summaryrefslogtreecommitdiffhomepage
path: root/scripts
AgeCommit message (Collapse)Author
2019-04-15interface: add neighbor config supportmeurisa
The neighbor or neighbor6 network section makes neighbours configurable via UCI or proto shell handlers. It allows to install neighbor proxy entries or static neighbor entries The neighbor or neighbor6 section has the following types: interface : declares the logical OpenWrt interface ipaddr : the ip address of the neighbor mac : the mac address of the neighbor proxy : specifies whether the neighbor ia a proxy entry (can be 1 or 0) router : specifies whether the neighbor is a router (can be 1 or 0) Signed-off-by: Alexander Meuris <meurisalexander@gmail.com> Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2019-03-21netifd: wireless: Add support for 802.11adRobert Marko
This simple patch adds 802.11ad to hwmode list so that netifd-wireless.sh does not otherwise overwrite it with the default hwmode=g Signed-off-by: Robert Marko <robimarko@gmail.com>
2019-03-21netifd: wireless: Add support for GCMP cipherRobert Marko
This patch will add support for using GCMP as cipher suite. This is not a strong cipher but is only one supported by wil6210 driver in order to have encrypted traffic. Signed-off-by: Robert Marko <robimarko@gmail.com>
2018-10-12wireless: Add WPA-EAP-SUITE-B-192 (WPA3-Enterprise)Hauke Mehrtens
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2018-10-12wireless: Add Opportunistic Wireless Encryption (OWE)Hauke Mehrtens
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2018-10-12wireless: Add Simultaneous Authentication of Equals (SAE)Hauke Mehrtens
This adds PSK3 / SAE support. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2018-09-19scripts: fix previous commitJo-Philipp Wich
Actually change the glob pattern as described in the previous commit. Fixes: 3c8ac1c ("netifd: fix wpa mixed mode matching") Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2018-09-19netifd: fix wpa mixed mode matchingRick Farina (Zero_Chaos)
Change wpa mixed mode matching to not accidently catch wep+mixed. All documented cases have the character between {wpa,psk} and mixed as a '-' but no need to break things which were working, so preserve the * case. Reported-by: "Rick Farina (Zero_Chaos)" <zerochaos@gentoo.org> [Allow "psk-mixed" to be prefixed, to align with the *psk2* and *psk* cases, slightly reword subject and commit message.] Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2018-04-20wireless: include noscan option in common wdev varsDaniel Golle
'noscan' can be passed down to wpa_supplicant to enforce channel settings in mesh mode. Allow hostapd.sh to take care of it. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2018-02-05netifd-proto: add proto_config_add_array wrapperHans Dedecker
Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2017-02-11wireless: fix _wireless_add_processGünther Kelleter
The pid is in $1, not $pid. Use proper test condition for nonmatching exe warning. Signed-off-by: Günther Kelleter <guenther.kelleter@devolo.de>
2016-10-27proto-shell: add helpers for generic options in proto handlersMarcin Jurkowski
Adding helpers for virtual interfaces generic options in ncm, qmi, mbim and directip protocols as suggested by Felix in https://lists.openwrt.org/pipermail/openwrt-devel/2016-February/039794.html Signed-off-by: Marcin Jurkowski <marcin1j@gmail.com>
2016-08-11proto-shell: Support teardown on layer 3 link lossHans Dedecker
Commit c6858766 added interface teardown support on layer 3 device link loss mainly for shell protocols who have no proto task like xl2tp. However for shell protocols having a proto task it is not always the correct action to teardown the interface; as an example the PPP daemon can be put into persist state trying to re-establish the link via a hold-off mechanism if layer 3 link loss is detected. Therefore shell handlers can enable via TEARDOWN_ON_L3_LINK_DOWN a proto flag which will teardown the interface when layer 3 link loss is detected Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2016-01-19wireless: rename 'wpa_pairwise' variable to 'wpa_cipher'Daniel Golle
We shall enforce the cipher for both, pairwise and group, thus change the name of the variable to a more generic phrasing, 'cipher' instead of 'pairwise'. Signed-off-by: Daniel Golle <daniel@makrotopia.org> Signed-off-by: Felix Fietkau <nbd@openwrt.org> [keep a copy for compatibility reasons]
2015-09-27wireless: fix bogus isolate setting on unbridged configurationFelix Fietkau
This was caused by a faulty test for the isolate option (arithmetic on a variable with no default) Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2015-08-25bridge: Allow setting multicast_to_unicast optionLinus Lüssing
With this patch the multicast_to_unicast feature can be disabled for all wireless interfaces via an according option on the uci bridge interface. This patch also exports the setting information to wireless handler scripts. The hostapd script will need that information to determine whether to enable or disable ap-isolation, for instance. Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
2015-08-25bridge: Fix multicast_to_unicast feature by hairpin+isolateLinus Lüssing
