1 /*
2 * WPA Supplicant / Configuration backend: text file
3 * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 *
8 * This file implements a configuration backend for text files. All the
9 * configuration information is stored in a text file that uses a format
10 * described in the sample configuration file, wpa_supplicant.conf.
11 */
12
13 #include "includes.h"
14 #ifdef ANDROID
15 #include <sys/stat.h>
16 #endif /* ANDROID */
17
18 #include "common.h"
19 #include "config.h"
20 #include "base64.h"
21 #include "uuid.h"
22 #include "common/ieee802_1x_defs.h"
23 #include "p2p/p2p.h"
24 #include "eap_peer/eap_methods.h"
25 #include "eap_peer/eap.h"
26 #include "utils/config.h"
27
28
wpa_config_validate_network(struct wpa_ssid * ssid,int line)29 static int wpa_config_validate_network(struct wpa_ssid *ssid, int line)
30 {
31 int errors = 0;
32
33 if (ssid->passphrase) {
34 if (ssid->psk_set) {
35 wpa_printf(MSG_ERROR, "Line %d: both PSK and "
36 "passphrase configured.", line);
37 errors++;
38 }
39 wpa_config_update_psk(ssid);
40 }
41
42 if (ssid->disabled == 2)
43 ssid->p2p_persistent_group = 1;
44
45 if ((ssid->group_cipher & WPA_CIPHER_CCMP) &&
46 !(ssid->pairwise_cipher & (WPA_CIPHER_CCMP | WPA_CIPHER_CCMP_256 |
47 WPA_CIPHER_GCMP | WPA_CIPHER_GCMP_256 |
48 WPA_CIPHER_NONE))) {
49 /* Group cipher cannot be stronger than the pairwise cipher. */
50 wpa_printf(MSG_DEBUG, "Line %d: removed CCMP from group cipher"
51 " list since it was not allowed for pairwise "
52 "cipher", line);
53 ssid->group_cipher &= ~WPA_CIPHER_CCMP;
54 }
55
56 if (ssid->mode == WPAS_MODE_MESH &&
57 (ssid->key_mgmt != WPA_KEY_MGMT_NONE &&
58 ssid->key_mgmt != WPA_KEY_MGMT_SAE)) {
59 wpa_printf(MSG_ERROR,
60 "Line %d: key_mgmt for mesh network should be open or SAE",
61 line);
62 errors++;
63 }
64
65 #ifdef CONFIG_OCV
66 if (ssid->ocv && ssid->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
67 wpa_printf(MSG_ERROR,
68 "Line %d: PMF needs to be enabled whenever using OCV",
69 line);
70 errors++;
71 }
72 #endif /* CONFIG_OCV */
73
74 return errors;
75 }
76
77
wpa_config_read_network(FILE * f,int * line,int id)78 static struct wpa_ssid * wpa_config_read_network(FILE *f, int *line, int id)
79 {
80 struct wpa_ssid *ssid;
81 int errors = 0, end = 0;
82 char buf[2000], *pos, *pos2;
83
84 wpa_printf(MSG_MSGDUMP, "Line: %d - start of a new network block",
85 *line);
86 ssid = os_zalloc(sizeof(*ssid));
87 if (ssid == NULL)
88 return NULL;
89 dl_list_init(&ssid->psk_list);
90 ssid->id = id;
91
92 wpa_config_set_network_defaults(ssid);
93
94 while (wpa_config_get_line(buf, sizeof(buf), f, line, &pos)) {
95 if (os_strcmp(pos, "}") == 0) {
96 end = 1;
97 break;
98 }
99
100 pos2 = os_strchr(pos, '=');
101 if (pos2 == NULL) {
102 wpa_printf(MSG_ERROR, "Line %d: Invalid SSID line "
103 "'%s'.", *line, pos);
104 errors++;
105 continue;
106 }
107
108 *pos2++ = '\0';
109 if (*pos2 == '"') {
110 if (os_strchr(pos2 + 1, '"') == NULL) {
111 wpa_printf(MSG_ERROR, "Line %d: invalid "
112 "quotation '%s'.", *line, pos2);
113 errors++;
114 continue;
115 }
116 }
117
118 if (wpa_config_set(ssid, pos, pos2, *line) < 0) {
119 #ifndef CONFIG_WEP
120 if (os_strcmp(pos, "wep_key0") == 0 ||
121 os_strcmp(pos, "wep_key1") == 0 ||
122 os_strcmp(pos, "wep_key2") == 0 ||
123 os_strcmp(pos, "wep_key3") == 0 ||
124 os_strcmp(pos, "wep_tx_keyidx") == 0) {
125 wpa_printf(MSG_ERROR,
126 "Line %d: unsupported WEP parameter",
127 *line);
128 ssid->disabled = 1;
129 continue;
130 }
131 #endif /* CONFIG_WEP */
132 errors++;
133 }
134 }
135
136 if (!end) {
137 wpa_printf(MSG_ERROR, "Line %d: network block was not "
138 "terminated properly.", *line);
139 errors++;
140 }
141
142 errors += wpa_config_validate_network(ssid, *line);
143
144 if (errors) {
145 wpa_config_free_ssid(ssid);
146 ssid = NULL;
147 }
148
149 return ssid;
150 }
151
152
wpa_config_read_cred(FILE * f,int * line,int id)153 static struct wpa_cred * wpa_config_read_cred(FILE *f, int *line, int id)
154 {
155 struct wpa_cred *cred;
156 int errors = 0, end = 0;
157 char buf[256], *pos, *pos2;
158
159 wpa_printf(MSG_MSGDUMP, "Line: %d - start of a new cred block", *line);
160 cred = os_zalloc(sizeof(*cred));
161 if (cred == NULL)
162 return NULL;
163 cred->id = id;
164 cred->sim_num = DEFAULT_USER_SELECTED_SIM;
165
166 while (wpa_config_get_line(buf, sizeof(buf), f, line, &pos)) {
167 if (os_strcmp(pos, "}") == 0) {
168 end = 1;
169 break;
170 }
171
172 pos2 = os_strchr(pos, '=');
173 if (pos2 == NULL) {
174 wpa_printf(MSG_ERROR, "Line %d: Invalid cred line "
175 "'%s'.", *line, pos);
176 errors++;
177 continue;
178 }
179
180 *pos2++ = '\0';
181 if (*pos2 == '"') {
182 if (os_strchr(pos2 + 1, '"') == NULL) {
183 wpa_printf(MSG_ERROR, "Line %d: invalid "
184 "quotation '%s'.", *line, pos2);
185 errors++;
186 continue;
187 }
188 }
189
190 if (wpa_config_set_cred(cred, pos, pos2, *line) < 0)
191 errors++;
192 }
193
194 if (!end) {
195 wpa_printf(MSG_ERROR, "Line %d: cred block was not "
196 "terminated properly.", *line);
197 errors++;
198 }
199
200 if (errors) {
201 wpa_config_free_cred(cred);
202 cred = NULL;
203 }
204
205 return cred;
206 }
207
208
209 #ifndef CONFIG_NO_CONFIG_BLOBS
wpa_config_read_blob(FILE * f,int * line,const char * name)210 static struct wpa_config_blob * wpa_config_read_blob(FILE *f, int *line,
211 const char *name)
212 {
213 struct wpa_config_blob *blob;
214 char buf[256], *pos;
215 char *encoded = NULL, *nencoded;
216 int end = 0;
217 size_t encoded_len = 0, len;
218
219 wpa_printf(MSG_MSGDUMP, "Line: %d - start of a new named blob '%s'",
220 *line, name);
221
222 while (wpa_config_get_line(buf, sizeof(buf), f, line, &pos)) {
223 if (os_strcmp(pos, "}") == 0) {
224 end = 1;
225 break;
226 }
227
228 len = os_strlen(pos);
229 nencoded = os_realloc(encoded, encoded_len + len);
230 if (nencoded == NULL) {
231 wpa_printf(MSG_ERROR, "Line %d: not enough memory for "
232 "blob", *line);
233 os_free(encoded);
234 return NULL;
235 }
236 encoded = nencoded;
237 os_memcpy(encoded + encoded_len, pos, len);
238 encoded_len += len;
239 }
240
241 if (!end || !encoded) {
242 wpa_printf(MSG_ERROR, "Line %d: blob was not terminated "
243 "properly", *line);
244 os_free(encoded);
245 return NULL;
246 }
247
248 blob = os_zalloc(sizeof(*blob));
249 if (blob == NULL) {
250 os_free(encoded);
251 return NULL;
252 }
