/wpa_supplicant/functions.sh

http://github.com/brinkman83/bashrc · Shell · 1068 lines · 725 code · 149 blank · 194 comment · 75 complexity · 57813804697f518c667b6930e3c7df2d MD5 · raw file

  1. #!/bin/sh
  2. #####################################################################
  3. ## Purpose
  4. # This file contains common shell functions used by scripts of the
  5. # wpasupplicant package to allow ifupdown to manage wpa_supplicant.
  6. # It also contains some functions used by wpa_action(8) that allow
  7. # ifupdown to be managed by wpa_cli(8) action events.
  8. #
  9. # This file is provided by the wpasupplicant package.
  10. #####################################################################
  11. # Copyright (C) 2006 - 2009 Debian/Ubuntu wpasupplicant Maintainers
  12. # <pkg-wpa-devel@lists.alioth.debian.org>
  13. #
  14. # This program is free software; you can redistribute it and/or
  15. # modify it under the terms of the GNU General Public License
  16. # as published by the Free Software Foundation; either version 2
  17. # of the License, or (at your option) any later version.
  18. #
  19. # This program is distributed in the hope that it will be useful,
  20. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  21. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  22. # GNU General Public License for more details.
  23. #
  24. # On Debian GNU/Linux systems, the text of the GPL license,
  25. # version 2, can be found in /usr/share/common-licenses/GPL-2.
  26. #####################################################################
  27. ## global variables
  28. # wpa_supplicant variables
  29. WPA_SUP_BIN="/sbin/wpa_supplicant"
  30. WPA_SUP_PNAME="wpa_supplicant"
  31. WPA_SUP_PIDFILE="/var/run/wpa_supplicant.${WPA_IFACE}.pid"
  32. # wpa_cli variables
  33. WPA_CLI_BIN="/sbin/wpa_cli"
  34. WPA_CLI_PNAME="wpa_cli"
  35. WPA_CLI_PIDFILE="/var/run/wpa_action.${WPA_IFACE}.pid"
  36. WPA_CLI_LOGFILE="/var/log/wpa_action.${WPA_IFACE}.log"
  37. WPA_CLI_TIMESTAMP="/var/run/wpa_action.${WPA_IFACE}.timestamp"
  38. WPA_CLI_IFUPDOWN="/var/run/wpa_action.${WPA_IFACE}.ifupdown"
  39. # sendsigs omission interface, present in initscripts (>= 2.86.ds1-48)
  40. if [ -d /lib/init/rw/sendsigs.omit.d/ ]; then
  41. # Debian
  42. WPA_SUP_OMIT_PIDFILE="/lib/init/rw/sendsigs.omit.d/wpasupplicant.wpa_supplicant.${WPA_IFACE}.pid"
  43. WPA_CLI_OMIT_PIDFILE="/lib/init/rw/sendsigs.omit.d/wpasupplicant.wpa_action.${WPA_IFACE}.pid"
  44. elif [ -d /var/run/sendsigs.omit.d/ ]; then
  45. # Ubuntu, see https://launchpad.net/bugs/181541 for status
  46. WPA_SUP_OMIT_PIDFILE="/var/run/sendsigs.omit.d/wpasupplicant.wpa_supplicant.${WPA_IFACE}.pid"
  47. WPA_CLI_OMIT_PIDFILE="/var/run/sendsigs.omit.d/wpasupplicant.wpa_action.${WPA_IFACE}.pid"
  48. else
  49. WPA_SUP_OMIT_PIDFILE=
  50. WPA_CLI_OMIT_PIDFILE=
  51. fi
  52. # default ctrl_interface socket directory
  53. if [ -z "$WPA_CTRL_DIR" ]; then
  54. WPA_CTRL_DIR="/var/run/wpa_supplicant"
  55. fi
  56. # verbosity variables
  57. if [ -n "$IF_WPA_VERBOSITY" ] || [ "$VERBOSITY" = "1" ]; then
  58. TO_NULL="/dev/stdout"
  59. DAEMON_VERBOSITY="--verbose"
  60. else
  61. TO_NULL="/dev/null"
  62. DAEMON_VERBOSITY="--quiet"
  63. fi
  64. #####################################################################
  65. ## wpa_cli wrapper
  66. # Path to common ctrl_interface socket and iface supplied.
  67. # NB: WPA_CTRL_DIR cannot be used for interactive commands, it is
  68. # set only in the environment that wpa_cli provides when processing
  69. # action events.
  70. #
  71. wpa_cli () {
  72. "$WPA_CLI_BIN" -p "$WPA_CTRL_DIR" -i "$WPA_IFACE" "$@"
  73. return "$?"
  74. }
  75. #####################################################################
  76. ## verbose and stderr message wrapper
  77. # Ensures a standard and easily identifiable message is printed by
  78. # scripts using this function library.
  79. #
  80. # verbose To stdout when IF_WPA_VERBOSITY or VERBOSITY is true
  81. #
  82. # action Same as verbose but without newline
  83. # Useful for allowing wpa_cli commands to echo result
  84. # value of 'OK' or 'FAILED'
  85. #
  86. # stderr Echo warning or error messages to stderr
  87. #
  88. # NB: when called by wpa_action, there is no redirection (verbose)
  89. #
  90. wpa_msg () {
  91. if [ -n "$WPA_ACTION" ]; then
  92. shift
  93. echo "wpa_action: $@"
  94. return
  95. fi
  96. case "$1" in
  97. "verbose")
  98. shift
  99. echo "$WPA_SUP_PNAME: $@" >$TO_NULL
  100. ;;
  101. "action")
  102. shift
  103. echo -n "$WPA_SUP_PNAME: $@ -- " >$TO_NULL
  104. ;;
  105. "stderr")
  106. shift
  107. echo "$WPA_SUP_PNAME: $@" >/dev/stderr
  108. ;;
  109. *)
  110. ;;
  111. esac
  112. }
  113. #####################################################################
  114. ## validate daemon pid files
  115. # Test daemon process ID files via start-stop-daemon with a signal 0
  116. # given the exec binary and pidfile location.
