mirror of
https://github.com/coolsnowwolf/lede.git
synced 2025-04-16 04:13:31 +00:00
802 lines
34 KiB
Lua
802 lines
34 KiB
Lua
-- This module is a demo to configure MTK' proprietary WiFi driver.
|
|
-- Basic idea is to bypass uci and edit wireless profile (mt76xx.dat) directly.
|
|
-- LuCI's WiFi configuration is more logical and elegent, but it's quite tricky to
|
|
-- translate uci into MTK's WiFi profile (like we did in "uci2dat").
|
|
-- And you will get your hands dirty.
|
|
--
|
|
-- Hua Shao <nossiac@163.com>
|
|
|
|
module("luci.controller.mtkwifi", package.seeall)
|
|
local http = require("luci.http")
|
|
local mtkwifi = require("mtkwifi")
|
|
|
|
function __mtkwifi_reload(devname)
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
|
|
for dev,profile in pairs(profiles) do
|
|
if not devname or devname == dev then
|
|
local diff = mtkwifi.diff_profile(profile)
|
|
-- Adding or deleting a vif will need to reinstall the wifi ko,
|
|
-- so we call "mtkwifi restart" here.
|
|
if diff.BssidNum then
|
|
os.execute("/sbin/mtkwifi restart "..devname)
|
|
else
|
|
os.execute("/sbin/mtkwifi reload "..devname)
|
|
end
|
|
-- keep a backup for this commit
|
|
-- it will be used in mtkwifi.diff_profile()
|
|
os.execute("cp -f "..profile.." "..mtkwifi.__profile_bak_path(profile))
|
|
end
|
|
end
|
|
end
|
|
|
|
|
|
function index()
|
|
|
|
entry({"admin", "network", "wifi"}, template("admin_mtk/mtk_wifi_overview"), _("Wireless"), 25)
|
|
entry({"admin", "network", "wifi", "dev_cfg_view"}, template("admin_mtk/mtk_wifi_dev_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "dev_cfg"}, call("dev_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "dev_cfg_reset"}, call("dev_cfg_reset")).leaf = true
|
|
entry({"admin", "network", "wifi", "dev_cfg_raw"}, call("dev_cfg_raw")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_cfg_view"}, template("admin_mtk/mtk_wifi_vif_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_cfg"}, call("vif_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_add_view"}, template("admin_mtk/mtk_wifi_vif_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_add"}, call("vif_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_del"}, call("vif_del")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_disable"}, call("vif_disable")).leaf = true
|
|
entry({"admin", "network", "wifi", "vif_enable"}, call("vif_enable")).leaf = true
|
|
entry({"admin", "network", "wifi", "get_station_list"}, call("get_station_list"))
|
|
entry({"admin", "network", "wifi", "get_country_region_list"}, call("get_country_region_list")).leaf = true
|
|
entry({"admin", "network", "wifi", "get_channel_list"}, call("get_channel_list"))
|
|
entry({"admin", "network", "wifi", "get_HT_ext_channel_list"}, call("get_HT_ext_channel_list"))
|
|
entry({"admin", "network", "wifi", "get_5G_2nd_80Mhz_channel_list"}, call("get_5G_2nd_80Mhz_channel_list"))
|
|
entry({"admin", "network", "wifi", "reset"}, call("reset_wifi")).leaf = true
|
|
entry({"admin", "network", "wifi", "reload"}, call("reload_wifi")).leaf = true
|
|
entry({"admin", "network", "wifi", "get_raw_profile"}, call("get_raw_profile"))
|
|
entry({"admin", "network", "wifi", "apcli_cfg_view"}, template("admin_mtk/mtk_wifi_apcli")).leaf = true
|
|
entry({"admin", "network", "wifi", "apcli_cfg"}, call("apcli_cfg")).leaf = true
|
|
entry({"admin", "network", "wifi", "apcli_disconnect"}, call("apcli_disconnect")).leaf = true
|
|
entry({"admin", "network", "wifi", "apcli_connect"}, call("apcli_connect")).leaf = true
|
|
entry({"admin", "network", "wifi", "apcli_scan"}, call("apcli_scan")).leaf = true;
|
|
end
|
|
|
|
function dev_cfg(devname)
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
assert(profiles[devname])
|
|
local cfgs = mtkwifi.load_profile(profiles[devname])
|
|
|
|
for k,v in pairs(http.formvalue()) do
|
|
if type(v) ~= type("") and type(v) ~= type(0) then
|
|
nixio.syslog("err", "dev_cfg, invalid value type for "..k..","..type(v))
|
|
elseif string.byte(k) == string.byte("_") then
|
|
nixio.syslog("err", "dev_cfg, special: "..k.."="..v)
|
|
else
|
|
cfgs[k] = v or ""
|
|
end
|
|
end
|
|
|
|
if mtkwifi.band(cfgs.WirelessMode) == "5G" then
|
|
cfgs.CountryRegionABand = http.formvalue("__cr");
|
|
else
|
|
cfgs.CountryRegion = http.formvalue("__cr");
|
|
end
|
|
|
|
if cfgs.Channel == "0" then -- Auto Channel Select
|
|
cfgs.AutoChannelSelect = "3"
|
|
else
|
|
cfgs.AutoChannelSelect = "0"
|
|
end
|
|
|
|
if http.formvalue("__bw") == "20" then
|
|
cfgs.HT_BW = 0
|
|
cfgs.VHT_BW = 0
|
|
elseif http.formvalue("__bw") == "40" then
|
|
cfgs.HT_BW = 1
|
|
cfgs.VHT_BW = 0
|
|
cfgs.HT_BSSCoexistence = 0
|
|
elseif http.formvalue("__bw") == "60" then
|
|
cfgs.HT_BW = 1
|
|
cfgs.VHT_BW = 0
|
|
cfgs.HT_BSSCoexistence = 1
|
|
elseif http.formvalue("__bw") == "80" then
|
|
cfgs.HT_BW = 1
|
|
cfgs.VHT_BW = 1
|
|
elseif http.formvalue("__bw") == "160" then
|
|
cfgs.HT_BW = 1
|
|
cfgs.VHT_BW = 2
|
|
elseif http.formvalue("__bw") == "161" then
|
|
cfgs.HT_BW = 1
|
|
cfgs.VHT_BW = 3
|
|
cfgs.VHT_Sec80_Channel = http.formvalue("VHT_Sec80_Channel") or ""
|
|
end
|
|
|
|
local mimo = http.formvalue("__mimo")
|
|
if mimo == "0" then
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
elseif mimo == "1" then
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
elseif mimo == "2" then
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
elseif mimo == "3" then
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
elseif mimo == "4" then
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
else
|
|
cfgs.ETxBfEnCond=1
|
|
cfgs.MUTxRxEnable=0
|
|
cfgs.ITxBfEn=1
|
|
end
|
|
|
|
-- if cfgs.ApCliEnable == "1" then
|
|
-- cfgs.Channel = http.formvalue("__apcli_channel")
|
|
-- end
|
|
|
|
-- VOW
|
|
-- ATC should actually be scattered into each SSID, but I'm just lazy.
