1  /*
2   * hostapd / Configuration definitions and helpers functions
3   * Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi>
4   *
5   * This software may be distributed under the terms of the BSD license.
6   * See README for more details.
7   */
8  
9  #ifndef HOSTAPD_CONFIG_H
10  #define HOSTAPD_CONFIG_H
11  
12  #include "common/defs.h"
13  #include "utils/list.h"
14  #include "ip_addr.h"
15  #include "common/wpa_common.h"
16  #include "common/ieee802_11_defs.h"
17  #include "common/ieee802_11_common.h"
18  #include "crypto/sha256.h"
19  #include "wps/wps.h"
20  #include "fst/fst.h"
21  #include "vlan.h"
22  
23  enum macaddr_acl {
24  	ACCEPT_UNLESS_DENIED = 0,
25  	DENY_UNLESS_ACCEPTED = 1,
26  	USE_EXTERNAL_RADIUS_AUTH = 2
27  };
28  
29  /**
30   * mesh_conf - local MBSS state and settings
31   */
32  struct mesh_conf {
33  	u8 meshid[32];
34  	u8 meshid_len;
35  	/* Active Path Selection Protocol Identifier */
36  	u8 mesh_pp_id;
37  	/* Active Path Selection Metric Identifier */
38  	u8 mesh_pm_id;
39  	/* Congestion Control Mode Identifier */
40  	u8 mesh_cc_id;
41  	/* Synchronization Protocol Identifier */
42  	u8 mesh_sp_id;
43  	/* Authentication Protocol Identifier */
44  	u8 mesh_auth_id;
45  	u8 *rsn_ie;
46  	int rsn_ie_len;
47  #define MESH_CONF_SEC_NONE BIT(0)
48  #define MESH_CONF_SEC_AUTH BIT(1)
49  #define MESH_CONF_SEC_AMPE BIT(2)
50  	unsigned int security;
51  	enum mfp_options ieee80211w;
52  	int ocv;
53  	unsigned int pairwise_cipher;
54  	unsigned int group_cipher;
55  	unsigned int mgmt_group_cipher;
56  	int dot11MeshMaxRetries;
57  	int dot11MeshRetryTimeout; /* msec */
58  	int dot11MeshConfirmTimeout; /* msec */
59  	int dot11MeshHoldingTimeout; /* msec */
60  	int mesh_fwding;
61  };
62  
63  #define MAX_STA_COUNT 2007
64  #define MAX_VLAN_ID 4094
65  
66  typedef u8 macaddr[ETH_ALEN];
67  
68  struct mac_acl_entry {
69  	macaddr addr;
70  	struct vlan_description vlan_id;
71  };
72  
73  struct hostapd_radius_servers;
74  struct ft_remote_r0kh;
75  struct ft_remote_r1kh;
76  
77  #ifdef CONFIG_WEP
78  #define NUM_WEP_KEYS 4
79  struct hostapd_wep_keys {
80  	u8 idx;
81  	u8 *key[NUM_WEP_KEYS];
82  	size_t len[NUM_WEP_KEYS];
83  	int keys_set;
84  	size_t default_len; /* key length used for dynamic key generation */
85  };
86  #endif /* CONFIG_WEP */
87  
88  typedef enum hostap_security_policy {
89  	SECURITY_PLAINTEXT = 0,
90  #ifdef CONFIG_WEP
91  	SECURITY_STATIC_WEP = 1,
92  #endif /* CONFIG_WEP */
93  	SECURITY_IEEE_802_1X = 2,
94  	SECURITY_WPA_PSK = 3,
95  	SECURITY_WPA = 4,
96  } secpolicy;
97  
98  struct hostapd_ssid {
99  	u8 ssid[SSID_MAX_LEN];
100  	size_t ssid_len;
101  	u32 short_ssid;
102  	unsigned int ssid_set:1;
103  	unsigned int utf8_ssid:1;
104  	unsigned int wpa_passphrase_set:1;
105  	unsigned int wpa_psk_set:1;
106  
107  	char vlan[IFNAMSIZ + 1];
108  	secpolicy security_policy;
109  
110  	struct hostapd_wpa_psk *wpa_psk;
111  	char *wpa_passphrase;
112  	char *wpa_psk_file;
113  	struct sae_pt *pt;
114  
115  #ifdef CONFIG_WEP
116  	struct hostapd_wep_keys wep;
117  #endif /* CONFIG_WEP */
118  
119  #define DYNAMIC_VLAN_DISABLED 0
120  #define DYNAMIC_VLAN_OPTIONAL 1
121  #define DYNAMIC_VLAN_REQUIRED 2
122  	int dynamic_vlan;
123  #define DYNAMIC_VLAN_NAMING_WITHOUT_DEVICE 0
124  #define DYNAMIC_VLAN_NAMING_WITH_DEVICE 1
125  #define DYNAMIC_VLAN_NAMING_END 2
126  	int vlan_naming;
127  	int per_sta_vif;
128  #ifdef CONFIG_FULL_DYNAMIC_VLAN
129  	char *vlan_tagged_interface;
130  #endif /* CONFIG_FULL_DYNAMIC_VLAN */
131  };
132  
133  
134  #define VLAN_ID_WILDCARD -1
135  
136  struct hostapd_vlan {
137  	struct hostapd_vlan *next;
138  	int vlan_id; /* VLAN ID or -1 (VLAN_ID_WILDCARD) for wildcard entry */
139  	struct vlan_description vlan_desc;
140  	char ifname[IFNAMSIZ + 1];
141  	char bridge[IFNAMSIZ + 1];
142  	int configured;
143  	int dynamic_vlan;
144  #ifdef CONFIG_FULL_DYNAMIC_VLAN
145  
146  #define DVLAN_CLEAN_WLAN_PORT	0x8
147  	int clean;
148  #endif /* CONFIG_FULL_DYNAMIC_VLAN */
149  };
150  
151  #define PMK_LEN 32
152  #define KEYID_LEN 32
153  #define MIN_PASSPHRASE_LEN 8
154  #define MAX_PASSPHRASE_LEN 63
155  struct hostapd_sta_wpa_psk_short {
156  	struct hostapd_sta_wpa_psk_short *next;
157  	unsigned int is_passphrase:1;
158  	u8 psk[PMK_LEN];
159  	char passphrase[MAX_PASSPHRASE_LEN + 1];
160  	int ref; /* (number of references held) - 1 */
161  };
162  
163  struct hostapd_wpa_psk {
164  	struct hostapd_wpa_psk *next;
165  	int group;
166  	char keyid[KEYID_LEN];
167  	int wps;
168  	u8 psk[PMK_LEN];
169  	u8 addr[ETH_ALEN];
170  	u8 p2p_dev_addr[ETH_ALEN];
171  	int vlan_id;
172  };
173  
174  struct hostapd_eap_user {
175  	struct hostapd_eap_user *next;
176  	u8 *identity;
177  	size_t identity_len;
178  	struct {
179  		int vendor;
180  		u32 method;
181  	} methods[EAP_MAX_METHODS];
182  	u8 *password;
183  	size_t password_len;
184  	u8 *salt;
185  	size_t salt_len; /* non-zero when password is salted */
186  	int phase2;
187  	int force_version;
188  	unsigned int wildcard_prefix:1;
189  	unsigned int password_hash:1; /* whether password is hashed with
190  				       * nt_password_hash() */
191  	unsigned int macacl:1;
192  	int ttls_auth; /* EAP_TTLS_AUTH_* bitfield */
193  	struct hostapd_radius_attr *accept_attr;
194  	u32 t_c_timestamp;
195  };
196  
197  struct hostapd_radius_attr {
198  	u8 type;
199  	struct wpabuf *val;
