393233b8b46c689f522664bf7a2e1be42c77d040
[openwrt/openwrt.git] / package / network / services / hostapd / files / hostapd.sh
1 . /lib/functions/network.sh
2
3 hostapd_set_bss_options() {
4 local var="$1"
5 local vif="$2"
6 local enc wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wps_possible wpa_key_mgmt
7
8 config_get enc "$vif" encryption "none"
9 config_get wep_rekey "$vif" wep_rekey # 300
10 config_get wpa_group_rekey "$vif" wpa_group_rekey # 300
11 config_get wpa_pair_rekey "$vif" wpa_pair_rekey # 300
12 config_get wpa_master_rekey "$vif" wpa_master_rekey # 640
13 config_get_bool ap_isolate "$vif" isolate 0
14 config_get_bool disassoc_low_ack "$vif" disassoc_low_ack 1
15 config_get max_num_sta "$vif" max_num_sta 0
16 config_get max_inactivity "$vif" max_inactivity 0
17 config_get_bool preamble "$vif" short_preamble 1
18
19 config_get device "$vif" device
20 config_get hwmode "$device" hwmode
21 config_get phy "$device" phy
22
23 append "$var" "ctrl_interface=/var/run/hostapd-$phy" "$N"
24
25 if [ "$ap_isolate" -gt 0 ]; then
26 append "$var" "ap_isolate=$ap_isolate" "$N"
27 fi
28 if [ "$max_num_sta" -gt 0 ]; then
29 append "$var" "max_num_sta=$max_num_sta" "$N"
30 fi
31 if [ "$max_inactivity" -gt 0 ]; then
32 append "$var" "ap_max_inactivity=$max_inactivity" "$N"
33 fi
34 append "$var" "disassoc_low_ack=$disassoc_low_ack" "$N"
35 if [ "$preamble" -gt 0 ]; then
36 append "$var" "preamble=$preamble" "$N"
37 fi
38
39 # Examples:
40 # psk-mixed/tkip => WPA1+2 PSK, TKIP
41 # wpa-psk2/tkip+aes => WPA2 PSK, CCMP+TKIP
42 # wpa2/tkip+aes => WPA2 RADIUS, CCMP+TKIP
43 # ...
44
45 # TODO: move this parsing function somewhere generic, so that
46 # later it can be reused by drivers that don't use hostapd
47
48 # crypto defaults: WPA2 vs WPA1
49 case "$enc" in
50 wpa2*|*psk2*)
51 wpa=2
52 crypto="CCMP"
53 ;;
54 *mixed*)
55 wpa=3
56 crypto="CCMP TKIP"
57 ;;
58 *)
59 wpa=1
60 crypto="TKIP"
61 ;;
62 esac
63
64 # explicit override for crypto setting
65 case "$enc" in
66 *tkip+aes|*tkip+ccmp|*aes+tkip|*ccmp+tkip) crypto="CCMP TKIP";;
67 *aes|*ccmp) crypto="CCMP";;
68 *tkip) crypto="TKIP";;
69 esac
70
71 # enforce CCMP for 11ng and 11na
72 case "$hwmode:$crypto" in
73 *ng:TKIP|*na:TKIP) crypto="CCMP TKIP";;
74 esac
75
76 # use crypto/auth settings for building the hostapd config
77 case "$enc" in
78 none)
79 wps_possible=1
80 wpa=0
81 crypto=
82 # Here we make the assumption that if we're in open mode
83 # with WPS enabled, we got to be in unconfigured state.
84 wps_not_configured=1
85 ;;
86 *psk*)
87 config_get psk "$vif" key
88 if [ ${#psk} -eq 64 ]; then
89 append "$var" "wpa_psk=$psk" "$N"
90 else
91 append "$var" "wpa_passphrase=$psk" "$N"
92 fi
93 wps_possible=1
94 [ -n "$wpa_group_rekey" ] && append "$var" "wpa_group_rekey=$wpa_group_rekey" "$N"
95 [ -n "$wpa_pair_rekey" ] && append "$var" "wpa_ptk_rekey=$wpa_pair_rekey" "$N"
96 [ -n "$wpa_master_rekey" ] && append "$var" "wpa_gmk_rekey=$wpa_master_rekey" "$N"
97 append wpa_key_mgmt "WPA-PSK"
98 ;;
99 *wpa*|*8021x*)
100 # required fields? formats?
