2008-02-28 02:34:43 +01:00
|
|
|
/*
|
2009-12-24 20:05:40 +01:00
|
|
|
* hostapd / Configuration definitions and helpers functions
|
2022-04-02 12:12:43 +02:00
|
|
|
* Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi>
|
2008-02-28 02:34:43 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-28 02:34:43 +01:00
|
|
|
*/
|
|
|
|
|
2009-12-21 15:10:21 +01:00
|
|
|
#ifndef HOSTAPD_CONFIG_H
|
|
|
|
#define HOSTAPD_CONFIG_H
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-11-29 16:51:55 +01:00
|
|
|
#include "common/defs.h"
|
2015-10-07 15:14:09 +02:00
|
|
|
#include "utils/list.h"
|
2008-02-28 02:34:43 +01:00
|
|
|
#include "ip_addr.h"
|
2009-11-29 16:51:55 +01:00
|
|
|
#include "common/wpa_common.h"
|
2015-04-07 11:41:20 +02:00
|
|
|
#include "common/ieee802_11_defs.h"
|
2012-08-12 10:33:00 +02:00
|
|
|
#include "common/ieee802_11_common.h"
|
2019-03-24 21:17:49 +01:00
|
|
|
#include "crypto/sha256.h"
|
2011-03-17 17:50:22 +01:00
|
|
|
#include "wps/wps.h"
|
2015-01-21 14:30:48 +01:00
|
|
|
#include "fst/fst.h"
|
2016-01-21 14:51:56 +01:00
|
|
|
#include "vlan.h"
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2022-05-05 08:25:43 +02:00
|
|
|
enum macaddr_acl {
|
|
|
|
ACCEPT_UNLESS_DENIED = 0,
|
|
|
|
DENY_UNLESS_ACCEPTED = 1,
|
|
|
|
USE_EXTERNAL_RADIUS_AUTH = 2
|
|
|
|
};
|
|
|
|
|
2014-09-01 06:23:21 +02:00
|
|
|
/**
|
|
|
|
* mesh_conf - local MBSS state and settings
|
|
|
|
*/
|
|
|
|
struct mesh_conf {
|
|
|
|
u8 meshid[32];
|
|
|
|
u8 meshid_len;
|
|
|
|
/* Active Path Selection Protocol Identifier */
|
|
|
|
u8 mesh_pp_id;
|
|
|
|
/* Active Path Selection Metric Identifier */
|
|
|
|
u8 mesh_pm_id;
|
|
|
|
/* Congestion Control Mode Identifier */
|
|
|
|
u8 mesh_cc_id;
|
|
|
|
/* Synchronization Protocol Identifier */
|
|
|
|
u8 mesh_sp_id;
|
|
|
|
/* Authentication Protocol Identifier */
|
|
|
|
u8 mesh_auth_id;
|
2015-08-31 09:58:09 +02:00
|
|
|
u8 *rsn_ie;
|
|
|
|
int rsn_ie_len;
|
2014-09-01 06:23:21 +02:00
|
|
|
#define MESH_CONF_SEC_NONE BIT(0)
|
|
|
|
#define MESH_CONF_SEC_AUTH BIT(1)
|
|
|
|
#define MESH_CONF_SEC_AMPE BIT(2)
|
|
|
|
unsigned int security;
|
2016-06-18 13:05:47 +02:00
|
|
|
enum mfp_options ieee80211w;
|
2018-08-06 21:46:25 +02:00
|
|
|
int ocv;
|
2016-06-18 21:14:37 +02:00
|
|
|
unsigned int pairwise_cipher;
|
|
|
|
unsigned int group_cipher;
|
|
|
|
unsigned int mgmt_group_cipher;
|
2014-11-15 02:35:32 +01:00
|
|
|
int dot11MeshMaxRetries;
|
|
|
|
int dot11MeshRetryTimeout; /* msec */
|
|
|
|
int dot11MeshConfirmTimeout; /* msec */
|
|
|
|
int dot11MeshHoldingTimeout; /* msec */
|
2021-08-31 09:44:07 +02:00
|
|
|
int mesh_fwding;
|
2014-09-01 06:23:21 +02:00
|
|
|
};
|
|
|
|
|
2009-12-24 20:05:40 +01:00
|
|
|
#define MAX_STA_COUNT 2007
|
|
|
|
#define MAX_VLAN_ID 4094
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
typedef u8 macaddr[ETH_ALEN];
|
|
|
|
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry {
|
|
|
|
macaddr addr;
|
2016-01-21 14:51:56 +01:00
|
|
|
struct vlan_description vlan_id;
|
2008-08-28 17:43:26 +02:00
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_radius_servers;
|
|
|
|
struct ft_remote_r0kh;
|
|
|
|
struct ft_remote_r1kh;
|
|
|
|
|
2020-02-29 15:52:39 +01:00
|
|
|
#ifdef CONFIG_WEP
|
2008-02-28 02:34:43 +01:00
|
|
|
#define NUM_WEP_KEYS 4
|
|
|
|
struct hostapd_wep_keys {
|
|
|
|
u8 idx;
|
|
|
|
u8 *key[NUM_WEP_KEYS];
|
|
|
|
size_t len[NUM_WEP_KEYS];
|
|
|
|
int keys_set;
|
|
|
|
size_t default_len; /* key length used for dynamic key generation */
|
|
|
|
};
|
2020-02-29 15:52:39 +01:00
|
|
|
#endif /* CONFIG_WEP */
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
typedef enum hostap_security_policy {
|
|
|
|
SECURITY_PLAINTEXT = 0,
|
2020-02-29 15:52:39 +01:00
|
|
|
#ifdef CONFIG_WEP
|
2008-02-28 02:34:43 +01:00
|
|
|
SECURITY_STATIC_WEP = 1,
|
2020-02-29 15:52:39 +01:00
|
|
|
#endif /* CONFIG_WEP */
|
2008-02-28 02:34:43 +01:00
|
|
|
SECURITY_IEEE_802_1X = 2,
|
|
|
|
SECURITY_WPA_PSK = 3,
|
2013-07-23 20:25:21 +02:00
|
|
|
SECURITY_WPA = 4,
|
|
|
|
SECURITY_OSEN = 5
|
2008-02-28 02:34:43 +01:00
|
|
|
} secpolicy;
|
|
|
|
|
|
|
|
struct hostapd_ssid {
|
2015-04-07 11:41:20 +02:00
|
|
|
u8 ssid[SSID_MAX_LEN];
|
2008-02-28 02:34:43 +01:00
|
|
|
size_t ssid_len;
|
2019-06-19 14:49:15 +02:00
|
|
|
u32 short_ssid;
|
2012-12-16 19:46:51 +01:00
|
|
|
unsigned int ssid_set:1;
|
|
|
|
unsigned int utf8_ssid:1;
|
2013-10-29 15:55:15 +01:00
|
|
|
unsigned int wpa_passphrase_set:1;
|
|
|
|
unsigned int wpa_psk_set:1;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
char vlan[IFNAMSIZ + 1];
|
|
|
|
secpolicy security_policy;
|
|
|
|
|
|
|
|
struct hostapd_wpa_psk *wpa_psk;
|
|
|
|
char *wpa_passphrase;
|
|
|
|
char *wpa_psk_file;
|
2019-09-06 14:51:37 +02:00
|
|
|
struct sae_pt *pt;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2020-02-29 15:52:39 +01:00
|
|
|
#ifdef CONFIG_WEP
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_wep_keys wep;
|
2020-02-29 15:52:39 +01:00
|
|
|
#endif /* CONFIG_WEP */
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
#define DYNAMIC_VLAN_DISABLED 0
|
|
|
|
#define DYNAMIC_VLAN_OPTIONAL 1
|
|
|
|
#define DYNAMIC_VLAN_REQUIRED 2
|
|
|
|
int dynamic_vlan;
|
2012-08-10 11:38:17 +02:00
|
|
|
#define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0
|
|
|
|
#define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1
|
|
|
|
#define DYNAMIC_VLAN_NAMING_END 2
|
|
|
|
int vlan_naming;
|
2016-01-21 14:52:00 +01:00
|
|
|
int per_sta_vif;
|
2008-02-28 02:34:43 +01:00
|
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
|
|
char *vlan_tagged_interface;
|
|
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
#define VLAN_ID_WILDCARD -1
|
|
|
|
|
|
|
|
struct hostapd_vlan {
|
|
|
|
struct hostapd_vlan *next;
|
|
|
|
int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */
|
2016-01-21 14:51:56 +01:00
|
|
|
struct vlan_description vlan_desc;
|
2008-02-28 02:34:43 +01:00
|
|
|
char ifname[IFNAMSIZ + 1];
|
2018-11-14 17:50:23 +01:00
|
|
|
char bridge[IFNAMSIZ + 1];
|
2015-04-10 14:49:49 +02:00
|
|
|
int configured;
|
2008-02-28 02:34:43 +01:00
|
|
|
int dynamic_vlan;
|
|
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
|
|
|
|
|
|
#define DVLAN_CLEAN_WLAN_PORT 0x8
|
|
|
|
int clean;
|
|
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define PMK_LEN 32
|
2019-01-16 13:35:19 +01:00
|
|
|
#define KEYID_LEN 32
|
2016-02-24 12:53:38 +01:00
|
|
|
#define MIN_PASSPHRASE_LEN 8
|
2016-02-24 12:53:36 +01:00
|
|
|
#define MAX_PASSPHRASE_LEN 63
|
2012-11-25 16:41:13 +01:00
|
|
|
struct hostapd_sta_wpa_psk_short {
|
|
|
|
struct hostapd_sta_wpa_psk_short *next;
|
2016-02-24 12:53:36 +01:00
|
|
|
unsigned int is_passphrase:1;
|
2012-11-25 16:41:13 +01:00
|
|
|
u8 psk[PMK_LEN];
|
2016-02-24 12:53:36 +01:00
|
|
|
char passphrase[MAX_PASSPHRASE_LEN + 1];
|
2016-02-24 12:53:37 +01:00
|
|
|
int ref; /* (number of references held) - 1 */
|
2012-11-25 16:41:13 +01:00
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_wpa_psk {
|
|
|
|
struct hostapd_wpa_psk *next;
|
|
|
|
int group;
|
2019-01-16 13:35:19 +01:00
|
|
|
char keyid[KEYID_LEN];
|
2020-02-10 12:49:33 +01:00
|
|
|
int wps;
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 psk[PMK_LEN];
|
|
|
|
u8 addr[ETH_ALEN];
|
2013-09-01 09:47:34 +02:00
|
|
|
u8 p2p_dev_addr[ETH_ALEN];
|
2019-02-14 12:34:33 +01:00
|
|
|
int vlan_id;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct hostapd_eap_user {
|
|
|
|
struct hostapd_eap_user *next;
|
|
|
|
u8 *identity;
|
|
|
|
size_t identity_len;
|
|
|
|
struct {
|
|
|
|
int vendor;
