Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
WIRELESS_DEFAULT_ENCRYPTION_MODE="NONE"
WIRELESS_VALID_ENCRYPTION_MODES="WPA2-PSK-SHA256 WPA2-PSK \
- WPA-PSK-SHA256 WPA-PSK WEP NONE"
+ WPA-PSK-SHA256 WPA-PSK NONE"
cli_wireless() {
local action=${1}
group="CCMP TKIP WEP104 WEP40"
;;
- # WEP
- WEP)
- auth_alg="SHARED"
- wep_key0="${key}"
- wep_tx_keyidx="0"
-
- # Reset PSK.
- psk=""
- ;;
-
# No encryption. DANGEROUS!
NONE)
auth_alg="OPEN"
WPA*PSK)
print_indent 1 "psk=\"${PSK}\""
;;
- WEP)
- print_indent 1 "wep_key0=\"${PSK}\""
- print_indent 1 "wep_tx_keyidx=0"
- ;;
esac
if isset EAP_MODES; then