|
|
if cfgs.VOW_Airtime_Fairness_En then
|
|
for i = 1,tonumber(cfgs.BssidNum) do
|
|
__atc_tp = http.formvalue("__atc_vif"..i.."_tp") or "0"
|
|
__atc_min_tp = http.formvalue("__atc_vif"..i.."_min_tp") or "0"
|
|
__atc_max_tp = http.formvalue("__atc_vif"..i.."_max_tp") or "0"
|
|
__atc_at = http.formvalue("__atc_vif"..i.."_at") or "0"
|
|
__atc_min_at = http.formvalue("__atc_vif"..i.."_min_at") or "0"
|
|
__atc_max_at = http.formvalue("__atc_vif"..i.."_max_at") or "0"
|
|
|
|
nixio.syslog("info", "ATC.__atc_tp ="..i..__atc_tp );
|
|
nixio.syslog("info", "ATC.__atc_min_tp ="..i..__atc_min_tp );
|
|
nixio.syslog("info", "ATC.__atc_max_tp ="..i..__atc_max_tp );
|
|
nixio.syslog("info", "ATC.__atc_at ="..i..__atc_at );
|
|
nixio.syslog("info", "ATC.__atc_min_at ="..i..__atc_min_at );
|
|
nixio.syslog("info", "ATC.__atc_max_at ="..i..__atc_max_at );
|
|
|
|
cfgs.VOW_Rate_Ctrl_En = mtkwifi.token_set(cfgs.VOW_Rate_Ctrl_En, i, __atc_tp)
|
|
cfgs.VOW_Group_Min_Rate = mtkwifi.token_set(cfgs.VOW_Group_Min_Rate, i, __atc_min_tp)
|
|
cfgs.VOW_Group_Max_Rate = mtkwifi.token_set(cfgs.VOW_Group_Max_Rate, i, __atc_max_tp)
|
|
|
|
cfgs.VOW_Airtime_Ctrl_En = mtkwifi.token_set(cfgs.VOW_Airtime_Ctrl_En, i, __atc_at)
|
|
cfgs.VOW_Group_Min_Ratio = mtkwifi.token_set(cfgs.VOW_Group_Min_Ratio, i, __atc_min_at)
|
|
cfgs.VOW_Group_Max_Ratio = mtkwifi.token_set(cfgs.VOW_Group_Max_Ratio, i, __atc_max_at)
|
|
end
|
|
|
|
cfgs.VOW_RX_En = http.formvalue("VOW_RX_En") or "0"
|
|
end
|
|
|
|
-- http.write_json(http.formvalue())
|
|
mtkwifi.save_profile(cfgs, profiles[devname])
|
|
|
|
if http.formvalue("__apply") then
|
|
__mtkwifi_reload(devname)
|
|
end
|
|
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi", "dev_cfg_view",devname))
|
|
end
|
|
|
|
function dev_cfg_raw(devname)
|
|
-- http.write_json(http.formvalue())
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
assert(profiles[devname])
|
|
|
|
local raw = http.formvalue("raw")
|
|
raw = string.gsub(raw, "\r\n", "\n")
|
|
local cfgs = mtkwifi.load_profile(nil, raw)
|
|
mtkwifi.save_profile(cfgs, profiles[devname])
|
|
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi", "dev_cfg_view", devname))
|
|
end
|
|
|
|
function dev_cfg_reset(devname)
|
|
-- http.write_json(http.formvalue())
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
assert(profiles[devname])
|
|
|
|
local fd = io.open("/rom"..profiles[devname], "r")
|
|
if fd then
|
|
fd:close() -- just to test if file exists.
|
|
os.execute("cp -f /rom"..profiles[devname].." "..profiles[devname])
|
|
else
|
|
mtkwifi.debug("unable to find /rom"..profiles[devname])
|
|
end
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi", "dev_cfg_view", devname))
|
|
end
|
|
|
|
function vif_del(dev, vif)
|
|
mtkwifi.debug("vif_del("..dev..vif..")")
