6 #include <netlink/genl/genl.h>
7 #include <netlink/genl/family.h>
8 #include <netlink/genl/ctrl.h>
9 #include <netlink/msg.h>
10 #include <netlink/attr.h>
15 #define WLAN_CAPABILITY_ESS (1<<0)
16 #define WLAN_CAPABILITY_IBSS (1<<1)
17 #define WLAN_CAPABILITY_CF_POLLABLE (1<<2)
18 #define WLAN_CAPABILITY_CF_POLL_REQUEST (1<<3)
19 #define WLAN_CAPABILITY_PRIVACY (1<<4)
20 #define WLAN_CAPABILITY_SHORT_PREAMBLE (1<<5)
21 #define WLAN_CAPABILITY_PBCC (1<<6)
22 #define WLAN_CAPABILITY_CHANNEL_AGILITY (1<<7)
23 #define WLAN_CAPABILITY_SPECTRUM_MGMT (1<<8)
24 #define WLAN_CAPABILITY_QOS (1<<9)
25 #define WLAN_CAPABILITY_SHORT_SLOT_TIME (1<<10)
26 #define WLAN_CAPABILITY_APSD (1<<11)
27 #define WLAN_CAPABILITY_RADIO_MEASURE (1<<12)
28 #define WLAN_CAPABILITY_DSSS_OFDM (1<<13)
29 #define WLAN_CAPABILITY_DEL_BACK (1<<14)
30 #define WLAN_CAPABILITY_IMM_BACK (1<<15)
31 /* DMG (60gHz) 802.11ad */
32 /* type - bits 0..1 */
33 #define WLAN_CAPABILITY_DMG_TYPE_MASK (3<<0)
35 #define WLAN_CAPABILITY_DMG_TYPE_IBSS (1<<0) /* Tx by: STA */
36 #define WLAN_CAPABILITY_DMG_TYPE_PBSS (2<<0) /* Tx by: PCP */
37 #define WLAN_CAPABILITY_DMG_TYPE_AP (3<<0) /* Tx by: AP */
39 #define WLAN_CAPABILITY_DMG_CBAP_ONLY (1<<2)
40 #define WLAN_CAPABILITY_DMG_CBAP_SOURCE (1<<3)
41 #define WLAN_CAPABILITY_DMG_PRIVACY (1<<4)
42 #define WLAN_CAPABILITY_DMG_ECPAC (1<<5)
44 #define WLAN_CAPABILITY_DMG_SPECTRUM_MGMT (1<<8)
45 #define WLAN_CAPABILITY_DMG_RADIO_MEASURE (1<<12)
47 static unsigned char ms_oui
[3] = { 0x00, 0x50, 0xf2 };
48 static unsigned char ieee80211_oui
[3] = { 0x00, 0x0f, 0xac };
49 static unsigned char wfa_oui
[3] = { 0x50, 0x6f, 0x9a };
53 enum print_ie_type type
;
54 bool show_both_ie_sets
;
57 #define IEEE80211_COUNTRY_EXTENSION_ID 201
59 union ieee80211_country_ie_triplet
{
64 } __attribute__ ((packed
)) chans
;
66 __u8 reg_extension_id
;
69 } __attribute__ ((packed
)) ext
;
70 } __attribute__ ((packed
));
72 int parse_sched_scan(struct nl_msg
*msg
, int *argc
, char ***argv
)
74 struct nl_msg
*matchset
= NULL
, *freqs
= NULL
, *ssids
= NULL
;
75 struct nl_msg
*scan_plans
= NULL
;
76 struct nlattr
*match
= NULL
, *plan
= NULL
;
83 } parse_state
= ND_TOPLEVEL
;
85 char *end
, **v
= *argv
;
87 unsigned int freq
, interval
= 0, delay
= 0, iterations
= 0;
88 bool have_matchset
= false, have_freqs
= false, have_ssids
= false;
89 bool have_active
= false, have_passive
= false, have_plans
= false;
92 matchset
= nlmsg_alloc();
98 freqs
= nlmsg_alloc();
104 ssids
= nlmsg_alloc();
110 scan_plans
= nlmsg_alloc();
117 switch (parse_state
) {
119 if (!strcmp(v
[0], "interval")) {
123 goto nla_put_failure
;
126 if (interval
|| have_plans
) {
128 goto nla_put_failure
;
130 interval
= strtoul(v
[0], &end
, 10);
131 if (*end
|| !interval
) {
133 goto nla_put_failure
;
136 NL80211_ATTR_SCHED_SCAN_INTERVAL
,
138 } else if (!strcmp(v
