4120f9d7ab
Per IEEE P802.11az/D7.0, 12.12.3.2 (PASN Frame Construction and Processing), responder should REFUSE PASN authentication frame 1 with Base AKM as PASN AKM if dot11NoAuthPASNActivated is false. That configuration was not previously available and hostapd was hardcoded with dot11NoAuthPASNActivated being true. Allow this to be configured and reject PASN authentication frame 1 from initiator if pasn_noauth=0 and Base AKM in RSNE of this frame is PASN. The default value for pasn_noauth is 1 to maintain previous functionality even though the dot11NoAuthPASNActivated is defined to have default value of false. Signed-off-by: Sai Pratyusha Magam <quic_smagam@quicinc.com>
1757 lines
43 KiB
C
1757 lines
43 KiB
C
/*
|
|
* hostapd / Configuration helper functions
|
|
* Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "crypto/sha1.h"
|
|
#include "crypto/tls.h"
|
|
#include "radius/radius_client.h"
|
|
#include "common/ieee802_11_defs.h"
|
|
#include "common/ieee802_1x_defs.h"
|
|
#include "common/eapol_common.h"
|
|
#include "common/dhcp.h"
|
|
#include "common/sae.h"
|
|
#include "eap_common/eap_wsc_common.h"
|
|
#include "eap_server/eap.h"
|
|
#include "wpa_auth.h"
|
|
#include "sta_info.h"
|
|
#include "airtime_policy.h"
|
|
#include "ap_config.h"
|
|
|
|
|
|
static void hostapd_config_free_vlan(struct hostapd_bss_config *bss)
|
|
{
|
|
struct hostapd_vlan *vlan, *prev;
|
|
|
|
vlan = bss->vlan;
|
|
prev = NULL;
|
|
while (vlan) {
|
|
prev = vlan;
|
|
vlan = vlan->next;
|
|
os_free(prev);
|
|
}
|
|
|
|
bss->vlan = NULL;
|
|
}
|
|
|
|
|
|
#ifndef DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES
|
|
#define DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES 0
|
|
#endif /* DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES */
|
|
|
|
void hostapd_config_defaults_bss(struct hostapd_bss_config *bss)
|
|
{
|
|
dl_list_init(&bss->anqp_elem);
|
|
|
|
bss->logger_syslog_level = HOSTAPD_LEVEL_INFO;
|
|
bss->logger_stdout_level = HOSTAPD_LEVEL_INFO;
|
|
bss->logger_syslog = (unsigned int) -1;
|
|
bss->logger_stdout = (unsigned int) -1;
|
|
|
|
#ifdef CONFIG_WEP
|
|
bss->auth_algs = WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED;
|
|
|
|
bss->wep_rekeying_period = 300;
|
|
/* use key0 in individual key and key1 in broadcast key */
|
|
bss->broadcast_key_idx_min = 1;
|
|
bss->broadcast_key_idx_max = 2;
|
|
#else /* CONFIG_WEP */
|
|
bss->auth_algs = WPA_AUTH_ALG_OPEN;
|
|
#endif /* CONFIG_WEP */
|
|
bss->eap_reauth_period = 3600;
|
|
|
|
bss->wpa_group_rekey = 600;
|
|
bss->wpa_gmk_rekey = 86400;
|
|
bss->wpa_deny_ptk0_rekey = PTK0_REKEY_ALLOW_ALWAYS;
|
|
bss->wpa_group_update_count = 4;
|
|
bss->wpa_pairwise_update_count = 4;
|
|
bss->wpa_disable_eapol_key_retries =
|
|
DEFAULT_WPA_DISABLE_EAPOL_KEY_RETRIES;
|
|
bss->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
|
|
#ifdef CONFIG_NO_TKIP
|
|
bss->wpa_pairwise = WPA_CIPHER_CCMP;
|
|
bss->wpa_group = WPA_CIPHER_CCMP;
|
|
#else /* CONFIG_NO_TKIP */
|
|
bss->wpa_pairwise = WPA_CIPHER_TKIP;
|
|
bss->wpa_group = WPA_CIPHER_TKIP;
|
|
#endif /* CONFIG_NO_TKIP */
|
|
bss->rsn_pairwise = 0;
|
|
|
|
bss->max_num_sta = MAX_STA_COUNT;
|
|
|
|
bss->dtim_period = 2;
|
|
|
|
bss->radius_server_auth_port = 1812;
|
|
bss->eap_sim_db_timeout = 1;
|
|
bss->eap_sim_id = 3;
|
|
bss->ap_max_inactivity = AP_MAX_INACTIVITY;
|
|
bss->eapol_version = EAPOL_VERSION;
|
|
|
|
bss->max_listen_interval = 65535;
|
|
|
|
bss->pwd_group = 19; /* ECC: GF(p=256) */
|
|
|
|
bss->assoc_sa_query_max_timeout = 1000;
|
|
bss->assoc_sa_query_retry_timeout = 201;
|
|
bss->group_mgmt_cipher = WPA_CIPHER_AES_128_CMAC;
|
|
#ifdef EAP_SERVER_FAST
|
|
/* both anonymous and authenticated provisioning */
|
|
bss->eap_fast_prov = 3;
|
|
bss->pac_key_lifetime = 7 * 24 * 60 * 60;
|
|
bss->pac_key_refresh_time = 1 * 24 * 60 * 60;
|
|
#endif /* EAP_SERVER_FAST */
|
|
|
|
/* Set to -1 as defaults depends on HT in setup */
|
|
bss->wmm_enabled = -1;
|
|
|
|
#ifdef CONFIG_IEEE80211R_AP
|
|
bss->ft_over_ds = 1;
|
|
bss->rkh_pos_timeout = 86400;
|
|
bss->rkh_neg_timeout = 60;
|
|
bss->rkh_pull_timeout = 1000;
|
|
bss->rkh_pull_retries = 4;
|
|
bss->r0_key_lifetime = 1209600;
|
|
#endif /* CONFIG_IEEE80211R_AP */
|
|
|
|
bss->radius_das_time_window = 300;
|
|
|
|
bss->anti_clogging_threshold = 5;
|
|
bss->sae_sync = 5;
|
|
|
|
bss->gas_frag_limit = 1400;
|
|
|
|
#ifdef CONFIG_FILS
|
|
dl_list_init(&bss->fils_realms);
|
|
bss->fils_hlp_wait_time = 30;
|
|
bss->dhcp_server_port = DHCP_SERVER_PORT;
|
|
bss->dhcp_relay_port = DHCP_SERVER_PORT;
|
|
bss->fils_discovery_min_int = 20;
|
|
#endif /* CONFIG_FILS */
|
|
|
|
bss->broadcast_deauth = 1;
|
|
|
|
#ifdef CONFIG_MBO
|
|
bss->mbo_cell_data_conn_pref = -1;
|
|
#endif /* CONFIG_MBO */
|
|
|
|
/* Disable TLS v1.3 by default for now to avoid interoperability issue.