|
|
local devname,vifname = dev, vif
|
|
mtkwifi.debug("devname="..devname)
|
|
mtkwifi.debug("vifname="..vifname)
|
|
local devs = mtkwifi.get_all_devs()
|
|
local idx = devs[devname]["vifs"][vifname].vifidx -- or tonumber(string.match(vifname, "%d+")) + 1
|
|
mtkwifi.debug("idx="..idx, devname, vifname)
|
|
local profile = devs[devname].profile
|
|
assert(profile)
|
|
if idx and tonumber(idx) >= 0 then
|
|
local cfgs = mtkwifi.load_profile(profile)
|
|
if cfgs then
|
|
mtkwifi.debug("ssid"..idx.."="..cfgs["SSID"..idx].."<br>")
|
|
cfgs["SSID"..idx] = ""
|
|
mtkwifi.debug("ssid"..idx.."="..cfgs["SSID"..idx].."<br>")
|
|
mtkwifi.debug("wpapsk"..idx.."="..cfgs["WPAPSK"..idx].."<br>")
|
|
cfgs["WPAPSK"..idx] = ""
|
|
local ssidlist = {}
|
|
local j = 1
|
|
for i = 1,16 do
|
|
if cfgs["SSID"..i] ~= "" then
|
|
ssidlist[j] = cfgs["SSID"..i]
|
|
j = j + 1
|
|
end
|
|
end
|
|
for i,v in ipairs(ssidlist) do
|
|
mtkwifi.debug("ssidlist"..i.."="..v)
|
|
end
|
|
mtkwifi.debug("cfgs.BssidNum="..cfgs.BssidNum.." #ssidlist="..#ssidlist)
|
|
assert(tonumber(cfgs.BssidNum) == #ssidlist + 1, "Please delete vif from larger idx.")
|
|
cfgs.BssidNum = #ssidlist
|
|
for i = 1,16 do
|
|
if i <= cfgs.BssidNum then
|
|
cfgs["SSID"..i] = ssidlist[i]
|
|
elseif cfgs["SSID"..i] then
|
|
cfgs["SSID"..i] = ""
|
|
end
|
|
end
|
|
|
|
mtkwifi.save_profile(cfgs, profile)
|
|
else
|
|
mtkwifi.debug(profile.." cannot be found!")
|
|
end
|
|
end
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
function vif_disable(iface)
|
|
os.execute("ifconfig "..iface.." down")
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
function vif_enable(iface)
|
|
os.execute("ifconfig "..iface.." up")
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
|
|
--[[
|
|
-- security config in mtk wifi is quite complicated!
|
|
-- cfgs listed below are attached with vif and combined like "0;0;0;0". They need specicial treatment.
|
|
TxRate, WmmCapable, NoForwarding,
|
|
HideSSID, IEEE8021X, PreAuth,
|
|
AuthMode, EncrypType, RekeyMethod,
|
|
RekeyInterval, PMKCachePeriod,
|
|
DefaultKeyId, Key{n}Type, HT_EXTCHA,
|
|
RADIUS_Server, RADIUS_Port,
|
|
]]
|
|
|
|
local function conf_wep_keys(cfgs,vifidx)
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vifidx, http.formvalue("__DefaultKeyID") or 1)
|
|
cfgs["Key1Str"..vifidx] = http.formvalue("Key1Str"..vifidx)
|
|
cfgs["Key2Str"..vifidx] = http.formvalue("Key2Str"..vifidx)
|
|
cfgs["Key3Str"..vifidx] = http.formvalue("Key3Str"..vifidx)
|
|
cfgs["Key4Str"..vifidx] = http.formvalue("Key4Str"..vifidx)
|
|
|
|
cfgs["Key1Type"]=mtkwifi.token_set(cfgs["Key1Type"],vifidx, http.formvalue("WEP1Type"..vifidx))
|
|
cfgs["Key2Type"]=mtkwifi.token_set(cfgs["Key2Type"],vifidx, http.formvalue("WEP2Type"..vifidx))
|
|
cfgs["Key3Type"]=mtkwifi.token_set(cfgs["Key3Type"],vifidx, http.formvalue("WEP3Type"..vifidx))
|
|
cfgs["Key4Type"]=mtkwifi.token_set(cfgs["Key4Type"],vifidx, http.formvalue("WEP4Type"..vifidx))
|
|
|
|
return cfgs
|
|
end
|
|
|
|
local function __security_cfg(cfgs, vif_idx)
|
|
mtkwifi.debug("__security_cfg, before, HideSSID="..tostring(cfgs.HideSSID))
|
|
mtkwifi.debug("__security_cfg, before, NoForwarding="..tostring(cfgs.NoForwarding))
|
|
mtkwifi.debug("__security_cfg, before, WmmCapable="..tostring(cfgs.WmmCapable))
|
|
mtkwifi.debug("__security_cfg, before, TxRate="..tostring(cfgs.TxRate))
|
|
mtkwifi.debug("__security_cfg, before, RekeyInterval="..tostring(cfgs.RekeyInterval))
|
|
mtkwifi.debug("__security_cfg, before, AuthMode="..tostring(cfgs.AuthMode))
|
|
mtkwifi.debug("__security_cfg, before, EncrypType="..tostring(cfgs.EncrypType))
|
|
mtkwifi.debug("__security_cfg, before, WscModeOption="..tostring(cfgs.WscModeOption))
|
|
mtkwifi.debug("__security_cfg, before, RekeyMethod="..tostring(cfgs.RekeyMethod))
|
|
mtkwifi.debug("__security_cfg, before, IEEE8021X="..tostring(cfgs.IEEE8021X))
|
|
mtkwifi.debug("__security_cfg, before, DefaultKeyID="..tostring(cfgs.DefaultKeyID))
|
|
mtkwifi.debug("__security_cfg, before, PMFMFPC="..tostring(cfgs.PMFMFPC))
|
|
mtkwifi.debug("__security_cfg, before, PMFMFPR="..tostring(cfgs.PMFMFPR))
|
|
mtkwifi.debug("__security_cfg, before, PMFSHA256="..tostring(cfgs.PMFSHA256))
|
|
mtkwifi.debug("__security_cfg, before, RADIUS_Server="..tostring(cfgs.RADIUS_Server))
|