|
|
|
|
u32 method;
|
2011-11-17 19:06:33 +01:00
|
|
|
} methods[EAP_MAX_METHODS];
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 *password;
|
|
|
|
size_t password_len;
|
2018-05-25 20:40:04 +02:00
|
|
|
u8 *salt;
|
|
|
|
size_t salt_len; /* non-zero when password is salted */
|
2008-02-28 02:34:43 +01:00
|
|
|
int phase2;
|
|
|
|
int force_version;
|
|
|
|
unsigned int wildcard_prefix:1;
|
|
|
|
unsigned int password_hash:1; /* whether password is hashed with
|
|
|
|
* nt_password_hash() */
|
2012-11-21 16:04:21 +01:00
|
|
|
unsigned int remediation:1;
|
2014-03-29 18:31:56 +01:00
|
|
|
unsigned int macacl:1;
|
2008-02-28 02:34:43 +01:00
|
|
|
int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */
|
2014-03-07 22:19:52 +01:00
|
|
|
struct hostapd_radius_attr *accept_attr;
|
2018-04-25 23:57:44 +02:00
|
|
|
u32 t_c_timestamp;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr {
|
|
|
|
u8 type;
|
|
|
|
struct wpabuf *val;
|
|
|
|
struct hostapd_radius_attr *next;
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2010-11-05 00:23:17 +01:00
|
|
|
#define NUM_TX_QUEUES 4
|
2011-10-17 22:55:50 +02:00
|
|
|
#define MAX_ROAMING_CONSORTIUM_LEN 15
|
|
|
|
|
|
|
|
struct hostapd_roaming_consortium {
|
|
|
|
u8 len;
|
|
|
|
u8 oi[MAX_ROAMING_CONSORTIUM_LEN];
|
|
|
|
};
|
|
|
|
|
2012-08-25 19:49:30 +02:00
|
|
|
struct hostapd_lang_string {
|
2012-02-26 21:34:21 +01:00
|
|
|
u8 lang[3];
|
|
|
|
u8 name_len;
|
|
|
|
u8 name[252];
|
|
|
|
};
|
|
|
|
|
2018-03-26 15:10:47 +02:00
|
|
|
struct hostapd_venue_url {
|
|
|
|
u8 venue_number;
|
|
|
|
u8 url_len;
|
|
|
|
u8 url[254];
|
|
|
|
};
|
|
|
|
|
2012-08-25 14:58:30 +02:00
|
|
|
#define MAX_NAI_REALMS 10
|
|
|
|
#define MAX_NAI_REALMLEN 255
|
|
|
|
#define MAX_NAI_EAP_METHODS 5
|
|
|
|
#define MAX_NAI_AUTH_TYPES 4
|
|
|
|
struct hostapd_nai_realm_data {
|
|
|
|
u8 encoding;
|
|
|
|
char realm_buf[MAX_NAI_REALMLEN + 1];
|
|
|
|
char *realm[MAX_NAI_REALMS];
|
|
|
|
u8 eap_method_count;
|
|
|
|
struct hostapd_nai_realm_eap {
|
|
|
|
u8 eap_method;
|
|
|
|
u8 num_auths;
|
|
|
|
u8 auth_id[MAX_NAI_AUTH_TYPES];
|
|
|
|
u8 auth_val[MAX_NAI_AUTH_TYPES];
|
|
|
|
} eap_method[MAX_NAI_EAP_METHODS];
|
|
|
|
};
|
|
|
|
|
2015-10-07 15:14:09 +02:00
|
|
|
struct anqp_element {
|
|
|
|
struct dl_list list;
|
|
|
|
u16 infoid;
|
|
|
|
struct wpabuf *payload;
|
|
|
|
};
|
|
|
|
|
2016-12-17 16:19:34 +01:00
|
|
|
struct fils_realm {
|
|
|
|
struct dl_list list;
|
|
|
|
u8 hash[2];
|
|
|
|
char realm[];
|
|
|
|
};
|
|
|
|
|
2018-05-19 16:28:01 +02:00
|
|
|
struct sae_password_entry {
|
|
|
|
struct sae_password_entry *next;
|
|
|
|
char *password;
|
|
|
|
char *identifier;
|
|
|
|
u8 peer_addr[ETH_ALEN];
|
2019-02-17 16:22:37 +01:00
|
|
|
int vlan_id;
|
2019-09-06 14:51:37 +02:00
|
|
|
struct sae_pt *pt;
|
2020-05-30 22:30:42 +02:00
|
|
|
struct sae_pk *pk;
|
2018-05-19 16:28:01 +02:00
|
|
|
};
|
2015-10-07 15:14:09 +02:00
|
|
|
|
2019-03-24 21:17:49 +01:00
|
|
|
struct dpp_controller_conf {
|
|
|
|
struct dpp_controller_conf *next;
|
|
|
|
u8 pkhash[SHA256_MAC_LEN];
|
|
|
|
struct hostapd_ip_addr ipaddr;
|
|
|
|
};
|
|
|
|
|
2019-03-20 15:58:52 +01:00
|
|
|
struct airtime_sta_weight {
|
|
|
|
struct airtime_sta_weight *next;
|
|
|
|
unsigned int weight;
|
|
|
|
u8 addr[ETH_ALEN];
|
|
|
|
};
|
|
|
|
|
2021-03-22 10:29:31 +01:00
|
|
|
#define EXT_CAPA_MAX_LEN 15
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
/**
|
|
|
|
* struct hostapd_bss_config - Per-BSS configuration
|
|
|
|
*/
|
|
|
|
struct hostapd_bss_config {
|
|
|
|
char iface[IFNAMSIZ + 1];
|
|
|
|
char bridge[IFNAMSIZ + 1];
|
2013-06-25 10:09:01 +02:00
|
|
|
char vlan_bridge[IFNAMSIZ + 1];
|
2010-11-09 15:12:42 +01:00
|
|
|
char wds_bridge[IFNAMSIZ + 1];
|
2023-02-23 05:57:23 +01:00
|
|
|
int bridge_hairpin; /* hairpin_mode on bridge members */
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
enum hostapd_logger_level logger_syslog_level, logger_stdout_level;
|
|
|
|
|
|
|
|
unsigned int logger_syslog; /* module bitfield */
|
|
|
|
unsigned int logger_stdout; /* module bitfield */
|
|
|
|
|
|
|
|
int max_num_sta; /* maximum number of STAs in station table */
|
|
|
|
|
|
|
|
int dtim_period;
|
2017-12-11 23:42:40 +01:00
|
|
|
unsigned int bss_load_update_period;
|
2017-12-04 10:23:33 +01:00
|
|
|
unsigned int chan_util_avg_period;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int ieee802_1x; /* use IEEE 802.1X */
|
|
|
|
int eapol_version;
|
|
|
|
int eap_server; /* Use internal EAP server instead of external
|
|
|
|
* RADIUS server */
|
|
|
|
struct hostapd_eap_user *eap_user;
|
2012-11-20 23:47:47 +01:00
|
|
|
char *eap_user_sqlite;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *eap_sim_db;
|
2015-06-10 13:15:24 +02:00
|
|
|
unsigned int eap_sim_db_timeout;
|
2014-11-29 20:28:24 +01:00
|
|
|
int eap_server_erp; /* Whether ERP is enabled on internal EAP server */
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_ip_addr own_ip_addr;
|
|
|
|
char *nas_identifier;
|
|
|
|
struct hostapd_radius_servers *radius;
|
2009-11-28 22:03:20 +01:00
|
|
|
int acct_interim_interval;
|
2012-05-05 17:19:54 +02:00
|
|
|
int radius_request_cui;
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr *radius_auth_req_attr;
|
|
|
|
struct hostapd_radius_attr *radius_acct_req_attr;
|
2019-07-21 14:05:56 +02:00
|
|
|
char *radius_req_attr_sqlite;
|
2012-05-06 21:02:42 +02:00
|
|
|
int radius_das_port;
|
2012-06-17 16:43:36 +02:00
|
|
|
unsigned int radius_das_time_window;
|
|
|
|
int radius_das_require_event_timestamp;
|
2016-07-26 20:17:09 +02:00
|
|
|
int radius_das_require_message_authenticator;
|
2012-05-06 21:02:42 +02:00
|
|
|
struct hostapd_ip_addr radius_das_client_addr;
|
|
|
|
u8 *radius_das_shared_secret;
|
|
|
|
size_t radius_das_shared_secret_len;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
struct hostapd_ssid ssid;
|
|
|
|
|
|
|
|
char *eap_req_id_text; /* optional displayable message sent with
|
|
|
|
* EAP Request-Identity */
|
|
|
|
size_t eap_req_id_text_len;
|
|
|
|
int eapol_key_index_workaround;
|
|
|
|
|
2020-02-29 15:52:39 +01:00
|
|
|
#ifdef CONFIG_WEP
|
2008-02-28 02:34:43 +01:00
|
|
|
size_t default_wep_key_len;
|
|
|
|
int individual_wep_key_len;
|
|
|
|
int wep_rekeying_period;
|
|
|
|
int broadcast_key_idx_min, broadcast_key_idx_max;
|
2020-02-29 15:52:39 +01:00
|
|
|
#endif /* CONFIG_WEP */
|
2008-02-28 02:34:43 +01:00
|
|
|
int eap_reauth_period;
|
2014-11-29 19:33:09 +01:00
|
|
|
int erp_send_reauth_start;
|
|
|
|
char *erp_domain;
|
2022-04-05 22:51:13 +02:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
bool eap_skip_prot_success;
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2022-05-05 08:25:43 +02:00
|
|
|
enum macaddr_acl macaddr_acl;
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry *accept_mac;
|
2008-02-28 02:34:43 +01:00
|
|
|
int num_accept_mac;
|
2008-08-28 17:43:26 +02:00
|
|
|
struct mac_acl_entry *deny_mac;
|
2008-02-28 02:34:43 +01:00
|
|
|
int num_deny_mac;
|
2009-12-24 10:46:22 +01:00
|
|
|
int wds_sta;
|
2010-11-09 15:27:15 +01:00
|
|
|
int isolate;
|
2013-07-20 16:20:43 +02:00
|
|
|
int start_disabled;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
|
|
|
|
* algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
|
|
|
|
|
|
|
|
int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */
|
2020-03-20 20:04:31 +01:00
|
|
|
int extended_key_id;
|
2008-02-28 02:34:43 +01:00
|
|
|
int wpa_key_mgmt;
|
2009-03-26 15:06:15 +01:00
|
|
|
enum mfp_options ieee80211w;
|
2014-03-12 19:26:37 +01:00
|
|
|
int group_mgmt_cipher;
