hostapd: Expose the tdls_prohibit option to UCI
[openwrt/openwrt.git] / package / network / services / hostapd / files / hostapd.sh
1 . /lib/functions/network.sh
2
3 wpa_supplicant_add_rate() {
4 local var="$1"
5 local val="$(($2 / 1000))"
6 local sub="$((($2 / 100) % 10))"
7 append $var "$val" ","
8 [ $sub -gt 0 ] && append $var "."
9 }
10
11 hostapd_add_rate() {
12 local var="$1"
13 local val="$(($2 / 100))"
14 append $var "$val" " "
15 }
16
17 hostapd_append_wep_key() {
18 local var="$1"
19
20 wep_keyidx=0
21 set_default key 1
22 case "$key" in
23 [1234])
24 for idx in 1 2 3 4; do
25 local zidx
26 zidx=$(($idx - 1))
27 json_get_var ckey "key${idx}"
28 [ -n "$ckey" ] && \
29 append $var "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T"
30 done
31 wep_keyidx=$((key - 1))
32 ;;
33 *)
34 append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T"
35 ;;
36 esac
37 }
38
39 hostapd_append_wpa_key_mgmt() {
40 local auth_type="$(echo $auth_type | tr 'a-z' 'A-Z')"
41
42 append wpa_key_mgmt "WPA-$auth_type"
43 [ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-${auth_type}"
44 [ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type}-SHA256"
45 }
46
47 hostapd_add_log_config() {
48 config_add_boolean \
49 log_80211 \
50 log_8021x \
51 log_radius \
52 log_wpa \
53 log_driver \
54 log_iapp \
55 log_mlme
56
57 config_add_int log_level
58 }
59
60 hostapd_common_add_device_config() {
61 config_add_array basic_rate
62 config_add_array supported_rates
63
64 config_add_string country
65 config_add_boolean country_ie doth
66 config_add_string require_mode
67 config_add_boolean legacy_rates
68
69 config_add_string acs_chan_bias
70 config_add_array hostapd_options
71
72 hostapd_add_log_config
73 }
74
75 hostapd_prepare_device_config() {
76 local config="$1"
77 local driver="$2"
78
79 local base="${config%%.conf}"
80 local base_cfg=
81
82 json_get_vars country country_ie beacon_int:100 doth require_mode legacy_rates acs_chan_bias
83
84 hostapd_set_log_options base_cfg
85
86 set_default country_ie 1
87 set_default doth 1
88 set_default legacy_rates 1
89
90 [ "$hwmode" = "b" ] && legacy_rates=1
91
92 [ -n "$country" ] && {
93 append base_cfg "country_code=$country" "$N"
94
95 [ "$country_ie" -gt 0 ] && append base_cfg "ieee80211d=1" "$N"
96 [ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg "ieee80211h=1" "$N"
97 }
98
99 [ -n "$acs_chan_bias" ] && append base_cfg "acs_chan_bias=$acs_chan_bias" "$N"
100
101 local brlist= br
102 json_get_values basic_rate_list basic_rate
103 local rlist= r
104 json_get_values rate_list supported_rates
105
106 [ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N"
107 [ "$legacy_rates" -eq 0 ] && set_default require_mode g
108
109 [ "$hwmode" = "g" ] && {
110 [ "$legacy_rates" -eq 0 ] && set_default rate_list "6000 9000 12000 18000 24000 36000 48000 54000"
111 [ -n "$require_mode" ] && set_default basic_rate_list "6000 12000 24000"
112 }
113
114 case "$require_mode" in
115 n) append base_cfg "require_ht=1" "$N";;
116 ac) append base_cfg "require_vht=1" "$N";;
117 esac
118
119 for r in $rate_list; do
120 hostapd_add_rate rlist "$r"
121 done
122
123 for br in $basic_rate_list; do
124 hostapd_add_rate brlist "$br"
125 done
126
127 [ -n "$rlist" ] && append base_cfg "supported_rates=$rlist" "$N"
128 [ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N"
129 append base_cfg "beacon_int=$beacon_int" "$N"