  117. #
  118. # $1 daemon
  119. # $2 pidfile
  120. #
  121. # Returns true when pidfile exists, the process ID exists _and_ was
  122. # created by the exec binary.
  123. #
  124. # If the test fails, but the pidfile exists, it is stale
  125. #
  126. test_daemon_pidfile () {
  127. local DAEMON
  128. local PIDFILE
  129. if [ -n "$1" ]; then
  130. DAEMON="$1"
  131. fi
  132. if [ -f "$2" ]; then
  133. PIDFILE="$2"
  134. fi
  135. if [ -n "$DAEMON" ] && [ -f "$PIDFILE" ]; then
  136. if start-stop-daemon --stop --quiet --signal 0 \
  137. --exec "$DAEMON" --pidfile "$PIDFILE"; then
  138. return 0
  139. else
  140. rm -f "$PIDFILE"
  141. return 1
  142. fi
  143. else
  144. return 1
  145. fi
  146. }
  147. # validate wpa_supplicant pidfile
  148. test_wpa_supplicant () {
  149. test_daemon_pidfile "$WPA_SUP_BIN" "$WPA_SUP_PIDFILE"
  150. }
  151. # validate wpa_cli pidfile
  152. test_wpa_cli () {
  153. test_daemon_pidfile "$WPA_CLI_BIN" "$WPA_CLI_PIDFILE"
  154. }
  155. #####################################################################
  156. ## daemonize wpa_supplicant
  157. # Start wpa_supplicant via start-stop-dameon with all required
  158. # options. Will start if environment variable WPA_SUP_CONF is present
  159. #
  160. # Default options:
  161. # -B dameonize/background process
  162. # -D driver backend ('wext' if none given)
  163. # -P process ID file
  164. # -C path to ctrl_interface socket directory
  165. # -s log to syslog
  166. #
  167. # Conditional options:
  168. # -c configuration file
  169. # -W wait for wpa_cli to attach to ctrl_interface socket
  170. # -b bridge interface name
  171. # -f path to log file
  172. #
  173. init_wpa_supplicant () {
  174. [ -n "$WPA_SUP_CONF" ] || return 0
  175. local WPA_SUP_OPTIONS
  176. WPA_SUP_OPTIONS="-s -B -P $WPA_SUP_PIDFILE -i $WPA_IFACE"
  177. if [ -n "$WPA_ACTION_SCRIPT" ]; then
  178. if [ -x "$WPA_ACTION_SCRIPT" ]; then
  179. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -W"
  180. wpa_msg verbose "wait for wpa_cli to attach"
  181. else
  182. wpa_msg stderr "action script \"$WPA_ACTION_SCRIPT\" not executable"
  183. return 1
  184. fi
  185. fi
  186. if [ -n "$IF_WPA_BRIDGE" ]; then
  187. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -b $IF_WPA_BRIDGE"
  188. wpa_msg verbose "wpa-bridge $IF_WPA_BRIDGE"
  189. fi
  190. if [ -n "$IF_WPA_DRIVER" ]; then
  191. wpa_msg verbose "wpa-driver $IF_WPA_DRIVER"
  192. case "$IF_WPA_DRIVER" in
  193. hostap|ipw|madwifi|ndiswrapper)
  194. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -D wext"
  195. wpa_msg stderr "\"$IF_WPA_DRIVER\" wpa-driver is unsupported"
  196. wpa_msg stderr "using \"wext\" wpa-driver instead ..."