253 blob->name = os_strdup(name);
254 blob->data = base64_decode(encoded, encoded_len, &blob->len);
255 os_free(encoded);
256
257 if (blob->name == NULL || blob->data == NULL) {
258 wpa_config_free_blob(blob);
259 return NULL;
260 }
261
262 return blob;
263 }
264
265
wpa_config_process_blob(struct wpa_config * config,FILE * f,int * line,char * bname)266 static int wpa_config_process_blob(struct wpa_config *config, FILE *f,
267 int *line, char *bname)
268 {
269 char *name_end;
270 struct wpa_config_blob *blob;
271
272 name_end = os_strchr(bname, '=');
273 if (name_end == NULL) {
274 wpa_printf(MSG_ERROR, "Line %d: no blob name terminator",
275 *line);
276 return -1;
277 }
278 *name_end = '\0';
279
280 blob = wpa_config_read_blob(f, line, bname);
281 if (blob == NULL) {
282 wpa_printf(MSG_ERROR, "Line %d: failed to read blob %s",
283 *line, bname);
284 return -1;
285 }
286 wpa_config_set_blob(config, blob);
287 return 0;
288 }
289 #endif /* CONFIG_NO_CONFIG_BLOBS */
290
291
wpa_config_read(const char * name,struct wpa_config * cfgp)292 struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
293 {
294 FILE *f;
295 char buf[512], *pos;
296 int errors = 0, line = 0;
297 struct wpa_ssid *ssid, *tail, *head;
298 struct wpa_cred *cred, *cred_tail, *cred_head;
299 struct wpa_config *config;
300 int id = 0;
301 int cred_id = 0;
302
303 if (name == NULL)
304 return NULL;
305 if (cfgp)
306 config = cfgp;
307 else
308 config = wpa_config_alloc_empty(NULL, NULL);
309 if (config == NULL) {
310 wpa_printf(MSG_ERROR, "Failed to allocate config file "
311 "structure");
312 return NULL;
313 }
314 tail = head = config->ssid;
315 while (tail && tail->next)
316 tail = tail->next;
317 cred_tail = cred_head = config->cred;
318 while (cred_tail && cred_tail->next)
319 cred_tail = cred_tail->next;
320
321 wpa_printf(MSG_DEBUG, "Reading configuration file '%s'", name);
322 f = fopen(name, "r");
323 if (f == NULL) {
324 wpa_printf(MSG_ERROR, "Failed to open config file '%s', "
325 "error: %s", name, strerror(errno));
326 if (config != cfgp)
327 os_free(config);
328 return NULL;
329 }
330
331 while (wpa_config_get_line(buf, sizeof(buf), f, &line, &pos)) {
332 if (os_strcmp(pos, "network={") == 0) {
333 ssid = wpa_config_read_network(f, &line, id++);
334 if (ssid == NULL) {
335 wpa_printf(MSG_ERROR, "Line %d: failed to "
336 "parse network block.", line);
337 errors++;
338 continue;
339 }
340 if (head == NULL) {
341 head = tail = ssid;
342 } else {
343 tail->next = ssid;
344 tail = ssid;
345 }
346 if (wpa_config_add_prio_network(config, ssid)) {
347 wpa_printf(MSG_ERROR, "Line %d: failed to add "
348 "network block to priority list.",
349 line);
350 errors++;
351 continue;
352 }
353 } else if (os_strcmp(pos, "cred={") == 0) {
354 cred = wpa_config_read_cred(f, &line, cred_id++);
355 if (cred == NULL) {
356 wpa_printf(MSG_ERROR, "Line %d: failed to "
357 "parse cred block.", line);
358 errors++;
359 continue;
360 }
361 if (cred_head == NULL) {
362 cred_head = cred_tail = cred;
363 } else {
364 cred_tail->next = cred;
365 cred_tail = cred;
366 }
367 #ifndef CONFIG_NO_CONFIG_BLOBS
368 } else if (os_strncmp(pos, "blob-base64-", 12) == 0) {
369 if (wpa_config_process_blob(config, f, &line, pos + 12)
370 < 0) {
371 wpa_printf(MSG_ERROR, "Line %d: failed to "
372 "process blob.", line);
373 errors++;
374 continue;
375 }
376 #endif /* CONFIG_NO_CONFIG_BLOBS */
377 } else if (wpa_config_process_global(config, pos, line) < 0) {
378 wpa_printf(MSG_ERROR, "Line %d: Invalid configuration "
379 "line '%s'.", line, pos);
380 errors++;
381 continue;
382 }
383 }
384
385 fclose(f);
386
387 config->ssid = head;
388 wpa_config_debug_dump_networks(config);
389 config->cred = cred_head;
390
391 #ifndef WPA_IGNORE_CONFIG_ERRORS
392 if (errors) {
393 if (config != cfgp)
394 wpa_config_free(config);
395 config = NULL;
396 head = NULL;
397 }
398 #endif /* WPA_IGNORE_CONFIG_ERRORS */
399
400 return config;
401 }
402
403
404 #ifndef CONFIG_NO_CONFIG_WRITE
405
write_str(FILE * f,const char * field,struct wpa_ssid * ssid)406 static void write_str(FILE *f, const char *field, struct wpa_ssid *ssid)
407 {
408 char *value = wpa_config_get(ssid, field);
409 if (value == NULL)
410 return;
411 fprintf(f, "\t%s=%s\n", field, value);
412 str_clear_free(value);
413 }
414
415
write_int(FILE * f,const char * field,int value,int def)416 static void write_int(FILE *f, const char *field, int value, int def)
417 {
418 if (value == def)
419 return;
420 fprintf(f, "\t%s=%d\n", field, value);
421 }
422
423
write_bssid(FILE * f,struct wpa_ssid * ssid)424 static void write_bssid(FILE *f, struct wpa_ssid *ssid)
425 {
426 char *value = wpa_config_get(ssid, "bssid");
427 if (value == NULL)
428 return;
429 fprintf(f, "\tbssid=%s\n", value);
430 os_free(value);
431 }
432
433
write_bssid_hint(FILE * f,struct wpa_ssid * ssid)434 static void write_bssid_hint(FILE *f, struct wpa_ssid *ssid)
435 {
436 char *value = wpa_config_get(ssid, "bssid_hint");
437
438 if (!value)
439 return;
440 fprintf(f, "\tbssid_hint=%s\n", value);
441 os_free(value);
442 }
443
444
write_psk(FILE * f,struct wpa_ssid * ssid)445 static void write_psk(FILE *f, struct wpa_ssid *ssid)
446 {
447 char *value;
448
449 if (ssid->mem_only_psk)
450 return;
451
452 value = wpa_config_get(ssid, "psk");
453 if (value == NULL)
454 return;
455 fprintf(f, "\tpsk=%s\n", value);
456 os_free(value);
457 }
458
459
write_proto(FILE * f,struct wpa_ssid * ssid)460 static void write_proto(FILE *f, struct wpa_ssid *ssid)
461 {
462 char *value;
463
464 if (ssid->proto == DEFAULT_PROTO)
465 return;
466
467 value = wpa_config_get(ssid, "proto");
468 if (value == NULL)
469 return;
470 if (value[0])
471 fprintf(f, "\tproto=%s\n", value);
472 os_free(value);
473 }
474
475
write_key_mgmt(FILE * f,struct wpa_ssid * ssid)476 static void write_key_mgmt(FILE *f, struct wpa_ssid *ssid)
477 {
478 char *value;
479
480 if (ssid->key_mgmt == DEFAULT_KEY_MGMT)
481 return;
482
483 value = wpa_config_get(ssid, "key_mgmt");
484 if (value == NULL)
485 return;
486 if (value[0])
487 fprintf(f, "\tkey_mgmt=%s\n", value);
488 os_free(value);
489 }
490
491
write_pairwise(FILE * f,struct wpa_ssid * ssid)492 static void write_pairwise(FILE *f, struct wpa_ssid *ssid)
493 {
494 char *value;
495
496 if (ssid->pairwise_cipher == DEFAULT_PAIRWISE)
497 return;
498
