dfe4100d81e74203cfed1bd5484332e5df644c1c
[openwrt/openwrt.git] / package / network / services / hostapd / files / netifd.sh
1 . /lib/functions/network.sh
2
3 wpa_supplicant_add_rate() {
4 local var="$1"
5 local val="$(($2 / 1000))"
6 local sub="$((($2 / 100) % 10))"
7 append $var "$val" ","
8 [ $sub -gt 0 ] && append $var "."
9 }
10
11 hostapd_add_rate() {
12 local var="$1"
13 local val="$(($2 / 100))"
14 append $var "$val" " "
15 }
16
17 hostapd_append_wep_key() {
18 local var="$1"
19
20 wep_keyidx=0
21 set_default key 1
22 case "$key" in
23 [1234])
24 for idx in 1 2 3 4; do
25 local zidx
26 zidx=$(($idx - 1))
27 json_get_var ckey "key${idx}"
28 [ -n "$ckey" ] && \
29 append $var "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T"
30 done
31 wep_keyidx=$((key - 1))
32 ;;
33 *)
34 append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T"
35 ;;
36 esac
37 }
38
39 hostapd_append_wpa_key_mgmt() {
40 local auth_type="$(echo $auth_type | tr 'a-z' 'A-Z')"
41
42 append wpa_key_mgmt "WPA-$auth_type"
43 [ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-${auth_type}"
44 [ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type}-SHA256"
45 }
46
47 hostapd_add_log_config() {
48 config_add_boolean \
49 log_80211 \
50 log_8021x \
51 log_radius \
52 log_wpa \
53 log_driver \
54 log_iapp \
55 log_mlme
56
57 config_add_int log_level
58 }
59
60 hostapd_common_add_device_config() {
61 config_add_array basic_rate
62 config_add_array supported_rates
63
64 config_add_string country
65 config_add_boolean country_ie doth
66 config_add_string require_mode
67
68 hostapd_add_log_config
69 }
70
71 hostapd_prepare_device_config() {
72 local config="$1"
73 local driver="$2"
74
75 local base="${config%%.conf}"
76 local base_cfg=
77
78 json_get_vars country country_ie beacon_int doth require_mode
79
80 hostapd_set_log_options base_cfg
81
82 set_default country_ie 1
83 set_default doth 1
84
85 [ -n "$country" ] && {
86 append base_cfg "country_code=$country" "$N"
87
88 [ "$country_ie" -gt 0 ] && append base_cfg "ieee80211d=1" "$N"
89 [ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg "ieee80211h=1" "$N"
90 }
91 [ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N"
92
93 local brlist= br
94 json_get_values basic_rate_list basic_rate
95 for br in $basic_rate_list; do
96 hostapd_add_rate brlist "$br"
97 done
98 case "$require_mode" in
99 g) brlist="60 120 240" ;;
100 n) append base_cfg "require_ht=1" "$N";;
101 ac) append base_cfg "require_vht=1" "$N";;
102 esac
103
104 local rlist= r
105 json_get_values rate_list supported_rates
106 for r in $rate_list; do
107 hostapd_add_rate rlist "$r"
108 done
109
110 [ -n "$rlist" ] && append base_cfg "supported_rates=$rlist" "$N"
111 [ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N"
112 [ -n "$beacon_int" ] && append base_cfg "beacon_int=$beacon_int" "$N"
113
114 cat > "$config" <<EOF
115 driver=$driver
116 $base_cfg
117 EOF
118 }
119
120 hostapd_common_add_bss_config() {
121 config_add_string 'bssid:macaddr' 'ssid:string'
122 config_add_boolean wds wmm uapsd hidden
123
124 config_add_int maxassoc max_inactivity
125 config_add_boolean disassoc_low_ack isolate short_preamble
126
127 config_add_int \
128 wep_rekey eap_reauth_period \
129 wpa_group_rekey wpa_pair_rekey wpa_master_rekey
130
131 config_add_boolean rsn_preauth auth_cache
132 config_add_int ieee80211w
133 config_add_int eapol_version
134
135 config_add_string 'auth_server:host' 'server:host'
136 config_add_string auth_secret
137 config_add_int 'auth_port:port' 'port:port'
138
139 config_add_string acct_server
140 config_add_string acct_secret
141 config_add_int acct_port
142
143 config_add_string dae_client
