iwinfo_utils.c 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406
  1. /*
  2. * iwinfo - Wireless Information Library - Shared utility routines
  3. *
  4. * Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
  5. *
  6. * The iwinfo library is free software: you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License version 2
  8. * as published by the Free Software Foundation.
  9. *
  10. * The iwinfo library is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
  13. * See the GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License along
  16. * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
  17. *
  18. * The signal handling code is derived from the official madwifi tools,
  19. * wlanconfig.c in particular. The encryption property handling was
  20. * inspired by the hostapd madwifi driver.
  21. */
  22. #include "iwinfo/utils.h"
  23. static int ioctl_socket = -1;
  24. struct uci_context *uci_ctx = NULL;
  25. static int iwinfo_ioctl_socket(void)
  26. {
  27. /* Prepare socket */
  28. if (ioctl_socket == -1)
  29. {
  30. ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
  31. fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
  32. }
  33. return ioctl_socket;
  34. }
  35. int iwinfo_ioctl(int cmd, void *ifr)
  36. {
  37. int s = iwinfo_ioctl_socket();
  38. return ioctl(s, cmd, ifr);
  39. }
  40. int iwinfo_dbm2mw(int in)
  41. {
  42. double res = 1.0;
  43. int ip = in / 10;
  44. int fp = in % 10;
  45. int k;
  46. for(k = 0; k < ip; k++) res *= 10;
  47. for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
  48. return (int)res;
  49. }
  50. int iwinfo_mw2dbm(int in)
  51. {
  52. double fin = (double) in;
  53. int res = 0;
  54. while(fin > 10.0)
  55. {
  56. res += 10;
  57. fin /= 10.0;
  58. }
  59. while(fin > 1.000001)
  60. {
  61. res += 1;
  62. fin /= LOG10_MAGIC;
  63. }
  64. return (int)res;
  65. }
  66. int iwinfo_ifup(const char *ifname)
  67. {
  68. struct ifreq ifr;
  69. strncpy(ifr.ifr_name, ifname, IFNAMSIZ - 1);
  70. if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
  71. return 0;
  72. ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
  73. return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
  74. }
  75. int iwinfo_ifdown(const char *ifname)
  76. {
  77. struct ifreq ifr;
  78. strncpy(ifr.ifr_name, ifname, IFNAMSIZ - 1);
  79. if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
  80. return 0;
  81. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  82. return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
  83. }
  84. int iwinfo_ifmac(const char *ifname)
  85. {
  86. struct ifreq ifr;
  87. strncpy(ifr.ifr_name, ifname, IFNAMSIZ - 1);
  88. if (iwinfo_ioctl(SIOCGIFHWADDR, &ifr))
  89. return 0;
  90. ifr.ifr_hwaddr.sa_data[0] |= 0x02;
  91. ifr.ifr_hwaddr.sa_data[1]++;
  92. ifr.ifr_hwaddr.sa_data[2]++;
  93. return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
  94. }
  95. void iwinfo_close(void)
  96. {
  97. if (ioctl_socket > -1)
  98. close(ioctl_socket);
  99. ioctl_socket = -1;
  100. }
  101. struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
  102. {
  103. FILE *db;
  104. char buf[256] = { 0 };
  105. static struct iwinfo_hardware_entry e;
  106. struct iwinfo_hardware_entry *rv = NULL;
  107. if (!(db = fopen(IWINFO_HARDWARE_FILE, "r")))
  108. return NULL;
  109. while (fgets(buf, sizeof(buf) - 1, db) != NULL)
  110. {
  111. memset(&e, 0, sizeof(e));
  112. if (sscanf(buf, "%hx %hx %hx %hx %hd %hd \"%63[^\"]\" \"%63[^\"]\"",
  113. &e.vendor_id, &e.device_id,
  114. &e.subsystem_vendor_id, &e.subsystem_device_id,
  115. &e.txpower_offset, &e.frequency_offset,
  116. e.vendor_name, e.device_name) < 8)
  117. continue;
  118. if ((e.vendor_id != 0xffff) && (e.vendor_id != id->vendor_id))
  119. continue;
  120. if ((e.device_id != 0xffff) && (e.device_id != id->device_id))
  121. continue;
  122. if ((e.subsystem_vendor_id != 0xffff) &&
  123. (e.subsystem_vendor_id != id->subsystem_vendor_id))
  124. continue;
  125. if ((e.subsystem_device_id != 0xffff) &&
  126. (e.subsystem_device_id != id->subsystem_device_id))
  127. continue;
  128. rv = &e;
  129. break;
  130. }
  131. fclose(db);
  132. return rv;
  133. }
  134. int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
  135. {
  136. FILE *mtd;
  137. uint16_t *bc;
  138. int fd, off;
  139. unsigned int len;
  140. char buf[128];
  141. if (!(mtd = fopen("/proc/mtd", "r")))
  142. return -1;
  143. while (fgets(buf, sizeof(buf), mtd) != NULL)
  144. {
  145. if (fscanf(mtd, "mtd%d: %x %*x %127s", &off, &len, buf) < 3 ||
  146. (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
  147. strcmp(buf, "\"factory\"")))
  148. {
  149. off = -1;
  150. continue;
  151. }
  152. break;
  153. }
  154. fclose(mtd);
  155. if (off < 0)
  156. return -1;
  157. snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
  158. if ((fd = open(buf, O_RDONLY)) < 0)
  159. return -1;
  160. bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
  161. if ((void *)bc != MAP_FAILED)
  162. {
  163. id->vendor_id = 0;
  164. id->device_id = 0;