|
|
* This can be enabled by default once the implementation has been fully
|
|
* completed and tested with other implementations. */
|
|
bss->tls_flags = TLS_CONN_DISABLE_TLSv1_3;
|
|
|
|
bss->max_auth_rounds = 100;
|
|
bss->max_auth_rounds_short = 50;
|
|
|
|
bss->send_probe_response = 1;
|
|
|
|
#ifdef CONFIG_HS20
|
|
bss->hs20_release = (HS20_VERSION >> 4) + 1;
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
#ifdef CONFIG_MACSEC
|
|
bss->mka_priority = DEFAULT_PRIO_NOT_KEY_SERVER;
|
|
bss->macsec_port = 1;
|
|
#endif /* CONFIG_MACSEC */
|
|
|
|
/* Default to strict CRL checking. */
|
|
bss->check_crl_strict = 1;
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
bss->sae_commit_status = -1;
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
#ifdef CONFIG_PASN
|
|
/* comeback after 10 TUs */
|
|
bss->pasn_comeback_after = 10;
|
|
bss->pasn_noauth = 1;
|
|
#endif /* CONFIG_PASN */
|
|
}
|
|
|
|
|
|
struct hostapd_config * hostapd_config_defaults(void)
|
|
{
|
|
#define ecw2cw(ecw) ((1 << (ecw)) - 1)
|
|
|
|
struct hostapd_config *conf;
|
|
struct hostapd_bss_config *bss;
|
|
const int aCWmin = 4, aCWmax = 10;
|
|
const struct hostapd_wmm_ac_params ac_bk =
|
|
{ aCWmin, aCWmax, 7, 0, 0 }; /* background traffic */
|
|
const struct hostapd_wmm_ac_params ac_be =
|
|
{ aCWmin, aCWmax, 3, 0, 0 }; /* best effort traffic */
|
|
const struct hostapd_wmm_ac_params ac_vi = /* video traffic */
|
|
{ aCWmin - 1, aCWmin, 2, 3008 / 32, 0 };
|
|
const struct hostapd_wmm_ac_params ac_vo = /* voice traffic */
|
|
{ aCWmin - 2, aCWmin - 1, 2, 1504 / 32, 0 };
|
|
const struct hostapd_tx_queue_params txq_bk =
|
|
{ 7, ecw2cw(aCWmin), ecw2cw(aCWmax), 0 };
|
|
const struct hostapd_tx_queue_params txq_be =
|
|
{ 3, ecw2cw(aCWmin), 4 * (ecw2cw(aCWmin) + 1) - 1, 0};
|
|
const struct hostapd_tx_queue_params txq_vi =
|
|
{ 1, (ecw2cw(aCWmin) + 1) / 2 - 1, ecw2cw(aCWmin), 30};
|
|
const struct hostapd_tx_queue_params txq_vo =
|
|
{ 1, (ecw2cw(aCWmin) + 1) / 4 - 1,
|
|
(ecw2cw(aCWmin) + 1) / 2 - 1, 15};
|
|
|
|
#undef ecw2cw
|
|
|
|
conf = os_zalloc(sizeof(*conf));
|
|
bss = os_zalloc(sizeof(*bss));
|
|
if (conf == NULL || bss == NULL) {
|
|
wpa_printf(MSG_ERROR, "Failed to allocate memory for "
|
|
"configuration data.");
|
|
os_free(conf);
|
|
os_free(bss);
|
|
return NULL;
|
|
}
|
|
conf->bss = os_calloc(1, sizeof(struct hostapd_bss_config *));
|
|
if (conf->bss == NULL) {
|
|
os_free(conf);
|
|
os_free(bss);
|
|
return NULL;
|
|
}
|
|
conf->bss[0] = bss;
|
|
|
|
bss->radius = os_zalloc(sizeof(*bss->radius));
|
|
if (bss->radius == NULL) {
|
|
os_free(conf->bss);
|
|
os_free(conf);
|
|
os_free(bss);
|
|
return NULL;
|
|
}
|
|
|
|
hostapd_config_defaults_bss(bss);
|
|
|
|
conf->num_bss = 1;
|
|
|
|
conf->beacon_int = 100;
|
|
conf->rts_threshold = -2; /* use driver default: 2347 */
|
|
conf->fragm_threshold = -2; /* user driver default: 2346 */
|
|
/* Set to invalid value means do not add Power Constraint IE */
|
|
conf->local_pwr_constraint = -1;
|
|
|
|
conf->wmm_ac_params[0] = ac_be;
|
|
conf->wmm_ac_params[1] = ac_bk;
|
|
conf->wmm_ac_params[2] = ac_vi;
|
|
conf->wmm_ac_params[3] = ac_vo;
|
|
|
|
conf->tx_queue[0] = txq_vo;
|
|
conf->tx_queue[1] = txq_vi;
|
|
conf->tx_queue[2] = txq_be;
|
|
conf->tx_queue[3] = txq_bk;
|
|
|
|
conf->ht_capab = HT_CAP_INFO_SMPS_DISABLED;
|
|
|
|
conf->ap_table_max_size = 255;
|
|
conf->ap_table_expiration_time = 60;
|
|
conf->track_sta_max_age = 180;
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
conf->ignore_probe_probability = 0.0;
|
|
conf->ignore_auth_probability = 0.0;
|
|
conf->ignore_assoc_probability = 0.0;
|
|
conf->ignore_reassoc_probability = 0.0;
|
|
conf->corrupt_gtk_rekey_mic_probability = 0.0;
|
|
conf->ecsa_ie_only = 0;
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
conf->acs = 0;
|
|
conf->acs_ch_list.num = 0;
|
|
#ifdef CONFIG_ACS
|
|
conf->acs_num_scans = 5;
|
|
#endif /* CONFIG_ACS */
|
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
conf->he_op.he_rts_threshold = HE_OPERATION_RTS_THRESHOLD_MASK >>
|
|
HE_OPERATION_RTS_THRESHOLD_OFFSET;
|
|
/* Set default basic MCS/NSS set to single stream MCS 0-7 */
|
|
conf->he_op.he_basic_mcs_nss_set = 0xfffc;
|
|
conf->he_op.he_bss_color_disabled = 1;
|
|
conf->he_op.he_bss_color_partial = 0;
|
|
conf->he_op.he_bss_color = os_random() % 63 + 1;
|
|
conf->he_op.he_twt_responder = 1;
|
|
conf->he_6ghz_max_mpdu = 2;
|
|
conf->he_6ghz_max_ampdu_len_exp = 7;
|
|
conf->he_6ghz_rx_ant_pat = 1;
|
|
conf->he_6ghz_tx_ant_pat = 1;
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
/* The third octet of the country string uses an ASCII space character
|
|
* by default to indicate that the regulations encompass all
|
|
* environments for the current frequency band in the country. */
|
|
conf->country[2] = ' ';
|
|
|
|
conf->rssi_reject_assoc_rssi = 0;
|
|
conf->rssi_reject_assoc_timeout = 30;
|
|
|
|
#ifdef CONFIG_AIRTIME_POLICY
|
|
conf->airtime_update_interval = AIRTIME_DEFAULT_UPDATE_INTERVAL;
|
|
#endif /* CONFIG_AIRTIME_POLICY */
|
|
|
|
return conf;
|
|
}
|
|
|
|
|
|
int hostapd_mac_comp(const void *a, const void *b)
|
|
{
|
|
return os_memcmp(a, b, sizeof(macaddr));
|
|
}
|
|
|
|
|
|
static int hostapd_config_read_wpa_psk(const char *fname,
|
|
struct hostapd_ssid *ssid)
|
|
{
|
|
FILE *f;
|
|
char buf[128], *pos;
|
|
const char *keyid;
|
|
char *context;
|
|
char *context2;
|
|
char *token;
|
|
char *name;
|
|
char *value;
|
|
int line = 0, ret = 0, len, ok;
|
|
u8 addr[ETH_ALEN];
|
|
struct hostapd_wpa_psk *psk;
|
|
|
|
if (!fname)
|
|
return 0;
|
|
|
|
f = fopen(fname, "r");
|
|
if (!f) {
|
|
wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
|
|
return -1;
|
|
}
|
|
|
|
while (fgets(buf, sizeof(buf), f)) {
|
|
int vlan_id = 0;
|
|
int wps = 0;
|
|
|
|
line++;
|
|
|
|
if (buf[0] == '#')
|
|
continue;
|
|
pos = buf;
|
|
