2008-02-28 02:34:43 +01:00
|
|
|
/*
|
2009-12-24 20:05:40 +01:00
|
|
|
* hostapd / Configuration definitions and helpers functions
|
2012-05-05 17:19:54 +02:00
|
|
|
* Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
|
2008-02-28 02:34:43 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-28 02:34:43 +01:00
|
|
|
*/
|
|
|
|
|
2009-12-21 15:10:21 +01:00
|
|
|
#ifndef HOSTAPD_CONFIG_H
|
|
|
|
#define HOSTAPD_CONFIG_H
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-11-29 16:51:55 +01:00
|
|
|
#include "common/defs.h"
|
2008-02-28 02:34:43 +01:00
|
|
|
#include "ip_addr.h"
|
2009-11-29 16:51:55 +01:00
|
|
|
#include "common/wpa_common.h"
|
2012-08-12 10:33:00 +02:00
|
|
|
#include "common/ieee802_11_common.h"
|
2011-03-17 17:50:22 +01:00
|
|
|
#include "wps/wps.h"
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2014-09-01 06:23:21 +02:00
|
|
|
/**
|
|
|
|
* mesh_conf - local MBSS state and settings
|
|
|
|
*/
|
|
|
|
struct mesh_conf {
|
|
|
|
u8 meshid[32];
|
|
|
|
u8 meshid_len;
|
|
|
|
/* Active Path Selection Protocol Identifier */
|
|
|
|
u8 mesh_pp_id;
|
|
|
|
/* Active Path Selection Metric Identifier */
|
|
|
|
u8 mesh_pm_id;
|
|
|
|
/* Congestion Control Mode Identifier */
|
|
|
|
u8 mesh_cc_id;
|
|
|
|
/* Synchronization Protocol Identifier */
|
|
|
|
u8 mesh_sp_id;
|
|
|
|
/* Authentication Protocol Identifier */
|
|
|
|
u8 mesh_auth_id;
|
|
|
|
u8 *ies;
|
|
|
|
int ie_len;
|
|
|
|
#define MESH_CONF_SEC_NONE BIT(0)
|
|
|
|
#define MESH_CONF_SEC_AUTH BIT(1)
|
|
|
|
#define MESH_CONF_SEC_AMPE BIT(2)
|
|
|
|
unsigned int security;
|
2014-11-15 02:35:32 +01:00
|
|
|
int dot11MeshMaxRetries;
|
|
|
|
int dot11MeshRetryTimeout; /* msec */
|
|
|
|
int dot11MeshConfirmTimeout; /* msec */
|
|
|
|
int dot11MeshHoldingTimeout; /* msec */
|
2014-09-01 06:23:21 +02:00
|
|
|
};
|
|
|
|
|
2009-12-24 20:05:40 +01:00
|
|
|
#define MAX_STA_COUNT 2007
|
|
|
|
#define MAX_VLAN_ID 4094
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
typedef u8 macaddr[ETH_ALEN];
|
|
|
|
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry {
|
|
|
|
macaddr addr;
|
|
|
|
int vlan_id;
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_radius_servers;
|
|
|
|
struct ft_remote_r0kh;
|
|
|
|
struct ft_remote_r1kh;
|
|
|
|
|
|
|
|
#define HOSTAPD_MAX_SSID_LEN 32
|
|
|
|
|
|
|
|
#define NUM_WEP_KEYS 4
|
|
|
|
struct hostapd_wep_keys {
|
|
|
|
u8 idx;
|
|
|
|
u8 *key[NUM_WEP_KEYS];
|
|
|
|
size_t len[NUM_WEP_KEYS];
|
|
|
|
int keys_set;
|
|
|
|
size_t default_len; /* key length used for dynamic key generation */
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef enum hostap_security_policy {
|
|
|
|
SECURITY_PLAINTEXT = 0,
|
|
|
|
SECURITY_STATIC_WEP = 1,
|
|
|
|
SECURITY_IEEE_802_1X = 2,
|
|
|
|
SECURITY_WPA_PSK = 3,
|
2013-07-23 20:25:21 +02:00
|
|
|
SECURITY_WPA = 4,
|
|
|
|
SECURITY_OSEN = 5
|
2008-02-28 02:34:43 +01:00
|
|
|
} secpolicy;
|
|
|
|
|
|
|
|
struct hostapd_ssid {
|
2012-08-07 15:07:25 +02:00
|
|
|
u8 ssid[HOSTAPD_MAX_SSID_LEN];
|
2008-02-28 02:34:43 +01:00
|
|
|
size_t ssid_len;
|
2012-12-16 19:46:51 +01:00
|
|
|
unsigned int ssid_set:1;
|
|
|
|
unsigned int utf8_ssid:1;
|
2013-10-29 15:55:15 +01:00
|
|
|
unsigned int wpa_passphrase_set:1;
|
|
|
|
unsigned int wpa_psk_set:1;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
char vlan[IFNAMSIZ + 1];
|
|
|
|
secpolicy security_policy;
|
|
|
|
|
|
|
|
struct hostapd_wpa_psk *wpa_psk;