499 value = wpa_config_get(ssid, "pairwise");
500 if (value == NULL)
501 return;
502 if (value[0])
503 fprintf(f, "\tpairwise=%s\n", value);
504 os_free(value);
505 }
506
507
write_group(FILE * f,struct wpa_ssid * ssid)508 static void write_group(FILE *f, struct wpa_ssid *ssid)
509 {
510 char *value;
511
512 if (ssid->group_cipher == DEFAULT_GROUP)
513 return;
514
515 value = wpa_config_get(ssid, "group");
516 if (value == NULL)
517 return;
518 if (value[0])
519 fprintf(f, "\tgroup=%s\n", value);
520 os_free(value);
521 }
522
523
write_group_mgmt(FILE * f,struct wpa_ssid * ssid)524 static void write_group_mgmt(FILE *f, struct wpa_ssid *ssid)
525 {
526 char *value;
527
528 if (!ssid->group_mgmt_cipher)
529 return;
530
531 value = wpa_config_get(ssid, "group_mgmt");
532 if (!value)
533 return;
534 if (value[0])
535 fprintf(f, "\tgroup_mgmt=%s\n", value);
536 os_free(value);
537 }
538
539
write_auth_alg(FILE * f,struct wpa_ssid * ssid)540 static void write_auth_alg(FILE *f, struct wpa_ssid *ssid)
541 {
542 char *value;
543
544 if (ssid->auth_alg == 0)
545 return;
546
547 value = wpa_config_get(ssid, "auth_alg");
548 if (value == NULL)
549 return;
550 if (value[0])
551 fprintf(f, "\tauth_alg=%s\n", value);
552 os_free(value);
553 }
554
555
556 #ifdef IEEE8021X_EAPOL
write_eap(FILE * f,struct wpa_ssid * ssid)557 static void write_eap(FILE *f, struct wpa_ssid *ssid)
558 {
559 char *value;
560
561 value = wpa_config_get(ssid, "eap");
562 if (value == NULL)
563 return;
564
565 if (value[0])
566 fprintf(f, "\teap=%s\n", value);
567 os_free(value);
568 }
569 #endif /* IEEE8021X_EAPOL */
570
571
572 #ifdef CONFIG_WEP
write_wep_key(FILE * f,int idx,struct wpa_ssid * ssid)573 static void write_wep_key(FILE *f, int idx, struct wpa_ssid *ssid)
574 {
575 char field[20], *value;
576 int res;
577
578 res = os_snprintf(field, sizeof(field), "wep_key%d", idx);
579 if (os_snprintf_error(sizeof(field), res))
580 return;
581 value = wpa_config_get(ssid, field);
582 if (value) {
583 fprintf(f, "\t%s=%s\n", field, value);
584 os_free(value);
585 }
586 }
587 #endif /* CONFIG_WEP */
588
589
590 #ifdef CONFIG_P2P
591
write_go_p2p_dev_addr(FILE * f,struct wpa_ssid * ssid)592 static void write_go_p2p_dev_addr(FILE *f, struct wpa_ssid *ssid)
593 {
594 char *value = wpa_config_get(ssid, "go_p2p_dev_addr");
595 if (value == NULL)
596 return;
597 fprintf(f, "\tgo_p2p_dev_addr=%s\n", value);
598 os_free(value);
599 }
600
write_p2p_client_list(FILE * f,struct wpa_ssid * ssid)601 static void write_p2p_client_list(FILE *f, struct wpa_ssid *ssid)
602 {
603 char *value = wpa_config_get(ssid, "p2p_client_list");
604 if (value == NULL)
605 return;
606 fprintf(f, "\tp2p_client_list=%s\n", value);
607 os_free(value);
608 }
609
610
write_psk_list(FILE * f,struct wpa_ssid * ssid)611 static void write_psk_list(FILE *f, struct wpa_ssid *ssid)
612 {
613 struct psk_list_entry *psk;
614 char hex[32 * 2 + 1];
615
616 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) {
617 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk));
618 fprintf(f, "\tpsk_list=%s" MACSTR "-%s\n",
619 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex);
620 }
621 }
622
623 #endif /* CONFIG_P2P */
624
625
626 #ifdef CONFIG_MACSEC
627
write_mka_cak(FILE * f,struct wpa_ssid * ssid)628 static void write_mka_cak(FILE *f, struct wpa_ssid *ssid)
629 {
630 char *value;
631
632 if (!(ssid->mka_psk_set & MKA_PSK_SET_CAK))
633 return;
634
635 value = wpa_config_get(ssid, "mka_cak");
636 if (!value)
637 return;
638 fprintf(f, "\tmka_cak=%s\n", value);
639 os_free(value);
640 }
641
642
write_mka_ckn(FILE * f,struct wpa_ssid * ssid)643 static void write_mka_ckn(FILE *f, struct wpa_ssid *ssid)
644 {
645 char *value;
646
647 if (!(ssid->mka_psk_set & MKA_PSK_SET_CKN))
648 return;
649
650 value = wpa_config_get(ssid, "mka_ckn");
651 if (!value)
652 return;
653 fprintf(f, "\tmka_ckn=%s\n", value);
654 os_free(value);
655 }
656
657 #endif /* CONFIG_MACSEC */
658
659
wpa_config_write_network(FILE * f,struct wpa_ssid * ssid)660 static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
661 {
662 #define STR(t) write_str(f, #t, ssid)
663 #define INT(t) write_int(f, #t, ssid->t, 0)
664 #define INTe(t, m) write_int(f, #t, ssid->eap.m, 0)
665 #define INT_DEF(t, def) write_int(f, #t, ssid->t, def)
666 #define INT_DEFe(t, m, def) write_int(f, #t, ssid->eap.m, def)
667
668 STR(ssid);
669 INT(scan_ssid);
670 write_bssid(f, ssid);
671 write_bssid_hint(f, ssid);
672 write_str(f, "bssid_ignore", ssid);
673 write_str(f, "bssid_accept", ssid);
674 write_psk(f, ssid);
675 INT(mem_only_psk);
676 STR(sae_password);
677 STR(sae_password_id);
678 write_int(f, "sae_pwe", ssid->sae_pwe, DEFAULT_SAE_PWE);
679 write_proto(f, ssid);
680 write_key_mgmt(f, ssid);
681 INT_DEF(bg_scan_period, DEFAULT_BG_SCAN_PERIOD);
682 write_pairwise(f, ssid);
683 write_group(f, ssid);
684 write_group_mgmt(f, ssid);
685 write_auth_alg(f, ssid);
686 STR(bgscan);
687 STR(autoscan);
688 STR(scan_freq);
689 #ifdef IEEE8021X_EAPOL
690 write_eap(f, ssid);
691 STR(identity);
692 STR(anonymous_identity);
693 STR(imsi_identity);
694 STR(machine_identity);
695 STR(password);
696 STR(machine_password);
697 STR(ca_cert);
698 STR(ca_path);
699 STR(client_cert);
700 STR(private_key);
701 STR(private_key_passwd);
702 STR(dh_file);
703 STR(subject_match);
704 STR(check_cert_subject);
705 STR(altsubject_match);
706 STR(domain_suffix_match);
707 STR(domain_match);
708 STR(ca_cert2);
709 STR(ca_path2);
710 STR(client_cert2);
711 STR(private_key2);
712 STR(private_key2_passwd);
713 STR(dh_file2);
714 STR(subject_match2);
715 STR(check_cert_subject2);
716 STR(altsubject_match2);
717 STR(domain_suffix_match2);
718 STR(domain_match2);
719 STR(machine_ca_cert);
720 STR(machine_ca_path);
721 STR(machine_client_cert);
722 STR(machine_private_key);
723 STR(machine_private_key_passwd);
724 STR(machine_dh_file);
725 STR(machine_subject_match);
726 STR(machine_check_cert_subject);
727 STR(machine_altsubject_match);
728 STR(machine_domain_suffix_match);
729 STR(machine_domain_match);
730 STR(phase1);
731 STR(phase2);
732 STR(machine_phase2);
733 STR(pcsc);
734 STR(pin);
735 STR(engine_id);
736 STR(key_id);
737 STR(cert_id);
738 STR(ca_cert_id);
739 STR(key2_id);
740 STR(pin2);
741 STR(engine2_id);
742 STR(cert2_id);
743 STR(ca_cert2_id);
744 INTe(engine, cert.engine);
