lang[3]; 157 u8 name_len; 158 u8 name[252]; 159}; 160 161#define MAX_NAI_REALMS 10 162#define MAX_NAI_REALMLEN 255 163#define MAX_NAI_EAP_METHODS 5 164#define MAX_NAI_AUTH_TYPES 4 165struct hostapd_nai_realm_data { 166 u8 encoding; 167 char realm_buf[MAX_NAI_REALMLEN + 1]; 168 char *realm[MAX_NAI_REALMS]; 169 u8 eap_method_count; 170 struct hostapd_nai_realm_eap { 171 u8 eap_method; 172 u8 num_auths; 173 u8 auth_id[MAX_NAI_AUTH_TYPES]; 174 u8 auth_val[MAX_NAI_AUTH_TYPES]; 175 } eap_method[MAX_NAI_EAP_METHODS]; 176}; 177 178/** 179 * struct hostapd_bss_config - Per-BSS configuration 180 */ 181struct hostapd_bss_config { 182 char iface[IFNAMSIZ + 1]; 183 char bridge[IFNAMSIZ + 1]; 184 char vlan_bridge[IFNAMSIZ + 1]; 185 char wds_bridge[IFNAMSIZ + 1]; 186 187 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 188 189 unsigned int logger_syslog; /* module bitfield */ 190 unsigned int logger_stdout; /* module bitfield */ 191 192 int max_num_sta; /* maximum number of STAs in station table */ 193 194 int dtim_period; 195 196 int ieee802_1x; /* use IEEE 802.1X */ 197 int eapol_version; 198 int eap_server; /* Use internal EAP server instead of external 199 * RADIUS server */ 200 struct hostapd_eap_user *eap_user; 201 char *eap_user_sqlite; 202 char *eap_sim_db; 203 struct hostapd_ip_addr own_ip_addr; 204 char *nas_identifier; 205 struct hostapd_radius_servers *radius; 206 int acct_interim_interval; 207 int radius_request_cui; 208 struct hostapd_radius_attr *radius_auth_req_attr; 209 struct hostapd_radius_attr *radius_acct_req_attr; 210 int radius_das_port; 211 unsigned int radius_das_time_window; 212 int radius_das_require_event_timestamp; 213 struct hostapd_ip_addr radius_das_client_addr; 214 u8 *radius_das_shared_secret; 215 size_t radius_das_shared_secret_len; 216 217 struct hostapd_ssid ssid; 218 219 char *eap_req_id_text; /* optional displayable message sent with 220 * EAP Request-Identity */ 221 size_t eap_req_id_text_len; 222 int eapol_key_index_workaround; 223 224 size_t default_wep_key_len; 225 int individual_wep_key_len; 226 int wep_rekeying_period; 227 int broadcast_key_idx_min, broadcast_key_idx_max; 228 int eap_reauth_period; 229 230 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 231 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 232 * frames */ 233 234 enum { 235 ACCEPT_UNLESS_DENIED = 0, 236 DENY_UNLESS_ACCEPTED = 1, 237 USE_EXTERNAL_RADIUS_AUTH = 2 238 } macaddr_acl; 239 struct mac_acl_entry *accept_mac; 240 int num_accept_mac; 241 struct mac_acl_entry *deny_mac; 242 int num_deny_mac; 243 int wds_sta; 244 int isolate; 245 int start_disabled; 246 247 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 248 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 249 250 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 251 int wpa_key_mgmt; 252#ifdef CONFIG_IEEE80211W 253 enum mfp_options ieee80211w; 254 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 255 unsigned int assoc_sa_query_max_timeout; 256 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 257 int assoc_sa_query_retry_timeout; 258#endif /* CONFIG_IEEE80211W */ 259 enum { 260 PSK_RADIUS_IGNORED = 0, 261 PSK_RADIUS_ACCEPTED = 1, 262 PSK_RADIUS_REQUIRED = 2 263 } wpa_psk_radius; 264 int wpa_pairwise; 265 int wpa_group; 266 int wpa_group_rekey; 267 int wpa_strict_rekey; 268 int wpa_gmk_rekey; 269 int wpa_ptk_rekey; 270 int rsn_pairwise; 271 int rsn_preauth; 272 char *rsn_preauth_interfaces; 273 int peerkey; 274 275#ifdef CONFIG_IEEE80211R 276 /* IEEE 802.11r - Fast BSS Transition */ 277 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 278 u8 r1_key_holder[FT_R1KH_ID_LEN]; 279 u32 r0_key_lifetime; 280 u32 reassociation_deadline; 281 struct ft_remote_r0kh *r0kh_list; 282 struct ft_remote_r1kh *r1kh_list; 283 int pmk_r1_push; 284 int ft_over_ds; 285#endif /* CONFIG_IEEE80211R */ 286 287 char *ctrl_interface; /* directory for UNIX domain sockets */ 288#ifndef CONFIG_NATIVE_WINDOWS 289 gid_t ctrl_interface_gid; 