[0], "scan_plans")) {
139 parse_state
= ND_PLANS
;
140 if (have_plans
|| interval
) {
142 goto nla_put_failure
;
147 } else if (!strcmp(v
[0], "delay")) {
151 goto nla_put_failure
;
156 goto nla_put_failure
;
158 delay
= strtoul(v
[0], &end
, 10);
161 goto nla_put_failure
;
164 NL80211_ATTR_SCHED_SCAN_DELAY
,
166 } else if (!strcmp(v
[0], "matches")) {
167 parse_state
= ND_MATCH
;
170 goto nla_put_failure
;
174 } else if (!strcmp(v
[0], "freqs")) {
175 parse_state
= ND_FREQS
;
178 goto nla_put_failure
;
183 } else if (!strcmp(v
[0], "active")) {
184 parse_state
= ND_ACTIVE
;
185 if (have_active
|| have_passive
) {
187 goto nla_put_failure
;
192 } else if (!strcmp(v
[0], "passive")) {
193 if (have_active
|| have_passive
) {
195 goto nla_put_failure
;
199 } else if (!strncmp(v
[0], "randomise", 9) ||
200 !strncmp(v
[0], "randomize", 9)) {
201 flags
|= NL80211_SCAN_FLAG_RANDOM_ADDR
;
202 err
= parse_random_mac_addr(msg
, v
[0] + 9);
204 goto nla_put_failure
;
206 /* this element is not for us, so
207 * return to continue parsing.
209 goto nla_put_failure
;
215 if (!strcmp(v
[0], "ssid")) {
219 goto nla_put_failure
;
222 /* TODO: for now we can only have an
223 * SSID in the match, so we can start
224 * the match nest here.
226 match
= nla_nest_start(matchset
, i
);
229 goto nla_put_failure
;
233 NL80211_SCHED_SCAN_MATCH_ATTR_SSID
,
235 nla_nest_end(matchset
, match
);
238 have_matchset
= true;
242 /* other element that cannot be part
243 * of a match indicates the end of the
245 /* need at least one match in the matchset */
248 goto nla_put_failure
;
251 parse_state
= ND_TOPLEVEL
;
256 freq
= strtoul(v
[0], &end
, 10);
260 goto nla_put_failure
;
263 parse_state
= ND_TOPLEVEL
;
265 NLA_PUT_U32(freqs
, i
, freq
);
271 if (!strcmp(v
[0], "ssid")) {
275 goto nla_put_failure
;
279 NL80211_SCHED_SCAN_MATCH_ATTR_SSID
,
286 /* other element that cannot be part
287 * of a match indicates the end of the
289 /* need at least one item in the set */
292 goto nla_put_failure
;
295 parse_state
= ND_TOPLEVEL
;
300 interval
= strtoul(v
[0], &end
, 10);
306 goto nla_put_failure
;
310 iterations
= strtoul(iter
, &end
, 10);
311 if (*end
|| !iterations
) {
313 goto nla_put_failure
;
317 plan
= nla_nest_start(scan_plans
, i
+ 1);
320 goto nla_put_failure
;
323 NLA_PUT_U32(scan_plans
,
324 NL80211_SCHED_SCAN_PLAN_INTERVAL
,
328 NLA_PUT_U32(scan_plans
,
329 NL80211_SCHED_SCAN_PLAN_ITERATIONS
,
332 parse_state
= ND_TOPLEVEL
;
334 nla_nest_end(scan_plans
, plan
);
343 NLA_PUT(ssids
, 1, 0, "");
345 nla_put_nested(msg
, NL80211_ATTR_SCAN_SSIDS
, ssids
);
347 nla_put_nested(msg
, NL80211_ATTR_SCAN_FREQUENCIES
, freqs
);
349 nla_put_nested(msg
, NL80211_ATTR_SCHED_SCAN_MATCH
, matchset
);
351 nla_put_nested(msg
, NL80211_ATTR_SCHED_SCAN_PLANS
, scan_plans
);
353 NLA_PUT_U32(msg
, NL80211_ATTR_SCAN_FLAGS
, flags
);
357 nla_nest_end(msg
