hostapd: add support for hostapd's radius_client_addr
[openwrt/openwrt.git] / package / network / services / hostapd / files / hostapd.sh
1 . /lib/functions/network.sh
2
3 wpa_supplicant_add_rate() {
4 local var="$1"
5 local val="$(($2 / 1000))"
6 local sub="$((($2 / 100) % 10))"
7 append $var "$val" ","
8 [ $sub -gt 0 ] && append $var "."
9 }
10
11 hostapd_add_rate() {
12 local var="$1"
13 local val="$(($2 / 100))"
14 append $var "$val" " "
15 }
16
17 hostapd_append_wep_key() {
18 local var="$1"
19
20 wep_keyidx=0
21 set_default key 1
22 case "$key" in
23 [1234])
24 for idx in 1 2 3 4; do
25 local zidx
26 zidx=$(($idx - 1))
27 json_get_var ckey "key${idx}"
28 [ -n "$ckey" ] && \
29 append $var "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T"
30 done
31 wep_keyidx=$((key - 1))
32 ;;
33 *)
34 append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T"
35 ;;
36 esac
37 }
38
39 hostapd_append_wpa_key_mgmt() {
40 local auth_type="$(echo $auth_type | tr 'a-z' 'A-Z')"
41
42 append wpa_key_mgmt "WPA-$auth_type"
43 [ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-${auth_type}"
44 [ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type}-SHA256"
45 }
46
47 hostapd_add_log_config() {
48 config_add_boolean \
49 log_80211 \
50 log_8021x \
51 log_radius \
52 log_wpa \
53 log_driver \
54 log_iapp \
55 log_mlme
56
57 config_add_int log_level
58 }
59
60 hostapd_common_add_device_config() {
61 config_add_array basic_rate
62 config_add_array supported_rates
63
64 config_add_string country
65 config_add_boolean country_ie doth
66 config_add_string require_mode
67 config_add_boolean legacy_rates
68
69 config_add_string acs_chan_bias
70 config_add_array hostapd_options
71
72 hostapd_add_log_config
73 }
74
75 hostapd_prepare_device_config() {
76 local config="$1"
77 local driver="$2"
78
79 local base="${config%%.conf}"
80 local base_cfg=
81
82 json_get_vars country country_ie beacon_int:100 doth require_mode legacy_rates acs_chan_bias
83
84 hostapd_set_log_options base_cfg
85
86 set_default country_ie 1
87 set_default doth 1
88 set_default legacy_rates 1
89
90 [ "$hwmode" = "b" ] && legacy_rates=1
91
92 [ -n "$country" ] && {
93 append base_cfg "country_code=$country" "$N"
94
95 [ "$country_ie" -gt 0 ] && append base_cfg "ieee80211d=1" "$N"
96 [ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg "ieee80211h=1" "$N"
97 }
98
99 [ -n "$acs_chan_bias" ] && append base_cfg "acs_chan_bias=$acs_chan_bias" "$N"
100
101 local brlist= br
102 json_get_values basic_rate_list basic_rate
103 local rlist= r
104 json_get_values rate_list supported_rates
105
106 [ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N"
107 [ "$legacy_rates" -eq 0 ] && set_default require_mode g
108
109 [ "$hwmode" = "g" ] && {
110 [ "$legacy_rates" -eq 0 ] && set_default rate_list "6000 9000 12000 18000 24000 36000 48000 54000"
111 [ -n "$require_mode" ] && set_default basic_rate_list "6000 12000 24000"
112 }
113
114 case "$require_mode" in
115 n) append base_cfg "require_ht=1" "$N";;
116 ac) append base_cfg "require_vht=1" "$N";;
117 esac
118
119 for r in $rate_list; do
120 hostapd_add_rate rlist "$r"
121 done
122
123 for br in $basic_rate_list; do
124 hostapd_add_rate brlist "$br"
125 done
126
127 [ -n "$rlist" ] && append base_cfg "supported_rates=$rlist" "$N"
128 [ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N"
129 append base_cfg "beacon_int=$beacon_int" "$N"
130
131 json_get_values opts hostapd_options