|
|
|
|
char *wpa_passphrase;
|
|
|
|
char *wpa_psk_file;
|
|
|
|
|
|
|
|
struct hostapd_wep_keys wep;
|
|
|
|
|
|
|
|
#define DYNAMIC_VLAN_DISABLED 0
|
|
|
|
#define DYNAMIC_VLAN_OPTIONAL 1
|
|
|
|
#define DYNAMIC_VLAN_REQUIRED 2
|
|
|
|
int dynamic_vlan;
|
2012-08-10 11:38:17 +02:00
|
|
|
#define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0
|
|
|
|
#define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1
|
|
|
|
#define DYNAMIC_VLAN_NAMING_END 2
|
|
|
|
int vlan_naming;
|
2008-02-28 02:34:43 +01:00
|
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
|
|
char *vlan_tagged_interface;
|
|
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
#define VLAN_ID_WILDCARD -1
|
|
|
|
|
|
|
|
struct hostapd_vlan {
|
|
|
|
struct hostapd_vlan *next;
|
|
|
|
int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */
|
|
|
|
char ifname[IFNAMSIZ + 1];
|
|
|
|
int dynamic_vlan;
|
|
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
|
|
|
|
|
|
#define DVLAN_CLEAN_BR 0x1
|
|
|
|
#define DVLAN_CLEAN_VLAN 0x2
|
|
|
|
#define DVLAN_CLEAN_VLAN_PORT 0x4
|
|
|
|
#define DVLAN_CLEAN_WLAN_PORT 0x8
|
|
|
|
int clean;
|
|
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define PMK_LEN 32
|
2012-11-25 16:41:13 +01:00
|
|
|
struct hostapd_sta_wpa_psk_short {
|
|
|
|
struct hostapd_sta_wpa_psk_short *next;
|
|
|
|
u8 psk[PMK_LEN];
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_wpa_psk {
|
|
|
|
struct hostapd_wpa_psk *next;
|
|
|
|
int group;
|
|
|
|
u8 psk[PMK_LEN];
|
|
|
|
u8 addr[ETH_ALEN];
|
2013-09-01 09:47:34 +02:00
|
|
|
u8 p2p_dev_addr[ETH_ALEN];
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct hostapd_eap_user {
|
|
|
|
struct hostapd_eap_user *next;
|
|
|
|
u8 *identity;
|
|
|
|
size_t identity_len;
|
|
|
|
struct {
|
|
|
|
int vendor;
|
|
|
|
u32 method;
|
2011-11-17 19:06:33 +01:00
|
|
|
} methods[EAP_MAX_METHODS];
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 *password;
|
|
|
|
size_t password_len;
|
|
|
|
int phase2;
|
|
|
|
int force_version;
|
|
|
|
unsigned int wildcard_prefix:1;
|
|
|
|
unsigned int password_hash:1; /* whether password is hashed with
|
|
|
|
* nt_password_hash() */
|
2012-11-21 16:04:21 +01:00
|
|
|
unsigned int remediation:1;
|
2014-03-29 18:31:56 +01:00
|
|
|
unsigned int macacl:1;
|
2008-02-28 02:34:43 +01:00
|
|
|
int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */
|
2014-03-07 22:19:52 +01:00
|
|
|
struct hostapd_radius_attr *accept_attr;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr {
|
|
|
|
u8 type;
|
|
|
|
struct wpabuf *val;
|
|
|
|
struct hostapd_radius_attr *next;
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2010-11-05 00:23:17 +01:00
|
|
|
#define NUM_TX_QUEUES 4
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
struct hostapd_tx_queue_params {
|
|
|
|
int aifs;
|
|
|
|
int cwmin;
|
|
|
|
int cwmax;
|
|
|
|
int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-10-17 22:55:50 +02:00
|
|
|
#define MAX_ROAMING_CONSORTIUM_LEN 15
|
|
|
|
|
|
|
|
struct hostapd_roaming_consortium {
|
|
|
|
u8 len;
|
|
|
|
u8 oi[MAX_ROAMING_CONSORTIUM_LEN];
|
|
|
|
};
|
|
|
|
|
2012-08-25 19:49:30 +02:00
|
|
|
struct hostapd_lang_string {
|
2012-02-26 21:34:21 +01:00
|
|
|
u8 lang[3];
|
|
|
|
u8 name_len;
|
|
|
|
u8 name[252];
|
|
|
|
};
|
|
|
|
|
2012-08-25 14:58:30 +02:00
|
|
|
#define MAX_NAI_REALMS 10
|
|
|
|
#define MAX_NAI_REALMLEN 255
|
|
|
|
#define MAX_NAI_EAP_METHODS 5
