581a8cde77
Added a new configuration option, wpa_ptk_rekey, that can be used to enforce frequent PTK rekeying, e.g., to mitigate some attacks against TKIP deficiencies. This can be set either by the Authenticator (to initiate periodic 4-way handshake to rekey PTK) or by the Supplicant (to request Authenticator to rekey PTK). With both wpa_ptk_rekey and wpa_group_rekey (in hostapd) set to 600, TKIP keys will not be used for more than 10 minutes which may make some attacks against TKIP more difficult to implement.
391 lines
9.2 KiB
C
391 lines
9.2 KiB
C
/*
|
|
* hostapd / Configuration file
|
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
|
* Copyright (c) 2007-2008, Intel Corporation
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
|
|
#ifndef CONFIG_H
|
|
#define CONFIG_H
|
|
|
|
#include "defs.h"
|
|
#include "ip_addr.h"
|
|
#include "wpa_common.h"
|
|
|
|
#ifndef IFNAMSIZ
|
|
#define IFNAMSIZ 16
|
|
#endif
|
|
|
|
typedef u8 macaddr[ETH_ALEN];
|
|
|
|
struct mac_acl_entry {
|
|
macaddr addr;
|
|
int vlan_id;
|
|
};
|
|
|
|
struct hostapd_radius_servers;
|
|
struct ft_remote_r0kh;
|
|
struct ft_remote_r1kh;
|
|
|
|
#define HOSTAPD_MAX_SSID_LEN 32
|
|
|
|
#define NUM_WEP_KEYS 4
|
|
struct hostapd_wep_keys {
|
|
u8 idx;
|
|
u8 *key[NUM_WEP_KEYS];
|
|
size_t len[NUM_WEP_KEYS];
|
|
int keys_set;
|
|
size_t default_len; /* key length used for dynamic key generation */
|
|
};
|
|
|
|
typedef enum hostap_security_policy {
|
|
SECURITY_PLAINTEXT = 0,
|
|
SECURITY_STATIC_WEP = 1,
|
|
SECURITY_IEEE_802_1X = 2,
|
|
SECURITY_WPA_PSK = 3,
|
|
SECURITY_WPA = 4
|
|
} secpolicy;
|
|
|
|
struct hostapd_ssid {
|
|
char ssid[HOSTAPD_MAX_SSID_LEN + 1];
|
|
size_t ssid_len;
|
|
int ssid_set;
|
|
|
|
char vlan[IFNAMSIZ + 1];
|
|
secpolicy security_policy;
|
|
|
|
struct hostapd_wpa_psk *wpa_psk;
|
|
char *wpa_passphrase;
|
|
char *wpa_psk_file;
|
|
|
|
struct hostapd_wep_keys wep;
|
|
|
|
#define DYNAMIC_VLAN_DISABLED 0
|
|
#define DYNAMIC_VLAN_OPTIONAL 1
|
|
#define DYNAMIC_VLAN_REQUIRED 2
|
|
int dynamic_vlan;
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
char *vlan_tagged_interface;
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
struct hostapd_wep_keys **dyn_vlan_keys;
|
|
size_t max_dyn_vlan_keys;
|
|
};
|
|
|
|
|
|
#define VLAN_ID_WILDCARD -1
|
|
|
|
struct hostapd_vlan {
|
|
struct hostapd_vlan *next;
|
|
int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */
|
|
char ifname[IFNAMSIZ + 1];
|
|
int dynamic_vlan;
|
|
#ifdef CONFIG_FULL_DYNAMIC_VLAN
|
|
|
|
#define DVLAN_CLEAN_BR 0x1
|
|
#define DVLAN_CLEAN_VLAN 0x2
|
|
#define DVLAN_CLEAN_VLAN_PORT 0x4
|
|
#define DVLAN_CLEAN_WLAN_PORT 0x8
|
|
int clean;
|
|
#endif /* CONFIG_FULL_DYNAMIC_VLAN */
|
|
};
|
|
|
|
#define PMK_LEN 32
|
|
struct hostapd_wpa_psk {
|
|
struct hostapd_wpa_psk *next;
|
|
int group;
|
|
u8 psk[PMK_LEN];
|
|
u8 addr[ETH_ALEN];
|
|
};
|
|
|
|
#define EAP_USER_MAX_METHODS 8
|
|
struct hostapd_eap_user {
|
|
struct hostapd_eap_user *next;
|
|
u8 *identity;
|
|
size_t identity_len;
|
|
struct {
|
|
int vendor;
|
|
u32 method;
|
|
} methods[EAP_USER_MAX_METHODS];
|
|
u8 *password;
|
|
size_t password_len;
|
|
int phase2;
|
|
int force_version;
|
|
unsigned int wildcard_prefix:1;
|
|
unsigned int password_hash:1; /* whether password is hashed with
|
|
* nt_password_hash() */
|
|
int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */
|
|
};
|
|
|
|
|
|
#define NUM_TX_QUEUES 8
|
|
|
|
struct hostapd_tx_queue_params {
|
|
int aifs;
|
|
int cwmin;
|
|
int cwmax;
|
|
int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */
|
|
int configured;
|
|
};
|
|
|
|
struct hostapd_wme_ac_params {
|
|
int cwmin;
|
|
int cwmax;
|
|
int aifs;
|
|
int txopLimit; /* in units of 32us */
|
|
