You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
565 lines
13 KiB
Bash
565 lines
13 KiB
Bash
#
|
|
# Copyright (c) 2017 Qualcomm Technologies, Inc.
|
|
#
|
|
# All Rights Reserved.
|
|
# Confidential and Proprietary - Qualcomm Technologies, Inc.
|
|
#
|
|
|
|
#
|
|
# Copyright (c) 2014, The Linux Foundation. All rights reserved.
|
|
#
|
|
|
|
wpa_supplicant_setup_vif() {
|
|
local vif="$1"
|
|
local driver="$2"
|
|
local key="$key"
|
|
local options="$3"
|
|
local freq="" crypto=""
|
|
local sae owe
|
|
local sae_str owe_str
|
|
|
|
[ -n "$4" ] && freq="frequency=$4"
|
|
config_get_bool sae "$vif" sae
|
|
config_get_bool owe "$vif" owe
|
|
config_get ieee80211w "$vif" ieee80211w
|
|
|
|
# make sure we have the encryption type and the psk
|
|
[ -n "$enc" ] || {
|
|
config_get enc "$vif" encryption
|
|
}
|
|
|
|
enc_list=`echo "$enc" | sed "s/+/ /g"`
|
|
|
|
for enc_var in $enc_list; do
|
|
case "$enc_var" in
|
|
*tkip)
|
|
crypto="TKIP $crypto"
|
|
;;
|
|
*aes)
|
|
crypto="CCMP $crypto"
|
|
;;
|
|
*ccmp)
|
|
crypto="CCMP $crypto"
|
|
;;
|
|
*ccmp-256)
|
|
crypto="CCMP-256 $crypto"
|
|
;;
|
|
*gcmp)
|
|
crypto="GCMP $crypto"
|
|
;;
|
|
*gcmp-256)
|
|
crypto="GCMP-256 $crypto"
|
|
esac
|
|
done
|
|
|
|
[ -n "$key" ] || {
|
|
config_get key "$vif" key
|
|
}
|
|
|
|
local net_cfg bridge
|
|
config_get bridge "$vif" bridge
|
|
[ -z "$bridge" ] && {
|
|
net_cfg="$(find_net_config "$vif")"
|
|
[ -z "$net_cfg" ] || bridge="$(bridge_interface "$net_cfg")"
|
|
config_set "$vif" bridge "$bridge"
|
|
}
|
|
|
|
local mode ifname wds modestr=""
|
|
config_get mode "$vif" mode
|
|
config_get ifname "$vif" ifname
|
|
config_get_bool wds "$vif" wds 0
|
|
config_get_bool extap "$vif" extap 0
|
|
config_get map "$vif" map
|
|
|
|
config_get device "$vif" device
|
|
config_get_bool qwrap_enable "$device" qwrap_enable 0
|
|
|
|
[ -z "$bridge" ] || [ "$mode" = ap ] || [ "$mode" = sta -a $wds -eq 1 ] || \
|
|
[ "$mode" = sta -a $extap -eq 1 ] || [ $qwrap_enable -ne 0 ] || {
|
|
echo "wpa_supplicant_setup_vif($ifname): Refusing to bridge $mode mode interface"
|
|
return 1
|
|
}
|
|
[ "$mode" = "adhoc" ] && modestr="mode=1"
|
|
|
|
key_mgmt='NONE'
|
|
case "$enc" in
|
|
*none*) ;;
|
|
*wep*)
|
|
config_get key "$vif" key
|
|
key="${key:-1}"
|
|
case "$key" in
|
|
[1234])
|
|
for idx in 1 2 3 4; do
|
|
local zidx
|
|
zidx=$(($idx - 1))