144 config_add_string dae_secret
145 config_add_int dae_port
146
147 config_add_string nasid
148 config_add_string ownip
149 config_add_string iapp_interface
150 config_add_string eap_type ca_cert client_cert identity anonymous_identity auth priv_key priv_key_pwd
151
152 config_add_int dynamic_vlan vlan_naming
153 config_add_string vlan_tagged_interface vlan_bridge
154 config_add_string vlan_file
155
156 config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey' 'key4:wepkey' 'password:wpakey'
157
158 config_add_string wpa_psk_file
159
160 config_add_boolean wps_pushbutton wps_label ext_registrar wps_pbc_in_m1
161 config_add_int wps_ap_setup_locked wps_independent
162 config_add_string wps_device_type wps_device_name wps_manufacturer wps_pin
163
164 config_add_boolean ieee80211r pmk_r1_push
165 config_add_int r0_key_lifetime reassociation_deadline
166 config_add_string mobility_domain r1_key_holder
167 config_add_array r0kh r1kh
168
169 config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout
170
171 config_add_string macfilter 'macfile:file'
172 config_add_array 'maclist:list(macaddr)'
173
174 config_add_array bssid_blacklist
175 config_add_array bssid_whitelist
176
177 config_add_int mcast_rate
178 config_add_array basic_rate
179 config_add_array supported_rates
180 }
181
182 hostapd_set_bss_options() {
183 local var="$1"
184 local phy="$2"
185 local vif="$3"
186
187 wireless_vif_parse_encryption
188
189 local bss_conf
190 local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
191
192 json_get_vars \
193 wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey \
194 maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
195 wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 wps_ap_setup_locked \
196 wps_independent wps_device_type wps_device_name wps_manufacturer wps_pin \
197 macfilter ssid wmm uapsd hidden short_preamble rsn_preauth \
198 iapp_interface eapol_version acct_server acct_secret acct_port \
199 dynamic_vlan ieee80211w
200
201 set_default isolate 0
202 set_default maxassoc 0
203 set_default max_inactivity 0
204 set_default short_preamble 1
205 set_default disassoc_low_ack 1
206 set_default hidden 0
207 set_default wmm 1
208 set_default uapsd 1
209 set_default eapol_version 0
210 set_default acct_port 1813
211
212 append bss_conf "ctrl_interface=/var/run/hostapd"
213 if [ "$isolate" -gt 0 ]; then
214 append bss_conf "ap_isolate=$isolate" "$N"
215 fi
216 if [ "$maxassoc" -gt 0 ]; then
217 append bss_conf "max_num_sta=$maxassoc" "$N"
218 fi
219 if [ "$max_inactivity" -gt 0 ]; then
220 append bss_conf "ap_max_inactivity=$max_inactivity" "$N"
221 fi
222
223 append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N"
224 append bss_conf "preamble=$short_preamble" "$N"
225 append bss_conf "wmm_enabled=$wmm" "$N"
226 append bss_conf "ignore_broadcast_ssid=$hidden" "$N"
227 append bss_conf "uapsd_advertisement_enabled=$uapsd" "$N"
228
229 [ "$wpa" -gt 0 ] && {
230 [ -n "$wpa_group_rekey" ] && append bss_conf "wpa_group_rekey=$wpa_group_rekey" "$N"
231 [ -n "$wpa_pair_rekey" ] && append bss_conf "wpa_ptk_rekey=$wpa_pair_rekey" "$N"
232 [ -n "$wpa_master_rekey" ] && append bss_conf "wpa_gmk_rekey=$wpa_master_rekey" "$N"
233 }
234
235 [ -n "$acct_server" ] && {
236 append bss_conf "acct_server_addr=$acct_server" "$N"
237 append bss_conf "acct_server_port=$acct_port" "$N"
238 [ -n "$acct_secret" ] && \
239 append bss_conf "acct_server_shared_secret=$acct_secret" "$N"
240 }
241
242 local vlan_possible=""
243
244 case "$auth_type" in
245 none)
246 wps_possible=1
247 # Here we make the assumption that if we're in open mode
248 # with WPS enabled, we got to be in unconfigured state.