200  	struct hostapd_radius_attr *next;
201  };
202  
203  
204  #define NUM_TX_QUEUES 4
205  #define MAX_ROAMING_CONSORTIUM_LEN 15
206  
207  struct hostapd_roaming_consortium {
208  	u8 len;
209  	u8 oi[MAX_ROAMING_CONSORTIUM_LEN];
210  };
211  
212  struct hostapd_lang_string {
213  	u8 lang[3];
214  	u8 name_len;
215  	u8 name[252];
216  };
217  
218  struct hostapd_venue_url {
219  	u8 venue_number;
220  	u8 url_len;
221  	u8 url[254];
222  };
223  
224  #define MAX_NAI_REALMS 10
225  #define MAX_NAI_REALMLEN 255
226  #define MAX_NAI_EAP_METHODS 5
227  #define MAX_NAI_AUTH_TYPES 4
228  struct hostapd_nai_realm_data {
229  	u8 encoding;
230  	char realm_buf[MAX_NAI_REALMLEN + 1];
231  	char *realm[MAX_NAI_REALMS];
232  	u8 eap_method_count;
233  	struct hostapd_nai_realm_eap {
234  		u8 eap_method;
235  		u8 num_auths;
236  		u8 auth_id[MAX_NAI_AUTH_TYPES];
237  		u8 auth_val[MAX_NAI_AUTH_TYPES];
238  	} eap_method[MAX_NAI_EAP_METHODS];
239  };
240  
241  struct anqp_element {
242  	struct dl_list list;
243  	u16 infoid;
244  	struct wpabuf *payload;
245  };
246  
247  struct fils_realm {
248  	struct dl_list list;
249  	u8 hash[2];
250  	char realm[];
251  };
252  
253  struct sae_password_entry {
254  	struct sae_password_entry *next;
255  	char *password;
256  	char *identifier;
257  	u8 peer_addr[ETH_ALEN];
258  	int vlan_id;
259  	struct sae_pt *pt;
260  	struct sae_pk *pk;
261  	u8 *success_mac;
262  	unsigned int num_success_mac, next_success_mac;
263  	u8 *fail_mac;
264  	unsigned int num_fail_mac, next_fail_mac;
265  };
266  
267  struct dpp_controller_conf {
268  	struct dpp_controller_conf *next;
269  	u8 pkhash[SHA256_MAC_LEN];
270  	struct hostapd_ip_addr ipaddr;
271  };
272  
273  struct airtime_sta_weight {
274  	struct airtime_sta_weight *next;
275  	unsigned int weight;
276  	u8 addr[ETH_ALEN];
277  };
278  
279  #define EXT_CAPA_MAX_LEN 15
280  
281  /**
282   * struct hostapd_bss_config - Per-BSS configuration
283   */
284  struct hostapd_bss_config {
285  	char iface[IFNAMSIZ + 1];
286  	char bridge[IFNAMSIZ + 1];
287  	char vlan_bridge[IFNAMSIZ + 1];
288  	char wds_bridge[IFNAMSIZ + 1];
289  	int bridge_hairpin; /* hairpin_mode on bridge members */
290  
291  	enum hostapd_logger_level logger_syslog_level, logger_stdout_level;
292  
293  	unsigned int logger_syslog; /* module bitfield */
294  	unsigned int logger_stdout; /* module bitfield */
295  
296  	int max_num_sta; /* maximum number of STAs in station table */
297  
298  	int dtim_period;
299  	unsigned int bss_load_update_period;
300  	unsigned int chan_util_avg_period;
301  
302  	int ieee802_1x; /* use IEEE 802.1X */
303  	int eapol_version;
304  	int eap_server; /* Use internal EAP server instead of external
305  			 * RADIUS server */
306  	struct hostapd_eap_user *eap_user;
307  	char *eap_user_sqlite;
308  	char *eap_sim_db;
309  	unsigned int eap_sim_db_timeout;
310  	int eap_server_erp; /* Whether ERP is enabled on internal EAP server */
311  	struct hostapd_ip_addr own_ip_addr;
312  	char *nas_identifier;
313  	struct hostapd_radius_servers *radius;
314  	int radius_require_message_authenticator;
315  	int acct_interim_interval;
316  	int radius_request_cui;
317  	struct hostapd_radius_attr *radius_auth_req_attr;
318  	struct hostapd_radius_attr *radius_acct_req_attr;
319  	char *radius_req_attr_sqlite;
320  	int radius_das_port;
321  	unsigned int radius_das_time_window;
322  	int radius_das_require_event_timestamp;
323  	int radius_das_require_message_authenticator;
324  	struct hostapd_ip_addr radius_das_client_addr;
325  	u8 *radius_das_shared_secret;
326  	size_t radius_das_shared_secret_len;
327  
328  	struct hostapd_ssid ssid;
329  
330  	char *eap_req_id_text; /* optional displayable message sent with
331  				* EAP Request-Identity */
332  	size_t eap_req_id_text_len;
333  	int eapol_key_index_workaround;
334  
335  #ifdef CONFIG_WEP
336  	size_t default_wep_key_len;
337  	int individual_wep_key_len;
338  	int wep_rekeying_period;
339  	int broadcast_key_idx_min, broadcast_key_idx_max;
340  #endif /* CONFIG_WEP */
341  	int eap_reauth_period;
342  	int erp_send_reauth_start;
343  	char *erp_domain;
344  #ifdef CONFIG_TESTING_OPTIONS
345  	bool eap_skip_prot_success;
346  #endif /* CONFIG_TESTING_OPTIONS */
347  
348  	enum macaddr_acl macaddr_acl;
349  	struct mac_acl_entry *accept_mac;
350  	int num_accept_mac;
351  	struct mac_acl_entry *deny_mac;
352  	int num_deny_mac;
353  	int wds_sta;
354  	int isolate;
355  	int start_disabled;
356  
357  	int auth_algs; /* bitfield of allowed IEEE 802.11 authentication
358  			* algorithms, WPA_AUTH_ALG_{OPEN,SHARED,LEAP} */
359  
360  	int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */
361  	int extended_key_id;
362  	int wpa_key_mgmt;
363  	int rsn_override_key_mgmt;
364  	int rsn_override_key_mgmt_2;
365  	enum mfp_options ieee80211w;
366  	enum mfp_options rsn_override_mfp;
367  	enum mfp_options rsn_override_mfp_2;
368  	int group_mgmt_cipher;
369  	int beacon_prot;
370  	/* dot11AssociationSAQueryMaximumTimeout (in TUs) */
371  	unsigned int assoc_sa_query_max_timeout;
372  	/* dot11AssociationSAQueryRetryTimeout (in TUs) */
373  	int assoc_sa_query_retry_timeout;
374  #ifdef CONFIG_OCV
375  	int ocv; /* Operating Channel Validation */
376  #endif /* CONFIG_OCV */
377  	enum {
378  		PSK_RADIUS_IGNORED = 0,
379  		PSK_RADIUS_ACCEPTED = 1,
380  		PSK_RADIUS_REQUIRED = 2,
381  		PSK_RADIUS_DURING_4WAY_HS = 3,
