]>
Commit | Line | Data |
---|---|---|
3563f4c5 JB |
1 | #include <net/if.h> |
2 | #include <errno.h> | |
3 | #include <string.h> | |
4 | #include <ctype.h> | |
764fe753 | 5 | #include <stdbool.h> |
3563f4c5 JB |
6 | |
7 | #include <netlink/genl/genl.h> | |
8 | #include <netlink/genl/family.h> | |
9 | #include <netlink/genl/ctrl.h> | |
10 | #include <netlink/msg.h> | |
11 | #include <netlink/attr.h> | |
12 | ||
13 | #include "nl80211.h" | |
14 | #include "iw.h" | |
15 | ||
92a04ecd MH |
16 | #define WLAN_CAPABILITY_ESS (1<<0) |
17 | #define WLAN_CAPABILITY_IBSS (1<<1) | |
18 | #define WLAN_CAPABILITY_CF_POLLABLE (1<<2) | |
19 | #define WLAN_CAPABILITY_CF_POLL_REQUEST (1<<3) | |
20 | #define WLAN_CAPABILITY_PRIVACY (1<<4) | |
21 | #define WLAN_CAPABILITY_SHORT_PREAMBLE (1<<5) | |
22 | #define WLAN_CAPABILITY_PBCC (1<<6) | |
23 | #define WLAN_CAPABILITY_CHANNEL_AGILITY (1<<7) | |
24 | #define WLAN_CAPABILITY_SPECTRUM_MGMT (1<<8) | |
25 | #define WLAN_CAPABILITY_QOS (1<<9) | |
26 | #define WLAN_CAPABILITY_SHORT_SLOT_TIME (1<<10) | |
27 | #define WLAN_CAPABILITY_APSD (1<<11) | |
28 | #define WLAN_CAPABILITY_DSSS_OFDM (1<<13) | |
29 | ||
857d966e MH |
30 | static unsigned char wifi_oui[3] = { 0x00, 0x50, 0xf2 }; |
31 | static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac }; | |
32 | ||
764fe753 JB |
33 | struct scan_params { |
34 | bool unknown; | |
35 | }; | |
36 | ||
7c37a24d JB |
37 | static int handle_scan(struct nl80211_state *state, |
38 | struct nl_cb *cb, | |
3563f4c5 JB |
39 | struct nl_msg *msg, |
40 | int argc, char **argv) | |
41 | { | |
559a1713 JB |
42 | struct nl_msg *ssids = NULL, *freqs = NULL; |
43 | char *eptr; | |
3563f4c5 | 44 | int err = -ENOBUFS; |
559a1713 JB |
45 | int i; |
46 | enum { | |
47 | NONE, | |
48 | FREQ, | |
49 | SSID, | |
50 | DONE, | |
51 | } parse = NONE; | |
52 | int freq; | |
53 | bool passive = false, have_ssids = false, have_freqs = false; | |
3563f4c5 JB |
54 | |
55 | ssids = nlmsg_alloc(); | |
56 | if (!ssids) | |
57 | return -ENOMEM; | |
559a1713 JB |
58 | |
59 | freqs = nlmsg_alloc(); | |
60 | if (!freqs) { | |
61 | nlmsg_free(ssids); | |
62 | return -ENOMEM; | |
63 | } | |
64 | ||
65 | for (i = 0; i < argc; i++) { | |
1ddf11eb | 66 | if (parse == NONE && strcmp(argv[i], "freq") == 0) { |
559a1713 JB |
67 | parse = FREQ; |
68 | have_freqs = true; | |
69 | continue; | |
1ddf11eb | 70 | } else if (parse < SSID && strcmp(argv[i], "ssid") == 0) { |
559a1713 JB |
71 | parse = SSID; |
72 | have_ssids = true; | |
73 | continue; | |
1ddf11eb | 74 | } else if (parse < SSID && strcmp(argv[i], "passive") == 0) { |
559a1713 JB |
75 | parse = DONE; |
76 | passive = true; | |
77 | continue; | |
78 | } | |
79 | ||
80 | switch (parse) { | |
81 | case NONE: | |
82 | case DONE: | |
83 | return 1; | |
84 | case FREQ: | |
85 | freq = strtoul(argv[i], &eptr, 10); | |
86 | if (eptr != argv[i] + strlen(argv[i])) | |
87 | return 1; | |
88 | NLA_PUT_U32(freqs, i, freq); | |
89 | break; | |
90 | case SSID: | |
91 | NLA_PUT(ssids, i, strlen(argv[i]), argv[i]); | |
92 | break; | |
93 | } | |
94 | } | |
95 | ||
96 | if (!have_ssids) | |
97 | NLA_PUT(ssids, 1, 0, ""); | |
98 | if (!passive) | |
99 | nla_put_nested(msg, NL80211_ATTR_SCAN_SSIDS, ssids); | |
100 | ||
101 | if (have_freqs) | |
102 | nla_put_nested(msg, NL80211_ATTR_SCAN_FREQUENCIES, freqs); | |
3563f4c5 JB |
103 | |
104 | err = 0; | |