130
131 json_get_values opts hostapd_options
132 for val in $opts; do
133 append base_cfg "$val" "$N"
134 done
135
136 cat > "$config" <<EOF
137 driver=$driver
138 $base_cfg
139 EOF
140 }
141
142 hostapd_common_add_bss_config() {
143 config_add_string 'bssid:macaddr' 'ssid:string'
144 config_add_boolean wds wmm uapsd hidden
145
146 config_add_int maxassoc max_inactivity
147 config_add_boolean disassoc_low_ack isolate short_preamble
148
149 config_add_int \
150 wep_rekey eap_reauth_period \
151 wpa_group_rekey wpa_pair_rekey wpa_master_rekey
152 config_add_boolean wpa_disable_eapol_key_retries
153
154 config_add_boolean tdls_prohibit
155
156 config_add_boolean rsn_preauth auth_cache
157 config_add_int ieee80211w
158 config_add_int eapol_version
159
160 config_add_string 'auth_server:host' 'server:host'
161 config_add_string auth_secret
162 config_add_int 'auth_port:port' 'port:port'
163
164 config_add_string acct_server
165 config_add_string acct_secret
166 config_add_int acct_port
167 config_add_int acct_interval
168
169 config_add_string dae_client
170 config_add_string dae_secret
171 config_add_int dae_port
172
173 config_add_string nasid
174 config_add_string ownip
175 config_add_string iapp_interface
176 config_add_string eap_type ca_cert client_cert identity anonymous_identity auth priv_key priv_key_pwd
177
178 config_add_int dynamic_vlan vlan_naming
179 config_add_string vlan_tagged_interface vlan_bridge
180 config_add_string vlan_file
181
182 config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey' 'key4:wepkey' 'password:wpakey'
183
184 config_add_string wpa_psk_file
185
186 config_add_boolean wps_pushbutton wps_label ext_registrar wps_pbc_in_m1
187 config_add_int wps_ap_setup_locked wps_independent
188 config_add_string wps_device_type wps_device_name wps_manufacturer wps_pin
189
190 config_add_boolean ieee80211r pmk_r1_push ft_psk_generate_local ft_over_ds
191 config_add_int r0_key_lifetime reassociation_deadline
192 config_add_string mobility_domain r1_key_holder
193 config_add_array r0kh r1kh
194
195 config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout
196
197 config_add_string macfilter 'macfile:file'
198 config_add_array 'maclist:list(macaddr)'
199
200 config_add_array bssid_blacklist
201 config_add_array bssid_whitelist
202
203 config_add_int mcast_rate
204 config_add_array basic_rate
205 config_add_array supported_rates
206 }
207
208 hostapd_set_bss_options() {
209 local var="$1"
210 local phy="$2"
211 local vif="$3"
212
213 wireless_vif_parse_encryption
214
215 local bss_conf
216 local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
217
218 json_get_vars \
219 wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey \
220 wpa_disable_eapol_key_retries tdls_prohibit \
221 maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
222 wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 wps_ap_setup_locked \
223 wps_independent wps_device_type wps_device_name wps_manufacturer wps_pin \
224 macfilter ssid wmm uapsd hidden short_preamble rsn_preauth \
225 iapp_interface eapol_version dynamic_vlan ieee80211w nasid \
226 acct_server acct_secret acct_port acct_interval
227
228 set_default isolate 0
229 set_default maxassoc 0
230 set_default max_inactivity 0
231 set_default short_preamble 1
232 set_default disassoc_low_ack 1
233 set_default hidden 0
234 set_default wmm 1
235 set_default uapsd 1
