Root/package/network/utils/iwinfo/src/iwinfo_utils.c

1/*
2 * iwinfo - Wireless Information Library - Shared utility routines
3 *
4 * Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
5 *
6 * The iwinfo library is free software: you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation.
9 *
10 * The iwinfo library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
13 * See the GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
17 *
18 * The signal handling code is derived from the official madwifi tools,
19 * wlanconfig.c in particular. The encryption property handling was
20 * inspired by the hostapd madwifi driver.
21 */
22
23#include "iwinfo/utils.h"
24
25
26static int ioctl_socket = -1;
27
28static int iwinfo_ioctl_socket(void)
29{
30    /* Prepare socket */
31    if( ioctl_socket == -1 )
32    {
33        ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
34        fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
35    }
36
37    return ioctl_socket;
38}
39
40int iwinfo_ioctl(int cmd, void *ifr)
41{
42    int s = iwinfo_ioctl_socket();
43    return ioctl(s, cmd, ifr);
44}
45
46int iwinfo_dbm2mw(int in)
47{
48    double res = 1.0;
49    int ip = in / 10;
50    int fp = in % 10;
51    int k;
52
53    for(k = 0; k < ip; k++) res *= 10;
54    for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
55
56    return (int)res;
57}
58
59int iwinfo_mw2dbm(int in)
60{
61    double fin = (double) in;
62    int res = 0;
63
64    while(fin > 10.0)
65    {
66        res += 10;
67        fin /= 10.0;
68    }
69
70    while(fin > 1.000001)
71    {
72        res += 1;
73        fin /= LOG10_MAGIC;
74    }
75
76    return (int)res;
77}
78
79int iwinfo_ifup(const char *ifname)
80{
81    struct ifreq ifr;
82
83    strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
84
85    if( iwinfo_ioctl(SIOCGIFFLAGS, &ifr) )
86        return 0;
87
88    ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
89
90    return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
91}
92
93int iwinfo_ifdown(const char *ifname)
94{
95    struct ifreq ifr;
96
97    strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
98
99    if( iwinfo_ioctl(SIOCGIFFLAGS, &ifr) )
100        return 0;
101
102    ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
103
104    return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
105}
106
107int iwinfo_ifmac(const char *ifname)
108{
109    struct ifreq ifr;
110
111    strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
112
113    if( iwinfo_ioctl(SIOCGIFHWADDR, &ifr) )
114        return 0;
115
116    ifr.ifr_hwaddr.sa_data[1]++;
117    ifr.ifr_hwaddr.sa_data[2]++;
118
119    return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
120}
121
122void iwinfo_close(void)
123{
124    if( ioctl_socket > -1 )
125        close(ioctl_socket);
126}
127
128struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
129{
130    const struct iwinfo_hardware_entry *e;
131
132    for (e = IWINFO_HARDWARE_ENTRIES; e->vendor_name; e++)
133    {
134        if ((e->vendor_id != 0xffff) && (e->vendor_id != id->vendor_id))
135            continue;
136
137        if ((e->device_id != 0xffff) && (e->device_id != id->device_id))
138            continue;
139
140        if ((e->subsystem_vendor_id != 0xffff) &&
141            (e->subsystem_vendor_id != id->subsystem_vendor_id))
142            continue;
143
144        if ((e->subsystem_device_id != 0xffff) &&
145            (e->subsystem_device_id != id->subsystem_device_id))
146            continue;
147
148        return (struct iwinfo_hardware_entry *)e;
149    }
150
151    return NULL;
152}
153
154int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
155{
156    FILE *mtd;
157    uint16_t *bc;
158
159    int fd, len, off;
160    char buf[128];
161
162    if (!(mtd = fopen("/proc/mtd", "r")))
163        return -1;
164
165    while (fgets(buf, sizeof(buf), mtd) > 0)
166    {
167        if (fscanf(mtd, "mtd%d: %*x %x %127s", &off, &len, buf) < 3 ||
168            (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
169             strcmp(buf, "\"factory\"")))
170        {
171            off = -1;
172            continue;
173        }
174
175        break;
176    }
177
178    fclose(mtd);
179
180    if (off < 0)
181        return -1;
182
183    snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
184
185    if ((fd = open(buf, O_RDONLY)) < 0)
186        return -1;
187
188    bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
189
190    if ((void *)bc != MAP_FAILED)
191    {
192        id->vendor_id = 0;
193        id->device_id = 0;
194
195        for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
196        {
197            /* AR531X board data magic */
198            if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
199            {
200                id->vendor_id = bc[off + 0x7d];
201                id->device_id = bc[off + 0x7c];