|
|
|
|
#define MAX_NAI_AUTH_TYPES 4
|
|
|
|
struct hostapd_nai_realm_data {
|
|
|
|
u8 encoding;
|
|
|
|
char realm_buf[MAX_NAI_REALMLEN + 1];
|
|
|
|
char *realm[MAX_NAI_REALMS];
|
|
|
|
u8 eap_method_count;
|
|
|
|
struct hostapd_nai_realm_eap {
|
|
|
|
u8 eap_method;
|
|
|
|
u8 num_auths;
|
|
|
|
u8 auth_id[MAX_NAI_AUTH_TYPES];
|
|
|
|
u8 auth_val[MAX_NAI_AUTH_TYPES];
|
|
|
|
} eap_method[MAX_NAI_EAP_METHODS];
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
/**
|
|
|
|
* struct hostapd_bss_config - Per-BSS configuration
|
|
|
|
*/
|
|
|
|
struct hostapd_bss_config {
|
|
|
|
char iface[IFNAMSIZ + 1];
|
|
|
|
char bridge[IFNAMSIZ + 1];
|
2013-06-25 10:09:01 +02:00
|
|
|
char vlan_bridge[IFNAMSIZ + 1];
|
2010-11-09 15:12:42 +01:00
|
|
|
char wds_bridge[IFNAMSIZ + 1];
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
enum hostapd_logger_level logger_syslog_level, logger_stdout_level;
|
|
|
|
|
|
|
|
unsigned int logger_syslog; /* module bitfield */
|
|
|
|
unsigned int logger_stdout; /* module bitfield */
|
|
|
|
|
|
|
|
int max_num_sta; /* maximum number of STAs in station table */
|
|
|
|
|
|
|
|
int dtim_period;
|
2014-10-16 01:36:04 +02:00
|
|
|
int bss_load_update_period;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int ieee802_1x; /* use IEEE 802.1X */
|
|
|
|
int eapol_version;
|
|
|
|
int eap_server; /* Use internal EAP server instead of external
|
|
|
|
* RADIUS server */
|
|
|
|
struct hostapd_eap_user *eap_user;
|
2012-11-20 23:47:47 +01:00
|
|
|
char *eap_user_sqlite;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *eap_sim_db;
|
|
|
|
struct hostapd_ip_addr own_ip_addr;
|
|
|
|
char *nas_identifier;
|
|
|
|
struct hostapd_radius_servers *radius;
|
2009-11-28 22:03:20 +01:00
|
|
|
int acct_interim_interval;
|
2012-05-05 17:19:54 +02:00
|
|
|
int radius_request_cui;
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr *radius_auth_req_attr;
|
|
|
|
struct hostapd_radius_attr *radius_acct_req_attr;
|
2012-05-06 21:02:42 +02:00
|
|
|
int radius_das_port;
|
2012-06-17 16:43:36 +02:00
|
|
|
unsigned int radius_das_time_window;
|
|
|
|
int radius_das_require_event_timestamp;
|
2012-05-06 21:02:42 +02:00
|
|
|
struct hostapd_ip_addr radius_das_client_addr;
|
|
|
|
u8 *radius_das_shared_secret;
|
|
|
|
size_t radius_das_shared_secret_len;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
struct hostapd_ssid ssid;
|
|
|
|
|
|
|
|
char *eap_req_id_text; /* optional displayable message sent with
|
|
|
|
* EAP Request-Identity */
|
|
|
|
size_t eap_req_id_text_len;
|
|
|
|
int eapol_key_index_workaround;
|
|
|
|
|
|
|
|
size_t default_wep_key_len;
|
|
|
|
int individual_wep_key_len;
|
|
|
|
int wep_rekeying_period;
|
|
|
|
int broadcast_key_idx_min, broadcast_key_idx_max;
|
|
|
|
int eap_reauth_period;
|
|
|
|
|
|
|
|
int ieee802_11f; /* use IEEE 802.11f (IAPP) */
|
|
|
|
char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast
|
|
|
|
* frames */
|
|
|
|
|
|
|
|
enum {
|
|
|
|
ACCEPT_UNLESS_DENIED = 0,
|
|
|
|
DENY_UNLESS_ACCEPTED = 1,
|
|
|
|
USE_EXTERNAL_RADIUS_AUTH = 2
|
|
|
|
} macaddr_acl;
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry *accept_mac;
|
2008-02-28 02:34:43 +01:00
|
|
|
int num_accept_mac;
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry *deny_mac;
|
2008-02-28 02:34:43 +01:00
|
|
|
int num_deny_mac;
|
2009-12-24 10:46:22 +01:00
|
|
|
int wds_sta;
|
2010-11-09 15:27:15 +01:00