|
|
config_get ckey "$vif" "key${idx}"
|
|
[ -n "$ckey" ] && \
|
|
append "wep_key${zidx}" "wep_key${zidx}=$(prepare_key_wep "$ckey")"
|
|
done
|
|
wep_tx_keyidx="wep_tx_keyidx=$((key - 1))"
|
|
;;
|
|
*)
|
|
wep_key0="wep_key0=$(prepare_key_wep "$key")"
|
|
wep_tx_keyidx="wep_tx_keyidx=0"
|
|
;;
|
|
esac
|
|
case "$enc" in
|
|
*mixed*)
|
|
wep_auth_alg='auth_alg=OPEN SHARED'
|
|
;;
|
|
*shared*)
|
|
wep_auth_alg='auth_alg=SHARED'
|
|
;;
|
|
*open*)
|
|
wep_auth_alg='auth_alg=OPEN'
|
|
;;
|
|
esac
|
|
;;
|
|
*psk*)
|
|
key_mgmt='WPA-PSK'
|
|
# if you want to use PSK with a non-nl80211 driver you
|
|
# have to use WPA-NONE and wext driver for wpa_s
|
|
[ "$mode" = "adhoc" -a "$driver" != "nl80211" ] && {
|
|
key_mgmt='WPA-NONE'
|
|
driver='wext'
|
|
}
|
|
if [ ${#key} -eq 64 ]; then
|
|
passphrase="psk=${key}"
|
|
else
|
|
passphrase="psk=\"${key}\""
|
|
fi
|
|
|
|
[ -n "$crypto" ] || crypto="CCMP"
|
|
pairwise="pairwise=$crypto"
|
|
|
|
case "$enc" in
|
|
*mixed*)
|
|
proto='proto=RSN WPA'
|
|
;;
|
|
*psk2*)
|
|
proto='proto=RSN'
|
|
config_get ieee80211w "$vif" ieee80211w 0
|
|
;;
|
|
*psk*)
|
|
proto='proto=WPA'
|
|
;;
|
|
esac
|
|
;;
|
|
*wpa*|*8021x*)
|
|
proto='proto=WPA2'
|
|
key_mgmt='WPA-EAP'
|
|
config_get ieee80211w "$vif" ieee80211w 0
|
|
config_get ca_cert "$vif" ca_cert
|
|
config_get eap_type "$vif" eap_type
|
|
ca_cert=${ca_cert:+"ca_cert=\"$ca_cert\""}
|
|
|
|
[ -n "$crypto" ] || crypto="CCMP"
|
|
pairwise="pairwise=$crypto"
|
|
|
|
case "$eap_type" in
|
|
tls)
|
|
config_get identity "$vif" identity
|
|
config_get client_cert "$vif" client_cert
|
|
config_get priv_key "$vif" priv_key
|
|
config_get priv_key_pwd "$vif" priv_key_pwd
|
|
identity="identity=\"$identity\""
|
|
client_cert="client_cert=\"$client_cert\""
|
|
priv_key="private_key=\"$priv_key\""
|
|
priv_key_pwd="private_key_passwd=\"$priv_key_pwd\""
|
|
;;
|
|
peap|ttls)
|
|
config_get auth "$vif" auth
|
|
config_get identity "$vif" identity
|
|
config_get password "$vif" password
|
|
phase2="phase2=\"auth=${auth:-MSCHAPV2}\""
|
|
identity="identity=\"$identity\""
|
|
password="password=\"$password\""
|
|
;;
|
|
esac
|
|
eap_type="eap=$(echo $eap_type | tr 'a-z' 'A-Z')"
|
|
;;
|
|
esac
|
|
|
|
keymgmt='NONE'
|
|
|
|
# Allow SHA256
|
|
case "$enc" in
|
|
*wpa*|*8021x*) keymgmt=WPA-EAP;;
|
|
*psk*) keymgmt=WPA-PSK;;
|
|
esac
|
|
|
|