382  	} wpa_psk_radius;
383  	int wpa_pairwise;
384  	int group_cipher; /* wpa_group value override from configuation */
385  	int wpa_group;
386  	int wpa_group_rekey;
387  	int wpa_group_rekey_set;
388  	int wpa_strict_rekey;
389  	int wpa_gmk_rekey;
390  	int wpa_ptk_rekey;
391  	enum ptk0_rekey_handling wpa_deny_ptk0_rekey;
392  	u32 wpa_group_update_count;
393  	u32 wpa_pairwise_update_count;
394  	int wpa_disable_eapol_key_retries;
395  	int rsn_pairwise;
396  	int rsn_override_pairwise;
397  	int rsn_override_pairwise_2;
398  	int rsn_preauth;
399  	char *rsn_preauth_interfaces;
400  
401  	int rsn_override_omit_rsnxe;
402  
403  #ifdef CONFIG_IEEE80211R_AP
404  	/* IEEE 802.11r - Fast BSS Transition */
405  	u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
406  	u8 r1_key_holder[FT_R1KH_ID_LEN];
407  	u32 r0_key_lifetime; /* PMK-R0 lifetime seconds */
408  	int rkh_pos_timeout;
409  	int rkh_neg_timeout;
410  	int rkh_pull_timeout; /* ms */
411  	int rkh_pull_retries;
412  	u32 reassociation_deadline;
413  	struct ft_remote_r0kh *r0kh_list;
414  	struct ft_remote_r1kh *r1kh_list;
415  	int pmk_r1_push;
416  	int ft_over_ds;
417  	int ft_psk_generate_local;
418  	int r1_max_key_lifetime;
419  	char *rxkh_file;
420  #endif /* CONFIG_IEEE80211R_AP */
421  
422  	char *ctrl_interface; /* directory for UNIX domain sockets */
423  #ifndef CONFIG_NATIVE_WINDOWS
424  	gid_t ctrl_interface_gid;
425  #endif /* CONFIG_NATIVE_WINDOWS */
426  	int ctrl_interface_gid_set;
427  
428  	char *ca_cert;
429  	char *server_cert;
430  	char *server_cert2;
431  	char *private_key;
432  	char *private_key2;
433  	char *private_key_passwd;
434  	char *private_key_passwd2;
435  	char *check_cert_subject;
436  	int check_crl;
437  	int check_crl_strict;
438  	unsigned int crl_reload_interval;
439  	unsigned int tls_session_lifetime;
440  	unsigned int tls_flags;
441  	unsigned int max_auth_rounds;
442  	unsigned int max_auth_rounds_short;
443  	char *ocsp_stapling_response;
444  	char *ocsp_stapling_response_multi;
445  	char *dh_file;
446  	char *openssl_ciphers;
447  	char *openssl_ecdh_curves;
448  	u8 *pac_opaque_encr_key;
449  	u8 *eap_fast_a_id;
450  	size_t eap_fast_a_id_len;
451  	char *eap_fast_a_id_info;
452  	int eap_fast_prov;
453  	int pac_key_lifetime;
454  	int pac_key_refresh_time;
455  	int eap_teap_auth;
456  	int eap_teap_separate_result;
457  	int eap_teap_id;
458  	int eap_teap_method_sequence;
459  	int eap_sim_aka_result_ind;
460  	int eap_sim_id;
461  	char *imsi_privacy_key;
462  	int eap_sim_aka_fast_reauth_limit;
463  	int tnc;
464  	int fragment_size;
465  	u16 pwd_group;
466  
467  	char *radius_server_clients;
468  	int radius_server_auth_port;
469  	int radius_server_acct_port;
470  	int radius_server_acct_log;
471  	int radius_server_ipv6;
472  
473  	int use_pae_group_addr; /* Whether to send EAPOL frames to PAE group
474  				 * address instead of individual address
475  				 * (for driver_wired.c).
476  				 */
477  
478  	int ap_max_inactivity;
479  	int bss_max_idle;
480  	int max_acceptable_idle_period;
481  	bool no_disconnect_on_group_keyerror;
482  	int ignore_broadcast_ssid;
483  	int no_probe_resp_if_max_sta;
484  
485  	int wmm_enabled;
486  	int wmm_uapsd;
487  
488  	struct hostapd_vlan *vlan;
489  
490  	macaddr bssid;
491  
492  	/*
493  	 * Maximum listen interval that STAs can use when associating with this
494  	 * BSS. If a STA tries to use larger value, the association will be
495  	 * denied with status code 51.
496  	 */
497  	u16 max_listen_interval;
498  
499  	int disable_pmksa_caching;
500  	int okc; /* Opportunistic Key Caching */
501  
502  	int wps_state;
503  #ifdef CONFIG_WPS
504  	int wps_independent;
505  	int ap_setup_locked;
506  	u8 uuid[16];
507  	char *wps_pin_requests;
508  	char *device_name;
509  	char *manufacturer;
510  	char *model_name;
511  	char *model_number;
512  	char *serial_number;
513  	u8 device_type[WPS_DEV_TYPE_LEN];
514  	char *config_methods;
515  	u8 os_version[4];
516  	char *ap_pin;
517  	int skip_cred_build;
518  	u8 *extra_cred;
519  	size_t extra_cred_len;
520  	int wps_cred_processing;
521  	int wps_cred_add_sae;
522  	int force_per_enrollee_psk;
523  	u8 *ap_settings;
524  	size_t ap_settings_len;
525  	struct hostapd_ssid multi_ap_backhaul_ssid;
526  	char *upnp_iface;
527  	char *friendly_name;
528  	char *manufacturer_url;
529  	char *model_description;
530  	char *model_url;
531  	char *upc;
532  	struct wpabuf *wps_vendor_ext[MAX_WPS_VENDOR_EXTENSIONS];
533  	struct wpabuf *wps_application_ext;
534  	int wps_nfc_pw_from_config;
535  	int wps_nfc_dev_pw_id;
536  	struct wpabuf *wps_nfc_dh_pubkey;
537  	struct wpabuf *wps_nfc_dh_privkey;
538  	struct wpabuf *wps_nfc_dev_pw;
539  #endif /* CONFIG_WPS */
540  	int pbc_in_m1;
541  	char *server_id;
542  
543  #define P2P_ENABLED BIT(0)
544  #define P2P_GROUP_OWNER BIT(1)
545  #define P2P_GROUP_FORMATION BIT(2)
546  #define P2P_MANAGE BIT(3)
547  #define P2P_ALLOW_CROSS_CONNECTION BIT(4)
548  	int p2p;
549  #ifdef CONFIG_P2P
550  	u8 ip_addr_go[4];
551  	u8 ip_addr_mask[4];
552  	u8 ip_addr_start[4];
553  	u8 ip_addr_end[4];
554  #endif /* CONFIG_P2P */
555  
556  	int disassoc_low_ack;
557  	int skip_inactivity_poll;
558  
559  #define TDLS_PROHIBIT BIT(0)
560  #define TDLS_PROHIBIT_CHAN_SWITCH BIT(1)
561  	int tdls;
562  	bool disable_11n;
563  	bool disable_11ac;
564  	bool disable_11ax;