132 for val in $opts; do
133 append base_cfg "$val" "$N"
134 done
135
136 cat > "$config" <<EOF
137 driver=$driver
138 $base_cfg
139 EOF
140 }
141
142 hostapd_common_add_bss_config() {
143 config_add_string 'bssid:macaddr' 'ssid:string'
144 config_add_boolean wds wmm uapsd hidden
145
146 config_add_int maxassoc max_inactivity
147 config_add_boolean disassoc_low_ack isolate short_preamble
148
149 config_add_int \
150 wep_rekey eap_reauth_period \
151 wpa_group_rekey wpa_pair_rekey wpa_master_rekey
152 config_add_boolean wpa_disable_eapol_key_retries
153
154 config_add_boolean tdls_prohibit
155
156 config_add_boolean rsn_preauth auth_cache
157 config_add_int ieee80211w
158 config_add_int eapol_version
159
160 config_add_string 'auth_server:host' 'server:host'
161 config_add_string auth_secret
162 config_add_int 'auth_port:port' 'port:port'
163
164 config_add_string acct_server
165 config_add_string acct_secret
166 config_add_int acct_port
167 config_add_int acct_interval
168
169 config_add_string dae_client
170 config_add_string dae_secret
171 config_add_int dae_port
172
173 config_add_string nasid
174 config_add_string ownip
175 config_add_string radius_client_addr
176 config_add_string iapp_interface
177 config_add_string eap_type ca_cert client_cert identity anonymous_identity auth priv_key priv_key_pwd
178 config_add_string ieee80211w_mgmt_cipher
179
180 config_add_int dynamic_vlan vlan_naming
181 config_add_string vlan_tagged_interface vlan_bridge
182 config_add_string vlan_file
183
184 config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey' 'key4:wepkey' 'password:wpakey'
185
186 config_add_string wpa_psk_file
187
188 config_add_boolean wps_pushbutton wps_label ext_registrar wps_pbc_in_m1
189 config_add_int wps_ap_setup_locked wps_independent
190 config_add_string wps_device_type wps_device_name wps_manufacturer wps_pin
191
192 config_add_boolean ieee80211r pmk_r1_push ft_psk_generate_local ft_over_ds
193 config_add_int r0_key_lifetime reassociation_deadline
194 config_add_string mobility_domain r1_key_holder
195 config_add_array r0kh r1kh
196
197 config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout
198
199 config_add_string macfilter 'macfile:file'
200 config_add_array 'maclist:list(macaddr)'
201
202 config_add_array bssid_blacklist
203 config_add_array bssid_whitelist
204
205 config_add_int mcast_rate
206 config_add_array basic_rate
207 config_add_array supported_rates
208 }
209
210 hostapd_set_bss_options() {
211 local var="$1"
212 local phy="$2"
213 local vif="$3"
214
215 wireless_vif_parse_encryption
216
217 local bss_conf
218 local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
219
220 json_get_vars \
221 wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey \
222 wpa_disable_eapol_key_retries tdls_prohibit \
223 maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
224 wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 wps_ap_setup_locked \
225 wps_independent wps_device_type wps_device_name wps_manufacturer wps_pin \
226 macfilter ssid wmm uapsd hidden short_preamble rsn_preauth \
227 iapp_interface eapol_version dynamic_vlan ieee80211w nasid \
228 acct_server acct_secret acct_port acct_interval
229
230 set_default isolate 0
231 set_default maxassoc 0
232 set_default max_inactivity 0
233 set_default short_preamble 1
234 set_default disassoc_low_ack 1
235 set_default hidden 0
236 set_default wmm 1