|
2020-02-17 21:54:23 +01:00
|
|
|
int beacon_prot;
|
2008-12-26 11:30:34 +01:00
|
|
|
/* dot11AssociationSAQueryMaximumTimeout (in TUs) */
|
|
|
|
unsigned int assoc_sa_query_max_timeout;
|
|
|
|
/* dot11AssociationSAQueryRetryTimeout (in TUs) */
|
|
|
|
int assoc_sa_query_retry_timeout;
|
2018-08-06 21:46:25 +02:00
|
|
|
#ifdef CONFIG_OCV
|
|
|
|
int ocv; /* Operating Channel Validation */
|
|
|
|
#endif /* CONFIG_OCV */
|
2011-12-11 12:01:57 +01:00
|
|
|
enum {
|
|
|
|
PSK_RADIUS_IGNORED = 0,
|
|
|
|
PSK_RADIUS_ACCEPTED = 1,
|
2022-04-02 12:12:43 +02:00
|
|
|
PSK_RADIUS_REQUIRED = 2,
|
|
|
|
PSK_RADIUS_DURING_4WAY_HS = 3,
|
2011-12-11 12:01:57 +01:00
|
|
|
} wpa_psk_radius;
|
2008-02-28 02:34:43 +01:00
|
|
|
int wpa_pairwise;
|
2017-11-17 11:31:41 +01:00
|
|
|
int group_cipher; /* wpa_group value override from configuation */
|
2008-02-28 02:34:43 +01:00
|
|
|
int wpa_group;
|
|
|
|
int wpa_group_rekey;
|
2017-07-03 12:42:55 +02:00
|
|
|
int wpa_group_rekey_set;
|
2008-02-28 02:34:43 +01:00
|
|
|
int wpa_strict_rekey;
|
|
|
|
int wpa_gmk_rekey;
|
2008-11-06 18:57:21 +01:00
|
|
|
int wpa_ptk_rekey;
|
2020-01-10 23:19:08 +01:00
|
|
|
enum ptk0_rekey_handling wpa_deny_ptk0_rekey;
|
2017-01-05 17:00:33 +01:00
|
|
|
u32 wpa_group_update_count;
|
|
|
|
u32 wpa_pairwise_update_count;
|
2017-10-16 17:37:43 +02:00
|
|
|
int wpa_disable_eapol_key_retries;
|
2008-02-28 02:34:43 +01:00
|
|
|
int rsn_pairwise;
|
|
|
|
int rsn_preauth;
|
|
|
|
char *rsn_preauth_interfaces;
|
|
|
|
|
2016-10-27 14:18:32 +02:00
|
|
|
#ifdef CONFIG_IEEE80211R_AP
|
2008-02-28 02:34:43 +01:00
|
|
|
/* IEEE 802.11r - Fast BSS Transition */
|
|
|
|
u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
|
|
|
|
u8 r1_key_holder[FT_R1KH_ID_LEN];
|
2017-05-18 15:21:50 +02:00
|
|
|
u32 r0_key_lifetime; /* PMK-R0 lifetime seconds */
|
2017-04-02 14:52:52 +02:00
|
|
|
int rkh_pos_timeout;
|
|
|
|
int rkh_neg_timeout;
|
|
|
|
int rkh_pull_timeout; /* ms */
|
|
|
|
int rkh_pull_retries;
|
2008-02-28 02:34:43 +01:00
|
|
|
u32 reassociation_deadline;
|
|
|
|
struct ft_remote_r0kh *r0kh_list;
|
|
|
|
struct ft_remote_r1kh *r1kh_list;
|
|
|
|
int pmk_r1_push;
|
2010-10-25 12:35:51 +02:00
|
|
|
int ft_over_ds;
|
2016-09-24 22:53:42 +02:00
|
|
|
int ft_psk_generate_local;
|
2017-05-18 15:21:50 +02:00
|
|
|
int r1_max_key_lifetime;
|
2016-10-27 14:18:32 +02:00
|
|
|
#endif /* CONFIG_IEEE80211R_AP */
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
char *ctrl_interface; /* directory for UNIX domain sockets */
|
2010-04-03 18:37:21 +02:00
|
|
|
#ifndef CONFIG_NATIVE_WINDOWS
|
2008-02-28 02:34:43 +01:00
|
|
|
gid_t ctrl_interface_gid;
|
2010-04-03 18:37:21 +02:00
|
|
|
#endif /* CONFIG_NATIVE_WINDOWS */
|
2008-02-28 02:34:43 +01:00
|
|
|
int ctrl_interface_gid_set;
|
|
|
|
|
|
|
|
char *ca_cert;
|
|
|
|
char *server_cert;
|
2019-07-12 17:11:53 +02:00
|
|
|
char *server_cert2;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *private_key;
|
2019-07-12 17:11:53 +02:00
|
|
|
char *private_key2;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *private_key_passwd;
|
2019-07-12 17:11:53 +02:00
|
|
|
char *private_key_passwd2;
|
2019-02-28 20:39:50 +01:00
|
|
|
char *check_cert_subject;
|
2008-02-28 02:34:43 +01:00
|
|
|
int check_crl;
|
2017-08-07 18:26:33 +02:00
|
|
|
int check_crl_strict;
|
2019-01-16 16:15:01 +01:00
|
|
|
unsigned int crl_reload_interval;
|
2015-08-23 20:26:39 +02:00
|
|
|
unsigned int tls_session_lifetime;
|
2017-09-16 23:11:37 +02:00
|
|
|
unsigned int tls_flags;
|
2019-09-01 14:58:10 +02:00
|
|
|
unsigned int max_auth_rounds;
|
|
|
|
unsigned int max_auth_rounds_short;
|
2013-06-29 23:54:24 +02:00
|
|
|
char *ocsp_stapling_response;
|
2015-12-22 18:34:36 +01:00
|
|
|
char *ocsp_stapling_response_multi;
|
2008-02-28 02:34:43 +01:00
|
|
|
char *dh_file;
|
2014-10-12 10:52:05 +02:00
|
|
|
char *openssl_ciphers;
|
2017-04-20 15:44:31 +02:00
|
|
|
char *openssl_ecdh_curves;
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 *pac_opaque_encr_key;
|
2008-10-19 08:55:59 +02:00
|
|
|
u8 *eap_fast_a_id;
|
|
|
|
size_t eap_fast_a_id_len;
|
|
|
|
char *eap_fast_a_id_info;
|
2008-10-08 15:55:23 +02:00
|
|
|
int eap_fast_prov;
|
2008-10-08 16:25:47 +02:00
|
|
|
int pac_key_lifetime;
|
|
|
|
int pac_key_refresh_time;
|
2019-07-09 15:56:02 +02:00
|
|
|
int eap_teap_auth;
|
|
|
|
int eap_teap_pac_no_inner;
|
2019-08-16 22:54:51 +02:00
|
|
|
int eap_teap_separate_result;
|
2019-08-20 00:37:31 +02:00
|
|
|
int eap_teap_id;
|
2022-12-01 16:04:13 +01:00
|
|
|
int eap_teap_method_sequence;
|
2008-02-28 02:34:43 +01:00
|
|
|
int eap_sim_aka_result_ind;
|
2019-07-31 23:02:02 +02:00
|
|
|
int eap_sim_id;
|
2022-04-30 15:56:10 +02:00
|
|
|
char *imsi_privacy_key;
|
2008-03-09 09:37:18 +01:00
|
|
|
int tnc;
|
2010-07-19 04:28:53 +02:00
|
|
|
int fragment_size;
|
2010-09-15 09:51:40 +02:00
|
|
|
u16 pwd_group;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
char *radius_server_clients;
|
|
|
|
int radius_server_auth_port;
|
2014-02-15 14:37:53 +01:00
|
|
|
int radius_server_acct_port;
|
2008-02-28 02:34:43 +01:00
|
|
|
int radius_server_ipv6;
|
|
|
|
|
|
|
|
int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group
|
|
|
|
* address instead of individual address
|
|
|
|
* (for driver_wired.c).
|
|
|
|
*/
|
|
|
|
|
|
|
|
int ap_max_inactivity;
|
|
|
|
int ignore_broadcast_ssid;
|
2015-10-17 18:28:35 +02:00
|
|
|
int no_probe_resp_if_max_sta;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-03-04 11:33:24 +01:00
|
|
|
int wmm_enabled;
|
2010-04-11 10:32:15 +02:00
|
|
|
int wmm_uapsd;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2013-08-04 20:45:50 +02:00
|
|
|
struct hostapd_vlan *vlan;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
macaddr bssid;
|
2008-02-28 02:54:06 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Maximum listen interval that STAs can use when associating with this
|
|
|
|
* BSS. If a STA tries to use larger value, the association will be
|
|
|
|
* denied with status code 51.
|
|
|
|
*/
|
|
|
|
u16 max_listen_interval;
|
2008-08-03 19:17:58 +02:00
|
|
|
|
2011-07-05 16:13:04 +02:00
|
|
|
int disable_pmksa_caching;
|
2008-08-03 19:17:58 +02:00
|
|
|
int okc; /* Opportunistic Key Caching */
|
2008-11-23 18:34:26 +01:00
|
|
|
|
|
|
|
int wps_state;
|
|
|
|
#ifdef CONFIG_WPS
|
2013-03-31 10:48:52 +02:00
|
|
|
int wps_independent;
|
2008-11-23 18:34:26 +01:00
|
|
|
int ap_setup_locked;
|
|
|
|
u8 uuid[16];
|
|
|
|
char *wps_pin_requests;
|
|
|
|
char *device_name;
|
|
|
|
char *manufacturer;
|
|
|
|
char *model_name;
|
|
|
|
char *model_number;
|
|
|
|
char *serial_number;
|
2011-03-17 17:50:22 +01:00
|
|
|
u8 device_type[WPS_DEV_TYPE_LEN];
|
2008-11-23 18:34:26 +01:00
|
|
|
char *config_methods;
|
|
|
|
u8 os_version[4];
|
|
|
|
char *ap_pin;
|
2009-01-16 21:50:41 +01:00
|
|
|
int skip_cred_build;
|
|
|
|
u8 *extra_cred;
|
|
|
|
size_t extra_cred_len;
|
2009-01-21 10:54:12 +01:00
|
|
|
int wps_cred_processing;
|
2019-03-06 20:41:44 +01:00
|
|
|
int wps_cred_add_sae;
|
2013-09-01 09:08:30 +02:00
|
|
|
int force_per_enrollee_psk;
|
2009-01-23 20:08:55 +01:00
|
|
|
u8 *ap_settings;
|
|
|
|
size_t ap_settings_len;
|
hostapd: Support Multi-AP backhaul STA onboarding with WPS
The Wi-Fi Alliance Multi-AP Specification v1.0 allows onboarding of a
backhaul STA through WPS. To enable this, the WPS Registrar offers a
different set of credentials (backhaul credentials instead of fronthaul
credentials) when the Multi-AP subelement is present in the WFA vendor
extension element of the WSC M1 message.
