 65a1c666f2
			
		
	
	65a1c666f2
	
	
	
		
			
			Regarding SAE support in wifi-station:
Important Note: Unlike PSK wifi-stations, both `mac` and `key` options are required
to make it work. With PSK, hostapd used to perform a brute-force match to find which
PSK entry to use, but with SAE this is infeasible due to SAE's design.
When `mac` is omitted, it will allow any MAC address to use the SAE password if it
didn't have a MAC address assigned to it, but this could only be done once.
The last wildcard entry would be used.
Also, unlike "hostapd: add support for SAE in PPSK option" (commit 913368a),
it is not required to set `sae_pwe` to `0`. This gives it a slight advantage
over using PPSK that goes beyond not needing RADIUS.
Example Configuration:
```
config wifi-vlan
        option iface default_radio0
        option name 999
        option vid 999
        option network management
config wifi-station
        # Allow user with MAC address 00:11:22:33:44:55 and matching
        # key "secretadminpass" to access the management network.
        option iface default_radio0
        option vid 999
        option mac '00:11:22:33:44:55'
        option key secretadminpass
config wifi-vlan
        option iface default_radio0
        option name 100
        option vid 100
        option network guest
config wifi-station
        # With SAE, when 'mac' is omitted it will be the fallback in case no
        # other MAC address matches. It won't be possible for a user that
        # has a matching MAC to use this network (i.e., 00:11:22:33:44:55
        # in this example).
        option iface default_radio0
        option vid 100
        option key guestpass
```
Regarding PSK file creation optimization:
This patch now conditionally runs `hostapd_set_psk_file` depending on `auth_type`.
Previously, `hostapd_set_psk` would always execute `hostapd_set_psk_file`, which
would create a new file if `wifi-station` was in use even if PSK was not enabled.
This change checks the `auth_type` to ensure that it is appropriate to parse the
`wifi-station` entries and create those files.
Furthermore, we now only configure `wpa_psk_file` when it is a supported option
(i.e., psk or psk-sae is used). Previously, we used to configure it when it was
not necessary. While it didn't cause any issues, it would litter `/var/run` with
unnecessary files. This patch fixes that case by configuring it depending on the
`auth_type`.
The new SAE support is aligned with these PSK file changes.
Signed-off-by: Rany Hany <rany_hany@riseup.net>
Link: https://github.com/openwrt/openwrt/pull/17145
Signed-off-by: John Crispin <john@phrozen.org>
		
	
		
			
				
	
	
		
			1657 lines
		
	
	
		
			51 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			1657 lines
		
	
	
		
			51 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| . /lib/functions/network.sh
 | |
| . /lib/functions.sh
 | |
| 
 | |
| wpa_supplicant_add_rate() {
 | |
| 	local var="$1"
 | |
| 	local val="$(($2 / 1000))"
 | |
| 	local sub="$((($2 / 100) % 10))"
 | |
| 	append $var "$val" ","
 | |
| 	[ $sub -gt 0 ] && append $var "."
 | |
| }
 | |
| 
 | |
| hostapd_add_rate() {
 | |
| 	local var="$1"
 | |
| 	local val="$(($2 / 100))"
 | |
| 	append $var "$val" " "
 | |
| }
 | |
| 
 | |
| hostapd_append_wep_key() {
 | |
| 	local var="$1"
 | |
| 
 | |
| 	wep_keyidx=0
 | |
| 	set_default key 1
 | |
| 	case "$key" in
 | |
| 		[1234])
 | |
| 			for idx in 1 2 3 4; do
 | |
| 				local zidx
 | |
| 				zidx="$(($idx - 1))"
 | |
| 				json_get_var ckey "key${idx}"
 | |
| 				[ -n "$ckey" ] && \
 | |
| 					append $var "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T"
 | |
| 			done
 | |
| 			wep_keyidx="$((key - 1))"
 | |
| 		;;
 | |
| 		*)
 | |
| 			append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T"
 | |
| 		;;
 | |
| 	esac
 | |
| }
 | |
| 
 | |
| hostapd_append_wpa_key_mgmt() {
 | |
| 	local auth_type_l="$(echo $auth_type | tr 'a-z' 'A-Z')"
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		psk|eap)
 | |
| 			append wpa_key_mgmt "WPA-$auth_type_l"
 | |
| 			[ "${wpa:-2}" -ge 2 ] && [ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-${auth_type_l}"
 | |
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-${auth_type_l}-SHA256"
 | |
| 		;;
 | |
| 		eap192)
 | |
| 			append wpa_key_mgmt "WPA-EAP-SUITE-B-192"
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP-SHA384"
 | |
| 		;;
 | |
| 		eap-eap2)
 | |
| 			append wpa_key_mgmt "WPA-EAP"
 | |
| 			append wpa_key_mgmt "WPA-EAP-SHA256"
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
 | |
| 		;;
 | |
| 		eap2)
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-EAP"
 | |
| 			append wpa_key_mgmt "WPA-EAP-SHA256"
 | |
| 		;;
 | |
| 		sae)
 | |
| 			append wpa_key_mgmt "SAE"
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-SAE"
 | |
| 		;;
 | |
| 		psk-sae)
 | |
| 			append wpa_key_mgmt "WPA-PSK"
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-PSK"
 | |
| 			[ "${ieee80211w:-0}" -gt 0 ] && append wpa_key_mgmt "WPA-PSK-SHA256"
 | |
| 			append wpa_key_mgmt "SAE"
 | |
| 			[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt "FT-SAE"
 | |
| 		;;
 | |
| 		owe)
 | |
| 			append wpa_key_mgmt "OWE"
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	[ "$fils" -gt 0 ] && {
 | |
| 		case "$auth_type" in
 | |
| 			eap192)
 | |
| 				append wpa_key_mgmt FILS-SHA384
 | |
| 				[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt FT-FILS-SHA384
 | |
| 			;;
 | |
| 			eap*)
 | |
| 				append wpa_key_mgmt FILS-SHA256
 | |
| 				[ "${ieee80211r:-0}" -gt 0 ] && append wpa_key_mgmt FT-FILS-SHA256
 | |
| 			;;
 | |
| 		esac
 | |
| 	}
 | |
| 
 | |
| 	[ "$auth_osen" = "1" ] && append wpa_key_mgmt "OSEN"
 | |
| }
 | |
| 
 | |
| hostapd_add_log_config() {
 | |
| 	config_add_boolean \
 | |
| 		log_80211 \
 | |
| 		log_8021x \
 | |
| 		log_radius \
 | |
| 		log_wpa \
 | |
| 		log_driver \
 | |
| 		log_iapp \
 | |
| 		log_mlme
 | |
| 
 | |
| 	config_add_int log_level
 | |
| }
 | |
| 
 | |
| hostapd_common_add_device_config() {
 | |
| 	config_add_array basic_rate
 | |
| 	config_add_array supported_rates
 | |
| 	config_add_string beacon_rate
 | |
| 
 | |
| 	config_add_string country country3
 | |
| 	config_add_boolean country_ie doth
 | |
| 	config_add_boolean spectrum_mgmt_required
 | |
| 	config_add_int local_pwr_constraint
 | |
| 	config_add_string require_mode
 | |
| 	config_add_boolean legacy_rates
 | |
| 	config_add_int cell_density
 | |
| 	config_add_int rts_threshold
 | |
| 	config_add_int rssi_reject_assoc_rssi
 | |
| 	config_add_int rssi_ignore_probe_request
 | |
| 	config_add_int maxassoc
 | |
| 	config_add_int reg_power_type
 | |
| 	config_add_boolean stationary_ap
 | |
| 
 | |
| 	config_add_string acs_chan_bias
 | |
| 	config_add_array hostapd_options
 | |
| 
 | |
| 	config_add_int airtime_mode
 | |
| 	config_add_int mbssid
 | |
| 
 | |
| 	hostapd_add_log_config
 | |
| }
 | |
| 
 | |
| hostapd_prepare_device_config() {
 | |
| 	local config="$1"
 | |
| 	local driver="$2"
 | |
| 
 | |
| 	local base_cfg=
 | |
| 
 | |
| 	json_get_vars country country3 country_ie beacon_int:100 doth require_mode legacy_rates \
 | |
| 		acs_chan_bias local_pwr_constraint spectrum_mgmt_required airtime_mode cell_density \
 | |
| 		rts_threshold beacon_rate rssi_reject_assoc_rssi rssi_ignore_probe_request maxassoc \
 | |
| 		mbssid:0 band reg_power_type stationary_ap
 | |
| 
 | |
| 	hostapd_set_log_options base_cfg
 | |
| 
 | |
| 	set_default country_ie 1
 | |
| 	set_default spectrum_mgmt_required 0
 | |
| 	set_default doth 1
 | |
| 	set_default legacy_rates 0
 | |
| 	set_default airtime_mode 0
 | |
| 	set_default cell_density 0
 | |
| 
 | |
| 	[ -n "$country" ] && {
 | |
| 		append base_cfg "country_code=$country" "$N"
 | |
| 		[ -n "$country3" ] && append base_cfg "country3=$country3" "$N"
 | |
| 
 | |
| 		[ "$country_ie" -gt 0 ] && {
 | |
| 			append base_cfg "ieee80211d=1" "$N"
 | |
| 			[ -n "$local_pwr_constraint" ] && append base_cfg "local_pwr_constraint=$local_pwr_constraint" "$N"
 | |
| 			[ "$spectrum_mgmt_required" -gt 0 ] && append base_cfg "spectrum_mgmt_required=$spectrum_mgmt_required" "$N"
 | |
| 		}
 | |
| 		[ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg "ieee80211h=1" "$N"
 | |
| 	}
 | |
| 
 | |
| 	[ -n "$acs_chan_bias" ] && append base_cfg "acs_chan_bias=$acs_chan_bias" "$N"