249 wps_not_configured=1
250 ;;
251 psk)
252 json_get_vars key wpa_psk_file
253 if [ ${#key} -lt 8 ]; then
254 wireless_setup_vif_failed INVALID_WPA_PSK
255 return 1
256 elif [ ${#key} -eq 64 ]; then
257 append bss_conf "wpa_psk=$key" "$N"
258 else
259 append bss_conf "wpa_passphrase=$key" "$N"
260 fi
261 [ -n "$wpa_psk_file" ] && {
262 [ -e "$wpa_psk_file" ] || touch "$wpa_psk_file"
263 append bss_conf "wpa_psk_file=$wpa_psk_file" "$N"
264 }
265 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
266
267 wps_possible=1
268 ;;
269 eap)
270 json_get_vars \
271 auth_server auth_secret auth_port \
272 dae_client dae_secret dae_port \
273 ownip \
274 eap_reauth_period
275
276 # radius can provide VLAN ID for clients
277 vlan_possible=1
278
279 # legacy compatibility
280 [ -n "$auth_server" ] || json_get_var auth_server server
281 [ -n "$auth_port" ] || json_get_var auth_port port
282 [ -n "$auth_secret" ] || json_get_var auth_secret key
283
284 set_default auth_port 1812
285 set_default dae_port 3799
286
287
288 append bss_conf "auth_server_addr=$auth_server" "$N"
289 append bss_conf "auth_server_port=$auth_port" "$N"
290 append bss_conf "auth_server_shared_secret=$auth_secret" "$N"
291
292 [ -n "$eap_reauth_period" ] && append bss_conf "eap_reauth_period=$eap_reauth_period" "$N"
293
294 [ -n "$dae_client" -a -n "$dae_secret" ] && {
295 append bss_conf "radius_das_port=$dae_port" "$N"
296 append bss_conf "radius_das_client=$dae_client $dae_secret" "$N"
297 }
298
299 [ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip" "$N"
300 append bss_conf "eapol_key_index_workaround=1" "$N"
301 append bss_conf "ieee8021x=1" "$N"
302
303 [ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
304 ;;
305 wep)
306 local wep_keyidx=0
307 json_get_vars key
308 hostapd_append_wep_key bss_conf
309 append bss_conf "wep_default_key=$wep_keyidx" "$N"
310 [ -n "$wep_rekey" ] && append bss_conf "wep_rekey_period=$wep_rekey" "$N"
311 ;;
312 esac
313
314 local auth_algs=$((($auth_mode_shared << 1) | $auth_mode_open))
315 append bss_conf "auth_algs=${auth_algs:-1}" "$N"
316 append bss_conf "wpa=$wpa" "$N"
317 [ -n "$wpa_pairwise" ] && append bss_conf "wpa_pairwise=$wpa_pairwise" "$N"
318
319 set_default wps_pushbutton 0
320 set_default wps_label 0
321 set_default wps_pbc_in_m1 0
322
323 config_methods=
324 [ "$wps_pushbutton" -gt 0 ] && append config_methods push_button
325 [ "$wps_label" -gt 0 ] && append config_methods label
326
327 [ -n "$wps_possible" -a -n "$config_methods" ] && {
328 set_default ext_registrar 0
329 set_default wps_device_type "6-0050F204-1"
330 set_default wps_device_name "Lede AP"
331 set_default wps_manufacturer "www.lede-project.org"
332
333 wps_state=2
334 [ -n "$wps_configured" ] && wps_state=1
335
336 [ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append bss_conf "upnp_iface=$network_bridge" "$N"
337
338 append bss_conf "eap_server=1" "$N"
339 [ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N"
340 append bss_conf "wps_state=$wps_state" "$N"
341 append bss_conf "device_type=$wps_device_type" "$N"
342 append bss_conf "device_name=$wps_device_name" "$N"
343 append bss_conf "manufacturer=$wps_manufacturer" "$N"
344 append bss_conf "config_methods=$config_methods" "$N"
345 [ -n "$wps_ap_setup_locked" ] && append bss_conf "ap_setup_locked=$wps_ap_setup_locked" "$N"
346 [ -n "$wps_independent" ] && append bss_conf "wps_independent=$wps_independent" "$N"
347 [ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf "pbc_in_m1=$wps_pbc_in_m1" "$N"
348 }
349
350 append bss_conf "ssid=$ssid" "$N"
351 [ -n "$network_bridge" ] && append bss_conf "bridge=$network_bridge" "$N"