, match
);
360 nlmsg_free(matchset
);
361 nlmsg_free(scan_plans
);
369 static int handle_scan(struct nl80211_state
*state
,
371 int argc
, char **argv
,
374 struct nl_msg
*ssids
= NULL
, *freqs
= NULL
;
388 unsigned int duration
= 0;
389 bool passive
= false, have_ssids
= false, have_freqs
= false;
390 bool duration_mandatory
= false;
391 size_t ies_len
= 0, meshid_len
= 0;
392 unsigned char *ies
= NULL
, *meshid
= NULL
, *tmpies
= NULL
;
393 unsigned int flags
= 0;
395 ssids
= nlmsg_alloc();
399 freqs
= nlmsg_alloc();
405 for (i
= 0; i
< argc
; i
++) {
408 if (strcmp(argv
[i
], "freq") == 0) {
412 } else if (strcmp(argv
[i
], "ies") == 0) {
415 } else if (strcmp(argv
[i
], "lowpri") == 0) {
416 flags
|= NL80211_SCAN_FLAG_LOW_PRIORITY
;
418 } else if (strcmp(argv
[i
], "flush") == 0) {
419 flags
|= NL80211_SCAN_FLAG_FLUSH
;
421 } else if (strcmp(argv
[i
], "ap-force") == 0) {
422 flags
|= NL80211_SCAN_FLAG_AP
;
424 } else if (strcmp(argv
[i
], "duration-mandatory") == 0) {
425 duration_mandatory
= true;
427 } else if (strncmp(argv
[i
], "randomise", 9) == 0 ||
428 strncmp(argv
[i
], "randomize", 9) == 0) {
429 flags
|= NL80211_SCAN_FLAG_RANDOM_ADDR
;
430 err
= parse_random_mac_addr(msg
, argv
[i
] + 9);
432 goto nla_put_failure
;
434 } else if (strcmp(argv
[i
], "ssid") == 0) {
438 } else if (strcmp(argv
[i
], "passive") == 0) {
442 } else if (strcmp(argv
[i
], "meshid") == 0) {
445 } else if (strcmp(argv
[i
], "duration") == 0) {
449 /* fall through - this is an error */
452 goto nla_put_failure
;
454 freq
= strtoul(argv
[i
], &eptr
, 10);
455 if (eptr
!= argv
[i
] + strlen(argv
[i
])) {
456 /* failed to parse as number -- maybe a tag? */
461 NLA_PUT_U32(freqs
, i
, freq
);
466 ies
= parse_hex(argv
[i
], &ies_len
);
468 goto nla_put_failure
;
472 NLA_PUT(ssids
, i
, strlen(argv
[i
]), argv
[i
]);
475 meshid_len
= strlen(argv
[i
]);
476 meshid
= (unsigned char *) malloc(meshid_len
+ 2);
478 goto nla_put_failure
;
479 meshid
[0] = 114; /* mesh element id */
480 meshid
[1] = meshid_len
;
481 memcpy(&meshid
[2], argv
[i
], meshid_len
);
486 duration
= strtoul(argv
[i
], &eptr
, 10);
493 tmpies
= (unsigned char *) malloc(ies_len
+ meshid_len
);
495 goto nla_put_failure
;
497 memcpy(tmpies
, ies
, ies_len
);
499 memcpy(&tmpies
[ies_len
], meshid
, meshid_len
);
500 if (nla_put(msg
, NL80211_ATTR_IE
, ies_len
+ meshid_len
, tmpies
) < 0)
501 goto nla_put_failure
;
505 NLA_PUT(ssids
, 1, 0, "");
507 nla_put_nested(msg
, NL80211_ATTR_SCAN_SSIDS
, ssids
);
510 nla_put_nested(msg
, NL80211_ATTR_SCAN_FREQUENCIES
, freqs
);
512 NLA_PUT_U32(msg
, NL80211_ATTR_SCAN_FLAGS
, flags
);
514 NLA_PUT_U16(msg
, NL80211_ATTR_MEASUREMENT_DURATION
, duration
);
515 if (duration_mandatory
) {
518 NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY
);
521 goto nla_put_failure
;
538 static void tab_on_first(bool *first
)