237 set_default uapsd 1
238 set_default wpa_disable_eapol_key_retries 0
239 set_default tdls_prohibit 0
240 set_default eapol_version 0
241 set_default acct_port 1813
242
243 append bss_conf "ctrl_interface=/var/run/hostapd"
244 if [ "$isolate" -gt 0 ]; then
245 append bss_conf "ap_isolate=$isolate" "$N"
246 fi
247 if [ "$maxassoc" -gt 0 ]; then
248 append bss_conf "max_num_sta=$maxassoc" "$N"
249 fi
250 if [ "$max_inactivity" -gt 0 ]; then
251 append bss_conf "ap_max_inactivity=$max_inactivity" "$N"
252 fi
253
254 append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N"
255 append bss_conf "preamble=$short_preamble" "$N"
256 append bss_conf "wmm_enabled=$wmm" "$N"
257 append bss_conf "ignore_broadcast_ssid=$hidden" "$N"
258 append bss_conf "uapsd_advertisement_enabled=$uapsd" "$N"
259
260 [ "$tdls_prohibit" -gt 0 ] && append bss_conf "tdls_prohibit=$tdls_prohibit" "$N"
261
262 [ "$wpa" -gt 0 ] && {
263 [ -n "$wpa_group_rekey" ] && append bss_conf "wpa_group_rekey=$wpa_group_rekey" "$N"
264 [ -n "$wpa_pair_rekey" ] && append bss_conf "wpa_ptk_rekey=$wpa_pair_rekey" "$N"
265 [ -n "$wpa_master_rekey" ] && append bss_conf "wpa_gmk_rekey=$wpa_master_rekey" "$N"
266 }
267
268 [ -n "$nasid" ] && append bss_conf "nas_identifier=$nasid" "$N"
269 [ -n "$acct_server" ] && {
270 append bss_conf "acct_server_addr=$acct_server" "$N"
271 append bss_conf "acct_server_port=$acct_port" "$N"
272 [ -n "$acct_secret" ] && \
273 append bss_conf "acct_server_shared_secret=$acct_secret" "$N"
274 [ -n "$acct_interval" ] && \
275 append bss_conf "radius_acct_interim_interval=$acct_interval" "$N"
276 }
277
278 local vlan_possible=""
279
280 case "$auth_type" in
281 none)
282 wps_possible=1
283 # Here we make the assumption that if we're in open mode
284 # with WPS enabled, we got to be in unconfigured state.
285 wps_not_configured=1
286 ;;
287 psk)
288 json_get_vars key wpa_psk_file
289 if [ ${#key} -lt 8 ]; then
290 wireless_setup_vif_failed INVALID_WPA_PSK
291 return 1
292 elif [ ${#key} -eq 64 ]; then
293 append bss_conf "wpa_psk=$key" "$N"
294 else
295 append bss_conf "wpa_passphrase=$key" "$N"
296 fi
297 [ -n "$wpa_psk_file" ] && {
298 [ -e "$wpa_psk_file" ] || touch "$wpa_psk_file"
299 append bss_conf "wpa_psk_file=$wpa_psk_file" "$N"
300 }
301 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
302
303 wps_possible=1
304 ;;
305 eap)
306 json_get_vars \
307 auth_server auth_secret auth_port \
308 dae_client dae_secret dae_port \
309 ownip radius_client_addr \
310 eap_reauth_period
311
312 # radius can provide VLAN ID for clients
313 vlan_possible=1
314
315 # legacy compatibility
316 [ -n "$auth_server" ] || json_get_var auth_server server
317 [ -n "$auth_port" ] || json_get_var auth_port port
318 [ -n "$auth_secret" ] || json_get_var auth_secret key
319
320 set_default auth_port 1812
321 set_default dae_port 3799
322
323
324 append bss_conf "auth_server_addr=$auth_server" "$N"
325 append bss_conf "auth_server_port=$auth_port" "$N"
326 append bss_conf "auth_server_shared_secret=$auth_secret" "$N"
327
328 [ -n "$eap_reauth_period" ] && append bss_conf "eap_reauth_period=$eap_reauth_period" "$N"
329
330 [ -n "$dae_client" -a -n "$dae_secret" ] && {
331 append bss_conf "radius_das_port=$dae_port" "$N"
332 append bss_conf "radius_das_client=$dae_client $dae_secret" "$N"
333 }
334
335 [ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip" "$N"
336 [ -n "$radius_client_addr" ] && append bss_conf "radius_client_addr=$radius_client_addr" "$N"