Add new configuration options to specify the backhaul credentials for
the hostapd internal registrar: multi_ap_backhaul_ssid,
multi_ap_backhaul_wpa_psk, multi_ap_backhaul_wpa_passphrase. These are
only relevant for a fronthaul SSID, i.e., where multi_ap is set to 2 or
3. When these options are set, pass the backhaul credentials instead of
the normal credentials when the Multi-AP subelement is present.
Ignore the Multi-AP subelement if the backhaul config options are not
set. Note that for an SSID which is fronthaul and backhaul at the same
time (i.e., multi_ap == 3), this results in the correct credentials
being sent anyway.
The security to be used for the backaul BSS is fixed to WPA2PSK. The
Multi-AP Specification only allows Open and WPA2PSK networks to be
configured. Although not stated explicitly, the backhaul link is
intended to be always encrypted, hence WPA2PSK.
To build the credentials, the credential-building code is essentially
copied and simplified. Indeed, the backhaul credentials are always
WPA2PSK and never use per-device PSK. All the options set for the
fronthaul BSS WPS are simply ignored.
Signed-off-by: Davina Lu <ylu@quantenna.com>
Signed-off-by: Igor Mitsyanko <igor.mitsyanko.os@quantenna.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
Cc: Marianna Carrera <marianna.carrera.so@quantenna.com>
2019-02-12 15:35:26 +01:00
|
|
|
struct hostapd_ssid multi_ap_backhaul_ssid;
|
2009-01-29 17:47:02 +01:00
|
|
|
char *upnp_iface;
|
|
|
|
char *friendly_name;
|
|
|
|
char *manufacturer_url;
|
|
|
|
char *model_description;
|
|
|
|
char *model_url;
|
|
|
|
char *upc;
|
2011-03-19 10:44:42 +01:00
|
|
|
struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS];
|
2020-01-03 09:58:26 +01:00
|
|
|
struct wpabuf *wps_application_ext;
|
2013-02-15 10:24:29 +01:00
|
|
|
int wps_nfc_pw_from_config;
|
2012-06-28 18:43:29 +02:00
|
|
|
int wps_nfc_dev_pw_id;
|
|
|
|
struct wpabuf *wps_nfc_dh_pubkey;
|
|
|
|
struct wpabuf *wps_nfc_dh_privkey;
|
|
|
|
struct wpabuf *wps_nfc_dev_pw;
|
2008-11-23 18:34:26 +01:00
|
|
|
#endif /* CONFIG_WPS */
|
2011-05-17 18:53:02 +02:00
|
|
|
int pbc_in_m1;
|
2013-07-06 17:17:15 +02:00
|
|
|
char *server_id;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
#define P2P_ENABLED BIT(0)
|
|
|
|
#define P2P_GROUP_OWNER BIT(1)
|
|
|
|
#define P2P_GROUP_FORMATION BIT(2)
|
2010-07-18 23:30:26 +02:00
|
|
|
#define P2P_MANAGE BIT(3)
|
|
|
|
#define P2P_ALLOW_CROSS_CONNECTION BIT(4)
|
2010-07-18 23:30:25 +02:00
|
|
|
int p2p;
|
2013-03-16 18:13:31 +01:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
u8 ip_addr_go[4];
|
|
|
|
u8 ip_addr_mask[4];
|
|
|
|
u8 ip_addr_start[4];
|
|
|
|
u8 ip_addr_end[4];
|
|
|
|
#endif /* CONFIG_P2P */
|
2010-12-28 16:15:01 +01:00
|
|
|
|
|
|
|
int disassoc_low_ack;
|
2011-12-25 19:57:01 +01:00
|
|
|
int skip_inactivity_poll;
|
2011-01-28 18:21:59 +01:00
|
|
|
|
|
|
|
#define TDLS_PROHIBIT BIT(0)
|
|
|
|
#define TDLS_PROHIBIT_CHAN_SWITCH BIT(1)
|
|
|
|
int tdls;
|
2020-06-30 16:23:46 +02:00
|
|
|
bool disable_11n;
|
|
|
|
bool disable_11ac;
|
|
|
|
bool disable_11ax;
|
2022-04-19 20:04:03 +02:00
|
|
|
bool disable_11be;
|
2011-09-23 19:26:17 +02:00
|
|
|
|
2011-10-17 23:24:16 +02:00
|
|
|
/* IEEE 802.11v */
|
|
|
|
int time_advertisement;
|
|
|
|
char *time_zone;
|
2012-12-16 18:16:17 +01:00
|
|
|
int wnm_sleep_mode;
|
2017-10-29 16:13:54 +01:00
|
|
|
int wnm_sleep_mode_no_keys;
|
2012-12-22 19:27:30 +01:00
|
|
|
int bss_transition;
|
2011-10-17 23:24:16 +02:00
|
|
|
|
2011-09-23 19:26:17 +02:00
|
|
|
/* IEEE 802.11u - Interworking */
|
|
|
|
int interworking;
|
|
|
|
int access_network_type;
|
|
|
|
int internet;
|
|
|
|
int asra;
|
|
|
|
int esr;
|
|
|
|
int uesa;
|
|
|
|
int venue_info_set;
|
|
|
|
u8 venue_group;
|
|
|
|
u8 venue_type;
|
|
|
|
u8 hessid[ETH_ALEN];
|
2011-10-17 22:55:50 +02:00
|
|
|
|
|
|
|
/* IEEE 802.11u - Roaming Consortium list */
|
|
|
|
unsigned int roaming_consortium_count;
|
|
|
|
struct hostapd_roaming_consortium *roaming_consortium;
|
2011-11-30 16:44:43 +01:00
|
|
|
|
2012-02-26 21:34:21 +01:00
|
|
|
/* IEEE 802.11u - Venue Name duples */
|
|
|
|
unsigned int venue_name_count;
|
2012-08-25 19:49:30 +02:00
|
|
|
struct hostapd_lang_string *venue_name;
|
2012-02-26 21:34:21 +01:00
|
|
|
|
2018-03-26 15:10:47 +02:00
|
|
|
/* Venue URL duples */
|
|
|
|
unsigned int venue_url_count;
|
|
|
|
struct hostapd_venue_url *venue_url;
|
|
|
|
|
2012-07-30 20:45:31 +02:00
|
|
|
/* IEEE 802.11u - Network Authentication Type */
|
|
|
|
u8 *network_auth_type;
|
|
|
|
size_t network_auth_type_len;
|
|
|
|
|
2012-07-30 20:51:19 +02:00
|
|
|
/* IEEE 802.11u - IP Address Type Availability */
|
|
|
|
u8 ipaddr_type_availability;
|
|
|
|
u8 ipaddr_type_configured;
|
|
|
|
|
2012-07-30 21:07:35 +02:00
|
|
|
/* IEEE 802.11u - 3GPP Cellular Network */
|
|
|
|
u8 *anqp_3gpp_cell_net;
|
|
|
|
size_t anqp_3gpp_cell_net_len;
|
|
|
|
|
2012-07-30 20:55:46 +02:00
|
|
|
/* IEEE 802.11u - Domain Name */
|
|
|
|
u8 *domain_name;
|
|
|
|
size_t domain_name_len;
|
|
|
|
|
2012-08-25 14:58:30 +02:00
|
|
|
unsigned int nai_realm_count;
|
|
|
|
struct hostapd_nai_realm_data *nai_realm_data;
|
|
|
|
|
2015-10-07 15:14:09 +02:00
|
|
|
struct dl_list anqp_elem; /* list of struct anqp_element */
|
|
|
|
|
2012-02-26 21:34:19 +01:00
|
|
|
u16 gas_comeback_delay;
|
2016-12-29 23:23:10 +01:00
|
|
|
size_t gas_frag_limit;
|
2016-06-10 20:43:25 +02:00
|
|
|
int gas_address3;
|
2012-02-26 21:34:19 +01:00
|
|
|
|
2013-07-24 11:28:20 +02:00
|
|
|
u8 qos_map_set[16 + 2 * 21];
|
|
|
|
unsigned int qos_map_set_len;
|
|
|
|
|
2013-07-23 20:25:21 +02:00
|
|
|
int osen;
|
AP: Add support for Proxy ARP, DHCP snooping mechanism
Proxy ARP allows the AP devices to keep track of the hardware address to
IP address mapping of the STA devices within the BSS. When a request for
such information is made (i.e., ARP request, Neighbor Solicitation), the
AP will respond on behalf of the STA device within the BSS. Such
requests could originate from a device within the BSS or also from the
bridge. In the process of the AP replying to the request (i.e., ARP
reply, Neighbor Advertisement), the AP will drop the original request
frame. The relevant STA will not even know that such information was
ever requested.
This feature is a requirement for Hotspot 2.0, and is defined in IEEE
Std 802.11-2012, 10.23.13. While the Proxy ARP support code mainly
resides in the kernel bridge code, in order to optimize the performance
and simplify kernel implementation, the DHCP snooping code was added to
the hostapd.