if [ "${sae}" -eq 1 -a "${ieee80211r}" -gt 0 ]
|
|
then
|
|
sae_str=FT-SAE
|
|
elif [ "${sae}" -eq 1 ]
|
|
then
|
|
sae_str=SAE
|
|
fi
|
|
|
|
if [ "${owe}" -eq 1 ]
|
|
then
|
|
owe_str=OWE
|
|
fi
|
|
|
|
case "$ieee80211w" in
|
|
0)
|
|
key_mgmt="${keymgmt}"
|
|
;;
|
|
1)
|
|
key_mgmt="${keymgmt} ${keymgmt}-SHA256"
|
|
;;
|
|
2)
|
|
key_mgmt="${keymgmt}-SHA256"
|
|
;;
|
|
esac
|
|
|
|
if [ "${sae}" -eq 1 ]
|
|
then
|
|
key_mgmt="${key_mgmt} ${sae_str}"
|
|
fi
|
|
if [ "${owe}" -eq 1 ]
|
|
then
|
|
key_mgmt="${key_mgmt} ${owe_str}"
|
|
fi
|
|
|
|
[ -n "$ieee80211w" ] && ieee80211w="ieee80211w=$ieee80211w"
|
|
case "$pairwise" in
|
|
*CCMP-256*) group="group=CCMP-256 GCMP-256 GCMP CCMP TKIP";;
|
|
*GCMP-256*) group="group=GCMP-256 GCMP CCMP TKIP";;
|
|
*GCMP*) group="group=GCMP CCMP TKIP";;
|
|
*CCMP*) group="group=CCMP TKIP";;
|
|
*TKIP*) group="group=TKIP";;
|
|
esac
|
|
|
|
config_get ifname "$vif" ifname
|
|
config_get bridge "$vif" bridge
|
|
config_get ssid "$vif" ssid
|
|
config_get bssid "$vif" bssid
|
|
bssid=${bssid:+"bssid=$bssid"}
|
|
|
|
config_get_bool wps_pbc "$vif" wps_pbc 0
|
|
|
|
config_get config_methods "$vif" wps_config
|
|
[ "$wps_pbc" -gt 0 ] && append config_methods push_button
|
|
|
|
[ -n "$config_methods" ] && {
|
|
wps_cred="wps_cred_processing=2"
|
|
wps_config_methods="config_methods=$config_methods"
|
|
update_config="update_config=1"
|
|
# fix the overlap session of WPS PBC for two STA vifs
|
|
macaddr=$(cat /sys/class/net/${bridge}/address)
|
|
uuid=$(echo "$macaddr" | sed 's/://g')
|
|
[ -n "$uuid" ] && {
|
|
uuid_config="uuid=87654321-9abc-def0-1234-$uuid"
|
|
}
|
|
}
|
|
|
|
local ctrl_interface wait_for_wrap=""
|
|
|
|
if [ $qwrap_enable -ne 0 ]; then
|
|
ctrl_interface="/var/run/wpa_supplicant"
|
|
if [ -f "/tmp/qwrap_conf_filename-$ifname.conf" ]; then
|
|
rm -rf /tmp/qwrap_conf_filename-$ifname.conf
|
|
fi
|
|
echo -e "/var/run/wpa_supplicant-$ifname.conf \c\h" > /tmp/qwrap_conf_filename-$ifname.conf
|
|
wait_for_wrap="-W"
|
|
fi
|
|
|
|
ctrl_interface="/var/run/wpa_supplicant-$ifname"
|
|
|
|
rm -rf $ctrl_interface
|
|
rm -f /var/run/wpa_supplicant-$ifname.conf
|
|
cat > /var/run/wpa_supplicant-$ifname.conf <<EOF
|
|
ctrl_interface=$ctrl_interface
|
|
$wps_config_methods
|
|
$wps_cred
|
|
$update_config
|
|
$uuid_config
|
|
network={
|
|
$modestr
|
|
scan_ssid=1
|
|
ssid="$ssid"