745 INTe(engine2, phase2_cert.engine);
746 INTe(machine_engine, machine_cert.engine);
747 INT_DEF(eapol_flags, DEFAULT_EAPOL_FLAGS);
748 STR(openssl_ciphers);
749 INTe(erp, erp);
750 #endif /* IEEE8021X_EAPOL */
751 #ifdef CONFIG_WEP
752 {
753 int i;
754
755 for (i = 0; i < 4; i++)
756 write_wep_key(f, i, ssid);
757 INT(wep_tx_keyidx);
758 }
759 #endif /* CONFIG_WEP */
760 INT(priority);
761 #ifdef IEEE8021X_EAPOL
762 INT_DEF(eap_workaround, DEFAULT_EAP_WORKAROUND);
763 STR(pac_file);
764 INT_DEFe(fragment_size, fragment_size, DEFAULT_FRAGMENT_SIZE);
765 INTe(ocsp, cert.ocsp);
766 INTe(ocsp2, phase2_cert.ocsp);
767 INTe(machine_ocsp, machine_cert.ocsp);
768 INT_DEFe(sim_num, sim_num, DEFAULT_USER_SELECTED_SIM);
769 #endif /* IEEE8021X_EAPOL */
770 INT(mode);
771 INT(no_auto_peer);
772 INT(mesh_fwding);
773 INT(frequency);
774 INT(enable_edmg);
775 INT(edmg_channel);
776 INT(fixed_freq);
777 #ifdef CONFIG_ACS
778 INT(acs);
779 #endif /* CONFIG_ACS */
780 write_int(f, "proactive_key_caching", ssid->proactive_key_caching, -1);
781 INT(disabled);
782 INT(mixed_cell);
783 INT_DEF(vht, 1);
784 INT_DEF(ht, 1);
785 INT(ht40);
786 INT_DEF(he, 1);
787 INT_DEF(max_oper_chwidth, DEFAULT_MAX_OPER_CHWIDTH);
788 INT(vht_center_freq1);
789 INT(vht_center_freq2);
790 INT(pbss);
791 INT(wps_disabled);
792 INT(fils_dh_group);
793 write_int(f, "ieee80211w", ssid->ieee80211w,
794 MGMT_FRAME_PROTECTION_DEFAULT);
795 STR(id_str);
796 #ifdef CONFIG_P2P
797 write_go_p2p_dev_addr(f, ssid);
798 write_p2p_client_list(f, ssid);
799 write_psk_list(f, ssid);
800 #endif /* CONFIG_P2P */
801 INT(ap_max_inactivity);
802 INT(dtim_period);
803 INT(beacon_int);
804 #ifdef CONFIG_MACSEC
805 INT(macsec_policy);
806 write_mka_cak(f, ssid);
807 write_mka_ckn(f, ssid);
808 INT(macsec_integ_only);
809 INT(macsec_replay_protect);
810 INT(macsec_replay_window);
811 INT(macsec_port);
812 INT_DEF(mka_priority, DEFAULT_PRIO_NOT_KEY_SERVER);
813 INT(macsec_csindex);
814 #endif /* CONFIG_MACSEC */
815 #ifdef CONFIG_HS20
816 INT(update_identifier);
817 STR(roaming_consortium_selection);
818 #endif /* CONFIG_HS20 */
819 write_int(f, "mac_addr", ssid->mac_addr, -1);
820 #ifdef CONFIG_MESH
821 STR(mesh_basic_rates);
822 INT_DEF(dot11MeshMaxRetries, DEFAULT_MESH_MAX_RETRIES);
823 INT_DEF(dot11MeshRetryTimeout, DEFAULT_MESH_RETRY_TIMEOUT);
824 INT_DEF(dot11MeshConfirmTimeout, DEFAULT_MESH_CONFIRM_TIMEOUT);
825 INT_DEF(dot11MeshHoldingTimeout, DEFAULT_MESH_HOLDING_TIMEOUT);
826 INT_DEF(mesh_rssi_threshold, DEFAULT_MESH_RSSI_THRESHOLD);
827 #endif /* CONFIG_MESH */
828 INT(wpa_ptk_rekey);
829 INT(wpa_deny_ptk0_rekey);
830 INT(group_rekey);
831 INT(ignore_broadcast_ssid);
832 #ifdef CONFIG_DPP
833 STR(dpp_connector);
834 STR(dpp_netaccesskey);
835 INT(dpp_netaccesskey_expiry);
836 STR(dpp_csign);
837 STR(dpp_pp_key);
838 INT(dpp_pfs);
839 #endif /* CONFIG_DPP */
840 INT(owe_group);
841 INT(owe_only);
842 INT(owe_ptk_workaround);
843 INT(multi_ap_backhaul_sta);
844 INT(ft_eap_pmksa_caching);
845 INT(beacon_prot);
846 INT(transition_disable);
847 INT(sae_pk);
848 #ifdef CONFIG_HT_OVERRIDES
849 INT_DEF(disable_ht, DEFAULT_DISABLE_HT);
850 INT_DEF(disable_ht40, DEFAULT_DISABLE_HT40);
851 INT_DEF(disable_sgi, DEFAULT_DISABLE_SGI);
852 INT_DEF(disable_ldpc, DEFAULT_DISABLE_LDPC);
853 INT(ht40_intolerant);
854 INT_DEF(tx_stbc, DEFAULT_TX_STBC);
855 INT_DEF(rx_stbc, DEFAULT_RX_STBC);
856 INT_DEF(disable_max_amsdu, DEFAULT_DISABLE_MAX_AMSDU);
857 INT_DEF(ampdu_factor, DEFAULT_AMPDU_FACTOR);
858 INT_DEF(ampdu_density, DEFAULT_AMPDU_DENSITY);
859 STR(ht_mcs);
860 #endif /* CONFIG_HT_OVERRIDES */
861 #ifdef CONFIG_VHT_OVERRIDES
862 INT(disable_vht);
863 INT(vht_capa);
864 INT(vht_capa_mask);
865 INT_DEF(vht_rx_mcs_nss_1, -1);
866 INT_DEF(vht_rx_mcs_nss_2, -1);
867 INT_DEF(vht_rx_mcs_nss_3, -1);
868 INT_DEF(vht_rx_mcs_nss_4, -1);
869 INT_DEF(vht_rx_mcs_nss_5, -1);
870 INT_DEF(vht_rx_mcs_nss_6, -1);
871 INT_DEF(vht_rx_mcs_nss_7, -1);
872 INT_DEF(vht_rx_mcs_nss_8, -1);
873 INT_DEF(vht_tx_mcs_nss_1, -1);
874 INT_DEF(vht_tx_mcs_nss_2, -1);
875 INT_DEF(vht_tx_mcs_nss_3, -1);
876 INT_DEF(vht_tx_mcs_nss_4, -1);
877 INT_DEF(vht_tx_mcs_nss_5, -1);
878 INT_DEF(vht_tx_mcs_nss_6, -1);
879 INT_DEF(vht_tx_mcs_nss_7, -1);
880 INT_DEF(vht_tx_mcs_nss_8, -1);
881 #endif /* CONFIG_VHT_OVERRIDES */
882 #ifdef CONFIG_HE_OVERRIDES
883 INT(disable_he);
884 #endif /* CONFIG_HE_OVERRIDES */
885
886 #undef STR
887 #undef INT
888 #undef INT_DEF
889 }
890
891
wpa_config_write_cred(FILE * f,struct wpa_cred * cred)892 static void wpa_config_write_cred(FILE *f, struct wpa_cred *cred)
893 {
894 size_t i;
895
896 if (cred->priority)
897 fprintf(f, "\tpriority=%d\n", cred->priority);
898 if (cred->pcsc)
899 fprintf(f, "\tpcsc=%d\n", cred->pcsc);
900 if (cred->realm)
901 fprintf(f, "\trealm=\"%s\"\n", cred->realm);
902 if (cred->username)
903 fprintf(f, "\tusername=\"%s\"\n", cred->username);
904 if (cred->password && cred->ext_password)
905 fprintf(f, "\tpassword=ext:%s\n", cred->password);
906 else if (cred->password)
907 fprintf(f, "\tpassword=\"%s\"\n", cred->password);
908 if (cred->ca_cert)
909 fprintf(f, "\tca_cert=\"%s\"\n", cred->ca_cert);
910 if (cred->client_cert)
911 fprintf(f, "\tclient_cert=\"%s\"\n", cred->client_cert);
912 if (cred->private_key)
913 fprintf(f, "\tprivate_key=\"%s\"\n", cred->private_key);
914 if (cred->private_key_passwd)
915 fprintf(f, "\tprivate_key_passwd=\"%s\"\n",
916 cred->private_key_passwd);
917 if (cred->imsi)
918 fprintf(f, "\timsi=\"%s\"\n", cred->imsi);
919 if (cred->milenage)
920 fprintf(f, "\tmilenage=\"%s\"\n", cred->milenage);
921 for (i = 0; i < cred->num_domain; i++)
922 fprintf(f, "\tdomain=\"%s\"\n", cred->domain[i]);
923 if (cred->domain_suffix_match)
924 fprintf(f, "\tdomain_suffix_match=\"%s\"\n",
925 cred->domain_suffix_match);
926 if (cred->roaming_consortium_len) {
927 fprintf(f, "\troaming_consortium=");
928 for (i = 0; i < cred->roaming_consortium_len; i++)
929 fprintf(f, "%02x", cred->roaming_consortium[i]);
930 fprintf(f, "\n");
931 }
932 if (cred->eap_method) {
933 const char *name;
934 name = eap_get_name(cred->eap_method[0].vendor,
935 cred->eap_method[0].method);
936 if (name)
937 fprintf(f, "\teap=%s\n", name);
938 }
939 if (cred->phase1)
940 fprintf(f, "\tphase1=\"%s\"\n", cred->phase1);
941 if (cred->phase2)
942 fprintf(f, "\tphase2=\"%s\"\n", cred->phase2);