while (*pos != '\0') {
|
|
if (*pos == '\n') {
|
|
*pos = '\0';
|
|
break;
|
|
}
|
|
pos++;
|
|
}
|
|
if (buf[0] == '\0')
|
|
continue;
|
|
|
|
context = NULL;
|
|
keyid = NULL;
|
|
while ((token = str_token(buf, " ", &context))) {
|
|
if (!os_strchr(token, '='))
|
|
break;
|
|
context2 = NULL;
|
|
name = str_token(token, "=", &context2);
|
|
if (!name)
|
|
break;
|
|
value = str_token(token, "", &context2);
|
|
if (!value)
|
|
value = "";
|
|
if (!os_strcmp(name, "keyid")) {
|
|
keyid = value;
|
|
} else if (!os_strcmp(name, "wps")) {
|
|
wps = atoi(value);
|
|
} else if (!os_strcmp(name, "vlanid")) {
|
|
vlan_id = atoi(value);
|
|
} else {
|
|
wpa_printf(MSG_ERROR,
|
|
"Unrecognized '%s=%s' on line %d in '%s'",
|
|
name, value, line, fname);
|
|
ret = -1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (ret == -1)
|
|
break;
|
|
|
|
if (!token)
|
|
token = "";
|
|
if (hwaddr_aton(token, addr)) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Invalid MAC address '%s' on line %d in '%s'",
|
|
token, line, fname);
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
psk = os_zalloc(sizeof(*psk));
|
|
if (psk == NULL) {
|
|
wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
|
|
ret = -1;
|
|
break;
|
|
}
|
|
psk->vlan_id = vlan_id;
|
|
if (is_zero_ether_addr(addr))
|
|
psk->group = 1;
|
|
else
|
|
os_memcpy(psk->addr, addr, ETH_ALEN);
|
|
|
|
pos = str_token(buf, "", &context);
|
|
if (!pos) {
|
|
wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
|
|
line, fname);
|
|
os_free(psk);
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
ok = 0;
|
|
len = os_strlen(pos);
|
|
if (len == 2 * PMK_LEN &&
|
|
hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
|
|
ok = 1;
|
|
else if (len >= 8 && len < 64 &&
|
|
pbkdf2_sha1(pos, ssid->ssid, ssid->ssid_len,
|
|
4096, psk->psk, PMK_LEN) == 0)
|
|
ok = 1;
|
|
if (!ok) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Invalid PSK '%s' on line %d in '%s'",
|
|
pos, line, fname);
|
|
os_free(psk);
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
if (keyid) {
|
|
len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid));
|
|
if ((size_t) len >= sizeof(psk->keyid)) {
|
|
wpa_printf(MSG_ERROR,
|
|
"PSK keyid too long on line %d in '%s'",
|
|
line, fname);
|
|
os_free(psk);
|
|
ret = -1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
psk->wps = wps;
|
|
|
|
psk->next = ssid->wpa_psk;
|
|
ssid->wpa_psk = psk;
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int hostapd_derive_psk(struct hostapd_ssid *ssid)
|
|
{
|
|
ssid->wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
|
|
if (ssid->wpa_psk == NULL) {
|
|
wpa_printf(MSG_ERROR, "Unable to alloc space for PSK");
|
|
return -1;
|
|
}
|
|
wpa_hexdump_ascii(MSG_DEBUG, "SSID",
|
|
(u8 *) ssid->ssid, ssid->ssid_len);
|
|
wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)",
|
|
(u8 *) ssid->wpa_passphrase,
|
|
os_strlen(ssid->wpa_passphrase));
|
|
if (pbkdf2_sha1(ssid->wpa_passphrase,
|
|
ssid->ssid, ssid->ssid_len,
|
|
4096, ssid->wpa_psk->psk, PMK_LEN) != 0) {
|
|
wpa_printf(MSG_ERROR, "Error in pbkdf2_sha1()");
|
|
return -1;
|
|
}
|
|
wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)",
|
|
ssid->wpa_psk->psk, PMK_LEN);
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_setup_sae_pt(struct hostapd_bss_config *conf)
|
|
{
|
|
#ifdef CONFIG_SAE
|
|
struct hostapd_ssid *ssid = &conf->ssid;
|
|
struct sae_password_entry *pw;
|
|
|
|
if ((conf->sae_pwe == SAE_PWE_HUNT_AND_PECK &&
|
|
!hostapd_sae_pw_id_in_use(conf) &&
|
|
!wpa_key_mgmt_sae_ext_key(conf->wpa_key_mgmt) &&
|
|
!hostapd_sae_pk_in_use(conf)) ||
|
|
conf->sae_pwe == SAE_PWE_FORCE_HUNT_AND_PECK ||
|
|
!wpa_key_mgmt_sae(conf->wpa_key_mgmt))
|
|
return 0; /* PT not needed */
|
|
|
|
sae_deinit_pt(ssid->pt);
|
|
ssid->pt = NULL;
|
|
if (ssid->wpa_passphrase) {
|
|
ssid->pt = sae_derive_pt(conf->sae_groups, ssid->ssid,
|
|
ssid->ssid_len,
|
|
(const u8 *) ssid->wpa_passphrase,
|
|
os_strlen(ssid->wpa_passphrase),
|
|
NULL);
|
|
if (!ssid->pt)
|
|
return -1;
|
|
}
|
|
|
|
for (pw = conf->sae_passwords; pw; pw = pw->next) {
|
|
sae_deinit_pt(pw->pt);
|
|
pw->pt = sae_derive_pt(conf->sae_groups, ssid->ssid,
|
|
ssid->ssid_len,
|
|
(const u8 *) pw->password,
|
|
os_strlen(pw->password),
|
|
pw->identifier);
|
|
if (!pw->pt)
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_SAE */
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf)
|
|
{
|
|
struct hostapd_ssid *ssid = &conf->ssid;
|
|
|
|
if (hostapd_setup_sae_pt(conf) < 0)
|
|
return -1;
|
|
|
|
if (ssid->wpa_passphrase != NULL) {
|
|
if (ssid->wpa_psk != NULL) {
|
|
wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
|
|
"instead of passphrase");
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
|
|
"passphrase");
|
|
if (hostapd_derive_psk(ssid) < 0)
|
|
return -1;
|
|
}
|
|
ssid->wpa_psk->group = 1;
|
|
}
|
|
|
|
return hostapd_config_read_wpa_psk(ssid->wpa_psk_file, &conf->ssid);
|
|
}
|
|
|
|
|
|
static void hostapd_config_free_radius(struct hostapd_radius_server *servers,
|
|
int num_servers)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < num_servers; i++) {
|
|
os_free(servers[i].shared_secret);
|
|
}
|
|
os_free(servers);
|
|
}
|
|
|
|
|
|
struct hostapd_radius_attr *
|
|
hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type)
|
|
{
|
|
for (; attr; attr = attr->next) {
|
|
if (attr->type == type)
|
|
return attr;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value)
|
|
{
|
|
const char *pos;
|
|
char syntax;
|
|
struct hostapd_radius_attr *attr;
|
|
size_t len;
|
|
|
|
attr = os_zalloc(sizeof(*attr));
|
|
if (!attr)
|
|
return NULL;
|
|
|
|
attr->type = atoi(value);
|
|
|
|
pos = os_strchr(value, ':');
|
|
if (!pos) {
|
|
attr->val = wpabuf_alloc(1);
|
|
if (!attr->val) {
|
|
os_free(attr);
|
|
return NULL;
|
|
}
|
|
wpabuf_put_u8(attr->val, 0);
|
|
return attr;
|
|
}
|
|