All IGMP and MLD versions suffer from a specific limitation (from a snooping switch perspective): Report suppression. Once a listener hears an IGMPv2/3 or MLDv1 report for the same group itself participates in then it might (if this listener is an IGMPv3 or MLDv2 listener) or will (if this is an IGMPv1/2 or MLDv1 listener) refrain from sending its own report. Therefore we might currently miss such surpressing listeners as they won't receive the multicast packet with the mangled, unicasted destination. Fixing this by first isolating the STAs and giving the bridge more control over traffic forwarding. E.g. refraining to forward listener reports to other STAs. For broadcast and unicast traffic to an STA on the same AP, the hairpin feature of the bridge will reflect such traffic back to the AP interface. However, if the AP interface is actually configured to isolate STAs, then hairpin is kept disabled. Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
2015-05-23proto-shell: allow running protocols without proto_task.Yousong Zhou
Adds a new config parameter "no-proto-task" for noting that no proto_task will be running for this protocol type. This is required since then change in commit "d0dcf74 proto-shell: retry setup if the proto handler script quits without changing the state or starting a process". The change is mainly for protocols like xl2tpd in which control commands are sent to another daemon xl2tpd to start L2TP negotiation and pppd process who is not under netifd's control as proto_task as is the case in other ppp related protocols like pppoe, pptp, etc. Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2015-04-03netifd: Interface last error supportHans Dedecker
Adds interface last error support which preserves the last reported error reported by the protocol handler till the interface is up; e.g. survives network reload and interface restarts. This is mainly usefull for tracking down why an interface fails to establish; eg auth failure/traffic limit for PPP interfaces Protocol handlers register last error support by setting lasterror=1 in the proto_init function Signed-off-by: Johan Peeters <johan.peeters111@gmail.com> Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2015-03-31netifd: add metric argument for proto_add_ipv4_routeSteven Barth
Signed-off-by: Steven Barth <steven@midlink.org>
2015-03-21Fix regression with IPv6 source-dest-routesSteven Barth
2015-03-19add missing argument for ipv4 routesSteven Barth
Signed-off-by: Steven Barth <steven@midlink.org>
2015-03-19Add table argument to shell API for routesSteven Barth
Signed-off-by: Steven Barth <steven@midlink.org>
2014-12-08Enable callers to pass the source IP of an IPv4 route when usingKristian Evensen
proto_add_ipv4_route(). This is useful with for example DHCP in a multihomed scenario, as it provides an easy way to match default routes with the correct IP address. One use case for this are applications that monitor the state of the WAN port, and the WAN port is assigned multiple addresses. Signed-off-by: Kristian Evensen <kristian.evensen at gmail.com>
2014-07-18scripts: set type for the "key" attributeFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2014-03-21netifd: Reload proto on topology changeHelmut Schaa
Introduce a new device event "topology change" that gets signaled by bridges on adding/removing members. On "topology changes" the proto handlers are requested to "renew" which is most useful for DHCP. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
2013-12-02wireless: fix getting the network_bridge variableFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-12-02wireless: fix htmode handlingFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-12-02wireless: call an initial cleanup functionFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-12-01wireless: fix process handling if the pid exe is a symlinkFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-11-30wireless: add some device/vif error debug messagesFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-11-30wireless: fix channel checkFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-11-29add initial support for handling wireless devices via scriptsFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-11-29utils.sh: add N (newline)Felix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-11-27IPv6: add class support to regular IPv6 addressesSteven Barth
2013-10-31proto-shell: fix legacy proto_config_add_* functions, make them wrap around ↵Felix Fietkau
config_add_* Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-29scripts/utils.sh: add a function for setting a variable defaultFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-22scripts: make config_add_* parameters take multiple argumentsFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-19scripts: add config_add_array() to utilsFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-19scripts: remove the executable flag from netifd-proto.shFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-19scripts: move some utility functions out of netifd-proto.sh into utils.shFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-19scripts: reorganize directory layoutFelix Fietkau
move example scripts from dummy/ to examples/ keep scripts that can be used as-is in scripts/ Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2013-10-19scripts: delete ifup/ifdown, they are unusedFelix Fietkau
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2011-10-07add support for calls to a hotplug script on interface state changesFelix Fietkau
2011-03-27add an example script for ifup/ifdownFelix Fietkau