 | |
| 
 | |
| 	local brlist= br
 | |
| 	json_get_values basic_rate_list basic_rate
 | |
| 	local rlist= r
 | |
| 	json_get_values rate_list supported_rates
 | |
| 
 | |
| 	[ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N"
 | |
| 	if [ "$hwmode" = "g" ] || [ "$hwmode" = "a" ]; then
 | |
| 		[ -n "$require_mode" ] && legacy_rates=0
 | |
| 		case "$require_mode" in
 | |
| 			n) append base_cfg "require_ht=1" "$N";;
 | |
| 			ac) append base_cfg "require_vht=1" "$N";;
 | |
| 		esac
 | |
| 	fi
 | |
| 	case "$hwmode" in
 | |
| 		b)
 | |
| 			if [ "$cell_density" -eq 1 ]; then
 | |
| 				set_default rate_list "5500 11000"
 | |
| 				set_default basic_rate_list "5500 11000"
 | |
| 			elif [ "$cell_density" -ge 2 ]; then
 | |
| 				set_default rate_list "11000"
 | |
| 				set_default basic_rate_list "11000"
 | |
| 			fi
 | |
| 		;;
 | |
| 		g)
 | |
| 			if [ "$cell_density" -eq 0 ] || [ "$cell_density" -eq 1 ]; then
 | |
| 				if [ "$legacy_rates" -eq 0 ]; then
 | |
| 					set_default rate_list "6000 9000 12000 18000 24000 36000 48000 54000"
 | |
| 					set_default basic_rate_list "6000 12000 24000"
 | |
| 				elif [ "$cell_density" -eq 1 ]; then
 | |
| 					set_default rate_list "5500 6000 9000 11000 12000 18000 24000 36000 48000 54000"
 | |
| 					set_default basic_rate_list "5500 11000"
 | |
| 				fi
 | |
| 			elif [ "$cell_density" -ge 3 ] && [ "$legacy_rates" -ne 0 ] || [ "$cell_density" -eq 2 ]; then
 | |
| 				if [ "$legacy_rates" -eq 0 ]; then
 | |
| 					set_default rate_list "12000 18000 24000 36000 48000 54000"
 | |
| 					set_default basic_rate_list "12000 24000"
 | |
| 				else
 | |
| 					set_default rate_list "11000 12000 18000 24000 36000 48000 54000"
 | |
| 					set_default basic_rate_list "11000"
 | |
| 				fi
 | |
| 			elif [ "$cell_density" -ge 3 ]; then
 | |
| 				set_default rate_list "24000 36000 48000 54000"
 | |
| 				set_default basic_rate_list "24000"
 | |
| 			fi
 | |
| 		;;
 | |
| 		a)
 | |
| 			if [ "$cell_density" -eq 1 ]; then
 | |
| 				set_default rate_list "6000 9000 12000 18000 24000 36000 48000 54000"
 | |
| 				set_default basic_rate_list "6000 12000 24000"
 | |
| 			elif [ "$cell_density" -eq 2 ]; then
 | |
| 				set_default rate_list "12000 18000 24000 36000 48000 54000"
 | |
| 				set_default basic_rate_list "12000 24000"
 | |
| 			elif [ "$cell_density" -ge 3 ]; then
 | |
| 				set_default rate_list "24000 36000 48000 54000"
 | |
| 				set_default basic_rate_list "24000"
 | |
| 			fi
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	for r in $rate_list; do
 | |
| 		hostapd_add_rate rlist "$r"
 | |
| 	done
 | |
| 
 | |
| 	for br in $basic_rate_list; do
 | |
| 		hostapd_add_rate brlist "$br"
 | |
| 	done
 | |
| 
 | |
| 	[ -n "$rssi_reject_assoc_rssi" ] && append base_cfg "rssi_reject_assoc_rssi=$rssi_reject_assoc_rssi" "$N"
 | |
| 	[ -n "$rssi_ignore_probe_request" ] && append base_cfg "rssi_ignore_probe_request=$rssi_ignore_probe_request" "$N"
 | |
| 	[ -n "$beacon_rate" ] && append base_cfg "beacon_rate=$beacon_rate" "$N"
 | |
| 	[ -n "$rlist" ] && append base_cfg "supported_rates=$rlist" "$N"
 | |
| 	[ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N"
 | |
| 	append base_cfg "beacon_int=$beacon_int" "$N"
 | |
| 	[ -n "$rts_threshold" ] && append base_cfg "rts_threshold=$rts_threshold" "$N"
 | |
| 	[ "$airtime_mode" -gt 0 ] && append base_cfg "airtime_mode=$airtime_mode" "$N"
 | |
| 	[ -n "$maxassoc" ] && append base_cfg "iface_max_num_sta=$maxassoc" "$N"
 | |
| 	[ "$mbssid" -gt 0 ] && [ "$mbssid" -le 2 ] && append base_cfg "mbssid=$mbssid" "$N"
 | |
| 
 | |
| 	[ "$band" = "6g" ] && {
 | |
| 		set_default reg_power_type 0
 | |
| 		append base_cfg "he_6ghz_reg_pwr_type=$reg_power_type" "$N"
 | |
| 	}
 | |
| 
 | |
| 	set_default stationary_ap 1
 | |
| 	append base_cfg "stationary_ap=$stationary_ap" "$N"
 | |
| 
 | |
| 	json_get_values opts hostapd_options
 | |
| 	for val in $opts; do
 | |
| 		append base_cfg "$val" "$N"
 | |
| 	done
 | |
| 
 | |
| 	cat > "$config" <<EOF
 | |
| driver=$driver
 | |
| $base_cfg
 | |
| EOF
 | |
| }
 | |
| 
 | |
| hostapd_common_add_bss_config() {
 | |
| 	config_add_string 'bssid:macaddr' 'ssid:string'
 | |
| 	config_add_boolean wds wmm uapsd hidden utf8_ssid ppsk
 | |
| 
 | |
| 	config_add_int maxassoc max_inactivity
 | |
| 	config_add_boolean disassoc_low_ack isolate short_preamble skip_inactivity_poll
 | |
| 
 | |
| 	config_add_int \
 | |
| 		wep_rekey eap_reauth_period \
 | |
| 		wpa_group_rekey wpa_pair_rekey wpa_master_rekey
 | |
| 	config_add_boolean wpa_strict_rekey
 | |
| 	config_add_boolean wpa_disable_eapol_key_retries
 | |
| 
 | |
| 	config_add_boolean tdls_prohibit
 | |
| 
 | |
| 	config_add_boolean rsn_preauth auth_cache
 | |
| 	config_add_int ieee80211w
 | |
| 	config_add_int eapol_version
 | |
| 
 | |
| 	config_add_array auth_server acct_server
 | |
| 	config_add_string 'server:host'
 | |
| 	config_add_string auth_secret key
 | |
| 	config_add_int 'auth_port:port' 'port:port'
 | |
| 
 | |
| 	config_add_string acct_secret
 | |
| 	config_add_int acct_port
 | |
| 	config_add_int acct_interval
 | |
| 
 | |
| 	config_add_int bss_load_update_period chan_util_avg_period
 | |
| 
 | |
| 	config_add_string dae_client
 | |
| 	config_add_string dae_secret
 | |
| 	config_add_int dae_port
 | |
| 
 | |
| 	config_add_string nasid
 | |
| 	config_add_string ownip
 | |
| 	config_add_string radius_client_addr
 | |
| 	config_add_string iapp_interface
 | |
| 	config_add_string eap_type ca_cert client_cert identity anonymous_identity auth priv_key priv_key_pwd
 | |
| 	config_add_boolean ca_cert_usesystem ca_cert2_usesystem
 | |
| 	config_add_string subject_match subject_match2
 | |
| 	config_add_array altsubject_match altsubject_match2
 | |
| 	config_add_array domain_match domain_match2 domain_suffix_match domain_suffix_match2
 | |
| 	config_add_string ieee80211w_mgmt_cipher
 | |
| 
 | |
| 	config_add_int dynamic_vlan vlan_naming vlan_no_bridge
 | |
| 	config_add_string vlan_tagged_interface vlan_bridge
 | |
| 	config_add_string vlan_file
 | |
| 
 | |
| 	config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey' 'key4:wepkey' 'password:wpakey'
 | |
| 
 | |
| 	config_add_string wpa_psk_file
 | |
| 
 | |
| 	config_add_int multi_ap
 | |
| 
 | |
| 	config_add_boolean wps_pushbutton wps_label ext_registrar wps_pbc_in_m1
 | |
| 	config_add_int wps_ap_setup_locked wps_independent
 | |
| 	config_add_string wps_device_type wps_device_name wps_manufacturer wps_pin
 | |
| 	config_add_string multi_ap_backhaul_ssid multi_ap_backhaul_key
 | |
| 
 | |
| 	config_add_boolean wnm_sleep_mode wnm_sleep_mode_no_keys bss_transition mbo
 | |
| 	config_add_int time_advertisement
 | |
| 	config_add_string time_zone
 | |
| 	config_add_string vendor_elements
 | |
| 
 | |
| 	config_add_boolean ieee80211k rrm_neighbor_report rrm_beacon_report
 | |
| 
 | |
| 	config_add_boolean ftm_responder stationary_ap
 | |
| 	config_add_string lci civic
 | |
| 
 | |
| 	config_add_boolean ieee80211r pmk_r1_push ft_psk_generate_local ft_over_ds
 | |
| 	config_add_int r0_key_lifetime reassociation_deadline
 | |
| 	config_add_string mobility_domain r1_key_holder
 | |
| 	config_add_array r0kh r1kh
 | |
| 
 | |
| 	config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout
 | |
| 
 | |
| 	config_add_string macfilter 'macfile:file'
 | |
| 	config_add_array 'maclist:list(macaddr)'
 | |
| 
 | |
| 	config_add_array bssid_blacklist
 | |
| 	config_add_array bssid_whitelist
 | |
| 
 | |
| 	config_add_int mcast_rate
 | |
| 	config_add_array basic_rate
 | |
| 	config_add_array supported_rates
 | |
| 
 | |
| 	config_add_boolean sae_require_mfp
 | |
| 	config_add_int sae_pwe
 | |
| 
 | |
| 	config_add_string 'owe_transition_bssid:macaddr' 'owe_transition_ssid:string'
 | |
| 	config_add_string owe_transition_ifname
 | |
| 
 | |
| 	config_add_boolean iw_enabled iw_internet iw_asra iw_esr iw_uesa
 | |
| 	config_add_int iw_access_network_type iw_venue_group iw_venue_type
 | |
| 	config_add_int iw_ipaddr_type_availability iw_gas_address3
 | |
| 	config_add_string iw_hessid iw_network_auth_type iw_qos_map_set
 | |
| 	config_add_array iw_roaming_consortium iw_domain_name iw_anqp_3gpp_cell_net iw_nai_realm
 | |
| 	config_add_array iw_anqp_elem iw_venue_name iw_venue_url
 | |
| 
 | |
