ap_config.c 27 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094
  1. /*
  2. * hostapd / Configuration helper functions
  3. * Copyright (c) 2003-2014, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "crypto/sha1.h"
  11. #include "radius/radius_client.h"
  12. #include "common/ieee802_11_defs.h"
  13. #include "common/eapol_common.h"
  14. #include "common/dhcp.h"
  15. #include "eap_common/eap_wsc_common.h"
  16. #include "eap_server/eap.h"
  17. #include "wpa_auth.h"
  18. #include "sta_info.h"
  19. #include "ap_config.h"
  20. static void hostapd_config_free_vlan(struct hostapd_bss_config *bss)
  21. {
  22. struct hostapd_vlan *vlan, *prev;
  23. vlan = bss->vlan;
  24. prev = NULL;
  25. while (vlan) {
  26. prev = vlan;
  27. vlan = vlan->next;
  28. os_free(prev);
  29. }
  30. bss->vlan = NULL;
  31. }
  32. void hostapd_config_defaults_bss(struct hostapd_bss_config *bss)
  33. {
  34. dl_list_init(&bss->anqp_elem);
  35. bss->logger_syslog_level = HOSTAPD_LEVEL_INFO;
  36. bss->logger_stdout_level = HOSTAPD_LEVEL_INFO;
  37. bss->logger_syslog = (unsigned int) -1;
  38. bss->logger_stdout = (unsigned int) -1;
  39. bss->auth_algs = WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED;
  40. bss->wep_rekeying_period = 300;
  41. /* use key0 in individual key and key1 in broadcast key */
  42. bss->broadcast_key_idx_min = 1;
  43. bss->broadcast_key_idx_max = 2;
  44. bss->eap_reauth_period = 3600;
  45. bss->wpa_group_rekey = 600;
  46. bss->wpa_gmk_rekey = 86400;
  47. bss->wpa_group_update_count = 4;
  48. bss->wpa_pairwise_update_count = 4;
  49. bss->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
  50. bss->wpa_pairwise = WPA_CIPHER_TKIP;
  51. bss->wpa_group = WPA_CIPHER_TKIP;
  52. bss->rsn_pairwise = 0;
  53. bss->max_num_sta = MAX_STA_COUNT;
  54. bss->dtim_period = 2;
  55. bss->radius_server_auth_port = 1812;
  56. bss->eap_sim_db_timeout = 1;
  57. bss->ap_max_inactivity = AP_MAX_INACTIVITY;
  58. bss->eapol_version = EAPOL_VERSION;
  59. bss->max_listen_interval = 65535;
  60. bss->pwd_group = 19; /* ECC: GF(p=256) */
  61. #ifdef CONFIG_IEEE80211W
  62. bss->assoc_sa_query_max_timeout = 1000;
  63. bss->assoc_sa_query_retry_timeout = 201;
  64. bss->group_mgmt_cipher = WPA_CIPHER_AES_128_CMAC;
  65. #endif /* CONFIG_IEEE80211W */
  66. #ifdef EAP_SERVER_FAST
  67. /* both anonymous and authenticated provisioning */
  68. bss->eap_fast_prov = 3;
  69. bss->pac_key_lifetime = 7 * 24 * 60 * 60;
  70. bss->pac_key_refresh_time = 1 * 24 * 60 * 60;
  71. #endif /* EAP_SERVER_FAST */
  72. /* Set to -1 as defaults depends on HT in setup */
  73. bss->wmm_enabled = -1;
  74. #ifdef CONFIG_IEEE80211R_AP
  75. bss->ft_over_ds = 1;
  76. bss->rkh_pos_timeout = 86400;
  77. bss->rkh_neg_timeout = 60;
  78. bss->rkh_pull_timeout = 1000;
  79. bss->rkh_pull_retries = 4;
  80. #endif /* CONFIG_IEEE80211R_AP */
  81. bss->radius_das_time_window = 300;
  82. bss->sae_anti_clogging_threshold = 5;
  83. bss->gas_frag_limit = 1400;
  84. #ifdef CONFIG_FILS
  85. dl_list_init(&bss->fils_realms);
  86. bss->fils_hlp_wait_time = 30;
  87. bss->dhcp_server_port = DHCP_SERVER_PORT;
  88. bss->dhcp_relay_port = DHCP_SERVER_PORT;
  89. #endif /* CONFIG_FILS */
  90. bss->broadcast_deauth = 1;
  91. #ifdef CONFIG_MBO
  92. bss->mbo_cell_data_conn_pref = -1;
  93. #endif /* CONFIG_MBO */
  94. }
  95. struct hostapd_config * hostapd_config_defaults(void)
  96. {
  97. #define ecw2cw(ecw) ((1 << (ecw)) - 1)
  98. struct hostapd_config *conf;
  99. struct hostapd_bss_config *bss;
  100. const int aCWmin = 4, aCWmax = 10;
  101. const struct hostapd_wmm_ac_params ac_bk =
  102. { aCWmin, aCWmax, 7, 0, 0 }; /* background traffic */
  103. const struct hostapd_wmm_ac_params ac_be =
  104. { aCWmin, aCWmax, 3, 0, 0 }; /* best effort traffic */