|
|
pos++;
|
|
if (pos[0] == '\0' || pos[1] != ':') {
|
|
os_free(attr);
|
|
return NULL;
|
|
}
|
|
syntax = *pos++;
|
|
pos++;
|
|
|
|
switch (syntax) {
|
|
case 's':
|
|
attr->val = wpabuf_alloc_copy(pos, os_strlen(pos));
|
|
break;
|
|
case 'x':
|
|
len = os_strlen(pos);
|
|
if (len & 1)
|
|
break;
|
|
len /= 2;
|
|
attr->val = wpabuf_alloc(len);
|
|
if (!attr->val)
|
|
break;
|
|
if (hexstr2bin(pos, wpabuf_put(attr->val, len), len) < 0) {
|
|
wpabuf_free(attr->val);
|
|
os_free(attr);
|
|
return NULL;
|
|
}
|
|
break;
|
|
case 'd':
|
|
attr->val = wpabuf_alloc(4);
|
|
if (attr->val)
|
|
wpabuf_put_be32(attr->val, atoi(pos));
|
|
break;
|
|
default:
|
|
os_free(attr);
|
|
return NULL;
|
|
}
|
|
|
|
if (!attr->val) {
|
|
os_free(attr);
|
|
return NULL;
|
|
}
|
|
|
|
return attr;
|
|
}
|
|
|
|
|
|
void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr)
|
|
{
|
|
struct hostapd_radius_attr *prev;
|
|
|
|
while (attr) {
|
|
prev = attr;
|
|
attr = attr->next;
|
|
wpabuf_free(prev->val);
|
|
os_free(prev);
|
|
}
|
|
}
|
|
|
|
|
|
void hostapd_config_free_eap_user(struct hostapd_eap_user *user)
|
|
{
|
|
hostapd_config_free_radius_attr(user->accept_attr);
|
|
os_free(user->identity);
|
|
bin_clear_free(user->password, user->password_len);
|
|
bin_clear_free(user->salt, user->salt_len);
|
|
os_free(user);
|
|
}
|
|
|
|
|
|
void hostapd_config_free_eap_users(struct hostapd_eap_user *user)
|
|
{
|
|
struct hostapd_eap_user *prev_user;
|
|
|
|
while (user) {
|
|
prev_user = user;
|
|
user = user->next;
|
|
hostapd_config_free_eap_user(prev_user);
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_WEP
|
|
static void hostapd_config_free_wep(struct hostapd_wep_keys *keys)
|
|
{
|
|
int i;
|
|
for (i = 0; i < NUM_WEP_KEYS; i++) {
|
|
bin_clear_free(keys->key[i], keys->len[i]);
|
|
keys->key[i] = NULL;
|
|
}
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
|
|
void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **l)
|
|
{
|
|
struct hostapd_wpa_psk *psk, *tmp;
|
|
|
|
for (psk = *l; psk;) {
|
|
tmp = psk;
|
|
psk = psk->next;
|
|
bin_clear_free(tmp, sizeof(*tmp));
|
|
}
|
|
*l = NULL;
|
|
}
|
|
|
|
|
|
static void hostapd_config_free_anqp_elem(struct hostapd_bss_config *conf)
|
|
{
|
|
struct anqp_element *elem;
|
|
|
|
while ((elem = dl_list_first(&conf->anqp_elem, struct anqp_element,
|
|
list))) {
|
|
dl_list_del(&elem->list);
|
|
wpabuf_free(elem->payload);
|
|
os_free(elem);
|
|
}
|
|
}
|
|
|
|
|
|
static void hostapd_config_free_fils_realms(struct hostapd_bss_config *conf)
|
|
{
|
|
#ifdef CONFIG_FILS
|
|
struct fils_realm *realm;
|
|
|
|
while ((realm = dl_list_first(&conf->fils_realms, struct fils_realm,
|
|
list))) {
|
|
dl_list_del(&realm->list);
|
|
os_free(realm);
|
|
}
|
|
#endif /* CONFIG_FILS */
|
|
}
|
|
|
|
|
|
static void hostapd_config_free_sae_passwords(struct hostapd_bss_config *conf)
|
|
{
|
|
struct sae_password_entry *pw, *tmp;
|
|
|
|
pw = conf->sae_passwords;
|
|
conf->sae_passwords = NULL;
|
|
while (pw) {
|
|
tmp = pw;
|
|
pw = pw->next;
|
|
str_clear_free(tmp->password);
|
|
os_free(tmp->identifier);
|
|
#ifdef CONFIG_SAE
|
|
sae_deinit_pt(tmp->pt);
|
|
#endif /* CONFIG_SAE */
|
|
#ifdef CONFIG_SAE_PK
|
|
sae_deinit_pk(tmp->pk);
|
|
#endif /* CONFIG_SAE_PK */
|
|
os_free(tmp);
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_DPP2
|
|
static void hostapd_dpp_controller_conf_free(struct dpp_controller_conf *conf)
|
|
{
|
|
struct dpp_controller_conf *prev;
|
|
|
|
while (conf) {
|
|
prev = conf;
|
|
conf = conf->next;
|
|
os_free(prev);
|
|
}
|
|
}
|
|
#endif /* CONFIG_DPP2 */
|
|
|
|
|
|
void hostapd_config_free_bss(struct hostapd_bss_config *conf)
|
|
{
|
|
#if defined(CONFIG_WPS) || defined(CONFIG_HS20)
|
|
size_t i;
|
|
#endif
|
|
|
|
if (conf == NULL)
|
|
return;
|
|
|
|
hostapd_config_clear_wpa_psk(&conf->ssid.wpa_psk);
|
|
|
|
str_clear_free(conf->ssid.wpa_passphrase);
|
|
os_free(conf->ssid.wpa_psk_file);
|
|
#ifdef CONFIG_WEP
|
|
hostapd_config_free_wep(&conf->ssid.wep);
|
|
#endif /* CONFIG_WEP */
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
os_free(conf->ssid.vlan_tagged_interface);
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
#ifdef CONFIG_SAE
|
|
sae_deinit_pt(conf->ssid.pt);
|
|
#endif /* CONFIG_SAE */
|
|
|
|
hostapd_config_free_eap_users(conf->eap_user);
|
|
os_free(conf->eap_user_sqlite);
|
|
|
|
os_free(conf->eap_req_id_text);
|
|
os_free(conf->erp_domain);
|
|
os_free(conf->accept_mac);
|
|
os_free(conf->deny_mac);
|
|
os_free(conf->nas_identifier);
|
|
if (conf->radius) {
|
|
hostapd_config_free_radius(conf->radius->auth_servers,
|
|
conf->radius->num_auth_servers);
|
|
hostapd_config_free_radius(conf->radius->acct_servers,
|
|
conf->radius->num_acct_servers);
|
|
os_free(conf->radius->force_client_dev);
|
|
}
|
|
hostapd_config_free_radius_attr(conf->radius_auth_req_attr);
|
|
hostapd_config_free_radius_attr(conf->radius_acct_req_attr);
|
|
os_free(conf->radius_req_attr_sqlite);
|
|
os_free(conf->rsn_preauth_interfaces);
|
|
os_free(conf->ctrl_interface);
|
|
os_free(conf->config_id);
|
|
os_free(conf->ca_cert);
|
|
os_free(conf->server_cert);
|
|
os_free(conf->server_cert2);
|
|
os_free(conf->private_key);
|
|
os_free(conf->private_key2);
|
|
os_free(conf->private_key_passwd);
|
|
os_free(conf->private_key_passwd2);
|
|
os_free(conf->check_cert_subject);
|
|
os_free(conf->ocsp_stapling_response);
|
|
os_free(conf->ocsp_stapling_response_multi);
|
|
os_free(conf->dh_file);
|
|
os_free(conf->openssl_ciphers);
|
|
os_free(conf->openssl_ecdh_curves);
|
|
os_free(conf->pac_opaque_encr_key);
|
|
os_free(conf->eap_fast_a_id);
|
|
os_free(conf->eap_fast_a_id_info);
|
|
os_free(conf->eap_sim_db);
|
|
os_free(conf->imsi_privacy_key);
|
|
os_free(conf->radius_server_clients);
|
|
os_free(conf->radius);
|
|
os_free(conf->radius_das_shared_secret);
|
|
hostapd_config_free_vlan(conf);