|
mtkwifi.debug("__security_cfg, before, RADIUS_Port="..tostring(cfgs.RADIUS_Port))
|
|
mtkwifi.debug("__security_cfg, before, session_timeout_interval="..tostring(cfgs.session_timeout_interval))
|
|
mtkwifi.debug("__security_cfg, before, PMKCachePeriod="..tostring(cfgs.PMKCachePeriod))
|
|
mtkwifi.debug("__security_cfg, before, PreAuth="..tostring(cfgs.PreAuth))
|
|
mtkwifi.debug("__security_cfg, before, Wapiifname="..tostring(cfgs.Wapiifname))
|
|
|
|
cfgs.HideSSID = mtkwifi.token_set(cfgs.HideSSID, vif_idx, http.formvalue("__hidessid") or "0")
|
|
cfgs.NoForwarding = mtkwifi.token_set(cfgs.NoForwarding, vif_idx, http.formvalue("__noforwarding") or "0")
|
|
cfgs.WmmCapable = mtkwifi.token_set(cfgs.WmmCapable, vif_idx, http.formvalue("__wmmcapable") or "0")
|
|
cfgs.TxRate = mtkwifi.token_set(cfgs.TxRate, vif_idx, http.formvalue("__txrate") or "0");
|
|
cfgs.RekeyInterval = mtkwifi.token_set(cfgs.RekeyInterval, vif_idx, http.formvalue("__rekeyinterval") or "0");
|
|
|
|
local __authmode = http.formvalue("__authmode") or "Disable"
|
|
cfgs.AuthMode = mtkwifi.token_set(cfgs.AuthMode, vif_idx, __authmode)
|
|
|
|
--[[ need to handle disable case as it conflicts with OPENWEP
|
|
case = disable; authmode = OPEN, encryption = NONE
|
|
case = open/OPENWEP; authmode = OPEN, encryption = WEP
|
|
]]
|
|
if __authmode == "Disable" then
|
|
cfgs.AuthMode = mtkwifi.token_set(cfgs.AuthMode, vif_idx, "OPEN")
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "NONE")
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "DISABLE")
|
|
elseif __authmode == "OPEN" or __authmode == "SHARED" or __authmode == "WEPAUTO" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.Key{n}Str, ...
|
|
cfgs.Key{n}Type, ...
|
|
cfgs.DefaultKeyID
|
|
]]
|
|
cfgs.WscModeOption = "0"
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "WEP")
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "DISABLE")
|
|
cfgs = conf_wep_keys(cfgs,vif_idx)
|
|
cfgs.WscConfMode = mtkwifi.token_set(cfgs.WscConfMode, vif_idx, 0)
|
|
elseif __authmode == "WPAPSK" or __authmode == "WPAPSKWPA2PSK" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.WPAPSK{n}, ...
|
|
cfgs.RekeyInterval
|
|
]]
|
|
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "TIME")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "0")
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vif_idx, "2")
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, http.formvalue("__wpa_encrypttype") or "NONE")
|
|
--cfgs["WPAPSK"..vif_idx] = http.formvalue("WPAPSK"..vif_idx)
|
|
elseif __authmode == "WPA2PSK" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.WPAPSK{n}, ...
|
|
cfgs.RekeyInterval
|
|
]]
|
|
-- for DOT11W_PMF_SUPPORT
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, http.formvalue("__wpa_encrypttype") or "0")
|
|
if cfgs.PMFMFPC then
|
|
cfgs.PMFMFPC = mtkwifi.token_set(cfgs.PMFMFPC, vif_idx, http.formvalue("__pmfmfpc") or "0")
|
|
end
|
|
if cfgs.PMFMFPR then
|
|
cfgs.PMFMFPR = mtkwifi.token_set(cfgs.PMFMFPR, vif_idx, http.formvalue("__pmfmfpr") or "0")
|
|
end
|
|
if cfgs.PMFSHA256 then
|
|
cfgs.PMFSHA256 = mtkwifi.token_set(cfgs.PMFSHA256, vif_idx, http.formvalue("__pmfsha256") or "0")
|
|
end
|
|
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "TIME")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "0")
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vif_idx, "2")
|
|
elseif __authmode == "WPA" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.WPAPSK{n}, ...
|
|
cfgs.RekeyInterval
|
|
cfgs.RADIUS_Key
|
|
]]
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, http.formvalue("__wpa_encrypttype") or "0")
|
|
cfgs.RADIUS_Server = mtkwifi.token_set(cfgs.RADIUS_Server, vif_idx, http.formvalue("__radius_server") or "0")
|
|
cfgs.RADIUS_Port = mtkwifi.token_set(cfgs.RADIUS_Port, vif_idx, http.formvalue("__radius_port") or "0")
|
|
cfgs.session_timeout_interval = mtkwifi.token_set(cfgs.session_timeout_interval, vif_idx, http.formvalue("__session_timeout_interval") or "0")
|
|
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "TIME")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "0")
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vif_idx, "2")
|
|
elseif __authmode == "WPA2" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.WPAPSK{n}, ...