  165. for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
  166. {
  167. /* AR531X board data magic */
  168. if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
  169. {
  170. id->vendor_id = bc[off + 0x7d];
  171. id->device_id = bc[off + 0x7c];
  172. id->subsystem_vendor_id = bc[off + 0x84];
  173. id->subsystem_device_id = bc[off + 0x83];
  174. break;
  175. }
  176. /* AR5416 EEPROM magic */
  177. else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
  178. {
  179. id->vendor_id = bc[off + 0x0D];
  180. id->device_id = bc[off + 0x0E];
  181. id->subsystem_vendor_id = bc[off + 0x13];
  182. id->subsystem_device_id = bc[off + 0x14];
  183. break;
  184. }
  185. /* Rt3xxx SoC */
  186. else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
  187. (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
  188. (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
  189. (bc[off] == 0x3052) || (bc[off] == 0x5230))
  190. {
  191. /* vendor: RaLink */
  192. id->vendor_id = 0x1814;
  193. id->subsystem_vendor_id = 0x1814;
  194. /* device */
  195. if ((bc[off] & 0xf0) == 0x30)
  196. id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
  197. else
  198. id->device_id = bc[off];
  199. /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
  200. id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
  201. }
  202. }
  203. munmap(bc, len);
  204. }
  205. close(fd);
  206. return (id->vendor_id && id->device_id) ? 0 : -1;
  207. }
  208. void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
  209. uint8_t defcipher, uint8_t defauth)
  210. {
  211. uint16_t i, count;
  212. static unsigned char ms_oui[3] = { 0x00, 0x50, 0xf2 };
  213. static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
  214. data += 2;
  215. len -= 2;
  216. if (!memcmp(data, ms_oui, 3))
  217. c->wpa_version += 1;
  218. else if (!memcmp(data, ieee80211_oui, 3))
  219. c->wpa_version += 2;
  220. if (len < 4)
  221. {
  222. c->group_ciphers |= defcipher;
  223. c->pair_ciphers |= defcipher;
  224. c->auth_suites |= defauth;
  225. return;
  226. }
  227. if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
  228. {
  229. switch (data[3])
  230. {
  231. case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40; break;
  232. case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP; break;
  233. case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP; break;
  234. case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
  235. case 6: /* AES-128-CMAC */ break;
  236. default: /* proprietary */ break;
  237. }
  238. }
  239. data += 4;
  240. len -= 4;
  241. if (len < 2)
  242. {
  243. c->pair_ciphers |= defcipher;
  244. c->auth_suites |= defauth;
  245. return;
  246. }
  247. count = data[0] | (data[1] << 8);
  248. if (2 + (count * 4) > len)
  249. return;
  250. for (i = 0; i < count; i++)
  251. {
  252. if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
  253. !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
  254. {
  255. switch (data[2 + (i * 4) + 3])
  256. {
  257. case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40; break;
  258. case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP; break;
  259. case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP; break;
  260. case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
  261. case 6: /* AES-128-CMAC */ break;
  262. default: /* proprietary */ break;
  263. }
  264. }
  265. }
  266. data += 2 + (count * 4);
  267. len -= 2 + (count * 4);
  268. if (len < 2)
  269. {
  270. c->auth_suites |= defauth;
  271. return;
  272. }
  273. count = data[0] | (data[1] << 8);
  274. if (2 + (count * 4) > len)
  275. return;
  276. for (i = 0; i < count; i++)
  277. {
  278. if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
  279. !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
  280. {
  281. switch (data[2 + (i * 4) + 3])
  282. {
  283. case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
  284. case 2: c->auth_suites |= IWINFO_KMGMT_PSK; break;
  285. case 3: /* FT/IEEE 802.1X */ break;
  286. case 4: /* FT/PSK */ break;
  287. case 5: /* IEEE 802.1X/SHA-256 */ break;
  288. case 6: /* PSK/SHA-256 */ break;
  289. default: /* proprietary */ break;
  290. }
  291. }
  292. }
  293. data += 2 + (count * 4);
  294. len -= 2 + (count * 4);
  295. }
  296. struct uci_section *iwinfo_uci_get_radio(const char *name, const char *type)
  297. {
  298. struct uci_ptr ptr = {
  299. .package = "wireless",
  300. .section = name,
  301. .flags = (name && *name == '@') ? UCI_LOOKUP_EXTENDED : 0,
  302. };
  303. const char *opt;
  304. if (!uci_ctx) {
  305. uci_ctx = uci_alloc_context();
  306. if (!uci_ctx)
  307. return NULL;
  308. }
  309. if (uci_lookup_ptr(uci_ctx, &ptr, NULL, true))
  310. return NULL;
  311. if (!ptr.s || strcmp(ptr.s->type, "wifi-device") != 0)
  312. return NULL;
  313. opt = uci_lookup_option_string(uci_ctx, ptr.s, "type");
  314. if (!opt || strcmp(opt, type) != 0)
  315. return NULL;
  316. return ptr.s;
  317. }
  318. void iwinfo_uci_free(void)
  319. {
  320. if (!uci_ctx)
  321. return;
  322. uci_free_context(uci_ctx);
  323. uci_ctx = NULL;
  324. }