2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2010 Michael Tremer & Christian Schmidt #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
22 .
/usr
/lib
/network
/header-port
24 HOOK_PORT_PATTERN
="${PORT_PATTERN_ACCESSPOINT}"
42 # Disable WPA3+2 by default
43 DEFAULT_WPA3_PERSONAL
="off"
44 DEFAULT_WPA2_PERSONAL
="off"
46 # Broadcast SSID by default
47 DEFAULT_BROADCAST_SSID
="on"
49 # Perform radar detection by default when possible
52 # 802.11w - Management Frame Protection
53 # Disable by default because many clients cannot connect when enabled
56 DEFAULT_ENVIRONMENT
="${WIRELESS_DEFAULT_ENVIRONMENT}"
58 hook_check_settings
() {
61 assert isset BROADCAST_SSID
62 assert isbool BROADCAST_SSID
67 assert isoneof MODE
${HOSTAPD_SUPPORTED_MODES}
72 assert wireless_environment_is_valid
"${ENVIRONMENT}"
75 hook_parse_cmdline
() {
76 while [ $# -gt 0 ]; do
79 BROADCAST_SSID
=$
(cli_get_val
"${1}")
82 CHANNEL
=$
(cli_get_val
"${1}")
84 --channel-bandwidth=*)
85 CHANNEL_BANDWIDTH
="$(cli_get_val "${1}")"
88 DFS
="$(cli_get_val "${1}")"
92 elif disabled DFS
; then
95 error
"Invalid value for DFS: ${DFS}"
100 ENVIRONMENT
="$(cli_get_val "${1}")"
102 if ! wireless_environment_is_valid
"${ENVIRONMENT}"; then
103 error
"Invalid wireless environment: ${ENVIRONMENT}"
108 ADDRESS
=$
(cli_get_val
"${1}")
111 MFP
="$(cli_get_val "${1}")"
115 elif disabled MFP
; then
118 error
"Invalid value for --mfp: ${MFP}"
123 MODE
=$
(cli_get_val
"${1}")
125 if ! isoneof MODE
${HOSTAPD_SUPPORTED_MODES}; then
126 error
"Unsupported mode: ${MODE}"
127 error
"Mode must be one of ${HOSTAPD_SUPPORTED_MODES}"
132 PHY
=$
(cli_get_val
"${1}")
135 SECRET
="$(cli_get_val "${1}")"
138 SSID
=$
(cli_get_val
"${1}")
141 WPA2_PERSONAL
="$(cli_get_bool "${1}")"
144 WPA3_PERSONAL
="$(cli_get_bool "${1}")"
147 warning
"Ignoring unknown argument '${1}'"
153 # Generate a random MAC address if none is set
154 if ! isset ADDRESS
; then
155 ADDRESS
="$(mac_generate)"
159 if ! isset MODE
; then
160 error
"--mode is not set"
164 # Automatically enable ACS if no channel is set and ACS is available
165 if ! isset CHANNEL
&& phy_supports_acs
"${PHY}"; then
168 log INFO
"Automatic Channel Selection (ACS) enabled"
171 # Channel bandwidth must match the mode
172 if isset CHANNEL_BANDWIDTH
&& ! wireless_channel_bandwidth_is_valid
"${MODE}" "${CHANNEL_BANDWIDTH}"; then
173 error
"Channel Bandwidth '${CHANNEL_BANDWIDTH}' is not supported for ${MODE}"
177 # Check if SECRET is set when WPA* is enabled
178 if ! isset SECRET
&& (enabled WPA3_PERSONAL || enabled WPA2_PERSONAL
); then
179 error
"Secret is not set when PSK authentication is enabled"
183 # Save address of phy do identify it again
184 PHY
=$
(phy_get
${PHY})
185 PHY
=$
(phy_get_address
${PHY})
192 if ! hook_default_edit
"$@"; then
196 # To apply all changes, we need to restart the port
197 port_restart
"${port}"
204 device_exists
"${port}" && exit ${EXIT_OK}
206 port_settings_read
"${port}"
208 # Check if the PHY is present.
209 local phy
=$
(phy_get
${PHY})
211 log DEBUG
"phy '${PHY}' is not present"
215 # Create the wireless device
216 wireless_create
"${port}" \
219 --address="${ADDRESS}"
228 # Remove the device if present
229 if device_exists
"${port}"; then
230 wireless_remove
"${port}"
240 # The port must already exist before
241 # hostapd is started. Otherwise it will
242 # fail horribly over and over again.
243 assert device_exists
"${port}"
245 hostapd_start
"${port}"
252 hostapd_stop
"${port}"
259 case "$(hotplug_action)" in
261 # Create the port when the phy is plugged in
262 if hotplug_event_port_uses_phy
"${port}"; then
263 hook_create
"${port}"
269 if hotplug_event_port_is_interface
"${port}"; then
270 hostapd_stop
"${port}"
277 exit ${EXIT_NOT_HANDLED}