|
|
cfgs.RekeyInterval
|
|
cfgs.RADIUS_Key
|
|
]]
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, http.formvalue("__wpa_encrypttype") or "0")
|
|
cfgs.RADIUS_Server = mtkwifi.token_set(cfgs.RADIUS_Server, vif_idx, http.formvalue("__radius_server") or "0")
|
|
cfgs.RADIUS_Port = mtkwifi.token_set(cfgs.RADIUS_Port, vif_idx, http.formvalue("__radius_port") or "0")
|
|
cfgs.session_timeout_interval = mtkwifi.token_set(cfgs.session_timeout_interval, vif_idx, http.formvalue("__session_timeout_interval") or "0")
|
|
cfgs.PMKCachePeriod = mtkwifi.token_set(cfgs.PMKCachePeriod, vif_idx, http.formvalue("__pmkcacheperiod") or "0")
|
|
cfgs.PreAuth = mtkwifi.token_set(cfgs.PreAuth, vif_idx, http.formvalue("__preauth") or "0")
|
|
-- for DOT11W_PMF_SUPPORT
|
|
if cfgs.PMFMFPC then
|
|
cfgs.PMFMFPC = mtkwifi.token_set(cfgs.PMFMFPC, vif_idx, http.formvalue("__pmfmfpc") or "0")
|
|
end
|
|
if cfgs.PMFMFPR then
|
|
cfgs.PMFMFPR = mtkwifi.token_set(cfgs.PMFMFPR, vif_idx, http.formvalue("__pmfmfpr") or "0")
|
|
end
|
|
if cfgs.PMFSHA256 then
|
|
cfgs.PMFSHA256 = mtkwifi.token_set(cfgs.PMFSHA256, vif_idx, http.formvalue("__pmfsha256") or "0")
|
|
end
|
|
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "TIME")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "0")
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vif_idx, "2")
|
|
elseif __authmode == "WPA1WPA2" then
|
|
--[[ the following required cfgs are already set in loop above
|
|
cfgs.WPAPSK{n}, ...
|
|
cfgs.RekeyInterval
|
|
cfgs.RADIUS_Key
|
|
]]
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, http.formvalue("__wpa_encrypttype") or "0")
|
|
cfgs.RADIUS_Server = mtkwifi.token_set(cfgs.RADIUS_Server, vif_idx, http.formvalue("__radius_server") or "0")
|
|
cfgs.RADIUS_Port = mtkwifi.token_set(cfgs.RADIUS_Port, vif_idx, http.formvalue("__radius_port") or "1812")
|
|
cfgs.session_timeout_interval = mtkwifi.token_set(cfgs.session_timeout_interval, vif_idx, http.formvalue("__session_timeout_interval") or "0")
|
|
cfgs.PMKCachePeriod = mtkwifi.token_set(cfgs.PMKCachePeriod, vif_idx, http.formvalue("__pmkcacheperiod") or "0")
|
|
cfgs.PreAuth = mtkwifi.token_set(cfgs.PreAuth, vif_idx, http.formvalue("__preauth") or "0")
|
|
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "TIME")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "0")
|
|
cfgs.DefaultKeyID = mtkwifi.token_set(cfgs.DefaultKeyID, vif_idx, "2")
|
|
elseif __authmode == "IEEE8021X" then
|
|
cfgs.RekeyMethod = mtkwifi.token_set(cfgs.RekeyMethod, vif_idx, "DISABLE")
|
|
cfgs.AuthMode = mtkwifi.token_set(cfgs.AuthMode, vif_idx, "OPEN")
|
|
cfgs.IEEE8021X = mtkwifi.token_set(cfgs.IEEE8021X, vif_idx, "1")
|
|
cfgs.RADIUS_Server = mtkwifi.token_set(cfgs.RADIUS_Server, vif_idx, http.formvalue("__radius_server") or "0")
|
|
cfgs.RADIUS_Port = mtkwifi.token_set(cfgs.RADIUS_Port, vif_idx, http.formvalue("__radius_port") or "0")
|
|
cfgs.session_timeout_interval = mtkwifi.token_set(cfgs.session_timeout_interval, vif_idx, http.formvalue("__session_timeout_interval") or "0")
|
|
if http.formvalue("__8021x_wep") then
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "WEP")
|
|
else
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "NONE")
|
|
end
|
|
elseif __authmode == "WAICERT" then
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "SMS4")
|
|
cfgs.Wapiifname = mtkwifi.token_set(cfgs.Wapiifname, vif_idx, "br-lan")
|
|
-- cfgs.wapicert_asipaddr
|
|
-- cfgs.WapiAsPort
|
|