  197. ;;
  198. *)
  199. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -D $IF_WPA_DRIVER"
  200. ;;
  201. esac
  202. else
  203. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -D wext"
  204. wpa_msg verbose "using default driver type: wpa-driver wext"
  205. fi
  206. if [ -n "$IF_WPA_DEBUG_LEVEL" ]; then
  207. case "$IF_WPA_DEBUG_LEVEL" in
  208. 3)
  209. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -t -ddd"
  210. ;;
  211. 2)
  212. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -t -dd"
  213. ;;
  214. 1)
  215. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -t -d"
  216. ;;
  217. 0)
  218. # wpa_supplicant default verbosity
  219. ;;
  220. -1)
  221. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -q"
  222. ;;
  223. -2)
  224. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -qq"
  225. ;;
  226. esac
  227. wpa_msg verbose "using debug level: $IF_WPA_DEBUG_LEVEL"
  228. fi
  229. if [ -n "$IF_WPA_LOGFILE" ]; then
  230. # custom log file
  231. WPA_SUP_OPTIONS="$WPA_SUP_OPTIONS -f $IF_WPA_LOGFILE"
  232. WPA_SUP_LOGFILE="$IF_WPA_LOGFILE"
  233. wpa_msg verbose "logging to $IF_WPA_LOGFILE"
  234. fi
  235. wpa_msg verbose "$WPA_SUP_BIN $WPA_SUP_OPTIONS $WPA_SUP_CONF"
  236. start-stop-daemon --start --oknodo $DAEMON_VERBOSITY \
  237. --name $WPA_SUP_PNAME --startas $WPA_SUP_BIN --pidfile $WPA_SUP_PIDFILE \
  238. -- $WPA_SUP_OPTIONS $WPA_SUP_CONF
  239. if [ "$?" -ne 0 ]; then
  240. wpa_msg stderr "$WPA_SUP_BIN daemon failed to start"
  241. return 1
  242. fi
  243. if [ -n "$WPA_SUP_OMIT_PIDFILE" ]; then
  244. local WPA_PIDFILE_WAIT
  245. local MAX_WPA_PIDFILE_WAIT
  246. WPA_PIDFILE_WAIT="0"
  247. MAX_WPA_PIDFILE_WAIT="5"
  248. until [ -s "$WPA_SUP_PIDFILE" ]; do
  249. if [ "$WPA_PIDFILE_WAIT" -ge "$MAX_WPA_PIDFILE_WAIT" ]; then
  250. wpa_msg stderr "timed out waiting for creation of $WPA_SUP_PIDFILE"
  251. return 1
  252. else
  253. wpa_msg verbose "waiting for \"$WPA_SUP_PIDFILE\": " \
  254. "$WPA_PIDFILE_WAIT (max. $MAX_WPA_PIDFILE_WAIT)"
  255. fi
  256. WPA_PIDFILE_WAIT=$(($WPA_PIDFILE_WAIT + 1))
  257. sleep 1
  258. done
  259. wpa_msg verbose "creating sendsigs omission pidfile: $WPA_SUP_OMIT_PIDFILE"
  260. cat "$WPA_SUP_PIDFILE" > "$WPA_SUP_OMIT_PIDFILE"
  261. else
  262. wpa_msg verbose "sendsigs omission pidfile not created"
  263. fi
  264. local WPA_SOCKET_WAIT
  265. local MAX_WPA_SOCKET_WAIT
  266. WPA_SOCKET_WAIT="0"
  267. MAX_WPA_SOCKET_WAIT="5"
  268. until [ -S "$WPA_CTRL_DIR/$WPA_IFACE" ]; do
  269. if [ "$WPA_SOCKET_WAIT" -ge "$MAX_WPA_SOCKET_WAIT" ]; then
  270. wpa_msg stderr "ctrl_interface socket not found at $WPA_CTRL_DIR/$WPA_IFACE"
  271. return 1
  272. else
  273. wpa_msg verbose "waiting for \"$WPA_CTRL_DIR/$WPA_IFACE\": " \
  274. "$WPA_SOCKET_WAIT (max. $MAX_WPA_SOCKET_WAIT)"
  275. fi
  276. WPA_SOCKET_WAIT=$(($WPA_SOCKET_WAIT + 1))
  277. sleep 1
  278. done
  279. wpa_msg verbose "ctrl_interface socket located at $WPA_CTRL_DIR/$WPA_IFACE"
  280. }
  281. #####################################################################
  282. ## stop wpa_supplicant process
  283. # Kill wpa_supplicant via start-stop-daemon, given the location of
  284. # the pidfile or ctrl_interface socket path and interface name
  285. #
  286. kill_wpa_supplicant () {
  287. test_wpa_supplicant || return 0
  288. wpa_msg verbose "terminating $WPA_SUP_PNAME daemon via pidfile $WPA_SUP_PIDFILE"
  289. start-stop-daemon --stop --oknodo $DAEMON_VERBOSITY \
  290. --exec $WPA_SUP_BIN --pidfile $WPA_SUP_PIDFILE
  291. if [ -f "$WPA_SUP_PIDFILE" ]; then
  292. rm -f "$WPA_SUP_PIDFILE"
  293. fi
  294. if [ -f "$WPA_SUP_OMIT_PIDFILE" ]; then
  295. wpa_msg verbose "removing $WPA_SUP_OMIT_PIDFILE"
  296. rm -f "$WPA_SUP_OMIT_PIDFILE"
  297. fi
  298. }
  299. #####################################################################
  300. ## reload wpa_supplicant process
  301. # Sending a HUP signal causes wpa_supplicant to reparse its
  302. # configuration file
  303. #
  304. reload_wpa_supplicant () {
  305. if test_wpa_supplicant; then
  306. wpa_msg verbose "reloading wpa_supplicant configuration file via HUP signal"
  307. start-stop-daemon --stop --signal HUP \
  308. --name "$WPA_SUP_PNAME" --pidfile "$WPA_SUP_PIDFILE"
  309. else
  310. wpa_msg verbose "cannot $WPA_ACTION, $WPA_SUP_PIDFILE does not exist"
  311. fi
  312. }
  313. #####################################################################
  314. ## daemonize wpa_cli and action script
  315. # If environment variable WPA_ACTION_SCRIPT is present, wpa_cli will
  316. # be spawned via start-stop-daemon