236 set_default wpa_disable_eapol_key_retries 0
237 set_default tdls_prohibit 0
238 set_default eapol_version 0
239 set_default acct_port 1813
240
241 append bss_conf "ctrl_interface=/var/run/hostapd"
242 if [ "$isolate" -gt 0 ]; then
243 append bss_conf "ap_isolate=$isolate" "$N"
244 fi
245 if [ "$maxassoc" -gt 0 ]; then
246 append bss_conf "max_num_sta=$maxassoc" "$N"
247 fi
248 if [ "$max_inactivity" -gt 0 ]; then
249 append bss_conf "ap_max_inactivity=$max_inactivity" "$N"
250 fi
251
252 append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N"
253 append bss_conf "preamble=$short_preamble" "$N"
254 append bss_conf "wmm_enabled=$wmm" "$N"
255 append bss_conf "ignore_broadcast_ssid=$hidden" "$N"
256 append bss_conf "uapsd_advertisement_enabled=$uapsd" "$N"
257
258 [ "$tdls_prohibit" -gt 0 ] && append bss_conf "tdls_prohibit=$tdls_prohibit" "$N"
259
260 [ "$wpa" -gt 0 ] && {
261 [ -n "$wpa_group_rekey" ] && append bss_conf "wpa_group_rekey=$wpa_group_rekey" "$N"
262 [ -n "$wpa_pair_rekey" ] && append bss_conf "wpa_ptk_rekey=$wpa_pair_rekey" "$N"
263 [ -n "$wpa_master_rekey" ] && append bss_conf "wpa_gmk_rekey=$wpa_master_rekey" "$N"
264 }
265
266 [ -n "$nasid" ] && append bss_conf "nas_identifier=$nasid" "$N"
267 [ -n "$acct_server" ] && {
268 append bss_conf "acct_server_addr=$acct_server" "$N"
269 append bss_conf "acct_server_port=$acct_port" "$N"
270 [ -n "$acct_secret" ] && \
271 append bss_conf "acct_server_shared_secret=$acct_secret" "$N"
272 [ -n "$acct_interval" ] && \
273 append bss_conf "radius_acct_interim_interval=$acct_interval" "$N"
274 }
275
276 local vlan_possible=""
277
278 case "$auth_type" in
279 none)
280 wps_possible=1
281 # Here we make the assumption that if we're in open mode
282 # with WPS enabled, we got to be in unconfigured state.
283 wps_not_configured=1
284 ;;
285 psk)
286 json_get_vars key wpa_psk_file
287 if [ ${#key} -lt 8 ]; then
288 wireless_setup_vif_failed INVALID_WPA_PSK
289 return 1
290 elif [ ${#key} -eq 64 ]; then
291 append bss_conf "wpa_psk=$key" "$N"
292 else
293 append bss_conf "wpa_passphrase=$key" "$N"
294 fi
295 [ -n "$wpa_psk_file" ] && {
296 [ -e "$wpa_psk_file" ] || touch "$wpa_psk_file"
297 append bss_conf "wpa_psk_file=$wpa_psk_file" "$N"
298 }
299 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
300
301 wps_possible=1
302 ;;
303 eap)
304 json_get_vars \
305 auth_server auth_secret auth_port \
306 dae_client dae_secret dae_port \
307 ownip \
308 eap_reauth_period
309
310 # radius can provide VLAN ID for clients
311 vlan_possible=1
312
313 # legacy compatibility
314 [ -n "$auth_server" ] || json_get_var auth_server server
315 [ -n "$auth_port" ] || json_get_var auth_port port
316 [ -n "$auth_secret" ] || json_get_var auth_secret key
317
318 set_default auth_port 1812
319 set_default dae_port 3799
320
321
322 append bss_conf "auth_server_addr=$auth_server" "$N"
323 append bss_conf "auth_server_port=$auth_port" "$N"
324 append bss_conf "auth_server_shared_secret=$auth_secret" "$N"
325
326 [ -n "$eap_reauth_period" ] && append bss_conf "eap_reauth_period=$eap_reauth_period" "$N"
327
328 [ -n "$dae_client" -a -n "$dae_secret" ] && {
329 append bss_conf "radius_das_port=$dae_port" "$N"
330 append bss_conf "radius_das_client=$dae_client $dae_secret" "$N"
331 }
332
333 [ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip" "$N"
334 append bss_conf "eapol_key_index_workaround=1" "$N"
