]> git.ipfire.org Git - thirdparty/hostap.git/blobdiff - wpa_supplicant/config_file.c
wpa_supplicant: Add HE override support
[thirdparty/hostap.git] / wpa_supplicant / config_file.c
index 3a44c8a0df766041757333d5d1a4eed57b80e5a5..a69c4cc6dbc1c005b686c272e6d6a6e88f7464e9 100644 (file)
@@ -1,6 +1,6 @@
 /*
  * WPA Supplicant / Configuration backend: text file
- * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
  *
  * This software may be distributed under the terms of the BSD license.
  * See README for more details.
@@ -141,8 +141,9 @@ static int wpa_config_validate_network(struct wpa_ssid *ssid, int line)
                ssid->p2p_persistent_group = 1;
 
        if ((ssid->group_cipher & WPA_CIPHER_CCMP) &&
-           !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) &&
-           !(ssid->pairwise_cipher & WPA_CIPHER_NONE)) {
+           !(ssid->pairwise_cipher & (WPA_CIPHER_CCMP | WPA_CIPHER_CCMP_256 |
+                                      WPA_CIPHER_GCMP | WPA_CIPHER_GCMP_256 |
+                                      WPA_CIPHER_NONE))) {
                /* Group cipher cannot be stronger than the pairwise cipher. */
                wpa_printf(MSG_DEBUG, "Line %d: removed CCMP from group cipher"
                           " list since it was not allowed for pairwise "
@@ -159,6 +160,15 @@ static int wpa_config_validate_network(struct wpa_ssid *ssid, int line)
                errors++;
        }
 
+#ifdef CONFIG_OCV
+       if (ssid->ocv && ssid->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
+               wpa_printf(MSG_ERROR,
+                          "Line %d: PMF needs to be enabled whenever using OCV",
+                          line);
+               errors++;
+       }
+#endif /* CONFIG_OCV */
+
        return errors;
 }
 
@@ -203,8 +213,22 @@ static struct wpa_ssid * wpa_config_read_network(FILE *f, int *line, int id)
                        }
                }
 
-               if (wpa_config_set(ssid, pos, pos2, *line) < 0)
+               if (wpa_config_set(ssid, pos, pos2, *line) < 0) {
+#ifndef CONFIG_WEP
+                       if (os_strcmp(pos, "wep_key0") == 0 ||
+                           os_strcmp(pos, "wep_key1") == 0 ||
+                           os_strcmp(pos, "wep_key2") == 0 ||
+                           os_strcmp(pos, "wep_key3") == 0 ||
+                           os_strcmp(pos, "wep_tx_keyidx") == 0) {
+                               wpa_printf(MSG_ERROR,
+                                          "Line %d: unsupported WEP parameter",
+                                          *line);
+                               ssid->disabled = 1;
+                               continue;
+                       }
+#endif /* CONFIG_WEP */
                        errors++;
+               }
        }
 
        if (!end) {
@@ -286,7 +310,7 @@ static struct wpa_config_blob * wpa_config_read_blob(FILE *f, int *line,
 {
        struct wpa_config_blob *blob;
        char buf[256], *pos;
-       unsigned char *encoded = NULL, *nencoded;
+       char *encoded = NULL, *nencoded;
        int end = 0;
        size_t encoded_len = 0, len;
 
@@ -312,7 +336,7 @@ static struct wpa_config_blob * wpa_config_read_blob(FILE *f, int *line,
                encoded_len += len;
        }
 
-       if (!end) {
+       if (!end || !encoded) {
                wpa_printf(MSG_ERROR, "Line %d: blob was not terminated "
                           "properly", *line);
                os_free(encoded);
@@ -397,7 +421,8 @@ struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
        if (f == NULL) {
                wpa_printf(MSG_ERROR, "Failed to open config file '%s', "
                           "error: %s", name, strerror(errno));
-               os_free(config);
+               if (config != cfgp)
+                       os_free(config);
                return NULL;
        }
 