  317. #
  318. # Required options:
  319. # -a action script => wpa_action
  320. # -P process ID file
  321. # -B background process
  322. #
  323. init_wpa_cli () {
  324. [ -n "$WPA_ACTION_SCRIPT" ] || return 0
  325. local WPA_CLI_OPTIONS
  326. WPA_CLI_OPTIONS="-B -P $WPA_CLI_PIDFILE -i $WPA_IFACE"
  327. wpa_msg verbose "$WPA_CLI_BIN $WPA_CLI_OPTIONS -p $WPA_CTRL_DIR -a $WPA_ACTION_SCRIPT"
  328. start-stop-daemon --start --oknodo $DAEMON_VERBOSITY \
  329. --name $WPA_CLI_PNAME --startas $WPA_CLI_BIN --pidfile $WPA_CLI_PIDFILE \
  330. -- $WPA_CLI_OPTIONS -p $WPA_CTRL_DIR -a $WPA_ACTION_SCRIPT
  331. if [ "$?" -ne 0 ]; then
  332. wpa_msg stderr "$WPA_CLI_BIN daemon failed to start"
  333. return 1
  334. fi
  335. if [ -n "$WPA_CLI_OMIT_PIDFILE" ]; then
  336. local WPA_PIDFILE_WAIT
  337. local MAX_WPA_PIDFILE_WAIT
  338. WPA_PIDFILE_WAIT="0"
  339. MAX_WPA_PIDFILE_WAIT="5"
  340. until [ -s "$WPA_CLI_PIDFILE" ]; do
  341. if [ "$WPA_PIDFILE_WAIT" -ge "$MAX_WPA_PIDFILE_WAIT" ]; then
  342. wpa_msg stderr "timed out waiting for creation of $WPA_CLI_PIDFILE"
  343. return 1
  344. else
  345. wpa_msg verbose "waiting for \"$WPA_CLI_PIDFILE\": " \
  346. "$WPA_PIDFILE_WAIT (max. $MAX_WPA_PIDFILE_WAIT)"
  347. fi
  348. WPA_PIDFILE_WAIT=$(($WPA_PIDFILE_WAIT + 1))
  349. sleep 1
  350. done
  351. wpa_msg verbose "creating sendsigs omission pidfile: $WPA_CLI_OMIT_PIDFILE"
  352. cat "$WPA_CLI_PIDFILE" > "$WPA_CLI_OMIT_PIDFILE"
  353. else
  354. wpa_msg verbose "sendsigs omission pidfile not created"
  355. fi
  356. }
  357. #####################################################################
  358. ## stop wpa_cli process
  359. # Kill wpa_cli via start-stop-daemon, given the location of the
  360. # pidfile
  361. #
  362. kill_wpa_cli () {
  363. test_wpa_cli || return 0
  364. wpa_msg verbose "terminating $WPA_CLI_PNAME daemon via pidfile $WPA_CLI_PIDFILE"
  365. start-stop-daemon --stop --oknodo $DAEMON_VERBOSITY \
  366. --exec $WPA_CLI_BIN --pidfile $WPA_CLI_PIDFILE
  367. if [ -f "$WPA_CLI_PIDFILE" ]; then
  368. rm -f "$WPA_CLI_PIDFILE"
  369. fi
  370. if [ -f "$WPA_CLI_OMIT_PIDFILE" ]; then
  371. rm -f "$WPA_CLI_OMIT_PIDFILE"
  372. fi
  373. if [ -f "$WPA_CLI_TIMESTAMP" ]; then
  374. rm -f "$WPA_CLI_TIMESTAMP"
  375. fi
  376. if [ -L "$WPA_CLI_IFUPDOWN" ]; then
  377. rm -f "$WPA_CLI_IFUPDOWN"
  378. fi
  379. }
  380. #####################################################################
  381. ## higher level wpa_cli wrapper for variable and set_network commands
  382. # wpa_cli_do <value> <type> <variable> [set_network variable] <desc>
  383. #
  384. # $1 envorinment variable
  385. # $2 data type of variable {raw|ascii}
  386. # $3 wpa_cli variable, if $3 is set_network, shift and take
  387. # set_network subvariable
  388. # $4 wpa-* string as it would appear in interfaces file, enhances
  389. # verbose messages
  390. #
  391. wpa_cli_do () {
  392. if [ -z "$1" ]; then
  393. return 0
  394. fi
  395. local WPACLISET_VALUE
  396. local WPACLISET_VARIABLE
  397. local WPACLISET_DESC
  398. case "$2" in
  399. ascii)
  400. # Double quote
  401. WPACLISET_VALUE="\"$1\""
  402. ;;
  403. raw|*)
  404. # Provide raw value
  405. WPACLISET_VALUE="$1"
  406. ;;
  407. esac
  408. case "$3" in
  409. set_network)
  410. if [ -z "$WPA_ID" ]; then
  411. return 1
  412. fi
  413. shift
  414. WPACLISET_VARIABLE="set_network $WPA_ID $3"
  415. ;;
  416. *)
  417. WPACLISET_VARIABLE="$3"
  418. ;;
  419. esac
  420. case "$4" in
  421. *-psk|*-passphrase|*-passwd*|*-wep-key*)
  422. WPACLISET_DESC="$4 *****"
  423. ;;
  424. *)
  425. WPACLISET_DESC="$4 $WPACLISET_VALUE"
  426. ;;
  427. esac
  428. wpa_msg action "$WPACLISET_DESC"
  429. wpa_cli $WPACLISET_VARIABLE "$WPACLISET_VALUE" >$TO_NULL
  430. if [ "$?" -ne 0 ]; then
  431. wpa_msg stderr "$WPACLISET_DESC failed!"
  432. fi
  433. }
  434. #####################################################################
  435. ## check value data type in plaintext or hex
  436. # returns 0 if input consists of hexadecimal digits only, 1 otherwise
  437. #
  438. ishex () {
  439. if [ -z "$1" ]; then
  440. return 0
  441. fi
  442. case "$1" in
  443. *[!0-9a-fA-F]*)
  444. # plaintext
  445. return 1
  446. ;;
  447. *)
  448. # hexadecimal
  449. return 0
  450. ;;
  451. esac
  452. }
  453. #####################################################################
  454. ## sanity check and set psk|passphrase
  455. # Warn about strange psk|passphrase values
  456. #
  457. # $1 psk or passphrase value
  458. #
  459. # If psk is surrounded by quotes strip them.