105 | nla_put_failure: | |
106 | nlmsg_free(ssids); | |
559a1713 | 107 | nlmsg_free(freqs); |
3563f4c5 JB |
108 | return err; |
109 | } | |
559a1713 | 110 | COMMAND(scan, trigger, "[freq <freq>*] [ssid <ssid>*|passive]", |
3563f4c5 JB |
111 | NL80211_CMD_TRIGGER_SCAN, 0, CIB_NETDEV, handle_scan); |
112 | ||
857d966e MH |
113 | static void tab_on_first(bool *first) |
114 | { | |
115 | if (!*first) | |
116 | printf("\t"); | |
117 | else | |
118 | *first = false; | |
119 | } | |
120 | ||
83b4934c | 121 | static void print_ssid(const uint8_t type, uint8_t len, const uint8_t *data) |
3563f4c5 JB |
122 | { |
123 | int i; | |
83b4934c JB |
124 | |
125 | printf(" "); | |
126 | ||
127 | for (i = 0; i < len; i++) { | |
3563f4c5 JB |
128 | if (isprint(data[i])) |
129 | printf("%c", data[i]); | |
130 | else | |
131 | printf("\\x%.2x", data[i]); | |
132 | } | |
133 | printf("\n"); | |
134 | } | |
135 | ||
83b4934c | 136 | static void print_supprates(const uint8_t type, uint8_t len, const uint8_t *data) |
3563f4c5 JB |
137 | { |
138 | int i; | |
139 | ||
83b4934c | 140 | printf(" "); |
3563f4c5 | 141 | |
83b4934c | 142 | for (i = 0; i < len; i++) { |
3563f4c5 JB |
143 | int r = data[i] & 0x7f; |
144 | printf("%d.%d%s ", r/2, 5*(r&1), data[i] & 0x80 ? "*":""); | |
145 | } | |
146 | printf("\n"); | |
147 | } | |
148 | ||
83b4934c | 149 | static void print_ds(const uint8_t type, uint8_t len, const uint8_t *data) |
3563f4c5 | 150 | { |
83b4934c | 151 | printf(" channel %d\n", data[0]); |
3563f4c5 JB |
152 | } |
153 | ||
83b4934c | 154 | static void print_country(const uint8_t type, uint8_t len, const uint8_t *data) |
b7e8fa37 MH |
155 | { |
156 | int i; | |
157 | ||
83b4934c | 158 | printf(" %.*s", 2, data); |
b7e8fa37 MH |
159 | switch (data[2]) { |
160 | case 'I': | |
161 | printf(" (indoor)"); | |
162 | break; | |
163 | case 'O': | |
164 | printf(" (outdoor)"); | |
165 | break; | |
b6c0d634 JB |
166 | case ' ': |
167 | printf(" (in/outdoor)"); | |
168 | break; | |
169 | default: | |
170 | printf(" (invalid environment)"); | |
171 | break; | |
b7e8fa37 MH |
172 | } |
173 | printf(", data:"); | |
174 | for(i=0; i<len-3; i++) | |
175 | printf(" %.02x", data[i + 3]); | |
176 | printf("\n"); | |
177 | } | |
178 | ||
d1563a1b MH |
179 | static void print_powerconstraint(const uint8_t type, uint8_t len, const uint8_t *data) |
180 | { | |
181 | printf(" %d dB\n", data[0]); | |
182 | } | |
183 | ||
83b4934c | 184 | static void print_erp(const uint8_t type, uint8_t len, const uint8_t *data) |
fc4d1484 MH |
185 | { |
186 | if (data[0] == 0x00) | |
83b4934c | 187 | printf(" <no flags>"); |
fc4d1484 MH |
188 | if (data[0] & 0x01) |
189 | printf(" NonERP_Present"); | |
190 | if (data[0] & 0x02) | |
191 | printf(" Use_Protection"); | |
192 | if (data[0] & 0x04) | |
193 | printf(" Barker_Preamble_Mode"); | |
194 | printf("\n"); | |
195 | } | |
196 | ||
83b4934c | 197 | static void print_cipher(const uint8_t *data) |
857d966e MH |
198 | { |
199 | if (memcmp(data, wifi_oui, 3) == 0) { | |
200 | switch (data[3]) { | |
201 | case 0x00: | |
202 | printf("Use group cipher suite"); | |
203 | break; | |
204 | case 0x01: | |
205 | printf("WEP-40"); | |
206 | break; | |
207 | case 0x02: | |
208 | printf("TKIP"); | |
209 | break; | |
210 | case 0x04: | |
211 | printf("CCMP"); | |
212 | break; | |
213 | case 0x05: | |
214 | printf("WEP-104"); | |
215 | break; | |
216 | default: | |