| 	config_add_boolean hs20 disable_dgaf osen
 | |
| 	config_add_int anqp_domain_id
 | |
| 	config_add_int hs20_deauth_req_timeout
 | |
| 	config_add_array hs20_oper_friendly_name
 | |
| 	config_add_array osu_provider
 | |
| 	config_add_array operator_icon
 | |
| 	config_add_array hs20_conn_capab
 | |
| 	config_add_string osu_ssid hs20_wan_metrics hs20_operating_class hs20_t_c_filename hs20_t_c_timestamp
 | |
| 
 | |
| 	config_add_string hs20_t_c_server_url
 | |
| 
 | |
| 	config_add_array airtime_sta_weight
 | |
| 	config_add_int airtime_bss_weight airtime_bss_limit
 | |
| 
 | |
| 	config_add_boolean multicast_to_unicast multicast_to_unicast_all proxy_arp per_sta_vif
 | |
| 
 | |
| 	config_add_array hostapd_bss_options
 | |
| 	config_add_boolean default_disabled
 | |
| 
 | |
| 	config_add_boolean request_cui
 | |
| 	config_add_array radius_auth_req_attr
 | |
| 	config_add_array radius_acct_req_attr
 | |
| 
 | |
| 	config_add_int eap_server radius_server_auth_port
 | |
| 	config_add_string eap_user_file ca_cert server_cert private_key private_key_passwd server_id radius_server_clients
 | |
| 
 | |
| 	config_add_boolean fils
 | |
| 	config_add_string fils_dhcp
 | |
| 
 | |
| 	config_add_int ocv
 | |
| 
 | |
| 	config_add_boolean apup
 | |
| 	config_add_string apup_peer_ifname_prefix
 | |
| }
 | |
| 
 | |
| hostapd_set_vlan_file() {
 | |
| 	local ifname="$1"
 | |
| 	local vlan="$2"
 | |
| 	json_get_vars name vid
 | |
| 	echo "${vid} ${ifname}-${name}" >> /var/run/hostapd-${ifname}.vlan
 | |
| 	wireless_add_vlan "${vlan}" "${ifname}-${name}"
 | |
| }
 | |
| 
 | |
| hostapd_set_vlan() {
 | |
| 	local ifname="$1"
 | |
| 
 | |
| 	rm -f /var/run/hostapd-${ifname}.vlan
 | |
| 	for_each_vlan hostapd_set_vlan_file ${ifname}
 | |
| }
 | |
| 
 | |
| hostapd_set_psk_file() {
 | |
| 	local ifname="$1"
 | |
| 	local vlan="$2"
 | |
| 	local vlan_id=""
 | |
| 
 | |
| 	json_get_vars mac vid key
 | |
| 	set_default mac "00:00:00:00:00:00"
 | |
| 	[ -n "$vid" ] && vlan_id="vlanid=$vid "
 | |
| 	echo "${vlan_id} ${mac} ${key}" >> /var/run/hostapd-${ifname}.psk
 | |
| }
 | |
| 
 | |
| hostapd_set_psk() {
 | |
| 	local ifname="$1"
 | |
| 
 | |
| 	rm -f /var/run/hostapd-${ifname}.psk
 | |
| 	case "$auth_type" in
 | |
| 		psk|psk-sae) ;;
 | |
| 		*) return ;;
 | |
| 	esac
 | |
| 	for_each_station hostapd_set_psk_file ${ifname}
 | |
| }
 | |
| 
 | |
| hostapd_set_sae_file() {
 | |
| 	local ifname="$1"
 | |
| 	local vlan="$2"
 | |
| 	local vlan_id=""
 | |
| 
 | |
| 	json_get_vars mac vid key
 | |
| 	set_default mac "ff:ff:ff:ff:ff:ff"
 | |
| 	[ -n "$mac" ] && mac="|mac=$mac"
 | |
| 	[ -n "$vid" ] && vlan_id="|vlanid=$vid"
 | |
| 	printf '%s%s%s\n' "${key}" "${mac}" "${vlan_id}" >> /var/run/hostapd-${ifname}.sae
 | |
| }
 | |
| 
 | |
| hostapd_set_sae() {
 | |
| 	local ifname="$1"
 | |
| 
 | |
| 	rm -f /var/run/hostapd-${ifname}.sae
 | |
| 	case "$auth_type" in
 | |
| 		sae|psk-sae) ;;
 | |
| 		*) return ;;
 | |
| 	esac
 | |
| 	for_each_station hostapd_set_sae_file ${ifname}
 | |
| }
 | |
| 
 | |
| append_iw_roaming_consortium() {
 | |
| 	[ -n "$1" ] && append bss_conf "roaming_consortium=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_iw_domain_name() {
 | |
| 	if [ -z "$iw_domain_name_conf" ]; then
 | |
| 		iw_domain_name_conf="$1"
 | |
| 	else
 | |
| 		iw_domain_name_conf="$iw_domain_name_conf,$1"
 | |
| 	fi
 | |
| }
 | |
| 
 | |
| append_iw_anqp_3gpp_cell_net() {
 | |
| 	if [ -z "$iw_anqp_3gpp_cell_net_conf" ]; then
 | |
| 		iw_anqp_3gpp_cell_net_conf="$1"
 | |
| 	else
 | |
| 		iw_anqp_3gpp_cell_net_conf="$iw_anqp_3gpp_cell_net_conf;$1"
 | |
| 	fi
 | |
| }
 | |
| 
 | |
| append_iw_anqp_elem() {
 | |
| 	[ -n "$1" ] && append bss_conf "anqp_elem=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_iw_nai_realm() {
 | |
| 	[ -n "$1" ] && append bss_conf "nai_realm=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_iw_venue_name() {
 | |
| 	append bss_conf "venue_name=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_iw_venue_url() {
 | |
| 	append bss_conf "venue_url=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_hs20_oper_friendly_name() {
 | |
| 	append bss_conf "hs20_oper_friendly_name=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_osu_provider_friendly_name() {
 | |
| 	append bss_conf "osu_friendly_name=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_osu_provider_service_desc() {
 | |
| 	append bss_conf "osu_service_desc=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_hs20_icon() {
 | |
| 	local width height lang type path
 | |
| 	config_get width "$1" width
 | |
| 	config_get height "$1" height
 | |
| 	config_get lang "$1" lang
 | |
| 	config_get type "$1" type
 | |
| 	config_get path "$1" path
 | |
| 
 | |
| 	append bss_conf "hs20_icon=$width:$height:$lang:$type:$1:$path" "$N"
 | |
| }
 | |
| 
 | |
| append_hs20_icons() {
 | |
| 	config_load wireless
 | |
| 	config_foreach append_hs20_icon hs20-icon
 | |
| }
 | |
| 
 | |
| append_operator_icon() {
 | |
| 	append bss_conf "operator_icon=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_osu_icon() {
 | |
| 	append bss_conf "osu_icon=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_osu_provider() {
 | |
| 	local cfgtype osu_server_uri osu_friendly_name osu_nai osu_nai2 osu_method_list
 | |
| 
 | |
| 	config_load wireless
 | |
| 	config_get cfgtype "$1" TYPE
 | |
| 	[ "$cfgtype" != "osu-provider" ] && return
 | |
| 
 | |
| 	append bss_conf "# provider $1" "$N"
 | |
| 	config_get osu_server_uri "$1" osu_server_uri
 | |
| 	config_get osu_nai "$1" osu_nai
 | |
| 	config_get osu_nai2 "$1" osu_nai2
 | |
| 	config_get osu_method_list "$1" osu_method
 | |
| 
 | |
| 	append bss_conf "osu_server_uri=$osu_server_uri" "$N"
 | |
| 	append bss_conf "osu_nai=$osu_nai" "$N"
 | |
| 	append bss_conf "osu_nai2=$osu_nai2" "$N"
 | |
| 	append bss_conf "osu_method_list=$osu_method_list" "$N"
 | |
| 
 | |
| 	config_list_foreach "$1" osu_service_desc append_osu_provider_service_desc
 | |
| 	config_list_foreach "$1" osu_friendly_name append_osu_friendly_name
 | |
| 	config_list_foreach "$1" osu_icon append_osu_icon
 | |
| 
 | |
| 	append bss_conf "$N"
 | |
| }
 | |
| 
 | |
| append_hs20_conn_capab() {
 | |
| 	[ -n "$1" ] && append bss_conf "hs20_conn_capab=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_radius_acct_req_attr() {
 | |
| 	[ -n "$1" ] && append bss_conf "radius_acct_req_attr=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_radius_auth_req_attr() {
 | |
| 	[ -n "$1" ] && append bss_conf "radius_auth_req_attr=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_airtime_sta_weight() {
 | |
| 	[ -n "$1" ] && append bss_conf "airtime_sta_weight=$1" "$N"
 | |
| }
 | |
| 
 | |
| append_auth_server() {
 | |
| 	[ -n "$1" ] || return
 | |
| 	append bss_conf "auth_server_addr=$1" "$N"
 | |
| 	append bss_conf "auth_server_port=$auth_port" "$N"
 | |
| 	[ -n "$auth_secret" ] && append bss_conf "auth_server_shared_secret=$auth_secret" "$N"
 | |
| }
 | |
| 
 | |
| append_acct_server() {
 | |
| 	[ -n "$1" ] || return
 | |
| 	append bss_conf "acct_server_addr=$1" "$N"
 | |
| 	append bss_conf "acct_server_port=$acct_port" "$N"
 | |
| 	[ -n "$acct_secret" ] && append bss_conf "acct_server_shared_secret=$acct_secret" "$N"
 | |
| }
 | |
| 
 | |
| hostapd_set_bss_options() {
 | |
| 	local var="$1"
 | |
| 	local phy="$2"
 | |
| 	local vif="$3"
 | |
| 
 | |
| 	wireless_vif_parse_encryption
 | |
| 
 | |
| 	local bss_conf bss_md5sum ft_key
 | |
| 	local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
 | |
| 
 | |
| 	json_get_vars \
 | |
| 		wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_strict_rekey \
 | |
| 		wpa_disable_eapol_key_retries tdls_prohibit \
 | |
| 		maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
 | |
| 		wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 wps_ap_setup_locked \
 | |
| 		wps_independent wps_device_type wps_device_name wps_manufacturer wps_pin \
 | |
| 		macfilter ssid utf8_ssid wmm uapsd hidden short_preamble rsn_preauth \
 | |
| 		iapp_interface eapol_version dynamic_vlan ieee80211w nasid \
 | |
| 		acct_secret acct_port acct_interval \
 | |
| 		bss_load_update_period chan_util_avg_period sae_require_mfp sae_pwe \
 | |
| 		multi_ap multi_ap_backhaul_ssid multi_ap_backhaul_key skip_inactivity_poll \
 | |
| 		ppsk airtime_bss_weight airtime_bss_limit airtime_sta_weight \