  460. #
  461. # If psk contains all hexadecimal characters and string length is 64:
  462. # is 256bit hexadecimal
  463. # else:
  464. # is plaintext
  465. #
  466. # plaintext passphrases must be 8 - 63 characters in length
  467. # 256-bit hexadecimal key must be 64 characters in length
  468. #
  469. wpa_key_check_and_set () {
  470. if [ "$#" -ne 3 ]; then
  471. return 0
  472. fi
  473. local KEY
  474. local KEY_LEN
  475. local KEY_TYPE
  476. local ENC_TYPE
  477. case "$1" in
  478. '"'*'"')
  479. # Strip surrounding quotation marks
  480. KEY=$(echo -n "$1" | sed 's/^"//;s/"$//')
  481. ;;
  482. *)
  483. KEY="$1"
  484. ;;
  485. esac
  486. KEY_LEN="${#KEY}"
  487. case "$2" in
  488. wep_key*)
  489. ENC_TYPE="WEP"
  490. ;;
  491. psk)
  492. ENC_TYPE="WPA"
  493. ;;
  494. *)
  495. return 0
  496. ;;
  497. esac
  498. if [ "$ENC_TYPE" = "WEP" ]; then
  499. if ishex "$KEY"; then
  500. case "$KEY_LEN" in
  501. 10|26|32|58)
  502. # 64/128/152/256-bit WEP
  503. KEY_TYPE="raw"
  504. ;;
  505. *)
  506. KEY_TYPE="ascii"
  507. ;;
  508. esac
  509. else
  510. KEY_TYPE="ascii"
  511. fi
  512. if [ "$KEY_TYPE" = "ascii" ]; then
  513. if [ "$KEY_LEN" -lt "5" ]; then
  514. wpa_msg stderr "WARNING: plaintext or ascii WEP key has $KEY_LEN characters,"
  515. wpa_msg stderr "it must have at least 5 to be valid."
  516. fi
  517. fi
  518. elif [ "$ENC_TYPE" = "WPA" ]; then
  519. if ishex "$KEY"; then
  520. case "$KEY_LEN" in
  521. 64)
  522. # 256-bit WPA
  523. KEY_TYPE="raw"
  524. ;;
  525. *)
  526. KEY_TYPE="ascii"
  527. ;;
  528. esac
  529. else
  530. KEY_TYPE="ascii"
  531. fi
  532. if [ "$KEY_TYPE" = "ascii" ]; then
  533. if [ "$KEY_LEN" -lt "8" ] || [ "$KEY_LEN" -gt "63" ]; then
  534. wpa_msg stderr "WARNING: plaintext or ascii WPA key has $KEY_LEN characters,"
  535. wpa_msg stderr "it must have between 8 and 63 to be valid."
  536. wpa_msg stderr "If the WPA key is a 256-bit hexadecimal key, it must have"
  537. wpa_msg stderr "exactly 64 characters."
  538. fi
  539. fi
  540. fi
  541. wpa_cli_do "$KEY" "$KEY_TYPE" set_network "$2" "$3"
  542. }
  543. #####################################################################
  544. ## formulate a usable configuration from interfaces(5) wpa- lines
  545. # A series of wpa_cli commands corresponding to environment variables
  546. # created as a result of wpa- lines in an interfaces stanza.
  547. #
  548. # NB: no-act when roaming daemon is used (to avoid prematurely
  549. # attaching to ctrl_interface socket)
  550. #
  551. conf_wpa_supplicant () {
  552. if [ -n "$WPA_ACTION_SCRIPT" ]; then
  553. return 0
  554. fi
  555. if [ "$IF_WPA_DRIVER" = "wired" ]; then
  556. IF_WPA_AP_SCAN="0"
  557. wpa_msg verbose "forcing ap_scan=0 (required for wired IEEE8021X auth)"
  558. fi
  559. if [ -n "$IF_WPA_ESSID" ]; then
  560. # #403316, be similar to wireless tools
  561. IF_WPA_SSID="$IF_WPA_ESSID"
  562. fi
  563. wpa_cli_do "$IF_WPA_AP_SCAN" raw \
  564. ap_scan wpa-ap-scan
  565. wpa_cli_do "$IF_WPA_PREAUTHENTICATE" raw \
  566. preauthenticate wpa-preauthenticate
  567. if [ -n "$IF_WPA_SSID" ] || [ "$IF_WPA_DRIVER" = "wired" ] || \
  568. [ -n "$IF_WPA_KEY_MGMT" ]; then
  569. case "$IF_WPA_SSID" in
  570. '"'*'"')
  571. IF_WPA_SSID=$(echo -n "$IF_WPA_SSID" | sed 's/^"//;s/"$//')
  572. ;;
  573. *)
  574. ;;
  575. esac
  576. WPA_ID=$(wpa_cli add_network)
  577. wpa_msg verbose "configuring network block -- $WPA_ID"
  578. wpa_cli_do "$IF_WPA_SSID" ascii \
  579. set_network ssid wpa-ssid
  580. wpa_cli_do "$IF_WPA_PRIORITY" raw \
  581. set_network priority wpa-priority
  582. wpa_cli_do "$IF_WPA_BSSID" raw \
  583. set_network bssid wpa-bssid
  584. if [ -s "$IF_WPA_PSK_FILE" ]; then
  585. IF_WPA_PSK=$(cat "$IF_WPA_PSK_FILE")
  586. fi
  587. # remain compat with wpa-passphrase-file
  588. if [ -s "$IF_WPA_PASSPHRASE_FILE" ]; then
  589. IF_WPA_PSK=$(cat "$IF_WPA_PASSPHRASE_FILE")
  590. fi
  591. # remain compat with wpa-passphrase
  592. if [ -n "$IF_WPA_PASSPHRASE" ]; then