101 # hostapd is particular, maybe a default configuration for failures
102 config_get auth_server "$vif" auth_server
103 [ -z "$auth_server" ] && config_get auth_server "$vif" server
104 append "$var" "auth_server_addr=$auth_server" "$N"
105 config_get auth_port "$vif" auth_port
106 [ -z "$auth_port" ] && config_get auth_port "$vif" port
107 auth_port=${auth_port:-1812}
108 append "$var" "auth_server_port=$auth_port" "$N"
109 config_get auth_secret "$vif" auth_secret
110 [ -z "$auth_secret" ] && config_get auth_secret "$vif" key
111 append "$var" "auth_server_shared_secret=$auth_secret" "$N"
112 # You don't really want to enable this unless you are doing
113 # some corner case testing or are using OpenWrt as a work around
114 # for some systematic issues.
115 config_get_bool auth_cache "$vif" auth_cache 0
116 config_get rsn_preauth "$vif" rsn_preauth
117 [ "$auth_cache" -gt 0 ] || [[ "$rsn_preauth" = 1 ]] || append "$var" "disable_pmksa_caching=1" "$N"
118 [ "$auth_cache" -gt 0 ] || [[ "$rsn_preauth" = 1 ]] || append "$var" "okc=0" "$N"
119 config_get acct_server "$vif" acct_server
120 [ -n "$acct_server" ] && append "$var" "acct_server_addr=$acct_server" "$N"
121 config_get acct_port "$vif" acct_port
122 [ -n "$acct_port" ] && acct_port=${acct_port:-1813}
123 [ -n "$acct_port" ] && append "$var" "acct_server_port=$acct_port" "$N"
124 config_get acct_secret "$vif" acct_secret
125 [ -n "$acct_secret" ] && append "$var" "acct_server_shared_secret=$acct_secret" "$N"
126 config_get eap_reauth_period "$vif" eap_reauth_period
127 [ -n "$eap_reauth_period" ] && append "$var" "eap_reauth_period=$eap_reauth_period" "$N"
128 config_get dae_client "$vif" dae_client
129 config_get dae_secret "$vif" dae_secret
130 [ -n "$dae_client" -a -n "$dae_secret" ] && {
131 config_get dae_port "$vif" dae_port
132 append "$var" "radius_das_port=${dae_port:-3799}" "$N"
133 append "$var" "radius_das_client=$dae_client $dae_secret" "$N"
134 }
135 config_get ownip "$vif" ownip
136 append "$var" "own_ip_addr=$ownip" "$N"
137 append "$var" "eapol_key_index_workaround=1" "$N"
138 append "$var" "ieee8021x=1" "$N"
139 append wpa_key_mgmt "WPA-EAP"
140 [ -n "$wpa_group_rekey" ] && append "$var" "wpa_group_rekey=$wpa_group_rekey" "$N"
141 [ -n "$wpa_pair_rekey" ] && append "$var" "wpa_ptk_rekey=$wpa_pair_rekey" "$N"
142 [ -n "$wpa_master_rekey" ] && append "$var" "wpa_gmk_rekey=$wpa_master_rekey" "$N"
143 ;;
144 *wep*)
145 config_get key "$vif" key
146 key="${key:-1}"
147 case "$key" in
148 [1234])
149 for idx in 1 2 3 4; do
150 local zidx
151 zidx=$(($idx - 1))
152 config_get ckey "$vif" "key${idx}"
153 [ -n "$ckey" ] && \
154 append "$var" "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N"
155 done
156 append "$var" "wep_default_key=$((key - 1))" "$N"
157 ;;
158 *)
159 append "$var" "wep_key0=$(prepare_key_wep "$key")" "$N"
160 append "$var" "wep_default_key=0" "$N"
161 [ -n "$wep_rekey" ] && append "$var" "wep_rekey_period=$wep_rekey" "$N"
162 ;;
163 esac
164 case "$enc" in
165 *shared*)
166 auth_algs=2
167 ;;
168 *mixed*)
169 auth_algs=3
170 ;;
171 esac
172 wpa=0
173 crypto=
174 ;;
175 *)
176 wpa=0
177 crypto=
178 ;;
179 esac
180 append "$var" "auth_algs=${auth_algs:-1}" "$N"
181 append "$var" "wpa=$wpa" "$N"