565  	bool disable_11be;
566  
567  	/* IEEE 802.11v */
568  	int time_advertisement;
569  	char *time_zone;
570  	int wnm_sleep_mode;
571  	int wnm_sleep_mode_no_keys;
572  	int bss_transition;
573  
574  	/* IEEE 802.11u - Interworking */
575  	int interworking;
576  	int access_network_type;
577  	int internet;
578  	int asra;
579  	int esr;
580  	int uesa;
581  	int venue_info_set;
582  	u8 venue_group;
583  	u8 venue_type;
584  	u8 hessid[ETH_ALEN];
585  
586  	/* IEEE 802.11u - Roaming Consortium list */
587  	unsigned int roaming_consortium_count;
588  	struct hostapd_roaming_consortium *roaming_consortium;
589  
590  	/* IEEE 802.11u - Venue Name duples */
591  	unsigned int venue_name_count;
592  	struct hostapd_lang_string *venue_name;
593  
594  	/* Venue URL duples */
595  	unsigned int venue_url_count;
596  	struct hostapd_venue_url *venue_url;
597  
598  	/* IEEE 802.11u - Network Authentication Type */
599  	u8 *network_auth_type;
600  	size_t network_auth_type_len;
601  
602  	/* IEEE 802.11u - IP Address Type Availability */
603  	u8 ipaddr_type_availability;
604  	u8 ipaddr_type_configured;
605  
606  	/* IEEE 802.11u - 3GPP Cellular Network */
607  	u8 *anqp_3gpp_cell_net;
608  	size_t anqp_3gpp_cell_net_len;
609  
610  	/* IEEE 802.11u - Domain Name */
611  	u8 *domain_name;
612  	size_t domain_name_len;
613  
614  	unsigned int nai_realm_count;
615  	struct hostapd_nai_realm_data *nai_realm_data;
616  
617  	struct dl_list anqp_elem; /* list of struct anqp_element */
618  
619  	u16 gas_comeback_delay;
620  	size_t gas_frag_limit;
621  	int gas_address3;
622  
623  	u8 qos_map_set[16 + 2 * 21];
624  	unsigned int qos_map_set_len;
625  
626  	int proxy_arp;
627  	int na_mcast_to_ucast;
628  
629  #ifdef CONFIG_HS20
630  	int hs20;
631  	int hs20_release;
632  	int disable_dgaf;
633  	u16 anqp_domain_id;
634  	unsigned int hs20_oper_friendly_name_count;
635  	struct hostapd_lang_string *hs20_oper_friendly_name;
636  	u8 *hs20_wan_metrics;
637  	u8 *hs20_connection_capability;
638  	size_t hs20_connection_capability_len;
639  	u8 *hs20_operating_class;
640  	u8 hs20_operating_class_len;
641  	unsigned int hs20_deauth_req_timeout;
642  	char *t_c_filename;
643  	u32 t_c_timestamp;
644  	char *t_c_server_url;
645  #endif /* CONFIG_HS20 */
646  
647  	u8 wps_rf_bands; /* RF bands for WPS (WPS_RF_*) */
648  
649  #ifdef CONFIG_RADIUS_TEST
650  	char *dump_msk_file;
651  #endif /* CONFIG_RADIUS_TEST */
652  
653  	struct wpabuf *vendor_elements;
654  	struct wpabuf *assocresp_elements;
655  
656  	unsigned int anti_clogging_threshold;
657  	unsigned int sae_sync;
658  	int sae_require_mfp;
659  	int sae_confirm_immediate;
660  	enum sae_pwe sae_pwe;
661  	int *sae_groups;
662  	struct sae_password_entry *sae_passwords;
663  	int sae_track_password;
664  
665  	char *wowlan_triggers; /* Wake-on-WLAN triggers */
666  
667  #ifdef CONFIG_TESTING_OPTIONS
668  	u8 bss_load_test[5];
669  	u8 bss_load_test_set;
670  	struct wpabuf *own_ie_override;
671  	struct wpabuf *rsne_override;
672  	struct wpabuf *rsnoe_override;
673  	struct wpabuf *rsno2e_override;
674  	struct wpabuf *rsnxe_override;
675  	struct wpabuf *rsnxoe_override;
676  	int sae_reflection_attack;
677  	int sae_commit_status;
678  	int sae_pk_omit;
679  	int sae_pk_password_check_skip;
680  	struct wpabuf *sae_commit_override;
681  	struct wpabuf *rsne_override_eapol;
682  	struct wpabuf *rsnxe_override_eapol;
683  	struct wpabuf *rsne_override_ft;
684  	struct wpabuf *rsnxe_override_ft;
685  	struct wpabuf *gtk_rsc_override;
686  	struct wpabuf *igtk_rsc_override;
687  	int no_beacon_rsnxe;
688  	int skip_prune_assoc;
689  	int ft_rsnxe_used;
690  	unsigned int oci_freq_override_eapol_m3;
691  	unsigned int oci_freq_override_eapol_g1;
692  	unsigned int oci_freq_override_saquery_req;
693  	unsigned int oci_freq_override_saquery_resp;
694  	unsigned int oci_freq_override_ft_assoc;
695  	unsigned int oci_freq_override_fils_assoc;
696  	unsigned int oci_freq_override_wnm_sleep;
697  	struct wpabuf *eapol_m1_elements;
698  	struct wpabuf *eapol_m3_elements;
699  	bool eapol_m3_no_encrypt;
700  	bool eapol_key_reserved_random;
701  	int test_assoc_comeback_type;
702  	struct wpabuf *presp_elements;
703  
704  #ifdef CONFIG_IEEE80211BE
705  	u16 eht_oper_puncturing_override;
706  #endif /* CONFIG_IEEE80211BE */
707  #endif /* CONFIG_TESTING_OPTIONS */
708  
709  #define MESH_ENABLED BIT(0)
710  	int mesh;
711  	int mesh_fwding;
712  
713  	u8 radio_measurements[RRM_CAPABILITIES_IE_LEN];
714  
715  	int vendor_vht;
716  	int use_sta_nsts;
717  
718  	char *no_probe_resp_if_seen_on;
719  	char *no_auth_if_seen_on;
720  
721  	int pbss;
722  
723  #ifdef CONFIG_MBO
724  	int mbo_enabled;
725  	/**
726  	 * oce - Enable OCE in AP and/or STA-CFON mode
727  	 *  - BIT(0) is Reserved
728  	 *  - Set BIT(1) to enable OCE in STA-CFON mode
729  	 *  - Set BIT(2) to enable OCE in AP mode
730  	 */
731  	unsigned int oce;
732  	int mbo_cell_data_conn_pref;
733  #endif /* CONFIG_MBO */
734  
735  	int ftm_responder;
736  	int ftm_initiator;
737  
738  #ifdef CONFIG_FILS
739  	u8 fils_cache_id[FILS_CACHE_ID_LEN];
740  	int fils_cache_id_set;
741  	struct dl_list fils_realms; /* list of struct fils_realm */
742  	int fils_dh_group;
743  	struct hostapd_ip_addr dhcp_server;
744  	int dhcp_rapid_commit_proxy;
745  	unsigned int fils_hlp_wait_time;
746  	u16 dhcp_server_port;
747  	u16 dhcp_relay_port;