-- cfgs.wapicert_ascert
|
|
-- cfgs.wapicert_usercert
|
|
elseif __authmode == "WAIPSK" then
|
|
cfgs.EncrypType = mtkwifi.token_set(cfgs.EncrypType, vif_idx, "SMS4")
|
|
-- cfgs.wapipsk_keytype
|
|
-- cfgs.wapipsk_prekey
|
|
end
|
|
|
|
mtkwifi.debug("__security_cfg, after, HideSSID="..tostring(cfgs.HideSSID))
|
|
mtkwifi.debug("__security_cfg, after, NoForwarding="..tostring(cfgs.NoForwarding))
|
|
mtkwifi.debug("__security_cfg, after, WmmCapable="..tostring(cfgs.WmmCapable))
|
|
mtkwifi.debug("__security_cfg, after, TxRate="..tostring(cfgs.TxRate))
|
|
mtkwifi.debug("__security_cfg, after, RekeyInterval="..tostring(cfgs.RekeyInterval))
|
|
mtkwifi.debug("__security_cfg, after, AuthMode="..tostring(cfgs.AuthMode))
|
|
mtkwifi.debug("__security_cfg, after, EncrypType="..tostring(cfgs.EncrypType))
|
|
mtkwifi.debug("__security_cfg, after, WscModeOption="..tostring(cfgs.WscModeOption))
|
|
mtkwifi.debug("__security_cfg, after, RekeyMethod="..tostring(cfgs.RekeyMethod))
|
|
mtkwifi.debug("__security_cfg, after, IEEE8021X="..tostring(cfgs.IEEE8021X))
|
|
mtkwifi.debug("__security_cfg, after, DefaultKeyID="..tostring(cfgs.DefaultKeyID))
|
|
mtkwifi.debug("__security_cfg, after, PMFMFPC="..tostring(cfgs.PMFMFPC))
|
|
mtkwifi.debug("__security_cfg, after, PMFMFPR="..tostring(cfgs.PMFMFPR))
|
|
mtkwifi.debug("__security_cfg, after, PMFSHA256="..tostring(cfgs.PMFSHA256))
|
|
mtkwifi.debug("__security_cfg, after, RADIUS_Server="..tostring(cfgs.RADIUS_Server))
|
|
mtkwifi.debug("__security_cfg, after, RADIUS_Port="..tostring(cfgs.RADIUS_Port))
|
|
mtkwifi.debug("__security_cfg, after, session_timeout_interval="..tostring(cfgs.session_timeout_interval))
|
|
mtkwifi.debug("__security_cfg, after, PMKCachePeriod="..tostring(cfgs.PMKCachePeriod))
|
|
mtkwifi.debug("__security_cfg, after, PreAuth="..tostring(cfgs.PreAuth))
|
|
mtkwifi.debug("__security_cfg, after, Wapiifname="..tostring(cfgs.Wapiifname))
|
|
end
|
|
|
|
function initialize_multiBssParameters(cfgs,vif_idx)
|
|
cfgs["WPAPSK"..vif_idx]="12345678"
|
|
cfgs["Key1Type"]=mtkwifi.token_set(cfgs["Key1Type"],vif_idx,"0")
|
|
cfgs["Key2Type"]=mtkwifi.token_set(cfgs["Key2Type"],vif_idx,"0")
|
|
cfgs["Key3Type"]=mtkwifi.token_set(cfgs["Key3Type"],vif_idx,"0")
|
|
cfgs["Key4Type"]=mtkwifi.token_set(cfgs["Key4Type"],vif_idx,"0")
|
|
cfgs["RADIUS_Server"]=mtkwifi.token_set(cfgs["RADIUS_Server"],vif_idx,"0")
|
|
cfgs["RADIUS_Key"..vif_idx]="ralink"
|
|
cfgs["DefaultKeyID"]=mtkwifi.token_set(cfgs["DefaultKeyID"],vif_idx,"1")
|
|
cfgs["IEEE8021X"]=mtkwifi.token_set(cfgs["IEEE8021X"],vif_idx,"0")
|
|
cfgs["WscConfMode"]=mtkwifi.token_set(cfgs["WscConfMode"],vif_idx,"0")
|
|
cfgs["PreAuth"]=mtkwifi.token_set(cfgs["PreAuth"],vif_idx,"0")
|
|
return cfgs
|
|
end
|
|
|
|
function vif_cfg(dev, vif)
|
|
local devname, vifname = dev, vif
|
|
if not devname then devname = vif end
|
|
mtkwifi.debug("devname="..devname)
|
|
mtkwifi.debug("vifname="..(vifname or ""))
|
|
local devs = mtkwifi.get_all_devs()
|
|
local profile = devs[devname].profile
|
|
assert(profile)
|
|
|
|
local cfgs = mtkwifi.load_profile(profile)
|
|
|
|
for k,v in pairs(http.formvalue()) do
|
|
if type(v) == type("") or type(v) == type(0) then
|
|
nixio.syslog("debug", "post."..k.."="..tostring(v))
|
|
else
|
|
nixio.syslog("debug", "post."..k.." invalid, type="..type(v))
|
|
end
|
|
end
|
|
|
|
-- sometimes vif_idx start from 0, like AccessPolicy0
|
|
-- sometimes it starts from 1, like WPAPSK1. nice!