182 [ -n "$crypto" ] && append "$var" "wpa_pairwise=$crypto" "$N"
183 [ -n "$wpa_group_rekey" ] && append "$var" "wpa_group_rekey=$wpa_group_rekey" "$N"
184
185 config_get ssid "$vif" ssid
186 config_get bridge "$vif" bridge
187 config_get ieee80211d "$vif" ieee80211d
188 config_get iapp_interface "$vif" iapp_interface
189
190 config_get_bool wps_pbc "$vif" wps_pushbutton 0
191 config_get_bool wps_label "$vif" wps_label 0
192
193 config_get config_methods "$vif" wps_config
194 [ "$wps_pbc" -gt 0 ] && append config_methods push_button
195
196 [ -n "$wps_possible" -a -n "$config_methods" ] && {
197 config_get device_type "$vif" wps_device_type "6-0050F204-1"
198 config_get device_name "$vif" wps_device_name "OpenWrt AP"
199 config_get manufacturer "$vif" wps_manufacturer "openwrt.org"
200 config_get wps_pin "$vif" wps_pin
201
202 config_get_bool ext_registrar "$vif" ext_registrar 0
203 [ "$ext_registrar" -gt 0 -a -n "$bridge" ] && append "$var" "upnp_iface=$bridge" "$N"
204
205 append "$var" "eap_server=1" "$N"
206 [ -n "$wps_pin" ] && append "$var" "ap_pin=$wps_pin" "$N"
207 append "$var" "wps_state=${wps_not_configured:-2}" "$N"
208 append "$var" "ap_setup_locked=0" "$N"
209 append "$var" "device_type=$device_type" "$N"
210 append "$var" "device_name=$device_name" "$N"
211 append "$var" "manufacturer=$manufacturer" "$N"
212 append "$var" "config_methods=$config_methods" "$N"
213 }
214
215 append "$var" "ssid=$ssid" "$N"
216 [ -n "$bridge" ] && append "$var" "bridge=$bridge" "$N"
217 [ -n "$ieee80211d" ] && append "$var" "ieee80211d=$ieee80211d" "$N"
218 [ -n "$iapp_interface" ] && {
219 local ifname
220 network_get_device ifname "$iapp_interface" || ifname = "$iapp_interface"
221 append bss_conf "iapp_interface=$ifname" "$N"
222 }
223
224 if [ "$wpa" -ge "1" ]
225 then
226 config_get nasid "$vif" nasid
227 [ -n "$nasid" ] && append "$var" "nas_identifier=$nasid" "$N"
228
229 config_get_bool ieee80211r "$vif" ieee80211r 0
230 if [ "$ieee80211r" -gt 0 ]
231 then
232 config_get mobility_domain "$vif" mobility_domain "4f57"
233 config_get r0_key_lifetime "$vif" r0_key_lifetime "10000"
234 config_get r1_key_holder "$vif" r1_key_holder "00004f577274"
235 config_get reassociation_deadline "$vif" reassociation_deadline "1000"
236 config_get r0kh "$vif" r0kh
237 config_get r1kh "$vif" r1kh
238 config_get_bool pmk_r1_push "$vif" pmk_r1_push 0
239
240 append "$var" "mobility_domain=$mobility_domain" "$N"
241 append "$var" "r0_key_lifetime=$r0_key_lifetime" "$N"
242 append "$var" "r1_key_holder=$r1_key_holder" "$N"
243 append "$var" "reassociation_deadline=$reassociation_deadline" "$N"
244 append "$var" "pmk_r1_push=$pmk_r1_push" "$N"
245
246 for kh in $r0kh; do
247 "$var" "r0kh=${kh//,/ }" "$N"
248 done
249 for kh in $r1kh; do
250 "$var" "r1kh=${kh//,/ }" "$N"
251 done
252
253 [ "$wpa_key_mgmt" != "${wpa_key_mgmt/EAP/}" ] && append wpa_key_mgmt "FT-EAP"
254 [ "$wpa_key_mgmt" != "${wpa_key_mgmt/PSK/}" ] && append wpa_key_mgmt "FT-PSK"
255 fi
256
257 [ -n "wpa_key_mgmt" ] && append "$var" "wpa_key_mgmt=$wpa_key_mgmt"
258 fi
259
260 if [ "$wpa" -ge "2" ]
261 then
262 # RSN -> allow preauthentication. You have two
263 # options, rsn_preauth for production or rsn_preauth_testing
264 # for validation / testing.