352 [ -n "$iapp_interface" ] && {
353 local ifname
354 network_get_device ifname "$iapp_interface" || ifname = "$iapp_interface"
355 append bss_conf "iapp_interface=$ifname" "$N"
356 }
357
358 if [ "$wpa" -ge "1" ]; then
359 json_get_vars nasid ieee80211r
360 set_default ieee80211r 0
361 [ -n "$nasid" ] && append bss_conf "nas_identifier=$nasid" "$N"
362
363 if [ "$ieee80211r" -gt "0" ]; then
364 json_get_vars mobility_domain r0_key_lifetime r1_key_holder \
365 reassociation_deadline pmk_r1_push
366 json_get_values r0kh r0kh
367 json_get_values r1kh r1kh
368
369 set_default mobility_domain "4f57"
370 set_default r0_key_lifetime 10000
371 set_default r1_key_holder "00004f577274"
372 set_default reassociation_deadline 1000
373 set_default pmk_r1_push 0
374
375 append bss_conf "mobility_domain=$mobility_domain" "$N"
376 append bss_conf "r0_key_lifetime=$r0_key_lifetime" "$N"
377 append bss_conf "r1_key_holder=$r1_key_holder" "$N"
378 append bss_conf "reassociation_deadline=$reassociation_deadline" "$N"
379 append bss_conf "pmk_r1_push=$pmk_r1_push" "$N"
380
381 for kh in $r0kh; do
382 append bss_conf "r0kh=${kh//,/ }" "$N"
383 done
384 for kh in $r1kh; do
385 append bss_conf "r1kh=${kh//,/ }" "$N"
386 done
387 fi
388
389 hostapd_append_wpa_key_mgmt
390 [ -n "$wpa_key_mgmt" ] && append bss_conf "wpa_key_mgmt=$wpa_key_mgmt" "$N"
391 fi
392
393 if [ "$wpa" -ge "2" ]; then
394 if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then
395 set_default auth_cache 1
396 append bss_conf "rsn_preauth=1" "$N"
397 append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N"
398 else
399 set_default auth_cache 0
400 fi
401
402 append bss_conf "okc=$auth_cache" "$N"
403 [ "$auth_cache" = 0 ] && append bss_conf "disable_pmksa_caching=1" "$N"
404
405 # RSN -> allow management frame protection
406 case "$ieee80211w" in
407 [012])
408 json_get_vars ieee80211w_max_timeout ieee80211w_retry_timeout
409 append bss_conf "ieee80211w=$ieee80211w" "$N"
410 [ "$ieee80211w" -gt "0" ] && {
411 [ -n "$ieee80211w_max_timeout" ] && \
412 append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
413 [ -n "$ieee80211w_retry_timeout" ] && \
414 append bss_conf "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
415 }
416 ;;
417 esac
418 fi
419
420 _macfile="/var/run/hostapd-$ifname.maclist"
421 case "$macfilter" in
422 allow)
423 append bss_conf "macaddr_acl=1" "$N"
424 append bss_conf "accept_mac_file=$_macfile" "$N"
425 # accept_mac_file can be used to set MAC to VLAN ID mapping
426 vlan_possible=1
427 ;;
428 deny)
429 append bss_conf "macaddr_acl=0" "$N"
430 append bss_conf "deny_mac_file=$_macfile" "$N"
431 ;;
432 *)
433 _macfile=""
434 ;;
435 esac
436
437 [ -n "$_macfile" ] && {
438 json_get_vars macfile
439 json_get_values maclist maclist
440
441 rm -f "$_macfile"
442 (
443 for mac in $maclist; do
444 echo "$mac"
445 done
446 [ -n "$macfile" -a -f "$macfile" ] && cat "$macfile"
447 ) > "$_macfile"
448 }
449
450 [ -n "$vlan_possible" -a -n "$dynamic_vlan" ] && {
451 json_get_vars vlan_naming vlan_tagged_interface vlan_bridge vlan_file
452 set_default vlan_naming 1
453 append bss_conf "dynamic_vlan=$dynamic_vlan" "$N"
454 append bss_conf "vlan_naming=$vlan_naming" "$N"
455 [ -n "$vlan_bridge" ] && \
456 append bss_conf "vlan_bridge=$vlan_bridge" "$N"
457 [ -n "$vlan_tagged_interface" ] && \
458 append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N"
459 [ -n "$vlan_file" ] && {
460 [ -e "$vlan_file" ] || touch "$vlan_file"
461 append bss_conf "vlan_file=$vlan_file" "$N"
462 }
463 }
464
465 append "$var" "$bss_conf" "$N"
466 return 0
467 }
468
469 hostapd_set_log_options() {