  105. const struct hostapd_wmm_ac_params ac_vi = /* video traffic */
  106. { aCWmin - 1, aCWmin, 2, 3008 / 32, 0 };
  107. const struct hostapd_wmm_ac_params ac_vo = /* voice traffic */
  108. { aCWmin - 2, aCWmin - 1, 2, 1504 / 32, 0 };
  109. const struct hostapd_tx_queue_params txq_bk =
  110. { 7, ecw2cw(aCWmin), ecw2cw(aCWmax), 0 };
  111. const struct hostapd_tx_queue_params txq_be =
  112. { 3, ecw2cw(aCWmin), 4 * (ecw2cw(aCWmin) + 1) - 1, 0};
  113. const struct hostapd_tx_queue_params txq_vi =
  114. { 1, (ecw2cw(aCWmin) + 1) / 2 - 1, ecw2cw(aCWmin), 30};
  115. const struct hostapd_tx_queue_params txq_vo =
  116. { 1, (ecw2cw(aCWmin) + 1) / 4 - 1,
  117. (ecw2cw(aCWmin) + 1) / 2 - 1, 15};
  118. #undef ecw2cw
  119. conf = os_zalloc(sizeof(*conf));
  120. bss = os_zalloc(sizeof(*bss));
  121. if (conf == NULL || bss == NULL) {
  122. wpa_printf(MSG_ERROR, "Failed to allocate memory for "
  123. "configuration data.");
  124. os_free(conf);
  125. os_free(bss);
  126. return NULL;
  127. }
  128. conf->bss = os_calloc(1, sizeof(struct hostapd_bss_config *));
  129. if (conf->bss == NULL) {
  130. os_free(conf);
  131. os_free(bss);
  132. return NULL;
  133. }
  134. conf->bss[0] = bss;
  135. bss->radius = os_zalloc(sizeof(*bss->radius));
  136. if (bss->radius == NULL) {
  137. os_free(conf->bss);
  138. os_free(conf);
  139. os_free(bss);
  140. return NULL;
  141. }
  142. hostapd_config_defaults_bss(bss);
  143. conf->num_bss = 1;
  144. conf->beacon_int = 100;
  145. conf->rts_threshold = -1; /* use driver default: 2347 */
  146. conf->fragm_threshold = -1; /* user driver default: 2346 */
  147. conf->send_probe_response = 1;
  148. /* Set to invalid value means do not add Power Constraint IE */
  149. conf->local_pwr_constraint = -1;
  150. conf->wmm_ac_params[0] = ac_be;
  151. conf->wmm_ac_params[1] = ac_bk;
  152. conf->wmm_ac_params[2] = ac_vi;
  153. conf->wmm_ac_params[3] = ac_vo;
  154. conf->tx_queue[0] = txq_vo;
  155. conf->tx_queue[1] = txq_vi;
  156. conf->tx_queue[2] = txq_be;
  157. conf->tx_queue[3] = txq_bk;
  158. conf->ht_capab = HT_CAP_INFO_SMPS_DISABLED;
  159. conf->ap_table_max_size = 255;
  160. conf->ap_table_expiration_time = 60;
  161. conf->track_sta_max_age = 180;
  162. #ifdef CONFIG_TESTING_OPTIONS
  163. conf->ignore_probe_probability = 0.0;
  164. conf->ignore_auth_probability = 0.0;
  165. conf->ignore_assoc_probability = 0.0;
  166. conf->ignore_reassoc_probability = 0.0;
  167. conf->corrupt_gtk_rekey_mic_probability = 0.0;
  168. conf->ecsa_ie_only = 0;
  169. #endif /* CONFIG_TESTING_OPTIONS */
  170. conf->acs = 0;
  171. conf->acs_ch_list.num = 0;
  172. #ifdef CONFIG_ACS
  173. conf->acs_num_scans = 5;
  174. #endif /* CONFIG_ACS */
  175. /* The third octet of the country string uses an ASCII space character
  176. * by default to indicate that the regulations encompass all
  177. * environments for the current frequency band in the country. */
  178. conf->country[2] = ' ';
  179. return conf;
  180. }
  181. int hostapd_mac_comp(const void *a, const void *b)
  182. {
  183. return os_memcmp(a, b, sizeof(macaddr));
  184. }
  185. static int hostapd_config_read_wpa_psk(const char *fname,
  186. struct hostapd_ssid *ssid)
  187. {
  188. FILE *f;
  189. char buf[128], *pos;
  190. int line = 0, ret = 0, len, ok;
  191. u8 addr[ETH_ALEN];
  192. struct hostapd_wpa_psk *psk;
  193. if (!fname)
  194. return 0;
  195. f = fopen(fname, "r");
  196. if (!f) {
  197. wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
  198. return -1;
  199. }
  200. while (fgets(buf, sizeof(buf), f)) {
  201. line++;
  202. if (buf[0] == '#')
  203. continue;
  204. pos = buf;
  205. while (*pos != '\0') {
  206. if (*pos == '\n') {
  207. *pos = '\0';
  208. break;
  209. }
  210. pos++;