|
|
os_free(conf->time_zone);
|
|
|
|
#ifdef CONFIG_IEEE80211R_AP
|
|
{
|
|
struct ft_remote_r0kh *r0kh, *r0kh_prev;
|
|
struct ft_remote_r1kh *r1kh, *r1kh_prev;
|
|
|
|
r0kh = conf->r0kh_list;
|
|
conf->r0kh_list = NULL;
|
|
while (r0kh) {
|
|
r0kh_prev = r0kh;
|
|
r0kh = r0kh->next;
|
|
os_free(r0kh_prev);
|
|
}
|
|
|
|
r1kh = conf->r1kh_list;
|
|
conf->r1kh_list = NULL;
|
|
while (r1kh) {
|
|
r1kh_prev = r1kh;
|
|
r1kh = r1kh->next;
|
|
os_free(r1kh_prev);
|
|
}
|
|
}
|
|
#endif /* CONFIG_IEEE80211R_AP */
|
|
|
|
#ifdef CONFIG_WPS
|
|
os_free(conf->wps_pin_requests);
|
|
os_free(conf->device_name);
|
|
os_free(conf->manufacturer);
|
|
os_free(conf->model_name);
|
|
os_free(conf->model_number);
|
|
os_free(conf->serial_number);
|
|
os_free(conf->config_methods);
|
|
os_free(conf->ap_pin);
|
|
os_free(conf->extra_cred);
|
|
os_free(conf->ap_settings);
|
|
hostapd_config_clear_wpa_psk(&conf->multi_ap_backhaul_ssid.wpa_psk);
|
|
str_clear_free(conf->multi_ap_backhaul_ssid.wpa_passphrase);
|
|
os_free(conf->upnp_iface);
|
|
os_free(conf->friendly_name);
|
|
os_free(conf->manufacturer_url);
|
|
os_free(conf->model_description);
|
|
os_free(conf->model_url);
|
|
os_free(conf->upc);
|
|
for (i = 0; i < MAX_WPS_VENDOR_EXTENSIONS; i++)
|
|
wpabuf_free(conf->wps_vendor_ext[i]);
|
|
wpabuf_free(conf->wps_application_ext);
|
|
wpabuf_free(conf->wps_nfc_dh_pubkey);
|
|
wpabuf_free(conf->wps_nfc_dh_privkey);
|
|
wpabuf_free(conf->wps_nfc_dev_pw);
|
|
#endif /* CONFIG_WPS */
|
|
|
|
os_free(conf->roaming_consortium);
|
|
os_free(conf->venue_name);
|
|
os_free(conf->venue_url);
|
|
os_free(conf->nai_realm_data);
|
|
os_free(conf->network_auth_type);
|
|
os_free(conf->anqp_3gpp_cell_net);
|
|
os_free(conf->domain_name);
|
|
hostapd_config_free_anqp_elem(conf);
|
|
|
|
#ifdef CONFIG_RADIUS_TEST
|
|
os_free(conf->dump_msk_file);
|
|
#endif /* CONFIG_RADIUS_TEST */
|
|
|
|
#ifdef CONFIG_HS20
|
|
os_free(conf->hs20_oper_friendly_name);
|
|
os_free(conf->hs20_wan_metrics);
|
|
os_free(conf->hs20_connection_capability);
|
|
os_free(conf->hs20_operating_class);
|
|
os_free(conf->hs20_icons);
|
|
if (conf->hs20_osu_providers) {
|
|
for (i = 0; i < conf->hs20_osu_providers_count; i++) {
|
|
struct hs20_osu_provider *p;
|
|
size_t j;
|
|
p = &conf->hs20_osu_providers[i];
|
|
os_free(p->friendly_name);
|
|
os_free(p->server_uri);
|
|
os_free(p->method_list);
|
|
for (j = 0; j < p->icons_count; j++)
|
|
os_free(p->icons[j]);
|
|
os_free(p->icons);
|
|
os_free(p->osu_nai);
|
|
os_free(p->osu_nai2);
|
|
os_free(p->service_desc);
|
|
}
|
|
os_free(conf->hs20_osu_providers);
|
|
}
|
|
if (conf->hs20_operator_icon) {
|
|
for (i = 0; i < conf->hs20_operator_icon_count; i++)
|
|
os_free(conf->hs20_operator_icon[i]);
|
|
os_free(conf->hs20_operator_icon);
|
|
}
|
|
os_free(conf->subscr_remediation_url);
|
|
os_free(conf->hs20_sim_provisioning_url);
|
|
os_free(conf->t_c_filename);
|
|
os_free(conf->t_c_server_url);
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
wpabuf_free(conf->vendor_elements);
|
|
wpabuf_free(conf->assocresp_elements);
|
|
|
|
os_free(conf->sae_groups);
|
|
#ifdef CONFIG_OWE
|
|
os_free(conf->owe_groups);
|
|
#endif /* CONFIG_OWE */
|
|
|
|
os_free(conf->wowlan_triggers);
|
|
|
|
os_free(conf->server_id);
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
wpabuf_free(conf->own_ie_override);
|
|
wpabuf_free(conf->sae_commit_override);
|
|
wpabuf_free(conf->rsne_override_eapol);
|
|
wpabuf_free(conf->rsnxe_override_eapol);
|
|
wpabuf_free(conf->rsne_override_ft);
|
|
wpabuf_free(conf->rsnxe_override_ft);
|
|
wpabuf_free(conf->gtk_rsc_override);
|
|
wpabuf_free(conf->igtk_rsc_override);
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
os_free(conf->no_probe_resp_if_seen_on);
|
|
os_free(conf->no_auth_if_seen_on);
|
|
|
|
hostapd_config_free_fils_realms(conf);
|
|
|
|
#ifdef CONFIG_DPP
|
|
os_free(conf->dpp_name);
|
|
os_free(conf->dpp_mud_url);
|
|
os_free(conf->dpp_extra_conf_req_name);
|
|
os_free(conf->dpp_extra_conf_req_value);
|
|
os_free(conf->dpp_connector);
|
|
wpabuf_free(conf->dpp_netaccesskey);
|
|
wpabuf_free(conf->dpp_csign);
|
|
#ifdef CONFIG_DPP2
|
|
hostapd_dpp_controller_conf_free(conf->dpp_controller);
|
|
#endif /* CONFIG_DPP2 */
|
|
#endif /* CONFIG_DPP */
|
|
|
|
hostapd_config_free_sae_passwords(conf);
|
|
|
|
#ifdef CONFIG_AIRTIME_POLICY
|
|
{
|
|
struct airtime_sta_weight *wt, *wt_prev;
|
|
|
|
wt = conf->airtime_weight_list;
|
|
conf->airtime_weight_list = NULL;
|
|
while (wt) {
|
|
wt_prev = wt;
|
|
wt = wt->next;
|
|
os_free(wt_prev);
|
|
}
|
|
}
|
|
#endif /* CONFIG_AIRTIME_POLICY */
|
|
|
|
#ifdef CONFIG_PASN
|
|
os_free(conf->pasn_groups);
|
|
#endif /* CONFIG_PASN */
|
|
|
|
os_free(conf);
|
|
}
|
|
|
|
|
|
/**
|
|
* hostapd_config_free - Free hostapd configuration
|
|
* @conf: Configuration data from hostapd_config_read().
|
|
*/
|
|
void hostapd_config_free(struct hostapd_config *conf)
|
|
{
|
|
size_t i;
|
|
|
|
if (conf == NULL)
|
|
return;
|
|
|
|
for (i = 0; i < conf->num_bss; i++)
|
|
hostapd_config_free_bss(conf->bss[i]);
|
|
os_free(conf->bss);
|
|
os_free(conf->supported_rates);
|
|
os_free(conf->basic_rates);
|
|
os_free(conf->acs_ch_list.range);
|
|
os_free(conf->acs_freq_list.range);
|
|
os_free(conf->driver_params);
|
|
#ifdef CONFIG_ACS
|
|
os_free(conf->acs_chan_bias);
|
|
#endif /* CONFIG_ACS */
|
|
wpabuf_free(conf->lci);
|
|
wpabuf_free(conf->civic);
|
|
|
|
os_free(conf);
|
|
}
|
|
|
|
|
|
/**
|
|
* hostapd_maclist_found - Find a MAC address from a list
|
|
* @list: MAC address list
|
|
* @num_entries: Number of addresses in the list
|
|
* @addr: Address to search for
|
|
* @vlan_id: Buffer for returning VLAN ID or %NULL if not needed
|
|
* Returns: 1 if address is in the list or 0 if not.
|
|
*
|
|
* Perform a binary search for given MAC address from a pre-sorted list.