335 append bss_conf "ieee8021x=1" "$N"
336
337 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
338 ;;
339 wep)
340 local wep_keyidx=0
341 json_get_vars key
342 hostapd_append_wep_key bss_conf
343 append bss_conf "wep_default_key=$wep_keyidx" "$N"
344 [ -n "$wep_rekey" ] && append bss_conf "wep_rekey_period=$wep_rekey" "$N"
345 ;;
346 esac
347
348 local auth_algs=$((($auth_mode_shared << 1) | $auth_mode_open))
349 append bss_conf "auth_algs=${auth_algs:-1}" "$N"
350 append bss_conf "wpa=$wpa" "$N"
351 [ -n "$wpa_pairwise" ] && append bss_conf "wpa_pairwise=$wpa_pairwise" "$N"
352
353 set_default wps_pushbutton 0
354 set_default wps_label 0
355 set_default wps_pbc_in_m1 0
356
357 config_methods=
358 [ "$wps_pushbutton" -gt 0 ] && append config_methods push_button
359 [ "$wps_label" -gt 0 ] && append config_methods label
360
361 [ -n "$wps_possible" -a -n "$config_methods" ] && {
362 set_default ext_registrar 0
363 set_default wps_device_type "6-0050F204-1"
364 set_default wps_device_name "Lede AP"
365 set_default wps_manufacturer "www.lede-project.org"
366 set_default wps_independent 1
367
368 wps_state=2
369 [ -n "$wps_configured" ] && wps_state=1
370
371 [ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append bss_conf "upnp_iface=$network_bridge" "$N"
372
373 append bss_conf "eap_server=1" "$N"
374 [ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N"
375 append bss_conf "wps_state=$wps_state" "$N"
376 append bss_conf "device_type=$wps_device_type" "$N"
377 append bss_conf "device_name=$wps_device_name" "$N"
378 append bss_conf "manufacturer=$wps_manufacturer" "$N"
379 append bss_conf "config_methods=$config_methods" "$N"
380 append bss_conf "wps_independent=$wps_independent" "$N"
381 [ -n "$wps_ap_setup_locked" ] && append bss_conf "ap_setup_locked=$wps_ap_setup_locked" "$N"
382 [ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf "pbc_in_m1=$wps_pbc_in_m1" "$N"
383 }
384
385 append bss_conf "ssid=$ssid" "$N"
386 [ -n "$network_bridge" ] && append bss_conf "bridge=$network_bridge" "$N"
387 [ -n "$iapp_interface" ] && {
388 local ifname
389 network_get_device ifname "$iapp_interface" || ifname="$iapp_interface"
390 append bss_conf "iapp_interface=$ifname" "$N"
391 }
392
393 if [ "$wpa" -ge "1" ]; then
394 json_get_vars ieee80211r
395 set_default ieee80211r 0
396
397 if [ "$ieee80211r" -gt "0" ]; then
398 json_get_vars mobility_domain r0_key_lifetime r1_key_holder \
399 reassociation_deadline pmk_r1_push ft_psk_generate_local ft_over_ds
400 json_get_values r0kh r0kh
401 json_get_values r1kh r1kh
402
403 set_default mobility_domain "4f57"
404 set_default r0_key_lifetime 10000
405 set_default reassociation_deadline 1000
406 set_default pmk_r1_push 0
407 set_default ft_psk_generate_local 0
408 set_default ft_over_ds 1
409
410 append bss_conf "mobility_domain=$mobility_domain" "$N"
411 append bss_conf "r0_key_lifetime=$r0_key_lifetime" "$N"
412 [ -n "$r1_key_holder" ] && append bss_conf "r1_key_holder=$r1_key_holder" "$N"
413 append bss_conf "reassociation_deadline=$reassociation_deadline" "$N"
414 append bss_conf "pmk_r1_push=$pmk_r1_push" "$N"
415 append bss_conf "ft_psk_generate_local=$ft_psk_generate_local" "$N"
416 append bss_conf "ft_over_ds=$ft_over_ds" "$N"
417
418 for kh in $r0kh; do
419 append bss_conf "r0kh=${kh//,/ }" "$N"
420 done
421 for kh in $r1kh; do
422 append bss_conf "r1kh=${kh//,/ }" "$N"