|
|
$bssid
|
|
key_mgmt=$key_mgmt
|
|
$proto
|
|
$freq
|
|
$ieee80211w
|
|
$passphrase
|
|
$pairwise
|
|
$group
|
|
$eap_type
|
|
$ca_cert
|
|
$client_cert
|
|
$priv_key
|
|
$priv_key_pwd
|
|
$phase2
|
|
$identity
|
|
$password
|
|
$wep_key0
|
|
$wep_key1
|
|
$wep_key2
|
|
$wep_key3
|
|
$wep_tx_keyidx
|
|
$wep_auth_alg
|
|
map=$map
|
|
}
|
|
EOF
|
|
[ -z "$proto" -a "$key_mgmt" != "NONE" ] || {\
|
|
# If there is a change in path of wpa_supplicant-$ifname.lock file, please make the path
|
|
# change also in wrapd_api.c file.
|
|
[ -f "/var/run/wpa_supplicant-$ifname.lock" ] &&
|
|
rm /var/run/wpa_supplicant-$ifname.lock
|
|
wpa_cli -g /var/run/wpa_supplicantglobal interface_add $ifname /var/run/wpa_supplicant-$ifname.conf athr /var/run/wpa_supplicant-$ifname "" $bridge
|
|
touch /var/run/wpa_supplicant-$ifname.lock
|
|
}
|
|
}
|
|
|
|
_wpa_supplicant_common() {
|
|
local ifname="$1"
|
|
|
|
_rpath="/var/run/wpa_supplicant"
|
|
_config="${_rpath}-$ifname.conf"
|
|
}
|
|
|
|
wpa_supplicant_prepare_interface() {
|
|
local ifname="$1"
|
|
_w_driver="$2"
|
|
|
|
_wpa_supplicant_common "$1"
|
|
|
|
json_get_vars mode wds
|
|
|
|
[ -n "$network_bridge" ] && {
|
|
fail=
|
|
case "$mode" in
|
|
adhoc)
|
|
fail=1
|
|
;;
|
|
sta)
|
|
[ "$wds" = 1 ] || fail=1
|
|
;;
|
|
esac
|
|
|
|
[ -n "$fail" ] && {
|
|
wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
|
|
return 1
|
|
}
|
|
}
|
|
|
|
local ap_scan=
|
|
|
|
_w_mode="$mode"
|
|
_w_modestr=
|
|
|
|
[[ "$mode" = adhoc ]] && {
|
|
ap_scan="ap_scan=2"
|
|
|
|
_w_modestr="mode=1"
|
|
}
|
|
|
|
[[ "$mode" = mesh ]] && {
|
|
user_mpm="user_mpm=1"
|
|
mesh_ctrl_interface="ctrl_interface=$_rpath"
|
|
}
|
|
|
|
wpa_supplicant_teardown_interface "$ifname"
|
|
cat > "$_config" <<EOF
|
|
$ap_scan
|
|
EOF
|
|
return 0
|
|
}
|
|
|
|
wpa_supplicant_add_network() {
|
|
local ifname="$1"
|
|
|
|
_wpa_supplicant_common "$1"
|
|
wireless_vif_parse_encryption
|
|
|
|
json_get_vars \
|
|
ssid bssid key basic_rate mcast_rate ieee80211w \
|
|
wps_device_type wps_device_name wps_manufacturer \
|
|
wps_config wps_model_name wps_model_number \
|
|
wps_serial_number
|
|
|
|
local key_mgmt='NONE'
|
|
local enc_str=
|
|
local network_data=
|
|
local T=" "
|
|
|
|
local wpa_key_mgmt="WPA-PSK"
|
|
local scan_ssid="scan_ssid=1"
|
|
local freq
|
|
|
|
[[ "$_w_mode" = "adhoc" ]] && {
|
|
append network_data "mode=1" "$N$T"
|
|
[ -n "$channel" ] && {
|
|
freq="$(get_freq "$phy" "$channel")"
|
|
append network_data "fixed_freq=1" "$N$T"
|
|
append network_data "frequency=$freq" "$N$T"
|
|
}
|
|
|
|
scan_ssid="scan_ssid=0"
|
|
|
|
[ "$_w_driver" = "nl80211" ] || wpa_key_mgmt="WPA-NONE"
|
|
}
|
|
|
|
[[ "$_w_mode" = "mesh" ]] && {
|
|
append network_data "mode=5" "$N$T"
|
|
[ -n "$channel" ] && {
|
|
freq="$(get_freq "$phy" "$channel")"
|
|
append network_data "frequency=$freq" "$N$T"
|
|
}
|
|
wpa_key_mgmt="SAE"
|
|
scan_ssid=""
|
|
}
|
|
|
|
[[ "$_w_mode" = "adhoc" -o "$_w_mode" = "mesh" ]] && append network_data "$_w_modestr" "$N$T"
|
|
|
|
case "$auth_type" in
|
|
none) ;;
|
|
wep)
|
|
local wep_keyidx=0
|
|
hostapd_append_wep_key network_data
|
|
append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
|
|
;;
|
|
psk)
|
|
local passphrase
|
|
|
|
key_mgmt="$wpa_key_mgmt"
|
|
if [ ${#key} -eq 64 ]; then
|
|
passphrase="psk=${key}"
|
|
else
|
|
passphrase="psk=\"${key}\""
|
|
fi
|
|
append network_data "$passphrase" "$N$T"
|
|
;;
|
|
eap)
|
|
key_mgmt='WPA-EAP'
|
|
|
|
json_get_vars eap_type identity ca_cert
|
|
[ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" "$N$T"