 | |
| 		multicast_to_unicast_all proxy_arp per_sta_vif \
 | |
| 		eap_server eap_user_file ca_cert server_cert private_key private_key_passwd server_id radius_server_clients radius_server_auth_port \
 | |
| 		vendor_elements fils ocv apup
 | |
| 
 | |
| 	set_default fils 0
 | |
| 	set_default isolate 0
 | |
| 	set_default maxassoc 0
 | |
| 	set_default max_inactivity 0
 | |
| 	set_default short_preamble 1
 | |
| 	set_default disassoc_low_ack 1
 | |
| 	set_default skip_inactivity_poll 0
 | |
| 	set_default hidden 0
 | |
| 	set_default wmm 1
 | |
| 	set_default uapsd 1
 | |
| 	set_default wpa_disable_eapol_key_retries 0
 | |
| 	set_default tdls_prohibit 0
 | |
| 	set_default eapol_version $((wpa & 1))
 | |
| 	set_default acct_port 1813
 | |
| 	set_default bss_load_update_period 60
 | |
| 	set_default chan_util_avg_period 600
 | |
| 	set_default utf8_ssid 1
 | |
| 	set_default multi_ap 0
 | |
| 	set_default ppsk 0
 | |
| 	set_default airtime_bss_weight 0
 | |
| 	set_default airtime_bss_limit 0
 | |
| 	set_default eap_server 0
 | |
| 	set_default apup 0
 | |
| 
 | |
| 	/usr/sbin/hostapd -vfils || fils=0
 | |
| 
 | |
| 	append bss_conf "ctrl_interface=/var/run/hostapd"
 | |
| 	if [ "$isolate" -gt 0 ]; then
 | |
| 		append bss_conf "ap_isolate=$isolate" "$N"
 | |
| 	fi
 | |
| 	if [ "$maxassoc" -gt 0 ]; then
 | |
| 		append bss_conf "max_num_sta=$maxassoc" "$N"
 | |
| 	fi
 | |
| 	if [ "$max_inactivity" -gt 0 ]; then
 | |
| 		append bss_conf "ap_max_inactivity=$max_inactivity" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	[ "$airtime_bss_weight" -gt 0 ] && append bss_conf "airtime_bss_weight=$airtime_bss_weight" "$N"
 | |
| 	[ "$airtime_bss_limit" -gt 0 ] && append bss_conf "airtime_bss_limit=$airtime_bss_limit" "$N"
 | |
| 	json_for_each_item append_airtime_sta_weight airtime_sta_weight
 | |
| 
 | |
| 	append bss_conf "bss_load_update_period=$bss_load_update_period" "$N"
 | |
| 	append bss_conf "chan_util_avg_period=$chan_util_avg_period" "$N"
 | |
| 	append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N"
 | |
| 	append bss_conf "skip_inactivity_poll=$skip_inactivity_poll" "$N"
 | |
| 	append bss_conf "preamble=$short_preamble" "$N"
 | |
| 	append bss_conf "wmm_enabled=$wmm" "$N"
 | |
| 	append bss_conf "ignore_broadcast_ssid=$hidden" "$N"
 | |
| 	append bss_conf "uapsd_advertisement_enabled=$uapsd" "$N"
 | |
| 	append bss_conf "utf8_ssid=$utf8_ssid" "$N"
 | |
| 	append bss_conf "multi_ap=$multi_ap" "$N"
 | |
| 	[ -n "$vendor_elements" ] && append bss_conf "vendor_elements=$vendor_elements" "$N"
 | |
| 
 | |
| 	[ "$tdls_prohibit" -gt 0 ] && append bss_conf "tdls_prohibit=$tdls_prohibit" "$N"
 | |
| 
 | |
| 	[ "$wpa" -gt 0 ] && {
 | |
| 		[ -n "$wpa_group_rekey"  ] && append bss_conf "wpa_group_rekey=$wpa_group_rekey" "$N"
 | |
| 		[ -n "$wpa_pair_rekey"   ] && append bss_conf "wpa_ptk_rekey=$wpa_pair_rekey"    "$N"
 | |
| 		[ -n "$wpa_master_rekey" ] && append bss_conf "wpa_gmk_rekey=$wpa_master_rekey"  "$N"
 | |
| 		[ -n "$wpa_strict_rekey" ] && append bss_conf "wpa_strict_rekey=$wpa_strict_rekey" "$N"
 | |
| 	}
 | |
| 
 | |
| 	[ -n "$nasid" ] && append bss_conf "nas_identifier=$nasid" "$N"
 | |
| 
 | |
| 	[ -n "$acct_interval" ] && \
 | |
| 		append bss_conf "radius_acct_interim_interval=$acct_interval" "$N"
 | |
| 	json_for_each_item append_acct_server acct_server
 | |
| 	json_for_each_item append_radius_acct_req_attr radius_acct_req_attr
 | |
| 
 | |
| 	[ -n "$ocv" ] && append bss_conf "ocv=$ocv" "$N"
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		sae|owe|eap2|eap192)
 | |
| 			set_default ieee80211w 2
 | |
| 			set_default sae_require_mfp 1
 | |
| 			[ "$ppsk" -eq 0 ] && set_default sae_pwe 2
 | |
| 		;;
 | |
| 		psk-sae|eap-eap2)
 | |
| 			set_default ieee80211w 1
 | |
| 			set_default sae_require_mfp 1
 | |
| 			[ "$ppsk" -eq 0 ] && set_default sae_pwe 2
 | |
| 		;;
 | |
| 	esac
 | |
| 	[ -n "$sae_require_mfp" ] && append bss_conf "sae_require_mfp=$sae_require_mfp" "$N"
 | |
| 	[ -n "$sae_pwe" ] && append bss_conf "sae_pwe=$sae_pwe" "$N"
 | |
| 
 | |
| 	local vlan_possible=""
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		none|owe)
 | |
| 			json_get_vars owe_transition_bssid owe_transition_ssid owe_transition_ifname
 | |
| 
 | |
| 			[ -n "$owe_transition_ssid" ] && append bss_conf "owe_transition_ssid=\"$owe_transition_ssid\"" "$N"
 | |
| 			[ -n "$owe_transition_bssid" ] && append bss_conf "owe_transition_bssid=$owe_transition_bssid" "$N"
 | |
| 			[ -n "$owe_transition_ifname" ] && append bss_conf "owe_transition_ifname=$owe_transition_ifname" "$N"
 | |
| 
 | |
| 			wps_possible=1
 | |
| 			# Here we make the assumption that if we're in open mode
 | |
| 			# with WPS enabled, we got to be in unconfigured state.
 | |
| 			wps_not_configured=1
 | |
| 		;;
 | |
| 		psk|sae|psk-sae)
 | |
| 			json_get_vars key wpa_psk_file sae_password_file
 | |
| 			if [ "$ppsk" -ne 0 ]; then
 | |
| 				json_get_vars auth_secret auth_port
 | |
| 				set_default auth_port 1812
 | |
| 				json_for_each_item append_auth_server auth_server
 | |
| 				append bss_conf "macaddr_acl=2" "$N"
 | |
| 				append bss_conf "wpa_psk_radius=2" "$N"
 | |
| 			elif [ ${#key} -eq 64 ]; then
 | |
| 				append bss_conf "wpa_psk=$key" "$N"
 | |
| 			elif [ ${#key} -ge 8 ] && [ ${#key} -le 63 ]; then
 | |
| 				append bss_conf "wpa_passphrase=$key" "$N"
 | |
| 			elif [ -n "$key" ] || [ -z "$wpa_psk_file" ] || [ -z "$sae_password_file" ]; then
 | |
| 				wireless_setup_vif_failed INVALID_WPA_PSK
 | |
| 				return 1
 | |
| 			fi
 | |
| 			[ -z "$wpa_psk_file" ] && set_default wpa_psk_file /var/run/hostapd-$ifname.psk
 | |
| 			[ -n "$wpa_psk_file" ] && [ "$auth_type" = "psk" -o "$auth_type" = "psk-sae" ] && {
 | |
| 				[ -e "$wpa_psk_file" ] || touch "$wpa_psk_file"
 | |
| 				append bss_conf "wpa_psk_file=$wpa_psk_file" "$N"
 | |
| 			}
 | |
| 			[ -z "$sae_password_file" ] && set_default sae_password_file /var/run/hostapd-$ifname.sae
 | |
| 			[ -n "$sae_password_file" ] && [ "$auth_type" = "sae" -o "$auth_type" = "psk-sae" ] && {
 | |
| 				[ -e "$sae_password_file" ] || touch "$sae_password_file"
 | |
| 				append bss_conf "sae_password_file=$sae_password_file" "$N"
 | |
| 			}
 | |
| 			[ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
 | |
| 
 | |
| 			set_default dynamic_vlan 0
 | |
| 			vlan_possible=1
 | |
| 			wps_possible=1
 | |
| 		;;
 | |
| 		eap|eap2|eap-eap2|eap192)
 | |
| 			json_get_vars \
 | |
| 				auth_server auth_secret auth_port \
 | |
| 				dae_client dae_secret dae_port \
 | |
| 				dynamic_ownip ownip radius_client_addr \
 | |
| 				eap_reauth_period request_cui \
 | |
| 				erp_domain mobility_domain \
 | |
| 				fils_realm fils_dhcp
 | |
| 
 | |
| 			# radius can provide VLAN ID for clients
 | |
| 			vlan_possible=1
 | |
| 
 | |
| 			set_default dynamic_ownip 1
 | |
| 
 | |
| 			# legacy compatibility
 | |
| 			[ -n "$auth_server" ] || json_get_var auth_server server
 | |
| 			[ -n "$auth_port" ] || json_get_var auth_port port
 | |
| 			[ -n "$auth_secret" ] || json_get_var auth_secret key
 | |
| 
 | |
| 			[ "$fils" -gt 0 ] && {
 | |
| 				set_default erp_domain "$mobility_domain"
 | |
| 				set_default erp_domain "$(echo "$ssid" | md5sum | head -c 8)"
 | |
| 				set_default fils_realm "$erp_domain"
 | |
| 
 | |
| 				append bss_conf "erp_send_reauth_start=1" "$N"
 | |
| 				append bss_conf "erp_domain=$erp_domain" "$N"
 | |
| 				append bss_conf "fils_realm=$fils_realm" "$N"
 | |
| 				append bss_conf "fils_cache_id=$(echo "$fils_realm" | md5sum | head -c 4)" "$N"
 | |
| 
 | |
| 				[ "$fils_dhcp" = "*" ] && {
 | |
| 					json_get_values network network
 | |
| 					fils_dhcp=
 | |
| 					for net in $network; do
 | |
| 						fils_dhcp="$(ifstatus "$net" | jsonfilter -e '@.data.dhcpserver')"
 | |
| 						[ -n "$fils_dhcp" ] && break
 | |
| 					done
 | |
| 
 | |
| 					[ -z "$fils_dhcp" -a -n "$network_bridge" -a -n "$network_ifname" ] && \
 | |
| 						fils_dhcp="$(udhcpc -B -n -q -s /lib/netifd/dhcp-get-server.sh -t 1 -i "$network_ifname" 2>/dev/null)"
 | |
| 				}
 | |
| 				[ -n "$fils_dhcp" ] && append bss_conf "dhcp_server=$fils_dhcp" "$N"
 | |
| 			}
 | |
| 
 | |
| 			set_default auth_port 1812
 | |
| 			set_default dae_port 3799
 | |
| 			set_default request_cui 0
 | |
| 
 | |