423 done
424 fi
425
426 append bss_conf "wpa_disable_eapol_key_retries=$wpa_disable_eapol_key_retries" "$N"
427
428 hostapd_append_wpa_key_mgmt
429 [ -n "$wpa_key_mgmt" ] && append bss_conf "wpa_key_mgmt=$wpa_key_mgmt" "$N"
430 fi
431
432 if [ "$wpa" -ge "2" ]; then
433 if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then
434 set_default auth_cache 1
435 append bss_conf "rsn_preauth=1" "$N"
436 append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N"
437 else
438 set_default auth_cache 0
439 fi
440
441 append bss_conf "okc=$auth_cache" "$N"
442 [ "$auth_cache" = 0 ] && append bss_conf "disable_pmksa_caching=1" "$N"
443
444 # RSN -> allow management frame protection
445 case "$ieee80211w" in
446 [012])
447 json_get_vars ieee80211w_max_timeout ieee80211w_retry_timeout
448 append bss_conf "ieee80211w=$ieee80211w" "$N"
449 [ "$ieee80211w" -gt "0" ] && {
450 [ -n "$ieee80211w_max_timeout" ] && \
451 append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
452 [ -n "$ieee80211w_retry_timeout" ] && \
453 append bss_conf "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
454 }
455 ;;
456 esac
457 fi
458
459 _macfile="/var/run/hostapd-$ifname.maclist"
460 case "$macfilter" in
461 allow)
462 append bss_conf "macaddr_acl=1" "$N"
463 append bss_conf "accept_mac_file=$_macfile" "$N"
464 # accept_mac_file can be used to set MAC to VLAN ID mapping
465 vlan_possible=1
466 ;;
467 deny)
468 append bss_conf "macaddr_acl=0" "$N"
469 append bss_conf "deny_mac_file=$_macfile" "$N"
470 ;;
471 *)
472 _macfile=""
473 ;;
474 esac
475
476 [ -n "$_macfile" ] && {
477 json_get_vars macfile
478 json_get_values maclist maclist
479
480 rm -f "$_macfile"
481 (
482 for mac in $maclist; do
483 echo "$mac"
484 done
485 [ -n "$macfile" -a -f "$macfile" ] && cat "$macfile"
486 ) > "$_macfile"
487 }
488
489 [ -n "$vlan_possible" -a -n "$dynamic_vlan" ] && {
490 json_get_vars vlan_naming vlan_tagged_interface vlan_bridge vlan_file
491 set_default vlan_naming 1
492 append bss_conf "dynamic_vlan=$dynamic_vlan" "$N"
493 append bss_conf "vlan_naming=$vlan_naming" "$N"
494 [ -n "$vlan_bridge" ] && \
495 append bss_conf "vlan_bridge=$vlan_bridge" "$N"
496 [ -n "$vlan_tagged_interface" ] && \
497 append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N"
498 [ -n "$vlan_file" ] && {
499 [ -e "$vlan_file" ] || touch "$vlan_file"
500 append bss_conf "vlan_file=$vlan_file" "$N"
501 }
502 }
503
504 append "$var" "$bss_conf" "$N"
505 return 0
506 }
507
508 hostapd_set_log_options() {
509 local var="$1"
510
511 local log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
512 json_get_vars log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
513
514 set_default log_level 2
515 set_default log_80211 1
516 set_default log_8021x 1
517 set_default log_radius 1
518 set_default log_wpa 1
519 set_default log_driver 1
520 set_default log_iapp 1
521 set_default log_mlme 1
522
523 local log_mask=$(( \
524 ($log_80211 << 0) | \
525 ($log_8021x << 1) | \
526 ($log_radius << 2) | \
527 ($log_wpa << 3) | \
528 ($log_driver << 4) | \
529 ($log_iapp << 5) | \
530 ($log_mlme << 6) \
531 ))
532
533 append "$var" "logger_syslog=$log_mask" "$N"
534 append "$var" "logger_syslog_level=$log_level" "$N"
535 append "$var" "logger_stdout=$log_mask" "$N"
536 append "$var" "logger_stdout_level=$log_level" "$N"
537
538 return 0
539 }
540
541 _wpa_supplicant_common() {
542 local ifname="$1"
