1 /* 2 * hostapd / Configuration definitions and helpers functions 3 * Copyright (c) 2003-2009, Jouni Malinen <j (at) w1.fi> 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License version 2 as 7 * published by the Free Software Foundation. 8 * 9 * Alternatively, this software may be distributed under the terms of BSD 10 * license. 11 * 12 * See README and COPYING for more details. 13 */ 14 15 #ifndef HOSTAPD_CONFIG_H 16 #define HOSTAPD_CONFIG_H 17 18 #include "common/defs.h" 19 #include "ip_addr.h" 20 #include "common/wpa_common.h" 21 #include "wps/wps.h" 22 23 #define MAX_STA_COUNT 2007 24 #define MAX_VLAN_ID 4094 25 26 typedef u8 macaddr[ETH_ALEN]; 27 28 struct mac_acl_entry { 29 macaddr addr; 30 int vlan_id; 31 }; 32 33 struct hostapd_radius_servers; 34 struct ft_remote_r0kh; 35 struct ft_remote_r1kh; 36 37 #define HOSTAPD_MAX_SSID_LEN 32 38 39 #define NUM_WEP_KEYS 4 40 struct hostapd_wep_keys { 41 u8 idx; 42 u8 *key[NUM_WEP_KEYS]; 43 size_t len[NUM_WEP_KEYS]; 44 int keys_set; 45 size_t default_len; /* key length used for dynamic key generation */ 46 }; 47 48 typedef enum hostap_security_policy { 49 SECURITY_PLAINTEXT = 0, 50 SECURITY_STATIC_WEP = 1, 51 SECURITY_IEEE_802_1X = 2, 52 SECURITY_WPA_PSK = 3, 53 SECURITY_WPA = 4 54 } secpolicy; 55 56 struct hostapd_ssid { 57 char ssid[HOSTAPD_MAX_SSID_LEN + 1]; 58 size_t ssid_len; 59 int ssid_set; 60 61 char vlan[IFNAMSIZ + 1]; 62 secpolicy security_policy; 63 64 struct hostapd_wpa_psk *wpa_psk; 65 char *wpa_passphrase; 66 char *wpa_psk_file; 67 68 struct hostapd_wep_keys wep; 69 70 #define DYNAMIC_VLAN_DISABLED 0 71 #define DYNAMIC_VLAN_OPTIONAL 1 72 #define DYNAMIC_VLAN_REQUIRED 2 73 int dynamic_vlan; 74 #ifdef CONFIG_FULL_DYNAMIC_VLAN 75 char *vlan_tagged_interface; 76 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 77 struct hostapd_wep_keys **dyn_vlan_keys; 78 size_t max_dyn_vlan_keys; 79 }; 80 81 82 #define VLAN_ID_WILDCARD -1 83 84 struct hostapd_vlan { 85 struct hostapd_vlan *next; 86 int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */ 87 char ifname[IFNAMSIZ + 1]; 88 int dynamic_vlan; 89 #ifdef CONFIG_FULL_DYNAMIC_VLAN 90 91 #define DVLAN_CLEAN_BR 0x1 92 #define DVLAN_CLEAN_VLAN 0x2 93 #define DVLAN_CLEAN_VLAN_PORT 0x4 94 #define DVLAN_CLEAN_WLAN_PORT 0x8 95 int clean; 96 #endif /* CONFIG_FULL_DYNAMIC_VLAN */ 97 }; 98 99 #define PMK_LEN 32 100 struct hostapd_wpa_psk { 101 struct hostapd_wpa_psk *next; 102 int group; 103 u8 psk[PMK_LEN]; 104 u8 addr[ETH_ALEN]; 105 }; 106 107 #define EAP_USER_MAX_METHODS 8 108 struct hostapd_eap_user { 109 struct hostapd_eap_user *next; 110 u8 *identity; 111 size_t identity_len; 112 struct { 113 int vendor; 114 u32 method; 115 } methods[EAP_USER_MAX_METHODS]; 116 u8 *password; 117 size_t password_len; 118 int phase2; 119 int force_version; 120 unsigned int wildcard_prefix:1; 121 unsigned int password_hash:1; /* whether password is hashed with 122 * nt_password_hash() */ 123 int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */ 124 }; 125 126 127 #define NUM_TX_QUEUES 4 128 129 struct hostapd_tx_queue_params { 130 int aifs; 131 int cwmin; 132 int cwmax; 133 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ 134 }; 135 136 struct hostapd_wmm_ac_params { 137 int cwmin; 138 int cwmax; 139 int aifs; 140 int txop_limit; /* in units of 32us */ 141 int admission_control_mandatory; 142 }; 143 144 145 /** 146 * struct hostapd_bss_config - Per-BSS configuration 147 */ 148 struct hostapd_bss_config { 149 char iface[IFNAMSIZ + 1]; 150 char bridge[IFNAMSIZ + 1]; 151 char wds_bridge[IFNAMSIZ + 1]; 152 153 enum hostapd_logger_level logger_syslog_level, logger_stdout_level; 154 155 unsigned int logger_syslog; /* module bitfield */ 156 unsigned int