546 struct print_ies_data
{
551 static void print_ssid(const uint8_t type
, uint8_t len
, const uint8_t *data
,
552 const struct print_ies_data
*ie_buffer
)
555 print_ssid_escaped(len
, data
);
559 #define BSS_MEMBERSHIP_SELECTOR_VHT_PHY 126
560 #define BSS_MEMBERSHIP_SELECTOR_HT_PHY 127
562 static void print_supprates(const uint8_t type
, uint8_t len
,
564 const struct print_ies_data
*ie_buffer
)
570 for (i
= 0; i
< len
; i
++) {
571 int r
= data
[i
] & 0x7f;
573 if (r
== BSS_MEMBERSHIP_SELECTOR_VHT_PHY
&& data
[i
] & 0x80)
575 else if (r
== BSS_MEMBERSHIP_SELECTOR_HT_PHY
&& data
[i
] & 0x80)
578 printf("%d.%d", r
/2, 5*(r
&1));
580 printf("%s ", data
[i
] & 0x80 ? "*" : "");
585 static void print_rm_enabled_capabilities(const uint8_t type
, uint8_t len
,
587 const struct print_ies_data
*ie_buffer
)
589 __u64 capa
= data
[0] |
593 ((__u64
) data
[4]) << 32;
596 printf("\t\tCapabilities: 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x\n",
601 #define PRINT_RM_CAPA(_bit, _str) \
603 if (capa & BIT(_bit)) \
604 printf("\t\t\t" _str "\n"); \
607 PRINT_RM_CAPA(0, "Link Measurement");
608 PRINT_RM_CAPA(1, "Neighbor Report");
609 PRINT_RM_CAPA(2, "Parallel Measurements");
610 PRINT_RM_CAPA(3, "Repeated Measurements");
611 PRINT_RM_CAPA(4, "Beacon Passive Measurement");
612 PRINT_RM_CAPA(5, "Beacon Active Measurement");
613 PRINT_RM_CAPA(6, "Beacon Table Measurement");
614 PRINT_RM_CAPA(7, "Beacon Measurement Reporting Conditions");
615 PRINT_RM_CAPA(8, "Frame Measurement");
616 PRINT_RM_CAPA(9, "Channel Load");
617 PRINT_RM_CAPA(10, "Noise Histogram Measurement");
618 PRINT_RM_CAPA(11, "Statistics Measurement");
619 PRINT_RM_CAPA(12, "LCI Measurement");
620 PRINT_RM_CAPA(13, "LCI Azimuth");
621 PRINT_RM_CAPA(14, "Transmit Stream/Category Measurement");
622 PRINT_RM_CAPA(15, "Triggered Transmit Stream/Category");
623 PRINT_RM_CAPA(16, "AP Channel Report");
624 PRINT_RM_CAPA(17, "RM MIB Capability");
626 PRINT_RM_CAPA(27, "Measurement Pilot Transmission Information");
627 PRINT_RM_CAPA(28, "Neighbor Report TSF Offset");
628 PRINT_RM_CAPA(29, "RCPI Measurement");
629 PRINT_RM_CAPA(30, "RSNI Measurement");
630 PRINT_RM_CAPA(31, "BSS Average Access Delay");
631 PRINT_RM_CAPA(32, "BSS Available Admission");
632 PRINT_RM_CAPA(33, "Antenna");
633 PRINT_RM_CAPA(34, "FTM Range Report");
634 PRINT_RM_CAPA(35, "Civic Location Measurement");
636 printf("\t\tNonoperating Channel Max Measurement Duration: %i\n", data
[3] >> 5);
637 printf("\t\tMeasurement Pilot Capability: %i\n", data
[4] & 7);
640 static void print_ds(const uint8_t type
, uint8_t len
, const uint8_t *data
,
641 const struct print_ies_data
*ie_buffer
)
643 printf(" channel %d\n", data
[0]);
646 static const char *country_env_str(char environment
)
648 switch (environment
) {
650 return "Indoor only";
652 return "Outdoor only";
654 return "Indoor/Outdoor";