543
544 _rpath="/var/run/wpa_supplicant"
545 _config="${_rpath}-$ifname.conf"
546 }
547
548 wpa_supplicant_teardown_interface() {
549 _wpa_supplicant_common "$1"
550 rm -rf "$_rpath/$1" "$_config"
551 }
552
553 wpa_supplicant_prepare_interface() {
554 local ifname="$1"
555 _w_driver="$2"
556
557 _wpa_supplicant_common "$1"
558
559 json_get_vars mode wds
560
561 [ -n "$network_bridge" ] && {
562 fail=
563 case "$mode" in
564 adhoc)
565 fail=1
566 ;;
567 sta)
568 [ "$wds" = 1 ] || fail=1
569 ;;
570 esac
571
572 [ -n "$fail" ] && {
573 wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
574 return 1
575 }
576 }
577
578 local ap_scan=
579
580 _w_mode="$mode"
581 _w_modestr=
582
583 [[ "$mode" = adhoc ]] && {
584 ap_scan="ap_scan=2"
585
586 _w_modestr="mode=1"
587 }
588
589 local country_str=
590 [ -n "$country" ] && {
591 country_str="country=$country"
592 }
593
594 wpa_supplicant_teardown_interface "$ifname"
595 cat > "$_config" <<EOF
596 $ap_scan
597 $country_str
598 EOF
599 return 0
600 }
601
602 wpa_supplicant_set_fixed_freq() {
603 local freq="$1"
604 local htmode="$2"
605
606 append network_data "fixed_freq=1" "$N$T"
607 append network_data "frequency=$freq" "$N$T"
608 case "$htmode" in
609 NOHT) append network_data "disable_ht=1" "$N$T";;
610 HT20|VHT20) append network_data "disable_ht40=1" "$N$T";;
611 HT40*|VHT40*|VHT80*|VHT160*) append network_data "ht40=1" "$N$T";;
612 esac
613 case "$htmode" in
614 VHT*) append network_data "vht=1" "$N$T";;
615 esac
616 case "$htmode" in
617 VHT80) append network_data "max_oper_chwidth=1" "$N$T";;
618 VHT160) append network_data "max_oper_chwidth=2" "$N$T";;
619 *) append network_data "max_oper_chwidth=0" "$N$T";;
620 esac
621 }
622
623 wpa_supplicant_add_network() {
624 local ifname="$1"
625 local freq="$2"
626 local htmode="$3"
627
628 _wpa_supplicant_common "$1"
629 wireless_vif_parse_encryption
630
631 json_get_vars \
632 ssid bssid key \
633 basic_rate mcast_rate \
634 ieee80211w ieee80211r
635
636 set_default ieee80211r 0
637
638 local key_mgmt='NONE'
639 local enc_str=
640 local network_data=
641 local T=" "
642
643 local scan_ssid="scan_ssid=1"
644 local freq wpa_key_mgmt
645
646 [[ "$_w_mode" = "adhoc" ]] && {
647 append network_data "mode=1" "$N$T"
648 [ -n "$channel" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
649
650 scan_ssid="scan_ssid=0"
651
652 [ "$_w_driver" = "nl80211" ] || append wpa_key_mgmt "WPA-NONE"
653 }
654
655 [[ "$_w_mode" = "mesh" ]] && {
656 json_get_vars mesh_id
657 ssid="${mesh_id}"
658
659 append network_data "mode=5" "$N$T"
660 [ -n "$channel" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
661 append wpa_key_mgmt "SAE"
662 scan_ssid=""
663 }
664
665 [ "$_w_mode" = "adhoc" -o "$_w_mode" = "mesh" ] && append network_data "$_w_modestr" "$N$T"
666
667 case "$auth_type" in
668 none) ;;
669 wep)
670 local wep_keyidx=0
671 hostapd_append_wep_key network_data
672 append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
673 ;;
674 psk)
675 local passphrase
676
677 if [ "$_w_mode" != "mesh" ]; then
678 hostapd_append_wpa_key_mgmt
679 fi
680
681 key_mgmt="$wpa_key_mgmt"
682
683 if [ ${#key} -eq 64 ]; then
684 passphrase="psk=${key}"
685 else
686 passphrase="psk=\"${key}\""
687 fi
688 append network_data "$passphrase" "$N$T"
689 ;;
690 eap)
691 hostapd_append_wpa_key_mgmt
692 key_mgmt="$wpa_key_mgmt"
693
694 json_get_vars eap_type identity anonymous_identity ca_cert