  211. }
  212. if (buf[0] == '\0')
  213. continue;
  214. if (hwaddr_aton(buf, addr)) {
  215. wpa_printf(MSG_ERROR, "Invalid MAC address '%s' on "
  216. "line %d in '%s'", buf, line, fname);
  217. ret = -1;
  218. break;
  219. }
  220. psk = os_zalloc(sizeof(*psk));
  221. if (psk == NULL) {
  222. wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
  223. ret = -1;
  224. break;
  225. }
  226. if (is_zero_ether_addr(addr))
  227. psk->group = 1;
  228. else
  229. os_memcpy(psk->addr, addr, ETH_ALEN);
  230. pos = buf + 17;
  231. if (*pos == '\0') {
  232. wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
  233. line, fname);
  234. os_free(psk);
  235. ret = -1;
  236. break;
  237. }
  238. pos++;
  239. ok = 0;
  240. len = os_strlen(pos);
  241. if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
  242. ok = 1;
  243. else if (len >= 8 && len < 64) {
  244. pbkdf2_sha1(pos, ssid->ssid, ssid->ssid_len,
  245. 4096, psk->psk, PMK_LEN);
  246. ok = 1;
  247. }
  248. if (!ok) {
  249. wpa_printf(MSG_ERROR, "Invalid PSK '%s' on line %d in "
  250. "'%s'", pos, line, fname);
  251. os_free(psk);
  252. ret = -1;
  253. break;
  254. }
  255. psk->next = ssid->wpa_psk;
  256. ssid->wpa_psk = psk;
  257. }
  258. fclose(f);
  259. return ret;
  260. }
  261. static int hostapd_derive_psk(struct hostapd_ssid *ssid)
  262. {
  263. ssid->wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
  264. if (ssid->wpa_psk == NULL) {
  265. wpa_printf(MSG_ERROR, "Unable to alloc space for PSK");
  266. return -1;
  267. }
  268. wpa_hexdump_ascii(MSG_DEBUG, "SSID",
  269. (u8 *) ssid->ssid, ssid->ssid_len);
  270. wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)",
  271. (u8 *) ssid->wpa_passphrase,
  272. os_strlen(ssid->wpa_passphrase));
  273. pbkdf2_sha1(ssid->wpa_passphrase,
  274. ssid->ssid, ssid->ssid_len,
  275. 4096, ssid->wpa_psk->psk, PMK_LEN);
  276. wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)",
  277. ssid->wpa_psk->psk, PMK_LEN);
  278. return 0;
  279. }
  280. int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf)
  281. {
  282. struct hostapd_ssid *ssid = &conf->ssid;
  283. if (ssid->wpa_passphrase != NULL) {
  284. if (ssid->wpa_psk != NULL) {
  285. wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
  286. "instead of passphrase");
  287. } else {
  288. wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
  289. "passphrase");
  290. if (hostapd_derive_psk(ssid) < 0)
  291. return -1;
  292. }
  293. ssid->wpa_psk->group = 1;
  294. }
  295. return hostapd_config_read_wpa_psk(ssid->wpa_psk_file, &conf->ssid);
  296. }
  297. static void hostapd_config_free_radius(struct hostapd_radius_server *servers,
  298. int num_servers)
  299. {
  300. int i;
  301. for (i = 0; i < num_servers; i++) {
  302. os_free(servers[i].shared_secret);
  303. }
  304. os_free(servers);
  305. }
  306. struct hostapd_radius_attr *
  307. hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type)
  308. {
  309. for (; attr; attr = attr->next) {
  310. if (attr->type == type)
  311. return attr;
  312. }
  313. return NULL;
  314. }
  315. static void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr)
  316. {
  317. struct hostapd_radius_attr *prev;
  318. while (attr) {
  319. prev = attr;
  320. attr = attr->next;
  321. wpabuf_free(prev->val);
  322. os_free(prev);
  323. }
  324. }
  325. void hostapd_config_free_eap_user(struct hostapd_eap_user *user)
  326. {
  327. hostapd_config_free_radius_attr(user->accept_attr);
  328. os_free(user->identity);
  329. bin_clear_free(user->password, user->password_len);
  330. os_free(user);
  331. }
  332. void hostapd_config_free_eap_users(struct hostapd_eap_user *user)
  333. {
  334. struct hostapd_eap_user *prev_user;
  335. while (user) {
  336. prev_user = user;