5594fd23 JB |
217 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
218 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
219 | break; |
220 | } | |
221 | } else if (memcmp(data, ieee80211_oui, 3) == 0) { | |
222 | switch (data[3]) { | |
223 | case 0x00: | |
224 | printf("Use group cipher suite"); | |
225 | break; | |
226 | case 0x01: | |
227 | printf("WEP-40"); | |
228 | break; | |
229 | case 0x02: | |
230 | printf("TKIP"); | |
231 | break; | |
232 | case 0x04: | |
233 | printf("CCMP"); | |
234 | break; | |
235 | case 0x05: | |
236 | printf("WEP-104"); | |
237 | break; | |
238 | case 0x06: | |
239 | printf("AES-128-CMAC"); | |
240 | break; | |
241 | default: | |
5594fd23 JB |
242 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
243 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
244 | break; |
245 | } | |
246 | } else | |
5594fd23 JB |
247 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
248 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
249 | } |
250 | ||
83b4934c | 251 | static void print_auth(const uint8_t *data) |
857d966e MH |
252 | { |
253 | if (memcmp(data, wifi_oui, 3) == 0) { | |
254 | switch (data[3]) { | |
255 | case 0x01: | |
256 | printf("IEEE 802.1X"); | |
257 | break; | |
258 | case 0x02: | |
259 | printf("PSK"); | |
260 | break; | |
261 | default: | |
5594fd23 JB |
262 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
263 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
264 | break; |
265 | } | |
266 | } else if (memcmp(data, ieee80211_oui, 3) == 0) { | |
267 | switch (data[3]) { | |
268 | case 0x01: | |
269 | printf("IEEE 802.1X"); | |
270 | break; | |
271 | case 0x02: | |
272 | printf("PSK"); | |
273 | break; | |
274 | default: | |
5594fd23 JB |
275 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
276 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
277 | break; |
278 | } | |
279 | } else | |
5594fd23 JB |
280 | printf("Unknown (%.02x-%.02x-%.02x:%d)", |
281 | data[0], data[1] ,data[2], data[3]); | |
857d966e MH |
282 | } |
283 | ||
83b4934c JB |
284 | static void print_rsn_ie(const char *defcipher, const char *defauth, |
285 | uint8_t len, const uint8_t *data) | |
857d966e MH |
286 | { |
287 | bool first = true; | |
288 | __u16 version, count, capa; | |
289 | int i; | |
290 | ||
857d966e MH |
291 | version = data[0] + (data[1] << 8); |
292 | tab_on_first(&first); | |
293 | printf("\t * Version: %d\n", version); | |
294 | ||
295 | data += 2; | |
296 | len -= 2; | |
297 | ||
298 | if (len < 4) { | |
299 | tab_on_first(&first); | |
300 | printf("\t * Group cipher: %s\n", defcipher); | |
301 | printf("\t * Pairwise ciphers: %s\n", defcipher); | |
302 | return; | |
303 | } | |
304 | ||
305 | tab_on_first(&first); | |
306 | printf("\t * Group cipher: "); | |
307 | print_cipher(data); | |
308 | printf("\n"); | |
309 | ||
310 | data += 4; | |
311 | len -= 4; | |
312 | ||
313 | if (len < 2) { | |
314 | tab_on_first(&first); | |
315 | printf("\t * Pairwise ciphers: %s\n", defcipher); | |
316 | return; | |
317 | } | |
318 | ||
319 | count = data[0] | (data[1] << 8); | |
31d477fb MH |
320 | if (2 + (count * 4) > len) |
321 | goto invalid; | |
322 | ||
857d966e MH |
323 | tab_on_first(&first); |
324 | printf("\t * Pairwise ciphers:"); | |
31d477fb | 325 | for (i = 0; i < count; i++) { |
857d966e MH |
326 | printf(" "); |
327 | print_cipher(data + 2 + (i * 4)); | |
