libiwinfo: reset ioctl_socket fd in iwinfo_close(), fixes random failures with multip...
[openwrt/svn-archive/archive.git] / package / network / utils / iwinfo / src / iwinfo_utils.c
1 /*
2 * iwinfo - Wireless Information Library - Shared utility routines
3 *
4 * Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
5 *
6 * The iwinfo library is free software: you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation.
9 *
10 * The iwinfo library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
13 * See the GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
17 *
18 * The signal handling code is derived from the official madwifi tools,
19 * wlanconfig.c in particular. The encryption property handling was
20 * inspired by the hostapd madwifi driver.
21 */
22
23 #include "iwinfo/utils.h"
24
25
26 static int ioctl_socket = -1;
27
28 static int iwinfo_ioctl_socket(void)
29 {
30 /* Prepare socket */
31 if (ioctl_socket == -1)
32 {
33 ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
34 fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
35 }
36
37 return ioctl_socket;
38 }
39
40 int iwinfo_ioctl(int cmd, void *ifr)
41 {
42 int s = iwinfo_ioctl_socket();
43 return ioctl(s, cmd, ifr);
44 }
45
46 int iwinfo_dbm2mw(int in)
47 {
48 double res = 1.0;
49 int ip = in / 10;
50 int fp = in % 10;
51 int k;
52
53 for(k = 0; k < ip; k++) res *= 10;
54 for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
55
56 return (int)res;
57 }
58
59 int iwinfo_mw2dbm(int in)
60 {
61 double fin = (double) in;
62 int res = 0;
63
64 while(fin > 10.0)
65 {
66 res += 10;
67 fin /= 10.0;
68 }
69
70 while(fin > 1.000001)
71 {
72 res += 1;
73 fin /= LOG10_MAGIC;
74 }
75
76 return (int)res;
77 }
78
79 int iwinfo_ifup(const char *ifname)
80 {
81 struct ifreq ifr;
82
83 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
84
85 if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
86 return 0;
87
88 ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
89
90 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
91 }
92
93 int iwinfo_ifdown(const char *ifname)
94 {
95 struct ifreq ifr;
96
97 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
98
99 if (iwinfo_ioctl(SIOCGIFFLAGS, &ifr))
100 return 0;
101
102 ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
103
104 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
105 }
106
107 int iwinfo_ifmac(const char *ifname)
108 {
109 struct ifreq ifr;
110
111 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
112
113 if (iwinfo_ioctl(SIOCGIFHWADDR, &ifr))
114 return 0;
115
116 ifr.ifr_hwaddr.sa_data[1]++;
117 ifr.ifr_hwaddr.sa_data[2]++;
118
119 return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
120 }
121
122 void iwinfo_close(void)
123 {
124 if (ioctl_socket > -1)
125 close(ioctl_socket);
126
127 ioctl_socket = -1;
128 }
129
130 struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
131 {
132 const struct iwinfo_hardware_entry *e;
133
134 for (e = IWINFO_HARDWARE_ENTRIES; e->vendor_name; e++)
135 {
136 if ((e->vendor_id != 0xffff) && (e->vendor_id != id->vendor_id))
137 continue;
138
139 if ((e->device_id != 0xffff) && (e->device_id != id->device_id))
140 continue;
141
142 if ((e->subsystem_vendor_id != 0xffff) &&
143 (e->subsystem_vendor_id != id->subsystem_vendor_id))
144 continue;
145
146 if ((e->subsystem_device_id != 0xffff) &&
147 (e->subsystem_device_id != id->subsystem_device_id))
148 continue;
149
150 return (struct iwinfo_hardware_entry *)e;
151 }
152
153 return NULL;
154 }
155
156 int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
157 {
158 FILE *mtd;
159 uint16_t *bc;
160
161 int fd, len, off;
162 char buf[128];
163
164 if (!(mtd = fopen("/proc/mtd", "r")))
165 return -1;
166
167 while (fgets(buf, sizeof(buf), mtd) > 0)
168 {
169 if (fscanf(mtd, "mtd%d: %*x %x %127s", &off, &len, buf) < 3 ||
170 (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
171 strcmp(buf, "\"factory\"")))
172 {
173 off = -1;
174 continue;
175 }
176
177 break;
178 }
179
180 fclose(mtd);
181
182 if (off < 0)
183 return -1;
184
185 snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
186
187 if ((fd = open(buf, O_RDONLY)) < 0)
188 return -1;
189