|
|
|
int isolate;
|
2013-07-20 16:20:43 +02:00
|
|
|
int start_disabled;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
|
|
|
|
* algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
|
|
|
|
|
|
|
|
int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */
|
|
|
|
int wpa_key_mgmt;
|
|
|
|
#ifdef CONFIG_IEEE80211W
|
2009-03-26 15:06:15 +01:00
|
|
|
enum mfp_options ieee80211w;
|
2014-03-12 19:26:37 +01:00
|
|
|
int group_mgmt_cipher;
|
2008-12-26 11:30:34 +01:00
|
|
|
/* dot11AssociationSAQueryMaximumTimeout (in TUs) */
|
|
|
|
unsigned int assoc_sa_query_max_timeout;
|
|
|
|
/* dot11AssociationSAQueryRetryTimeout (in TUs) */
|
|
|
|
int assoc_sa_query_retry_timeout;
|
2008-02-28 02:34:43 +01:00
|
|
|
#endif /* CONFIG_IEEE80211W */
|
2011-12-11 12:01:57 +01:00
|
|
|
enum {
|
|
|
|
PSK_RADIUS_IGNORED = 0,
|
|
|
|
PSK_RADIUS_ACCEPTED = 1,
|
|
|
|
PSK_RADIUS_REQUIRED = 2
|
|
|
|
} wpa_psk_radius;
|
2008-02-28 02:34:43 +01:00
|
|
|
int wpa_pairwise;
|
|
|
|
int wpa_group;
|
|
|
|
int wpa_group_rekey;
|
|
|
|
int wpa_strict_rekey;
|
|
|
|
int wpa_gmk_rekey;
|
2008-11-06 18:57:21 +01:00
|
|
|
int wpa_ptk_rekey;
|
2008-02-28 02:34:43 +01:00
|
|
|
int rsn_pairwise;
|
|
|
|
int rsn_preauth;
|
|
|
|
char *rsn_preauth_interfaces;
|
|
|
|
int peerkey;
|
|
|
|
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
|
|
/* IEEE 802.11r - Fast BSS Transition */
|
|
|
|
u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
|
|
|
|
u8 r1_key_holder[FT_R1KH_ID_LEN];
|
|
|
|
u32 r0_key_lifetime;
|
|
|
|
u32 reassociation_deadline;
|
|
|
|
struct ft_remote_r0kh *r0kh_list;
|
|
|
|
struct ft_remote_r1kh *r1kh_list;
|
|
|
|
int pmk_r1_push;
|
2010-10-25 12:35:51 +02:00
|
|
|
int ft_over_ds;
|
2008-02-28 02:34:43 +01:00
|
|
|
#endif /* CONFIG_IEEE80211R */
|
|
|
|
|
|
|
|
char *ctrl_interface; /* directory for UNIX domain sockets */
|
2010-04-03 18:37:21 +02:00
|
|
|
#ifndef CONFIG_NATIVE_WINDOWS
|
2008-02-28 02:34:43 +01:00
|
|
|
gid_t ctrl_interface_gid;
|
2010-04-03 18:37:21 +02:00
|
|
|
#endif /* CONFIG_NATIVE_WINDOWS */
|
2008-02-28 02:34:43 +01:00
|
|
|
int ctrl_interface_gid_set;
|
|
|
|
|
|
|
|
char *ca_cert;
|
|
|
|
char *server_cert;
|
|
|
|
char *private_key;
|
|
|
|
char *private_key_passwd;
|
|
|
|
int check_crl;
|
2013-06-29 23:54:24 +02:00
|
|
|
char *ocsp_stapling_response;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *dh_file;
|
2014-10-12 10:52:05 +02:00
|
|
|
char *openssl_ciphers;
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 *pac_opaque_encr_key;
|
2008-10-19 08:55:59 +02:00
|
|
|
u8 *eap_fast_a_id;
|
|
|
|
size_t eap_fast_a_id_len;
|
|
|
|
char *eap_fast_a_id_info;
|
2008-10-08 15:55:23 +02:00
|
|
|
int eap_fast_prov;
|
2008-10-08 16:25:47 +02:00
|
|
|
int pac_key_lifetime;
|
|
|
|
int pac_key_refresh_time;
|
2008-02-28 02:34:43 +01:00
|
|
|
int eap_sim_aka_result_ind;
|
2008-03-09 09:37:18 +01:00
|
|
|
int tnc;
|
2010-07-19 04:28:53 +02:00
|
|
|
int fragment_size;
|
2010-09-15 09:51:40 +02:00
|
|
|
u16 pwd_group;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
char *radius_server_clients;
|
|
|
|
int radius_server_auth_port;
|
2014-02-15 14:37:53 +01:00
|
|
|
int radius_server_acct_port;
|
2008-02-28 02:34:43 +01:00
|
|
|
int radius_server_ipv6;
|
|
|
|
|
|
|
|
int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group
|
|
|
|
* address instead of individual address
|
|
|
|
* (for driver_wired.c).