@@ -463,7 +488,8 @@ struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
 
 #ifndef WPA_IGNORE_CONFIG_ERRORS
        if (errors) {
-               wpa_config_free(config);
+               if (config != cfgp)
+                       wpa_config_free(config);
                config = NULL;
                head = NULL;
        }
@@ -481,7 +507,7 @@ static void write_str(FILE *f, const char *field, struct wpa_ssid *ssid)
        if (value == NULL)
                return;
        fprintf(f, "\t%s=%s\n", field, value);
-       os_free(value);
+       str_clear_free(value);
 }
 
 
@@ -503,6 +529,17 @@ static void write_bssid(FILE *f, struct wpa_ssid *ssid)
 }
 
 
+static void write_bssid_hint(FILE *f, struct wpa_ssid *ssid)
+{
+       char *value = wpa_config_get(ssid, "bssid_hint");
+
+       if (!value)
+               return;
+       fprintf(f, "\tbssid_hint=%s\n", value);
+       os_free(value);
+}
+
+
 static void write_psk(FILE *f, struct wpa_ssid *ssid)
 {
        char *value;
@@ -582,6 +619,22 @@ static void write_group(FILE *f, struct wpa_ssid *ssid)
 }
 
 
+static void write_group_mgmt(FILE *f, struct wpa_ssid *ssid)
+{
+       char *value;
+
+       if (!ssid->group_mgmt_cipher)
+               return;
+
+       value = wpa_config_get(ssid, "group_mgmt");
+       if (!value)
+               return;
+       if (value[0])
+               fprintf(f, "\tgroup_mgmt=%s\n", value);
+       os_free(value);
+}
+
+
 static void write_auth_alg(FILE *f, struct wpa_ssid *ssid)
 {
        char *value;
@@ -614,6 +667,7 @@ static void write_eap(FILE *f, struct wpa_ssid *ssid)
 #endif /* IEEE8021X_EAPOL */
 
 
+#ifdef CONFIG_WEP
 static void write_wep_key(FILE *f, int idx, struct wpa_ssid *ssid)
 {
        char field[20], *value;
@@ -628,6 +682,7 @@ static void write_wep_key(FILE *f, int idx, struct wpa_ssid *ssid)
                os_free(value);
        }
 }
+#endif /* CONFIG_WEP */
 
 
 #ifdef CONFIG_P2P
@@ -702,26 +757,28 @@ static void write_mka_ckn(FILE *f, struct wpa_ssid *ssid)
 
 static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
 {
-       int i;
-
 #define STR(t) write_str(f, #t, ssid)
 #define INT(t) write_int(f, #t, ssid->t, 0)
-#define INTe(t) write_int(f, #t, ssid->eap.t, 0)
+#define INTe(t, m) write_int(f, #t, ssid->eap.m, 0)
 #define INT_DEF(t, def) write_int(f, #t, ssid->t, def)
-#define INT_DEFe(t, def) write_int(f, #t, ssid->eap.t, def)
+#define INT_DEFe(t, m, def) write_int(f, #t, ssid->eap.m, def)
 
