summaryrefslogtreecommitdiff
path: root/scripts
Commit message (Collapse)AuthorAgeFilesLines
* netifd: fix WPA3 enterprise ciphersJoerg Werner2022-08-201-0/+9
| | | | | | | | | WPA3 enterprise requires wpa_cipher to be GCMP-256 for good client/device support, so if the user sets encryption to wpa3 or wpa3-mixed, then add GCMP-256. Also allow explicit selection of GCMP-256/CCMP-256 ciphers by adding gcmp256/ccmp256 at the end of the encryption value. Signed-off-by: Joerg Werner <schreibubi@gmail.com>
* netifd: fix hwmode for 60g bandDaniel Golle2022-05-231-1/+2
| | | | | | | | hwmode should be set to 'ad' for 60g band. Reported-by: herman@zeilsteenfilm.nl Fixes: 62e3cb5 ("scripts/netifd-wireless.sh: add support for specifying the operating band") Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* wireless: improve reliability of proxyarp supportFelix Fietkau2021-09-011-2/+2
| | | | | | | | instead of relying on hostapd to manipulate bridge attributes (which can race against netifd adding/removing of member ports), set the proxyarp related attributes in netifd directly when bringing up the member port Signed-off-by: Felix Fietkau <nbd@nbd.name>
* wireless: pass the real network ifname to the setup scriptFelix Fietkau2021-06-041-0/+1
| | | | | | | If the network ifname is a VLAN on top of a VLAN-filtering bridge, hostapd needs to know the VLAN ifname to communicate with other APs, if 802.11r is enabled. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* scripts/netifd-wireless.sh: add support for specifying the operating bandFelix Fietkau2021-05-241-14/+14
| | | | | | Add the new 'band' option, which supports the following values: 2g, 5g, 6g, 60g Signed-off-by: Felix Fietkau <nbd@nbd.name>
* netifd: wireless: default to GCMP WPA cipher on 802.11adDaniel Golle2021-01-051-1/+7
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* wireless: add support for not killing processes on teardownFelix Fietkau2020-12-281-0/+1
| | | | | | | When using a global hostapd/wpa_supplicant instance, it should not be killed if a single radio is torn down Signed-off-by: Felix Fietkau <nbd@nbd.name>
* netifd-wireless: parse 'osen' encryptionDaniel Golle2020-09-081-0/+6
| | | | | | | | Support Hotspot 2.0 online signup with encryption, either as only encryption type of a dedicated SSID or together with WPA-EAP for single SSID setups. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* netifd: wireless: add support for tracking wifi-station sectionsJohn Crispin2020-06-041-0/+24
| | | | | | | This new section allows us to assign mac specific key/vid settings to a station. Signed-off-by: John Crispin <john@phrozen.org>
* netifd: wireless: add support for tracking wifi-vlan sectionsJohn Crispin2020-06-041-3/+39
| | | | | | This new section allows us to create apvlan settings for hostapd. Signed-off-by: John Crispin <john@phrozen.org>
* interface: add neighbor config supportmeurisa2019-04-151-0/+58
| | | | | | | | | | | | | | | | | | The neighbor or neighbor6 network section makes neighbours configurable via UCI or proto shell handlers. It allows to install neighbor proxy entries or static neighbor entries The neighbor or neighbor6 section has the following types: interface : declares the logical OpenWrt interface ipaddr : the ip address of the neighbor mac : the mac address of the neighbor proxy : specifies whether the neighbor ia a proxy entry (can be 1 or 0) router : specifies whether the neighbor is a router (can be 1 or 0) Signed-off-by: Alexander Meuris <meurisalexander@gmail.com> Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* netifd: wireless: Add support for 802.11adRobert Marko2019-03-211-1/+1
| | | | | | This simple patch adds 802.11ad to hwmode list so that netifd-wireless.sh does not otherwise overwrite it with the default hwmode=g Signed-off-by: Robert Marko <robimarko@gmail.com>
* netifd: wireless: Add support for GCMP cipherRobert Marko2019-03-211-0/+1
| | | | | | | | This patch will add support for using GCMP as cipher suite. This is not a strong cipher but is only one supported by wil6210 driver in order to have encrypted traffic. Signed-off-by: Robert Marko <robimarko@gmail.com>
* wireless: Add WPA-EAP-SUITE-B-192 (WPA3-Enterprise)Hauke Mehrtens2018-10-121-1/+7
| | | | Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* wireless: Add Opportunistic Wireless Encryption (OWE)Hauke Mehrtens2018-10-121-1/+4
| | | | Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* wireless: Add Simultaneous Authentication of Equals (SAE)Hauke Mehrtens2018-10-121-1/+7
| | | | | | This adds PSK3 / SAE support. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* scripts: fix previous commitJo-Philipp Wich2018-09-191-1/+1
