@sysconfdir@/waproamd/scripts/<AP MAC
address>: this is called whenever a wireless network
- controlled by an AP with a matching address is detected. The MAC
- address is formatted lowercase. Takes the same arguments as the
+ controlled by an AP with a matching address is detected. The file
+ is first tried with the MAC address formatted lowercase. If no
+ script with that name exists waproamd looks for a file with the
+ MAC address formatted uppercase. Only scripts marked executable are considered. Takes the same arguments as the
following script:
+
+
@sysconfdir@/waproamd/scripts/essid:<ESSID>:
+ This is called whenever a wireless AP is detected but no script
+ named after the AP MAC exists (See above). If the ESSID contains
+ special chracters (ASCII code < 32, >= 127, '/', '%') they are
+ replaced by a character % and the hexadecimal ASCII number of the
+ character in uppercase. This is similar to the HTTP URL
+ encoding. Only scripts marked executable are considered. Takes the same arguments as the following script:
-
@sysconfdir@/waproamd/scripts/default: this is
- the script which is called whenever no script named after the
- AP MAC address is found. It takes a single argument: either
- "start" or "stop". An environment variable AP is set to the
- MAC address of the access point found. An environment variable
- IFACE is set to the network interface name. The default
- implementation of this script looks for a file
+
@sysconfdir@/waproamd/scripts/default: this is the
+ script which is called when neither a script named after the
+ AP MAC address, nor a script named after the ESSID is found. It
+ takes a single argument: either "start" or "stop". An environment
+ variable AP is set to the MAC address of the access point
+ found. An environment variable IFACE is set to the network
+ interface name. An environment variable ESSID contains the ESSID
+ of the WLAN network. ESSID_ESCAPED contains the ESSID with all
+ special chracters escaped the same way as described above. The
+ default implementation of this script looks for a file
+ @sysconfdir@/waproamd/keys/<AP MAC address>.wep
+ (or named after the ESSID, following the same scheme as the script
+ selection described above). If it exists its contents is used to
+ set the WEP key of the NIC. Otherwise the script looks for a file
@sysconfdir@/waproamd/keys/<AP MAC
- address>.wep. If it exists its contents is used to
- set the WEP key of the NIC. Otherwise the script looks for a
- file @sysconfdir@/waproamd/keys/<AP
- MAC address>.aes. If it exists the AES WEP rekeying daemon
+ address>.aes. If it exists the AES WEP rekeying daemon
is called. Otherwise WEP
encryption is disabled.
-
/var/run/waproamd.<iface>.pid: the pid file
for waproamd.