Signed-off-by: Kyeyoon Park <kyeyoonp@qca.qualcomm.com>
2014-09-26 07:32:55 +02:00
|
|
|
int proxy_arp;
|
2015-04-27 11:30:09 +02:00
|
|
|
int na_mcast_to_ucast;
|
2019-05-24 09:26:46 +02:00
|
|
|
|
2011-09-08 19:52:23 +02:00
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
int hs20;
|
2018-12-07 23:39:00 +01:00
|
|
|
int hs20_release;
|
2011-10-18 11:38:32 +02:00
|
|
|
int disable_dgaf;
|
2013-03-17 14:59:36 +01:00
|
|
|
u16 anqp_domain_id;
|
2012-08-25 15:03:51 +02:00
|
|
|
unsigned int hs20_oper_friendly_name_count;
|
|
|
|
struct hostapd_lang_string *hs20_oper_friendly_name;
|
2012-08-25 15:09:01 +02:00
|
|
|
u8 *hs20_wan_metrics;
|
2012-08-25 15:12:40 +02:00
|
|
|
u8 *hs20_connection_capability;
|
|
|
|
size_t hs20_connection_capability_len;
|
2012-08-25 15:17:21 +02:00
|
|
|
u8 *hs20_operating_class;
|
|
|
|
u8 hs20_operating_class_len;
|
2013-03-17 15:28:59 +01:00
|
|
|
struct hs20_icon {
|
|
|
|
u16 width;
|
|
|
|
u16 height;
|
|
|
|
char language[3];
|
|
|
|
char type[256];
|
|
|
|
char name[256];
|
|
|
|
char file[256];
|
|
|
|
} *hs20_icons;
|
|
|
|
size_t hs20_icons_count;
|
2015-04-07 11:41:20 +02:00
|
|
|
u8 osu_ssid[SSID_MAX_LEN];
|
2013-03-17 15:34:09 +01:00
|
|
|
size_t osu_ssid_len;
|
|
|
|
struct hs20_osu_provider {
|
|
|
|
unsigned int friendly_name_count;
|
|
|
|
struct hostapd_lang_string *friendly_name;
|
|
|
|
char *server_uri;
|
|
|
|
int *method_list;
|
|
|
|
char **icons;
|
|
|
|
size_t icons_count;
|
|
|
|
char *osu_nai;
|
2018-10-05 19:49:42 +02:00
|
|
|
char *osu_nai2;
|
2013-03-17 15:34:09 +01:00
|
|
|
unsigned int service_desc_count;
|
|
|
|
struct hostapd_lang_string *service_desc;
|
|
|
|
} *hs20_osu_providers, *last_osu;
|
|
|
|
size_t hs20_osu_providers_count;
|
2018-10-05 19:49:42 +02:00
|
|
|
size_t hs20_osu_providers_nai_count;
|
2018-04-16 12:18:57 +02:00
|
|
|
char **hs20_operator_icon;
|
|
|
|
size_t hs20_operator_icon_count;
|
2013-07-26 21:13:58 +02:00
|
|
|
unsigned int hs20_deauth_req_timeout;
|
2012-11-21 16:04:21 +01:00
|
|
|
char *subscr_remediation_url;
|
|
|
|
u8 subscr_remediation_method;
|
2018-12-14 14:58:13 +01:00
|
|
|
char *hs20_sim_provisioning_url;
|
2018-04-23 20:10:52 +02:00
|
|
|
char *t_c_filename;
|
|
|
|
u32 t_c_timestamp;
|
2018-04-23 23:05:44 +02:00
|
|
|
char *t_c_server_url;
|
2011-09-08 19:52:23 +02:00
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
2011-11-30 16:44:43 +01:00
|
|
|
u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */
|
2011-12-08 23:15:04 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_RADIUS_TEST
|
|
|
|
char *dump_msk_file;
|
|
|
|
#endif /* CONFIG_RADIUS_TEST */
|
2012-08-27 15:20:10 +02:00
|
|
|
|
|
|
|
struct wpabuf *vendor_elements;
|
2016-04-20 06:04:17 +02:00
|
|
|
struct wpabuf *assocresp_elements;
|
2012-12-31 15:58:36 +01:00
|
|
|
|
2021-03-15 13:57:05 +01:00
|
|
|
unsigned int anti_clogging_threshold;
|
2017-12-26 11:46:22 +01:00
|
|
|
unsigned int sae_sync;
|
2017-12-27 17:26:31 +01:00
|
|
|
int sae_require_mfp;
|
2019-10-10 14:38:26 +02:00
|
|
|
int sae_confirm_immediate;
|
2022-11-29 19:36:15 +01:00
|
|
|
enum sae_pwe sae_pwe;
|
2013-01-01 15:23:47 +01:00
|
|
|
int *sae_groups;
|
2018-05-19 16:28:01 +02:00
|
|
|
struct sae_password_entry *sae_passwords;
|
2013-08-06 17:23:22 +02:00
|
|
|
|
2014-09-03 23:58:37 +02:00
|
|
|
char *wowlan_triggers; /* Wake-on-WLAN triggers */
|
|
|
|
|
2013-08-06 17:23:22 +02:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
u8 bss_load_test[5];
|
|
|
|
u8 bss_load_test_set;
|
2015-08-08 17:18:03 +02:00
|
|
|
struct wpabuf *own_ie_override;
|
2017-09-02 00:31:47 +02:00
|
|
|
int sae_reflection_attack;
|
2020-06-08 13:00:28 +02:00
|
|
|
int sae_commit_status;
|
|
|
|
int sae_pk_omit;
|
2020-09-08 23:08:38 +02:00
|
|
|
int sae_pk_password_check_skip;
|
2017-09-02 00:52:15 +02:00
|
|
|
struct wpabuf *sae_commit_override;
|
2020-03-07 15:45:52 +01:00
|
|
|
struct wpabuf *rsne_override_eapol;
|
2019-12-07 15:53:08 +01:00
|
|
|
struct wpabuf *rsnxe_override_eapol;
|
2020-03-14 22:30:27 +01:00
|
|
|
struct wpabuf *rsne_override_ft;
|
|
|
|
struct wpabuf *rsnxe_override_ft;
|
2020-01-04 12:05:26 +01:00
|
|
|
struct wpabuf *gtk_rsc_override;
|
|
|
|
struct wpabuf *igtk_rsc_override;
|
2020-03-20 23:23:01 +01:00
|
|
|
int no_beacon_rsnxe;
|
2020-03-28 19:39:19 +01:00
|
|
|
int skip_prune_assoc;
|
2020-04-16 22:22:57 +02:00
|
|
|
int ft_rsnxe_used;
|
2020-05-29 23:04:53 +02:00
|
|
|
unsigned int oci_freq_override_eapol_m3;
|
|
|
|
unsigned int oci_freq_override_eapol_g1;
|
|
|
|
unsigned int oci_freq_override_saquery_req;
|
|
|
|
unsigned int oci_freq_override_saquery_resp;
|
|
|
|
unsigned int oci_freq_override_ft_assoc;
|
|
|
|
unsigned int oci_freq_override_fils_assoc;
|
|
|
|
unsigned int oci_freq_override_wnm_sleep;
|
2013-08-06 17:23:22 +02:00
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2014-09-01 06:23:21 +02:00
|
|
|
|
|
|
|
#define MESH_ENABLED BIT(0)
|
|
|
|
int mesh;
|
2021-08-31 09:44:07 +02:00
|
|
|
int mesh_fwding;
|
2014-12-12 19:45:31 +01:00
|
|
|
|
2016-04-06 18:42:06 +02:00
|
|
|
u8 radio_measurements[RRM_CAPABILITIES_IE_LEN];
|
2014-11-10 16:12:29 +01:00
|
|
|
|
|
|
|
int vendor_vht;
|
2016-08-31 16:15:47 +02:00
|
|
|
int use_sta_nsts;
|
2015-09-05 16:53:15 +02:00
|
|
|
|
|
|
|
char *no_probe_resp_if_seen_on;
|
2015-09-05 18:00:03 +02:00
|
|
|
char *no_auth_if_seen_on;
|
2016-02-08 11:30:04 +01:00
|
|
|
|
|
|
|
int pbss;
|
2016-02-15 15:53:52 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_MBO
|
|
|
|
int mbo_enabled;
|
2017-06-16 14:17:03 +02:00
|
|
|
/**
|
|
|
|
* oce - Enable OCE in AP and/or STA-CFON mode
|
|
|
|
* - BIT(0) is Reserved
|
|
|
|
* - Set BIT(1) to enable OCE in STA-CFON mode
|
|
|
|
* - Set BIT(2) to enable OCE in AP mode
|
|
|
|
*/
|
|
|
|
unsigned int oce;
|
2017-03-10 17:33:51 +01:00
|
|
|
int mbo_cell_data_conn_pref;
|
2016-02-15 15:53:52 +01:00
|
|
|
#endif /* CONFIG_MBO */
|
2016-08-03 16:41:53 +02:00
|
|
|
|
|
|
|
int ftm_responder;
|
|
|
|
int ftm_initiator;
|
2015-09-01 16:57:59 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_FILS
|
|
|
|
u8 fils_cache_id[FILS_CACHE_ID_LEN];
|
|
|
|
int fils_cache_id_set;
|
2016-12-17 16:19:34 +01:00
|
|
|
struct dl_list fils_realms; /* list of struct fils_realm */
|
2017-03-12 21:40:56 +01:00
|
|
|
int fils_dh_group;
|
2017-01-31 13:38:44 +01:00
|
|
|
struct hostapd_ip_addr dhcp_server;
|
|
|
|
int dhcp_rapid_commit_proxy;
|
|
|
|
unsigned int fils_hlp_wait_time;
|
|
|
|
u16 dhcp_server_port;
|
|
|
|
u16 dhcp_relay_port;
|
2020-12-15 03:04:27 +01:00
|
|
|
u32 fils_discovery_min_int;
|
|
|
|
u32 fils_discovery_max_int;
|
2015-09-01 16:57:59 +02:00