logger_stdout; /* module bitfield */ 157 158 char *dump_log_name; /* file name for state dump (SIGUSR1) */ 159 160 int max_num_sta; /* maximum number of STAs in station table */ 161 162 int dtim_period; 163 164 int ieee802_1x; /* use IEEE 802.1X */ 165 int eapol_version; 166 int eap_server; /* Use internal EAP server instead of external 167 * RADIUS server */ 168 struct hostapd_eap_user *eap_user; 169 char *eap_sim_db; 170 struct hostapd_ip_addr own_ip_addr; 171 char *nas_identifier; 172 struct hostapd_radius_servers *radius; 173 int acct_interim_interval; 174 175 struct hostapd_ssid ssid; 176 177 char *eap_req_id_text; /* optional displayable message sent with 178 * EAP Request-Identity */ 179 size_t eap_req_id_text_len; 180 int eapol_key_index_workaround; 181 182 size_t default_wep_key_len; 183 int individual_wep_key_len; 184 int wep_rekeying_period; 185 int broadcast_key_idx_min, broadcast_key_idx_max; 186 int eap_reauth_period; 187 188 int ieee802_11f; /* use IEEE 802.11f (IAPP) */ 189 char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast 190 * frames */ 191 192 enum { 193 ACCEPT_UNLESS_DENIED = 0, 194 DENY_UNLESS_ACCEPTED = 1, 195 USE_EXTERNAL_RADIUS_AUTH = 2 196 } macaddr_acl; 197 struct mac_acl_entry *accept_mac; 198 int num_accept_mac; 199 struct mac_acl_entry *deny_mac; 200 int num_deny_mac; 201 int wds_sta; 202 int isolate; 203 204 int auth_algs; /* bitfield of allowed IEEE 802.11 authentication 205 * algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */ 206 207 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ 208 int wpa_key_mgmt; 209 #ifdef CONFIG_IEEE80211W 210 enum mfp_options ieee80211w; 211 /* dot11AssociationSAQueryMaximumTimeout (in TUs) */ 212 unsigned int assoc_sa_query_max_timeout; 213 /* dot11AssociationSAQueryRetryTimeout (in TUs) */ 214 int assoc_sa_query_retry_timeout; 215 #endif /* CONFIG_IEEE80211W */ 216 int wpa_pairwise; 217 int wpa_group; 218 int wpa_group_rekey; 219 int wpa_strict_rekey; 220 int wpa_gmk_rekey; 221 int wpa_ptk_rekey; 222 int rsn_pairwise; 223 int rsn_preauth; 224 char *rsn_preauth_interfaces; 225 int peerkey; 226 227 #ifdef CONFIG_IEEE80211R 228 /* IEEE 802.11r - Fast BSS Transition */ 229 u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN]; 230 u8 r1_key_holder[FT_R1KH_ID_LEN]; 231 u32 r0_key_lifetime; 232 u32 reassociation_deadline; 233 struct ft_remote_r0kh *r0kh_list; 234 struct ft_remote_r1kh *r1kh_list; 235 int pmk_r1_push; 236 int ft_over_ds; 237 #endif /* CONFIG_IEEE80211R */ 238 239 char *ctrl_interface; /* directory for UNIX domain sockets */ 240 #ifndef CONFIG_NATIVE_WINDOWS 241 gid_t ctrl_interface_gid; 242 #endif /* CONFIG_NATIVE_WINDOWS */ 243 int ctrl_interface_gid_set; 244 245 char *ca_cert; 246 char *server_cert; 247 char *private_key; 248 char *private_key_passwd; 249 int check_crl; 250 char *dh_file; 251 u8 *pac_opaque_encr_key; 252 u8 *eap_fast_a_id; 253 size_t eap_fast_a_id_len; 254 char *eap_fast_a_id_info; 255 int eap_fast_prov; 256 int pac_key_lifetime; 257 int pac_key_refresh_time; 258 int eap_sim_aka_result_ind; 259 int tnc; 260 int fragment_size; 261 u16 pwd_group; 262 263 char *radius_server_clients; 264 int radius_server_auth_port; 265 int radius_server_ipv6; 266 267 char *test_socket; /* UNIX domain socket path for driver_test */ 268 269 int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group 270 * address instead of individual address 271 * (for driver_wired.c). 272 */ 273 274 int ap_max_inactivity; 275 int ignore_broadcast_ssid; 276 277 int wmm_enabled; 278 int wmm_uapsd; 279 280 struct hostapd_vlan *vlan, *vlan_tail; 281 282 macaddr bssid; 283 284 /* 285 * Maximum listen interval that STAs can use when associating with this 286 * BSS. If a STA tries to use larger value, the association will be 287 * denied with status code 51. 