337 append bss_conf "eapol_key_index_workaround=1" "$N"
338 append bss_conf "ieee8021x=1" "$N"
339
340 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
341 ;;
342 wep)
343 local wep_keyidx=0
344 json_get_vars key
345 hostapd_append_wep_key bss_conf
346 append bss_conf "wep_default_key=$wep_keyidx" "$N"
347 [ -n "$wep_rekey" ] && append bss_conf "wep_rekey_period=$wep_rekey" "$N"
348 ;;
349 esac
350
351 local auth_algs=$((($auth_mode_shared << 1) | $auth_mode_open))
352 append bss_conf "auth_algs=${auth_algs:-1}" "$N"
353 append bss_conf "wpa=$wpa" "$N"
354 [ -n "$wpa_pairwise" ] && append bss_conf "wpa_pairwise=$wpa_pairwise" "$N"
355
356 set_default wps_pushbutton 0
357 set_default wps_label 0
358 set_default wps_pbc_in_m1 0
359
360 config_methods=
361 [ "$wps_pushbutton" -gt 0 ] && append config_methods push_button
362 [ "$wps_label" -gt 0 ] && append config_methods label
363
364 [ -n "$wps_possible" -a -n "$config_methods" ] && {
365 set_default ext_registrar 0
366 set_default wps_device_type "6-0050F204-1"
367 set_default wps_device_name "OpenWrt AP"
368 set_default wps_manufacturer "www.openwrt.org"
369 set_default wps_independent 1
370
371 wps_state=2
372 [ -n "$wps_configured" ] && wps_state=1
373
374 [ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append bss_conf "upnp_iface=$network_bridge" "$N"
375
376 append bss_conf "eap_server=1" "$N"
377 [ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N"
378 append bss_conf "wps_state=$wps_state" "$N"
379 append bss_conf "device_type=$wps_device_type" "$N"
380 append bss_conf "device_name=$wps_device_name" "$N"
381 append bss_conf "manufacturer=$wps_manufacturer" "$N"
382 append bss_conf "config_methods=$config_methods" "$N"
383 append bss_conf "wps_independent=$wps_independent" "$N"
384 [ -n "$wps_ap_setup_locked" ] && append bss_conf "ap_setup_locked=$wps_ap_setup_locked" "$N"
385 [ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf "pbc_in_m1=$wps_pbc_in_m1" "$N"
386 }
387
388 append bss_conf "ssid=$ssid" "$N"
389 [ -n "$network_bridge" ] && append bss_conf "bridge=$network_bridge" "$N"
390 [ -n "$iapp_interface" ] && {
391 local ifname
392 network_get_device ifname "$iapp_interface" || ifname="$iapp_interface"
393 append bss_conf "iapp_interface=$ifname" "$N"
394 }
395
396 if [ "$wpa" -ge "1" ]; then
397 json_get_vars ieee80211r
398 set_default ieee80211r 0
399
400 if [ "$ieee80211r" -gt "0" ]; then
401 json_get_vars mobility_domain r0_key_lifetime r1_key_holder \
402 reassociation_deadline pmk_r1_push ft_psk_generate_local ft_over_ds
403 json_get_values r0kh r0kh
404 json_get_values r1kh r1kh
405
406 set_default mobility_domain "4f57"
407 set_default r0_key_lifetime 10000
408 set_default reassociation_deadline 1000
409 set_default pmk_r1_push 0
410 set_default ft_psk_generate_local 0
411 set_default ft_over_ds 1
412
413 append bss_conf "mobility_domain=$mobility_domain" "$N"
414 append bss_conf "r0_key_lifetime=$r0_key_lifetime" "$N"
415 [ -n "$r1_key_holder" ] && append bss_conf "r1_key_holder=$r1_key_holder" "$N"
416 append bss_conf "reassociation_deadline=$reassociation_deadline" "$N"
417 append bss_conf "pmk_r1_push=$pmk_r1_push" "$N"
418 append bss_conf "ft_psk_generate_local=$ft_psk_generate_local" "$N"
419 append bss_conf "ft_over_ds=$ft_over_ds" "$N"
420
421 for kh in $r0kh; do
422 append bss_conf "r0kh=${kh//,/ }" "$N"
423 done