695 [ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" "$N$T"
696 [ -n "$identity" ] && append network_data "identity=\"$identity\"" "$N$T"
697 [ -n "$anonymous_identity" ] && append network_data "anonymous_identity=\"$anonymous_identity\"" "$N$T"
698 case "$eap_type" in
699 tls)
700 json_get_vars client_cert priv_key priv_key_pwd
701 append network_data "client_cert=\"$client_cert\"" "$N$T"
702 append network_data "private_key=\"$priv_key\"" "$N$T"
703 append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T"
704 ;;
705 fast|peap|ttls)
706 json_get_vars auth password ca_cert2 client_cert2 priv_key2 priv_key2_pwd
707 set_default auth MSCHAPV2
708
709 if [ "$auth" = "EAP-TLS" ]; then
710 [ -n "$ca_cert2" ] &&
711 append network_data "ca_cert2=\"$ca_cert2\"" "$N$T"
712 append network_data "client_cert2=\"$client_cert2\"" "$N$T"
713 append network_data "private_key2=\"$priv_key2\"" "$N$T"
714 append network_data "private_key2_passwd=\"$priv_key2_pwd\"" "$N$T"
715 else
716 append network_data "password=\"$password\"" "$N$T"
717 fi
718
719 phase2proto="auth="
720 case "$auth" in
721 "auth"*)
722 phase2proto=""
723 ;;
724 "EAP-"*)
725 auth="$(echo $auth | cut -b 5- )"
726 [ "$eap_type" = "ttls" ] &&
727 phase2proto="autheap="
728 ;;
729 esac
730 append network_data "phase2=\"$phase2proto$auth\"" "$N$T"
731 ;;
732 esac
733 append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T"
734 ;;
735 esac
736
737 [ "$mode" = mesh ] || {
738 case "$wpa" in
739 1)
740 append network_data "proto=WPA" "$N$T"
741 ;;
742 2)
743 append network_data "proto=RSN" "$N$T"
744 ;;
745 esac
746
747 case "$ieee80211w" in
748 [012])
749 [ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" "$N$T"
750 ;;
751 esac
752 }
753 [ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
754 [ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int" "$N$T"
755
756 local bssid_blacklist bssid_whitelist
757 json_get_values bssid_blacklist bssid_blacklist
758 json_get_values bssid_whitelist bssid_whitelist
759
760 [ -n "$bssid_blacklist" ] && append network_data "bssid_blacklist=$bssid_blacklist" "$N$T"
761 [ -n "$bssid_whitelist" ] && append network_data "bssid_whitelist=$bssid_whitelist" "$N$T"
762
763 [ -n "$basic_rate" ] && {
764 local br rate_list=
765 for br in $basic_rate; do
766 wpa_supplicant_add_rate rate_list "$br"
767 done
768 [ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T"
769 }
770
771 [ -n "$mcast_rate" ] && {
772 local mc_rate=
773 wpa_supplicant_add_rate mc_rate "$mcast_rate"
774 append network_data "mcast_rate=$mc_rate" "$N$T"
775 }
776
777 cat >> "$_config" <<EOF
778 network={
779 $scan_ssid
780 ssid="$ssid"
781 key_mgmt=$key_mgmt
782 $network_data
783 }
784 EOF
785 return 0
786 }
787
788 wpa_supplicant_run() {
789 local ifname="$1"; shift
790
791 _wpa_supplicant_common "$ifname"
792
793 /usr/sbin/wpa_supplicant -B \
794 ${network_bridge:+-b $network_bridge} \
795 -P "/var/run/wpa_supplicant-${ifname}.pid" \
796 -D ${_w_driver:-wext} \
797 -i "$ifname" \
798 -c "$_config" \
799 -C "$_rpath" \
800 "$@"
801
802 ret="$?"
803 wireless_add_process "$(cat "/var/run/wpa_supplicant-${ifname}.pid")" /usr/sbin/wpa_supplicant 1
804
805 [ "$ret" != 0 ] && wireless_setup_vif_failed WPA_SUPPLICANT_FAILED
806
807 return $ret
808 }
809
810 hostapd_common_cleanup() {
811 killall hostapd wpa_supplicant meshd-nl80211
812 }