  337. user = user->next;
  338. hostapd_config_free_eap_user(prev_user);
  339. }
  340. }
  341. static void hostapd_config_free_wep(struct hostapd_wep_keys *keys)
  342. {
  343. int i;
  344. for (i = 0; i < NUM_WEP_KEYS; i++) {
  345. bin_clear_free(keys->key[i], keys->len[i]);
  346. keys->key[i] = NULL;
  347. }
  348. }
  349. void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **l)
  350. {
  351. struct hostapd_wpa_psk *psk, *tmp;
  352. for (psk = *l; psk;) {
  353. tmp = psk;
  354. psk = psk->next;
  355. bin_clear_free(tmp, sizeof(*tmp));
  356. }
  357. *l = NULL;
  358. }
  359. static void hostapd_config_free_anqp_elem(struct hostapd_bss_config *conf)
  360. {
  361. struct anqp_element *elem;
  362. while ((elem = dl_list_first(&conf->anqp_elem, struct anqp_element,
  363. list))) {
  364. dl_list_del(&elem->list);
  365. wpabuf_free(elem->payload);
  366. os_free(elem);
  367. }
  368. }
  369. static void hostapd_config_free_fils_realms(struct hostapd_bss_config *conf)
  370. {
  371. #ifdef CONFIG_FILS
  372. struct fils_realm *realm;
  373. while ((realm = dl_list_first(&conf->fils_realms, struct fils_realm,
  374. list))) {
  375. dl_list_del(&realm->list);
  376. os_free(realm);
  377. }
  378. #endif /* CONFIG_FILS */
  379. }
  380. void hostapd_config_free_bss(struct hostapd_bss_config *conf)
  381. {
  382. if (conf == NULL)
  383. return;
  384. hostapd_config_clear_wpa_psk(&conf->ssid.wpa_psk);
  385. str_clear_free(conf->ssid.wpa_passphrase);
  386. os_free(conf->ssid.wpa_psk_file);
  387. hostapd_config_free_wep(&conf->ssid.wep);
  388. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  389. os_free(conf->ssid.vlan_tagged_interface);
  390. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  391. hostapd_config_free_eap_users(conf->eap_user);
  392. os_free(conf->eap_user_sqlite);
  393. os_free(conf->eap_req_id_text);
  394. os_free(conf->erp_domain);
  395. os_free(conf->accept_mac);
  396. os_free(conf->deny_mac);
  397. os_free(conf->nas_identifier);
  398. if (conf->radius) {
  399. hostapd_config_free_radius(conf->radius->auth_servers,
  400. conf->radius->num_auth_servers);
  401. hostapd_config_free_radius(conf->radius->acct_servers,
  402. conf->radius->num_acct_servers);
  403. }
  404. hostapd_config_free_radius_attr(conf->radius_auth_req_attr);
  405. hostapd_config_free_radius_attr(conf->radius_acct_req_attr);
  406. os_free(conf->rsn_preauth_interfaces);
  407. os_free(conf->ctrl_interface);
  408. os_free(conf->ca_cert);
  409. os_free(conf->server_cert);
  410. os_free(conf->private_key);
  411. os_free(conf->private_key_passwd);
  412. os_free(conf->ocsp_stapling_response);
  413. os_free(conf->ocsp_stapling_response_multi);
  414. os_free(conf->dh_file);
  415. os_free(conf->openssl_ciphers);
  416. os_free(conf->pac_opaque_encr_key);
  417. os_free(conf->eap_fast_a_id);
  418. os_free(conf->eap_fast_a_id_info);
  419. os_free(conf->eap_sim_db);
  420. os_free(conf->radius_server_clients);
  421. os_free(conf->radius);
  422. os_free(conf->radius_das_shared_secret);
  423. hostapd_config_free_vlan(conf);
  424. os_free(conf->time_zone);
  425. #ifdef CONFIG_IEEE80211R_AP
  426. {
  427. struct ft_remote_r0kh *r0kh, *r0kh_prev;
  428. struct ft_remote_r1kh *r1kh, *r1kh_prev;
  429. r0kh = conf->r0kh_list;
  430. conf->r0kh_list = NULL;
  431. while (r0kh) {
  432. r0kh_prev = r0kh;
  433. r0kh = r0kh->next;
  434. os_free(r0kh_prev);
  435. }
  436. r1kh = conf->r1kh_list;
  437. conf->r1kh_list = NULL;
  438. while (r1kh) {
  439. r1kh_prev = r1kh;
  440. r1kh = r1kh->next;
  441. os_free(r1kh_prev);
  442. }
  443. }
  444. #endif /* CONFIG_IEEE80211R_AP */
  445. #ifdef CONFIG_WPS
  446. os_free(conf->wps_pin_requests);
  447. os_free(conf->device_name);
  448. os_free(conf->manufacturer);