|
|
local vif_idx
|
|
local to_url
|
|
if http.formvalue("__action") == "vif_cfg_view" then
|
|
vif_idx = devs[devname]["vifs"][vifname].vifidx
|
|
mtkwifi.debug("vif_idx=", vif_idx, devname, vifname)
|
|
to_url = luci.dispatcher.build_url("admin", "network", "wifi", "vif_cfg_view", devname, vifname)
|
|
elseif http.formvalue("__action") == "vif_add_view" then
|
|
cfgs.BssidNum = tonumber(cfgs.BssidNum) + 1
|
|
vif_idx = tonumber(cfgs.BssidNum)
|
|
to_url = luci.dispatcher.build_url("admin", "network", "wifi")
|
|
-- initializing ; separated parameters for the new interface
|
|
cfgs = initialize_multiBssParameters(cfgs, vif_idx)
|
|
|
|
end
|
|
|
|
-- "__" should not be in the name if user wants to copy formvalue data directly in the dat file variable
|
|
for k,v in pairs(http.formvalue()) do
|
|
if type(v) ~= type("") and type(v) ~= type(0) then
|
|
nixio.syslog("err", "vif_cfg, invalid value type for "..k..","..type(v))
|
|
elseif string.byte(k) ~= string.byte("_") then
|
|
mtkwifi.debug("copying values for "..k)
|
|
cfgs[k] = v or ""
|
|
end
|
|
end
|
|
|
|
cfgs["AccessPolicy"..vif_idx-1] = http.formvalue("__accesspolicy")
|
|
local t = mtkwifi.parse_mac(http.formvalue("__maclist"))
|
|
cfgs["AccessControlList"..vif_idx-1] = table.concat(t, ";")
|
|
|
|
__security_cfg(cfgs, vif_idx)
|
|
|
|
mtkwifi.debug(devname, profile)
|
|
mtkwifi.save_profile(cfgs, profile)
|
|
if http.formvalue("__apply") then
|
|
__mtkwifi_reload(devname)
|
|
end
|
|
return luci.http.redirect(to_url)
|
|
end
|
|
|
|
function apcli_scan(ifname)
|
|
local aplist = mtkwifi.scan_ap(ifname)
|
|
http.write_json(aplist)
|
|
end
|
|
|
|
function get_station_list()
|
|
http.write("get_station_list")
|
|
end
|
|
|
|
function reset_wifi(devname)
|
|
if devname then
|
|
os.execute("cp -f /rom/etc/wireless/"..devname.."/ /etc/wireless/")
|
|
else
|
|
os.execute("cp -rf /rom/etc/wireless /etc/")
|
|
end
|
|
os.execute("rm -rf /tmp/mtk/wifi")
|
|
__mtkwifi_reload(devname)
|
|
return luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
function reload_wifi(devname)
|
|
__mtkwifi_reload(devname)
|
|
return luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
function get_raw_profile()
|
|
local sid = http.formvalue("sid")
|
|
http.write_json("get_raw_profile")
|
|
end
|
|
|
|
function get_country_region_list()
|
|
local mode = http.formvalue("mode")
|
|
local cr_list;
|
|
|
|
if mtkwifi.band(mode) == "5G" then
|
|
cr_list = mtkwifi.CountryRegionList_5G_All
|
|
else
|
|
cr_list = mtkwifi.CountryRegionList_2G_All
|
|
end
|
|
|
|
http.write_json(cr_list)
|
|
end
|
|
|
|
function remove_ch_by_region(ch_list, region)
|
|
for i = #ch_list,2,-1 do
|
|
if not ch_list[i].region[region] then
|
|
table.remove(ch_list, i)
|
|
end
|
|
end
|
|
end
|
|
|
|
function get_channel_list()
|
|
local mode = http.formvalue("mode")
|
|
local region = tonumber(http.formvalue("country_region")) or 1
|
|
local ch_list
|
|
|
|
if mtkwifi.band(mode) == "5G" then
|
|
ch_list = mtkwifi.ChannelList_5G_All
|
|
else
|
|
ch_list = mtkwifi.ChannelList_2G_All
|
|
end
|
|
|
|
remove_ch_by_region(ch_list, region)
|
|
http.write_json(ch_list)
|
|
end
|
|
|
|
function get_HT_ext_channel_list()
|
|
local ch_cur = tonumber(http.formvalue("ch_cur"))
|
|
local region = tonumber(http.formvalue("country_region")) or 1
|
|
local ext_ch_list = {}
|
|
|
|
if ch_cur <= 14 then -- 2.4G Channel
|
|
local ch_list = mtkwifi.ChannelList_2G_All
|
|
local below_ch = ch_cur - 4
|
|
local above_ch = ch_cur + 4
|
|
local i = 1
|
|
|
|
if below_ch > 0 and ch_list[below_ch + 1].region[region] then
|
|
ext_ch_list[i] = {}
|
|
ext_ch_list[i].val = 0
|
|
ext_ch_list[i].text = ch_list[below_ch + 1].text
|
|
i = i + 1
|
|
end
|
|
|
|
if above_ch <= 14 and ch_list[above_ch + 1].region[region] then
|
|
ext_ch_list[i] = {}
|
|
ext_ch_list[i].val = 1
|
|
ext_ch_list[i].text = ch_list[above_ch + 1].text
|
|
end
|
|
else -- 5G Channel
|
|
local ch_list = mtkwifi.ChannelList_5G_All
|
|
local ext_ch_idx = -1
|
|
local len = 0
|
|
|
|
for k, v in ipairs(ch_list) do
|
|
len = len + 1
|
|
if v.channel == ch_cur then
|
|
ext_ch_idx = (k % 2 == 0) and k + 1 or k - 1
|
|
end
|
|
end
|
|
|
|
if ext_ch_idx > 0 and ext_ch_idx < len and ch_list[ext_ch_idx].region[region] then
|
|
ext_ch_list[1] = {}
|
|
ext_ch_list[1].val = ext_ch_idx % 2
|
|
ext_ch_list[1].text = ch_list[ext_ch_idx].text
|
|
end
|
|
end
|
|
|
|
http.write_json(ext_ch_list)
|
|
end
|
|
|
|
function get_5G_2nd_80Mhz_channel_list()
|
|
local ch_cur = tonumber(http.formvalue("ch_cur"))
|
|
local region = tonumber(http.formvalue("country_region"))
|
|
local ch_list = mtkwifi.ChannelList_5G_2nd_80MHZ_ALL
|
|
local ch_list_5g = mtkwifi.ChannelList_5G_All
|
|
local i, j, test_ch, test_idx
|
|
local bw80_1st_idx = -1
|
|
|
|
-- remove adjacent freqencies starting from list tail.
|
|
for i = #ch_list,1,-1 do
|
|
for j = 0,3 do
|
|
if ch_list[i].channel == -1 then
|
|
break
|
|
end
|
|
|
|
test_ch = ch_list[i].channel + j * 4
|
|
test_idx = ch_list[i].chidx + j
|
|
|
|
if test_ch == ch_cur then
|
|
if i + 1 <= #ch_list and ch_list[i + 1] then
|
|
table.remove(ch_list, i + 1)
|
|
end
|
|
table.remove(ch_list, i)
|
|
bw80_1st_idx = i
|
|
break
|
|
end
|
|
|
|
if i == (bw80_1st_idx - 1) or (not ch_list_5g[test_idx].region[region]) then
|
|
table.remove(ch_list, i)
|
|
break
|
|
end
|
|
end
|
|
end
|
|
|
|
-- remove unused channel.