328 | } | |
329 | printf("\n"); | |
330 | ||
331 | data += 2 + (count * 4); | |
332 | len -= 2 + (count * 4); | |
333 | ||
334 | if (len < 2) { | |
335 | tab_on_first(&first); | |
336 | printf("\t * Authentication suites: %s\n", defauth); | |
337 | return; | |
338 | } | |
339 | ||
340 | count = data[0] | (data[1] << 8); | |
31d477fb MH |
341 | if (2 + (count * 4) > len) |
342 | goto invalid; | |
343 | ||
857d966e MH |
344 | tab_on_first(&first); |
345 | printf("\t * Authentication suites:"); | |
83b4934c | 346 | for (i = 0; i < count; i++) { |
857d966e MH |
347 | printf(" "); |
348 | print_auth(data + 2 + (i * 4)); | |
349 | } | |
350 | printf("\n"); | |
351 | ||
352 | data += 2 + (count * 4); | |
353 | len -= 2 + (count * 4); | |
354 | ||
355 | if (len < 2) | |
356 | return; | |
357 | ||
358 | capa = data[0] | (data[1] << 8); | |
359 | tab_on_first(&first); | |
360 | printf("\t * Capabilities: 0x%.4x\n", capa); | |
31d477fb MH |
361 | |
362 | data += 2; | |
363 | len -= 2; | |
364 | ||
365 | invalid: | |
366 | if (len != 0) { | |
367 | printf("\t\t * bogus tail data (%d):", len); | |
368 | while (len) { | |
369 | printf(" %.2x", *data); | |
370 | data++; | |
371 | len--; | |
372 | } | |
373 | printf("\n"); | |
374 | } | |
857d966e MH |
375 | } |
376 | ||
83b4934c | 377 | static void print_rsn(const uint8_t type, uint8_t len, const uint8_t *data) |
857d966e | 378 | { |
83b4934c | 379 | print_rsn_ie("CCMP", "IEEE 802.1X", len, data); |
857d966e MH |
380 | } |
381 | ||
83b4934c | 382 | static void print_capabilities(const uint8_t type, uint8_t len, const uint8_t *data) |
9b880b00 MH |
383 | { |
384 | int i; | |
385 | ||
83b4934c | 386 | for(i = 0; i < len; i++) |
9b880b00 MH |
387 | printf(" %.02x", data[i]); |
388 | printf("\n"); | |
389 | } | |
390 | ||
83b4934c JB |
391 | struct ie_print { |
392 | const char *name; | |
393 | void (*print)(const uint8_t type, uint8_t len, const uint8_t *data); | |
394 | uint8_t minlen, maxlen; | |
764fe753 JB |
395 | }; |
396 | ||
83b4934c JB |
397 | static void print_ie(const struct ie_print *p, const uint8_t type, |
398 | uint8_t len, const uint8_t *data) | |
4673a894 | 399 | { |
83b4934c JB |
400 | int i; |
401 | ||
402 | if (!p->print) | |
403 | return; | |
404 | ||
405 | printf("\t%s:", p->name); | |
406 | if (len < p->minlen || len > p->maxlen) { | |
407 | if (len > 1) { | |
408 | printf(" <invalid: %d bytes:", len); | |
409 | for (i = 0; i < len; i++) | |
410 | printf(" %.02x", data[i]); | |
411 | printf(">\n"); | |
412 | } else if (len) | |
413 | printf(" <invalid: 1 byte: %.02x>\n", data[0]); | |
414 | else | |
415 | printf(" <invalid: no data>\n"); | |
416 | return; | |
417 | } | |
418 | ||
419 | p->print(type, len, data); | |
420 | } | |
421 | ||
422 | #define PRINT_IGN { \ | |
423 | .name = "IGNORE", \ | |
424 | .print = NULL, \ | |
425 | .minlen = 0, \ | |
426 | .maxlen = 255, \ | |
4673a894 JB |
427 | } |
428 | ||
83b4934c JB |
429 | static const struct ie_print ieprinters[] = { |
430 | [0] = { "SSID", print_ssid, 0, 32, }, | |
431 | [1] = { "Supported rates", print_supprates, 0, 255, }, | |
432 | [3] = { "DS Paramater set", print_ds, 1, 1, }, | |
433 | [5] = PRINT_IGN, | |
434 | [7] = { "Country", print_country, 3, 255, }, | |
d1563a1b | 435 | [32] = { "Power constraint", print_powerconstraint, 1, 1, }, |
83b4934c JB |
436 | [42] = { "ERP", print_erp, 1, 255, }, |