943 if (cred->excluded_ssid) {
944 size_t j;
945 for (i = 0; i < cred->num_excluded_ssid; i++) {
946 struct excluded_ssid *e = &cred->excluded_ssid[i];
947 fprintf(f, "\texcluded_ssid=");
948 for (j = 0; j < e->ssid_len; j++)
949 fprintf(f, "%02x", e->ssid[j]);
950 fprintf(f, "\n");
951 }
952 }
953 if (cred->roaming_partner) {
954 for (i = 0; i < cred->num_roaming_partner; i++) {
955 struct roaming_partner *p = &cred->roaming_partner[i];
956 fprintf(f, "\troaming_partner=\"%s,%d,%u,%s\"\n",
957 p->fqdn, p->exact_match, p->priority,
958 p->country);
959 }
960 }
961 if (cred->update_identifier)
962 fprintf(f, "\tupdate_identifier=%d\n", cred->update_identifier);
963
964 if (cred->provisioning_sp)
965 fprintf(f, "\tprovisioning_sp=\"%s\"\n", cred->provisioning_sp);
966 if (cred->sp_priority)
967 fprintf(f, "\tsp_priority=%d\n", cred->sp_priority);
968
969 if (cred->min_dl_bandwidth_home)
970 fprintf(f, "\tmin_dl_bandwidth_home=%u\n",
971 cred->min_dl_bandwidth_home);
972 if (cred->min_ul_bandwidth_home)
973 fprintf(f, "\tmin_ul_bandwidth_home=%u\n",
974 cred->min_ul_bandwidth_home);
975 if (cred->min_dl_bandwidth_roaming)
976 fprintf(f, "\tmin_dl_bandwidth_roaming=%u\n",
977 cred->min_dl_bandwidth_roaming);
978 if (cred->min_ul_bandwidth_roaming)
979 fprintf(f, "\tmin_ul_bandwidth_roaming=%u\n",
980 cred->min_ul_bandwidth_roaming);
981
982 if (cred->max_bss_load)
983 fprintf(f, "\tmax_bss_load=%u\n",
984 cred->max_bss_load);
985
986 if (cred->ocsp)
987 fprintf(f, "\tocsp=%d\n", cred->ocsp);
988
989 if (cred->num_req_conn_capab) {
990 for (i = 0; i < cred->num_req_conn_capab; i++) {
991 int *ports;
992
993 fprintf(f, "\treq_conn_capab=%u",
994 cred->req_conn_capab_proto[i]);
995 ports = cred->req_conn_capab_port[i];
996 if (ports) {
997 int j;
998 for (j = 0; ports[j] != -1; j++) {
999 fprintf(f, "%s%d", j > 0 ? "," : ":",
1000 ports[j]);
1001 }
1002 }
1003 fprintf(f, "\n");
1004 }
1005 }
1006
1007 if (cred->required_roaming_consortium_len) {
1008 fprintf(f, "\trequired_roaming_consortium=");
1009 for (i = 0; i < cred->required_roaming_consortium_len; i++)
1010 fprintf(f, "%02x",
1011 cred->required_roaming_consortium[i]);
1012 fprintf(f, "\n");
1013 }
1014
1015 if (cred->num_roaming_consortiums) {
1016 size_t j;
1017
1018 fprintf(f, "\troaming_consortiums=\"");
1019 for (i = 0; i < cred->num_roaming_consortiums; i++) {
1020 if (i > 0)
1021 fprintf(f, ",");
1022 for (j = 0; j < cred->roaming_consortiums_len[i]; j++)
1023 fprintf(f, "%02x",
1024 cred->roaming_consortiums[i][j]);
1025 }
1026 fprintf(f, "\"\n");
1027 }
1028
1029 if (cred->sim_num != DEFAULT_USER_SELECTED_SIM)
1030 fprintf(f, "\tsim_num=%d\n", cred->sim_num);
1031
1032 if (cred->engine)
1033 fprintf(f, "\tengine=%d\n", cred->engine);
1034 if (cred->engine_id)
1035 fprintf(f, "\tengine_id=\"%s\"\n", cred->engine_id);
1036 if (cred->key_id)
1037 fprintf(f, "\tkey_id=\"%s\"\n", cred->key_id);
1038 if (cred->cert_id)
1039 fprintf(f, "\tcert_id=\"%s\"\n", cred->cert_id);
1040 if (cred->ca_cert_id)
1041 fprintf(f, "\tca_cert_id=\"%s\"\n", cred->ca_cert_id);
1042 }
1043
1044
1045 #ifndef CONFIG_NO_CONFIG_BLOBS
wpa_config_write_blob(FILE * f,struct wpa_config_blob * blob)1046 static int wpa_config_write_blob(FILE *f, struct wpa_config_blob *blob)
1047 {
1048 char *encoded;
1049
1050 encoded = base64_encode(blob->data, blob->len, NULL);
1051 if (encoded == NULL)
1052 return -1;
1053
1054 fprintf(f, "\nblob-base64-%s={\n%s}\n", blob->name, encoded);
1055 os_free(encoded);
1056 return 0;
1057 }
1058 #endif /* CONFIG_NO_CONFIG_BLOBS */
1059
1060
write_global_bin(FILE * f,const char * field,const struct wpabuf * val)1061 static void write_global_bin(FILE *f, const char *field,
1062 const struct wpabuf *val)
1063 {
1064 size_t i;
1065 const u8 *pos;
1066
1067 if (val == NULL)
1068 return;
1069
1070 fprintf(f, "%s=", field);
1071 pos = wpabuf_head(val);
1072 for (i = 0; i < wpabuf_len(val); i++)
1073 fprintf(f, "%02X", *pos++);
1074 fprintf(f, "\n");
1075 }
1076
1077
wpa_config_write_global(FILE * f,struct wpa_config * config)1078 static void wpa_config_write_global(FILE *f, struct wpa_config *config)
1079 {
1080 #ifdef CONFIG_CTRL_IFACE
1081 if (config->ctrl_interface)
1082 fprintf(f, "ctrl_interface=%s\n", config->ctrl_interface);
1083 if (config->ctrl_interface_group)
1084 fprintf(f, "ctrl_interface_group=%s\n",
1085 config->ctrl_interface_group);
1086 #endif /* CONFIG_CTRL_IFACE */
1087 if (config->eapol_version != DEFAULT_EAPOL_VERSION)
1088 fprintf(f, "eapol_version=%d\n", config->eapol_version);
1089 if (config->ap_scan != DEFAULT_AP_SCAN)
1090 fprintf(f, "ap_scan=%d\n", config->ap_scan);
1091 if (config->disable_scan_offload)
1092 fprintf(f, "disable_scan_offload=%d\n",
1093 config->disable_scan_offload);
1094 if (config->fast_reauth != DEFAULT_FAST_REAUTH)
1095 fprintf(f, "fast_reauth=%d\n", config->fast_reauth);
1096 if (config->opensc_engine_path)
1097 fprintf(f, "opensc_engine_path=%s\n",
1098 config->opensc_engine_path);
1099 if (config->pkcs11_engine_path)
1100 fprintf(f, "pkcs11_engine_path=%s\n",
1101 config->pkcs11_engine_path);
1102 if (config->pkcs11_module_path)
1103 fprintf(f, "pkcs11_module_path=%s\n",
1104 config->pkcs11_module_path);
1105 if (config->openssl_ciphers)
1106 fprintf(f, "openssl_ciphers=%s\n", config->openssl_ciphers);
1107 if (config->pcsc_reader)
1108 fprintf(f, "pcsc_reader=%s\n", config->pcsc_reader);
1109 if (config->pcsc_pin)
1110 fprintf(f, "pcsc_pin=%s\n", config->pcsc_pin);
1111 if (config->driver_param)
1112 fprintf(f, "driver_param=%s\n", config->driver_param);
1113 if (config->dot11RSNAConfigPMKLifetime)
1114 fprintf(f, "dot11RSNAConfigPMKLifetime=%u\n",
1115 config->dot11RSNAConfigPMKLifetime);
1116 if (config->dot11RSNAConfigPMKReauthThreshold)
1117 fprintf(f, "dot11RSNAConfigPMKReauthThreshold=%u\n",
1118 config->dot11RSNAConfigPMKReauthThreshold);
1119 if (config->dot11RSNAConfigSATimeout)
1120 fprintf(f, "dot11RSNAConfigSATimeout=%u\n",
1121 config->dot11RSNAConfigSATimeout);
1122 if (config->update_config)
1123 fprintf(f, "update_config=%d\n", config->update_config);
1124 #ifdef CONFIG_WPS
1125 if (!is_nil_uuid(config->uuid)) {
1126 char buf[40];
1127 uuid_bin2str(config->uuid, buf, sizeof(buf));
1128 fprintf(f, "uuid=%s\n", buf);
1129 }
1130 if (config->auto_uuid)
1131 fprintf(f, "auto_uuid=%d\n", config->auto_uuid);