470 local var="$1"
471
472 local log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
473 json_get_vars log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
474
475 set_default log_level 2
476 set_default log_80211 1
477 set_default log_8021x 1
478 set_default log_radius 1
479 set_default log_wpa 1
480 set_default log_driver 1
481 set_default log_iapp 1
482 set_default log_mlme 1
483
484 local log_mask=$(( \
485 ($log_80211 << 0) | \
486 ($log_8021x << 1) | \
487 ($log_radius << 2) | \
488 ($log_wpa << 3) | \
489 ($log_driver << 4) | \
490 ($log_iapp << 5) | \
491 ($log_mlme << 6) \
492 ))
493
494 append "$var" "logger_syslog=$log_mask" "$N"
495 append "$var" "logger_syslog_level=$log_level" "$N"
496 append "$var" "logger_stdout=$log_mask" "$N"
497 append "$var" "logger_stdout_level=$log_level" "$N"
498
499 return 0
500 }
501
502 _wpa_supplicant_common() {
503 local ifname="$1"
504
505 _rpath="/var/run/wpa_supplicant"
506 _config="${_rpath}-$ifname.conf"
507 }
508
509 wpa_supplicant_teardown_interface() {
510 _wpa_supplicant_common "$1"
511 rm -rf "$_rpath/$1" "$_config"
512 }
513
514 wpa_supplicant_prepare_interface() {
515 local ifname="$1"
516 _w_driver="$2"
517
518 _wpa_supplicant_common "$1"
519
520 json_get_vars mode wds
521
522 [ -n "$network_bridge" ] && {
523 fail=
524 case "$mode" in
525 adhoc)
526 fail=1
527 ;;
528 sta)
529 [ "$wds" = 1 ] || fail=1
530 ;;
531 esac
532
533 [ -n "$fail" ] && {
534 wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
535 return 1
536 }
537 }
538
539 local ap_scan=
540
541 _w_mode="$mode"
542 _w_modestr=
543
544 [[ "$mode" = adhoc ]] && {
545 ap_scan="ap_scan=2"
546
547 _w_modestr="mode=1"
548 }
549
550 local country_str=
551 [ -n "$country" ] && {
552 country_str="country=$country"
553 }
554
555 wpa_supplicant_teardown_interface "$ifname"
556 cat > "$_config" <<EOF
557 $ap_scan
558 $country_str
559 EOF
560 return 0
561 }
562
563 wpa_supplicant_add_network() {
564 local ifname="$1"
565
566 _wpa_supplicant_common "$1"
567 wireless_vif_parse_encryption
568
569 json_get_vars \
570 ssid bssid key \
571 basic_rate mcast_rate \
572 ieee80211w ieee80211r
573
574 set_default ieee80211r 0
575
576 local key_mgmt='NONE'
577 local enc_str=
578 local network_data=
579 local T=" "
580
581 local scan_ssid="scan_ssid=1"
582 local freq wpa_key_mgmt
583
584 [[ "$_w_mode" = "adhoc" ]] && {
585 append network_data "mode=1" "$N$T"
586 [ -n "$channel" ] && {
587 freq="$(get_freq "$phy" "$channel")"
588 append network_data "fixed_freq=1" "$N$T"
589 append network_data "frequency=$freq" "$N$T"
590 }
591
592 scan_ssid="scan_ssid=0"
593
594 [ "$_w_driver" = "nl80211" ] || append wpa_key_mgmt "WPA-NONE"
595 }
596
597 [[ "$_w_mode" = "mesh" ]] && {
598 json_get_vars mesh_id
599 ssid="${mesh_id}"
600
601 append network_data "mode=5" "$N$T"
602 [ -n "$channel" ] && {
603 freq="$(get_freq "$phy" "$channel")"
604 append network_data "frequency=$freq" "$N$T"
605 }
606 append wpa_key_mgmt "SAE"
607 scan_ssid=""
608 }
609
610 [[ "$_w_mode" = "adhoc" -o "$_w_mode" = "mesh" ]] && append network_data "$_w_modestr" "$N$T"
611
612 case "$auth_type" in
613 none) ;;
614 wep)
615 local wep_keyidx=0
616 hostapd_append_wep_key network_data
617 append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
618 ;;
619 psk)
620 local passphrase
621
622 if [ "$_w_mode" != "mesh" ]; then
623 hostapd_append_wpa_key_mgmt
624 fi
625
626 key_mgmt="$wpa_key_mgmt"
627
628 if [ ${#key} -eq 64 ]; then
629 passphrase="psk=${key}"
630 else
631 passphrase="psk=\"${key}\""
632 fi
633 append network_data "$passphrase" "$N$T"
634 ;;
635 eap)
636 hostapd_append_wpa_key_mgmt