437 | [48] = { "RSN", print_rsn, 2, 255, }, | |
438 | [50] = { "Extended supported rates", print_supprates, 0, 255, }, | |
439 | [127] = { "Extended capabilities", print_capabilities, 0, 255, }, | |
440 | }; | |
441 | ||
442 | static void print_wifi_wpa(const uint8_t type, uint8_t len, const uint8_t *data) | |
443 | { | |
444 | print_rsn_ie("TKIP", "IEEE 802.1X", len, data); | |
445 | } | |
446 | ||
447 | static void print_wifi_wmm(const uint8_t type, uint8_t len, const uint8_t *data) | |
6ff0c93a MH |
448 | { |
449 | int i; | |
450 | ||
6ff0c93a MH |
451 | switch (data[0]) { |
452 | case 0x00: | |
83b4934c | 453 | printf(" information:"); |
6ff0c93a MH |
454 | break; |
455 | case 0x01: | |
83b4934c | 456 | printf(" parameter:"); |
6ff0c93a MH |
457 | break; |
458 | default: | |
83b4934c | 459 | printf(" type %d:", data[0]); |
6ff0c93a MH |
460 | break; |
461 | } | |
462 | ||
83b4934c | 463 | for(i = 0; i < len - 1; i++) |
6ff0c93a MH |
464 | printf(" %.02x", data[i + 1]); |
465 | printf("\n"); | |
466 | } | |
467 | ||
83b4934c | 468 | static void print_wifi_wps(const uint8_t type, uint8_t len, const uint8_t *data) |
4673a894 JB |
469 | { |
470 | bool first = true; | |
471 | __u16 subtype, sublen; | |
472 | ||
4673a894 JB |
473 | while (len >= 4) { |
474 | subtype = (data[0] << 8) + data[1]; | |
475 | sublen = (data[2] << 8) + data[3]; | |
476 | if (sublen > len) | |
477 | break; | |
478 | ||
479 | switch (subtype) { | |
480 | case 0x104a: | |
481 | tab_on_first(&first); | |
dffc6750 | 482 | printf("\t * Version: %d.%d\n", data[4] >> 4, data[4] & 0xF); |
4673a894 JB |
483 | break; |
484 | case 0x1011: | |
485 | tab_on_first(&first); | |
486 | printf("\t * Device name: %.*s\n", sublen, data + 4); | |
487 | break; | |
488 | case 0x1021: | |
489 | tab_on_first(&first); | |
490 | printf("\t * Manufacturer: %.*s\n", sublen, data + 4); | |
491 | break; | |
492 | case 0x1023: | |
493 | tab_on_first(&first); | |
494 | printf("\t * Model: %.*s\n", sublen, data + 4); | |
495 | break; | |
7ee5a865 JB |
496 | case 0x1057: { |
497 | __u16 val = (data[4] << 8) | data[5]; | |
498 | tab_on_first(&first); | |
499 | printf("\t * AP setup locked: 0x%.4x\n", val); | |
500 | break; | |
501 | } | |
4673a894 JB |
502 | case 0x1008: { |
503 | __u16 meth = (data[4] << 8) + data[5]; | |
504 | bool comma = false; | |
505 | tab_on_first(&first); | |
506 | printf("\t * Config methods:"); | |
507 | #define T(bit, name) do { \ | |
508 | if (meth & (1<<bit)) { \ | |
509 | if (comma) \ | |
510 | printf(","); \ | |
511 | comma = true; \ | |
512 | printf(" " name); \ | |
513 | } } while (0) | |
514 | T(0, "USB"); | |
515 | T(1, "Ethernet"); | |
516 | T(2, "Label"); | |
517 | T(3, "Display"); | |
518 | T(4, "Ext. NFC"); | |
519 | T(5, "Int. NFC"); | |
520 | T(6, "NFC Intf."); | |
521 | T(7, "PBC"); | |
522 | T(8, "Keypad"); | |
523 | printf("\n"); | |
524 | break; | |
525 | #undef T | |
526 | } | |
527 | default: | |
528 | break; | |
529 | } | |
530 | ||
531 | data += sublen + 4; | |
532 | len -= sublen + 4; | |
533 | } | |
534 | ||
535 | if (len != 0) { | |
536 | printf("\t\t * bogus tail data (%d):", len); | |
537 | while (len) { | |
538 | printf(" %.2x", *data); | |
539 | data++; | |
540 | len--; | |
541 | } | |
542 | printf("\n"); | |
543 | } | |
544 | } | |
545 | ||
83b4934c JB |
546 | static const struct ie_print wifiprinters[] = { |
547 | [1] = { "WPA", print_wifi_wpa, 2, 255, }, | |