|
|
|
#endif /* CONFIG_FILS */
|
2016-10-31 14:58:08 +01:00
|
|
|
|
|
|
|
int multicast_to_unicast;
|
2023-02-23 05:57:23 +01:00
|
|
|
int bridge_multicast_to_unicast;
|
2017-02-22 23:03:00 +01:00
|
|
|
|
|
|
|
int broadcast_deauth;
|
2017-06-18 16:29:57 +02:00
|
|
|
|
2020-11-30 12:10:46 +01:00
|
|
|
int notify_mgmt_frames;
|
|
|
|
|
2017-06-18 16:29:57 +02:00
|
|
|
#ifdef CONFIG_DPP
|
2019-09-17 12:36:22 +02:00
|
|
|
char *dpp_name;
|
|
|
|
char *dpp_mud_url;
|
2022-07-16 11:31:28 +02:00
|
|
|
char *dpp_extra_conf_req_name;
|
|
|
|
char *dpp_extra_conf_req_value;
|
2017-06-18 16:29:57 +02:00
|
|
|
char *dpp_connector;
|
|
|
|
struct wpabuf *dpp_netaccesskey;
|
|
|
|
unsigned int dpp_netaccesskey_expiry;
|
|
|
|
struct wpabuf *dpp_csign;
|
2019-03-24 21:17:49 +01:00
|
|
|
#ifdef CONFIG_DPP2
|
|
|
|
struct dpp_controller_conf *dpp_controller;
|
2022-07-09 11:36:34 +02:00
|
|
|
int dpp_relay_port;
|
2020-03-27 13:03:04 +01:00
|
|
|
int dpp_configurator_connectivity;
|
2020-03-28 11:33:48 +01:00
|
|
|
int dpp_pfs;
|
2019-03-24 21:17:49 +01:00
|
|
|
#endif /* CONFIG_DPP2 */
|
2017-06-18 16:29:57 +02:00
|
|
|
#endif /* CONFIG_DPP */
|
2017-10-08 11:23:00 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_OWE
|
|
|
|
macaddr owe_transition_bssid;
|
|
|
|
u8 owe_transition_ssid[SSID_MAX_LEN];
|
|
|
|
size_t owe_transition_ssid_len;
|
2017-10-09 12:38:15 +02:00
|
|
|
char owe_transition_ifname[IFNAMSIZ + 1];
|
2017-10-10 18:00:57 +02:00
|
|
|
int *owe_groups;
|
2020-01-23 19:56:51 +01:00
|
|
|
int owe_ptk_workaround;
|
2017-10-08 11:23:00 +02:00
|
|
|
#endif /* CONFIG_OWE */
|
2018-10-30 13:00:00 +01:00
|
|
|
|
|
|
|
int coloc_intf_reporting;
|
2018-12-07 12:07:36 +01:00
|
|
|
|
|
|
|
u8 send_probe_response;
|
2018-12-05 11:23:51 +01:00
|
|
|
|
2020-03-25 23:08:26 +01:00
|
|
|
u8 transition_disable;
|
|
|
|
|
2018-12-05 11:23:51 +01:00
|
|
|
#define BACKHAUL_BSS 1
|
|
|
|
#define FRONTHAUL_BSS 2
|
|
|
|
int multi_ap; /* bitmap of BACKHAUL_BSS, FRONTHAUL_BSS */
|
2019-03-20 15:58:52 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_AIRTIME_POLICY
|
|
|
|
unsigned int airtime_weight;
|
|
|
|
int airtime_limit;
|
|
|
|
struct airtime_sta_weight *airtime_weight_list;
|
|
|
|
#endif /* CONFIG_AIRTIME_POLICY */
|
2019-05-24 09:26:46 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_MACSEC
|
|
|
|
/**
|
|
|
|
* macsec_policy - Determines the policy for MACsec secure session
|
|
|
|
*
|
|
|
|
* 0: MACsec not in use (default)
|
|
|
|
* 1: MACsec enabled - Should secure, accept key server's advice to
|
|
|
|
* determine whether to use a secure session or not.
|
|
|
|
*/
|
|
|
|
int macsec_policy;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* macsec_integ_only - Determines how MACsec are transmitted
|
|
|
|
*
|
|
|
|
* This setting applies only when MACsec is in use, i.e.,
|
|
|
|
* - macsec_policy is enabled
|
|
|
|
* - the key server has decided to enable MACsec
|
|
|
|
*
|
|
|
|
* 0: Encrypt traffic (default)
|
|
|
|
* 1: Integrity only
|
|
|
|
*/
|
|
|
|
int macsec_integ_only;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* macsec_replay_protect - Enable MACsec replay protection
|
|
|
|
*
|
|
|
|
* This setting applies only when MACsec is in use, i.e.,
|
|
|
|
* - macsec_policy is enabled
|
|
|
|
* - the key server has decided to enable MACsec
|
|
|
|
*
|
|
|
|
* 0: Replay protection disabled (default)
|
|
|
|
* 1: Replay protection enabled
|
|
|
|
*/
|
|
|
|
int macsec_replay_protect;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* macsec_replay_window - MACsec replay protection window
|
|
|
|
*
|
|
|
|
* A window in which replay is tolerated, to allow receipt of frames
|
|
|
|
* that have been misordered by the network.
|
|
|
|
*
|
|
|
|
* This setting applies only when MACsec replay protection active, i.e.,
|
|
|
|
* - macsec_replay_protect is enabled
|
|
|
|
* - the key server has decided to enable MACsec
|
|
|
|
*
|
|
|
|
* 0: No replay window, strict check (default)
|
|
|
|
* 1..2^32-1: number of packets that could be misordered
|
|
|
|
*/
|
|
|
|
u32 macsec_replay_window;
|
|
|
|
|
2023-02-14 09:26:56 +01:00
|
|
|
/**
|
|
|
|
* macsec_offload - Enable MACsec offload
|
|
|
|
*
|
|
|
|
* This setting applies only when MACsec is in use, i.e.,
|
|
|
|
* - macsec_policy is enabled
|
|
|
|
* - the key server has decided to enable MACsec
|
|
|
|
*
|
|
|
|
* 0 = MACSEC_OFFLOAD_OFF (default)
|
|
|
|
* 1 = MACSEC_OFFLOAD_PHY
|
|
|
|
* 2 = MACSEC_OFFLOAD_MAC
|
|
|
|
*/
|
|
|
|
int macsec_offload;
|
|
|
|
|
2019-05-24 09:26:46 +02:00
|
|
|
/**
|
|
|
|
* macsec_port - MACsec port (in SCI)
|
|
|
|
*
|
|
|
|
* Port component of the SCI.
|
|
|
|
*
|
|
|
|
* Range: 1-65534 (default: 1)
|
|
|
|
*/
|
|
|
|
int macsec_port;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* mka_priority - Priority of MKA Actor
|
|
|
|
*
|
|
|
|
* Range: 0-255 (default: 255)
|
|
|
|
*/
|
|
|
|
int mka_priority;
|
|
|
|
|
2021-11-15 11:22:19 +01:00
|
|
|
/**
|
|
|
|
* macsec_csindex - Cipher suite index for MACsec
|
|
|
|
*
|
|
|
|
* Range: 0-1 (default: 0)
|
|
|
|
*/
|
|
|
|
int macsec_csindex;
|
|
|
|
|
2019-05-24 09:26:46 +02:00
|
|
|
/**
|
|
|
|
* mka_ckn - MKA pre-shared CKN
|
|
|
|
*/
|
|
|
|
#define MACSEC_CKN_MAX_LEN 32
|
|
|
|
size_t mka_ckn_len;
|
|
|
|
u8 mka_ckn[MACSEC_CKN_MAX_LEN];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* mka_cak - MKA pre-shared CAK
|
|
|
|
*/
|
|
|
|
#define MACSEC_CAK_MAX_LEN 32
|
|
|
|
size_t mka_cak_len;
|
|
|
|
u8 mka_cak[MACSEC_CAK_MAX_LEN];
|
|
|
|
|
|
|
|
#define MKA_PSK_SET_CKN BIT(0)
|
|
|
|
#define MKA_PSK_SET_CAK BIT(1)
|
|
|
|
#define MKA_PSK_SET (MKA_PSK_SET_CKN | MKA_PSK_SET_CAK)
|
|
|
|
/**
|
|
|
|
* mka_psk_set - Whether mka_ckn and mka_cak are set
|
|
|
|
*/
|
|
|
|
u8 mka_psk_set;
|
|
|
|
#endif /* CONFIG_MACSEC */
|
2020-12-16 12:00:17 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_PASN
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
/*
|
|
|
|
* Normally, KDK should be derived if and only if both sides support
|
|
|
|
* secure LTF. Allow forcing KDK derivation for testing purposes.
|
|
|
|
*/
|
|
|
|
int force_kdk_derivation;
|
2021-03-15 13:57:03 +01:00
|
|
|
|
|
|
|
/* If set, corrupt the MIC in the 2nd Authentication frame of PASN */
|
|
|
|
int pasn_corrupt_mic;
|
2020-12-16 12:00:17 +01:00
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2020-12-16 12:00:30 +01:00
|
|
|
|
|
|
|
int *pasn_groups;
|
2021-03-21 12:55:08 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The time in TUs after which the non-AP STA is requested to retry the
|
|
|
|
* PASN authentication in case there are too many parallel operations.