  593. IF_WPA_PSK="$IF_WPA_PASSPHRASE"
  594. fi
  595. if [ -n "$IF_WPA_PSK" ]; then
  596. wpa_key_check_and_set "$IF_WPA_PSK" \
  597. psk wpa-psk
  598. fi
  599. wpa_cli_do "$IF_WPA_PAIRWISE" raw \
  600. set_network pairwise wpa-pairwise
  601. wpa_cli_do "$IF_WPA_GROUP" raw \
  602. set_network group wpa-group
  603. wpa_cli_do "$IF_WPA_MODE" raw \
  604. set_network mode wpa-mode
  605. wpa_cli_do "$IF_WPA_FREQUENCY" raw \
  606. set_network frequency wpa-frequency
  607. wpa_cli_do "$IF_WPA_KEY_MGMT" raw \
  608. set_network key_mgmt wpa-key-mgmt
  609. wpa_cli_do "$IF_WPA_PROTO" raw \
  610. set_network proto wpa-proto
  611. wpa_cli_do "$IF_WPA_AUTH_ALG" raw \
  612. set_network auth_alg wpa-auth-alg
  613. wpa_cli_do "$IF_WPA_SCAN_SSID" raw \
  614. set_network scan_ssid wpa-scan-ssid
  615. wpa_cli_do "$IF_WPA_IDENTITY" ascii \
  616. set_network identity wpa-identity
  617. wpa_cli_do "$IF_WPA_ANONYMOUS_IDENTITY" ascii \
  618. set_network anonymous_identity wpa-anonymous-identity
  619. wpa_cli_do "$IF_WPA_EAP" raw \
  620. set_network eap wpa-eap
  621. wpa_cli_do "$IF_WPA_EAPPSK" raw \
  622. set_network eappsk wpa-eappsk
  623. wpa_cli_do "$IF_WPA_NAI" ascii \
  624. set_network nai wpa-nai
  625. wpa_cli_do "$IF_WPA_PASSWORD" ascii \
  626. set_network password wpa-password
  627. wpa_cli_do "$IF_WPA_CA_CERT" ascii \
  628. set_network ca_cert wpa-ca-cert
  629. wpa_cli_do "$IF_WPA_CA_PATH" ascii \
  630. set_network ca_path wpa-ca-path
  631. wpa_cli_do "$IF_WPA_CLIENT_CERT" ascii \
  632. set_network client_cert wpa-client-cert
  633. wpa_cli_do "$IF_WPA_PRIVATE_KEY" ascii \
  634. set_network private_key wpa-private-key
  635. wpa_cli_do "$IF_WPA_PRIVATE_KEY_PASSWD" ascii \
  636. set_network private_key_passwd wpa-private-key-passwd
  637. wpa_cli_do "$IF_WPA_DH_FILE" ascii \
  638. set_network dh_file wpa-dh-file
  639. wpa_cli_do "$IF_WPA_SUBJECT_MATCH" ascii \
  640. set_network subject_match wpa-subject-match
  641. wpa_cli_do "$IF_WPA_ALTSUBJECT_MATCH" ascii \
  642. set_network altsubject_match wpa-altsubject-match
  643. wpa_cli_do "$IF_WPA_CA_CERT2" ascii \
  644. set_network ca_cert2 wpa-ca-cert2
  645. wpa_cli_do "$IF_WPA_CA_PATH2" ascii \
  646. set_network ca_path2 wpa-ca-path2
  647. wpa_cli_do "$IF_WPA_CLIENT_CERT2" ascii \
  648. set_network client_cert2 wpa-client-cert2
  649. wpa_cli_do "$IF_WPA_PRIVATE_KEY2" ascii \
  650. set_network private_key2 wpa-private-key2
  651. wpa_cli_do "$IF_WPA_PRIVATE_KEY_PASSWD2" ascii \
  652. set_network private_key_passwd2 wpa-private-key-passwd2
  653. wpa_cli_do "$IF_WPA_DH_FILE2" ascii \
  654. set_network dh_file2 wpa-dh-file2
  655. wpa_cli_do "$IF_WPA_SUBJECT_MATCH2" ascii \
  656. set_network subject_match2 wpa-subject-match2
  657. wpa_cli_do "$IF_WPA_ALTSUBJECT_MATCH2" ascii \
  658. set_network altsubject_match2 wpa-altsubject-match2
  659. wpa_cli_do "$IF_WPA_EAP_METHODS" raw \
  660. set_network eap_methods wpa-eap-methods
  661. wpa_cli_do "$IF_WPA_PHASE1" ascii \
  662. set_network phase1 wpa-phase1
  663. wpa_cli_do "$IF_WPA_PHASE2" ascii \
  664. set_network phase2 wpa-phase2
  665. wpa_cli_do "$IF_WPA_PCSC" raw \
  666. set_network pcsc wpa-pcsc
  667. wpa_cli_do "$IF_WPA_PIN" ascii \
  668. set_network pin wpa-pin
  669. wpa_cli_do "$IF_WPA_ENGINE" raw \
  670. set_network engine wpa-engine
  671. wpa_cli_do "$IF_WPA_ENGINE_ID" ascii \
  672. set_network engine_id wpa-engine-id
  673. wpa_cli_do "$IF_WPA_KEY_ID" ascii \
  674. set_network key_id wpa-key-id
  675. wpa_cli_do "$IF_WPA_EAPOL_FLAGS" raw \
  676. set_network eapol_flags wpa-eapol-flags
  677. if [ -n "$IF_WPA_WEP_KEY0" ]; then
  678. wpa_key_check_and_set "$IF_WPA_WEP_KEY0" \
  679. wep_key0 wpa-wep-key0
  680. fi
  681. if [ -n "$IF_WPA_WEP_KEY1" ]; then
  682. wpa_key_check_and_set "$IF_WPA_WEP_KEY1" \
  683. wep_key1 wpa-wep-key1
  684. fi
  685. if [ -n "$IF_WPA_WEP_KEY2" ]; then
  686. wpa_key_check_and_set "$IF_WPA_WEP_KEY2" \
  687. wep_key2 wpa-wep-key2
  688. fi
  689. if [ -n "$IF_WPA_WEP_KEY3" ]; then