| 			[ "$eap_server" -eq 0 ] && json_for_each_item append_auth_server auth_server
 | |
| 			[ "$request_cui" -gt 0 ] && append bss_conf "radius_request_cui=$request_cui" "$N"
 | |
| 			[ -n "$eap_reauth_period" ] && append bss_conf "eap_reauth_period=$eap_reauth_period" "$N"
 | |
| 
 | |
| 			[ -n "$dae_client" -a -n "$dae_secret" ] && {
 | |
| 				append bss_conf "radius_das_port=$dae_port" "$N"
 | |
| 				append bss_conf "radius_das_client=$dae_client $dae_secret" "$N"
 | |
| 			}
 | |
| 			json_for_each_item append_radius_auth_req_attr radius_auth_req_attr
 | |
| 
 | |
| 			if [ -n "$ownip" ]; then
 | |
| 				append bss_conf "own_ip_addr=$ownip" "$N"
 | |
| 			elif [ "$dynamic_ownip" -gt 0 ]; then
 | |
| 				append bss_conf "dynamic_own_ip_addr=$dynamic_ownip" "$N"
 | |
| 			fi
 | |
| 
 | |
| 			[ -n "$radius_client_addr" ] && append bss_conf "radius_client_addr=$radius_client_addr" "$N"
 | |
| 			append bss_conf "eapol_key_index_workaround=1" "$N"
 | |
| 			append bss_conf "ieee8021x=1" "$N"
 | |
| 
 | |
| 			[ "$eapol_version" -ge "1" -a "$eapol_version" -le "2" ] && append bss_conf "eapol_version=$eapol_version" "$N"
 | |
| 		;;
 | |
| 		wep)
 | |
| 			local wep_keyidx=0
 | |
| 			json_get_vars key
 | |
| 			hostapd_append_wep_key bss_conf
 | |
| 			append bss_conf "wep_default_key=$wep_keyidx" "$N"
 | |
| 			[ -n "$wep_rekey" ] && append bss_conf "wep_rekey_period=$wep_rekey" "$N"
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		none|owe|psk|sae|psk-sae|wep)
 | |
| 			json_get_vars \
 | |
| 			auth_server auth_port auth_secret \
 | |
| 			ownip radius_client_addr
 | |
| 
 | |
| 			[ -n "$auth_server" ] &&  {
 | |
| 				set_default auth_port 1812
 | |
| 
 | |
| 				json_for_each_item append_auth_server auth_server
 | |
| 				[ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip" "$N"
 | |
| 				[ -n "$radius_client_addr" ] && append bss_conf "radius_client_addr=$radius_client_addr" "$N"
 | |
| 				append bss_conf "macaddr_acl=2" "$N"
 | |
| 			}
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	local auth_algs="$((($auth_mode_shared << 1) | $auth_mode_open))"
 | |
| 	append bss_conf "auth_algs=${auth_algs:-1}" "$N"
 | |
| 	append bss_conf "wpa=$wpa" "$N"
 | |
| 	[ -n "$wpa_pairwise" ] && append bss_conf "wpa_pairwise=$wpa_pairwise" "$N"
 | |
| 
 | |
| 	set_default wps_pushbutton 0
 | |
| 	set_default wps_label 0
 | |
| 	set_default wps_pbc_in_m1 0
 | |
| 
 | |
| 	config_methods=
 | |
| 	[ "$wps_pushbutton" -gt 0 ] && append config_methods push_button
 | |
| 	[ "$wps_label" -gt 0 ] && append config_methods label
 | |
| 
 | |
| 	# WPS not possible on Multi-AP backhaul-only SSID
 | |
| 	[ "$multi_ap" = 1 ] && wps_possible=
 | |
| 
 | |
| 	[ -n "$wps_possible" -a -n "$config_methods" ] && {
 | |
| 		set_default ext_registrar 0
 | |
| 		set_default wps_device_type "6-0050F204-1"
 | |
| 		set_default wps_device_name "OpenWrt AP"
 | |
| 		set_default wps_manufacturer "www.openwrt.org"
 | |
| 		set_default wps_independent 1
 | |
| 
 | |
| 		wps_state=2
 | |
| 		[ -n "$wps_not_configured" ] && wps_state=1
 | |
| 
 | |
| 		[ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append bss_conf "upnp_iface=$network_bridge" "$N"
 | |
| 
 | |
| 		append bss_conf "eap_server=1" "$N"
 | |
| 		[ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N"
 | |
| 		append bss_conf "wps_state=$wps_state" "$N"
 | |
| 		append bss_conf "device_type=$wps_device_type" "$N"
 | |
| 		append bss_conf "device_name=$wps_device_name" "$N"
 | |
| 		append bss_conf "manufacturer=$wps_manufacturer" "$N"
 | |
| 		append bss_conf "config_methods=$config_methods" "$N"
 | |
| 		append bss_conf "wps_independent=$wps_independent" "$N"
 | |
| 		[ -n "$wps_ap_setup_locked" ] && append bss_conf "ap_setup_locked=$wps_ap_setup_locked" "$N"
 | |
| 		[ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf "pbc_in_m1=$wps_pbc_in_m1" "$N"
 | |
| 		[ "$multi_ap" -gt 0 ] && [ -n "$multi_ap_backhaul_ssid" ] && {
 | |
| 			append bss_conf "multi_ap_backhaul_ssid=\"$multi_ap_backhaul_ssid\"" "$N"
 | |
| 			if [ -z "$multi_ap_backhaul_key" ]; then
 | |
| 				:
 | |
| 			elif [ ${#multi_ap_backhaul_key} -lt 8 ]; then
 | |
| 				wireless_setup_vif_failed INVALID_WPA_PSK
 | |
| 				return 1
 | |
| 			elif [ ${#multi_ap_backhaul_key} -eq 64 ]; then
 | |
| 				append bss_conf "multi_ap_backhaul_wpa_psk=$multi_ap_backhaul_key" "$N"
 | |
| 			else
 | |
| 				append bss_conf "multi_ap_backhaul_wpa_passphrase=$multi_ap_backhaul_key" "$N"
 | |
| 			fi
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	append bss_conf "ssid=$ssid" "$N"
 | |
| 	[ -n "$network_bridge" ] && append bss_conf "bridge=$network_bridge${N}wds_bridge=" "$N"
 | |
| 	[ -n "$network_ifname" ] && append bss_conf "snoop_iface=$network_ifname" "$N"
 | |
| 	[ -n "$iapp_interface" ] && {
 | |
| 		local ifname
 | |
| 		network_get_device ifname "$iapp_interface" || ifname="$iapp_interface"
 | |
| 		append bss_conf "iapp_interface=$ifname" "$N"
 | |
| 	}
 | |
| 
 | |
| 	json_get_vars time_advertisement time_zone wnm_sleep_mode wnm_sleep_mode_no_keys bss_transition mbo
 | |
| 	set_default bss_transition 0
 | |
| 	set_default wnm_sleep_mode 0
 | |
| 	set_default wnm_sleep_mode_no_keys 0
 | |
| 	set_default mbo 0
 | |
| 
 | |
| 	[ -n "$time_advertisement" ] && append bss_conf "time_advertisement=$time_advertisement" "$N"
 | |
| 	[ -n "$time_zone" ] && append bss_conf "time_zone=$time_zone" "$N"
 | |
| 	if [ "$wnm_sleep_mode" -eq "1" ]; then
 | |
| 		append bss_conf "wnm_sleep_mode=1" "$N"
 | |
| 		[ "$wnm_sleep_mode_no_keys" -eq "1" ] && append bss_conf "wnm_sleep_mode_no_keys=1" "$N"
 | |
| 	fi
 | |
| 	[ "$bss_transition" -eq "1" ] && append bss_conf "bss_transition=1" "$N"
 | |
| 	[ "$mbo" -eq 1 ] && append bss_conf "mbo=1" "$N"
 | |
| 
 | |
| 	json_get_vars ieee80211k rrm_neighbor_report rrm_beacon_report rnr
 | |
| 	set_default ieee80211k 0
 | |
| 	set_default rnr 0
 | |
| 	if [ "$ieee80211k" -eq "1" ]; then
 | |
| 		set_default rrm_neighbor_report 1
 | |
| 		set_default rrm_beacon_report 1
 | |
| 	else
 | |
| 		set_default rrm_neighbor_report 0
 | |
| 		set_default rrm_beacon_report 0
 | |
| 	fi
 | |
| 
 | |
| 	[ "$rrm_neighbor_report" -eq "1" ] && append bss_conf "rrm_neighbor_report=1" "$N"
 | |
| 	[ "$rrm_beacon_report" -eq "1" ] && append bss_conf "rrm_beacon_report=1" "$N"
 | |
| 	[ "$rnr" -eq "1" ] && append bss_conf "rnr=1" "$N"
 | |
| 
 | |
| 	json_get_vars ftm_responder stationary_ap lci civic
 | |
| 	set_default ftm_responder 0
 | |
| 	if [ "$ftm_responder" -eq "1" ]; then
 | |
| 		set_default stationary_ap 0
 | |
| 		iw phy "$phy" info | grep -q "ENABLE_FTM_RESPONDER" && {
 | |
| 			append bss_conf "ftm_responder=1" "$N"
 | |
| 			[ "$stationary_ap" -eq "1" ] && append bss_conf "stationary_ap=1" "$N"
 | |
| 			[ -n "$lci" ] && append bss_conf "lci=$lci" "$N"
 | |
| 			[ -n "$civic" ] && append bss_conf "civic=$civic" "$N"
 | |
| 		}
 | |
| 	fi
 | |
| 
 | |
| 	json_get_vars ieee80211r
 | |
| 	set_default ieee80211r 0
 | |
| 	if [ "$wpa" -ge "1" ]; then
 | |
| 		if [ "$fils" -gt 0 ]; then
 | |
| 			json_get_vars fils_realm
 | |
| 			set_default fils_realm "$(echo "$ssid" | md5sum | head -c 8)"
 | |
| 		fi
 | |
| 
 | |
| 		append bss_conf "wpa_disable_eapol_key_retries=$wpa_disable_eapol_key_retries" "$N"
 | |
| 
 | |
| 		hostapd_append_wpa_key_mgmt
 | |
| 		[ -n "$wpa_key_mgmt" ] && append bss_conf "wpa_key_mgmt=$wpa_key_mgmt" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	if [ "$wpa" -ge "2" ]; then
 | |
| 		if [ "$ieee80211r" -gt "0" ]; then
 | |
| 			json_get_vars mobility_domain ft_psk_generate_local ft_over_ds reassociation_deadline
 | |
| 
 | |
| 			set_default mobility_domain "$(echo "$ssid" | md5sum | head -c 4)"
 | |
| 			set_default ft_over_ds 0
 | |
| 			set_default reassociation_deadline 1000
 | |
| 
 | |
| 			case "$auth_type" in
 | |
| 				psk)
 | |
| 					set_default ft_psk_generate_local 1
 | |
| 				;;
 | |
| 				*)
 | |
| 					set_default ft_psk_generate_local 0
 | |
| 				;;
 | |
| 			esac
 | |
| 
 | |
| 			[ -n "$network_ifname" ] && append bss_conf "ft_iface=$network_ifname" "$N"
 | |
| 			append bss_conf "mobility_domain=$mobility_domain" "$N"
 | |
| 			append bss_conf "ft_psk_generate_local=$ft_psk_generate_local" "$N"
 | |
| 			append bss_conf "ft_over_ds=$ft_over_ds" "$N"
 | |