|
|
*/
|
|
int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
|
|
const u8 *addr, struct vlan_description *vlan_id)
|
|
{
|
|
int start, end, middle, res;
|
|
|
|
start = 0;
|
|
end = num_entries - 1;
|
|
|
|
while (start <= end) {
|
|
middle = (start + end) / 2;
|
|
res = os_memcmp(list[middle].addr, addr, ETH_ALEN);
|
|
if (res == 0) {
|
|
if (vlan_id)
|
|
*vlan_id = list[middle].vlan_id;
|
|
return 1;
|
|
}
|
|
if (res < 0)
|
|
start = middle + 1;
|
|
else
|
|
end = middle - 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_rate_found(int *list, int rate)
|
|
{
|
|
int i;
|
|
|
|
if (list == NULL)
|
|
return 0;
|
|
|
|
for (i = 0; list[i] >= 0; i++)
|
|
if (list[i] == rate)
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_vlan_valid(struct hostapd_vlan *vlan,
|
|
struct vlan_description *vlan_desc)
|
|
{
|
|
struct hostapd_vlan *v = vlan;
|
|
int i;
|
|
|
|
if (!vlan_desc->notempty || vlan_desc->untagged < 0 ||
|
|
vlan_desc->untagged > MAX_VLAN_ID)
|
|
return 0;
|
|
for (i = 0; i < MAX_NUM_TAGGED_VLAN; i++) {
|
|
if (vlan_desc->tagged[i] < 0 ||
|
|
vlan_desc->tagged[i] > MAX_VLAN_ID)
|
|
return 0;
|
|
}
|
|
if (!vlan_desc->untagged && !vlan_desc->tagged[0])
|
|
return 0;
|
|
|
|
while (v) {
|
|
if (!vlan_compare(&v->vlan_desc, vlan_desc) ||
|
|
v->vlan_id == VLAN_ID_WILDCARD)
|
|
return 1;
|
|
v = v->next;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, int vlan_id)
|
|
{
|
|
struct hostapd_vlan *v = vlan;
|
|
while (v) {
|
|
if (v->vlan_id == vlan_id)
|
|
return v->ifname;
|
|
v = v->next;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
|
|
const u8 *addr, const u8 *p2p_dev_addr,
|
|
const u8 *prev_psk, int *vlan_id)
|
|
{
|
|
struct hostapd_wpa_psk *psk;
|
|
int next_ok = prev_psk == NULL;
|
|
|
|
if (vlan_id)
|
|
*vlan_id = 0;
|
|
|
|
if (p2p_dev_addr && !is_zero_ether_addr(p2p_dev_addr)) {
|
|
wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
|
|
" p2p_dev_addr=" MACSTR " prev_psk=%p",
|
|
MAC2STR(addr), MAC2STR(p2p_dev_addr), prev_psk);
|
|
addr = NULL; /* Use P2P Device Address for matching */
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
|
|
" prev_psk=%p",
|
|
MAC2STR(addr), prev_psk);
|
|
}
|
|
|
|
for (psk = conf->ssid.wpa_psk; psk != NULL; psk = psk->next) {
|
|
if (next_ok &&
|
|
(psk->group ||
|
|
(addr && os_memcmp(psk->addr, addr, ETH_ALEN) == 0) ||
|
|
(!addr && p2p_dev_addr &&
|
|
os_memcmp(psk->p2p_dev_addr, p2p_dev_addr, ETH_ALEN) ==
|
|
0))) {
|
|
if (vlan_id)
|
|
*vlan_id = psk->vlan_id;
|
|
return psk->psk;
|
|
}
|
|
|
|
if (psk->psk == prev_psk)
|
|
next_ok = 1;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_SAE_PK
|
|
static bool hostapd_sae_pk_password_without_pk(struct hostapd_bss_config *bss)
|
|
{
|
|
struct sae_password_entry *pw;
|
|
bool res = false;
|
|
|
|
if (bss->ssid.wpa_passphrase &&
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
!bss->sae_pk_password_check_skip &&
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
sae_pk_valid_password(bss->ssid.wpa_passphrase))
|
|
res = true;
|
|
|
|
for (pw = bss->sae_passwords; pw; pw = pw->next) {
|
|
if (!pw->pk &&
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
!bss->sae_pk_password_check_skip &&
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
sae_pk_valid_password(pw->password))
|
|
return true;
|
|
|
|
if (bss->ssid.wpa_passphrase && res && pw->pk &&
|
|
os_strcmp(bss->ssid.wpa_passphrase, pw->password) == 0)
|
|
res = false;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
#endif /* CONFIG_SAE_PK */
|
|
|
|
|
|
static bool hostapd_config_check_bss_6g(struct hostapd_bss_config *bss)
|
|
{
|
|
if (bss->wpa != WPA_PROTO_RSN) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Pre-RSNA security methods are not allowed in 6 GHz");
|
|
return false;
|
|
}
|
|
|
|
if (bss->ieee80211w != MGMT_FRAME_PROTECTION_REQUIRED) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Management frame protection is required in 6 GHz");
|
|
return false;
|
|
}
|
|
|
|
if (bss->wpa_key_mgmt & (WPA_KEY_MGMT_PSK |
|
|
WPA_KEY_MGMT_FT_PSK |
|
|
WPA_KEY_MGMT_PSK_SHA256)) {
|
|
wpa_printf(MSG_ERROR, "Invalid AKM suite for 6 GHz");
|
|
return false;
|
|
}
|
|
|
|
if (bss->rsn_pairwise & (WPA_CIPHER_WEP40 |
|
|
WPA_CIPHER_WEP104 |
|
|
WPA_CIPHER_TKIP)) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Invalid pairwise cipher suite for 6 GHz");
|
|
return false;
|
|
}
|
|
|
|
if (bss->wpa_group & (WPA_CIPHER_WEP40 |
|
|
WPA_CIPHER_WEP104 |
|
|
WPA_CIPHER_TKIP)) {
|
|
wpa_printf(MSG_ERROR, "Invalid group cipher suite for 6 GHz");
|
|
return false;
|
|
}
|
|
|
|
#ifdef CONFIG_SAE
|
|
if (wpa_key_mgmt_sae(bss->wpa_key_mgmt) &&
|
|
bss->sae_pwe == SAE_PWE_HUNT_AND_PECK) {
|
|
wpa_printf(MSG_INFO, "SAE: Enabling SAE H2E on 6 GHz");
|
|
bss->sae_pwe = SAE_PWE_BOTH;
|
|
}
|
|
#endif /* CONFIG_SAE */
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
static int hostapd_config_check_bss(struct hostapd_bss_config *bss,
|
|
struct hostapd_config *conf,
|
|
int full_config)
|
|
{
|
|
if (full_config && is_6ghz_op_class(conf->op_class) &&
|
|
!hostapd_config_check_bss_6g(bss))
|
|
return -1;
|
|
|
|
if (full_config && bss->ieee802_1x && !bss->eap_server &&
|
|
!bss->radius->auth_servers) {
|
|
wpa_printf(MSG_ERROR, "Invalid IEEE 802.1X configuration (no "
|
|
"EAP authenticator configured).");
|
|
return -1;
|
|
}
|
|
|
|
#ifdef CONFIG_WEP
|
|
if (bss->wpa) {
|
|
int wep, i;
|
|
|
|
wep = bss->default_wep_key_len > 0 ||
|
|
bss->individual_wep_key_len > 0;
|
|
for (i = 0; i < NUM_WEP_KEYS; i++) {
|
|
if (bss->ssid.wep.keys_set) {
|
|
wep = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (wep) {
|
|
wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported");
|
|
return -1;
|
|
}
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if (full_config && bss->wpa &&
|
|
bss->wpa_psk_radius != PSK_RADIUS_IGNORED &&
|
|
bss->wpa_psk_radius != PSK_RADIUS_DURING_4WAY_HS &&
|
|
bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH) {
|
|
wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no "
|
|
"RADIUS checking (macaddr_acl=2) enabled.");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && bss->wpa &&
|
|
wpa_key_mgmt_wpa_psk_no_sae(bss->wpa_key_mgmt) &&
|
|
bss->ssid.wpa_psk == NULL && bss->ssid.wpa_passphrase == NULL &&
|
|
bss->ssid.wpa_psk_file == NULL &&
|
|
bss->wpa_psk_radius != PSK_RADIUS_DURING_4WAY_HS &&
|
|
(bss->wpa_psk_radius != PSK_RADIUS_REQUIRED ||
|
|
bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH)) {
|
|
wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
|
|
"is not configured.");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && !is_zero_ether_addr(bss->bssid)) {
|
|
size_t i;
|
|
|
|
for (i = 0; i < conf->num_bss; i++) {
|
|
if (conf->bss[i] != bss &&
|
|
(hostapd_mac_comp(conf->bss[i]->bssid,
|
|
bss->bssid) == 0)) {
|
|
wpa_printf(MSG_ERROR, "Duplicate BSSID " MACSTR
|
|
" on interface '%s' and '%s'.",
|
|
MAC2STR(bss->bssid),
|
|
conf->bss[i]->iface, bss->iface);
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef CONFIG_IEEE80211R_AP
|
|
if (full_config && wpa_key_mgmt_ft(bss->wpa_key_mgmt) &&
|
|
(bss->nas_identifier == NULL ||
|
|
os_strlen(bss->nas_identifier) < 1 ||
|
|
os_strlen(bss->nas_identifier) > FT_R0KH_ID_MAX_LEN)) {
|
|
wpa_printf(MSG_ERROR, "FT (IEEE 802.11r) requires "
|
|
"nas_identifier to be configured as a 1..48 octet "
|
|
"string");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_IEEE80211R_AP */
|
|
|
|
if (full_config && conf->ieee80211n &&
|
|
conf->hw_mode == HOSTAPD_MODE_IEEE80211B) {
|
|
bss->disable_11n = true;
|
|
wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) in 11b mode is not "
|
|
"allowed, disabling HT capabilities");
|
|
}
|
|
|
|
#ifdef CONFIG_WEP
|
|
if (full_config && conf->ieee80211n &&
|
|
bss->ssid.security_policy == SECURITY_STATIC_WEP) {
|
|
bss->disable_11n = true;
|
|
wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WEP is not "
|
|
"allowed, disabling HT capabilities");
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if (full_config && conf->ieee80211n && bss->wpa &&
|
|
!(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
|
|
!(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
|
|
WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
|
|
{
|
|
bss->disable_11n = true;
|
|
wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WPA/WPA2 "
|
|
"requires CCMP/GCMP to be enabled, disabling HT "
|
|
"capabilities");