748  	u32 fils_discovery_min_int;
749  	u32 fils_discovery_max_int;
750  #endif /* CONFIG_FILS */
751  
752  	int multicast_to_unicast;
753  	int bridge_multicast_to_unicast;
754  
755  	int broadcast_deauth;
756  
757  	int notify_mgmt_frames;
758  
759  #ifdef CONFIG_DPP
760  	char *dpp_name;
761  	char *dpp_mud_url;
762  	char *dpp_extra_conf_req_name;
763  	char *dpp_extra_conf_req_value;
764  	char *dpp_connector;
765  	struct wpabuf *dpp_netaccesskey;
766  	unsigned int dpp_netaccesskey_expiry;
767  	struct wpabuf *dpp_csign;
768  #ifdef CONFIG_DPP2
769  	struct dpp_controller_conf *dpp_controller;
770  	int dpp_relay_port;
771  	int dpp_configurator_connectivity;
772  	int dpp_pfs;
773  #endif /* CONFIG_DPP2 */
774  #endif /* CONFIG_DPP */
775  
776  #ifdef CONFIG_OWE
777  	macaddr owe_transition_bssid;
778  	u8 owe_transition_ssid[SSID_MAX_LEN];
779  	size_t owe_transition_ssid_len;
780  	char owe_transition_ifname[IFNAMSIZ + 1];
781  	int *owe_groups;
782  	int owe_ptk_workaround;
783  #endif /* CONFIG_OWE */
784  
785  	int coloc_intf_reporting;
786  
787  	u8 send_probe_response;
788  
789  	u8 transition_disable;
790  
791  #define BACKHAUL_BSS 1
792  #define FRONTHAUL_BSS 2
793  	int multi_ap; /* bitmap of BACKHAUL_BSS, FRONTHAUL_BSS */
794  	int multi_ap_profile;
795  	/* Multi-AP Profile-1 clients not allowed to connect */
796  #define PROFILE1_CLIENT_ASSOC_DISALLOW BIT(0)
797  	/* Multi-AP Profile-2 clients not allowed to connect */
798  #define PROFILE2_CLIENT_ASSOC_DISALLOW BIT(1)
799  	unsigned int multi_ap_client_disallow;
800  	/* Primary VLAN ID to use in Multi-AP */
801  	int multi_ap_vlanid;
802  
803  #ifdef CONFIG_AIRTIME_POLICY
804  	unsigned int airtime_weight;
805  	int airtime_limit;
806  	struct airtime_sta_weight *airtime_weight_list;
807  #endif /* CONFIG_AIRTIME_POLICY */
808  
809  #ifdef CONFIG_MACSEC
810  	/**
811  	 * macsec_policy - Determines the policy for MACsec secure session
812  	 *
813  	 * 0: MACsec not in use (default)
814  	 * 1: MACsec enabled - Should secure, accept key server's advice to
815  	 *    determine whether to use a secure session or not.
816  	 */
817  	int macsec_policy;
818  
819  	/**
820  	 * macsec_integ_only - Determines how MACsec are transmitted
821  	 *
822  	 * This setting applies only when MACsec is in use, i.e.,
823  	 *  - macsec_policy is enabled
824  	 *  - the key server has decided to enable MACsec
825  	 *
826  	 * 0: Encrypt traffic (default)
827  	 * 1: Integrity only
828  	 */
829  	int macsec_integ_only;
830  
831  	/**
832  	 * macsec_replay_protect - Enable MACsec replay protection
833  	 *
834  	 * This setting applies only when MACsec is in use, i.e.,
835  	 *  - macsec_policy is enabled
836  	 *  - the key server has decided to enable MACsec
837  	 *
838  	 * 0: Replay protection disabled (default)
839  	 * 1: Replay protection enabled
840  	 */
841  	int macsec_replay_protect;
842  
843  	/**
844  	 * macsec_replay_window - MACsec replay protection window
845  	 *
846  	 * A window in which replay is tolerated, to allow receipt of frames
847  	 * that have been misordered by the network.
848  	 *
849  	 * This setting applies only when MACsec replay protection active, i.e.,
850  	 *  - macsec_replay_protect is enabled
851  	 *  - the key server has decided to enable MACsec
852  	 *
853  	 * 0: No replay window, strict check (default)
854  	 * 1..2^32-1: number of packets that could be misordered
855  	 */
856  	u32 macsec_replay_window;
857  
858  	/**
859  	 * macsec_offload - Enable MACsec offload
860  	 *
861  	 * This setting applies only when MACsec is in use, i.e.,
862  	 *  - macsec_policy is enabled
863  	 *  - the key server has decided to enable MACsec
864  	 *
865  	 * 0 = MACSEC_OFFLOAD_OFF (default)
866  	 * 1 = MACSEC_OFFLOAD_PHY
867  	 * 2 = MACSEC_OFFLOAD_MAC
868  	 */
869  	int macsec_offload;
870  
871  	/**
872  	 * macsec_port - MACsec port (in SCI)
873  	 *
874  	 * Port component of the SCI.
875  	 *
876  	 * Range: 1-65534 (default: 1)
877  	 */
878  	int macsec_port;
879  
880  	/**
881  	 * mka_priority - Priority of MKA Actor
882  	 *
883  	 * Range: 0-255 (default: 255)
884  	 */
885  	int mka_priority;
886  
887  	/**
888  	 * macsec_csindex - Cipher suite index for MACsec
889  	 *
890  	 * Range: 0-1 (default: 0)
891  	 */
892  	int macsec_csindex;
893  
894  	/**
895  	 * macsec_icv_indicator - Always include ICV Indicator
896  	 * (for compatibility with older MACsec switches)
897  	 *
898  	 * Range: 0-1 (default: 0)
899  	 */
900  	int macsec_icv_indicator;
901  
902  	/**
903  	 * mka_ckn - MKA pre-shared CKN
904  	 */
905  #define MACSEC_CKN_MAX_LEN 32
906  	size_t mka_ckn_len;
907  	u8 mka_ckn[MACSEC_CKN_MAX_LEN];
908  
909  	/**
910  	 * mka_cak - MKA pre-shared CAK
911  	 */
912  #define MACSEC_CAK_MAX_LEN 32
913  	size_t mka_cak_len;
914  	u8 mka_cak[MACSEC_CAK_MAX_LEN];
915  
916  #define MKA_PSK_SET_CKN BIT(0)
917  #define MKA_PSK_SET_CAK BIT(1)
918  #define MKA_PSK_SET (MKA_PSK_SET_CKN | MKA_PSK_SET_CAK)
919  	/**
920  	 * mka_psk_set - Whether mka_ckn and mka_cak are set
921  	 */
922  	u8 mka_psk_set;
923  #endif /* CONFIG_MACSEC */
924  
925  #ifdef CONFIG_PASN
926  	/* Whether to allow PASN-UNAUTH */
927  	int pasn_noauth;
928  
929  #ifdef CONFIG_TESTING_OPTIONS
930  	/*
931  	 * Normally, KDK should be derived if and only if both sides support
932  	 * secure LTF. Allow forcing KDK derivation for testing purposes.