        STR(ssid);
        INT(scan_ssid);
        write_bssid(f, ssid);
+       write_bssid_hint(f, ssid);
        write_str(f, "bssid_blacklist", ssid);
        write_str(f, "bssid_whitelist", ssid);
        write_psk(f, ssid);
        INT(mem_only_psk);
+       STR(sae_password);
+       STR(sae_password_id);
        write_proto(f, ssid);
        write_key_mgmt(f, ssid);
        INT_DEF(bg_scan_period, DEFAULT_BG_SCAN_PERIOD);
        write_pairwise(f, ssid);
        write_group(f, ssid);
+       write_group_mgmt(f, ssid);
        write_auth_alg(f, ssid);
        STR(bgscan);
        STR(autoscan);
@@ -730,7 +787,10 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        write_eap(f, ssid);
        STR(identity);
        STR(anonymous_identity);
+       STR(imsi_identity);
+       STR(machine_identity);
        STR(password);
+       STR(machine_password);
        STR(ca_cert);
        STR(ca_path);
        STR(client_cert);
@@ -738,6 +798,7 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        STR(private_key_passwd);
        STR(dh_file);
        STR(subject_match);
+       STR(check_cert_subject);
        STR(altsubject_match);
        STR(domain_suffix_match);
        STR(domain_match);
@@ -748,11 +809,24 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        STR(private_key2_passwd);
        STR(dh_file2);
        STR(subject_match2);
+       STR(check_cert_subject2);
        STR(altsubject_match2);
        STR(domain_suffix_match2);
        STR(domain_match2);
+       STR(machine_ca_cert);
+       STR(machine_ca_path);
+       STR(machine_client_cert);
+       STR(machine_private_key);
+       STR(machine_private_key_passwd);
+       STR(machine_dh_file);
+       STR(machine_subject_match);
+       STR(machine_check_cert_subject);
+       STR(machine_altsubject_match);
+       STR(machine_domain_suffix_match);
+       STR(machine_domain_match);
        STR(phase1);
        STR(phase2);
+       STR(machine_phase2);
        STR(pcsc);
        STR(pin);
        STR(engine_id);
@@ -764,47 +838,55 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        STR(engine2_id);
        STR(cert2_id);
        STR(ca_cert2_id);
-       INTe(engine);
-       INTe(engine2);
+       INTe(engine, cert.engine);
+       INTe(engine2, phase2_cert.engine);
+       INTe(machine_engine, machine_cert.engine);
        INT_DEF(eapol_flags, DEFAULT_EAPOL_FLAGS);
        STR(openssl_ciphers);
-       INTe(erp);
+       INTe(erp, erp);
 #endif /* IEEE8021X_EAPOL */
-       for (i = 0; i < 4; i++)
-               write_wep_key(f, i, ssid);
-       INT(wep_tx_keyidx);
+#ifdef CONFIG_WEP
+       {
+               int i;
+
+               for (i = 0; i < 4; i++)
+                       write_wep_key(f, i, ssid);
+               INT(wep_tx_keyidx);
+       }
+#endif /* CONFIG_WEP */
        INT(priority);
 #ifdef IEEE8021X_EAPOL
        INT_DEF(eap_workaround, DEFAULT_EAP_WORKAROUND);
        STR(pac_file);
-       INT_DEFe(fragment_size, DEFAULT_FRAGMENT_SIZE);
-       INTe(ocsp);
-       INT_DEFe(sim_num, DEFAULT_USER_SELECTED_SIM);
+       INT_DEFe(fragment_size, fragment_size, DEFAULT_FRAGMENT_SIZE);
+       INTe(ocsp, cert.ocsp);
+       INTe(ocsp2, phase2_cert.ocsp);