290#endif /* CONFIG_NATIVE_WINDOWS */ 291 int ctrl_interface_gid_set; 292 293 char *ca_cert; 294 char *server_cert; 295 char *private_key; 296 char *private_key_passwd; 297 int check_crl; 298 char *ocsp_stapling_response; 299 char *dh_file; 300 u8 *pac_opaque_encr_key; 301 u8 *eap_fast_a_id; 302 size_t eap_fast_a_id_len; 303 char *eap_fast_a_id_info; 304 int eap_fast_prov; 305 int pac_key_lifetime; 306 int pac_key_refresh_time; 307 int eap_sim_aka_result_ind; 308 int tnc; 309 int fragment_size; 310 u16 pwd_group; 311 312 char *radius_server_clients; 313 int radius_server_auth_port; 314 int radius_server_acct_port; 315 int radius_server_ipv6; 316 317 char *test_socket; /* UNIX domain socket path for driver_test */ 318 319 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 320 * address instead of individual address 321 * (for driver_wired.c). 322 */ 323 324 int ap_max_inactivity; 325 int ignore_broadcast_ssid; 326 327 int wmm_enabled; 328 int wmm_uapsd; 329 330 struct hostapd_vlan *vlan; 331 332 macaddr bssid; 333 334 /* 335 * Maximum listen interval that STAs can use when associating with this 336 * BSS. If a STA tries to use larger value, the association will be 337 * denied with status code 51. 338 */ 339 u16 max_listen_interval; 340 341 int disable_pmksa_caching; 342 int okc; /* Opportunistic Key Caching */ 343 344 int wps_state; 345#ifdef CONFIG_WPS 346 int wps_independent; 347 int ap_setup_locked; 348 u8 uuid[16]; 349 char *wps_pin_requests; 350 char *device_name; 351 char *manufacturer; 352 char *model_name; 353 char *model_number; 354 char *serial_number; 355 u8 device_type[WPS_DEV_TYPE_LEN]; 356 char *config_methods; 357 u8 os_version[4]; 358 char *ap_pin; 359 int skip_cred_build; 360 u8 *extra_cred; 361 size_t extra_cred_len; 362 int wps_cred_processing; 363 int force_per_enrollee_psk; 364 u8 *ap_settings; 365 size_t ap_settings_len; 366 char *upnp_iface; 367 char *friendly_name; 368 char *manufacturer_url; 369 char *model_description; 370 char *model_url; 371 char *upc; 372 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 373 int wps_nfc_pw_from_config; 374 int wps_nfc_dev_pw_id; 375 struct wpabuf *wps_nfc_dh_pubkey; 376 struct wpabuf *wps_nfc_dh_privkey; 377 struct wpabuf *wps_nfc_dev_pw; 378#endif /* CONFIG_WPS */ 379 int pbc_in_m1; 380 char *server_id; 381 382#define P2P_ENABLED BIT(0) 383#define P2P_GROUP_OWNER BIT(1) 384#define P2P_GROUP_FORMATION BIT(2) 385#define P2P_MANAGE BIT(3) 386#define P2P_ALLOW_CROSS_CONNECTION BIT(4) 387 int p2p; 388#ifdef CONFIG_P2P 389 u8 ip_addr_go[4]; 390 u8 ip_addr_mask[4]; 391 u8 ip_addr_start[4]; 392 u8 ip_addr_end[4]; 393#endif /* CONFIG_P2P */ 394 395 int disassoc_low_ack; 396 int skip_inactivity_poll; 397 398#define TDLS_PROHIBIT BIT(0) 399#define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 400 int tdls; 401 int disable_11n; 402 int disable_11ac; 403 404 /* IEEE 802.11v */ 405 int time_advertisement; 406 char *time_zone; 407 int wnm_sleep_mode; 408 int bss_transition; 409 410 /* IEEE 802.11u - Interworking */ 411 int interworking; 412 int access_network_type; 413 int internet; 414 int asra; 415 int esr; 416 int uesa; 417 int venue_info_set; 418 u8 venue_group; 419 u8 venue_type; 420 u8 hessid[ETH_ALEN]; 421 422 /* IEEE 802.11u - Roaming Consortium list */ 423 unsigned int roaming_consortium_count; 424 struct hostapd_roaming_consortium *roaming_consortium; 425 426 /* IEEE 802.11u - Venue Name duples */ 427 unsigned int venue_name_count; 428 struct hostapd_lang_string *venue_name; 429 430 /* IEEE 802.11u - Network Authentication Type */ 431 u8 *network_auth_type; 432 size_t network_auth_type_len; 433 434 /* IEEE 802.11u - IP Address Type Availability */ 435 u8 ipaddr_type_availability; 436 u8 ipaddr_type_configured; 437 438 /* IEEE 802.11u - 3GPP Cellular Network */ 439 u8 *anqp_3gpp_cell_net; 440 size_t anqp_3gpp_cell_net_len; 441 442 /* IEEE 802.11u - Domain Name */ 443 u8 *domain_name; 444 size_t domain_name_len; 445 446 unsigned int