424 for kh in $r1kh; do
425 append bss_conf "r1kh=${kh//,/ }" "$N"
426 done
427 fi
428
429 append bss_conf "wpa_disable_eapol_key_retries=$wpa_disable_eapol_key_retries" "$N"
430
431 hostapd_append_wpa_key_mgmt
432 [ -n "$wpa_key_mgmt" ] && append bss_conf "wpa_key_mgmt=$wpa_key_mgmt" "$N"
433 fi
434
435 if [ "$wpa" -ge "2" ]; then
436 if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then
437 set_default auth_cache 1
438 append bss_conf "rsn_preauth=1" "$N"
439 append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N"
440 else
441 set_default auth_cache 0
442 fi
443
444 append bss_conf "okc=$auth_cache" "$N"
445 [ "$auth_cache" = 0 ] && append bss_conf "disable_pmksa_caching=1" "$N"
446
447 # RSN -> allow management frame protection
448 case "$ieee80211w" in
449 [012])
450 json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
451 append bss_conf "ieee80211w=$ieee80211w" "$N"
452 [ "$ieee80211w" -gt "0" ] && {
453 append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
454 [ -n "$ieee80211w_max_timeout" ] && \
455 append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
456 [ -n "$ieee80211w_retry_timeout" ] && \
457 append bss_conf "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
458 }
459 ;;
460 esac
461 fi
462
463 _macfile="/var/run/hostapd-$ifname.maclist"
464 case "$macfilter" in
465 allow)
466 append bss_conf "macaddr_acl=1" "$N"
467 append bss_conf "accept_mac_file=$_macfile" "$N"
468 # accept_mac_file can be used to set MAC to VLAN ID mapping
469 vlan_possible=1
470 ;;
471 deny)
472 append bss_conf "macaddr_acl=0" "$N"
473 append bss_conf "deny_mac_file=$_macfile" "$N"
474 ;;
475 *)
476 _macfile=""
477 ;;
478 esac
479
480 [ -n "$_macfile" ] && {
481 json_get_vars macfile
482 json_get_values maclist maclist
483
484 rm -f "$_macfile"
485 (
486 for mac in $maclist; do
487 echo "$mac"
488 done
489 [ -n "$macfile" -a -f "$macfile" ] && cat "$macfile"
490 ) > "$_macfile"
491 }
492
493 [ -n "$vlan_possible" -a -n "$dynamic_vlan" ] && {
494 json_get_vars vlan_naming vlan_tagged_interface vlan_bridge vlan_file
495 set_default vlan_naming 1
496 append bss_conf "dynamic_vlan=$dynamic_vlan" "$N"
497 append bss_conf "vlan_naming=$vlan_naming" "$N"
498 [ -n "$vlan_bridge" ] && \
499 append bss_conf "vlan_bridge=$vlan_bridge" "$N"
500 [ -n "$vlan_tagged_interface" ] && \
501 append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N"
502 [ -n "$vlan_file" ] && {
503 [ -e "$vlan_file" ] || touch "$vlan_file"
504 append bss_conf "vlan_file=$vlan_file" "$N"
505 }
506 }
507
508 append "$var" "$bss_conf" "$N"
509 return 0
510 }
511
512 hostapd_set_log_options() {
513 local var="$1"
514
515 local log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
516 json_get_vars log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
517
518 set_default log_level 2
519 set_default log_80211 1
520 set_default log_8021x 1
521 set_default log_radius 1
522 set_default log_wpa 1
523 set_default log_driver 1
524 set_default log_iapp 1
525 set_default log_mlme 1
526
527 local log_mask=$(( \
528 ($log_80211 << 0) | \
529 ($log_8021x << 1) | \
530 ($log_radius << 2) | \
531 ($log_wpa << 3) | \
532 ($log_driver << 4) | \
533 ($log_iapp << 5) | \
534 ($log_mlme << 6) \
535 ))
536
537 append "$var" "logger_syslog=$log_mask" "$N"
538 append "$var" "logger_syslog_level=$log_level" "$N"
539 append "$var" "logger_stdout=$log_mask" "$N"
540 append "$var" "logger_stdout_level=$log_level" "$N"