  449. os_free(conf->model_name);
  450. os_free(conf->model_number);
  451. os_free(conf->serial_number);
  452. os_free(conf->config_methods);
  453. os_free(conf->ap_pin);
  454. os_free(conf->extra_cred);
  455. os_free(conf->ap_settings);
  456. os_free(conf->upnp_iface);
  457. os_free(conf->friendly_name);
  458. os_free(conf->manufacturer_url);
  459. os_free(conf->model_description);
  460. os_free(conf->model_url);
  461. os_free(conf->upc);
  462. {
  463. unsigned int i;
  464. for (i = 0; i < MAX_WPS_VENDOR_EXTENSIONS; i++)
  465. wpabuf_free(conf->wps_vendor_ext[i]);
  466. }
  467. wpabuf_free(conf->wps_nfc_dh_pubkey);
  468. wpabuf_free(conf->wps_nfc_dh_privkey);
  469. wpabuf_free(conf->wps_nfc_dev_pw);
  470. #endif /* CONFIG_WPS */
  471. os_free(conf->roaming_consortium);
  472. os_free(conf->venue_name);
  473. os_free(conf->nai_realm_data);
  474. os_free(conf->network_auth_type);
  475. os_free(conf->anqp_3gpp_cell_net);
  476. os_free(conf->domain_name);
  477. hostapd_config_free_anqp_elem(conf);
  478. #ifdef CONFIG_RADIUS_TEST
  479. os_free(conf->dump_msk_file);
  480. #endif /* CONFIG_RADIUS_TEST */
  481. #ifdef CONFIG_HS20
  482. os_free(conf->hs20_oper_friendly_name);
  483. os_free(conf->hs20_wan_metrics);
  484. os_free(conf->hs20_connection_capability);
  485. os_free(conf->hs20_operating_class);
  486. os_free(conf->hs20_icons);
  487. if (conf->hs20_osu_providers) {
  488. size_t i;
  489. for (i = 0; i < conf->hs20_osu_providers_count; i++) {
  490. struct hs20_osu_provider *p;
  491. size_t j;
  492. p = &conf->hs20_osu_providers[i];
  493. os_free(p->friendly_name);
  494. os_free(p->server_uri);
  495. os_free(p->method_list);
  496. for (j = 0; j < p->icons_count; j++)
  497. os_free(p->icons[j]);
  498. os_free(p->icons);
  499. os_free(p->osu_nai);
  500. os_free(p->service_desc);
  501. }
  502. os_free(conf->hs20_osu_providers);
  503. }
  504. os_free(conf->subscr_remediation_url);
  505. #endif /* CONFIG_HS20 */
  506. wpabuf_free(conf->vendor_elements);
  507. wpabuf_free(conf->assocresp_elements);
  508. os_free(conf->sae_groups);
  509. os_free(conf->wowlan_triggers);
  510. os_free(conf->server_id);
  511. #ifdef CONFIG_TESTING_OPTIONS
  512. wpabuf_free(conf->own_ie_override);
  513. #endif /* CONFIG_TESTING_OPTIONS */
  514. os_free(conf->no_probe_resp_if_seen_on);
  515. os_free(conf->no_auth_if_seen_on);
  516. hostapd_config_free_fils_realms(conf);
  517. #ifdef CONFIG_DPP
  518. os_free(conf->dpp_connector);
  519. wpabuf_free(conf->dpp_netaccesskey);
  520. wpabuf_free(conf->dpp_csign);
  521. #endif /* CONFIG_DPP */
  522. os_free(conf);
  523. }
  524. /**
  525. * hostapd_config_free - Free hostapd configuration
  526. * @conf: Configuration data from hostapd_config_read().
  527. */
  528. void hostapd_config_free(struct hostapd_config *conf)
  529. {
  530. size_t i;
  531. if (conf == NULL)
  532. return;
  533. for (i = 0; i < conf->num_bss; i++)
  534. hostapd_config_free_bss(conf->bss[i]);
  535. os_free(conf->bss);
  536. os_free(conf->supported_rates);
  537. os_free(conf->basic_rates);
  538. os_free(conf->acs_ch_list.range);
  539. os_free(conf->driver_params);
  540. #ifdef CONFIG_ACS
  541. os_free(conf->acs_chan_bias);
  542. #endif /* CONFIG_ACS */
  543. wpabuf_free(conf->lci);
  544. wpabuf_free(conf->civic);
  545. os_free(conf);
  546. }
  547. /**
  548. * hostapd_maclist_found - Find a MAC address from a list
  549. * @list: MAC address list
  550. * @num_entries: Number of addresses in the list
  551. * @addr: Address to search for
  552. * @vlan_id: Buffer for returning VLAN ID or %NULL if not needed
  553. * Returns: 1 if address is in the list or 0 if not.
  554. *
  555. * Perform a binary search for given MAC address from a pre-sorted list.
