1702ce88f6d18fdfdb3a447f70a14f002d03cb7d
[openwrt.git] / package / network / utils / iwinfo / src / iwinfo_utils.c
1 /*
2  * iwinfo - Wireless Information Library - Shared utility routines
3  *
4  *   Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
5  *
6  * The iwinfo library is free software: you can redistribute it and/or
7  * modify it under the terms of the GNU General Public License version 2
8  * as published by the Free Software Foundation.
9  *
10  * The iwinfo library is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
13  * See the GNU General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License along
16  * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
17  *
18  * The signal handling code is derived from the official madwifi tools,
19  * wlanconfig.c in particular. The encryption property handling was
20  * inspired by the hostapd madwifi driver.
21  */
22
23 #include "iwinfo/utils.h"
24
25
26 static int ioctl_socket = -1;
27
28 static int iwinfo_ioctl_socket(void)
29 {
30         /* Prepare socket */
31         if (ioctl_socket == -1)
32         {
33                 ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
34                 fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
35         }
36
37         return ioctl_socket;
38 }
39
40 int iwinfo_ioctl(int cmd, void *ifr)
41 {
42         int s = iwinfo_ioctl_socket();
43         return ioctl(s, cmd, ifr);
44 }
45
46 int iwinfo_dbm2mw(int in)
47 {
48         double res = 1.0;
49         int ip = in / 10;
50         int fp = in % 10;
51         int k;
52
53         for(k = 0; k < ip; k++) res *= 10;
54         for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
55
56         return (int)res;
57 }
58
59 int iwinfo_mw2dbm(int in)
60 {
61         double fin = (double) in;
62         int res = 0;
63
64         while(fin > 10.0)
65         {
66                 res += 10;
67                 fin /= 10.0;
68         }
69
70         while(fin > 1.000001)
71         {
72                 res += 1;
73                 fin /= LOG10_MAGIC;
74         }
75
76         return (int)res;
77 }
78
79 int iwinfo_ifup(const char *ifname)
80 {
81         struct ifreq ifr;
82
83         strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
84
85         if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
86                 return 0;
87
88         ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
89
90         return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
91 }
92
93 int iwinfo_ifdown(const char *ifname)
94 {
95         struct ifreq ifr;
96
97         strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
98
99         if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
100                 return 0;
101
102         ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
103
104         return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
105 }
106
107 int iwinfo_ifmac(const char *ifname)
108 {
109         struct ifreq ifr;
110
111         strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
112
113         if (iwinfo_ioctl(SIOCGIFHWADDR, &ifr))
114                 return 0;
115
116         ifr.ifr_hwaddr.sa_data[0] |= 0x02;
117         ifr.ifr_hwaddr.sa_data[1]++;
118         ifr.ifr_hwaddr.sa_data[2]++;
119
120         return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
121 }
122
123 void iwinfo_close(void)
124 {
125         if (ioctl_socket > -1)
126                 close(ioctl_socket);
127
128         ioctl_socket = -1;
129 }
130
131 struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
132 {
133         FILE *db;
134         char buf[256] = { 0 };
135         static struct iwinfo_hardware_entry e, *rv = NULL;
136
137         if (!(db = fopen(IWINFO_HARDWARE_FILE, "r")))
138                 return NULL;
139
140         while (fgets(buf, sizeof(buf) - 1, db) != NULL)
141         {
142                 memset(&e, 0, sizeof(e));
143
144                 if (sscanf(buf, "%hx %hx %hx %hx %hd %hd \"%63[^\"]\" \"%63[^\"]\"",
145                                &e.vendor_id, &e.device_id,
146                                &e.subsystem_vendor_id, &e.subsystem_device_id,
147                                &e.txpower_offset, &e.frequency_offset,
148                                e.vendor_name, e.device_name) < 8)
149                         continue;
150
151                 if ((e.vendor_id != 0xffff) && (e.vendor_id != id->vendor_id))
152                         continue;
153
154                 if ((e.device_id != 0xffff) && (e.device_id != id->device_id))
155                         continue;
156
157                 if ((e.subsystem_vendor_id != 0xffff) &&
158                         (e.subsystem_vendor_id != id->subsystem_vendor_id))
159                         continue;
160
161                 if ((e.subsystem_device_id != 0xffff) &&
162                         (e.subsystem_device_id != id->subsystem_device_id))
163                         continue;
164
165                 rv = &e;
166                 break;
167         }
168
169         fclose(db);
170         return rv;
171 }
172
173 int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
174 {
175         FILE *mtd;
176         uint16_t *bc;
177
178         int fd, len, off;
179         char buf[128];
180
181         if (!(mtd = fopen("/proc/mtd", "r")))
182                 return -1;
183
184         while (fgets(buf, sizeof(buf), mtd) > 0)
185         {
186                 if (fscanf(mtd, "mtd%d: %x %*x %127s", &off, &len, buf) < 3 ||
187                     (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
188                      strcmp(buf, "\"factory\"")))
189                 {
190                         off = -1;
191                         continue;
192                 }
193
194                 break;
195         }
196
197         fclose(mtd);
198
199         if (off < 0)
200                 return -1;
201
202         snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
203
204         if ((fd = open(buf, O_RDONLY)) < 0)
205                 return -1;
206
207         bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
208
209         if ((void *)bc != MAP_FAILED)
210         {
211                 id->vendor_id = 0;
212                 id->device_id = 0;
213
214                 for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
215                 {
216                         /* AR531X board data magic */
217                         if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