933  	 */
934  	int force_kdk_derivation;
935  
936  	/* If set, corrupt the MIC in the 2nd Authentication frame of PASN */
937  	int pasn_corrupt_mic;
938  #endif /* CONFIG_TESTING_OPTIONS */
939  
940  	int *pasn_groups;
941  
942  	/*
943  	 * The time in TUs after which the non-AP STA is requested to retry the
944  	 * PASN authentication in case there are too many parallel operations.
945  	 */
946  	u16 pasn_comeback_after;
947  #endif /* CONFIG_PASN */
948  
949  	unsigned int unsol_bcast_probe_resp_interval;
950  
951  	u8 ext_capa_mask[EXT_CAPA_MAX_LEN];
952  	u8 ext_capa[EXT_CAPA_MAX_LEN];
953  
954  	u8 rnr;
955  	char *config_id;
956  
957  	bool ssid_protection;
958  	bool known_sta_identification;
959  
960  #ifdef CONFIG_IEEE80211BE
961  	/* The AP is part of an AP MLD */
962  	u8 mld_ap;
963  
964  	/* The MLD ID to which the AP MLD is affiliated with */
965  	u8 mld_id;
966  
967  	/* The AP's MLD MAC address within the AP MLD */
968  	u8 mld_addr[ETH_ALEN];
969  
970  #ifdef CONFIG_TESTING_OPTIONS
971  	/*
972  	 * If set indicate the AP as disabled in the RNR element included in the
973  	 * other APs in the AP MLD.
974  	 */
975  	bool mld_indicate_disabled;
976  #endif /* CONFIG_TESTING_OPTIONS */
977  #endif /* CONFIG_IEEE80211BE */
978  	int mbssid_index;
979  
980  	bool spp_amsdu;
981  };
982  
983  /**
984   * struct he_phy_capabilities_info - HE PHY capabilities
985   */
986  struct he_phy_capabilities_info {
987  	bool he_su_beamformer;
988  	bool he_su_beamformee;
989  	bool he_mu_beamformer;
990  };
991  
992  /**
993   * struct he_operation - HE operation
994   */
995  struct he_operation {
996  	u8 he_bss_color;
997  	u8 he_bss_color_disabled;
998  	u8 he_bss_color_partial;
999  	u8 he_default_pe_duration;
1000  	u8 he_twt_required;
1001  	u8 he_twt_responder;
1002  	u16 he_rts_threshold;
1003  	u8 he_er_su_disable;
1004  	u16 he_basic_mcs_nss_set;
1005  };
1006  
1007  /**
1008   * struct spatial_reuse - Spatial reuse
1009   */
1010  struct spatial_reuse {
1011  	u8 sr_control;
1012  	u8 non_srg_obss_pd_max_offset;
1013  	u8 srg_obss_pd_min_offset;
1014  	u8 srg_obss_pd_max_offset;
1015  	u8 srg_bss_color_bitmap[8];
1016  	u8 srg_partial_bssid_bitmap[8];
1017  };
1018  
1019  /**
1020   * struct eht_phy_capabilities_info - EHT PHY capabilities
1021   */
1022  struct eht_phy_capabilities_info {
1023  	bool su_beamformer;
1024  	bool su_beamformee;
1025  	bool mu_beamformer;
1026  };
1027  
1028  /**
1029   * struct hostapd_config - Per-radio interface configuration
1030   */
1031  struct hostapd_config {
1032  	struct hostapd_bss_config **bss, *last_bss;
1033  	size_t num_bss;
1034  
1035  	u16 beacon_int;
1036  	int rts_threshold;
1037  	int fragm_threshold;
1038  	u8 op_class;
1039  	u8 channel;
1040  	int enable_edmg;
1041  	u8 edmg_channel;
1042  	u8 acs;
1043  	struct wpa_freq_range_list acs_ch_list;
1044  	struct wpa_freq_range_list acs_freq_list;
1045  	u8 acs_freq_list_present;
1046  	int acs_exclude_dfs;
1047  	u8 min_tx_power;
1048  	enum hostapd_hw_mode hw_mode; /* HOSTAPD_MODE_IEEE80211A, .. */
1049  	bool hw_mode_set;
1050  	int acs_exclude_6ghz_non_psc;
1051  	int enable_background_radar;
1052  	enum {
1053  		LONG_PREAMBLE = 0,
1054  		SHORT_PREAMBLE = 1
1055  	} preamble;
1056  
1057  	int *supported_rates;
1058  	int *basic_rates;
1059  	unsigned int beacon_rate;
1060  	enum beacon_rate_type rate_type;
1061  
1062  	const struct wpa_driver_ops *driver;
1063  	char *driver_params;
1064  
1065  	int ap_table_max_size;
1066  	int ap_table_expiration_time;
1067  
1068  	unsigned int track_sta_max_num;
1069  	unsigned int track_sta_max_age;
1070  
1071  	char country[3]; /* first two octets: country code as described in
1072  			  * ISO/IEC 3166-1. Third octet:
1073  			  * ' ' (ascii 32): all environments
1074  			  * 'O': Outdoor environemnt only
1075  			  * 'I': Indoor environment only
1076  			  * 'X': Used with noncountry entity ("XXX")
1077  			  * 0x00..0x31: identifying IEEE 802.11 standard
1078  			  *	Annex E table (0x04 = global table)
1079  			  */
1080  
1081  	int ieee80211d;
1082  
1083  	int ieee80211h; /* DFS */
1084  
1085  	/*
1086  	 * Local power constraint is an octet encoded as an unsigned integer in
1087  	 * units of decibels. Invalid value -1 indicates that Power Constraint
1088  	 * element will not be added.
1089  	 */
1090  	int local_pwr_constraint;
1091  
1092  	/* Control Spectrum Management bit */
1093  	int spectrum_mgmt_required;
1094  
1095  	struct hostapd_tx_queue_params tx_queue[NUM_TX_QUEUES];
1096  
1097  	/*
1098  	 * WMM AC parameters, in same order as 802.1D, i.e.