202                id->subsystem_vendor_id = bc[off + 0x84];
203                id->subsystem_device_id = bc[off + 0x83];
204                break;
205            }
206
207            /* AR5416 EEPROM magic */
208            else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
209            {
210                id->vendor_id = bc[off + 0x0D];
211                id->device_id = bc[off + 0x0E];
212                id->subsystem_vendor_id = bc[off + 0x13];
213                id->subsystem_device_id = bc[off + 0x14];
214                break;
215            }
216
217            /* Rt3xxx SoC */
218            else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
219                     (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
220                     (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
221                     (bc[off] == 0x3052) || (bc[off] == 0x5230))
222            {
223                /* vendor: RaLink */
224                id->vendor_id = 0x1814;
225                id->subsystem_vendor_id = 0x1814;
226
227                /* device */
228                if (bc[off] & 0xf0 == 0x30)
229                    id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
230                else
231                    id->device_id = bc[off];
232
233                /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
234                id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
235            }
236        }
237
238        munmap(bc, len);
239    }
240
241    close(fd);
242
243    return (id->vendor_id && id->device_id) ? 0 : -1;
244}
245
246void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
247                      uint8_t defcipher, uint8_t defauth)
248{
249    uint16_t i, count;
250
251    static unsigned char ms_oui[3] = { 0x00, 0x50, 0xf2 };
252    static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
253
254    data += 2;
255    len -= 2;
256
257    if (!memcmp(data, ms_oui, 3))
258        c->wpa_version += 1;
259    else if (!memcmp(data, ieee80211_oui, 3))
260        c->wpa_version += 2;
261
262    if (len < 4)
263    {
264        c->group_ciphers |= defcipher;
265        c->pair_ciphers |= defcipher;
266        c->auth_suites |= defauth;
267        return;
268    }
269
270    if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
271    {
272        switch (data[3])
273        {
274            case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40; break;
275            case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP; break;
276            case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP; break;
277            case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
278            case 6: /* AES-128-CMAC */ break;
279            default: /* proprietary */ break;
280        }
281    }
282
283    data += 4;
284    len -= 4;
285
286    if (len < 2)
287    {
288        c->pair_ciphers |= defcipher;
289        c->auth_suites |= defauth;
290        return;
291    }
292
293    count = data[0] | (data[1] << 8);
294    if (2 + (count * 4) > len)
295        return;
296
297    for (i = 0; i < count; i++)
298    {
299        if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
300            !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
301        {
302            switch (data[2 + (i * 4) + 3])
303            {
304                case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40; break;
305                case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP; break;
306                case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP; break;
307                case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
308                case 6: /* AES-128-CMAC */ break;
309                default: /* proprietary */ break;
310            }
311        }
312    }
313
314    data += 2 + (count * 4);
315    len -= 2 + (count * 4);
316
317    if (len < 2)
318    {
319        c->auth_suites |= defauth;
320        return;
321    }
322
323    count = data[0] | (data[1] << 8);
324    if (2 + (count * 4) > len)
325        return;
326
327    for (i = 0; i < count; i++)
328    {
329        if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
330            !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
331        {
332            switch (data[2 + (i * 4) + 3])
333            {
334                case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
335                case 2: c->auth_suites |= IWINFO_KMGMT_PSK; break;
336                case 3: /* FT/IEEE 802.1X */ break;
337                case 4: /* FT/PSK */ break;
338                case 5: /* IEEE 802.1X/SHA-256 */ break;
339                case 6: /* PSK/SHA-256 */ break;
340                default: /* proprietary */ break;
341            }
342        }
343    }
344
345    data += 2 + (count * 4);
346    len -= 2 + (count * 4);
347}
348

Archive Download this file



interactive