|
|
for i = #ch_list,1,-1 do
|
|
if ch_list[i].channel == -1 then
|
|
table.remove(ch_list, i)
|
|
end
|
|
end
|
|
http.write_json(ch_list)
|
|
end
|
|
|
|
function apcli_cfg(dev, vif)
|
|
local devname = dev
|
|
mtkwifi.debug(devname)
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
mtkwifi.debug(profiles[devname])
|
|
assert(profiles[devname])
|
|
|
|
local cfgs = mtkwifi.load_profile(profiles[devname])
|
|
|
|
for k,v in pairs(http.formvalue()) do
|
|
if type(v) ~= type("") and type(v) ~= type(0) then
|
|
nixio.syslog("err", "apcli_cfg, invalid value type for "..k..","..type(v))
|
|
elseif string.byte(k) ~= string.byte("_") then
|
|
cfgs[k] = v or ""
|
|
end
|
|
end
|
|
|
|
cfgs.ApCliSsid = ''..mtkwifi.__handleSpecialChars(http.formvalue("ApCliSsid"))
|
|
local __authmode = http.formvalue("ApCliAuthMode")
|
|
if __authmode == "Disable" then
|
|
cfgs.ApCliAuthMode = "OPEN"
|
|
cfgs.ApCliEncrypType = "NONE"
|
|
elseif __authmode == "OPEN" or __authmode == "SHARED" then
|
|
cfgs.ApCliAuthMode = __authmode
|
|
cfgs.ApCliEncrypType = http.formvalue("wep_ApCliEncrypType")
|
|
else
|
|
cfgs.ApCliAuthMode = __authmode
|
|
cfgs.ApCliEncrypType = http.formvalue("wpa_ApCliEncrypType")
|
|
end
|
|
|
|
mtkwifi.save_profile(cfgs, profiles[devname])
|
|
|
|
if http.formvalue("__apply") then
|
|
__mtkwifi_reload(devname)
|
|
end
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi", "apcli_cfg_view", dev, vif))
|
|
end
|
|
|
|
function apcli_connect(dev, vif)
|
|
-- dev_vif can be
|
|
-- 1. mt7620.apcli0 # simple case
|
|
-- 2. mt7615e.1.apclix0 # multi-card
|
|
-- 3. mt7615e.1.2G.apclix0 # multi-card & multi-profile
|
|
local devname,vifname = dev, vif
|
|
mtkwifi.debug("devname=", dev, "vifname=", vif)
|
|
mtkwifi.debug(devname)
|
|
mtkwifi.debug(vifname)
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
mtkwifi.debug(profiles[devname])
|
|
assert(profiles[devname])
|
|
|
|
local cfgs = mtkwifi.load_profile(profiles[devname])
|
|
cfgs.ApCliEnable = "1"
|
|
mtkwifi.save_profile(cfgs, profiles[devname])
|
|
os.execute("iwpriv "..vifname.." set ApCliEnable=0")
|
|
os.execute("ifconfig "..vifname.." up")
|
|
os.execute("iwpriv "..vifname.." set Channel="..cfgs.Channel)
|
|
os.execute("iwpriv "..vifname.." set ApCliAuthMode="..cfgs.ApCliAuthMode)
|
|
os.execute("iwpriv "..vifname.." set ApCliEncrypType="..cfgs.ApCliEncrypType)
|
|
if cfgs.ApCliAuthMode == "WEP" then
|
|
os.execute("#iwpriv "..vifname.." set ApCliDefaultKeyID="..cfgs.ApCliDefaultKeyID)
|
|
os.execute("#iwpriv "..vifname.." set ApCliKey1="..cfgs.ApCliKey1Str)
|
|
elseif cfgs.ApCliAuthMode == "WPAPSK"
|
|
or cfgs.ApCliAuthMode == "WPA2PSK"
|
|
or cfgs.ApCliAuthMode == "WPA1PSKWPA2PSK" then
|
|
os.execute("iwpriv "..vifname.." set ApCliWPAPSK="..cfgs.ApCliWPAPSK)
|
|
end
|
|
os.execute("iwpriv "..vifname.." set ApCliSsid=\""..cfgs.ApCliSsid.."\"")
|
|
os.execute("iwpriv "..vifname.." set ApCliEnable=1")
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|
|
function apcli_disconnect(dev, vif)
|
|
-- dev_vif can be
|
|
-- 1. mt7620.apcli0 # simple case
|
|
-- 2. mt7615e.1.apclix0 # multi-card
|
|
-- 3. mt7615e.1.2G.apclix0 # multi-card & multi-profile
|
|
local devname,vifname = dev, vif
|
|
mtkwifi.debug("devname=", dev, "vifname", vif)
|
|
mtkwifi.debug(devname)
|
|
mtkwifi.debug(vifname)
|
|
local profiles = mtkwifi.search_dev_and_profile()
|
|
mtkwifi.debug(profiles[devname])
|
|
assert(profiles[devname])
|
|
local cfgs = mtkwifi.load_profile(profiles[devname])
|
|
cfgs.ApCliEnable = "0"
|
|
mtkwifi.save_profile(cfgs, profiles[devname])
|
|
os.execute("iwpriv "..vifname.." set ApCliEnable=0")
|
|
os.execute("ifconfig "..vifname.." down")
|
|
luci.http.redirect(luci.dispatcher.build_url("admin", "network", "wifi"))
|
|
end
|
|
|