  556. */
  557. int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
  558. const u8 *addr, struct vlan_description *vlan_id)
  559. {
  560. int start, end, middle, res;
  561. start = 0;
  562. end = num_entries - 1;
  563. while (start <= end) {
  564. middle = (start + end) / 2;
  565. res = os_memcmp(list[middle].addr, addr, ETH_ALEN);
  566. if (res == 0) {
  567. if (vlan_id)
  568. *vlan_id = list[middle].vlan_id;
  569. return 1;
  570. }
  571. if (res < 0)
  572. start = middle + 1;
  573. else
  574. end = middle - 1;
  575. }
  576. return 0;
  577. }
  578. int hostapd_rate_found(int *list, int rate)
  579. {
  580. int i;
  581. if (list == NULL)
  582. return 0;
  583. for (i = 0; list[i] >= 0; i++)
  584. if (list[i] == rate)
  585. return 1;
  586. return 0;
  587. }
  588. int hostapd_vlan_valid(struct hostapd_vlan *vlan,
  589. struct vlan_description *vlan_desc)
  590. {
  591. struct hostapd_vlan *v = vlan;
  592. int i;
  593. if (!vlan_desc->notempty || vlan_desc->untagged < 0 ||
  594. vlan_desc->untagged > MAX_VLAN_ID)
  595. return 0;
  596. for (i = 0; i < MAX_NUM_TAGGED_VLAN; i++) {
  597. if (vlan_desc->tagged[i] < 0 ||
  598. vlan_desc->tagged[i] > MAX_VLAN_ID)
  599. return 0;
  600. }
  601. if (!vlan_desc->untagged && !vlan_desc->tagged[0])
  602. return 0;
  603. while (v) {
  604. if (!vlan_compare(&v->vlan_desc, vlan_desc) ||
  605. v->vlan_id == VLAN_ID_WILDCARD)
  606. return 1;
  607. v = v->next;
  608. }
  609. return 0;
  610. }
  611. const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan, int vlan_id)
  612. {
  613. struct hostapd_vlan *v = vlan;
  614. while (v) {
  615. if (v->vlan_id == vlan_id)
  616. return v->ifname;
  617. v = v->next;
  618. }
  619. return NULL;
  620. }
  621. const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
  622. const u8 *addr, const u8 *p2p_dev_addr,
  623. const u8 *prev_psk)
  624. {
  625. struct hostapd_wpa_psk *psk;
  626. int next_ok = prev_psk == NULL;
  627. if (p2p_dev_addr && !is_zero_ether_addr(p2p_dev_addr)) {
  628. wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
  629. " p2p_dev_addr=" MACSTR " prev_psk=%p",
  630. MAC2STR(addr), MAC2STR(p2p_dev_addr), prev_psk);
  631. addr = NULL; /* Use P2P Device Address for matching */
  632. } else {
  633. wpa_printf(MSG_DEBUG, "Searching a PSK for " MACSTR
  634. " prev_psk=%p",
  635. MAC2STR(addr), prev_psk);
  636. }
  637. for (psk = conf->ssid.wpa_psk; psk != NULL; psk = psk->next) {
  638. if (next_ok &&
  639. (psk->group ||
  640. (addr && os_memcmp(psk->addr, addr, ETH_ALEN) == 0) ||
  641. (!addr && p2p_dev_addr &&
  642. os_memcmp(psk->p2p_dev_addr, p2p_dev_addr, ETH_ALEN) ==
  643. 0)))
  644. return psk->psk;
  645. if (psk->psk == prev_psk)
  646. next_ok = 1;
  647. }
  648. return NULL;
  649. }
  650. static int hostapd_config_check_bss(struct hostapd_bss_config *bss,
  651. struct hostapd_config *conf,
  652. int full_config)
  653. {
  654. if (full_config && bss->ieee802_1x && !bss->eap_server &&
  655. !bss->radius->auth_servers) {
  656. wpa_printf(MSG_ERROR, "Invalid IEEE 802.1X configuration (no "
  657. "EAP authenticator configured).");
  658. return -1;
  659. }
  660. if (bss->wpa) {
  661. int wep, i;
  662. wep = bss->default_wep_key_len > 0 ||
  663. bss->individual_wep_key_len > 0;
  664. for (i = 0; i < NUM_WEP_KEYS; i++) {
  665. if (bss->ssid.wep.keys_set) {
  666. wep = 1;
  667. break;
  668. }
  669. }
  670. if (wep) {
  671. wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported");
  672. return -1;
  673. }
  674. }
  675. if (full_config && bss->wpa &&
  676. bss->wpa_psk_radius != PSK_RADIUS_IGNORED &&
  677. bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH) {
  678. wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no "
  679. "RADIUS checking (macaddr_acl=2) enabled.");
  680. return -1;
  681. }
  682. if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) &&
  683. bss->ssid.wpa_psk == NULL && bss->ssid.wpa_passphrase == NULL &&
  684. bss->ssid.wpa_psk_file == NULL &&
  685. (bss->wpa_psk_radius != PSK_RADIUS_REQUIRED ||
  686. bss->macaddr_acl != USE_EXTERNAL_RADIUS_AUTH)) {
  687. wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
  688. "is not configured.");
  689. return -1;
  690. }
  691. if (full_config && !is_zero_ether_addr(bss->bssid)) {