| | | | | | | Actually change the glob pattern as described in the previous commit. Fixes: 3c8ac1c ("netifd: fix wpa mixed mode matching") Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* netifd: fix wpa mixed mode matchingRick Farina (Zero_Chaos)2018-09-191-1/+1
| | | | | | | | | | | | | Change wpa mixed mode matching to not accidently catch wep+mixed. All documented cases have the character between {wpa,psk} and mixed as a '-' but no need to break things which were working, so preserve the * case. Reported-by: "Rick Farina (Zero_Chaos)" <zerochaos@gentoo.org> [Allow "psk-mixed" to be prefixed, to align with the *psk2* and *psk* cases, slightly reword subject and commit message.] Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* wireless: include noscan option in common wdev varsDaniel Golle2018-04-201-1/+1
| | | | | | | 'noscan' can be passed down to wpa_supplicant to enforce channel settings in mesh mode. Allow hostapd.sh to take care of it. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* netifd-proto: add proto_config_add_array wrapperHans Dedecker2018-02-051-0/+4
| | | | Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* wireless: fix _wireless_add_processGünther Kelleter2017-02-111-2/+2
| | | | | | | The pid is in $1, not $pid. Use proper test condition for nonmatching exe warning. Signed-off-by: Günther Kelleter <guenther.kelleter@devolo.de>
* proto-shell: add helpers for generic options in proto handlersMarcin Jurkowski2016-10-271-0/+13
| | | | | | | | Adding helpers for virtual interfaces generic options in ncm, qmi, mbim and directip protocols as suggested by Felix in https://lists.openwrt.org/pipermail/openwrt-devel/2016-February/039794.html Signed-off-by: Marcin Jurkowski <marcin1j@gmail.com>
* proto-shell: Support teardown on layer 3 link lossHans Dedecker2016-08-111-0/+2
| | | | | | | | | | | | | Commit c6858766 added interface teardown support on layer 3 device link loss mainly for shell protocols who have no proto task like xl2tp. However for shell protocols having a proto task it is not always the correct action to teardown the interface; as an example the PPP daemon can be put into persist state trying to re-establish the link via a hold-off mechanism if layer 3 link loss is detected. Therefore shell handlers can enable via TEARDOWN_ON_L3_LINK_DOWN a proto flag which will teardown the interface when layer 3 link loss is detected Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* wireless: rename 'wpa_pairwise' variable to 'wpa_cipher'Daniel Golle2016-01-191-6/+7
| | | | | | | | | We shall enforce the cipher for both, pairwise and group, thus change the name of the variable to a more generic phrasing, 'cipher' instead of 'pairwise'. Signed-off-by: Daniel Golle <daniel@makrotopia.org> Signed-off-by: Felix Fietkau <nbd@openwrt.org> [keep a copy for compatibility reasons]
* wireless: fix bogus isolate setting on unbridged configurationFelix Fietkau2015-09-271-4/+2
| | | | | | | This was caused by a faulty test for the isolate option (arithmetic on a variable with no default) Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* bridge: Allow setting multicast_to_unicast optionLinus Lüssing2015-08-251-0/+1
| | | | | | | | | | | With this patch the multicast_to_unicast feature can be disabled for all wireless interfaces via an according option on the uci bridge interface. This patch also exports the setting information to wireless handler scripts. The hostapd script will need that information to determine whether to enable or disable ap-isolation, for instance. Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
* bridge: Fix multicast_to_unicast feature by hairpin+isolateLinus Lüssing2015-08-251-0/+15
| | | | | | | | | | | | | | | | | | | | | | | | | All IGMP and MLD versions suffer from a specific limitation (from a snooping switch perspective): Report suppression. Once a listener hears an IGMPv2/3 or MLDv1 report for the same group itself participates in then it might (if this listener is an IGMPv3 or MLDv2 listener) or will (if this is an IGMPv1/2 or MLDv1 listener) refrain from sending its own report. Therefore we might currently miss such surpressing listeners as they won't receive the multicast packet with the mangled, unicasted destination. Fixing this by first isolating the STAs and giving the bridge more control over traffic forwarding. E.g. refraining to forward listener reports to other STAs. For broadcast and unicast traffic to an STA on the same AP, the hairpin feature of the bridge will reflect such traffic back to the AP interface. However, if the AP interface is actually configured to isolate STAs, then hairpin is kept disabled. Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