548 | [2] = { "WMM", print_wifi_wmm, 1, 255, }, | |
549 | [4] = { "WPS", print_wifi_wps, 0, 255, }, | |
4673a894 JB |
550 | }; |
551 | ||
764fe753 JB |
552 | static void print_vendor(unsigned char len, unsigned char *data, |
553 | struct scan_params *params) | |
3563f4c5 JB |
554 | { |
555 | int i; | |
556 | ||
fbf80af5 | 557 | if (len < 3) { |
4673a894 | 558 | printf("\tVendor specific: <too short> data:"); |
fbf80af5 JB |
559 | for(i = 0; i < len; i++) |
560 | printf(" %.02x", data[i]); | |
561 | printf("\n"); | |
562 | return; | |
563 | } | |
564 | ||
857d966e | 565 | if (len >= 4 && memcmp(data, wifi_oui, 3) == 0) { |
83b4934c JB |
566 | if (data[3] < ARRAY_SIZE(wifiprinters) && wifiprinters[data[3]].name) { |
567 | print_ie(&wifiprinters[data[3]], data[3], len - 4, data + 4); | |
568 | return; | |
569 | } | |
4673a894 JB |
570 | if (!params->unknown) |
571 | return; | |
857d966e | 572 | printf("\tWiFi OUI %#.2x, data:", data[3]); |
4673a894 JB |
573 | for(i = 0; i < len - 4; i++) |
574 | printf(" %.02x", data[i + 4]); | |
575 | printf("\n"); | |
576 | return; | |
577 | } | |
578 | ||
764fe753 JB |
579 | if (!params->unknown) |
580 | return; | |
581 | ||
fbf80af5 | 582 | printf("\tVendor specific: OUI %.2x:%.2x:%.2x, data:", |
3563f4c5 | 583 | data[0], data[1], data[2]); |
fbf80af5 JB |
584 | for (i = 3; i < len; i++) |
585 | printf(" %.2x", data[i]); | |
3563f4c5 JB |
586 | printf("\n"); |
587 | } | |
588 | ||
764fe753 | 589 | static void print_ies(unsigned char *ie, int ielen, struct scan_params *params) |
3563f4c5 JB |
590 | { |
591 | while (ielen >= 2 && ielen >= ie[1]) { | |
83b4934c JB |
592 | if (ie[0] < ARRAY_SIZE(ieprinters) && ieprinters[ie[0]].name) { |
593 | print_ie(&ieprinters[ie[0]], ie[0], ie[1], ie + 2); | |
764fe753 JB |
594 | } else if (ie[0] == 221 /* vendor */) { |
595 | print_vendor(ie[1], ie + 2, params); | |
596 | } else if (params->unknown) { | |
3563f4c5 JB |
597 | int i; |
598 | ||
8086b700 | 599 | printf("\tUnknown IE (%d):", ie[0]); |
3563f4c5 | 600 | for (i=0; i<ie[1]; i++) |
8086b700 | 601 | printf(" %.2x", ie[2+i]); |
3563f4c5 JB |
602 | printf("\n"); |
603 | } | |
604 | ielen -= ie[1] + 2; | |
605 | ie += ie[1] + 2; | |
606 | } | |
607 | } | |
608 | ||
609 | static int print_bss_handler(struct nl_msg *msg, void *arg) | |
610 | { | |
611 | struct nlattr *tb[NL80211_ATTR_MAX + 1]; | |
612 | struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); | |
613 | struct nlattr *bss[NL80211_BSS_MAX + 1]; | |
614 | char mac_addr[20], dev[20]; | |
615 | static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = { | |
616 | [NL80211_BSS_TSF] = { .type = NLA_U64 }, | |
617 | [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 }, | |
618 | [NL80211_BSS_BSSID] = { }, | |
619 | [NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 }, | |
620 | [NL80211_BSS_CAPABILITY] = { .type = NLA_U16 }, | |
621 | [NL80211_BSS_INFORMATION_ELEMENTS] = { }, | |
f2e17e1f JB |
622 | [NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 }, |
623 | [NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 }, | |
3563f4c5 JB |
624 | }; |
625 | ||
626 | nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), | |
627 | genlmsg_attrlen(gnlh, 0), NULL); | |
628 | ||
629 | if (!tb[NL80211_ATTR_BSS]) { | |
630 | fprintf(stderr, "bss info missing!"); | |
631 | return NL_SKIP; | |
632 | } | |