1132 if (config->device_name)
1133 fprintf(f, "device_name=%s\n", config->device_name);
1134 if (config->manufacturer)
1135 fprintf(f, "manufacturer=%s\n", config->manufacturer);
1136 if (config->model_name)
1137 fprintf(f, "model_name=%s\n", config->model_name);
1138 if (config->model_number)
1139 fprintf(f, "model_number=%s\n", config->model_number);
1140 if (config->serial_number)
1141 fprintf(f, "serial_number=%s\n", config->serial_number);
1142 {
1143 char _buf[WPS_DEV_TYPE_BUFSIZE], *buf;
1144 buf = wps_dev_type_bin2str(config->device_type,
1145 _buf, sizeof(_buf));
1146 if (os_strcmp(buf, "0-00000000-0") != 0)
1147 fprintf(f, "device_type=%s\n", buf);
1148 }
1149 if (WPA_GET_BE32(config->os_version))
1150 fprintf(f, "os_version=%08x\n",
1151 WPA_GET_BE32(config->os_version));
1152 if (config->config_methods)
1153 fprintf(f, "config_methods=%s\n", config->config_methods);
1154 if (config->wps_cred_processing)
1155 fprintf(f, "wps_cred_processing=%d\n",
1156 config->wps_cred_processing);
1157 if (config->wps_cred_add_sae)
1158 fprintf(f, "wps_cred_add_sae=%d\n",
1159 config->wps_cred_add_sae);
1160 if (config->wps_vendor_ext_m1) {
1161 int i, len = wpabuf_len(config->wps_vendor_ext_m1);
1162 const u8 *p = wpabuf_head_u8(config->wps_vendor_ext_m1);
1163 if (len > 0) {
1164 fprintf(f, "wps_vendor_ext_m1=");
1165 for (i = 0; i < len; i++)
1166 fprintf(f, "%02x", *p++);
1167 fprintf(f, "\n");
1168 }
1169 }
1170 #endif /* CONFIG_WPS */
1171 #ifdef CONFIG_P2P
1172 {
1173 int i;
1174 char _buf[WPS_DEV_TYPE_BUFSIZE], *buf;
1175
1176 for (i = 0; i < config->num_sec_device_types; i++) {
1177 buf = wps_dev_type_bin2str(config->sec_device_type[i],
1178 _buf, sizeof(_buf));
1179 if (buf)
1180 fprintf(f, "sec_device_type=%s\n", buf);
1181 }
1182 }
1183 if (config->p2p_listen_reg_class)
1184 fprintf(f, "p2p_listen_reg_class=%d\n",
1185 config->p2p_listen_reg_class);
1186 if (config->p2p_listen_channel)
1187 fprintf(f, "p2p_listen_channel=%d\n",
1188 config->p2p_listen_channel);
1189 if (config->p2p_oper_reg_class)
1190 fprintf(f, "p2p_oper_reg_class=%d\n",
1191 config->p2p_oper_reg_class);
1192 if (config->p2p_oper_channel)
1193 fprintf(f, "p2p_oper_channel=%d\n", config->p2p_oper_channel);
1194 if (config->p2p_go_intent != DEFAULT_P2P_GO_INTENT)
1195 fprintf(f, "p2p_go_intent=%d\n", config->p2p_go_intent);
1196 if (config->p2p_ssid_postfix)
1197 fprintf(f, "p2p_ssid_postfix=%s\n", config->p2p_ssid_postfix);
1198 if (config->persistent_reconnect)
1199 fprintf(f, "persistent_reconnect=%d\n",
1200 config->persistent_reconnect);
1201 if (config->p2p_intra_bss != DEFAULT_P2P_INTRA_BSS)
1202 fprintf(f, "p2p_intra_bss=%d\n", config->p2p_intra_bss);
1203 if (config->p2p_group_idle)
1204 fprintf(f, "p2p_group_idle=%d\n", config->p2p_group_idle);
1205 if (config->p2p_passphrase_len)
1206 fprintf(f, "p2p_passphrase_len=%u\n",
1207 config->p2p_passphrase_len);
1208 if (config->p2p_pref_chan) {
1209 unsigned int i;
1210 fprintf(f, "p2p_pref_chan=");
1211 for (i = 0; i < config->num_p2p_pref_chan; i++) {
1212 fprintf(f, "%s%u:%u", i > 0 ? "," : "",
1213 config->p2p_pref_chan[i].op_class,
1214 config->p2p_pref_chan[i].chan);
1215 }
1216 fprintf(f, "\n");
1217 }
1218 if (config->p2p_no_go_freq.num) {
1219 char *val = freq_range_list_str(&config->p2p_no_go_freq);
1220 if (val) {
1221 fprintf(f, "p2p_no_go_freq=%s\n", val);
1222 os_free(val);
1223 }
1224 }
1225 if (config->p2p_add_cli_chan)
1226 fprintf(f, "p2p_add_cli_chan=%d\n", config->p2p_add_cli_chan);
1227 if (config->p2p_optimize_listen_chan !=
1228 DEFAULT_P2P_OPTIMIZE_LISTEN_CHAN)
1229 fprintf(f, "p2p_optimize_listen_chan=%d\n",
1230 config->p2p_optimize_listen_chan);
1231 if (config->p2p_go_ht40)
1232 fprintf(f, "p2p_go_ht40=%d\n", config->p2p_go_ht40);
1233 if (config->p2p_go_vht)
1234 fprintf(f, "p2p_go_vht=%d\n", config->p2p_go_vht);
1235 if (config->p2p_go_he)
1236 fprintf(f, "p2p_go_he=%d\n", config->p2p_go_he);
1237 if (config->p2p_go_edmg)
1238 fprintf(f, "p2p_go_edmg=%d\n", config->p2p_go_edmg);
1239 if (config->p2p_go_ctwindow != DEFAULT_P2P_GO_CTWINDOW)
1240 fprintf(f, "p2p_go_ctwindow=%d\n", config->p2p_go_ctwindow);
1241 if (config->p2p_disabled)
1242 fprintf(f, "p2p_disabled=%d\n", config->p2p_disabled);
1243 if (config->p2p_no_group_iface)
1244 fprintf(f, "p2p_no_group_iface=%d\n",
1245 config->p2p_no_group_iface);
1246 if (config->p2p_ignore_shared_freq)
1247 fprintf(f, "p2p_ignore_shared_freq=%d\n",
1248 config->p2p_ignore_shared_freq);
1249 if (config->p2p_cli_probe)
1250 fprintf(f, "p2p_cli_probe=%d\n", config->p2p_cli_probe);
1251 if (config->p2p_go_freq_change_policy != DEFAULT_P2P_GO_FREQ_MOVE)
1252 fprintf(f, "p2p_go_freq_change_policy=%u\n",
1253 config->p2p_go_freq_change_policy);
1254
1255 if (config->p2p_6ghz_disable)
1256 fprintf(f, "p2p_6ghz_disable=%d\n", config->p2p_6ghz_disable);
1257
1258 if (WPA_GET_BE32(config->ip_addr_go))
1259 fprintf(f, "ip_addr_go=%u.%u.%u.%u\n",
1260 config->ip_addr_go[0], config->ip_addr_go[1],
1261 config->ip_addr_go[2], config->ip_addr_go[3]);
1262 if (WPA_GET_BE32(config->ip_addr_mask))
1263 fprintf(f, "ip_addr_mask=%u.%u.%u.%u\n",
1264 config->ip_addr_mask[0], config->ip_addr_mask[1],
1265 config->ip_addr_mask[2], config->ip_addr_mask[3]);
1266 if (WPA_GET_BE32(config->ip_addr_start))
1267 fprintf(f, "ip_addr_start=%u.%u.%u.%u\n",
1268 config->ip_addr_start[0], config->ip_addr_start[1],
1269 config->ip_addr_start[2], config->ip_addr_start[3]);
1270 if (WPA_GET_BE32(config->ip_addr_end))
1271 fprintf(f, "ip_addr_end=%u.%u.%u.%u\n",
1272 config->ip_addr_end[0], config->ip_addr_end[1],
1273 config->ip_addr_end[2], config->ip_addr_end[3]);
1274 #endif /* CONFIG_P2P */
1275 if (config->country[0] && config->country[1]) {
1276 fprintf(f, "country=%c%c\n",
1277 config->country[0], config->country[1]);
1278 }
1279 if (config->bss_max_count != DEFAULT_BSS_MAX_COUNT)
1280 fprintf(f, "bss_max_count=%u\n", config->bss_max_count);
1281 if (config->bss_expiration_age != DEFAULT_BSS_EXPIRATION_AGE)
1282 fprintf(f, "bss_expiration_age=%u\n",
1283 config->bss_expiration_age);
1284 if (config->bss_expiration_scan_count !=
1285 DEFAULT_BSS_EXPIRATION_SCAN_COUNT)
1286 fprintf(f, "bss_expiration_scan_count=%u\n",
1287 config->bss_expiration_scan_count);
1288 if (config->filter_ssids)
1289 fprintf(f, "filter_ssids=%d\n", config->filter_ssids);