  692. size_t i;
  693. for (i = 0; i < conf->num_bss; i++) {
  694. if (conf->bss[i] != bss &&
  695. (hostapd_mac_comp(conf->bss[i]->bssid,
  696. bss->bssid) == 0)) {
  697. wpa_printf(MSG_ERROR, "Duplicate BSSID " MACSTR
  698. " on interface '%s' and '%s'.",
  699. MAC2STR(bss->bssid),
  700. conf->bss[i]->iface, bss->iface);
  701. return -1;
  702. }
  703. }
  704. }
  705. #ifdef CONFIG_IEEE80211R_AP
  706. if (full_config && wpa_key_mgmt_ft(bss->wpa_key_mgmt) &&
  707. (bss->nas_identifier == NULL ||
  708. os_strlen(bss->nas_identifier) < 1 ||
  709. os_strlen(bss->nas_identifier) > FT_R0KH_ID_MAX_LEN)) {
  710. wpa_printf(MSG_ERROR, "FT (IEEE 802.11r) requires "
  711. "nas_identifier to be configured as a 1..48 octet "
  712. "string");
  713. return -1;
  714. }
  715. #endif /* CONFIG_IEEE80211R_AP */
  716. #ifdef CONFIG_IEEE80211N
  717. if (full_config && conf->ieee80211n &&
  718. conf->hw_mode == HOSTAPD_MODE_IEEE80211B) {
  719. bss->disable_11n = 1;
  720. wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) in 11b mode is not "
  721. "allowed, disabling HT capabilities");
  722. }
  723. if (full_config && conf->ieee80211n &&
  724. bss->ssid.security_policy == SECURITY_STATIC_WEP) {
  725. bss->disable_11n = 1;
  726. wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WEP is not "
  727. "allowed, disabling HT capabilities");
  728. }
  729. if (full_config && conf->ieee80211n && bss->wpa &&
  730. !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
  731. !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
  732. WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
  733. {
  734. bss->disable_11n = 1;
  735. wpa_printf(MSG_ERROR, "HT (IEEE 802.11n) with WPA/WPA2 "
  736. "requires CCMP/GCMP to be enabled, disabling HT "
  737. "capabilities");
  738. }
  739. #endif /* CONFIG_IEEE80211N */
  740. #ifdef CONFIG_IEEE80211AC
  741. if (full_config && conf->ieee80211ac &&
  742. bss->ssid.security_policy == SECURITY_STATIC_WEP) {
  743. bss->disable_11ac = 1;
  744. wpa_printf(MSG_ERROR,
  745. "VHT (IEEE 802.11ac) with WEP is not allowed, disabling VHT capabilities");
  746. }
  747. if (full_config && conf->ieee80211ac && bss->wpa &&
  748. !(bss->wpa_pairwise & WPA_CIPHER_CCMP) &&
  749. !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
  750. WPA_CIPHER_CCMP_256 | WPA_CIPHER_GCMP_256)))
  751. {
  752. bss->disable_11ac = 1;
  753. wpa_printf(MSG_ERROR,
  754. "VHT (IEEE 802.11ac) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling VHT capabilities");
  755. }
  756. #endif /* CONFIG_IEEE80211AC */
  757. #ifdef CONFIG_WPS
  758. if (full_config && bss->wps_state && bss->ignore_broadcast_ssid) {
  759. wpa_printf(MSG_INFO, "WPS: ignore_broadcast_ssid "
  760. "configuration forced WPS to be disabled");
  761. bss->wps_state = 0;
  762. }
  763. if (full_config && bss->wps_state &&
  764. bss->ssid.wep.keys_set && bss->wpa == 0) {
  765. wpa_printf(MSG_INFO, "WPS: WEP configuration forced WPS to be "
  766. "disabled");
  767. bss->wps_state = 0;
  768. }
  769. if (full_config && bss->wps_state && bss->wpa &&
  770. (!(bss->wpa & 2) ||
  771. !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)))) {
  772. wpa_printf(MSG_INFO, "WPS: WPA/TKIP configuration without "
  773. "WPA2/CCMP/GCMP forced WPS to be disabled");
  774. bss->wps_state = 0;
  775. }
  776. #endif /* CONFIG_WPS */
  777. #ifdef CONFIG_HS20
  778. if (full_config && bss->hs20 &&
  779. (!(bss->wpa & 2) ||
  780. !(bss->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP |
  781. WPA_CIPHER_CCMP_256 |
  782. WPA_CIPHER_GCMP_256)))) {
  783. wpa_printf(MSG_ERROR, "HS 2.0: WPA2-Enterprise/CCMP "
  784. "configuration is required for Hotspot 2.0 "
  785. "functionality");
  786. return -1;
  787. }
  788. #endif /* CONFIG_HS20 */
  789. #ifdef CONFIG_MBO
  790. if (full_config && bss->mbo_enabled && (bss->wpa & 2) &&
  791. bss->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
  792. wpa_printf(MSG_ERROR,
  793. "MBO: PMF needs to be enabled whenever using WPA2 with MBO");
  794. return -1;
  795. }
  796. #endif /* CONFIG_MBO */
  797. return 0;
  798. }
  799. static int hostapd_config_check_cw(struct hostapd_config *conf, int queue)
  800. {
  801. int tx_cwmin = conf->tx_queue[queue].cwmin;
  802. int tx_cwmax = conf->tx_queue[queue].cwmax;