int admission_control_mandatory;
|
|
};
|
|
|
|
|
|
/**
|
|
* struct hostapd_bss_config - Per-BSS configuration
|
|
*/
|
|
struct hostapd_bss_config {
|
|
char iface[IFNAMSIZ + 1];
|
|
char bridge[IFNAMSIZ + 1];
|
|
|
|
enum hostapd_logger_level logger_syslog_level, logger_stdout_level;
|
|
|
|
unsigned int logger_syslog; /* module bitfield */
|
|
unsigned int logger_stdout; /* module bitfield */
|
|
|
|
char *dump_log_name; /* file name for state dump (SIGUSR1) */
|
|
|
|
int max_num_sta; /* maximum number of STAs in station table */
|
|
|
|
int dtim_period;
|
|
|
|
int ieee802_1x; /* use IEEE 802.1X */
|
|
int eapol_version;
|
|
int eap_server; /* Use internal EAP server instead of external
|
|
* RADIUS server */
|
|
struct hostapd_eap_user *eap_user;
|
|
char *eap_sim_db;
|
|
struct hostapd_ip_addr own_ip_addr;
|
|
char *nas_identifier;
|
|
struct hostapd_radius_servers *radius;
|
|
|
|
struct hostapd_ssid ssid;
|
|
|
|
char *eap_req_id_text; /* optional displayable message sent with
|
|
* EAP Request-Identity */
|
|
size_t eap_req_id_text_len;
|
|
int eapol_key_index_workaround;
|
|
|
|
size_t default_wep_key_len;
|
|
int individual_wep_key_len;
|
|
int wep_rekeying_period;
|
|
int broadcast_key_idx_min, broadcast_key_idx_max;
|
|
int eap_reauth_period;
|
|
|
|
int ieee802_11f; /* use IEEE 802.11f (IAPP) */
|
|
char iapp_iface[IFNAMSIZ + 1]; /* interface used with IAPP broadcast
|
|
* frames */
|
|
|
|
u8 assoc_ap_addr[ETH_ALEN];
|
|
int assoc_ap; /* whether assoc_ap_addr is set */
|
|
|
|
enum {
|
|
ACCEPT_UNLESS_DENIED = 0,
|
|
DENY_UNLESS_ACCEPTED = 1,
|
|
USE_EXTERNAL_RADIUS_AUTH = 2
|
|
} macaddr_acl;
|
|
struct mac_acl_entry *accept_mac;
|
|
int num_accept_mac;
|
|
struct mac_acl_entry *deny_mac;
|
|
int num_deny_mac;
|
|
|
|
int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
|
|
* algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
|
|
|
|
int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */
|
|
int wpa_key_mgmt;
|
|
#ifdef CONFIG_IEEE80211W
|
|
enum {
|
|
NO_IEEE80211W = 0,
|
|
IEEE80211W_OPTIONAL = 1,
|
|
IEEE80211W_REQUIRED = 2
|
|
} ieee80211w;
|
|
/* dot11AssociationPingResponseTimeout (in TU) */
|
|
unsigned int assoc_ping_timeout;
|
|
/* dot11AssociationMaximumPingAttempts */
|
|
int assoc_ping_attempts;
|
|
#endif /* CONFIG_IEEE80211W */
|
|
int wpa_pairwise;
|
|
int wpa_group;
|
|
int wpa_group_rekey;
|
|
int wpa_strict_rekey;
|
|
int wpa_gmk_rekey;
|
|
int wpa_ptk_rekey;
|
|
int rsn_pairwise;
|
|
int rsn_preauth;
|
|
char *rsn_preauth_interfaces;
|
|
int peerkey;
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
/* IEEE 802.11r - Fast BSS Transition */
|
|
u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
|
|
u8 r1_key_holder[FT_R1KH_ID_LEN];
|
|
u32 r0_key_lifetime;
|
|
u32 reassociation_deadline;
|
|
struct ft_remote_r0kh *r0kh_list;
|
|
struct ft_remote_r1kh *r1kh_list;
|
|
int pmk_r1_push;
|
|
#endif /* CONFIG_IEEE80211R */
|
|
|
|
char *ctrl_interface; /* directory for UNIX domain sockets */
|
|
gid_t ctrl_interface_gid;
|
|
int ctrl_interface_gid_set;
|
|
|
|
char *ca_cert;
|
|
char *server_cert;
|
|
char *private_key;
|
|
char *private_key_passwd;
|
|
int check_crl;
|
|
char *dh_file;
|
|
u8 *pac_opaque_encr_key;
|
|
u8 *eap_fast_a_id;
|
|
size_t eap_fast_a_id_len;
|
|
char *eap_fast_a_id_info;
|
|
int eap_fast_prov;
|
|
int pac_key_lifetime;
|
|
int pac_key_refresh_time;
|
|
int eap_sim_aka_result_ind;
|
|
int tnc;
|
|
|
|
char *radius_server_clients;
|
|
int radius_server_auth_port;
|
|
int radius_server_ipv6;
|
|
|
|
char *test_socket; /* UNIX domain socket path for driver_test */
|
|
|
|
int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group
|
|
* address instead of individual address
|
|
* (for driver_wired.c).