1290 if (config->filter_rssi)
1291 fprintf(f, "filter_rssi=%d\n", config->filter_rssi);
1292 if (config->max_num_sta != DEFAULT_MAX_NUM_STA)
1293 fprintf(f, "max_num_sta=%u\n", config->max_num_sta);
1294 if (config->ap_isolate != DEFAULT_AP_ISOLATE)
1295 fprintf(f, "ap_isolate=%u\n", config->ap_isolate);
1296 if (config->disassoc_low_ack)
1297 fprintf(f, "disassoc_low_ack=%d\n", config->disassoc_low_ack);
1298 #ifdef CONFIG_HS20
1299 if (config->hs20)
1300 fprintf(f, "hs20=1\n");
1301 #endif /* CONFIG_HS20 */
1302 #ifdef CONFIG_INTERWORKING
1303 if (config->interworking)
1304 fprintf(f, "interworking=%d\n", config->interworking);
1305 if (!is_zero_ether_addr(config->hessid))
1306 fprintf(f, "hessid=" MACSTR "\n", MAC2STR(config->hessid));
1307 if (config->access_network_type != DEFAULT_ACCESS_NETWORK_TYPE)
1308 fprintf(f, "access_network_type=%d\n",
1309 config->access_network_type);
1310 if (config->go_interworking)
1311 fprintf(f, "go_interworking=%d\n", config->go_interworking);
1312 if (config->go_access_network_type)
1313 fprintf(f, "go_access_network_type=%d\n",
1314 config->go_access_network_type);
1315 if (config->go_internet)
1316 fprintf(f, "go_internet=%d\n", config->go_internet);
1317 if (config->go_venue_group)
1318 fprintf(f, "go_venue_group=%d\n", config->go_venue_group);
1319 if (config->go_venue_type)
1320 fprintf(f, "go_venue_type=%d\n", config->go_venue_type);
1321 #endif /* CONFIG_INTERWORKING */
1322 if (config->pbc_in_m1)
1323 fprintf(f, "pbc_in_m1=%d\n", config->pbc_in_m1);
1324 if (config->wps_nfc_pw_from_config) {
1325 if (config->wps_nfc_dev_pw_id)
1326 fprintf(f, "wps_nfc_dev_pw_id=%d\n",
1327 config->wps_nfc_dev_pw_id);
1328 write_global_bin(f, "wps_nfc_dh_pubkey",
1329 config->wps_nfc_dh_pubkey);
1330 write_global_bin(f, "wps_nfc_dh_privkey",
1331 config->wps_nfc_dh_privkey);
1332 write_global_bin(f, "wps_nfc_dev_pw", config->wps_nfc_dev_pw);
1333 }
1334
1335 if (config->ext_password_backend)
1336 fprintf(f, "ext_password_backend=%s\n",
1337 config->ext_password_backend);
1338 if (config->p2p_go_max_inactivity != DEFAULT_P2P_GO_MAX_INACTIVITY)
1339 fprintf(f, "p2p_go_max_inactivity=%d\n",
1340 config->p2p_go_max_inactivity);
1341 if (config->auto_interworking)
1342 fprintf(f, "auto_interworking=%d\n",
1343 config->auto_interworking);
1344 if (config->okc)
1345 fprintf(f, "okc=%d\n", config->okc);
1346 if (config->pmf)
1347 fprintf(f, "pmf=%d\n", config->pmf);
1348 if (config->dtim_period)
1349 fprintf(f, "dtim_period=%d\n", config->dtim_period);
1350 if (config->beacon_int)
1351 fprintf(f, "beacon_int=%d\n", config->beacon_int);
1352
1353 if (config->sae_groups) {
1354 int i;
1355 fprintf(f, "sae_groups=");
1356 for (i = 0; config->sae_groups[i] > 0; i++) {
1357 fprintf(f, "%s%d", i > 0 ? " " : "",
1358 config->sae_groups[i]);
1359 }
1360 fprintf(f, "\n");
1361 }
1362
1363 if (config->sae_pwe)
1364 fprintf(f, "sae_pwe=%d\n", config->sae_pwe);
1365
1366 if (config->sae_pmkid_in_assoc)
1367 fprintf(f, "sae_pmkid_in_assoc=%d\n",
1368 config->sae_pmkid_in_assoc);
1369
1370 if (config->ap_vendor_elements) {
1371 int i, len = wpabuf_len(config->ap_vendor_elements);
1372 const u8 *p = wpabuf_head_u8(config->ap_vendor_elements);
1373 if (len > 0) {
1374 fprintf(f, "ap_vendor_elements=");
1375 for (i = 0; i < len; i++)
1376 fprintf(f, "%02x", *p++);
1377 fprintf(f, "\n");
1378 }
1379 }
1380
1381 if (config->ap_assocresp_elements) {
1382 int i, len = wpabuf_len(config->ap_assocresp_elements);
1383 const u8 *p = wpabuf_head_u8(config->ap_assocresp_elements);
1384
1385 if (len > 0) {
1386 fprintf(f, "ap_assocresp_elements=");
1387 for (i = 0; i < len; i++)
1388 fprintf(f, "%02x", *p++);
1389 fprintf(f, "\n");
1390 }
1391 }
1392
1393 if (config->ignore_old_scan_res)
1394 fprintf(f, "ignore_old_scan_res=%d\n",
1395 config->ignore_old_scan_res);
1396
1397 if (config->freq_list && config->freq_list[0]) {
1398 int i;
1399 fprintf(f, "freq_list=");
1400 for (i = 0; config->freq_list[i]; i++) {
1401 fprintf(f, "%s%d", i > 0 ? " " : "",
1402 config->freq_list[i]);
1403 }
1404 fprintf(f, "\n");
1405 }
1406 if (config->initial_freq_list && config->initial_freq_list[0]) {
1407 int i;
1408 fprintf(f, "initial_freq_list=");
1409 for (i = 0; config->initial_freq_list[i]; i++) {
1410 fprintf(f, "%s%d", i > 0 ? " " : "",
1411 config->initial_freq_list[i]);
1412 }
1413 fprintf(f, "\n");
1414 }
1415 if (config->scan_cur_freq != DEFAULT_SCAN_CUR_FREQ)
1416 fprintf(f, "scan_cur_freq=%d\n", config->scan_cur_freq);
1417
1418 if (config->scan_res_valid_for_connect !=
1419 DEFAULT_SCAN_RES_VALID_FOR_CONNECT)
1420 fprintf(f, "scan_res_valid_for_connect=%d\n",
1421 config->scan_res_valid_for_connect);
1422
1423 if (config->sched_scan_interval)
1424 fprintf(f, "sched_scan_interval=%u\n",
1425 config->sched_scan_interval);
1426
1427 if (config->sched_scan_start_delay)
1428 fprintf(f, "sched_scan_start_delay=%u\n",
1429 config->sched_scan_start_delay);
1430
1431 if (config->external_sim)
1432 fprintf(f, "external_sim=%d\n", config->external_sim);
1433
1434 if (config->tdls_external_control)
1435 fprintf(f, "tdls_external_control=%d\n",
1436 config->tdls_external_control);
1437
1438 if (config->wowlan_triggers)
1439 fprintf(f, "wowlan_triggers=%s\n",
1440 config->wowlan_triggers);
1441
1442 if (config->bgscan)
1443 fprintf(f, "bgscan=\"%s\"\n", config->bgscan);
1444
1445 if (config->autoscan)
1446 fprintf(f, "autoscan=%s\n", config->autoscan);
1447
1448 if (config->p2p_search_delay != DEFAULT_P2P_SEARCH_DELAY)
1449 fprintf(f, "p2p_search_delay=%u\n",
1450 config->p2p_search_delay);
1451
1452 if (config->mac_addr)
1453 fprintf(f, "mac_addr=%d\n", config->mac_addr);
1454
1455 if (config->rand_addr_lifetime != DEFAULT_RAND_ADDR_LIFETIME)
1456 fprintf(f, "rand_addr_lifetime=%u\n",
1457 config->rand_addr_lifetime);
1458
1459 if (config->preassoc_mac_addr)
1460 fprintf(f, "preassoc_mac_addr=%d\n", config->preassoc_mac_addr);
1461
1462 if (config->key_mgmt_offload != DEFAULT_KEY_MGMT_OFFLOAD)
1463 fprintf(f, "key_mgmt_offload=%d\n", config->key_mgmt_offload);
1464
1465 if (config->user_mpm != DEFAULT_USER_MPM)
1466 fprintf(f, "user_mpm=%d\n", config->user_mpm);
1467
1468 if (config->max_peer_links != DEFAULT_MAX_PEER_LINKS)
1469 fprintf(f, "max_peer_links=%d\n", config->max_peer_links);
1470
1471 if (config->cert_in_cb != DEFAULT_CERT_IN_CB)