| 			append bss_conf "reassociation_deadline=$reassociation_deadline" "$N"
 | |
| 
 | |
| 			if [ "$ft_psk_generate_local" -eq "0" ]; then
 | |
| 				json_get_vars r0_key_lifetime r1_key_holder pmk_r1_push
 | |
| 				json_get_values r0kh r0kh
 | |
| 				json_get_values r1kh r1kh
 | |
| 
 | |
| 				set_default r0_key_lifetime 10000
 | |
| 				set_default pmk_r1_push 0
 | |
| 
 | |
| 				[ -n "$r0kh" -a -n "$r1kh" ] || {
 | |
| 					if [ -z "$auth_secret" -a -z "$key" ]; then
 | |
| 						wireless_setup_vif_failed FT_KEY_CANT_BE_DERIVED
 | |
| 						return 1
 | |
| 					fi
 | |
| 					ft_key=`echo -n "$mobility_domain/${auth_secret:-${key}}" | md5sum | awk '{print $1}'`
 | |
| 
 | |
| 					set_default r0kh "ff:ff:ff:ff:ff:ff,*,$ft_key"
 | |
| 					set_default r1kh "00:00:00:00:00:00,00:00:00:00:00:00,$ft_key"
 | |
| 				}
 | |
| 
 | |
| 				[ -n "$r1_key_holder" ] && append bss_conf "r1_key_holder=$r1_key_holder" "$N"
 | |
| 				append bss_conf "r0_key_lifetime=$r0_key_lifetime" "$N"
 | |
| 				append bss_conf "pmk_r1_push=$pmk_r1_push" "$N"
 | |
| 
 | |
| 				for kh in $r0kh; do
 | |
| 					append bss_conf "r0kh=${kh//,/ }" "$N"
 | |
| 				done
 | |
| 				for kh in $r1kh; do
 | |
| 					append bss_conf "r1kh=${kh//,/ }" "$N"
 | |
| 				done
 | |
| 			fi
 | |
| 		fi
 | |
| 
 | |
| 		if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then
 | |
| 			set_default auth_cache 1
 | |
| 			append bss_conf "rsn_preauth=1" "$N"
 | |
| 			append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N"
 | |
| 		else
 | |
| 			case "$auth_type" in
 | |
| 			sae|psk-sae|owe)
 | |
| 				set_default auth_cache 1
 | |
| 			;;
 | |
| 			*)
 | |
| 				set_default auth_cache 0
 | |
| 			;;
 | |
| 			esac
 | |
| 		fi
 | |
| 
 | |
| 		append bss_conf "okc=$auth_cache" "$N"
 | |
| 		[ "$auth_cache" = 0 -a "$fils" = 0 ] && append bss_conf "disable_pmksa_caching=1" "$N"
 | |
| 
 | |
| 		# RSN -> allow management frame protection
 | |
| 		case "$ieee80211w" in
 | |
| 			[012])
 | |
| 				json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
 | |
| 				append bss_conf "ieee80211w=$ieee80211w" "$N"
 | |
| 				[ "$ieee80211w" -gt "0" ] && {
 | |
| 					if [ "$auth_type" = "eap192" ]; then
 | |
| 						append bss_conf "group_mgmt_cipher=BIP-GMAC-256" "$N"
 | |
| 					else
 | |
| 						append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
 | |
| 					fi
 | |
| 					[ -n "$ieee80211w_max_timeout" ] && \
 | |
| 						append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
 | |
| 					[ -n "$ieee80211w_retry_timeout" ] && \
 | |
| 						append bss_conf "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
 | |
| 				}
 | |
| 			;;
 | |
| 		esac
 | |
| 	fi
 | |
| 
 | |
| 	_macfile="/var/run/hostapd-$ifname.maclist"
 | |
| 	case "$macfilter" in
 | |
| 		allow)
 | |
| 			append bss_conf "macaddr_acl=1" "$N"
 | |
| 			append bss_conf "accept_mac_file=$_macfile" "$N"
 | |
| 			# accept_mac_file can be used to set MAC to VLAN ID mapping
 | |
| 			vlan_possible=1
 | |
| 		;;
 | |
| 		deny)
 | |
| 			append bss_conf "macaddr_acl=0" "$N"
 | |
| 			append bss_conf "deny_mac_file=$_macfile" "$N"
 | |
| 		;;
 | |
| 		*)
 | |
| 			_macfile=""
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	[ -n "$_macfile" ] && {
 | |
| 		json_get_vars macfile
 | |
| 		json_get_values maclist maclist
 | |
| 
 | |
| 		rm -f "$_macfile"
 | |
| 		(
 | |
| 			for mac in $maclist; do
 | |
| 				echo "$mac"
 | |
| 			done
 | |
| 			[ -n "$macfile" -a -f "$macfile" ] && cat "$macfile"
 | |
| 		) > "$_macfile"
 | |
| 	}
 | |
| 
 | |
| 	[ -n "$vlan_possible" -a -n "$dynamic_vlan" ] && {
 | |
| 		json_get_vars vlan_naming vlan_tagged_interface vlan_bridge vlan_file vlan_no_bridge
 | |
| 		set_default vlan_naming 1
 | |
| 		[ -z "$vlan_file" ] && set_default vlan_file /var/run/hostapd-$ifname.vlan
 | |
| 		append bss_conf "dynamic_vlan=$dynamic_vlan" "$N"
 | |
| 		append bss_conf "vlan_naming=$vlan_naming" "$N"
 | |
| 		if [ -n "$vlan_bridge" ]; then
 | |
| 			append bss_conf "vlan_bridge=$vlan_bridge" "$N"
 | |
| 		else
 | |
| 			set_default vlan_no_bridge 1
 | |
| 		fi
 | |
| 		append bss_conf "vlan_no_bridge=$vlan_no_bridge" "$N"
 | |
| 		[ -n "$vlan_tagged_interface" ] && \
 | |
| 			append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N"
 | |
| 		[ -n "$vlan_file" ] && {
 | |
| 			[ -e "$vlan_file" ] || touch "$vlan_file"
 | |
| 			append bss_conf "vlan_file=$vlan_file" "$N"
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	json_get_vars iw_enabled iw_internet iw_asra iw_esr iw_uesa iw_access_network_type
 | |
| 	json_get_vars iw_hessid iw_venue_group iw_venue_type iw_network_auth_type
 | |
| 	json_get_vars iw_roaming_consortium iw_domain_name iw_anqp_3gpp_cell_net iw_nai_realm
 | |
| 	json_get_vars iw_anqp_elem iw_qos_map_set iw_ipaddr_type_availability iw_gas_address3
 | |
| 	json_get_vars iw_venue_name iw_venue_url
 | |
| 
 | |
| 	set_default iw_enabled 0
 | |
| 	if [ "$iw_enabled" = "1" ]; then
 | |
| 		append bss_conf "interworking=1" "$N"
 | |
| 		set_default iw_internet 1
 | |
| 		set_default iw_asra 0
 | |
| 		set_default iw_esr 0
 | |
| 		set_default iw_uesa 0
 | |
| 
 | |
| 		append bss_conf "internet=$iw_internet" "$N"
 | |
| 		append bss_conf "asra=$iw_asra" "$N"
 | |
| 		append bss_conf "esr=$iw_esr" "$N"
 | |
| 		append bss_conf "uesa=$iw_uesa" "$N"
 | |
| 
 | |
| 		[ -n "$iw_access_network_type" ] && \
 | |
| 			append bss_conf "access_network_type=$iw_access_network_type" "$N"
 | |
| 		[ -n "$iw_hessid" ] && append bss_conf "hessid=$iw_hessid" "$N"
 | |
| 		[ -n "$iw_venue_group" ] && \
 | |
| 			append bss_conf "venue_group=$iw_venue_group" "$N"
 | |
| 		[ -n "$iw_venue_type" ] && append bss_conf "venue_type=$iw_venue_type" "$N"
 | |
| 		[ -n "$iw_network_auth_type" ] && \
 | |
| 			append bss_conf "network_auth_type=$iw_network_auth_type" "$N"
 | |
| 		[ -n "$iw_gas_address3" ] && append bss_conf "gas_address3=$iw_gas_address3" "$N"
 | |
| 
 | |
| 		json_for_each_item append_iw_roaming_consortium iw_roaming_consortium
 | |
| 		json_for_each_item append_iw_anqp_elem iw_anqp_elem
 | |
| 		json_for_each_item append_iw_nai_realm iw_nai_realm
 | |
| 		json_for_each_item append_iw_venue_name iw_venue_name
 | |
| 		json_for_each_item append_iw_venue_url iw_venue_url
 | |
| 
 | |
| 		iw_domain_name_conf=
 | |
| 		json_for_each_item append_iw_domain_name iw_domain_name
 | |
| 		[ -n "$iw_domain_name_conf" ] && \
 | |
| 			append bss_conf "domain_name=$iw_domain_name_conf" "$N"
 | |
| 
 | |
| 		iw_anqp_3gpp_cell_net_conf=
 | |
| 		json_for_each_item append_iw_anqp_3gpp_cell_net iw_anqp_3gpp_cell_net
 | |
| 		[ -n "$iw_anqp_3gpp_cell_net_conf" ] && \
 | |
| 			append bss_conf "anqp_3gpp_cell_net=$iw_anqp_3gpp_cell_net_conf" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	set_default iw_qos_map_set 0,0,2,16,1,1,255,255,18,22,24,38,40,40,44,46,48,56
 | |
| 	case "$iw_qos_map_set" in
 | |
| 		*,*);;
 | |
| 		*) iw_qos_map_set="";;
 | |
| 	esac
 | |
| 	[ -n "$iw_qos_map_set" ] && append bss_conf "qos_map_set=$iw_qos_map_set" "$N"
 | |
| 
 | |
| 	local hs20 disable_dgaf osen anqp_domain_id hs20_deauth_req_timeout \
 | |
| 		osu_ssid hs20_wan_metrics hs20_operating_class hs20_t_c_filename hs20_t_c_timestamp \
 | |
| 		hs20_t_c_server_url
 | |
| 	json_get_vars hs20 disable_dgaf osen anqp_domain_id hs20_deauth_req_timeout \
 | |
| 		osu_ssid hs20_wan_metrics hs20_operating_class hs20_t_c_filename hs20_t_c_timestamp \
 | |
| 		hs20_t_c_server_url
 | |
| 
 | |
| 	set_default hs20 0
 | |
| 	set_default disable_dgaf $hs20
 | |
| 	set_default osen 0
 | |
| 	set_default anqp_domain_id 0
 | |
| 	set_default hs20_deauth_req_timeout 60
 | |
| 	if [ "$hs20" = "1" ]; then
 | |
| 		append bss_conf "hs20=1" "$N"
 | |
| 		append_hs20_icons
 | |
| 		append bss_conf "disable_dgaf=$disable_dgaf" "$N"
 | |
| 		append bss_conf "osen=$osen" "$N"
 | |
| 		append bss_conf "anqp_domain_id=$anqp_domain_id" "$N"
 | |
| 		append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N"
 | |
| 		[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N"
 | |
| 		[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N"
 | |
| 		[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N"
 | |
| 		[ -n "$hs20_t_c_filename" ] && append bss_conf "hs20_t_c_filename=$hs20_t_c_filename" "$N"
 | |
