hostapd.sh 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. hostapd_set_bss_options() {
  2. local var="$1"
  3. local vif="$2"
  4. local enc wpa_group_rekey wps_possible
  5. config_get enc "$vif" encryption
  6. config_get wpa_group_rekey "$vif" wpa_group_rekey
  7. config_get_bool ap_isolate "$vif" isolate 0
  8. config_get device "$vif" device
  9. config_get hwmode "$device" hwmode
  10. config_get phy "$device" phy
  11. append "$var" "ctrl_interface=/var/run/hostapd-$phy" "$N"
  12. if [ "$ap_isolate" -gt 0 ]; then
  13. append "$var" "ap_isolate=$ap_isolate" "$N"
  14. fi
  15. # Examples:
  16. # psk-mixed/tkip => WPA1+2 PSK, TKIP
  17. # wpa-psk2/tkip+aes => WPA2 PSK, CCMP+TKIP
  18. # wpa2/tkip+aes => WPA2 RADIUS, CCMP+TKIP
  19. # ...
  20. # TODO: move this parsing function somewhere generic, so that
  21. # later it can be reused by drivers that don't use hostapd
  22. # crypto defaults: WPA2 vs WPA1
  23. case "$enc" in
  24. wpa2*|*psk2*)
  25. wpa=2
  26. crypto="CCMP"
  27. ;;
  28. *mixed*)
  29. wpa=3
  30. crypto="CCMP TKIP"
  31. ;;
  32. *)
  33. wpa=1
  34. crypto="TKIP"
  35. ;;
  36. esac
  37. # explicit override for crypto setting
  38. case "$enc" in
  39. *tkip+aes|*tkip+ccmp|*aes+tkip|*ccmp+tkip) crypto="CCMP TKIP";;
  40. *aes|*ccmp) crypto="CCMP";;
  41. *tkip) crypto="TKIP";;
  42. esac
  43. # enforce CCMP for 11ng and 11na
  44. case "$hwmode:$crypto" in
  45. *ng:TKIP|*na:TKIP) crypto="CCMP TKIP";;
  46. esac
  47. # use crypto/auth settings for building the hostapd config
  48. case "$enc" in
  49. *psk*)
  50. config_get psk "$vif" key
  51. if [ ${#psk} -eq 64 ]; then
  52. append "$var" "wpa_psk=$psk" "$N"
  53. else
  54. append "$var" "wpa_passphrase=$psk" "$N"
  55. fi
  56. wps_possible=1
  57. ;;
  58. *wpa*)
  59. # required fields? formats?
  60. # hostapd is particular, maybe a default configuration for failures
  61. config_get auth_server "$vif" auth_server
  62. [ -z "$auth_server" ] && config_get auth_server "$vif" server
  63. append "$var" "auth_server_addr=$auth_server" "$N"
  64. config_get auth_port "$vif" auth_port
  65. [ -z "$auth_port" ] && config_get auth_port "$vif" port
  66. auth_port=${auth_port:-1812}
  67. append "$var" "auth_server_port=$auth_port" "$N"
  68. config_get auth_secret "$vif" auth_secret
  69. [ -z "$auth_secret" ] && config_get auth_secret "$vif" key
  70. append "$var" "auth_server_shared_secret=$auth_secret" "$N"
  71. config_get acct_server "$vif" acct_server
  72. [ -n "$acct_server" ] && append "$var" "acct_server_addr=$acct_server" "$N"
  73. config_get acct_port "$vif" acct_port
  74. [ -n "$acct_port" ] && acct_port=${acct_port:-1813}
  75. [ -n "$acct_port" ] && append "$var" "acct_server_port=$acct_port" "$N"
  76. config_get acct_secret "$vif" acct_secret
  77. [ -n "$acct_secret" ] && append "$var" "acct_server_shared_secret=$acct_secret" "$N"
  78. config_get nasid "$vif" nasid
  79. append "$var" "nas_identifier=$nasid" "$N"
  80. append "$var" "eapol_key_index_workaround=1" "$N"
  81. append "$var" "radius_acct_interim_interval=300" "$N"
  82. append "$var" "ieee8021x=1" "$N"
  83. append "$var" "wpa_key_mgmt=WPA-EAP" "$N"
  84. append "$var" "wpa_group_rekey=300" "$N"
  85. append "$var" "wpa_gmk_rekey=640" "$N"
  86. ;;
  87. *wep*)
  88. config_get key "$vif" key
  89. key="${key:-1}"
  90. case "$key" in
  91. [1234])
  92. for idx in 1 2 3 4; do
  93. local zidx
  94. zidx=$(($idx - 1))
  95. config_get ckey "$vif" "key${idx}"
  96. [ -n "$ckey" ] && \
  97. append "$var" "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N"
  98. done
  99. append "$var" "wep_default_key=$((key - 1))" "$N"
  100. ;;
  101. *)