|
|
*/
|
|
|
|
int ap_max_inactivity;
|
|
int ignore_broadcast_ssid;
|
|
|
|
int wme_enabled;
|
|
|
|
struct hostapd_vlan *vlan, *vlan_tail;
|
|
|
|
macaddr bssid;
|
|
|
|
/*
|
|
* Maximum listen interval that STAs can use when associating with this
|
|
* BSS. If a STA tries to use larger value, the association will be
|
|
* denied with status code 51.
|
|
*/
|
|
u16 max_listen_interval;
|
|
|
|
int okc; /* Opportunistic Key Caching */
|
|
};
|
|
|
|
|
|
typedef enum {
|
|
HOSTAPD_MODE_IEEE80211B,
|
|
HOSTAPD_MODE_IEEE80211G,
|
|
HOSTAPD_MODE_IEEE80211A,
|
|
NUM_HOSTAPD_MODES
|
|
} hostapd_hw_mode;
|
|
|
|
|
|
/**
|
|
* struct hostapd_config - Per-radio interface configuration
|
|
*/
|
|
struct hostapd_config {
|
|
struct hostapd_bss_config *bss, *last_bss;
|
|
struct hostapd_radius_servers *radius;
|
|
size_t num_bss;
|
|
|
|
u16 beacon_int;
|
|
int rts_threshold;
|
|
int fragm_threshold;
|
|
u8 send_probe_response;
|
|
u8 channel;
|
|
hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */
|
|
enum {
|
|
LONG_PREAMBLE = 0,
|
|
SHORT_PREAMBLE = 1
|
|
} preamble;
|
|
enum {
|
|
CTS_PROTECTION_AUTOMATIC = 0,
|
|
CTS_PROTECTION_FORCE_ENABLED = 1,
|
|
CTS_PROTECTION_FORCE_DISABLED = 2,
|
|
CTS_PROTECTION_AUTOMATIC_NO_OLBC = 3,
|
|
} cts_protection_type;
|
|
|
|
int *supported_rates;
|
|
int *basic_rates;
|
|
|
|
const struct wpa_driver_ops *driver;
|
|
|
|
int passive_scan_interval; /* seconds, 0 = disabled */
|
|
int passive_scan_listen; /* usec */
|
|
int passive_scan_mode;
|
|
int ap_table_max_size;
|
|
int ap_table_expiration_time;
|
|
|
|
char country[3]; /* first two octets: country code as described in
|
|
* ISO/IEC 3166-1. Third octet:
|
|
* ' ' (ascii 32): all environments
|
|
* 'O': Outdoor environemnt only
|
|
* 'I': Indoor environment only
|
|
*/
|
|
|
|
int ieee80211d;
|
|
unsigned int ieee80211h; /* Enable/Disable 80211h */
|
|
|
|
struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES];
|
|
|
|
/*
|
|
* WME AC parameters, in same order as 802.1D, i.e.
|
|
* 0 = BE (best effort)
|
|
* 1 = BK (background)
|
|
* 2 = VI (video)
|
|
* 3 = VO (voice)
|
|
*/
|
|
struct hostapd_wme_ac_params wme_ac_params[4];
|
|
|
|
enum {
|
|
INTERNAL_BRIDGE_DO_NOT_CONTROL = -1,
|
|
INTERNAL_BRIDGE_DISABLED = 0,
|
|
INTERNAL_BRIDGE_ENABLED = 1
|
|
} bridge_packets;
|
|
|
|
#ifdef CONFIG_IEEE80211N
|
|
int ieee80211n;
|
|
int ht_op_mode_fixed;
|
|
u16 ht_capab;
|
|
#endif /* CONFIG_IEEE80211N */
|
|
};
|
|
|
|
|
|
int hostapd_mac_comp(const void *a, const void *b);
|
|
int hostapd_mac_comp_empty(const void *a);
|
|
struct hostapd_config * hostapd_config_read(const char *fname);
|
|
void hostapd_config_free(struct hostapd_config *conf);
|
|
int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
|
|
const u8 *addr, int *vlan_id);
|
|
int hostapd_rate_found(int *list, int rate);
|
|
int hostapd_wep_key_cmp(struct hostapd_wep_keys *a,
|
|
struct hostapd_wep_keys *b);
|
|
const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
|
|
const u8 *addr, const u8 *prev_psk);
|
|
int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf);
|
|
const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan,
|
|
int vlan_id);
|
|
const struct hostapd_eap_user *
|
|
hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity,
|
|
size_t identity_len, int phase2);
|
|
|
|
#endif /* CONFIG_H */
|