| 		[ -n "$hs20_t_c_timestamp" ] && append bss_conf "hs20_t_c_timestamp=$hs20_t_c_timestamp" "$N"
 | |
| 		[ -n "$hs20_t_c_server_url" ] && append bss_conf "hs20_t_c_server_url=$hs20_t_c_server_url" "$N"
 | |
| 		json_for_each_item append_hs20_oper_friendly_name hs20_oper_friendly_name
 | |
| 		json_for_each_item append_hs20_conn_capab hs20_conn_capab
 | |
| 		json_for_each_item append_osu_provider osu_provider
 | |
| 		json_for_each_item append_operator_icon operator_icon
 | |
| 	fi
 | |
| 
 | |
| 	if [ "$eap_server" = "1" ]; then
 | |
| 		append bss_conf "eap_server=1" "$N"
 | |
| 		append bss_conf "eap_server_erp=1" "$N"
 | |
| 		[ -n "$eap_user_file" ] && append bss_conf "eap_user_file=$eap_user_file" "$N"
 | |
| 		[ -n "$ca_cert" ] && append bss_conf "ca_cert=$ca_cert" "$N"
 | |
| 		[ -n "$server_cert" ] && append bss_conf "server_cert=$server_cert" "$N"
 | |
| 		[ -n "$private_key" ] && append bss_conf "private_key=$private_key" "$N"
 | |
| 		[ -n "$private_key_passwd" ] && append bss_conf "private_key_passwd=$private_key_passwd" "$N"
 | |
| 		[ -n "$server_id" ] && append bss_conf "server_id=$server_id" "$N"
 | |
| 		[ -n "$radius_server_clients" ] && append bss_conf "radius_server_clients=$radius_server_clients" "$N"
 | |
| 		[ -n "$radius_server_auth_port" ] && append bss_conf "radius_server_auth_port=$radius_server_auth_port" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	set_default multicast_to_unicast_all 0
 | |
| 	if [ "$multicast_to_unicast_all" -gt 0 ]; then
 | |
| 		append bss_conf "multicast_to_unicast=$multicast_to_unicast_all" "$N"
 | |
| 	fi
 | |
| 	set_default proxy_arp 0
 | |
| 	if [ "$proxy_arp" -gt 0 ]; then
 | |
| 		append bss_conf "proxy_arp=$proxy_arp" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	set_default per_sta_vif 0
 | |
| 	if [ "$per_sta_vif" -gt 0 ]; then
 | |
| 		append bss_conf "per_sta_vif=$per_sta_vif" "$N"
 | |
| 	fi
 | |
| 
 | |
| 	if [ "$apup" -gt 0 ]; then
 | |
| 		append bss_conf "apup=$apup" "$N"
 | |
| 
 | |
| 		local apup_peer_ifname_prefix
 | |
| 		json_get_vars apup_peer_ifname_prefix
 | |
| 		if [ -n "$apup_peer_ifname_prefix" ] ; then
 | |
| 			append bss_conf "apup_peer_ifname_prefix=$apup_peer_ifname_prefix" "$N"
 | |
| 		fi
 | |
| 	fi
 | |
| 
 | |
| 	json_get_values opts hostapd_bss_options
 | |
| 	for val in $opts; do
 | |
| 		append bss_conf "$val" "$N"
 | |
| 	done
 | |
| 
 | |
| 	append "$var" "$bss_conf" "$N"
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| hostapd_set_log_options() {
 | |
| 	local var="$1"
 | |
| 
 | |
| 	local log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
 | |
| 	json_get_vars log_level log_80211 log_8021x log_radius log_wpa log_driver log_iapp log_mlme
 | |
| 
 | |
| 	set_default log_level 2
 | |
| 	set_default log_80211  1
 | |
| 	set_default log_8021x  1
 | |
| 	set_default log_radius 1
 | |
| 	set_default log_wpa    1
 | |
| 	set_default log_driver 1
 | |
| 	set_default log_iapp   1
 | |
| 	set_default log_mlme   1
 | |
| 
 | |
| 	local log_mask="$(( \
 | |
| 		($log_80211  << 0) | \
 | |
| 		($log_8021x  << 1) | \
 | |
| 		($log_radius << 2) | \
 | |
| 		($log_wpa    << 3) | \
 | |
| 		($log_driver << 4) | \
 | |
| 		($log_iapp   << 5) | \
 | |
| 		($log_mlme   << 6)   \
 | |
| 	))"
 | |
| 
 | |
| 	append "$var" "logger_syslog=$log_mask" "$N"
 | |
| 	append "$var" "logger_syslog_level=$log_level" "$N"
 | |
| 	append "$var" "logger_stdout=$log_mask" "$N"
 | |
| 	append "$var" "logger_stdout_level=$log_level" "$N"
 | |
| 
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| _wpa_supplicant_common() {
 | |
| 	local ifname="$1"
 | |
| 
 | |
| 	_rpath="/var/run/wpa_supplicant"
 | |
| 	_config="${_rpath}-$ifname.conf"
 | |
| }
 | |
| 
 | |
| wpa_supplicant_teardown_interface() {
 | |
| 	_wpa_supplicant_common "$1"
 | |
| 	rm -rf "$_rpath/$1" "$_config"
 | |
| }
 | |
| 
 | |
| wpa_supplicant_prepare_interface() {
 | |
| 	local ifname="$1"
 | |
| 	_w_driver="$2"
 | |
| 
 | |
| 	_wpa_supplicant_common "$1"
 | |
| 
 | |
| 	json_get_vars mode wds multi_ap
 | |
| 
 | |
| 	[ -n "$network_bridge" ] && {
 | |
| 		fail=
 | |
| 		case "$mode" in
 | |
| 			adhoc)
 | |
| 				fail=1
 | |
| 			;;
 | |
| 			sta)
 | |
| 				[ "$wds" = 1 -o "$multi_ap" = 1 ] || fail=1
 | |
| 			;;
 | |
| 		esac
 | |
| 
 | |
| 		[ -n "$fail" ] && {
 | |
| 			wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
 | |
| 			return 1
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	local ap_scan=
 | |
| 
 | |
| 	_w_mode="$mode"
 | |
| 
 | |
| 	[ "$mode" = adhoc ] && {
 | |
| 		ap_scan="ap_scan=2"
 | |
| 	}
 | |
| 
 | |
| 	local country_str=
 | |
| 	[ -n "$country" ] && {
 | |
| 		country_str="country=$country"
 | |
| 	}
 | |
| 
 | |
| 	multiap_flag_file="${_config}.is_multiap"
 | |
| 	if [ "$multi_ap" = "1" ]; then
 | |
| 		touch "$multiap_flag_file"
 | |
| 	else
 | |
| 		[ -e "$multiap_flag_file" ] && rm "$multiap_flag_file"
 | |
| 	fi
 | |
| 	wpa_supplicant_teardown_interface "$ifname"
 | |
| 	cat > "$_config" <<EOF
 | |
| ${scan_list:+freq_list=$scan_list}
 | |
| $ap_scan
 | |
| $country_str
 | |
| EOF
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| wpa_supplicant_set_fixed_freq() {
 | |
| 	local freq="$1"
 | |
| 	local htmode="$2"
 | |
| 
 | |
| 	append network_data "fixed_freq=1" "$N$T"
 | |
| 	append network_data "frequency=$freq" "$N$T"
 | |
| 	case "$htmode" in
 | |
| 		NOHT) append network_data "disable_ht=1" "$N$T";;
 | |
| 		HE20|HT20|VHT20) append network_data "disable_ht40=1" "$N$T";;
 | |
| 		HT40*|VHT40|VHT80|VHT160|HE40|HE80|HE160) append network_data "ht40=1" "$N$T";;
 | |
| 	esac
 | |
| 	case "$htmode" in
 | |
| 		VHT*) append network_data "vht=1" "$N$T";;
 | |
| 	esac
 | |
| 	case "$htmode" in
 | |
| 		HE80|VHT80) append network_data "max_oper_chwidth=1" "$N$T";;
 | |
| 		HE160|VHT160) append network_data "max_oper_chwidth=2" "$N$T";;
 | |
| 		HE20|HE40|VHT20|VHT40) append network_data "max_oper_chwidth=0" "$N$T";;
 | |
| 		*) append network_data "disable_vht=1" "$N$T";;
 | |
| 	esac
 | |
| }
 | |
| 
 | |
| wpa_supplicant_add_network() {
 | |
| 	local ifname="$1"
 | |
| 	local freq="$2"
 | |
| 	local htmode="$3"
 | |
| 	local noscan="$4"
 | |
| 
 | |
| 	_wpa_supplicant_common "$1"
 | |
| 	wireless_vif_parse_encryption
 | |
| 
 | |
| 	json_get_vars \
 | |
| 		ssid bssid key \
 | |
| 		basic_rate mcast_rate \
 | |
| 		ieee80211w ieee80211r fils ocv \
 | |
| 		multi_ap \
 | |
| 		default_disabled
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		sae|owe|eap2|eap192)
 | |
| 			set_default ieee80211w 2
 | |
| 		;;
 | |
| 		psk-sae)
 | |
| 			set_default ieee80211w 1
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	set_default ieee80211r 0
 | |
| 	set_default multi_ap 0
 | |
| 	set_default default_disabled 0
 | |
| 
 | |
| 	local key_mgmt='NONE'
 | |
| 	local network_data=
 | |
| 	local T="	"
 | |
| 
 | |
| 	local scan_ssid="scan_ssid=1"
 | |
| 	local freq wpa_key_mgmt
 | |
| 
 | |
| 	[ "$_w_mode" = "adhoc" ] && {
 | |
| 		append network_data "mode=1" "$N$T"
 | |
| 		[ -n "$freq" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
 | |
| 		[ "$noscan" = "1" ] && append network_data "noscan=1" "$N$T"
 | |
| 
 | |
| 		scan_ssid="scan_ssid=0"
 | |
| 
 | |
| 		[ "$_w_driver" = "nl80211" ] ||	append wpa_key_mgmt "WPA-NONE"
 | |
| 	}
 | |
| 
 | |
| 	[ "$_w_mode" = "mesh" ] && {
 | |
| 		json_get_vars mesh_id mesh_fwding mesh_rssi_threshold encryption
 | |
| 		[ -n "$mesh_id" ] && ssid="${mesh_id}"
 | |
| 
 | |
| 		append network_data "mode=5" "$N$T"
 | |
| 		[ -n "$mesh_fwding" ] && append network_data "mesh_fwding=${mesh_fwding}" "$N$T"
 | |
| 		[ -n "$mesh_rssi_threshold" ] && append network_data "mesh_rssi_threshold=${mesh_rssi_threshold}" "$N$T"
 | |
| 		[ -n "$freq" ] && wpa_supplicant_set_fixed_freq "$freq" "$htmode"
 | |
| 		[ "$noscan" = "1" ] && append network_data "noscan=1" "$N$T"
 | |
| 		[ "$encryption" = "none" -o -z "$encryption" ] || append wpa_key_mgmt "SAE"
 | |
| 		scan_ssid=""
 | |
| 	}
 | |
| 
 | |
| 	[ "$_w_mode" = "sta" ] && {
 | |
| 		[ "$multi_ap" = 1 ] && append network_data "multi_ap_backhaul_sta=1" "$N$T"
 | |
| 		[ "$default_disabled" = 1 ] && append network_data "disabled=1" "$N$T"
 | |
| 	}
 | |
| 
 | |
| 	[ -n "$ocv" ] && append network_data "ocv=$ocv" "$N$T"
 | |
| 
 | |
| 	case "$auth_type" in
 | |
| 		none) ;;
 | |
| 		owe)
 | |