|
|
|
|
*/
|
|
|
|
|
|
|
|
int ap_max_inactivity;
|
|
|
|
int ignore_broadcast_ssid;
|
|
|
|
|
2009-03-04 11:33:24 +01:00
|
|
|
int wmm_enabled;
|
2010-04-11 10:32:15 +02:00
|
|
|
int wmm_uapsd;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2013-08-04 20:45:50 +02:00
|
|
|
struct hostapd_vlan *vlan;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
macaddr bssid;
|
2008-02-28 02:54:06 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Maximum listen interval that STAs can use when associating with this
|
|
|
|
* BSS. If a STA tries to use larger value, the association will be
|
|
|
|
* denied with status code 51.
|
|
|
|
*/
|
|
|
|
u16 max_listen_interval;
|
2008-08-03 19:17:58 +02:00
|
|
|
|
2011-07-05 16:13:04 +02:00
|
|
|
int disable_pmksa_caching;
|
2008-08-03 19:17:58 +02:00
|
|
|
int okc; /* Opportunistic Key Caching */
|
2008-11-23 18:34:26 +01:00
|
|
|
|
|
|
|
int wps_state;
|
|
|
|
#ifdef CONFIG_WPS
|
2013-03-31 10:48:52 +02:00
|
|
|
int wps_independent;
|
2008-11-23 18:34:26 +01:00
|
|
|
int ap_setup_locked;
|
|
|
|
u8 uuid[16];
|
|
|
|
char *wps_pin_requests;
|
|
|
|
char *device_name;
|
|
|
|
char *manufacturer;
|
|
|
|
char *model_name;
|
|
|
|
char *model_number;
|
|
|
|
char *serial_number;
|
2011-03-17 17:50:22 +01:00
|
|
|
u8 device_type[WPS_DEV_TYPE_LEN];
|
2008-11-23 18:34:26 +01:00
|
|
|
char *config_methods;
|
|
|
|
u8 os_version[4];
|
|
|
|
char *ap_pin;
|
2009-01-16 21:50:41 +01:00
|
|
|
int skip_cred_build;
|
|
|
|
u8 *extra_cred;
|
|
|
|
size_t extra_cred_len;
|
2009-01-21 10:54:12 +01:00
|
|
|
int wps_cred_processing;
|
2013-09-01 09:08:30 +02:00
|
|
|
int force_per_enrollee_psk;
|
2009-01-23 20:08:55 +01:00
|
|
|
u8 *ap_settings;
|
|
|
|
size_t ap_settings_len;
|
2009-01-29 17:47:02 +01:00
|
|
|
char *upnp_iface;
|
|
|
|
char *friendly_name;
|
|
|
|
char *manufacturer_url;
|
|
|
|
char *model_description;
|
|
|
|
char *model_url;
|
|
|
|
char *upc;
|
2011-03-19 10:44:42 +01:00
|
|
|
struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS];
|
2013-02-15 10:24:29 +01:00
|
|
|
int wps_nfc_pw_from_config;
|
2012-06-28 18:43:29 +02:00
|
|
|
int wps_nfc_dev_pw_id;
|
|
|
|
struct wpabuf *wps_nfc_dh_pubkey;
|
|
|
|
struct wpabuf *wps_nfc_dh_privkey;
|
|
|
|
struct wpabuf *wps_nfc_dev_pw;
|
2008-11-23 18:34:26 +01:00
|
|
|
#endif /* CONFIG_WPS */
|
2011-05-17 18:53:02 +02:00
|
|
|
int pbc_in_m1;
|
2013-07-06 17:17:15 +02:00
|
|
|
char *server_id;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
#define P2P_ENABLED BIT(0)
|
|
|
|
#define P2P_GROUP_OWNER BIT(1)
|
|
|
|
#define P2P_GROUP_FORMATION BIT(2)
|
2010-07-18 23:30:26 +02:00
|
|
|
#define P2P_MANAGE BIT(3)
|
|
|
|
#define P2P_ALLOW_CROSS_CONNECTION BIT(4)
|
2010-07-18 23:30:25 +02:00
|
|
|
int p2p;
|
2013-03-16 18:13:31 +01:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
u8 ip_addr_go[4];
|
|
|
|
u8 ip_addr_mask[4];
|
|
|
|
u8 ip_addr_start[4];
|
|
|
|
u8 ip_addr_end[4];
|
|
|
|
#endif /* CONFIG_P2P */
|
2010-12-28 16:15:01 +01:00
|
|
|
|
|
|
|
int disassoc_low_ack;
|
2011-12-25 19:57:01 +01:00
|
|
|
int skip_inactivity_poll;
|
2011-01-28 18:21:59 +01:00
|
|
|
|
|
|
|
#define TDLS_PROHIBIT BIT(0)