  690. wpa_key_check_and_set "$IF_WPA_WEP_KEY3" \
  691. wep_key3 wpa-wep-key3
  692. fi
  693. wpa_cli_do "$IF_WPA_WEP_TX_KEYIDX" raw \
  694. set_network wep_tx_keyidx wpa-wep-tx-keyidx
  695. wpa_cli_do "$IF_WPA_PROACTIVE_KEY_CACHING" raw \
  696. set_network proactive_key_caching wpa-proactive-key-caching
  697. wpa_cli_do "$IF_WPA_PAC_FILE" ascii \
  698. set_network pac_file wpa-pac-file
  699. wpa_cli_do "$IF_WPA_MODE" raw \
  700. set_network mode wpa-mode
  701. wpa_cli_do "$IF_WPA_PEERKEY" raw \
  702. set_network peerkey wpa-peerkey
  703. wpa_cli_do "$IF_FRAGMENT_SIZE" raw \
  704. set_network fragment_size wpa-fragment-size
  705. wpa_cli_do "$IF_WPA_ID_STR" ascii \
  706. set_network id_str wpa-id-str
  707. wpa_cli_do "$WPA_ID" raw \
  708. enable_network "enabling network block"
  709. fi
  710. }
  711. #####################################################################
  712. ## wpa_action basic logging
  713. # Log actions to file
  714. #
  715. wpa_log_init () {
  716. if touch "$WPA_CLI_LOGFILE" 2>/dev/null; then
  717. exec >> "$WPA_CLI_LOGFILE" 2>&1
  718. fi
  719. }
  720. # log timestamp and wpa_action arguments
  721. wpa_log_action () {
  722. [ -w "$WPA_CLI_LOGFILE" ] || return 0
  723. local DATE
  724. DATE=$(date +"%H:%M:%S %Y-%m-%d")
  725. echo "########## $DATE ##########"
  726. echo "IFACE=$WPA_IFACE ACTION=$WPA_ACTION"
  727. }
  728. # log wpa_cli environment variables
  729. wpa_log_environment () {
  730. [ -w "$WPA_CLI_LOGFILE" ] || return 0
  731. echo "WPA_ID=$WPA_ID WPA_ID_STR=$WPA_ID_STR"
  732. echo "WPA_CTRL_DIR=$WPA_CTRL_DIR"
  733. }
  734. #####################################################################
  735. ## hysteresis checking
  736. # Networking tools such as dhcp clients used with ifupdown can
  737. # synthesize artificial ACTION events, particuarly just after a
  738. # DISCONNECTED/CONNECTED events are experienced in quick succession.
  739. # This can lead to infinite event loops, and in extreme cases has the
  740. # potential to cause system instability.
  741. #
  742. wpa_hysteresis_event () {
  743. local TIME
  744. TIME=$(date +%s)
  745. echo "$TIME" > "$WPA_CLI_TIMESTAMP"
  746. }
  747. wpa_hysteresis_check () {
  748. if [ -f "$WPA_CLI_TIMESTAMP" ]; then
  749. local TIME
  750. local TIMESTAMP
  751. local TIMEWAIT
  752. TIME=$(date +%s)
  753. # current time minus 4 second event buffer
  754. TIMEWAIT=$(($TIME-4))
  755. # get time of last event
  756. TIMESTAMP=$(cat $WPA_CLI_TIMESTAMP)
  757. # compare values, allowing new action to be processed
  758. # only if last action was more than 4 seconds ago
  759. if [ "$TIMEWAIT" -le "$TIMESTAMP" ]; then
  760. echo "Ignoring $WPA_ACTION event, too soon after previous event"
  761. return 1
  762. fi
  763. fi
  764. return 0
  765. }
  766. #####################################################################
  767. ## identify ifupdown files
  768. # Identify ifupdown core files, so that state of the interface can be
  769. # checked. This is the weakest part of the wpa_action roaming scheme,
  770. # it would be _much_ better if stateless ifupdown capabilities were
  771. # a reality.
  772. #
  773. ifupdown_check () {
  774. if [ -e /etc/network/interfaces ]; then
  775. INTERFACES_FILE="/etc/network/interfaces"
  776. else
  777. echo "Cannot locate ifupdown's \"interfaces\" file, $WPA_IFACE will not be configured"
  778. return 1
  779. fi
  780. if [ -e /etc/network/run/ifstate ]; then
  781. # debian's ifupdown
  782. IFSTATE_FILE="/etc/network/run/ifstate"
  783. elif [ -e /var/run/network/ifstate ]; then
  784. # ubuntu's
  785. IFSTATE_FILE="/var/run/network/ifstate"
  786. else
  787. echo "Cannot locate ifupdown's \"ifstate\" file, $WPA_IFACE will not be configured"
  788. return 1
  789. fi
  790. return 0
  791. }
  792. ifupdown_status () {
  793. if grep -s -q "^${WPA_IFACE}=${WPA_LOGICAL_IFACE}" "$IFSTATE_FILE"; then
  794. return 0
  795. fi
  796. echo "Interface \"$WPA_IFACE\" failed to establish a connection."