+       INTe(machine_ocsp, machine_cert.ocsp);
+       INT_DEFe(sim_num, sim_num, DEFAULT_USER_SELECTED_SIM);
 #endif /* IEEE8021X_EAPOL */
        INT(mode);
        INT(no_auto_peer);
        INT(frequency);
+       INT(enable_edmg);
+       INT(edmg_channel);
        INT(fixed_freq);
 #ifdef CONFIG_ACS
        INT(acs);
 #endif /* CONFIG_ACS */
        write_int(f, "proactive_key_caching", ssid->proactive_key_caching, -1);
        INT(disabled);
-       INT(peerkey);
        INT(mixed_cell);
        INT(vht);
        INT_DEF(ht, 1);
        INT(ht40);
-       INT(max_oper_chwidth);
+       INT_DEF(max_oper_chwidth, DEFAULT_MAX_OPER_CHWIDTH);
        INT(vht_center_freq1);
        INT(vht_center_freq2);
        INT(pbss);
        INT(wps_disabled);
        INT(fils_dh_group);
-#ifdef CONFIG_IEEE80211W
        write_int(f, "ieee80211w", ssid->ieee80211w,
                  MGMT_FRAME_PROTECTION_DEFAULT);
-#endif /* CONFIG_IEEE80211W */
        STR(id_str);
 #ifdef CONFIG_P2P
        write_go_p2p_dev_addr(f, ssid);
@@ -819,11 +901,14 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        write_mka_cak(f, ssid);
        write_mka_ckn(f, ssid);
        INT(macsec_integ_only);
+       INT(macsec_replay_protect);
+       INT(macsec_replay_window);
        INT(macsec_port);
        INT_DEF(mka_priority, DEFAULT_PRIO_NOT_KEY_SERVER);
 #endif /* CONFIG_MACSEC */
 #ifdef CONFIG_HS20
        INT(update_identifier);
+       STR(roaming_consortium_selection);
 #endif /* CONFIG_HS20 */
        write_int(f, "mac_addr", ssid->mac_addr, -1);
 #ifdef CONFIG_MESH
@@ -832,16 +917,34 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        INT_DEF(dot11MeshRetryTimeout, DEFAULT_MESH_RETRY_TIMEOUT);
        INT_DEF(dot11MeshConfirmTimeout, DEFAULT_MESH_CONFIRM_TIMEOUT);
        INT_DEF(dot11MeshHoldingTimeout, DEFAULT_MESH_HOLDING_TIMEOUT);
+       INT_DEF(mesh_rssi_threshold, DEFAULT_MESH_RSSI_THRESHOLD);
 #endif /* CONFIG_MESH */
        INT(wpa_ptk_rekey);
+       INT(wpa_deny_ptk0_rekey);
        INT(group_rekey);
        INT(ignore_broadcast_ssid);
+#ifdef CONFIG_DPP
+       STR(dpp_connector);
+       STR(dpp_netaccesskey);
+       INT(dpp_netaccesskey_expiry);
+       STR(dpp_csign);
+       INT(dpp_pfs);
+#endif /* CONFIG_DPP */
+       INT(owe_group);
+       INT(owe_only);
+       INT(owe_ptk_workaround);
+       INT(multi_ap_backhaul_sta);
+       INT(ft_eap_pmksa_caching);
+       INT(beacon_prot);
+       INT(transition_disable);
 #ifdef CONFIG_HT_OVERRIDES
        INT_DEF(disable_ht, DEFAULT_DISABLE_HT);
        INT_DEF(disable_ht40, DEFAULT_DISABLE_HT40);
        INT_DEF(disable_sgi, DEFAULT_DISABLE_SGI);
        INT_DEF(disable_ldpc, DEFAULT_DISABLE_LDPC);
        INT(ht40_intolerant);
+       INT_DEF(tx_stbc, DEFAULT_TX_STBC);
+       INT_DEF(rx_stbc, DEFAULT_RX_STBC);
        INT_DEF(disable_max_amsdu, DEFAULT_DISABLE_MAX_AMSDU);
        INT_DEF(ampdu_factor, DEFAULT_AMPDU_FACTOR);
        INT_DEF(ampdu_density, DEFAULT_AMPDU_DENSITY);
@@ -868,6 +971,9 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
        INT_DEF(vht_tx_mcs_nss_7, -1);
        INT_DEF(vht_tx_mcs_nss_8, -1);
 #endif /* CONFIG_VHT_OVERRIDES */
+#ifdef CONFIG_HE_OVERRIDES
+       INT(disable_he);
+#endif /* CONFIG_HE_OVERRIDES */
 