nai_realm_count; 447 struct hostapd_nai_realm_data *nai_realm_data; 448 449 u16 gas_comeback_delay; 450 int gas_frag_limit; 451 452 u8 qos_map_set[16 + 2 * 21]; 453 unsigned int qos_map_set_len; 454 455#ifdef CONFIG_HS20 456 int hs20; 457 int disable_dgaf; 458 unsigned int hs20_oper_friendly_name_count; 459 struct hostapd_lang_string *hs20_oper_friendly_name; 460 u8 *hs20_wan_metrics; 461 u8 *hs20_connection_capability; 462 size_t hs20_connection_capability_len; 463 u8 *hs20_operating_class; 464 u8 hs20_operating_class_len; 465#endif /* CONFIG_HS20 */ 466 467 u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */ 468 469#ifdef CONFIG_RADIUS_TEST 470 char *dump_msk_file; 471#endif /* CONFIG_RADIUS_TEST */ 472 473 struct wpabuf *vendor_elements; 474 475 unsigned int sae_anti_clogging_threshold; 476 int *sae_groups; 477 478#ifdef CONFIG_TESTING_OPTIONS 479 u8 bss_load_test[5]; 480 u8 bss_load_test_set; 481#endif /* CONFIG_TESTING_OPTIONS */ 482}; 483 484 485/** 486 * struct hostapd_config - Per-radio interface configuration 487 */ 488struct hostapd_config { 489 struct hostapd_bss_config **bss, *last_bss; 490 size_t num_bss; 491 492 u16 beacon_int; 493 int rts_threshold; 494 int fragm_threshold; 495 u8 send_probe_response; 496 u8 channel; 497 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 498 enum { 499 LONG_PREAMBLE = 0, 500 SHORT_PREAMBLE = 1 501 } preamble; 502 503 int *supported_rates; 504 int *basic_rates; 505 506 const struct wpa_driver_ops *driver; 507 508 int ap_table_max_size; 509 int ap_table_expiration_time; 510 511 char country[3]; /* first two octets: country code as described in 512 * ISO/IEC 3166-1. Third octet: 513 * ' ' (ascii 32): all environments 514 * 'O': Outdoor environemnt only 515 * 'I': Indoor environment only 516 */ 517 518 int ieee80211d; 519 520 int ieee80211h; /* DFS */ 521 522 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 523 524 /* 525 * WMM AC parameters, in same order as 802.1D, i.e. 526 * 0 = BE (best effort) 527 * 1 = BK (background) 528 * 2 = VI (video) 529 * 3 = VO (voice) 530 */ 531 struct hostapd_wmm_ac_params wmm_ac_params[4]; 532 533 int ht_op_mode_fixed; 534 u16 ht_capab; 535 int ieee80211n; 536 int secondary_channel; 537 int require_ht; 538 int obss_interval; 539 u32 vht_capab; 540 int ieee80211ac; 541 int require_vht; 542 u8 vht_oper_chwidth; 543 u8 vht_oper_centr_freq_seg0_idx; 544 u8 vht_oper_centr_freq_seg1_idx; 545 546#ifdef CONFIG_TESTING_OPTIONS 547 double ignore_probe_probability; 548 double ignore_auth_probability; 549 double ignore_assoc_probability; 550 double ignore_reassoc_probability; 551 double corrupt_gtk_rekey_mic_probability; 552#endif /* CONFIG_TESTING_OPTIONS */ 553 554#ifdef CONFIG_ACS 555 unsigned int acs_num_scans; 556#endif /* CONFIG_ACS */ 557}; 558 559 560int hostapd_mac_comp(const void *a, const void *b); 561int hostapd_mac_comp_empty(const void *a); 562struct hostapd_config * hostapd_config_defaults(void); 563void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 564void hostapd_config_free_bss(struct hostapd_bss_config *conf); 565void hostapd_config_free(struct hostapd_config *conf); 566int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 567 const u8 *addr, int *vlan_id); 568int hostapd_rate_found(int *list, int rate); 569int hostapd_wep_key_cmp(struct hostapd_wep_keys *a, 570 struct hostapd_wep_keys *b); 571const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 572 const u8 *addr, const u8 *p2p_dev_addr, 573 const u8 *prev_psk); 574int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 575int hostapd_vlan_id_valid(struct hostapd_vlan *vlan, int vlan_id); 576const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 577 int vlan_id); 578struct hostapd_radius_attr * 579hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type); 580int hostapd_config_check(struct hostapd_config *conf, int full_config); 581void hostapd_set_security_params(struct hostapd_bss_config *bss); 582 583#endif /* HOSTAPD_CONFIG_H */ 584