|
|
[ -n "$identity" ] && append network_data "identity=\"$identity\"" "$N$T"
|
|
case "$eap_type" in
|
|
tls)
|
|
json_get_vars client_cert priv_key priv_key_pwd
|
|
append network_data "client_cert=\"$client_cert\"" "$N$T"
|
|
append network_data "private_key=\"$priv_key\"" "$N$T"
|
|
append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T"
|
|
;;
|
|
peap|ttls)
|
|
json_get_vars auth password
|
|
set_default auth MSCHAPV2
|
|
append network_data "phase2=\"$auth\"" "$N$T"
|
|
append network_data "password=\"$password\"" "$N$T"
|
|
;;
|
|
esac
|
|
append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T"
|
|
;;
|
|
sae)
|
|
local passphrase
|
|
|
|
key_mgmt="$wpa_key_mgmt"
|
|
if [ ${#key} -eq 64 ]; then
|
|
passphrase="psk=${key}"
|
|
else
|
|
passphrase="psk=\"${key}\""
|
|
fi
|
|
append network_data "$passphrase" "$N$T"
|
|
;;
|
|
esac
|
|
|
|
[ "$mode" = mesh ] || {
|
|
case "$wpa" in
|
|
1)
|
|
append network_data "proto=WPA" "$N$T"
|
|
;;
|
|
2)
|
|
append network_data "proto=RSN" "$N$T"
|
|
;;
|
|
esac
|
|
|
|
case "$ieee80211w" in
|
|
[012])
|
|
[ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" "$N$T"
|
|
;;
|
|
esac
|
|
}
|
|
local beacon_int brates mrate
|
|
[ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
|
|
[ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int" "$N$T"
|
|
|
|
local bssid_blacklist bssid_whitelist
|
|
json_get_values bssid_blacklist bssid_blacklist
|
|
json_get_values bssid_whitelist bssid_whitelist
|
|
|
|
[ -n "$bssid_blacklist" ] && append network_data "bssid_blacklist=$bssid_blacklist" "$N$T"
|
|
[ -n "$bssid_whitelist" ] && append network_data "bssid_whitelist=$bssid_whitelist" "$N$T"
|
|
|
|
[ -n "$basic_rate" ] && {
|
|
local br rate_list=
|
|
for br in $basic_rate; do
|
|
wpa_supplicant_add_rate rate_list "$br"
|
|
done
|
|
[ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T"
|
|
}
|
|
|
|
[ -n "$mcast_rate" ] && {
|
|
local mc_rate=
|
|
wpa_supplicant_add_rate mc_rate "$mcast_rate"
|
|
append network_data "mcast_rate=$mc_rate" "$N$T"
|
|
}
|
|
|
|
local ht_str
|
|
[[ "$_w_mode" = adhoc ]] || ibss_htmode=
|
|
[ -n "$ibss_htmode" ] && append network_data "htmode=$ibss_htmode" "$N$T"
|
|
|
|
config_methods=$wps_config
|
|
[ -n "$config_methods" ] && {
|
|
set_default wps_device_type "6-0050F204-1"
|
|
set_default wps_device_name "Wireless Client"
|
|
set_default wps_manufacturer "openwrt.org"
|
|
set_default wps_model_name "cmodel"
|
|
set_default wps_model_number "123"
|
|
set_default wps_serial_number "12345"
|
|
|
|
device_type="device_type=$wps_device_type"
|
|
device_name="device_name=$wps_device_name"
|
|
manufacturer="manufacturer=$wps_manufacturer"
|
|
model_name="model_name=$wps_model_name"
|
|
model_number="model_number=$wps_model_number"
|
|
serial_number="serial_number=$wps_serial_number"
|
|
config_methods="config_methods=$config_methods"
|
|
}
|
|
|
|
cat >> "$_config" <<EOF
|
|
$mesh_ctrl_interface
|
|
$user_mpm
|
|
$device_type
|
|
$device_name
|
|
$manufacturer
|
|
$model_name
|
|
$model_number
|
|
$serial_number
|
|
$config_methods
|
|
|
|
network={
|
|
$scan_ssid
|
|
ssid="$ssid"
|
|
key_mgmt=$key_mgmt
|
|
$network_data
|
|
}
|
|
EOF
|
|
return 0
|
|
}
|
|
|
|
wpa_supplicant_run() {
|
|
local ifname="$1"; shift
|
|
|
|
_wpa_supplicant_common "$ifname"
|
|
|
|
[ -f "${_rpath}-$ifname.lock" ] &&
|
|
rm ${_rpath}-$ifname.lock
|
|
wpa_cli -g ${_rpath}global interface_add $ifname ${_config} nl80211 ${_rpath}-$ifname ""
|
|
touch ${_rpath}-$ifname.lock
|
|
}
|