|
|
|
|
*/
|
|
|
|
u16 pasn_comeback_after;
|
2020-12-16 12:00:17 +01:00
|
|
|
#endif /* CONFIG_PASN */
|
2020-09-11 04:45:46 +02:00
|
|
|
|
|
|
|
unsigned int unsol_bcast_probe_resp_interval;
|
2021-03-22 10:29:31 +01:00
|
|
|
|
|
|
|
u8 ext_capa_mask[EXT_CAPA_MAX_LEN];
|
|
|
|
u8 ext_capa[EXT_CAPA_MAX_LEN];
|
2021-07-28 01:42:19 +02:00
|
|
|
|
|
|
|
u8 rnr;
|
2022-08-01 13:08:22 +02:00
|
|
|
char *config_id;
|
2022-12-01 04:18:37 +01:00
|
|
|
bool xrates_supported;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
2017-02-08 00:16:52 +01:00
|
|
|
/**
|
|
|
|
* struct he_phy_capabilities_info - HE PHY capabilities
|
|
|
|
*/
|
|
|
|
struct he_phy_capabilities_info {
|
2020-04-24 00:33:16 +02:00
|
|
|
bool he_su_beamformer;
|
|
|
|
bool he_su_beamformee;
|
|
|
|
bool he_mu_beamformer;
|
2017-02-08 00:16:52 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct he_operation - HE operation
|
|
|
|
*/
|
|
|
|
struct he_operation {
|
|
|
|
u8 he_bss_color;
|
2020-02-04 09:04:54 +01:00
|
|
|
u8 he_bss_color_disabled;
|
|
|
|
u8 he_bss_color_partial;
|
2017-02-08 00:16:52 +01:00
|
|
|
u8 he_default_pe_duration;
|
|
|
|
u8 he_twt_required;
|
2021-05-28 06:17:38 +02:00
|
|
|
u8 he_twt_responder;
|
2019-04-16 14:33:58 +02:00
|
|
|
u16 he_rts_threshold;
|
2021-07-21 07:46:26 +02:00
|
|
|
u8 he_er_su_disable;
|
2019-05-20 09:55:04 +02:00
|
|
|
u16 he_basic_mcs_nss_set;
|
2017-02-08 00:16:52 +01:00
|
|
|
};
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2019-04-16 14:34:01 +02:00
|
|
|
/**
|
|
|
|
* struct spatial_reuse - Spatial reuse
|
|
|
|
*/
|
|
|
|
struct spatial_reuse {
|
|
|
|
u8 sr_control;
|
|
|
|
u8 non_srg_obss_pd_max_offset;
|
|
|
|
u8 srg_obss_pd_min_offset;
|
|
|
|
u8 srg_obss_pd_max_offset;
|
2020-10-03 11:31:16 +02:00
|
|
|
u8 srg_bss_color_bitmap[8];
|
|
|
|
u8 srg_partial_bssid_bitmap[8];
|
2019-04-16 14:34:01 +02:00
|
|
|
};
|
|
|
|
|
2022-04-19 20:04:05 +02:00
|
|
|
/**
|
|
|
|
* struct eht_phy_capabilities_info - EHT PHY capabilities
|
|
|
|
*/
|
|
|
|
struct eht_phy_capabilities_info {
|
|
|
|
bool su_beamformer;
|
|
|
|
bool su_beamformee;
|
|
|
|
bool mu_beamformer;
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
/**
|
|
|
|
* struct hostapd_config - Per-radio interface configuration
|
|
|
|
*/
|
|
|
|
struct hostapd_config {
|
2013-10-29 15:23:23 +01:00
|
|
|
struct hostapd_bss_config **bss, *last_bss;
|
2008-02-28 02:34:43 +01:00
|
|
|
size_t num_bss;
|
|
|
|
|
|
|
|
u16 beacon_int;
|
|
|
|
int rts_threshold;
|
|
|
|
int fragm_threshold;
|
2019-08-09 06:27:46 +02:00
|
|
|
u8 op_class;
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 channel;
|
2019-09-11 11:03:07 +02:00
|
|
|
int enable_edmg;
|
|
|
|
u8 edmg_channel;
|
2015-03-11 21:03:58 +01:00
|
|
|
u8 acs;
|
|
|
|
struct wpa_freq_range_list acs_ch_list;
|
2019-11-26 06:49:32 +01:00
|
|
|
struct wpa_freq_range_list acs_freq_list;
|
|
|
|
u8 acs_freq_list_present;
|
2017-05-16 12:42:38 +02:00
|
|
|
int acs_exclude_dfs;
|
2021-11-11 17:40:05 +01:00
|
|
|
u8 min_tx_power;
|
2009-12-26 09:35:08 +01:00
|
|
|
enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */
|
2022-04-29 10:18:34 +02:00
|
|
|
bool hw_mode_set;
|
2019-11-26 06:49:32 +01:00
|
|
|
int acs_exclude_6ghz_non_psc;
|
2022-04-22 01:02:39 +02:00
|
|
|
int enable_background_radar;
|
2008-02-28 02:34:43 +01:00
|
|
|
enum {
|
|
|
|
LONG_PREAMBLE = 0,
|
|
|
|
SHORT_PREAMBLE = 1
|
|
|
|
} preamble;
|
|
|
|
|
|
|
|
int *supported_rates;
|
|
|
|
int *basic_rates;
|
2016-11-22 10:10:35 +01:00
|
|
|
unsigned int beacon_rate;
|
|
|
|
enum beacon_rate_type rate_type;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-04-09 12:40:12 +02:00
|
|
|
const struct wpa_driver_ops *driver;
|
2014-11-29 12:24:42 +01:00
|
|
|
char *driver_params;
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
int ap_table_max_size;
|
|
|
|
int ap_table_expiration_time;
|
|
|
|
|
2015-09-05 16:11:11 +02:00
|
|
|
unsigned int track_sta_max_num;
|
|
|
|
unsigned int track_sta_max_age;
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
char country[3]; /* first two octets: country code as described in
|
|
|
|
* ISO/IEC 3166-1. Third octet:
|
|
|
|
* ' ' (ascii 32): all environments
|
|
|
|
* 'O': Outdoor environemnt only
|
|
|
|
* 'I': Indoor environment only
|
2017-03-01 09:58:15 +01:00
|
|
|
* 'X': Used with noncountry entity ("XXX")
|
|
|
|
* 0x00..0x31: identifying IEEE 802.11 standard
|
|
|
|
* Annex E table (0x04 = global table)
|
2008-02-28 02:34:43 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
int ieee80211d;
|
|
|
|
|
2013-05-09 19:14:53 +02:00
|
|
|
int ieee80211h; /* DFS */
|
|
|
|
|
2014-02-21 14:42:17 +01:00
|
|
|
/*
|
|
|
|
* Local power constraint is an octet encoded as an unsigned integer in
|
|
|
|
* units of decibels. Invalid value -1 indicates that Power Constraint
|
|
|
|
* element will not be added.
|
|
|
|
*/
|
|
|
|
int local_pwr_constraint;
|
|
|
|
|
2014-02-21 14:42:18 +01:00
|
|
|
/* Control Spectrum Management bit */
|
|
|
|
int spectrum_mgmt_required;
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES];
|
|
|
|
|
|
|
|
/*
|
2009-03-04 11:33:24 +01:00
|
|
|
* WMM AC parameters, in same order as 802.1D, i.e.
|
2008-02-28 02:34:43 +01:00
|
|
|
* 0 = BE (best effort)
|
|
|
|
* 1 = BK (background)
|
|
|
|
* 2 = VI (video)
|
|
|
|
* 3 = VO (voice)
|
|
|
|
*/
|
2009-03-04 11:33:24 +01:00
|
|
|
struct hostapd_wmm_ac_params wmm_ac_params[4];
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2008-08-22 20:03:31 +02:00
|
|
|
int ht_op_mode_fixed;
|
|
|
|
u16 ht_capab;
|
2008-12-09 23:45:57 +01:00
|
|
|
int ieee80211n;
|
2008-11-25 19:59:39 +01:00
|
|
|
int secondary_channel;
|
2015-06-28 17:14:58 +02:00
|
|
|
int no_pri_sec_switch;
|
2011-02-09 14:08:47 +01:00
|
|
|
int require_ht;
|
2013-09-04 17:59:52 +02:00
|
|
|
int obss_interval;
|
2012-06-30 12:52:13 +02:00
|
|
|
u32 vht_capab;
|
|
|
|
int ieee80211ac;
|
2012-08-10 18:53:24 +02:00
|
|
|
int require_vht;
|
2022-05-13 18:17:40 +02:00
|
|
|
enum oper_chan_width vht_oper_chwidth;
|
2012-08-10 18:54:54 +02:00
|
|
|
u8 vht_oper_centr_freq_seg0_idx;
|
2012-11-24 17:02:29 +01:00
|
|
|
u8 vht_oper_centr_freq_seg1_idx;
|
2017-04-21 02:05:25 +02:00
|
|
|
u8 ht40_plus_minus_allowed;
|
2013-04-23 16:51:28 +02:00
|
|
|
|
2016-03-06 10:42:37 +01:00
|
|
|
/* Use driver-generated interface addresses when adding multiple BSSs */
|
|
|
|
u8 use_driver_iface_addr;
|
|
|
|
|
2015-01-21 14:30:48 +01:00
|
|
|
#ifdef CONFIG_FST
|
|
|
|
struct fst_iface_cfg fst_cfg;
|
|
|
|
#endif /* CONFIG_FST */
|
|
|
|
|
2015-02-18 03:35:12 +01:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
u8 p2p_go_ctwindow;
|
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
2013-04-23 16:51:28 +02:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
double ignore_probe_probability;
|
|
|
|
double ignore_auth_probability;
|
|
|
|
double ignore_assoc_probability;
|
|
|
|
double ignore_reassoc_probability;
|
2013-05-04 10:45:03 +02:00
|
|
|
double corrupt_gtk_rekey_mic_probability;
|
2015-09-08 11:46:32 +02:00
|
|
|
int ecsa_ie_only;
|
2022-12-01 17:54:35 +01:00
|
|
|
bool delay_eapol_tx;
|
2013-04-23 16:51:28 +02:00
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2013-08-31 10:49:51 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_ACS
|
|
|
|
unsigned int acs_num_scans;
|
2015-02-06 16:59:57 +01:00
|
|
|
struct acs_bias {
|
|
|
|
int channel;
|
|
|
|
double bias;
|
|
|
|
} *acs_chan_bias;
|
|
|
|
unsigned int num_acs_chan_bias;
|
2013-08-31 10:49:51 +02:00
|
|
|
#endif /* CONFIG_ACS */
|
2016-04-06 18:42:01 +02:00
|
|
|
|
|
|
|
struct wpabuf *lci;
|
|
|
|
struct wpabuf *civic;
|
2016-10-27 14:18:25 +02:00
|
|
|
int stationary_ap;
|
2017-02-08 00:16:52 +01:00
|
|
|
|
|
|
|
int ieee80211ax;
|
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
struct he_phy_capabilities_info he_phy_capab;
|
|
|
|
struct he_operation he_op;
|
2019-01-07 10:26:24 +01:00
|
|
|
struct ieee80211_he_mu_edca_parameter_set he_mu_edca;
|
2019-04-16 14:34:01 +02:00
|
|
|
struct spatial_reuse spr;
|
2022-05-13 18:17:40 +02:00
|
|
|
enum oper_chan_width he_oper_chwidth;
|
2019-05-20 09:55:08 +02:00
|
|
|
u8 he_oper_centr_freq_seg0_idx;
|
|
|
|
u8 he_oper_centr_freq_seg1_idx;
|
2020-10-03 08:34:16 +02:00
|
|
|
u8 he_6ghz_max_mpdu;
|
|
|
|
u8 he_6ghz_max_ampdu_len_exp;
|
|
|
|
u8 he_6ghz_rx_ant_pat;
|
|
|
|
u8 he_6ghz_tx_ant_pat;
|
2022-04-08 01:56:53 +02:00
|