|
|
}
|
|
|
|
#ifdef CONFIG_IEEE80211AC
|
|
#ifdef CONFIG_WEP
|
|
if (full_config && conf->ieee80211ac &&
|
|
bss->ssid.security_policy == SECURITY_STATIC_WEP) {
|
|
bss->disable_11ac = true;
|
|
wpa_printf(MSG_ERROR,
|
|
"VHT (IEEE 802.11ac) with WEP is not allowed, disabling VHT capabilities");
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if (full_config && conf->ieee80211ac && bss->wpa &&
|
|
!(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
|
|
!(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
|
|
WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
|
|
{
|
|
bss->disable_11ac = true;
|
|
wpa_printf(MSG_ERROR,
|
|
"VHT (IEEE 802.11ac) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling VHT capabilities");
|
|
}
|
|
#endif /* CONFIG_IEEE80211AC */
|
|
|
|
#ifdef CONFIG_IEEE80211AX
|
|
#ifdef CONFIG_WEP
|
|
if (full_config && conf->ieee80211ax &&
|
|
bss->ssid.security_policy == SECURITY_STATIC_WEP) {
|
|
bss->disable_11ax = true;
|
|
wpa_printf(MSG_ERROR,
|
|
"HE (IEEE 802.11ax) with WEP is not allowed, disabling HE capabilities");
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if (full_config && conf->ieee80211ax && bss->wpa &&
|
|
!(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
|
|
!(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
|
|
WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
|
|
{
|
|
bss->disable_11ax = true;
|
|
wpa_printf(MSG_ERROR,
|
|
"HE (IEEE 802.11ax) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling HE capabilities");
|
|
}
|
|
#endif /* CONFIG_IEEE80211AX */
|
|
|
|
#ifdef CONFIG_WPS
|
|
if (full_config && bss->wps_state && bss->ignore_broadcast_ssid) {
|
|
wpa_printf(MSG_INFO, "WPS: ignore_broadcast_ssid "
|
|
"configuration forced WPS to be disabled");
|
|
bss->wps_state = 0;
|
|
}
|
|
|
|
#ifdef CONFIG_WEP
|
|
if (full_config && bss->wps_state &&
|
|
bss->ssid.wep.keys_set && bss->wpa == 0) {
|
|
wpa_printf(MSG_INFO, "WPS: WEP configuration forced WPS to be "
|
|
"disabled");
|
|
bss->wps_state = 0;
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if (full_config && bss->wps_state && bss->wpa &&
|
|
(!(bss->wpa & 2) ||
|
|
!(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
|
|
WPA_CIPHER_CCMP_256 |
|
|
WPA_CIPHER_GCMP_256)))) {
|
|
wpa_printf(MSG_INFO, "WPS: WPA/TKIP configuration without "
|
|
"WPA2/CCMP/GCMP forced WPS to be disabled");
|
|
bss->wps_state = 0;
|
|
}
|
|
#endif /* CONFIG_WPS */
|
|
|
|
#ifdef CONFIG_HS20
|
|
if (full_config && bss->hs20 &&
|
|
(!(bss->wpa & 2) ||
|
|
!(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
|
|
WPA_CIPHER_CCMP_256 |
|
|
WPA_CIPHER_GCMP_256)))) {
|
|
wpa_printf(MSG_ERROR, "HS 2.0: WPA2-Enterprise/CCMP "
|
|
"configuration is required for Hotspot 2.0 "
|
|
"functionality");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
#ifdef CONFIG_MBO
|
|
if (full_config && bss->mbo_enabled && (bss->wpa & 2) &&
|
|
bss->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
|
|
wpa_printf(MSG_ERROR,
|
|
"MBO: PMF needs to be enabled whenever using WPA2 with MBO");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_MBO */
|
|
|
|
#ifdef CONFIG_OCV
|
|
if (full_config && bss->ieee80211w == NO_MGMT_FRAME_PROTECTION &&
|
|
bss->ocv) {
|
|
wpa_printf(MSG_ERROR,
|
|
"OCV: PMF needs to be enabled whenever using OCV");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_OCV */
|
|
|
|
#ifdef CONFIG_SAE_PK
|
|
if (full_config && hostapd_sae_pk_in_use(bss) &&
|
|
hostapd_sae_pk_password_without_pk(bss)) {
|
|
wpa_printf(MSG_ERROR,
|
|
"SAE-PK: SAE password uses SAE-PK style, but does not have PK configured");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_SAE_PK */
|
|
|
|
#ifdef CONFIG_FILS
|
|
if (full_config && bss->fils_discovery_max_int &&
|
|
(!conf->ieee80211ax || bss->disable_11ax)) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Currently IEEE 802.11ax support is mandatory to enable FILS discovery transmission.");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && bss->fils_discovery_max_int &&
|
|
bss->unsol_bcast_probe_resp_interval) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Cannot enable both FILS discovery and unsolicited broadcast Probe Response at the same time");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_FILS */
|
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
if (full_config && !bss->disable_11be && bss->disable_11ax) {
|
|
bss->disable_11be = true;
|
|
wpa_printf(MSG_INFO,
|
|
"Disabling IEEE 802.11be as IEEE 802.11ax is disabled for this BSS");
|
|
}
|
|
#endif /* CONFIG_IEEE80211BE */
|
|
|
|
if (full_config && bss->ignore_broadcast_ssid && conf->mbssid) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Hidden SSID is not suppored when MBSSID is enabled");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int hostapd_config_check_cw(struct hostapd_config *conf, int queue)
|
|
{
|
|
int tx_cwmin = conf->tx_queue[queue].cwmin;
|
|
int tx_cwmax = conf->tx_queue[queue].cwmax;
|
|
int ac_cwmin = conf->wmm_ac_params[queue].cwmin;
|
|
int ac_cwmax = conf->wmm_ac_params[queue].cwmax;
|
|
|
|
if (tx_cwmin > tx_cwmax) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Invalid TX queue cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
|
|
tx_cwmin, tx_cwmax);
|
|
return -1;
|
|
}
|
|
if (ac_cwmin > ac_cwmax) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Invalid WMM AC cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
|
|
ac_cwmin, ac_cwmax);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_config_check(struct hostapd_config *conf, int full_config)
|
|
{
|
|
size_t i;
|
|
|
|
if (full_config && is_6ghz_op_class(conf->op_class) &&
|
|
!conf->hw_mode_set) {
|
|
/* Use the appropriate hw_mode value automatically when the
|
|
* op_class parameter has been set, but hw_mode was not. */
|
|
conf->hw_mode = HOSTAPD_MODE_IEEE80211A;
|
|
}
|
|
|
|
if (full_config && conf->ieee80211d &&
|
|
(!conf->country[0] || !conf->country[1])) {
|
|
wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11d without "
|
|
"setting the country_code");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && conf->ieee80211h && !conf->ieee80211d) {
|
|
wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11h without "
|
|
"IEEE 802.11d enabled");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && conf->local_pwr_constraint != -1 &&
|
|
!conf->ieee80211d) {
|
|
wpa_printf(MSG_ERROR, "Cannot add Power Constraint element without Country element");
|
|
return -1;
|
|
}
|
|
|
|
if (full_config && conf->spectrum_mgmt_required &&
|
|
conf->local_pwr_constraint == -1) {
|
|
wpa_printf(MSG_ERROR, "Cannot set Spectrum Management bit without Country and Power Constraint elements");
|
|
return -1;
|
|
}
|
|
|
|
#ifdef CONFIG_AIRTIME_POLICY
|
|
if (full_config && conf->airtime_mode > AIRTIME_MODE_STATIC &&
|
|
!conf->airtime_update_interval) {
|
|
wpa_printf(MSG_ERROR, "Airtime update interval cannot be zero");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_AIRTIME_POLICY */
|
|
for (i = 0; i < NUM_TX_QUEUES; i++) {
|
|
if (hostapd_config_check_cw(conf, i))
|
|
return -1;
|
|
}
|
|
|
|
#ifdef CONFIG_IEEE80211BE
|
|
if (full_config && conf->ieee80211be && !conf->ieee80211ax) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Cannot set ieee80211be without ieee80211ax");
|
|
return -1;
|
|
}
|
|
#endif /* CONFIG_IEEE80211BE */
|
|
|
|
if (full_config && conf->mbssid && !conf->ieee80211ax) {
|
|
wpa_printf(MSG_ERROR,
|
|
"Cannot enable multiple BSSID support without ieee80211ax");
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < conf->num_bss; i++) {
|
|
if (hostapd_config_check_bss(conf->bss[i], conf, full_config))
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void hostapd_set_security_params(struct hostapd_bss_config *bss,
|
|
int full_config)
|
|
{
|
|
#ifdef CONFIG_WEP
|
|
if (bss->individual_wep_key_len == 0) {
|
|
/* individual keys are not use; can use key idx0 for
|
|
* broadcast keys */
|
|
bss->broadcast_key_idx_min = 0;
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
|
|
if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
|
|
bss->rsn_pairwise = bss->wpa_pairwise;
|
|
if (bss->group_cipher)
|
|
bss->wpa_group = bss->group_cipher;
|
|
else
|
|
bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
|
|
bss->wpa_pairwise,
|
|
bss->rsn_pairwise);
|
|
if (!bss->wpa_group_rekey_set)
|
|
bss->wpa_group_rekey = bss->wpa_group == WPA_CIPHER_TKIP ?