| 			hostapd_append_wpa_key_mgmt
 | |
| 			key_mgmt="$wpa_key_mgmt"
 | |
| 		;;
 | |
| 		wep)
 | |
| 			local wep_keyidx=0
 | |
| 			hostapd_append_wep_key network_data
 | |
| 			append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
 | |
| 		;;
 | |
| 		wps)
 | |
| 			key_mgmt='WPS'
 | |
| 		;;
 | |
| 		psk|sae|psk-sae)
 | |
| 			local passphrase
 | |
| 
 | |
| 			if [ "$_w_mode" != "mesh" ]; then
 | |
| 				hostapd_append_wpa_key_mgmt
 | |
| 			fi
 | |
| 
 | |
| 			key_mgmt="$wpa_key_mgmt"
 | |
| 
 | |
| 			if [ "$_w_mode" = "mesh" ] || [ "$auth_type" = "sae" ]; then
 | |
| 				passphrase="sae_password=\"${key}\""
 | |
| 			else
 | |
| 				if [ ${#key} -eq 64 ]; then
 | |
| 					passphrase="psk=${key}"
 | |
| 				else
 | |
| 					passphrase="psk=\"${key}\""
 | |
| 				fi
 | |
| 			fi
 | |
| 			append network_data "$passphrase" "$N$T"
 | |
| 		;;
 | |
| 		eap|eap2|eap192)
 | |
| 			hostapd_append_wpa_key_mgmt
 | |
| 			key_mgmt="$wpa_key_mgmt"
 | |
| 
 | |
| 			json_get_vars eap_type identity anonymous_identity ca_cert ca_cert_usesystem
 | |
| 
 | |
| 			[ "$fils" -gt 0 ] && append network_data "erp=1" "$N$T"
 | |
| 			if [ "$ca_cert_usesystem" -eq "1" -a -f "/etc/ssl/certs/ca-certificates.crt" ]; then
 | |
| 				append network_data "ca_cert=\"/etc/ssl/certs/ca-certificates.crt\"" "$N$T"
 | |
| 			else
 | |
| 				[ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" "$N$T"
 | |
| 			fi
 | |
| 			[ -n "$identity" ] && append network_data "identity=\"$identity\"" "$N$T"
 | |
| 			[ -n "$anonymous_identity" ] && append network_data "anonymous_identity=\"$anonymous_identity\"" "$N$T"
 | |
| 			case "$eap_type" in
 | |
| 				tls)
 | |
| 					json_get_vars client_cert priv_key priv_key_pwd
 | |
| 					append network_data "client_cert=\"$client_cert\"" "$N$T"
 | |
| 					append network_data "private_key=\"$priv_key\"" "$N$T"
 | |
| 					append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T"
 | |
| 
 | |
| 					json_get_vars subject_match
 | |
| 					[ -n "$subject_match" ] && append network_data "subject_match=\"$subject_match\"" "$N$T"
 | |
| 
 | |
| 					json_get_values altsubject_match altsubject_match
 | |
| 					if [ -n "$altsubject_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $altsubject_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "altsubject_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					json_get_values domain_match domain_match
 | |
| 					if [ -n "$domain_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $domain_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "domain_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					json_get_values domain_suffix_match domain_suffix_match
 | |
| 					if [ -n "$domain_suffix_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $domain_suffix_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "domain_suffix_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 				;;
 | |
| 				fast|peap|ttls)
 | |
| 					json_get_vars auth password ca_cert2 ca_cert2_usesystem client_cert2 priv_key2 priv_key2_pwd
 | |
| 					set_default auth MSCHAPV2
 | |
| 
 | |
| 					if [ "$auth" = "EAP-TLS" ]; then
 | |
| 						if [ "$ca_cert2_usesystem" -eq "1" -a -f "/etc/ssl/certs/ca-certificates.crt" ]; then
 | |
| 							append network_data "ca_cert2=\"/etc/ssl/certs/ca-certificates.crt\"" "$N$T"
 | |
| 						else
 | |
| 							[ -n "$ca_cert2" ] && append network_data "ca_cert2=\"$ca_cert2\"" "$N$T"
 | |
| 						fi
 | |
| 						append network_data "client_cert2=\"$client_cert2\"" "$N$T"
 | |
| 						append network_data "private_key2=\"$priv_key2\"" "$N$T"
 | |
| 						append network_data "private_key2_passwd=\"$priv_key2_pwd\"" "$N$T"
 | |
| 					else
 | |
| 						append network_data "password=\"$password\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					json_get_vars subject_match
 | |
| 					[ -n "$subject_match" ] && append network_data "subject_match=\"$subject_match\"" "$N$T"
 | |
| 
 | |
| 					json_get_values altsubject_match altsubject_match
 | |
| 					if [ -n "$altsubject_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $altsubject_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "altsubject_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					json_get_values domain_match domain_match
 | |
| 					if [ -n "$domain_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $domain_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "domain_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					json_get_values domain_suffix_match domain_suffix_match
 | |
| 					if [ -n "$domain_suffix_match" ]; then
 | |
| 						local list=
 | |
| 						for x in $domain_suffix_match; do
 | |
| 							append list "$x" ";"
 | |
| 						done
 | |
| 						append network_data "domain_suffix_match=\"$list\"" "$N$T"
 | |
| 					fi
 | |
| 
 | |
| 					phase2proto="auth="
 | |
| 					case "$auth" in
 | |
| 						"auth"*)
 | |
| 							phase2proto=""
 | |
| 						;;
 | |
| 						"EAP-"*)
 | |
| 							auth="$(echo $auth | cut -b 5- )"
 | |
| 							[ "$eap_type" = "ttls" ] &&
 | |
| 								phase2proto="autheap="
 | |
| 							json_get_vars subject_match2
 | |
| 							[ -n "$subject_match2" ] && append network_data "subject_match2=\"$subject_match2\"" "$N$T"
 | |
| 
 | |
| 							json_get_values altsubject_match2 altsubject_match2
 | |
| 							if [ -n "$altsubject_match2" ]; then
 | |
| 								local list=
 | |
| 								for x in $altsubject_match2; do
 | |
| 									append list "$x" ";"
 | |
| 								done
 | |
| 								append network_data "altsubject_match2=\"$list\"" "$N$T"
 | |
| 							fi
 | |
| 
 | |
| 							json_get_values domain_match2 domain_match2
 | |
| 							if [ -n "$domain_match2" ]; then
 | |
| 								local list=
 | |
| 								for x in $domain_match2; do
 | |
| 									append list "$x" ";"
 | |
| 								done
 | |
| 								append network_data "domain_match2=\"$list\"" "$N$T"
 | |
| 							fi
 | |
| 
 | |
| 							json_get_values domain_suffix_match2 domain_suffix_match2
 | |
| 							if [ -n "$domain_suffix_match2" ]; then
 | |
| 								local list=
 | |
| 								for x in $domain_suffix_match2; do
 | |
| 									append list "$x" ";"
 | |
| 								done
 | |
| 								append network_data "domain_suffix_match2=\"$list\"" "$N$T"
 | |
| 							fi
 | |
| 						;;
 | |
| 					esac
 | |
| 					append network_data "phase2=\"$phase2proto$auth\"" "$N$T"
 | |
| 				;;
 | |
| 			esac
 | |
| 			append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T"
 | |
| 		;;
 | |
| 	esac
 | |
| 
 | |
| 	[ "$wpa_cipher" = GCMP ] && {
 | |
| 		append network_data "pairwise=GCMP" "$N$T"
 | |
| 		append network_data "group=GCMP" "$N$T"
 | |
| 	}
 | |
| 
 | |
| 	[ "$mode" = mesh ] || {
 | |
| 		case "$wpa" in
 | |
| 			1)
 | |
| 				append network_data "proto=WPA" "$N$T"
 | |
| 			;;
 | |
| 			2)
 | |
| 				append network_data "proto=RSN" "$N$T"
 | |
| 			;;
 | |
| 		esac
 | |
| 
 | |
| 		case "$ieee80211w" in
 | |
| 			[012])
 | |
| 				[ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" "$N$T"
 | |
| 			;;
 | |
| 		esac
 | |
| 	}
 | |
| 	[ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
 | |
| 	[ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int" "$N$T"
 | |
| 
 | |
| 	local bssid_blacklist bssid_whitelist
 | |
| 	json_get_values bssid_blacklist bssid_blacklist
 | |
| 	json_get_values bssid_whitelist bssid_whitelist
 | |
| 
 | |
| 	[ -n "$bssid_blacklist" ] && append network_data "bssid_blacklist=$bssid_blacklist" "$N$T"
 | |
| 	[ -n "$bssid_whitelist" ] && append network_data "bssid_whitelist=$bssid_whitelist" "$N$T"
 | |
| 
 | |
| 	[ -n "$basic_rate" ] && {
 | |
| 		local br rate_list=
 | |
| 		for br in $basic_rate; do
 | |
| 			wpa_supplicant_add_rate rate_list "$br"
 | |
| 		done
 | |
| 		[ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T"
 | |
| 	}
 | |
| 
 | |
| 	[ -n "$mcast_rate" ] && {
 | |
| 		local mc_rate=
 | |
| 		wpa_supplicant_add_rate mc_rate "$mcast_rate"
 | |
| 		append network_data "mcast_rate=$mc_rate" "$N$T"
 | |
| 	}
 | |
| 
 | |
| 	if [ "$key_mgmt" = "WPS" ]; then
 | |
| 		echo "wps_cred_processing=1" >> "$_config"
 | |
| 	else
 | |
| 		cat >> "$_config" <<EOF
 | |
| network={
 | |
| 	$scan_ssid
 | |
| 	ssid="$ssid"
 | |
| 	key_mgmt=$key_mgmt
 | |
| 	$network_data
 | |
| }
 | |
| EOF
 | |
| 	fi
 | |
| 	return 0
 | |
| }
 |