2 * iwinfo - Wireless Information Library - Shared utility routines
4 * Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
6 * The iwinfo library is free software: you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation.
10 * The iwinfo library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
13 * See the GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
18 * The signal handling code is derived from the official madwifi tools,
19 * wlanconfig.c in particular. The encryption property handling was
20 * inspired by the hostapd madwifi driver.
23 #include "iwinfo/utils.h"
26 static int ioctl_socket = -1;
28 static int iwinfo_ioctl_socket(void)
31 if (ioctl_socket == -1)
33 ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
34 fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
40 int iwinfo_ioctl(int cmd, void *ifr)
42 int s = iwinfo_ioctl_socket();
43 return ioctl(s, cmd, ifr);
46 int iwinfo_dbm2mw(int in)
53 for(k = 0; k < ip; k++) res *= 10;
54 for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
59 int iwinfo_mw2dbm(int in)
61 double fin = (double) in;
79 int iwinfo_ifup(const char *ifname)
83 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
85 if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
88 ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
90 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
93 int iwinfo_ifdown(const char *ifname)
97 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
99 if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
102 ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
104 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
107 int iwinfo_ifmac(const char *ifname)
111 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
113 if (iwinfo_ioctl(SIOCGIFHWADDR, &ifr))
116 ifr.ifr_hwaddr.sa_data[0] |= 0x02;
117 ifr.ifr_hwaddr.sa_data[1]++;
118 ifr.ifr_hwaddr.sa_data[2]++;
120 return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
123 void iwinfo_close(void)
125 if (ioctl_socket > -1)
131 struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
134 char buf[256] = { 0 };
135 static struct iwinfo_hardware_entry e, *rv = NULL;
137 if (!(db = fopen(IWINFO_HARDWARE_FILE, "r")))
140 while (fgets(buf, sizeof(buf) - 1, db) != NULL)
142 memset(&e, 0, sizeof(e));
144 if (sscanf(buf, "%hx %hx %hx %hx %hd %hd \"%63[^\"]\" \"%63[^\"]\"",
145 &e.vendor_id, &e.device_id,
146 &e.subsystem_vendor_id, &e.subsystem_device_id,
147 &e.txpower_offset, &e.frequency_offset,
148 e.vendor_name, e.device_name) < 8)
151 if ((e.vendor_id != 0xffff) && (e.vendor_id != id->vendor_id))
154 if ((e.device_id != 0xffff) && (e.device_id != id->device_id))
157 if ((e.subsystem_vendor_id != 0xffff) &&
158 (e.subsystem_vendor_id != id->subsystem_vendor_id))
161 if ((e.subsystem_device_id != 0xffff) &&
162 (e.subsystem_device_id != id->subsystem_device_id))
173 int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
181 if (!(mtd = fopen("/proc/mtd", "r")))
184 while (fgets(buf, sizeof(buf), mtd) > 0)
186 if (fscanf(mtd, "mtd%d: %x %*x %127s", &off, &len, buf) < 3 ||
187 (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
188 strcmp(buf, "\"factory\"")))
202 snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
204 if ((fd = open(buf, O_RDONLY)) < 0)
207 bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
209 if ((void *)bc != MAP_FAILED)
214 for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
216 /* AR531X board data magic */
217 if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
219 id->vendor_id = bc[off + 0x7d];
220 id->device_id = bc[off + 0x7c];
221 id->subsystem_vendor_id = bc[off + 0x84];
222 id->subsystem_device_id = bc[off + 0x83];
226 /* AR5416 EEPROM magic */
227 else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
229 id->vendor_id = bc[off + 0x0D];
230 id->device_id = bc[off + 0x0E];
231 id->subsystem_vendor_id = bc[off + 0x13];
232 id->subsystem_device_id = bc[off + 0x14];
237 else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
238 (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
239 (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
240 (bc[off] == 0x3052) || (bc[off] == 0x5230))
243 id->vendor_id = 0x1814;
244 id->subsystem_vendor_id = 0x1814;
247 if (bc[off] & 0xf0 == 0x30)
248 id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
250 id->device_id = bc[off];
252 /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
253 id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
262 return (id->vendor_id && id->device_id) ? 0 : -1;
265 void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
266 uint8_t defcipher, uint8_t defauth)
270 static unsigned char ms_oui[3] = { 0x00, 0x50, 0xf2 };
271 static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
276 if (!memcmp(data, ms_oui, 3))
278 else if (!memcmp(data, ieee80211_oui, 3))
283 c->group_ciphers |= defcipher;
284 c->pair_ciphers |= defcipher;
285 c->auth_suites |= defauth;
289 if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
293 case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40; break;
294 case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP; break;
295 case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP; break;
296 case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
297 case 6: /* AES-128-CMAC */ break;
298 default: /* proprietary */ break;
307 c->pair_ciphers |= defcipher;
308 c->auth_suites |= defauth;
312 count = data[0] | (data[1] << 8);
313 if (2 + (count * 4) > len)
316 for (i = 0; i < count; i++)
318 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
319 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
321 switch (data[2 + (i * 4) + 3])
323 case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40; break;
324 case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP; break;
325 case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP; break;
326 case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
327 case 6: /* AES-128-CMAC */ break;
328 default: /* proprietary */ break;
333 data += 2 + (count * 4);
334 len -= 2 + (count * 4);
338 c->auth_suites |= defauth;
342 count = data[0] | (data[1] << 8);
343 if (2 + (count * 4) > len)
346 for (i = 0; i < count; i++)
348 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
349 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
351 switch (data[2 + (i * 4) + 3])
353 case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
354 case 2: c->auth_suites |= IWINFO_KMGMT_PSK; break;
355 case 3: /* FT/IEEE 802.1X */ break;
356 case 4: /* FT/PSK */ break;
357 case 5: /* IEEE 802.1X/SHA-256 */ break;
358 case 6: /* PSK/SHA-256 */ break;
359 default: /* proprietary */ break;
364 data += 2 + (count * 4);
365 len -= 2 + (count * 4);