  803. int ac_cwmin = conf->wmm_ac_params[queue].cwmin;
  804. int ac_cwmax = conf->wmm_ac_params[queue].cwmax;
  805. if (tx_cwmin > tx_cwmax) {
  806. wpa_printf(MSG_ERROR,
  807. "Invalid TX queue cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
  808. tx_cwmin, tx_cwmax);
  809. return -1;
  810. }
  811. if (ac_cwmin > ac_cwmax) {
  812. wpa_printf(MSG_ERROR,
  813. "Invalid WMM AC cwMin/cwMax values. cwMin(%d) greater than cwMax(%d)",
  814. ac_cwmin, ac_cwmax);
  815. return -1;
  816. }
  817. return 0;
  818. }
  819. int hostapd_config_check(struct hostapd_config *conf, int full_config)
  820. {
  821. size_t i;
  822. if (full_config && conf->ieee80211d &&
  823. (!conf->country[0] || !conf->country[1])) {
  824. wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11d without "
  825. "setting the country_code");
  826. return -1;
  827. }
  828. if (full_config && conf->ieee80211h && !conf->ieee80211d) {
  829. wpa_printf(MSG_ERROR, "Cannot enable IEEE 802.11h without "
  830. "IEEE 802.11d enabled");
  831. return -1;
  832. }
  833. if (full_config && conf->local_pwr_constraint != -1 &&
  834. !conf->ieee80211d) {
  835. wpa_printf(MSG_ERROR, "Cannot add Power Constraint element without Country element");
  836. return -1;
  837. }
  838. if (full_config && conf->spectrum_mgmt_required &&
  839. conf->local_pwr_constraint == -1) {
  840. wpa_printf(MSG_ERROR, "Cannot set Spectrum Management bit without Country and Power Constraint elements");
  841. return -1;
  842. }
  843. for (i = 0; i < NUM_TX_QUEUES; i++) {
  844. if (hostapd_config_check_cw(conf, i))
  845. return -1;
  846. }
  847. for (i = 0; i < conf->num_bss; i++) {
  848. if (hostapd_config_check_bss(conf->bss[i], conf, full_config))
  849. return -1;
  850. }
  851. return 0;
  852. }
  853. void hostapd_set_security_params(struct hostapd_bss_config *bss,
  854. int full_config)
  855. {
  856. if (bss->individual_wep_key_len == 0) {
  857. /* individual keys are not use; can use key idx0 for
  858. * broadcast keys */
  859. bss->broadcast_key_idx_min = 0;
  860. }
  861. if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
  862. bss->rsn_pairwise = bss->wpa_pairwise;
  863. bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise,
  864. bss->rsn_pairwise);
  865. if (!bss->wpa_group_rekey_set)
  866. bss->wpa_group_rekey = bss->wpa_group == WPA_CIPHER_TKIP ?
  867. 600 : 86400;
  868. if (full_config) {
  869. bss->radius->auth_server = bss->radius->auth_servers;
  870. bss->radius->acct_server = bss->radius->acct_servers;
  871. }
  872. if (bss->wpa && bss->ieee802_1x) {
  873. bss->ssid.security_policy = SECURITY_WPA;
  874. } else if (bss->wpa) {
  875. bss->ssid.security_policy = SECURITY_WPA_PSK;
  876. } else if (bss->ieee802_1x) {
  877. int cipher = WPA_CIPHER_NONE;
  878. bss->ssid.security_policy = SECURITY_IEEE_802_1X;
  879. bss->ssid.wep.default_len = bss->default_wep_key_len;
  880. if (full_config && bss->default_wep_key_len) {
  881. cipher = bss->default_wep_key_len >= 13 ?
  882. WPA_CIPHER_WEP104 : WPA_CIPHER_WEP40;
  883. } else if (full_config && bss->ssid.wep.keys_set) {
  884. if (bss->ssid.wep.len[0] >= 13)
  885. cipher = WPA_CIPHER_WEP104;
  886. else
  887. cipher = WPA_CIPHER_WEP40;
  888. }
  889. bss->wpa_group = cipher;
  890. bss->wpa_pairwise = cipher;
  891. bss->rsn_pairwise = cipher;
  892. if (full_config)
  893. bss->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA;
  894. } else if (bss->ssid.wep.keys_set) {
  895. int cipher = WPA_CIPHER_WEP40;
  896. if (bss->ssid.wep.len[0] >= 13)
  897. cipher = WPA_CIPHER_WEP104;
  898. bss->ssid.security_policy = SECURITY_STATIC_WEP;
  899. bss->wpa_group = cipher;
  900. bss->wpa_pairwise = cipher;
  901. bss->rsn_pairwise = cipher;
  902. if (full_config)
  903. bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
  904. } else if (bss->osen) {
  905. bss->ssid.security_policy = SECURITY_OSEN;
  906. bss->wpa_group = WPA_CIPHER_CCMP;
  907. bss->wpa_pairwise = 0;
  908. bss->rsn_pairwise = WPA_CIPHER_CCMP;
  909. } else {
  910. bss->ssid.security_policy = SECURITY_PLAINTEXT;
  911. if (full_config) {
  912. bss->wpa_group = WPA_CIPHER_NONE;
  913. bss->wpa_pairwise = WPA_CIPHER_NONE;
  914. bss->rsn_pairwise = WPA_CIPHER_NONE;
  915. bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
  916. }
  917. }
  918. }