* proto-shell: allow running protocols without proto_task.Yousong Zhou2015-05-231-0/+2
| | | | | | | | | | | | | | | Adds a new config parameter "no-proto-task" for noting that no proto_task will be running for this protocol type. This is required since then change in commit "d0dcf74 proto-shell: retry setup if the proto handler script quits without changing the state or starting a process". The change is mainly for protocols like xl2tpd in which control commands are sent to another daemon xl2tpd to start L2TP negotiation and pppd process who is not under netifd's control as proto_task as is the case in other ppp related protocols like pppoe, pptp, etc. Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* netifd: Interface last error supportHans Dedecker2015-04-031-0/+1
| | | | | | | | | | | | | | Adds interface last error support which preserves the last reported error reported by the protocol handler till the interface is up; e.g. survives network reload and interface restarts. This is mainly usefull for tracking down why an interface fails to establish; eg auth failure/traffic limit for PPP interfaces Protocol handlers register last error support by setting lasterror=1 in the proto_init function Signed-off-by: Johan Peeters <johan.peeters111@gmail.com> Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* netifd: add metric argument for proto_add_ipv4_routeSteven Barth2015-03-311-1/+2
| | | | Signed-off-by: Steven Barth <steven@midlink.org>
* Fix regression with IPv6 source-dest-routesSteven Barth2015-03-211-4/+4
|
* add missing argument for ipv4 routesSteven Barth2015-03-191-1/+1
| | | | Signed-off-by: Steven Barth <steven@midlink.org>
* Add table argument to shell API for routesSteven Barth2015-03-191-2/+6
| | | | Signed-off-by: Steven Barth <steven@midlink.org>
* Enable callers to pass the source IP of an IPv4 route when usingKristian Evensen2014-12-081-1/+2
| | | | | | | | | proto_add_ipv4_route(). This is useful with for example DHCP in a multihomed scenario, as it provides an easy way to match default routes with the correct IP address. One use case for this are applications that monitor the state of the WAN port, and the WAN port is assigned multiple addresses. Signed-off-by: Kristian Evensen <kristian.evensen at gmail.com>
* scripts: set type for the "key" attributeFelix Fietkau2014-07-181-1/+1
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* netifd: Reload proto on topology changeHelmut Schaa2014-03-211-1/+9
| | | | | | | | | | Introduce a new device event "topology change" that gets signaled by bridges on adding/removing members. On "topology changes" the proto handlers are requested to "renew" which is most useful for DHCP. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* wireless: fix getting the network_bridge variableFelix Fietkau2013-12-021-9/+2
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* wireless: fix htmode handlingFelix Fietkau2013-12-021-2/+2
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* wireless: call an initial cleanup functionFelix Fietkau2013-12-021-0/+2
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* wireless: fix process handling if the pid exe is a symlinkFelix Fietkau2013-12-011-1/+5
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* wireless: add some device/vif error debug messagesFelix Fietkau2013-11-301-0/+2
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* wireless: fix channel checkFelix Fietkau2013-11-301-2/+2
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* add initial support for handling wireless devices via scriptsFelix Fietkau2013-11-291-0/+321
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* utils.sh: add N (newline)Felix Fietkau2013-11-291-0/+3
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* IPv6: add class support to regular IPv6 addressesSteven Barth2013-11-271-1/+5
|
* proto-shell: fix legacy proto_config_add_* functions, make them wrap around ↵Felix Fietkau2013-10-311-3/+3
| | | | | | config_add_* Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* scripts/utils.sh: add a function for setting a variable defaultFelix Fietkau2013-10-291-0/+6
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* scripts: make config_add_* parameters take multiple argumentsFelix Fietkau2013-10-221-8/+12
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* scripts: add config_add_array() to utilsFelix Fietkau2013-10-191-0/+4
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>
* scripts: remove the executable flag from netifd-proto.shFelix Fietkau2013-10-191-0/+0
| | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org>