633 | if (nla_parse_nested(bss, NL80211_BSS_MAX, | |
634 | tb[NL80211_ATTR_BSS], | |
635 | bss_policy)) { | |
636 | fprintf(stderr, "failed to parse nested attributes!"); | |
637 | return NL_SKIP; | |
638 | } | |
639 | ||
640 | if (!bss[NL80211_BSS_BSSID]) | |
641 | return NL_SKIP; | |
642 | ||
643 | mac_addr_n2a(mac_addr, nla_data(bss[NL80211_BSS_BSSID])); | |
644 | if_indextoname(nla_get_u32(tb[NL80211_ATTR_IFINDEX]), dev); | |
645 | printf("BSS %s (on %s)\n", mac_addr, dev); | |
646 | ||
e7109a8a JB |
647 | if (bss[NL80211_BSS_TSF]) { |
648 | unsigned long long tsf; | |
649 | tsf = (unsigned long long)nla_get_u64(bss[NL80211_BSS_TSF]); | |
650 | printf("\tTSF: %llu usec (%llud, %.2lld:%.2llu:%.2llu)\n", | |
651 | tsf, tsf/1000/1000/60/60/24, (tsf/1000/1000/60/60) % 24, | |
652 | (tsf/1000/1000/60) % 60, (tsf/1000/1000) % 60); | |
653 | } | |
3563f4c5 JB |
654 | if (bss[NL80211_BSS_FREQUENCY]) |
655 | printf("\tfreq: %d\n", | |
656 | nla_get_u32(bss[NL80211_BSS_FREQUENCY])); | |
657 | if (bss[NL80211_BSS_BEACON_INTERVAL]) | |
658 | printf("\tbeacon interval: %d\n", | |
659 | nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL])); | |
92a04ecd MH |
660 | if (bss[NL80211_BSS_CAPABILITY]) { |
661 | __u16 capa = nla_get_u16(bss[NL80211_BSS_CAPABILITY]); | |
662 | printf("\tcapability:"); | |
663 | if (capa & WLAN_CAPABILITY_ESS) | |
664 | printf(" ESS"); | |
665 | if (capa & WLAN_CAPABILITY_IBSS) | |
666 | printf(" IBSS"); | |
667 | if (capa & WLAN_CAPABILITY_PRIVACY) | |
668 | printf(" Privacy"); | |
669 | if (capa & WLAN_CAPABILITY_SHORT_PREAMBLE) | |
670 | printf(" ShortPreamble"); | |
671 | if (capa & WLAN_CAPABILITY_PBCC) | |
672 | printf(" PBCC"); | |
673 | if (capa & WLAN_CAPABILITY_CHANNEL_AGILITY) | |
674 | printf(" ChannelAgility"); | |
675 | if (capa & WLAN_CAPABILITY_SPECTRUM_MGMT) | |
676 | printf(" SpectrumMgmt"); | |
677 | if (capa & WLAN_CAPABILITY_QOS) | |
678 | printf(" QoS"); | |
679 | if (capa & WLAN_CAPABILITY_SHORT_SLOT_TIME) | |
680 | printf(" ShortSlotTime"); | |
681 | if (capa & WLAN_CAPABILITY_APSD) | |
682 | printf(" APSD"); | |
683 | if (capa & WLAN_CAPABILITY_DSSS_OFDM) | |
684 | printf(" DSSS-OFDM"); | |
685 | printf(" (0x%.4x)\n", capa); | |
686 | } | |
f2e17e1f JB |
687 | if (bss[NL80211_BSS_SIGNAL_MBM]) { |
688 | int s = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]); | |
689 | printf("\tsignal: %d.%.2d dBm\n", s/100, s%100); | |
690 | } | |
691 | if (bss[NL80211_BSS_SIGNAL_UNSPEC]) { | |
692 | unsigned char s = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]); | |
693 | printf("\tsignal: %d/100\n", s); | |
694 | } | |
3563f4c5 JB |
695 | if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) |
696 | print_ies(nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]), | |
764fe753 JB |
697 | nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]), |
698 | arg); | |
3563f4c5 JB |
699 | |
700 | return NL_SKIP; | |
701 | } | |
702 | ||
764fe753 | 703 | static struct scan_params scan_params; |
3563f4c5 | 704 | |
7c37a24d JB |
705 | static int handle_scan_dump(struct nl80211_state *state, |
706 | struct nl_cb *cb, | |
3563f4c5 JB |
707 | struct nl_msg *msg, |
708 | int argc, char **argv) | |
709 | { | |
764fe753 JB |
710 | if (argc > 1) |
711 | return 1; | |
712 | ||
713 | scan_params.unknown = false; | |
714 | if (argc == 1 && !strcmp(argv[0], "-u")) | |
715 | scan_params.unknown = true; | |