288 */ 289 u16 max_listen_interval; 290 291 int disable_pmksa_caching; 292 int okc; /* Opportunistic Key Caching */ 293 294 int wps_state; 295 #ifdef CONFIG_WPS 296 int ap_setup_locked; 297 u8 uuid[16]; 298 char *wps_pin_requests; 299 char *device_name; 300 char *manufacturer; 301 char *model_name; 302 char *model_number; 303 char *serial_number; 304 u8 device_type[WPS_DEV_TYPE_LEN]; 305 char *config_methods; 306 u8 os_version[4]; 307 char *ap_pin; 308 int skip_cred_build; 309 u8 *extra_cred; 310 size_t extra_cred_len; 311 int wps_cred_processing; 312 u8 *ap_settings; 313 size_t ap_settings_len; 314 char *upnp_iface; 315 char *friendly_name; 316 char *manufacturer_url; 317 char *model_description; 318 char *model_url; 319 char *upc; 320 struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS]; 321 #endif /* CONFIG_WPS */ 322 int pbc_in_m1; 323 324 #define P2P_ENABLED BIT(0) 325 #define P2P_GROUP_OWNER BIT(1) 326 #define P2P_GROUP_FORMATION BIT(2) 327 #define P2P_MANAGE BIT(3) 328 #define P2P_ALLOW_CROSS_CONNECTION BIT(4) 329 int p2p; 330 331 int disassoc_low_ack; 332 333 #define TDLS_PROHIBIT BIT(0) 334 #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1) 335 int tdls; 336 int disable_11n; 337 }; 338 339 340 /** 341 * struct hostapd_config - Per-radio interface configuration 342 */ 343 struct hostapd_config { 344 struct hostapd_bss_config *bss, *last_bss; 345 size_t num_bss; 346 347 u16 beacon_int; 348 int rts_threshold; 349 int fragm_threshold; 350 u8 send_probe_response; 351 u8 channel; 352 enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */ 353 enum { 354 LONG_PREAMBLE = 0, 355 SHORT_PREAMBLE = 1 356 } preamble; 357 enum { 358 CTS_PROTECTION_AUTOMATIC = 0, 359 CTS_PROTECTION_FORCE_ENABLED = 1, 360 CTS_PROTECTION_FORCE_DISABLED = 2, 361 CTS_PROTECTION_AUTOMATIC_NO_OLBC = 3, 362 } cts_protection_type; 363 364 int *supported_rates; 365 int *basic_rates; 366 367 const struct wpa_driver_ops *driver; 368 369 int ap_table_max_size; 370 int ap_table_expiration_time; 371 372 char country[3]; /* first two octets: country code as described in 373 * ISO/IEC 3166-1. Third octet: 374 * ' ' (ascii 32): all environments 375 * 'O': Outdoor environemnt only 376 * 'I': Indoor environment only 377 */ 378 379 int ieee80211d; 380 381 struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES]; 382 383 /* 384 * WMM AC parameters, in same order as 802.1D, i.e. 385 * 0 = BE (best effort) 386 * 1 = BK (background) 387 * 2 = VI (video) 388 * 3 = VO (voice) 389 */ 390 struct hostapd_wmm_ac_params wmm_ac_params[4]; 391 392 int ht_op_mode_fixed; 393 u16 ht_capab; 394 int ieee80211n; 395 int secondary_channel; 396 int require_ht; 397 }; 398 399 400 int hostapd_mac_comp(const void *a, const void *b); 401 int hostapd_mac_comp_empty(const void *a); 402 struct hostapd_config * hostapd_config_defaults(void); 403 void hostapd_config_defaults_bss(struct hostapd_bss_config *bss); 404 void hostapd_config_free(struct hostapd_config *conf); 405 int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries, 406 const u8 *addr, int *vlan_id); 407 int hostapd_rate_found(int *list, int rate); 408 int hostapd_wep_key_cmp(struct hostapd_wep_keys *a, 409 struct hostapd_wep_keys *b); 410 const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf, 411 const u8 *addr, const u8 *prev_psk); 412 int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf); 413 const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, 414 int vlan_id); 415 const struct hostapd_eap_user * 416 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, 417 size_t identity_len, int phase2); 418 419 #endif /* HOSTAPD_CONFIG_H */ 420