packages: sort network related packages into package/network/
[openwrt/staging/mkresin.git] / package / network / utils / iwinfo / src / iwinfo_utils.c
1 /*
2 * iwinfo - Wireless Information Library - Shared utility routines
3 *
4 * Copyright (C) 2010 Jo-Philipp Wich <xm@subsignal.org>
5 *
6 * The iwinfo library is free software: you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation.
9 *
10 * The iwinfo library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
13 * See the GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with the iwinfo library. If not, see http://www.gnu.org/licenses/.
17 *
18 * The signal handling code is derived from the official madwifi tools,
19 * wlanconfig.c in particular. The encryption property handling was
20 * inspired by the hostapd madwifi driver.
21 */
22
23 #include "iwinfo/utils.h"
24
25
26 static int ioctl_socket = -1;
27
28 static int iwinfo_ioctl_socket(void)
29 {
30 /* Prepare socket */
31 if( ioctl_socket == -1 )
32 {
33 ioctl_socket = socket(AF_INET, SOCK_DGRAM, 0);
34 fcntl(ioctl_socket, F_SETFD, fcntl(ioctl_socket, F_GETFD) | FD_CLOEXEC);
35 }
36
37 return ioctl_socket;
38 }
39
40 int iwinfo_ioctl(int cmd, void *ifr)
41 {
42 int s = iwinfo_ioctl_socket();
43 return ioctl(s, cmd, ifr);
44 }
45
46 int iwinfo_dbm2mw(int in)
47 {
48 double res = 1.0;
49 int ip = in / 10;
50 int fp = in % 10;
51 int k;
52
53 for(k = 0; k < ip; k++) res *= 10;
54 for(k = 0; k < fp; k++) res *= LOG10_MAGIC;
55
56 return (int)res;
57 }
58
59 int iwinfo_mw2dbm(int in)
60 {
61 double fin = (double) in;
62 int res = 0;
63
64 while(fin > 10.0)
65 {
66 res += 10;
67 fin /= 10.0;
68 }
69
70 while(fin > 1.000001)
71 {
72 res += 1;
73 fin /= LOG10_MAGIC;
74 }
75
76 return (int)res;
77 }
78
79 int iwinfo_ifup(const char *ifname)
80 {
81 struct ifreq ifr;
82
83 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
84
85 if( iwinfo_ioctl(SIOCGIFFLAGS, &ifr) )
86 return 0;
87
88 ifr.ifr_flags |= (IFF_UP | IFF_RUNNING);
89
90 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
91 }
92
93 int iwinfo_ifdown(const char *ifname)
94 {
95 struct ifreq ifr;
96
97 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
98
99 if( iwinfo_ioctl(SIOCGIFFLAGS, &ifr) )
100 return 0;
101
102 ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
103
104 return !iwinfo_ioctl(SIOCSIFFLAGS, &ifr);
105 }
106
107 int iwinfo_ifmac(const char *ifname)
108 {
109 struct ifreq ifr;
110
111 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
112
113 if( iwinfo_ioctl(SIOCGIFHWADDR, &ifr) )
114 return 0;
115
116 ifr.ifr_hwaddr.sa_data[1]++;
117 ifr.ifr_hwaddr.sa_data[2]++;
118
119 return !iwinfo_ioctl(SIOCSIFHWADDR, &ifr);
120 }
121
122 void iwinfo_close(void)
123 {
124 if( ioctl_socket > -1 )
125 close(ioctl_socket);
126 }
127
128 struct iwinfo_hardware_entry * iwinfo_hardware(struct iwinfo_hardware_id *id)
129 {
130 const struct iwinfo_hardware_entry *e;
131
132 for (e = IWINFO_HARDWARE_ENTRIES; e->vendor_name; e++)
133 {
134 if ((e->vendor_id != 0xffff) && (e->vendor_id != id->vendor_id))
135 continue;
136
137 if ((e->device_id != 0xffff) && (e->device_id != id->device_id))
138 continue;
139
140 if ((e->subsystem_vendor_id != 0xffff) &&
141 (e->subsystem_vendor_id != id->subsystem_vendor_id))
142 continue;
143
144 if ((e->subsystem_device_id != 0xffff) &&
145 (e->subsystem_device_id != id->subsystem_device_id))
146 continue;
147
148 return (struct iwinfo_hardware_entry *)e;
149 }
150
151 return NULL;
152 }
153
154 int iwinfo_hardware_id_from_mtd(struct iwinfo_hardware_id *id)
155 {
156 FILE *mtd;
157 uint16_t *bc;
158
159 int fd, len, off;
160 char buf[128];
161
162 if (!(mtd = fopen("/proc/mtd", "r")))
163 return -1;
164
165 while (fgets(buf, sizeof(buf), mtd) > 0)
166 {
167 if (fscanf(mtd, "mtd%d: %*x %x %127s", &off, &len, buf) < 3 ||
168 (strcmp(buf, "\"boardconfig\"") && strcmp(buf, "\"EEPROM\"") &&
169 strcmp(buf, "\"factory\"")))
170 {
171 off = -1;
172 continue;
173 }
174
175 break;
176 }
177
178 fclose(mtd);
179
180 if (off < 0)
181 return -1;
182
183 snprintf(buf, sizeof(buf), "/dev/mtdblock%d", off);
184
185 if ((fd = open(buf, O_RDONLY)) < 0)