 #undef STR
 #undef INT
@@ -998,6 +1104,20 @@ static void wpa_config_write_cred(FILE *f, struct wpa_cred *cred)
                fprintf(f, "\n");
        }
 
+       if (cred->num_roaming_consortiums) {
+               size_t j;
+
+               fprintf(f, "\troaming_consortiums=\"");
+               for (i = 0; i < cred->num_roaming_consortiums; i++) {
+                       if (i > 0)
+                               fprintf(f, ",");
+                       for (j = 0; j < cred->roaming_consortiums_len[i]; j++)
+                               fprintf(f, "%02x",
+                                       cred->roaming_consortiums[i][j]);
+               }
+               fprintf(f, "\"\n");
+       }
+
        if (cred->sim_num != DEFAULT_USER_SELECTED_SIM)
                fprintf(f, "\tsim_num=%d\n", cred->sim_num);
 }
@@ -1006,7 +1126,7 @@ static void wpa_config_write_cred(FILE *f, struct wpa_cred *cred)
 #ifndef CONFIG_NO_CONFIG_BLOBS
 static int wpa_config_write_blob(FILE *f, struct wpa_config_blob *blob)
 {
-       unsigned char *encoded;
+       char *encoded;
 
        encoded = base64_encode(blob->data, blob->len, NULL);
        if (encoded == NULL)
@@ -1115,6 +1235,9 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
        if (config->wps_cred_processing)
                fprintf(f, "wps_cred_processing=%d\n",
                        config->wps_cred_processing);
+       if (config->wps_cred_add_sae)
+               fprintf(f, "wps_cred_add_sae=%d\n",
+                       config->wps_cred_add_sae);
        if (config->wps_vendor_ext_m1) {
                int i, len = wpabuf_len(config->wps_vendor_ext_m1);
                const u8 *p = wpabuf_head_u8(config->wps_vendor_ext_m1);
@@ -1190,6 +1313,10 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
                fprintf(f, "p2p_go_ht40=%d\n", config->p2p_go_ht40);
        if (config->p2p_go_vht)
                fprintf(f, "p2p_go_vht=%d\n", config->p2p_go_vht);
+       if (config->p2p_go_he)
+               fprintf(f, "p2p_go_he=%d\n", config->p2p_go_he);
+       if (config->p2p_go_edmg)
+               fprintf(f, "p2p_go_edmg=%d\n", config->p2p_go_edmg);
        if (config->p2p_go_ctwindow != DEFAULT_P2P_GO_CTWINDOW)
                fprintf(f, "p2p_go_ctwindow=%d\n", config->p2p_go_ctwindow);
        if (config->p2p_disabled)
@@ -1241,6 +1368,8 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
                fprintf(f, "filter_rssi=%d\n", config->filter_rssi);
        if (config->max_num_sta != DEFAULT_MAX_NUM_STA)
                fprintf(f, "max_num_sta=%u\n", config->max_num_sta);
+       if (config->ap_isolate != DEFAULT_AP_ISOLATE)
+               fprintf(f, "ap_isolate=%u\n", config->ap_isolate);
        if (config->disassoc_low_ack)
                fprintf(f, "disassoc_low_ack=%d\n", config->disassoc_low_ack);
 #ifdef CONFIG_HS20
@@ -1255,6 +1384,17 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
        if (config->access_network_type != DEFAULT_ACCESS_NETWORK_TYPE)
                fprintf(f, "access_network_type=%d\n",
                        config->access_network_type);
+       if (config->go_interworking)
+               fprintf(f, "go_interworking=%d\n", config->go_interworking);
+       if (config->go_access_network_type)
+               fprintf(f, "go_access_network_type=%d\n",
+                       config->go_access_network_type);
+       if (config->go_internet)
+               fprintf(f, "go_internet=%d\n", config->go_internet);
+       if (config->go_venue_group)
+               fprintf(f, "go_venue_group=%d\n", config->go_venue_group);
+       if (config->go_venue_type)
+               fprintf(f, "go_venue_type=%d\n", config->go_venue_type);
 #endif /* CONFIG_INTERWORKING */
        if (config->pbc_in_m1)
                fprintf(f, "pbc_in_m1=%d\n", config->pbc_in_m1);
@@ -1297,6 +1437,13 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
                fprintf(f, "\n");
        }
 