541
542 return 0
543 }
544
545 _wpa_supplicant_common() {
546 local ifname="$1"
547
548 _rpath="/var/run/wpa_supplicant"
549 _config="${_rpath}-$ifname.conf"
550 }
551
552 wpa_supplicant_teardown_interface() {
553 _wpa_supplicant_common "$1"
554 rm -rf "$_rpath/$1" "$_config"
555 }
556
557 wpa_supplicant_prepare_interface() {
558 local ifname="$1"
559 _w_driver="$2"
560
561 _wpa_supplicant_common "$1"
562
563 json_get_vars mode wds
564
565 [ -n "$network_bridge" ] && {
566 fail=
567 case "$mode" in
568 adhoc)
569 fail=1
570 ;;
571 sta)
572 [ "$wds" = 1 ] || fail=1
573 ;;
574 esac
575
576 [ -n "$fail" ] && {
577 wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
578 return 1
579 }
580 }
581
582 local ap_scan=
583
584 _w_mode="$mode"
585 _w_modestr=
586
587 [[ "$mode" = adhoc ]] && {
588 ap_scan="ap_scan=2"
589
590 _w_modestr="mode=1"
591 }
592
593 local country_str=
594 [ -n "$country" ] && {
595 country_str="country=$country"
596 }
597
598 wpa_supplicant_teardown_interface "$ifname"
599 cat > "$_config" <<EOF
600 $ap_scan
601 $country_str
602 EOF
603 return 0
604 }
605
606 wpa_supplicant_set_fixed_freq() {
607 local freq="$1"
608 local htmode="$2"
609
610 append network_data "fixed_freq=1" "$N$T"
611 append network_data "frequency=$freq" "$N$T"
612 case "$htmode" in
613 NOHT) append network_data "disable_ht=1" "$N$T";;
614 HT20|VHT20) append network_data "disable_ht40=1" "$N$T";;
615 HT40*|VHT40*|VHT80*|VHT160*) append network_data "ht40=1" "$N$T";;
616 esac
617 case "$htmode" in
618 VHT*) append network_data "vht=1" "$N$T";;
619 esac
620 case "$htmode" in
621 VHT80) append network_data "max_oper_chwidth=1" "$N$T";;
622 VHT160) append network_data "max_oper_chwidth=2" "$N$T";;
623 *) append network_data "max_oper_chwidth=0" "$N$T";;
624 esac
625 }
626
627 wpa_supplicant_add_network() {
628 local ifname="$1"
629 local freq="$2"
630 local htmode="$3"
631
632 _wpa_supplicant_common "$1"
633 wireless_vif_parse_encryption
634
635 json_get_vars \
636 ssid bssid key \
637 basic_rate mcast_rate \
638 ieee80211w ieee80211r
639
640 set_default ieee80211r 0
641
642 local key_mgmt='NONE'
643 local enc_str=
644 local network_data=
645 local T=" "
646
647 local scan_ssid="scan_ssid=1"
648 local freq wpa_key_mgmt
649
650 [[ "$_w_mode" = "adhoc" ]] && {
651 append network_data "mode=1" "$N$T"
652 [ -n "$channel" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
653
654 scan_ssid="scan_ssid=0"
655
656 [ "$_w_driver" = "nl80211" ] || append wpa_key_mgmt "WPA-NONE"
657 }
658
659 [[ "$_w_mode" = "mesh" ]] && {
660 json_get_vars mesh_id
661 ssid="${mesh_id}"
662
663 append network_data "mode=5" "$N$T"
664 [ -n "$channel" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
665 append wpa_key_mgmt "SAE"
666 scan_ssid=""
667 }
668
669 [ "$_w_mode" = "adhoc" -o "$_w_mode" = "mesh" ] && append network_data "$_w_modestr" "$N$T"
670
671 case "$auth_type" in
672 none) ;;
673 wep)
674 local wep_keyidx=0
675 hostapd_append_wep_key network_data
676 append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
677 ;;
678 psk)
679 local passphrase
680
681 if [ "$_w_mode" != "mesh" ]; then
682 hostapd_append_wpa_key_mgmt
683 fi
684
685 key_mgmt="$wpa_key_mgmt"
686
687 if [ ${#key} -eq 64 ]; then
688 passphrase="psk=${key}"
689 else
690 passphrase="psk=\"${key}\""
691 fi
692 append network_data "$passphrase" "$N$T"
693 ;;
694 eap)
695 hostapd_append_wpa_key_mgmt
696 key_mgmt="$wpa_key_mgmt"