186 return -1;
187
188 bc = mmap(NULL, len, PROT_READ, MAP_PRIVATE|MAP_LOCKED, fd, 0);
189
190 if ((void *)bc != MAP_FAILED)
191 {
192 id->vendor_id = 0;
193 id->device_id = 0;
194
195 for (off = len / 2 - 0x800; off >= 0; off -= 0x800)
196 {
197 /* AR531X board data magic */
198 if ((bc[off] == 0x3533) && (bc[off + 1] == 0x3131))
199 {
200 id->vendor_id = bc[off + 0x7d];
201 id->device_id = bc[off + 0x7c];
202 id->subsystem_vendor_id = bc[off + 0x84];
203 id->subsystem_device_id = bc[off + 0x83];
204 break;
205 }
206
207 /* AR5416 EEPROM magic */
208 else if ((bc[off] == 0xA55A) || (bc[off] == 0x5AA5))
209 {
210 id->vendor_id = bc[off + 0x0D];
211 id->device_id = bc[off + 0x0E];
212 id->subsystem_vendor_id = bc[off + 0x13];
213 id->subsystem_device_id = bc[off + 0x14];
214 break;
215 }
216
217 /* Rt3xxx SoC */
218 else if ((bc[off] == 0x3352) || (bc[off] == 0x5233) ||
219 (bc[off] == 0x3350) || (bc[off] == 0x5033) ||
220 (bc[off] == 0x3050) || (bc[off] == 0x5030) ||
221 (bc[off] == 0x3052) || (bc[off] == 0x5230))
222 {
223 /* vendor: RaLink */
224 id->vendor_id = 0x1814;
225 id->subsystem_vendor_id = 0x1814;
226
227 /* device */
228 if (bc[off] & 0xf0 == 0x30)
229 id->device_id = (bc[off] >> 8) | (bc[off] & 0x00ff) << 8;
230 else
231 id->device_id = bc[off];
232
233 /* subsystem from EEPROM_NIC_CONF0_RF_TYPE */
234 id->subsystem_device_id = (bc[off + 0x1a] & 0x0f00) >> 8;
235 }
236 }
237
238 munmap(bc, len);
239 }
240
241 close(fd);
242
243 return (id->vendor_id && id->device_id) ? 0 : -1;
244 }
245
246 void iwinfo_parse_rsn(struct iwinfo_crypto_entry *c, uint8_t *data, uint8_t len,
247 uint8_t defcipher, uint8_t defauth)
248 {
249 uint16_t i, count;
250
251 static unsigned char ms_oui[3] = { 0x00, 0x50, 0xf2 };
252 static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
253
254 data += 2;
255 len -= 2;
256
257 if (!memcmp(data, ms_oui, 3))
258 c->wpa_version += 1;
259 else if (!memcmp(data, ieee80211_oui, 3))
260 c->wpa_version += 2;
261
262 if (len < 4)
263 {
264 c->group_ciphers |= defcipher;
265 c->pair_ciphers |= defcipher;
266 c->auth_suites |= defauth;
267 return;
268 }
269
270 if (!memcmp(data, ms_oui, 3) || !memcmp(data, ieee80211_oui, 3))
271 {
272 switch (data[3])
273 {
274 case 1: c->group_ciphers |= IWINFO_CIPHER_WEP40; break;
275 case 2: c->group_ciphers |= IWINFO_CIPHER_TKIP; break;
276 case 4: c->group_ciphers |= IWINFO_CIPHER_CCMP; break;
277 case 5: c->group_ciphers |= IWINFO_CIPHER_WEP104; break;
278 case 6: /* AES-128-CMAC */ break;
279 default: /* proprietary */ break;
280 }
281 }
282
283 data += 4;
284 len -= 4;
285
286 if (len < 2)
287 {
288 c->pair_ciphers |= defcipher;
289 c->auth_suites |= defauth;
290 return;
291 }
292
293 count = data[0] | (data[1] << 8);
294 if (2 + (count * 4) > len)
295 return;
296
297 for (i = 0; i < count; i++)
298 {
299 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
300 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
301 {
302 switch (data[2 + (i * 4) + 3])
303 {
304 case 1: c->pair_ciphers |= IWINFO_CIPHER_WEP40; break;
305 case 2: c->pair_ciphers |= IWINFO_CIPHER_TKIP; break;
306 case 4: c->pair_ciphers |= IWINFO_CIPHER_CCMP; break;
307 case 5: c->pair_ciphers |= IWINFO_CIPHER_WEP104; break;
308 case 6: /* AES-128-CMAC */ break;
309 default: /* proprietary */ break;
310 }
311 }
312 }
313
314 data += 2 + (count * 4);
315 len -= 2 + (count * 4);
316
317 if (len < 2)
318 {
319 c->auth_suites |= defauth;
320 return;
321 }
322
323 count = data[0] | (data[1] << 8);
324 if (2 + (count * 4) > len)
325 return;
326
327 for (i = 0; i < count; i++)
328 {
329 if (!memcmp(data + 2 + (i * 4), ms_oui, 3) ||
330 !memcmp(data + 2 + (i * 4), ieee80211_oui, 3))
331 {
332 switch (data[2 + (i * 4) + 3])
333 {
334 case 1: c->auth_suites |= IWINFO_KMGMT_8021x; break;
335 case 2: c->auth_suites |= IWINFO_KMGMT_PSK; break;
336 case 3: /* FT/IEEE 802.1X */ break;
337 case 4: /* FT/PSK */ break;
338 case 5: /* IEEE 802.1X/SHA-256 */ break;
339 case 6: /* PSK/SHA-256 */ break;
340 default: /* proprietary */ break;
341 }
342 }
343 }
344
345 data += 2 + (count * 4);
346 len -= 2 + (count * 4);
347 }