190 bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
191
192 if ((void *)bc != MAP_FAILED)
193 {
194 id->vendor_id = 0;
195 id->device_id = 0;
196
197 for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
198 {
199 /* AR531X board data magic */
200 if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
201 {
202 id->vendor_id = bc[off + 0x7d];
203 id->device_id = bc[off + 0x7c];
204 id->subsystem_vendor_id = bc[off + 0x84];
205 id->subsystem_device_id = bc[off + 0x83];
206 break;
207 }
208
209 /* AR5416 EEPROM magic */
210 else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
211 {
212 id->vendor_id = bc[off + 0x0D];
213 id->device_id = bc[off + 0x0E];
214 id->subsystem_vendor_id = bc[off + 0x13];
215 id->subsystem_device_id = bc[off + 0x14];
216 break;
217 }
218
219 /* Rt3xxx SoC */
220 else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
221 (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
222 (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
223 (bc[off] == 0x3052) || (bc[off] == 0x5230))
224 {
225 /* vendor: RaLink */
226 id->vendor_id = 0x1814;
227 id->subsystem_vendor_id = 0x1814;
228
229 /* device */
230 if (bc[off] & 0xf0 == 0x30)
231 id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
232 else
233 id->device_id = bc[off];
234
235 /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
236 id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
237 }
238 }
239
240 munmap(bc, len);
241 }
242
243 close(fd);
244
245 return (id->vendor_id && id->device_id) ? 0 : -1;
246 }
247
248 void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
249 uint8_t defcipher, uint8_t defauth)
250 {
251 uint16_t i, count;
252
253 static unsigned char ms_oui[3] = { 0x00, 0x50, 0xf2 };
254 static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
255
256 data += 2;
257 len -= 2;
258
259 if (!memcmp(data, ms_oui, 3))
260 c->wpa_version += 1;
261 else if (!memcmp(data, ieee80211_oui, 3))
262 c->wpa_version += 2;
263
264 if (len < 4)
265 {
266 c->group_ciphers |= defcipher;
267 c->pair_ciphers |= defcipher;
268 c->auth_suites |= defauth;
269 return;
270 }
271
272 if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
273 {
274 switch (data[3])
275 {
276 case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40; break;
277 case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP; break;
278 case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP; break;
279 case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
280 case 6: /* AES-128-CMAC */ break;
281 default: /* proprietary */ break;
282 }
283 }
284
285 data += 4;
286 len -= 4;
287
288 if (len < 2)
289 {
290 c->pair_ciphers |= defcipher;
291 c->auth_suites |= defauth;
292 return;
293 }
294
295 count = data[0] | (data[1] << 8);
296 if (2 + (count * 4) > len)
297 return;
298
299 for (i = 0; i < count; i++)
300 {
301 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
302 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
303 {
304 switch (data[2 + (i * 4) + 3])
305 {
306 case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40; break;
307 case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP; break;
308 case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP; break;
309 case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
310 case 6: /* AES-128-CMAC */ break;
311 default: /* proprietary */ break;
312 }
313 }
314 }
315
316 data += 2 + (count * 4);
317 len -= 2 + (count * 4);
318
319 if (len < 2)
320 {
321 c->auth_suites |= defauth;
322 return;
323 }
324
325 count = data[0] | (data[1] << 8);
326 if (2 + (count * 4) > len)
327 return;
328
329 for (i = 0; i < count; i++)
330 {
331 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
332 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
333 {
334 switch (data[2 + (i * 4) + 3])
335 {
336 case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
337 case 2: c->auth_suites |= IWINFO_KMGMT_PSK; break;
338 case 3: /* FT/IEEE 802.1X */ break;
339 case 4: /* FT/PSK */ break;
340 case 5: /* IEEE 802.1X/SHA-256 */ break;
341 case 6: /* PSK/SHA-256 */ break;
342 default: /* proprietary */ break;
343 }
344 }
345 }
346
347 data += 2 + (count * 4);
348 len -= 2 + (count * 4);
349 }