697
698 json_get_vars eap_type identity anonymous_identity ca_cert
699 [ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" "$N$T"
700 [ -n "$identity" ] && append network_data "identity=\"$identity\"" "$N$T"
701 [ -n "$anonymous_identity" ] && append network_data "anonymous_identity=\"$anonymous_identity\"" "$N$T"
702 case "$eap_type" in
703 tls)
704 json_get_vars client_cert priv_key priv_key_pwd
705 append network_data "client_cert=\"$client_cert\"" "$N$T"
706 append network_data "private_key=\"$priv_key\"" "$N$T"
707 append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T"
708 ;;
709 fast|peap|ttls)
710 json_get_vars auth password ca_cert2 client_cert2 priv_key2 priv_key2_pwd
711 set_default auth MSCHAPV2
712
713 if [ "$auth" = "EAP-TLS" ]; then
714 [ -n "$ca_cert2" ] &&
715 append network_data "ca_cert2=\"$ca_cert2\"" "$N$T"
716 append network_data "client_cert2=\"$client_cert2\"" "$N$T"
717 append network_data "private_key2=\"$priv_key2\"" "$N$T"
718 append network_data "private_key2_passwd=\"$priv_key2_pwd\"" "$N$T"
719 else
720 append network_data "password=\"$password\"" "$N$T"
721 fi
722
723 phase2proto="auth="
724 case "$auth" in
725 "auth"*)
726 phase2proto=""
727 ;;
728 "EAP-"*)
729 auth="$(echo $auth | cut -b 5- )"
730 [ "$eap_type" = "ttls" ] &&
731 phase2proto="autheap="
732 ;;
733 esac
734 append network_data "phase2=\"$phase2proto$auth\"" "$N$T"
735 ;;
736 esac
737 append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T"
738 ;;
739 esac
740
741 [ "$mode" = mesh ] || {
742 case "$wpa" in
743 1)
744 append network_data "proto=WPA" "$N$T"
745 ;;
746 2)
747 append network_data "proto=RSN" "$N$T"
748 ;;
749 esac
750
751 case "$ieee80211w" in
752 [012])
753 [ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" "$N$T"
754 ;;
755 esac
756 }
757 [ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
758 [ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int" "$N$T"
759
760 local bssid_blacklist bssid_whitelist
761 json_get_values bssid_blacklist bssid_blacklist
762 json_get_values bssid_whitelist bssid_whitelist
763
764 [ -n "$bssid_blacklist" ] && append network_data "bssid_blacklist=$bssid_blacklist" "$N$T"
765 [ -n "$bssid_whitelist" ] && append network_data "bssid_whitelist=$bssid_whitelist" "$N$T"
766
767 [ -n "$basic_rate" ] && {
768 local br rate_list=
769 for br in $basic_rate; do
770 wpa_supplicant_add_rate rate_list "$br"
771 done
772 [ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T"
773 }
774
775 [ -n "$mcast_rate" ] && {
776 local mc_rate=
777 wpa_supplicant_add_rate mc_rate "$mcast_rate"
778 append network_data "mcast_rate=$mc_rate" "$N$T"
779 }
780
781 cat >> "$_config" <<EOF
782 network={
783 $scan_ssid
784 ssid="$ssid"
785 key_mgmt=$key_mgmt
786 $network_data
787 }
788 EOF
789 return 0
790 }
791
792 wpa_supplicant_run() {
793 local ifname="$1"; shift
794
795 _wpa_supplicant_common "$ifname"
796
797 /usr/sbin/wpa_supplicant -B \
798 ${network_bridge:+-b $network_bridge} \
799 -P "/var/run/wpa_supplicant-${ifname}.pid" \
800 -D ${_w_driver:-wext} \
801 -i "$ifname" \
802 -c "$_config" \
803 -C "$_rpath" \
804 "$@"
805
806 ret="$?"
807 wireless_add_process "$(cat "/var/run/wpa_supplicant-${ifname}.pid")" /usr/sbin/wpa_supplicant 1
808
809 [ "$ret" != 0 ] && wireless_setup_vif_failed WPA_SUPPLICANT_FAILED
810
811 return $ret
812 }
813
814 hostapd_common_cleanup() {
815 killall hostapd wpa_supplicant meshd-nl80211
816 }