  797. echo "Attempting reassociation..."
  798. return 1
  799. }
  800. ifupdown_lock () {
  801. ln -s lock "$WPA_CLI_IFUPDOWN"
  802. }
  803. ifupdown_locked () {
  804. [ -L "$WPA_CLI_IFUPDOWN" ] && return 0
  805. return 1
  806. }
  807. ifupdown_unlock () {
  808. rm -f "$WPA_CLI_IFUPDOWN"
  809. }
  810. #####################################################################
  811. ## apply mapping logic and ifup logical interface
  812. # Apply mapping logic via id_str or external mapping script, check
  813. # state of IFACE with respect to ifupdown and ifup logical interaface
  814. #
  815. ifup () {
  816. local WPA_LOGICAL_IFACE
  817. if [ -z "$IF_WPA_MAPPING_SCRIPT_PRIORITY" ] && [ -n "$WPA_ID_STR" ]; then
  818. WPA_LOGICAL_IFACE="$WPA_ID_STR"
  819. echo "Mapping logical interface via id_str: $WPA_LOGICAL_IFACE"
  820. fi
  821. if [ -z "$WPA_LOGICAL_IFACE" ] && [ -n "$IF_WPA_MAPPING_SCRIPT" ]; then
  822. echo "Mapping logical interface via wpa-mapping-script: $IF_WPA_MAPPING_SCRIPT"
  823. local WPA_MAP_STDIN
  824. WPA_MAP_STDIN=$(set | sed -n 's/^\(IF_WPA_MAP[0-9]*\)=.*/echo \$\1/p')
  825. if [ -n "$WPA_MAP_STDIN" ]; then
  826. WPA_LOGICAL_IFACE=$(eval "$WPA_MAP_STDIN" | "$IF_WPA_MAPPING_SCRIPT" "$WPA_IFACE")
  827. else
  828. WPA_LOGICAL_IFACE=$("$IF_WPA_MAPPING_SCRIPT" "$WPA_IFACE")
  829. fi
  830. if [ -n "$WPA_LOGICAL_IFACE" ]; then
  831. echo "Mapping script result: $WPA_LOGICAL_IFACE"
  832. else
  833. echo "Mapping script failed."
  834. fi
  835. fi
  836. if [ -z "$WPA_LOGICAL_IFACE" ]; then
  837. if [ -n "$IF_WPA_ROAM_DEFAULT_IFACE" ]; then
  838. WPA_LOGICAL_IFACE="$IF_WPA_ROAM_DEFAULT_IFACE"
  839. echo "Using wpa-roam-default-iface: $WPA_LOGICAL_IFACE"
  840. else
  841. WPA_LOGICAL_IFACE="default"
  842. echo "Using fallback logical interface: $WPA_LOGICAL_IFACE"
  843. fi
  844. fi
  845. if [ -n "$WPA_LOGICAL_IFACE" ]; then
  846. if egrep -q "^iface[[:space:]]+${WPA_LOGICAL_IFACE}[[:space:]]+inet" "$INTERFACES_FILE"; then
  847. : # logical network is defined
  848. else
  849. echo "No network defined for \"$WPA_LOGICAL_IFACE\" in \"$INTERFACES_FILE\""
  850. echo "Trying to configure the \"default\" network instead ..."
  851. WPA_LOGICAL_IFACE="default"
  852. fi
  853. echo "ifup $WPA_IFACE=$WPA_LOGICAL_IFACE"
  854. ifupdown_lock
  855. if grep -q "^$WPA_IFACE=$WPA_IFACE" "$IFSTATE_FILE"; then
  856. # Force settings over the unconfigured "master" IFACE
  857. /sbin/ifup -v --force "$WPA_IFACE=$WPA_LOGICAL_IFACE"
  858. else
  859. /sbin/ifup -v "$WPA_IFACE=$WPA_LOGICAL_IFACE"
  860. fi
  861. ifupdown_unlock
  862. else
  863. echo "No suitable logical interface mapping for ifupdown to configure"
  864. fi
  865. }
  866. #####################################################################
  867. ## ifdown IFACE
  868. # Check IFACE state and ifdown as requested.
  869. #
  870. ifdown () {
  871. if grep -q "^$WPA_IFACE" "$IFSTATE_FILE"; then
  872. ifupdown_lock
  873. echo "ifdown $WPA_IFACE"
  874. /sbin/ifdown -v "$WPA_IFACE"
  875. ifupdown_unlock
  876. else
  877. echo "Ignoring request to take \"$WPA_IFACE\" down, it is not up"
  878. fi
  879. }
  880. #####################################################################
  881. ## keep IFACE scanning
  882. # After ifdown, the IFACE may be left "down", and inhibits
  883. # wpa_supplicant's ability to continue roaming.
  884. #
  885. # NB: use iproute if present, flushing the IFACE first
  886. #
  887. if_post_down_up () {
  888. if type ip >/dev/null; then
  889. ip addr flush dev "$WPA_IFACE" 2>/dev/null
  890. ip link set "$WPA_IFACE" up
  891. else
  892. ifconfig "$WPA_IFACE" up
  893. fi
  894. }