265 if [ -n "$bridge" -a "$rsn_preauth" = 1 ]
266 then
267 append "$var" "rsn_preauth=1" "$N"
268 append "$var" "rsn_preauth_interfaces=$bridge" "$N"
269 append "$var" "okc=1" "$N"
270 else
271 # RSN preauthentication testings hould disable
272 # Opportunistic Key Caching (okc) as otherwise the PMKSA
273 # entry for a test could come from the Opportunistic Key Caching
274 config_get rsn_preauth_testing "$vif" rsn_preauth_testing
275 if [ -n "$bridge" -a "$rsn_preauth_testing" = 1 ]
276 then
277 append "$var" "rsn_preauth=1" "$N"
278 append "$var" "rsn_preauth_interfaces=$bridge" "$N"
279 append "$var" "okc=0" "$N"
280 fi
281 fi
282
283 # RSN -> allow management frame protection
284 config_get ieee80211w "$vif" ieee80211w
285 case "$ieee80211w" in
286 [012])
287 append "$var" "ieee80211w=$ieee80211w" "$N"
288 [ "$ieee80211w" -gt "0" ] && {
289 config_get ieee80211w_max_timeout "$vif" ieee80211w_max_timeout
290 config_get ieee80211w_retry_timeout "$vif" ieee80211w_retry_timeout
291 [ -n "$ieee80211w_max_timeout" ] && \
292 append "$var" "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
293 [ -n "$ieee80211w_retry_timeout" ] && \
294 append "$var" "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
295 }
296 ;;
297 esac
298 fi
299
300 config_get macfile "$vif" macfile
301 config_get maclist "$vif" maclist
302 if [ -z "$macfile" ]
303 then
304 # if no macfile has been specified, fallback to the default name
305 # and truncate file to avoid aggregating entries over time
306 macfile="/var/run/hostapd-$ifname.maclist"
307 echo "" > "$macfile"
308 else
309 if [ -n "$maclist" ]
310 then
311 # to avoid to overwrite the original file, make a copy
312 # before appending the entries specified by the maclist
313 # option
314 cp $macfile $macfile.maclist
315 macfile=$macfile.maclist
316 fi
317 fi
318
319 if [ -n "$maclist" ]
320 then
321 for mac in $maclist; do
322 echo "$mac" >> $macfile
323 done
324 fi
325
326 config_get macfilter "$vif" macfilter
327 case "$macfilter" in
328 allow)
329 append "$var" "macaddr_acl=1" "$N"
330 append "$var" "accept_mac_file=$macfile" "$N"
331 ;;
332 deny)
333 append "$var" "macaddr_acl=0" "$N"
334 append "$var" "deny_mac_file=$macfile" "$N"
335 ;;
336 esac
337 }
338
339 hostapd_set_log_options() {
340 local var="$1"
341 local cfg="$2"
342 local log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
343
344 config_get log_level "$cfg" log_level 2
345
346 config_get_bool log_80211 "$cfg" log_80211 1
347 config_get_bool log_8021x "$cfg" log_8021x 1
348 config_get_bool log_radius "$cfg" log_radius 1
349 config_get_bool log_wpa "$cfg" log_wpa 1
350 config_get_bool log_driver "$cfg" log_driver 1
351 config_get_bool log_iapp "$cfg" log_iapp 1
352 config_get_bool log_mlme "$cfg" log_mlme 1
353
354 local log_mask=$(( \
355 ($log_80211 << 0) | \
356 ($log_8021x << 1) | \
357 ($log_radius << 2) | \
358 ($log_wpa << 3) | \
359 ($log_driver << 4) | \
360 ($log_iapp << 5) | \
361 ($log_mlme << 6) \
362 ))
363
364 append "$var" "logger_syslog=$log_mask" "$N"
365 append "$var" "logger_syslog_level=$log_level" "$N"
366 append "$var" "logger_stdout=$log_mask" "$N"
367 append "$var" "logger_stdout_level=$log_level" "$N"
368 }
369
370 hostapd_setup_vif() {
371 local vif="$1"
372 local driver="$2"
373 local ifname device channel hwmode
374
375 hostapd_cfg=
376
377 config_get ifname "$vif" ifname
378 config_get device "$vif" device
379 config_get channel "$device" channel
380 config_get hwmode "$device" hwmode
381
382 hostapd_set_log_options hostapd_cfg "$device"
383 hostapd_set_bss_options hostapd_cfg "$vif"
384
385 case "$hwmode" in
386 *bg|*gdt|*gst|*fh) hwmode=g;;
387 *adt|*ast) hwmode=a;;
388 esac
389 [ "$channel" = auto ] && channel=
390 [ -n "$channel" -a -z "$hwmode" ] && wifi_fixup_hwmode "$device"
391 cat > /var/run/hostapd-$ifname.conf <<EOF
392 driver=$driver
393 interface=$ifname
394 ${hwmode:+hw_mode=${hwmode#11}}
395 ${channel:+channel=$channel}
396 $hostapd_cfg
397 EOF
398 hostapd -P /var/run/wifi-$ifname.pid -B /var/run/hostapd-$ifname.conf
399 }