+       if (config->sae_pwe)
+               fprintf(f, "sae_pwe=%d\n", config->sae_pwe);
+
+       if (config->sae_pmkid_in_assoc)
+               fprintf(f, "sae_pmkid_in_assoc=%d\n",
+                       config->sae_pmkid_in_assoc);
+
        if (config->ap_vendor_elements) {
                int i, len = wpabuf_len(config->ap_vendor_elements);
                const u8 *p = wpabuf_head_u8(config->ap_vendor_elements);
@@ -1410,6 +1557,8 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
            DEFAULT_DISASSOC_IMMINENT_RSSI_THRESHOLD)
                fprintf(f, "disassoc_imminent_rssi_threshold=%d\n",
                        config->disassoc_imminent_rssi_threshold);
+       if (config->oce != DEFAULT_OCE_SUPPORT)
+               fprintf(f, "oce=%u\n", config->oce);
 #endif /* CONFIG_MBO */
 
        if (config->gas_address3)
@@ -1435,7 +1584,26 @@ static void wpa_config_write_global(FILE *f, struct wpa_config *config)
                        config->gas_rand_addr_lifetime);
        if (config->gas_rand_mac_addr)
                fprintf(f, "gas_rand_mac_addr=%d\n", config->gas_rand_mac_addr);
-
+       if (config->dpp_config_processing)
+               fprintf(f, "dpp_config_processing=%d\n",
+                       config->dpp_config_processing);
+       if (config->coloc_intf_reporting)
+               fprintf(f, "coloc_intf_reporting=%d\n",
+                       config->coloc_intf_reporting);
+       if (config->p2p_device_random_mac_addr)
+               fprintf(f, "p2p_device_random_mac_addr=%d\n",
+                       config->p2p_device_random_mac_addr);
+       if (!is_zero_ether_addr(config->p2p_device_persistent_mac_addr))
+               fprintf(f, "p2p_device_persistent_mac_addr=" MACSTR "\n",
+                       MAC2STR(config->p2p_device_persistent_mac_addr));
+       if (config->p2p_interface_random_mac_addr)
+               fprintf(f, "p2p_interface_random_mac_addr=%d\n",
+                       config->p2p_interface_random_mac_addr);
+       if (config->disable_btm)
+               fprintf(f, "disable_btm=1\n");
+       if (config->extended_key_id != DEFAULT_EXTENDED_KEY_ID)
+               fprintf(f, "extended_key_id=%d\n",
+                       config->extended_key_id);
 }
 
 #endif /* CONFIG_NO_CONFIG_WRITE */
@@ -1452,9 +1620,16 @@ int wpa_config_write(const char *name, struct wpa_config *config)
 #endif /* CONFIG_NO_CONFIG_BLOBS */
        int ret = 0;
        const char *orig_name = name;
-       int tmp_len = os_strlen(name) + 5; /* allow space for .tmp suffix */
-       char *tmp_name = os_malloc(tmp_len);
+       int tmp_len;
+       char *tmp_name;
 
+       if (!name) {
+               wpa_printf(MSG_ERROR, "No configuration file for writing");
+               return -1;
+       }
+
+       tmp_len = os_strlen(name) + 5; /* allow space for .tmp suffix */
+       tmp_name = os_malloc(tmp_len);
        if (tmp_name) {
                os_snprintf(tmp_name, tmp_len, "%s.tmp", name);
                name = tmp_name;
@@ -1482,8 +1657,11 @@ int wpa_config_write(const char *name, struct wpa_config *config)
        for (ssid = config->ssid; ssid; ssid = ssid->next) {
                if (ssid->key_mgmt == WPA_KEY_MGMT_WPS || ssid->temporary)
                        continue; /* do not save temporary networks */
-               if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt) && !ssid->psk_set &&
-                   !ssid->passphrase)
+               if (wpa_key_mgmt_wpa_psk_no_sae(ssid->key_mgmt) &&
+                   !ssid->psk_set && !ssid->passphrase)
+                       continue; /* do not save invalid network */
+               if (wpa_key_mgmt_sae(ssid->key_mgmt) &&
+                   !ssid->passphrase && !ssid->sae_password)
                        continue; /* do not save invalid network */
                fprintf(f, "\nnetwork={\n");
                wpa_config_write_network(f, ssid);