|
|
|
|
#define TDLS_PROHIBIT_CHAN_SWITCH BIT(1)
|
|
|
|
int tdls;
|
2011-02-21 16:27:16 +01:00
|
|
|
int disable_11n;
|
2012-06-30 12:52:13 +02:00
|
|
|
int disable_11ac;
|
2011-09-23 19:26:17 +02:00
|
|
|
|
2011-10-17 23:24:16 +02:00
|
|
|
/* IEEE 802.11v */
|
|
|
|
int time_advertisement;
|
|
|
|
char *time_zone;
|
2012-12-16 18:16:17 +01:00
|
|
|
int wnm_sleep_mode;
|
2012-12-22 19:27:30 +01:00
|
|
|
int bss_transition;
|
2011-10-17 23:24:16 +02:00
|
|
|
|
2011-09-23 19:26:17 +02:00
|
|
|
/* IEEE 802.11u - Interworking */
|
|
|
|
int interworking;
|
|
|
|
int access_network_type;
|
|
|
|
int internet;
|
|
|
|
int asra;
|
|
|
|
int esr;
|
|
|
|
int uesa;
|
|
|
|
int venue_info_set;
|
|
|
|
u8 venue_group;
|
|
|
|
u8 venue_type;
|
|
|
|
u8 hessid[ETH_ALEN];
|
2011-10-17 22:55:50 +02:00
|
|
|
|
|
|
|
/* IEEE 802.11u - Roaming Consortium list */
|
|
|
|
unsigned int roaming_consortium_count;
|
|
|
|
struct hostapd_roaming_consortium *roaming_consortium;
|
2011-11-30 16:44:43 +01:00
|
|
|
|
2012-02-26 21:34:21 +01:00
|
|
|
/* IEEE 802.11u - Venue Name duples */
|
|
|
|
unsigned int venue_name_count;
|
2012-08-25 19:49:30 +02:00
|
|
|
struct hostapd_lang_string *venue_name;
|
2012-02-26 21:34:21 +01:00
|
|
|
|
2012-07-30 20:45:31 +02:00
|
|
|
/* IEEE 802.11u - Network Authentication Type */
|
|
|
|
u8 *network_auth_type;
|
|
|
|
size_t network_auth_type_len;
|
|
|
|
|
2012-07-30 20:51:19 +02:00
|
|
|
/* IEEE 802.11u - IP Address Type Availability */
|
|
|
|
u8 ipaddr_type_availability;
|
|
|
|
u8 ipaddr_type_configured;
|
|
|
|
|
2012-07-30 21:07:35 +02:00
|
|
|
/* IEEE 802.11u - 3GPP Cellular Network */
|
|
|
|
u8 *anqp_3gpp_cell_net;
|
|
|
|
size_t anqp_3gpp_cell_net_len;
|
|
|
|
|
2012-07-30 20:55:46 +02:00
|
|
|
/* IEEE 802.11u - Domain Name */
|
|
|
|
u8 *domain_name;
|
|
|
|
size_t domain_name_len;
|
|
|
|
|
2012-08-25 14:58:30 +02:00
|
|
|
unsigned int nai_realm_count;
|
|
|
|
struct hostapd_nai_realm_data *nai_realm_data;
|
|
|
|
|
2012-02-26 21:34:19 +01:00
|
|
|
u16 gas_comeback_delay;
|
|
|
|
int gas_frag_limit;
|
|
|
|
|
2013-07-24 11:28:20 +02:00
|
|
|
u8 qos_map_set[16 + 2 * 21];
|
|
|
|
unsigned int qos_map_set_len;
|
|
|
|
|
2013-07-23 20:25:21 +02:00
|
|
|
int osen;
|
AP: Add support for Proxy ARP, DHCP snooping mechanism
Proxy ARP allows the AP devices to keep track of the hardware address to
IP address mapping of the STA devices within the BSS. When a request for
such information is made (i.e., ARP request, Neighbor Solicitation), the
AP will respond on behalf of the STA device within the BSS. Such
requests could originate from a device within the BSS or also from the
bridge. In the process of the AP replying to the request (i.e., ARP
reply, Neighbor Advertisement), the AP will drop the original request
frame. The relevant STA will not even know that such information was
ever requested.
This feature is a requirement for Hotspot 2.0, and is defined in IEEE
Std 802.11-2012, 10.23.13. While the Proxy ARP support code mainly
resides in the kernel bridge code, in order to optimize the performance
and simplify kernel implementation, the DHCP snooping code was added to
the hostapd.