  102. append "$var" "wep_key0=$(prepare_key_wep "$key")" "$N"
  103. append "$var" "wep_default_key=0" "$N"
  104. ;;
  105. esac
  106. case "$enc" in
  107. *shared*)
  108. auth_algs=2
  109. ;;
  110. *mixed*)
  111. auth_algs=3
  112. ;;
  113. esac
  114. wpa=0
  115. crypto=
  116. ;;
  117. *)
  118. wpa=0
  119. crypto=
  120. ;;
  121. esac
  122. append "$var" "auth_algs=${auth_algs:-1}" "$N"
  123. append "$var" "wpa=$wpa" "$N"
  124. [ -n "$crypto" ] && append "$var" "wpa_pairwise=$crypto" "$N"
  125. [ -n "$wpa_group_rekey" ] && append "$var" "wpa_group_rekey=$wpa_group_rekey" "$N"
  126. config_get ssid "$vif" ssid
  127. config_get bridge "$vif" bridge
  128. config_get ieee80211d "$vif" ieee80211d
  129. config_get iapp_interface "$vif" iapp_interface
  130. config_get_bool wps_pbc "$vif" wps_pushbutton 0
  131. config_get_bool wps_label "$vif" wps_label 0
  132. config_get config_methods "$vif" wps_config
  133. [ "$wps_pbc" -gt 0 ] && append config_methods push_button
  134. [ -n "$wps_possible" -a -n "$config_methods" ] && {
  135. config_get device_type "$vif" wps_device_type "6-0050F204-1"
  136. config_get device_name "$vif" wps_device_name "OpenWrt AP"
  137. config_get manufacturer "$vif" wps_manufacturer "openwrt.org"
  138. append "$var" "eap_server=1" "$N"
  139. append "$var" "wps_state=2" "$N"
  140. append "$var" "ap_setup_locked=1" "$N"
  141. append "$var" "device_type=$device_type" "$N"
  142. append "$var" "device_name=$device_name" "$N"
  143. append "$var" "manufacturer=$manufacturer" "$N"
  144. append "$var" "config_methods=$config_methods" "$N"
  145. }
  146. append "$var" "ssid=$ssid" "$N"
  147. [ -n "$bridge" ] && append "$var" "bridge=$bridge" "$N"
  148. [ -n "$ieee80211d" ] && append "$var" "ieee80211d=$ieee80211d" "$N"
  149. [ -n "$iapp_interface" ] && append "$var" iapp_interface=$(uci_get_state network "$iapp_interface" ifname "$iapp_interface") "$N"
  150. if [ "$wpa" -ge "2" ]
  151. then
  152. # RSN -> allow preauthentication
  153. config_get rsn_preauth "$vif" rsn_preauth
  154. if [ -n "$bridge" -a "$rsn_preauth" = 1 ]
  155. then
  156. append "$var" "rsn_preauth=1" "$N"
  157. append "$var" "rsn_preauth_interfaces=$bridge" "$N"
  158. fi
  159. # RSN -> allow management frame protection
  160. config_get ieee80211w "$vif" ieee80211w
  161. case "$ieee80211w" in
  162. [012])
  163. append "$var" "ieee80211w=$ieee80211w" "$N"
  164. [ "$ieee80211w" -gt "0" ] && {
  165. config_get ieee80211w_max_timeout "$vif" ieee80211w_max_timeout
  166. config_get ieee80211w_retry_timeout "$vif" ieee80211w_retry_timeout
  167. [ -n "$ieee80211w_max_timeout" ] && \
  168. append "$var" "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
  169. [ -n "$ieee80211w_retry_timeout" ] && \
  170. append "$var" "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
  171. }
  172. ;;
  173. esac
  174. fi
  175. }
  176. hostapd_setup_vif() {
  177. local vif="$1"
  178. local driver="$2"
  179. hostapd_cfg=
  180. hostapd_set_bss_options hostapd_cfg "$vif"
  181. config_get ifname "$vif" ifname
  182. config_get device "$vif" device
  183. config_get channel "$device" channel
  184. config_get hwmode "$device" hwmode
  185. case "$hwmode" in
  186. *bg|*gdt|*gst|*fh) hwmode=g;;
  187. *adt|*ast) hwmode=a;;
  188. esac
  189. [ "$channel" = auto ] && channel=
  190. [ -n "$channel" -a -z "$hwmode" ] && wifi_fixup_hwmode "$device"
  191. cat > /var/run/hostapd-$ifname.conf <<EOF
  192. driver=$driver
  193. interface=$ifname
  194. ${hwmode:+hw_mode=${hwmode#11}}
  195. ${channel:+channel=$channel}
  196. $hostapd_cfg
  197. EOF
  198. hostapd -P /var/run/wifi-$ifname.pid -B /var/run/hostapd-$ifname.conf
  199. }