1099  	 * 0 = BE (best effort)
1100  	 * 1 = BK (background)
1101  	 * 2 = VI (video)
1102  	 * 3 = VO (voice)
1103  	 */
1104  	struct hostapd_wmm_ac_params wmm_ac_params[4];
1105  
1106  	int ht_op_mode_fixed;
1107  	u16 ht_capab;
1108  	int ieee80211n;
1109  	int secondary_channel;
1110  	int no_pri_sec_switch;
1111  	int require_ht;
1112  	int obss_interval;
1113  	u32 vht_capab;
1114  	int ieee80211ac;
1115  	int require_vht;
1116  	enum oper_chan_width vht_oper_chwidth;
1117  	u8 vht_oper_centr_freq_seg0_idx;
1118  	u8 vht_oper_centr_freq_seg1_idx;
1119  	u8 ht40_plus_minus_allowed;
1120  
1121  	/* Use driver-generated interface addresses when adding multiple BSSs */
1122  	u8 use_driver_iface_addr;
1123  
1124  #ifdef CONFIG_FST
1125  	struct fst_iface_cfg fst_cfg;
1126  #endif /* CONFIG_FST */
1127  
1128  #ifdef CONFIG_P2P
1129  	u8 p2p_go_ctwindow;
1130  #endif /* CONFIG_P2P */
1131  
1132  #ifdef CONFIG_TESTING_OPTIONS
1133  	double ignore_probe_probability;
1134  	double ignore_auth_probability;
1135  	double ignore_assoc_probability;
1136  	double ignore_reassoc_probability;
1137  	double corrupt_gtk_rekey_mic_probability;
1138  	int ecsa_ie_only;
1139  	int csa_ie_only;
1140  	bool delay_eapol_tx;
1141  #endif /* CONFIG_TESTING_OPTIONS */
1142  
1143  #ifdef CONFIG_ACS
1144  	unsigned int acs_num_scans;
1145  	struct acs_bias {
1146  		int channel;
1147  		double bias;
1148  	} *acs_chan_bias;
1149  	unsigned int num_acs_chan_bias;
1150  #endif /* CONFIG_ACS */
1151  
1152  	struct wpabuf *lci;
1153  	struct wpabuf *civic;
1154  	int stationary_ap;
1155  
1156  	int ieee80211ax;
1157  #ifdef CONFIG_IEEE80211AX
1158  	struct he_phy_capabilities_info he_phy_capab;
1159  	struct he_operation he_op;
1160  	struct ieee80211_he_mu_edca_parameter_set he_mu_edca;
1161  	struct spatial_reuse spr;
1162  	enum oper_chan_width he_oper_chwidth;
1163  	u8 he_oper_centr_freq_seg0_idx;
1164  	u8 he_oper_centr_freq_seg1_idx;
1165  	u8 he_6ghz_max_mpdu;
1166  	u8 he_6ghz_max_ampdu_len_exp;
1167  	u8 he_6ghz_rx_ant_pat;
1168  	u8 he_6ghz_tx_ant_pat;
1169  	u8 he_6ghz_reg_pwr_type;
1170  
1171  	int reg_def_cli_eirp_psd;
1172  	int reg_sub_cli_eirp_psd;
1173  
1174  	/*
1175  	 * This value should be used when regulatory client EIRP PSD values
1176  	 * advertised by an AP that is an SP AP or an indoor SP AP are
1177  	 * insufficient to ensure that regulatory client limits on total EIRP
1178  	 * are always met for all transmission bandwidths within the bandwidth
1179  	 * of the AP’s BSS.
1180  	 */
1181  	int reg_def_cli_eirp;
1182  
1183  	bool require_he;
1184  #endif /* CONFIG_IEEE80211AX */
1185  
1186  	/* VHT enable/disable config from CHAN_SWITCH */
1187  #define CH_SWITCH_VHT_ENABLED BIT(0)
1188  #define CH_SWITCH_VHT_DISABLED BIT(1)
1189  	unsigned int ch_switch_vht_config;
1190  
1191  	/* HE enable/disable config from CHAN_SWITCH */
1192  #define CH_SWITCH_HE_ENABLED BIT(0)
1193  #define CH_SWITCH_HE_DISABLED BIT(1)
1194  	unsigned int ch_switch_he_config;
1195  
1196  	int rssi_reject_assoc_rssi;
1197  	int rssi_reject_assoc_timeout;
1198  	int rssi_ignore_probe_request;
1199  
1200  #ifdef CONFIG_AIRTIME_POLICY
1201  	enum {
1202  		AIRTIME_MODE_OFF = 0,
1203  		AIRTIME_MODE_STATIC = 1,
1204  		AIRTIME_MODE_DYNAMIC = 2,
1205  		AIRTIME_MODE_LIMIT = 3,
1206  		__AIRTIME_MODE_MAX,
1207  	} airtime_mode;
1208  	unsigned int airtime_update_interval;
1209  #define AIRTIME_MODE_MAX (__AIRTIME_MODE_MAX - 1)
1210  #endif /* CONFIG_AIRTIME_POLICY */
1211  
1212  	int ieee80211be;
1213  #ifdef CONFIG_IEEE80211BE
1214  	enum oper_chan_width eht_oper_chwidth;
1215  	u8 eht_oper_centr_freq_seg0_idx;
1216  	struct eht_phy_capabilities_info eht_phy_capab;
1217  	u16 punct_bitmap; /* a bitmap of disabled 20 MHz channels */
1218  	u8 punct_acs_threshold;
1219  	u8 eht_default_pe_duration;
1220  	u8 eht_bw320_offset;
1221  #endif /* CONFIG_IEEE80211BE */
1222  
1223  	/* EHT enable/disable config from CHAN_SWITCH */
1224  #define CH_SWITCH_EHT_ENABLED BIT(0)
1225  #define CH_SWITCH_EHT_DISABLED BIT(1)
1226  	unsigned int ch_switch_eht_config;
1227  
1228  	enum mbssid {
1229  		MBSSID_DISABLED = 0,
1230  		MBSSID_ENABLED = 1,
1231  		ENHANCED_MBSSID_ENABLED = 2,
1232  	} mbssid;
1233  	unsigned int mbssid_max;
1234  
1235  	/* Whether to enable TWT responder in HT and VHT modes */
1236  	bool ht_vht_twt_responder;
1237  
1238  	bool channel_usage;
1239  	bool peer_to_peer_twt;
1240  };
1241  
1242  
1243  static inline enum oper_chan_width
hostapd_get_oper_chwidth(struct hostapd_config * conf)1244  hostapd_get_oper_chwidth(struct hostapd_config *conf)
1245  {
1246  #ifdef CONFIG_IEEE80211BE
1247  	if (conf->ieee80211be)
1248  		return conf->eht_oper_chwidth;
1249  #endif /* CONFIG_IEEE80211BE */
1250  #ifdef CONFIG_IEEE80211AX
1251  	if (conf->ieee80211ax)
1252  		return conf->he_oper_chwidth;
1253  #endif /* CONFIG_IEEE80211AX */
1254  	return conf->vht_oper_chwidth;
1255  }
1256  
1257  static inline void
hostapd_set_oper_chwidth(struct hostapd_config * conf,enum oper_chan_width oper_chwidth)1258  hostapd_set_oper_chwidth(struct hostapd_config *conf,
1259  			 enum oper_chan_width oper_chwidth)
1260  {
1261  #ifdef CONFIG_IEEE80211BE
1262  	if (conf->ieee80211be)
1263  		conf->eht_oper_chwidth = oper_chwidth;
1264  	if (oper_chwidth == CONF_OPER_CHWIDTH_320MHZ)
1265  		oper_chwidth = CONF_OPER_CHWIDTH_160MHZ;
1266  #endif /* CONFIG_IEEE80211BE */
1267  #ifdef CONFIG_IEEE80211AX
1268  	if (conf->ieee80211ax)
1269  		conf->he_oper_chwidth = oper_chwidth;
1270  #endif /* CONFIG_IEEE80211AX */
1271  	conf->vht_oper_chwidth = oper_chwidth;
1272  }
1273  
1274  static inline u8
hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config * conf)1275  hostapd_get_oper_centr_freq_seg0_idx(struct hostapd_config *conf)
1276  {