|
|
600 : 86400;
|
|
|
|
if (full_config) {
|
|
bss->radius->auth_server = bss->radius->auth_servers;
|
|
bss->radius->acct_server = bss->radius->acct_servers;
|
|
}
|
|
|
|
if (bss->wpa && bss->ieee802_1x) {
|
|
bss->ssid.security_policy = SECURITY_WPA;
|
|
} else if (bss->wpa) {
|
|
bss->ssid.security_policy = SECURITY_WPA_PSK;
|
|
} else if (bss->ieee802_1x) {
|
|
int cipher = WPA_CIPHER_NONE;
|
|
bss->ssid.security_policy = SECURITY_IEEE_802_1X;
|
|
#ifdef CONFIG_WEP
|
|
bss->ssid.wep.default_len = bss->default_wep_key_len;
|
|
if (full_config && bss->default_wep_key_len) {
|
|
cipher = bss->default_wep_key_len >= 13 ?
|
|
WPA_CIPHER_WEP104 : WPA_CIPHER_WEP40;
|
|
} else if (full_config && bss->ssid.wep.keys_set) {
|
|
if (bss->ssid.wep.len[0] >= 13)
|
|
cipher = WPA_CIPHER_WEP104;
|
|
else
|
|
cipher = WPA_CIPHER_WEP40;
|
|
}
|
|
#endif /* CONFIG_WEP */
|
|
bss->wpa_group = cipher;
|
|
bss->wpa_pairwise = cipher;
|
|
bss->rsn_pairwise = cipher;
|
|
if (full_config)
|
|
bss->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA;
|
|
#ifdef CONFIG_WEP
|
|
} else if (bss->ssid.wep.keys_set) {
|
|
int cipher = WPA_CIPHER_WEP40;
|
|
if (bss->ssid.wep.len[0] >= 13)
|
|
cipher = WPA_CIPHER_WEP104;
|
|
bss->ssid.security_policy = SECURITY_STATIC_WEP;
|
|
bss->wpa_group = cipher;
|
|
bss->wpa_pairwise = cipher;
|
|
bss->rsn_pairwise = cipher;
|
|
if (full_config)
|
|
bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
|
|
#endif /* CONFIG_WEP */
|
|
} else if (bss->osen) {
|
|
bss->ssid.security_policy = SECURITY_OSEN;
|
|
bss->wpa_group = WPA_CIPHER_CCMP;
|
|
bss->wpa_pairwise = 0;
|
|
bss->rsn_pairwise = WPA_CIPHER_CCMP;
|
|
} else {
|
|
bss->ssid.security_policy = SECURITY_PLAINTEXT;
|
|
if (full_config) {
|
|
bss->wpa_group = WPA_CIPHER_NONE;
|
|
bss->wpa_pairwise = WPA_CIPHER_NONE;
|
|
bss->rsn_pairwise = WPA_CIPHER_NONE;
|
|
bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf)
|
|
{
|
|
int with_id = 0, without_id = 0;
|
|
struct sae_password_entry *pw;
|
|
|
|
if (conf->ssid.wpa_passphrase)
|
|
without_id = 1;
|
|
|
|
for (pw = conf->sae_passwords; pw; pw = pw->next) {
|
|
if (pw->identifier)
|
|
with_id = 1;
|
|
else
|
|
without_id = 1;
|
|
if (with_id && without_id)
|
|
break;
|
|
}
|
|
|
|
if (with_id && !without_id)
|
|
return 2;
|
|
return with_id;
|
|
}
|
|
|
|
|
|
bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf)
|
|
{
|
|
#ifdef CONFIG_SAE_PK
|
|
struct sae_password_entry *pw;
|
|
|
|
for (pw = conf->sae_passwords; pw; pw = pw->next) {
|
|
if (pw->pk)
|
|
return true;
|
|
}
|
|
#endif /* CONFIG_SAE_PK */
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_SAE_PK
|
|
bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf)
|
|
{
|
|
bool with_pk = false;
|
|
struct sae_password_entry *pw;
|
|
|
|
if (conf->ssid.wpa_passphrase)
|
|
return false;
|
|
|
|
for (pw = conf->sae_passwords; pw; pw = pw->next) {
|
|
if (!pw->pk)
|
|
return false;
|
|
with_pk = true;
|
|
}
|
|
|
|
return with_pk;
|
|
}
|
|
#endif /* CONFIG_SAE_PK */
|
|
|
|
|
|
int hostapd_acl_comp(const void *a, const void *b)
|
|
{
|
|
const struct mac_acl_entry *aa = a;
|
|
const struct mac_acl_entry *bb = b;
|
|
return os_memcmp(aa->addr, bb->addr, sizeof(macaddr));
|
|
}
|
|
|
|
|
|
int hostapd_add_acl_maclist(struct mac_acl_entry **acl, int *num,
|
|
int vlan_id, const u8 *addr)
|
|
{
|
|
struct mac_acl_entry *newacl;
|
|
|
|
newacl = os_realloc_array(*acl, *num + 1, sizeof(**acl));
|
|
if (!newacl) {
|
|
wpa_printf(MSG_ERROR, "MAC list reallocation failed");
|
|
return -1;
|
|
}
|
|
|
|
*acl = newacl;
|
|
os_memcpy((*acl)[*num].addr, addr, ETH_ALEN);
|
|
os_memset(&(*acl)[*num].vlan_id, 0, sizeof((*acl)[*num].vlan_id));
|
|
(*acl)[*num].vlan_id.untagged = vlan_id;
|
|
(*acl)[*num].vlan_id.notempty = !!vlan_id;
|
|
(*num)++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void hostapd_remove_acl_mac(struct mac_acl_entry **acl, int *num,
|
|
const u8 *addr)
|
|
{
|
|
int i = 0;
|
|
|
|
while (i < *num) {
|
|
if (os_memcmp((*acl)[i].addr, addr, ETH_ALEN) == 0) {
|
|
os_remove_in_array(*acl, *num, sizeof(**acl), i);
|
|
(*num)--;
|
|
} else {
|
|
i++;
|
|
}
|
|
}
|
|
}
|