Signed-off-by: Kyeyoon Park <kyeyoonp@qca.qualcomm.com>
2014-09-26 07:32:55 +02:00
|
|
|
int proxy_arp;
|
2011-09-08 19:52:23 +02:00
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
int hs20;
|
2011-10-18 11:38:32 +02:00
|
|
|
int disable_dgaf;
|
2013-03-17 14:59:36 +01:00
|
|
|
u16 anqp_domain_id;
|
2012-08-25 15:03:51 +02:00
|
|
|
unsigned int hs20_oper_friendly_name_count;
|
|
|
|
struct hostapd_lang_string *hs20_oper_friendly_name;
|
2012-08-25 15:09:01 +02:00
|
|
|
u8 *hs20_wan_metrics;
|
2012-08-25 15:12:40 +02:00
|
|
|
u8 *hs20_connection_capability;
|
|
|
|
size_t hs20_connection_capability_len;
|
2012-08-25 15:17:21 +02:00
|
|
|
u8 *hs20_operating_class;
|
|
|
|
u8 hs20_operating_class_len;
|
2013-03-17 15:28:59 +01:00
|
|
|
struct hs20_icon {
|
|
|
|
u16 width;
|
|
|
|
u16 height;
|
|
|
|
char language[3];
|
|
|
|
char type[256];
|
|
|
|
char name[256];
|
|
|
|
char file[256];
|
|
|
|
} *hs20_icons;
|
|
|
|
size_t hs20_icons_count;
|
2013-03-17 15:34:09 +01:00
|
|
|
u8 osu_ssid[HOSTAPD_MAX_SSID_LEN];
|
|
|
|
size_t osu_ssid_len;
|
|
|
|
struct hs20_osu_provider {
|
|
|
|
unsigned int friendly_name_count;
|
|
|
|
struct hostapd_lang_string *friendly_name;
|
|
|
|
char *server_uri;
|
|
|
|
int *method_list;
|
|
|
|
char **icons;
|
|
|
|
size_t icons_count;
|
|
|
|
char *osu_nai;
|
|
|
|
unsigned int service_desc_count;
|
|
|
|
struct hostapd_lang_string *service_desc;
|
|
|
|
} *hs20_osu_providers, *last_osu;
|
|
|
|
size_t hs20_osu_providers_count;
|
2013-07-26 21:13:58 +02:00
|
|
|
unsigned int hs20_deauth_req_timeout;
|
2012-11-21 16:04:21 +01:00
|
|
|
char *subscr_remediation_url;
|
|
|
|
u8 subscr_remediation_method;
|
2011-09-08 19:52:23 +02:00
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
2011-11-30 16:44:43 +01:00
|
|
|
u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */
|
2011-12-08 23:15:04 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_RADIUS_TEST
|
|
|
|
char *dump_msk_file;
|
|
|
|
#endif /* CONFIG_RADIUS_TEST */
|
2012-08-27 15:20:10 +02:00
|
|
|
|
|
|
|
struct wpabuf *vendor_elements;
|
2012-12-31 15:58:36 +01:00
|
|
|
|
|
|
|
unsigned int sae_anti_clogging_threshold;
|
2013-01-01 15:23:47 +01:00
|
|
|
int *sae_groups;
|
2013-08-06 17:23:22 +02:00
|
|
|
|
2014-09-03 23:58:37 +02:00
|
|
|
char *wowlan_triggers; /* Wake-on-WLAN triggers */
|
|
|
|
|
2013-08-06 17:23:22 +02:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
u8 bss_load_test[5];
|
|
|
|
u8 bss_load_test_set;
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2014-09-01 06:23:21 +02:00
|
|
|
|
|
|
|
#define MESH_ENABLED BIT(0)
|
|
|
|
int mesh;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct hostapd_config - Per-radio interface configuration
|
|
|
|
*/
|
|
|
|
struct hostapd_config {
|
2013-10-29 15:23:23 +01:00
|
|
|
struct hostapd_bss_config **bss, *last_bss;
|
2008-02-28 02:34:43 +01:00
|
|
|
size_t num_bss;
|
|
|
|
|
|
|
|
u16 beacon_int;
|
|
|
|
int rts_threshold;
|
|
|
|
int fragm_threshold;
|
|
|
|
u8 send_probe_response;
|
|
|
|
u8 channel;
|
2014-02-06 19:30:37 +01:00
|
|
|
int *chanlist;
|
2009-12-26 09:35:08 +01:00
|
|
|
enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */
|
2008-02-28 02:34:43 +01:00
|
|
|
enum {
|
|
|
|
LONG_PREAMBLE = 0,
|
|
|
|
SHORT_PREAMBLE = 1
|
|
|
|
} preamble;
|
|
|
|
|
|
|
|
int *supported_rates;
|
|
|
|
int *basic_rates;
|
|
|
|
|
2009-04-09 12:40:12 +02:00
|
|
|
const struct wpa_driver_ops *driver;
|
2014-11-29 12:24:42 +01:00
|
|
|
char *driver_params;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int ap_table_max_size;
|
|
|
|
int ap_table_expiration_time;
|
|
|
|
|
|
|
|
char country[3]; /* first two octets: country code as described in
|
|
|
|
* ISO/IEC 3166-1. Third octet:
|
|
|
|
* ' ' (ascii 32): all environments
|
|
|
|
* 'O': Outdoor environemnt only
|
|
|
|
* 'I': Indoor environment only
|
|
|
|
*/
|
|
|
|
|
|
|
|
int ieee80211d;
|
|
|
|
|
2013-05-09 19:14:53 +02:00
|
|
|
int ieee80211h; /* DFS */
|
|
|
|
|
2014-02-21 14:42:17 +01:00
|
|
|
/*
|
|
|
|
* Local power constraint is an octet encoded as an unsigned integer in
|
|
|
|
* units of decibels. Invalid value -1 indicates that Power Constraint
|
|
|
|
* element will not be added.