716 | ||
717 | nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, print_bss_handler, | |
718 | &scan_params); | |
3563f4c5 JB |
719 | return 0; |
720 | } | |
764fe753 | 721 | COMMAND(scan, dump, "[-u]", |
3563f4c5 | 722 | NL80211_CMD_GET_SCAN, NLM_F_DUMP, CIB_NETDEV, handle_scan_dump); |
a5fe4ef2 JB |
723 | |
724 | static int handle_scan_combined(struct nl80211_state *state, | |
725 | struct nl_cb *cb, | |
726 | struct nl_msg *msg, | |
727 | int argc, char **argv) | |
728 | { | |
559a1713 JB |
729 | char **trig_argv; |
730 | /* static char *trig_argv[] = { | |
a5fe4ef2 JB |
731 | NULL, |
732 | "scan", | |
733 | "trigger", | |
559a1713 | 734 | };*/ |
a5fe4ef2 JB |
735 | static char *dump_argv[] = { |
736 | NULL, | |
737 | "scan", | |
738 | "dump", | |
92649eab | 739 | NULL, |
a5fe4ef2 JB |
740 | }; |
741 | static const __u32 cmds[] = { | |
742 | NL80211_CMD_NEW_SCAN_RESULTS, | |
743 | NL80211_CMD_SCAN_ABORTED, | |
744 | }; | |
559a1713 | 745 | int trig_argc, dump_argc, err; |
a5fe4ef2 | 746 | |
559a1713 JB |
747 | if (argc >= 3 && !strcmp(argv[2], "-u")) { |
748 | dump_argc = 4; | |
749 | dump_argv[3] = "-u"; | |
750 | } else | |
751 | dump_argc = 3; | |
752 | ||
753 | trig_argc = 3 + (argc - 2) + (3 - dump_argc); | |
754 | trig_argv = calloc(trig_argc, sizeof(*trig_argv)); | |
755 | if (!trig_argv) | |
756 | return -ENOMEM; | |
a5fe4ef2 | 757 | trig_argv[0] = argv[0]; |
559a1713 JB |
758 | trig_argv[1] = "scan"; |
759 | trig_argv[2] = "trigger"; | |
760 | int i; | |
761 | for (i = 0; i < argc - 2 - (dump_argc - 3); i++) | |
762 | trig_argv[i + 3] = argv[i + 2 + (dump_argc - 3)]; | |
763 | err = handle_cmd(state, II_NETDEV, trig_argc, trig_argv); | |
764 | free(trig_argv); | |
a5fe4ef2 JB |
765 | if (err) |
766 | return err; | |
767 | ||
61725dbe JB |
768 | /* |
769 | * WARNING: DO NOT COPY THIS CODE INTO YOUR APPLICATION | |
770 | * | |
771 | * This code has a bug, which requires creating a separate | |
772 | * nl80211 socket to fix: | |
773 | * It is possible for a NL80211_CMD_NEW_SCAN_RESULTS or | |
774 | * NL80211_CMD_SCAN_ABORTED message to be sent by the kernel | |
775 | * before (!) we listen to it, because we only start listening | |
776 | * after we send our scan request. | |
777 | * | |
778 | * Doing it the other way around has a race condition as well, | |
779 | * if you first open the events socket you may get a notification | |
780 | * for a previous scan. | |
781 | * | |
782 | * The only proper way to fix this would be to listen to events | |
783 | * before sending the command, and for the kernel to send the | |
784 | * scan request along with the event, so that you can match up | |
785 | * whether the scan you requested was finished or aborted (this | |
786 | * may result in processing a scan that another application | |
787 | * requested, but that doesn't seem to be a problem). | |
788 | * | |
789 | * Alas, the kernel doesn't do that (yet). | |
790 | */ | |
791 | ||
a5fe4ef2 JB |
792 | if (listen_events(state, ARRAY_SIZE(cmds), cmds) == |
793 | NL80211_CMD_SCAN_ABORTED) { | |
794 | printf("scan aborted!\n"); | |
795 | return 0; | |
796 | } | |
797 | ||
798 | dump_argv[0] = argv[0]; | |
92649eab | 799 | return handle_cmd(state, II_NETDEV, dump_argc, dump_argv); |
a5fe4ef2 | 800 | } |
559a1713 | 801 | TOPLEVEL(scan, "[-u] [freq <freq>*] [ssid <ssid>*|passive]", 0, 0, CIB_NETDEV, handle_scan_combined); |