637 key_mgmt="$wpa_key_mgmt"
638
639 json_get_vars eap_type identity anonymous_identity ca_cert
640 [ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" "$N$T"
641 [ -n "$identity" ] && append network_data "identity=\"$identity\"" "$N$T"
642 [ -n "$anonymous_identity" ] && append network_data "anonymous_identity=\"$anonymous_identity\"" "$N$T"
643 case "$eap_type" in
644 tls)
645 json_get_vars client_cert priv_key priv_key_pwd
646 append network_data "client_cert=\"$client_cert\"" "$N$T"
647 append network_data "private_key=\"$priv_key\"" "$N$T"
648 append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T"
649 ;;
650 fast|peap|ttls)
651 json_get_vars auth password ca_cert2 client_cert2 priv_key2 priv_key2_pwd
652 set_default auth MSCHAPV2
653
654 if [ "$auth" = "EAP-TLS" ]; then
655 [ -n "$ca_cert2" ] &&
656 append network_data "ca_cert2=\"$ca_cert2\"" "$N$T"
657 append network_data "client_cert2=\"$client_cert2\"" "$N$T"
658 append network_data "private_key2=\"$priv_key2\"" "$N$T"
659 append network_data "private_key2_passwd=\"$priv_key2_pwd\"" "$N$T"
660 else
661 append network_data "password=\"$password\"" "$N$T"
662 fi
663
664 phase2proto="auth="
665 case "$auth" in
666 "auth"*)
667 phase2proto=""
668 ;;
669 "EAP-"*)
670 auth="$(echo $auth | cut -b 5- )"
671 [ "$eap_type" = "ttls" ] &&
672 phase2proto="autheap="
673 ;;
674 esac
675 append network_data "phase2=\"$phase2proto$auth\"" "$N$T"
676 ;;
677 esac
678 append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T"
679 ;;
680 esac
681
682 [ "$mode" = mesh ] || {
683 case "$wpa" in
684 1)
685 append network_data "proto=WPA" "$N$T"
686 ;;
687 2)
688 append network_data "proto=RSN" "$N$T"
689 ;;
690 esac
691
692 case "$ieee80211w" in
693 [012])
694 [ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" "$N$T"
695 ;;
696 esac
697 }
698 local beacon_int brates mrate
699 [ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
700 [ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int" "$N$T"
701
702 local bssid_blacklist bssid_whitelist
703 json_get_values bssid_blacklist bssid_blacklist
704 json_get_values bssid_whitelist bssid_whitelist
705
706 [ -n "$bssid_blacklist" ] && append network_data "bssid_blacklist=$bssid_blacklist" "$N$T"
707 [ -n "$bssid_whitelist" ] && append network_data "bssid_whitelist=$bssid_whitelist" "$N$T"
708
709 [ -n "$basic_rate" ] && {
710 local br rate_list=
711 for br in $basic_rate; do
712 wpa_supplicant_add_rate rate_list "$br"
713 done
714 [ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T"
715 }
716
717 [ -n "$mcast_rate" ] && {
718 local mc_rate=
719 wpa_supplicant_add_rate mc_rate "$mcast_rate"
720 append network_data "mcast_rate=$mc_rate" "$N$T"
721 }
722
723 local ht_str
724 [[ "$_w_mode" = adhoc ]] || ibss_htmode=
725 [ -n "$ibss_htmode" ] && append network_data "htmode=$ibss_htmode" "$N$T"
726
727 cat >> "$_config" <<EOF
728 network={
729 $scan_ssid
730 ssid="$ssid"
731 key_mgmt=$key_mgmt
732 $network_data
733 }
734 EOF
735 return 0
736 }
737
738 wpa_supplicant_run() {
739 local ifname="$1"; shift
740
741 _wpa_supplicant_common "$ifname"
742
743 /usr/sbin/wpa_supplicant -B \
744 ${network_bridge:+-b $network_bridge} \
745 -P "/var/run/wpa_supplicant-${ifname}.pid" \
746 -D ${_w_driver:-wext} \
747 -i "$ifname" \
748 -c "$_config" \
749 -C "$_rpath" \
750 "$@"
751
752 ret="$?"
753 wireless_add_process "$(cat "/var/run/wpa_supplicant-${ifname}.pid")" /usr/sbin/wpa_supplicant 1
754
755 [ "$ret" != 0 ] && wireless_setup_vif_failed WPA_SUPPLICANT_FAILED
756
757 return $ret
758 }
759
760 hostapd_common_cleanup() {
761 killall hostapd wpa_supplicant meshd-nl80211
762 }