218                         {
219                                 id->vendor_id = bc[off + 0x7d];
220                                 id->device_id = bc[off + 0x7c];
221                                 id->subsystem_vendor_id = bc[off + 0x84];
222                                 id->subsystem_device_id = bc[off + 0x83];
223                                 break;
224                         }
225
226                         /* AR5416 EEPROM magic */
227                         else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
228                         {
229                                 id->vendor_id = bc[off + 0x0D];
230                                 id->device_id = bc[off + 0x0E];
231                                 id->subsystem_vendor_id = bc[off + 0x13];
232                                 id->subsystem_device_id = bc[off + 0x14];
233                                 break;
234                         }
235
236                         /* Rt3xxx SoC */
237                         else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
238                                  (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
239                                  (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
240                                  (bc[off] == 0x3052) || (bc[off] == 0x5230))
241                         {
242                                 /* vendor: RaLink */
243                                 id->vendor_id = 0x1814;
244                                 id->subsystem_vendor_id = 0x1814;
245
246                                 /* device */
247                                 if (bc[off] & 0xf0 == 0x30)
248                                         id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
249                                 else
250                                         id->device_id = bc[off];
251
252                                 /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
253                                 id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
254                         }
255                 }
256
257                 munmap(bc, len);
258         }
259
260         close(fd);
261
262         return (id->vendor_id && id->device_id) ? 0 : -1;
263 }
264
265 void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
266                                           uint8_t defcipher, uint8_t defauth)
267 {
268         uint16_t i, count;
269
270         static unsigned char ms_oui[3]        = { 0x00, 0x50, 0xf2 };
271         static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
272
273         data += 2;
274         len -= 2;
275
276         if (!memcmp(data, ms_oui, 3))
277                 c->wpa_version += 1;
278         else if (!memcmp(data, ieee80211_oui, 3))
279                 c->wpa_version += 2;
280
281         if (len < 4)
282         {
283                 c->group_ciphers |= defcipher;
284                 c->pair_ciphers  |= defcipher;
285                 c->auth_suites   |= defauth;
286                 return;
287         }
288
289         if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
290         {
291                 switch (data[3])
292                 {
293                         case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40;  break;
294                         case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP;   break;
295                         case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP;   break;
296                         case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
297                         case 6:  /* AES-128-CMAC */ break;
298                         default: /* proprietary */  break;
299                 }
300         }
301
302         data += 4;
303         len -= 4;
304
305         if (len < 2)
306         {
307                 c->pair_ciphers |= defcipher;
308                 c->auth_suites  |= defauth;
309                 return;
310         }
311
312         count = data[0] | (data[1] << 8);
313         if (2 + (count * 4) > len)
314                 return;
315
316         for (i = 0; i < count; i++)
317         {
318                 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
319                         !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
320                 {
321                         switch (data[2 + (i * 4) + 3])
322                         {
323                                 case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40;  break;
324                                 case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP;   break;
325                                 case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP;   break;
326                                 case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
327                                 case 6:  /* AES-128-CMAC */ break;
328                                 default: /* proprietary */  break;
329                         }
330                 }
331         }
332
333         data += 2 + (count * 4);
334         len -= 2 + (count * 4);
335
336         if (len < 2)
337         {
338                 c->auth_suites |= defauth;
339                 return;
340         }
341
342         count = data[0] | (data[1] << 8);
343         if (2 + (count * 4) > len)
344                 return;
345
346         for (i = 0; i < count; i++)
347         {
348                 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
349                         !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
350                 {
351                         switch (data[2 + (i * 4) + 3])
352                         {
353                                 case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
354                                 case 2: c->auth_suites |= IWINFO_KMGMT_PSK;   break;
355                                 case 3:  /* FT/IEEE 802.1X */                 break;
356                                 case 4:  /* FT/PSK */                         break;
357                                 case 5:  /* IEEE 802.1X/SHA-256 */            break;
358                                 case 6:  /* PSK/SHA-256 */                    break;
359                                 default: /* proprietary */                    break;
360                         }
361                 }
362         }
363
364         data += 2 + (count * 4);
365         len -= 2 + (count * 4);
366 }