1472 fprintf(f, "cert_in_cb=%d\n", config->cert_in_cb);
1473
1474 if (config->mesh_max_inactivity != DEFAULT_MESH_MAX_INACTIVITY)
1475 fprintf(f, "mesh_max_inactivity=%d\n",
1476 config->mesh_max_inactivity);
1477
1478 if (config->mesh_fwding != DEFAULT_MESH_FWDING)
1479 fprintf(f, "mesh_fwding=%d\n", config->mesh_fwding);
1480
1481 if (config->dot11RSNASAERetransPeriod !=
1482 DEFAULT_DOT11_RSNA_SAE_RETRANS_PERIOD)
1483 fprintf(f, "dot11RSNASAERetransPeriod=%d\n",
1484 config->dot11RSNASAERetransPeriod);
1485
1486 if (config->passive_scan)
1487 fprintf(f, "passive_scan=%d\n", config->passive_scan);
1488
1489 if (config->reassoc_same_bss_optim)
1490 fprintf(f, "reassoc_same_bss_optim=%d\n",
1491 config->reassoc_same_bss_optim);
1492
1493 if (config->wps_priority)
1494 fprintf(f, "wps_priority=%d\n", config->wps_priority);
1495
1496 if (config->wpa_rsc_relaxation != DEFAULT_WPA_RSC_RELAXATION)
1497 fprintf(f, "wpa_rsc_relaxation=%d\n",
1498 config->wpa_rsc_relaxation);
1499
1500 if (config->sched_scan_plans)
1501 fprintf(f, "sched_scan_plans=%s\n", config->sched_scan_plans);
1502
1503 #ifdef CONFIG_MBO
1504 if (config->non_pref_chan)
1505 fprintf(f, "non_pref_chan=%s\n", config->non_pref_chan);
1506 if (config->mbo_cell_capa != DEFAULT_MBO_CELL_CAPA)
1507 fprintf(f, "mbo_cell_capa=%u\n", config->mbo_cell_capa);
1508 if (config->disassoc_imminent_rssi_threshold !=
1509 DEFAULT_DISASSOC_IMMINENT_RSSI_THRESHOLD)
1510 fprintf(f, "disassoc_imminent_rssi_threshold=%d\n",
1511 config->disassoc_imminent_rssi_threshold);
1512 if (config->oce != DEFAULT_OCE_SUPPORT)
1513 fprintf(f, "oce=%u\n", config->oce);
1514 #endif /* CONFIG_MBO */
1515
1516 if (config->gas_address3)
1517 fprintf(f, "gas_address3=%d\n", config->gas_address3);
1518
1519 if (config->ftm_responder)
1520 fprintf(f, "ftm_responder=%d\n", config->ftm_responder);
1521 if (config->ftm_initiator)
1522 fprintf(f, "ftm_initiator=%d\n", config->ftm_initiator);
1523
1524 if (config->osu_dir)
1525 fprintf(f, "osu_dir=%s\n", config->osu_dir);
1526
1527 if (config->fst_group_id)
1528 fprintf(f, "fst_group_id=%s\n", config->fst_group_id);
1529 if (config->fst_priority)
1530 fprintf(f, "fst_priority=%d\n", config->fst_priority);
1531 if (config->fst_llt)
1532 fprintf(f, "fst_llt=%d\n", config->fst_llt);
1533
1534 if (config->gas_rand_addr_lifetime != DEFAULT_RAND_ADDR_LIFETIME)
1535 fprintf(f, "gas_rand_addr_lifetime=%u\n",
1536 config->gas_rand_addr_lifetime);
1537 if (config->gas_rand_mac_addr)
1538 fprintf(f, "gas_rand_mac_addr=%d\n", config->gas_rand_mac_addr);
1539 if (config->dpp_config_processing)
1540 fprintf(f, "dpp_config_processing=%d\n",
1541 config->dpp_config_processing);
1542 if (config->coloc_intf_reporting)
1543 fprintf(f, "coloc_intf_reporting=%d\n",
1544 config->coloc_intf_reporting);
1545 if (config->p2p_device_random_mac_addr)
1546 fprintf(f, "p2p_device_random_mac_addr=%d\n",
1547 config->p2p_device_random_mac_addr);
1548 if (!is_zero_ether_addr(config->p2p_device_persistent_mac_addr))
1549 fprintf(f, "p2p_device_persistent_mac_addr=" MACSTR "\n",
1550 MAC2STR(config->p2p_device_persistent_mac_addr));
1551 if (config->p2p_interface_random_mac_addr)
1552 fprintf(f, "p2p_interface_random_mac_addr=%d\n",
1553 config->p2p_interface_random_mac_addr);
1554 if (config->disable_btm)
1555 fprintf(f, "disable_btm=1\n");
1556 if (config->extended_key_id != DEFAULT_EXTENDED_KEY_ID)
1557 fprintf(f, "extended_key_id=%d\n",
1558 config->extended_key_id);
1559 if (config->wowlan_disconnect_on_deinit)
1560 fprintf(f, "wowlan_disconnect_on_deinit=%d\n",
1561 config->wowlan_disconnect_on_deinit);
1562 }
1563
1564 #endif /* CONFIG_NO_CONFIG_WRITE */
1565
1566
wpa_config_write(const char * name,struct wpa_config * config)1567 int wpa_config_write(const char *name, struct wpa_config *config)
1568 {
1569 #ifndef CONFIG_NO_CONFIG_WRITE
1570 FILE *f;
1571 struct wpa_ssid *ssid;
1572 struct wpa_cred *cred;
1573 #ifndef CONFIG_NO_CONFIG_BLOBS
1574 struct wpa_config_blob *blob;
1575 #endif /* CONFIG_NO_CONFIG_BLOBS */
1576 int ret = 0;
1577 const char *orig_name = name;
1578 int tmp_len;
1579 char *tmp_name;
1580
1581 if (!name) {
1582 wpa_printf(MSG_ERROR, "No configuration file for writing");
1583 return -1;
1584 }
1585
1586 tmp_len = os_strlen(name) + 5; /* allow space for .tmp suffix */
1587 tmp_name = os_malloc(tmp_len);
1588 if (tmp_name) {
1589 os_snprintf(tmp_name, tmp_len, "%s.tmp", name);
1590 name = tmp_name;
1591 }
1592
1593 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
1594
1595 f = fopen(name, "w");
1596 if (f == NULL) {
1597 wpa_printf(MSG_DEBUG, "Failed to open '%s' for writing", name);
1598 os_free(tmp_name);
1599 return -1;
1600 }
1601
1602 wpa_config_write_global(f, config);
1603
1604 for (cred = config->cred; cred; cred = cred->next) {
1605 if (cred->temporary)
1606 continue;
1607 fprintf(f, "\ncred={\n");
1608 wpa_config_write_cred(f, cred);
1609 fprintf(f, "}\n");
1610 }
1611
1612 for (ssid = config->ssid; ssid; ssid = ssid->next) {
1613 if (ssid->key_mgmt == WPA_KEY_MGMT_WPS || ssid->temporary)
1614 continue; /* do not save temporary networks */
1615 if (wpa_key_mgmt_wpa_psk_no_sae(ssid->key_mgmt) &&
1616 !ssid->psk_set && !ssid->passphrase)
1617 continue; /* do not save invalid network */
1618 if (wpa_key_mgmt_sae(ssid->key_mgmt) &&
1619 !ssid->passphrase && !ssid->sae_password)
1620 continue; /* do not save invalid network */
1621 fprintf(f, "\nnetwork={\n");
1622 wpa_config_write_network(f, ssid);
1623 fprintf(f, "}\n");
1624 }
1625
1626 #ifndef CONFIG_NO_CONFIG_BLOBS
1627 for (blob = config->blobs; blob; blob = blob->next) {
1628 ret = wpa_config_write_blob(f, blob);
1629 if (ret)
1630 break;
1631 }
1632 #endif /* CONFIG_NO_CONFIG_BLOBS */
1633
1634 os_fdatasync(f);
1635
1636 fclose(f);
1637
1638 if (tmp_name) {
1639 int chmod_ret = 0;
1640
1641 #ifdef ANDROID
1642 chmod_ret = chmod(tmp_name,
1643 S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
1644 #endif /* ANDROID */
1645 if (chmod_ret != 0 || rename(tmp_name, orig_name) != 0)
1646 ret = -1;
1647
1648 os_free(tmp_name);
1649 }
1650
1651 wpa_printf(MSG_DEBUG, "Configuration file '%s' written %ssuccessfully",
1652 orig_name, ret ? "un" : "");
1653 return ret;
1654 #else /* CONFIG_NO_CONFIG_WRITE */
1655 return -1;
1656 #endif /* CONFIG_NO_CONFIG_WRITE */
1657 }
1658