1277  #ifdef CONFIG_IEEE80211BE
1278  	if (conf->ieee80211be)
1279  		return conf->eht_oper_centr_freq_seg0_idx;
1280  #endif /* CONFIG_IEEE80211BE */
1281  #ifdef CONFIG_IEEE80211AX
1282  	if (conf->ieee80211ax)
1283  		return conf->he_oper_centr_freq_seg0_idx;
1284  #endif /* CONFIG_IEEE80211AX */
1285  	return conf->vht_oper_centr_freq_seg0_idx;
1286  }
1287  
1288  static inline void
hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config * conf,u8 oper_centr_freq_seg0_idx)1289  hostapd_set_oper_centr_freq_seg0_idx(struct hostapd_config *conf,
1290  				     u8 oper_centr_freq_seg0_idx)
1291  {
1292  #ifdef CONFIG_IEEE80211BE
1293  	if (conf->ieee80211be)
1294  		conf->eht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
1295  	if (is_6ghz_op_class(conf->op_class) &&
1296  	    center_idx_to_bw_6ghz(oper_centr_freq_seg0_idx) == 4)
1297  		oper_centr_freq_seg0_idx +=
1298  			conf->channel > oper_centr_freq_seg0_idx ? 16 : -16;
1299  #endif /* CONFIG_IEEE80211BE */
1300  #ifdef CONFIG_IEEE80211AX
1301  	if (conf->ieee80211ax)
1302  		conf->he_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
1303  #endif /* CONFIG_IEEE80211AX */
1304  	conf->vht_oper_centr_freq_seg0_idx = oper_centr_freq_seg0_idx;
1305  }
1306  
1307  static inline u8
hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config * conf)1308  hostapd_get_oper_centr_freq_seg1_idx(struct hostapd_config *conf)
1309  {
1310  #ifdef CONFIG_IEEE80211AX
1311  	if (conf->ieee80211ax)
1312  		return conf->he_oper_centr_freq_seg1_idx;
1313  #endif /* CONFIG_IEEE80211AX */
1314  	return conf->vht_oper_centr_freq_seg1_idx;
1315  }
1316  
1317  static inline void
hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config * conf,u8 oper_centr_freq_seg1_idx)1318  hostapd_set_oper_centr_freq_seg1_idx(struct hostapd_config *conf,
1319  				     u8 oper_centr_freq_seg1_idx)
1320  {
1321  #ifdef CONFIG_IEEE80211AX
1322  	if (conf->ieee80211ax)
1323  		conf->he_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
1324  #endif /* CONFIG_IEEE80211AX */
1325  	conf->vht_oper_centr_freq_seg1_idx = oper_centr_freq_seg1_idx;
1326  }
1327  
1328  static inline u8
hostapd_get_bw320_offset(struct hostapd_config * conf)1329  hostapd_get_bw320_offset(struct hostapd_config *conf)
1330  {
1331  #ifdef CONFIG_IEEE80211BE
1332  	if (conf->ieee80211be && is_6ghz_op_class(conf->op_class) &&
1333  	    hostapd_get_oper_chwidth(conf) == CONF_OPER_CHWIDTH_320MHZ)
1334  		return conf->eht_bw320_offset;
1335  #endif /* CONFIG_IEEE80211BE */
1336  	return 0;
1337  }
1338  
1339  static inline void
hostapd_set_and_check_bw320_offset(struct hostapd_config * conf,u8 bw320_offset)1340  hostapd_set_and_check_bw320_offset(struct hostapd_config *conf,
1341  				   u8 bw320_offset)
1342  {
1343  #ifdef CONFIG_IEEE80211BE
1344  	if (conf->ieee80211be && is_6ghz_op_class(conf->op_class) &&
1345  	    op_class_to_ch_width(conf->op_class) == CONF_OPER_CHWIDTH_320MHZ) {
1346  		if (conf->channel) {
1347  			/* If the channel is set, then calculate bw320_offset
1348  			 * by center frequency segment 0.
1349  			 */
1350  			u8 seg0 = hostapd_get_oper_centr_freq_seg0_idx(conf);
1351  
1352  			conf->eht_bw320_offset = (seg0 - 31) % 64 ? 2 : 1;
1353  		} else {
1354  			/* If the channel is not set, bw320_offset indicates
1355  			 * preferred offset of 320 MHz.
1356  			 */
1357  			conf->eht_bw320_offset = bw320_offset;
1358  		}
1359  	} else {
1360  		conf->eht_bw320_offset = 0;
1361  	}
1362  #endif /* CONFIG_IEEE80211BE */
1363  }
1364  
1365  
1366  int hostapd_mac_comp(const void *a, const void *b);
1367  struct hostapd_config * hostapd_config_defaults(void);
1368  void hostapd_config_defaults_bss(struct hostapd_bss_config *bss);
1369  void hostapd_config_free_radius_attr(struct hostapd_radius_attr *attr);
1370  void hostapd_config_free_eap_user(struct hostapd_eap_user *user);
1371  void hostapd_config_free_eap_users(struct hostapd_eap_user *user);
1372  void hostapd_config_clear_wpa_psk(struct hostapd_wpa_psk **p);
1373  void hostapd_config_clear_rxkhs(struct hostapd_bss_config *conf);
1374  void hostapd_config_free_bss(struct hostapd_bss_config *conf);
1375  void hostapd_config_free(struct hostapd_config *conf);
1376  int hostapd_maclist_found(struct mac_acl_entry *list, int num_entries,
1377  			  const u8 *addr, struct vlan_description *vlan_id);
1378  int hostapd_rate_found(int *list, int rate);
1379  const u8 * hostapd_get_psk(const struct hostapd_bss_config *conf,
1380  			   const u8 *addr, const u8 *p2p_dev_addr,
1381  			   const u8 *prev_psk, int *vlan_id);
1382  int hostapd_setup_wpa_psk(struct hostapd_bss_config *conf);
1383  int hostapd_vlan_valid(struct hostapd_vlan *vlan,
1384  		       struct vlan_description *vlan_desc);
1385  const char * hostapd_get_vlan_id_ifname(struct hostapd_vlan *vlan,
1386  					int vlan_id);
1387  struct hostapd_radius_attr *
1388  hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type);
1389  struct hostapd_radius_attr * hostapd_parse_radius_attr(const char *value);
1390  int hostapd_config_check(struct hostapd_config *conf, int full_config);
1391  void hostapd_set_security_params(struct hostapd_bss_config *bss,
1392  				 int full_config);
1393  int hostapd_sae_pw_id_in_use(struct hostapd_bss_config *conf);
1394  bool hostapd_sae_pk_in_use(struct hostapd_bss_config *conf);
1395  bool hostapd_sae_pk_exclusively(struct hostapd_bss_config *conf);
1396  int hostapd_setup_sae_pt(struct hostapd_bss_config *conf);
1397  int hostapd_acl_comp(const void *a, const void *b);
1398  int hostapd_add_acl_maclist(struct mac_acl_entry **acl, int *num,
1399  			    int vlan_id, const u8 *addr);
1400  void hostapd_remove_acl_mac(struct mac_acl_entry **acl, int *num,
1401  			    const u8 *addr);
1402  
1403  #endif /* HOSTAPD_CONFIG_H */
1404