|
|
|
|
*/
|
|
|
|
int local_pwr_constraint;
|
|
|
|
|
2014-02-21 14:42:18 +01:00
|
|
|
/* Control Spectrum Management bit */
|
|
|
|
int spectrum_mgmt_required;
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES];
|
|
|
|
|
|
|
|
/*
|
2009-03-04 11:33:24 +01:00
|
|
|
* WMM AC parameters, in same order as 802.1D, i.e.
|
2008-02-28 02:34:43 +01:00
|
|
|
* 0 = BE (best effort)
|
|
|
|
* 1 = BK (background)
|
|
|
|
* 2 = VI (video)
|
|
|
|
* 3 = VO (voice)
|
|
|
|
*/
|
2009-03-04 11:33:24 +01:00
|
|
|
struct hostapd_wmm_ac_params wmm_ac_params[4];
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2008-08-22 20:03:31 +02:00
|
|
|
int ht_op_mode_fixed;
|
|
|
|
u16 ht_capab;
|
2008-12-09 23:45:57 +01:00
|
|
|
int ieee80211n;
|
2008-11-25 19:59:39 +01:00
|
|
|
int secondary_channel;
|
2011-02-09 14:08:47 +01:00
|
|
|
int require_ht;
|
2013-09-04 17:59:52 +02:00
|
|
|
int obss_interval;
|
2012-06-30 12:52:13 +02:00
|
|
|
u32 vht_capab;
|
|
|
|
int ieee80211ac;
|
2012-08-10 18:53:24 +02:00
|
|
|
int require_vht;
|
2012-06-30 12:52:13 +02:00
|
|
|
u8 vht_oper_chwidth;
|
2012-08-10 18:54:54 +02:00
|
|
|
u8 vht_oper_centr_freq_seg0_idx;
|
2012-11-24 17:02:29 +01:00
|
|
|
u8 vht_oper_centr_freq_seg1_idx;
|
2013-04-23 16:51:28 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
double ignore_probe_probability;
|
|
|
|
double ignore_auth_probability;
|
|
|
|
double ignore_assoc_probability;
|
|
|
|
double ignore_reassoc_probability;
|
2013-05-04 10:45:03 +02:00
|
|
|
double corrupt_gtk_rekey_mic_probability;
|
2013-04-23 16:51:28 +02:00
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2013-08-31 10:49:51 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_ACS
|
|
|
|
unsigned int acs_num_scans;
|
|
|
|
#endif /* CONFIG_ACS */
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
int hostapd_mac_comp(const void *a, const void *b);
|
|
|
|
int hostapd_mac_comp_empty(const void *a);
|
2009-03-26 19:35:49 +01:00
|
|
|
struct hostapd_config * hostapd_config_defaults(void);
|
2009-12-24 20:05:40 +01:00
|
|
|
void hostapd_config_defaults_bss(struct hostapd_bss_config *bss);
|
2014-03-07 22:19:52 +01:00
|
|
|
void hostapd_config_free_eap_user(struct hostapd_eap_user *user);
|
2013-10-17 17:56:30 +02:00
|
|
|
void hostapd_config_free_bss(struct hostapd_bss_config *conf);
|
2008-02-28 02:34:43 +01:00
|
|
|
void hostapd_config_free(struct hostapd_config *conf);
|
2008-08-28 17:43:26 +02:00
|
|
|
int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
|
|
|
|
const u8 *addr, int *vlan_id);
|
2008-02-28 02:34:43 +01:00
|
|
|
int hostapd_rate_found(int *list, int rate);
|
|
|
|
const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
|
2013-09-01 10:30:26 +02:00
|
|
|
const u8 *addr, const u8 *p2p_dev_addr,
|
|
|
|
const u8 *prev_psk);
|
2008-02-28 02:34:43 +01:00
|
|
|
int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf);
|
2013-06-25 11:03:02 +02:00
|
|
|
int hostapd_vlan_id_valid(struct hostapd_vlan *vlan, int vlan_id);
|
2008-02-28 02:34:43 +01:00
|
|
|
const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan,
|
|
|
|
int vlan_id);
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr *
|
|
|
|
hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type);
|
2014-01-07 19:14:53 +01:00
|
|
|
int hostapd_config_check(struct hostapd_config *conf, int full_config);
|
2014-05-30 19:40:11 +02:00
|
|
|
void hostapd_set_security_params(struct hostapd_bss_config *bss,
|
|
|
|
int full_config);
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-12-21 15:10:21 +01:00
|
|
|
#endif /* HOSTAPD_CONFIG_H */
|