|
|
u8 he_6ghz_reg_pwr_type;
|
2022-12-04 10:49:32 +01:00
|
|
|
bool require_he;
|
2017-02-08 00:16:52 +01:00
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
2018-05-07 12:27:18 +02:00
|
|
|
|
|
|
|
/* VHT enable/disable config from CHAN_SWITCH */
|
|
|
|
#define CH_SWITCH_VHT_ENABLED BIT(0)
|
|
|
|
#define CH_SWITCH_VHT_DISABLED BIT(1)
|
|
|
|
unsigned int ch_switch_vht_config;
|
2017-08-21 18:43:53 +02:00
|
|
|
|
2020-06-11 13:18:42 +02:00
|
|
|
/* HE enable/disable config from CHAN_SWITCH */
|
|
|
|
#define CH_SWITCH_HE_ENABLED BIT(0)
|
|
|
|
#define CH_SWITCH_HE_DISABLED BIT(1)
|
|
|
|
unsigned int ch_switch_he_config;
|
|
|
|
|
2017-08-21 18:43:53 +02:00
|
|
|
int rssi_reject_assoc_rssi;
|
|
|
|
int rssi_reject_assoc_timeout;
|
2020-08-12 18:55:31 +02:00
|
|
|
int rssi_ignore_probe_request;
|
2019-03-20 15:58:52 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_AIRTIME_POLICY
|
|
|
|
enum {
|
|
|
|
AIRTIME_MODE_OFF = 0,
|
|
|
|
AIRTIME_MODE_STATIC = 1,
|
|
|
|
AIRTIME_MODE_DYNAMIC = 2,
|
|
|
|
AIRTIME_MODE_LIMIT = 3,
|
|
|
|
__AIRTIME_MODE_MAX,
|
|
|
|
} airtime_mode;
|
|
|
|
unsigned int airtime_update_interval;
|
|
|
|
#define AIRTIME_MODE_MAX (__AIRTIME_MODE_MAX - 1)
|
|
|
|
#endif /* CONFIG_AIRTIME_POLICY */
|
2022-04-19 20:04:03 +02:00
|
|
|
|
|
|
|
int ieee80211be;
|
2022-04-19 20:04:04 +02:00
|
|
|
#ifdef CONFIG_IEEE80211BE
|
2022-05-13 18:17:40 +02:00
|
|
|
enum oper_chan_width eht_oper_chwidth;
|
2022-04-19 20:04:04 +02:00
|
|
|
u8 eht_oper_centr_freq_seg0_idx;
|
2022-04-19 20:04:05 +02:00
|
|
|
struct eht_phy_capabilities_info eht_phy_capab;
|
2023-03-14 05:59:15 +01:00
|
|
|
u16 punct_bitmap; /* a bitmap of disabled 20 MHz channels */
|
2022-04-19 20:04:04 +02:00
|
|
|
#endif /* CONFIG_IEEE80211BE */
|
2022-04-19 20:04:17 +02:00
|
|
|
|
|
|
|
/* EHT enable/disable config from CHAN_SWITCH */
|
|
|
|
#define CH_SWITCH_EHT_ENABLED BIT(0)
|
|
|
|
#define CH_SWITCH_EHT_DISABLED BIT(1)
|
|
|
|
unsigned int ch_switch_eht_config;
|
2022-12-01 04:18:33 +01:00
|
|
|
|
|
|
|
enum mbssid {
|
|
|
|
MBSSID_DISABLED = 0,
|
|
|
|
MBSSID_ENABLED = 1,
|
|
|
|
ENHANCED_MBSSID_ENABLED = 2,
|
|
|
|
} mbssid;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2022-05-13 18:17:40 +02:00
|
|
|
static inline enum oper_chan_width
|
|
|
|
hostapd_get_oper_chwidth(struct hostapd_config *conf)
|
2019-05-20 09:55:07 +02:00
|
|
|
{
|
2022-04-19 20:04:04 +02:00
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
|
|
if (conf->ieee80211be)
|
|
|
|
return conf->eht_oper_chwidth;
|
|
|
|
#endif /* CONFIG_IEEE80211BE */
|
2019-05-20 09:55:07 +02:00
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
return conf->he_oper_chwidth;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
return conf->vht_oper_chwidth;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
2022-05-13 18:17:40 +02:00
|
|
|
hostapd_set_oper_chwidth(struct hostapd_config *conf,
|
|
|
|
enum oper_chan_width oper_chwidth)
|
2019-05-20 09:55:07 +02:00
|
|
|
{
|
2022-04-19 20:04:04 +02:00
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
|
|
if (conf->ieee80211be)
|
|
|
|
conf->eht_oper_chwidth = oper_chwidth;
|
2022-05-13 18:17:41 +02:00
|
|
|
if (oper_chwidth == CONF_OPER_CHWIDTH_320MHZ)
|
|
|
|
oper_chwidth = CONF_OPER_CHWIDTH_160MHZ;
|
2022-04-19 20:04:04 +02:00
|
|
|
#endif /* CONFIG_IEEE80211BE */
|
2019-05-20 09:55:07 +02:00
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
conf->he_oper_chwidth = oper_chwidth;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
conf->vht_oper_chwidth = oper_chwidth;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u8
|
|
|
|
hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config *conf)
|
|
|
|
{
|
2022-04-19 20:04:04 +02:00
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
|
|
if (conf->ieee80211be)
|
|
|
|
return conf->eht_oper_centr_freq_seg0_idx;
|
|
|
|
#endif /* CONFIG_IEEE80211BE */
|
2019-05-20 09:55:07 +02:00
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
return conf->he_oper_centr_freq_seg0_idx;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
return conf->vht_oper_centr_freq_seg0_idx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config *conf,
|
|
|
|
u8 oper_centr_freq_seg0_idx)
|
|
|
|
{
|
2022-04-19 20:04:04 +02:00
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
|
|
if (conf->ieee80211be)
|
|
|
|
conf->eht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
|
2022-05-13 18:17:41 +02:00
|
|
|
if (center_idx_to_bw_6ghz(oper_centr_freq_seg0_idx) == 4)
|
|
|
|
oper_centr_freq_seg0_idx +=
|
|
|
|
conf->channel > oper_centr_freq_seg0_idx ? 16 : -16;
|
2022-04-19 20:04:04 +02:00
|
|
|
#endif /* CONFIG_IEEE80211BE */
|
2019-05-20 09:55:07 +02:00
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
conf->he_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
conf->vht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u8
|
|
|
|
hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config *conf)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
return conf->he_oper_centr_freq_seg1_idx;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
return conf->vht_oper_centr_freq_seg1_idx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config *conf,
|
|
|
|
u8 oper_centr_freq_seg1_idx)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
|
|
if (conf->ieee80211ax)
|
|
|
|
conf->he_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
|
|
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
conf->vht_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
int hostapd_mac_comp(const void *a, const void *b);
|
2009-03-26 19:35:49 +01:00
|
|
|
struct hostapd_config * hostapd_config_defaults(void);
|
2009-12-24 20:05:40 +01:00
|
|
|
void hostapd_config_defaults_bss(struct hostapd_bss_config *bss);
|
2019-07-21 14:05:56 +02:00
|
|
|
void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr);
|
2014-03-07 22:19:52 +01:00
|
|
|
void hostapd_config_free_eap_user(struct hostapd_eap_user *user);
|
2016-12-28 11:12:14 +01:00
|
|
|
void hostapd_config_free_eap_users(struct hostapd_eap_user *user);
|
2015-01-19 23:57:41 +01:00
|
|
|
void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p);
|
2013-10-17 17:56:30 +02:00
|
|
|
void hostapd_config_free_bss(struct hostapd_bss_config *conf);
|
2008-02-28 02:34:43 +01:00
|
|
|
void hostapd_config_free(struct hostapd_config *conf);
|
2008-08-28 17:43:26 +02:00
|
|
|
int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
|
2016-01-21 14:51:56 +01:00
|
|
|
const u8 *addr, struct vlan_description *vlan_id);
|
2008-02-28 02:34:43 +01:00
|
|
|
int hostapd_rate_found(int *list, int rate);
|
|
|
|
const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
|
2013-09-01 10:30:26 +02:00
|
|
|
const u8 *addr, const u8 *p2p_dev_addr,
|
2019-02-14 12:34:33 +01:00
|
|
|
const u8 *prev_psk, int *vlan_id);
|
2008-02-28 02:34:43 +01:00
|
|
|
int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf);
|
2016-01-21 14:51:56 +01:00
|
|
|
int hostapd_vlan_valid(struct hostapd_vlan *vlan,
|
|
|
|
struct vlan_description *vlan_desc);
|
2008-02-28 02:34:43 +01:00
|
|
|
const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan,
|
|
|
|
int vlan_id);
|
2012-05-05 19:19:56 +02:00
|
|
|
struct hostapd_radius_attr *
|
|
|
|
hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type);
|
2019-07-21 14:05:55 +02:00
|
|
|
struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value);
|
2014-01-07 19:14:53 +01:00
|
|
|
int hostapd_config_check(struct hostapd_config *conf, int full_config);
|
2014-05-30 19:40:11 +02:00
|
|
|
void hostapd_set_security_params(struct hostapd_bss_config *bss,
|
|
|
|
int full_config);
|
2019-01-23 23:00:28 +01:00
|
|
|
int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf);
|
2020-05-30 22:30:42 +02:00
|
|
|
bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf);
|
|
|
|
bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf);
|
2019-09-06 14:51:37 +02:00
|
|
|
int hostapd_setup_sae_pt(struct hostapd_bss_config *conf);
|
2022-03-24 06:48:57 +01:00
|
|
|
int hostapd_acl_comp(const void *a, const void *b);
|
|
|
|
int hostapd_add_acl_maclist(struct mac_acl_entry **acl, int *num,
|
|
|
|
int vlan_id, const u8 *addr);
|
|
|
|
void hostapd_remove_acl_mac(struct mac_acl_entry **acl, int *num,
|
|
|
|
const u8 *addr);
|
2008-02-28 02:34:43 +01:00
|
|
|
|
2009-12-21 15:10:21 +01:00
|
|
|
#endif /* HOSTAPD_CONFIG_H */
|