660 static void print_country(const uint8_t type
, uint8_t len
, const uint8_t *data
,
661 const struct print_ies_data
*ie_buffer
)
663 printf(" %.*s", 2, data
);
665 printf("\tEnvironment: %s\n", country_env_str(data
[2]));
671 printf("\t\tNo country IE triplets present\n");
677 union ieee80211_country_ie_triplet
*triplet
= (void *) data
;
679 if (triplet
->ext
.reg_extension_id
>= IEEE80211_COUNTRY_EXTENSION_ID
) {
680 printf("\t\tExtension ID: %d Regulatory Class: %d Coverage class: %d (up to %dm)\n",
681 triplet
->ext
.reg_extension_id
,
682 triplet
->ext
.reg_class
,
683 triplet
->ext
.coverage_class
,
684 triplet
->ext
.coverage_class
* 450);
692 if (triplet
->chans
.first_channel
<= 14)
693 end_channel
= triplet
->chans
.first_channel
+ (triplet
->chans
.num_channels
- 1);
695 end_channel
= triplet
->chans
.first_channel
+ (4 * (triplet
->chans
.num_channels
- 1));
697 printf("\t\tChannels [%d - %d] @ %d dBm\n", triplet
->chans
.first_channel
, end_channel
, triplet
->chans
.max_power
);
706 static void print_powerconstraint(const uint8_t type
, uint8_t len
,
708 const struct print_ies_data
*ie_buffer
)
710 printf(" %d dB\n", data
[0]);
713 static void print_tpcreport(const uint8_t type
, uint8_t len
,
715 const struct print_ies_data
*ie_buffer
)
717 printf(" TX power: %d dBm\n", data
[0]);
718 /* printf(" Link Margin (%d dB) is reserved in Beacons\n", data[1]); */
721 static void print_erp(const uint8_t type
, uint8_t len
, const uint8_t *data
,
722 const struct print_ies_data
*ie_buffer
)
725 printf(" <no flags>");
727 printf(" NonERP_Present");
729 printf(" Use_Protection");
731 printf(" Barker_Preamble_Mode");
735 static void print_cipher(const uint8_t *data
)
737 if (memcmp(data
, ms_oui
, 3) == 0) {
740 printf("Use group cipher suite");
755 printf("%.02x-%.02x-%.02x:%d",
756 data
[0], data
[1] ,data
[2], data
[3]);
759 } else if (memcmp(data
, ieee80211_oui
, 3) == 0) {
762 printf("Use group cipher suite");
777 printf("AES-128-CMAC");
786 printf("%.02x-%.02x-%.02x:%d",
787 data
[0], data
[1] ,data
[2], data
[3]);
791 printf("%.02x-%.02x-%.02x:%d",
792 data
[0], data
[1] ,data
[2], data
[3]);
795 static void print_auth(const uint8_t *data
)
797 if (memcmp(data
, ms_oui
, 3) == 0) {
800 printf("IEEE 802.1X");
806 printf("%.02x-%.02x-%.02x:%d",
807 data
[0], data
[1] ,data
[2], data
[3]);
810 } else if (memcmp(data
, ieee80211_oui
, 3) == 0) {
813 printf("IEEE 802.1X");
819 printf("FT/IEEE 802.1X");
825 printf("IEEE 802.1X/SHA-256");
828 printf("PSK/SHA-256");
840 printf("IEEE 802.1X/SUITE-B");
843 printf("IEEE 802.1X/SUITE-B-192");
846 printf("FT/IEEE 802.1X/SHA-384");
849 printf("FILS/SHA-256");
852 printf("FILS/SHA-384");
855 printf("FT/FILS/SHA-256");
858 printf("FT/FILS/SHA-384");
864 printf("%.02x-%.02x-%.02x:%d",
865 data
[0], data
[1] ,data
[2], data
[3]);
868 } else if (memcmp(data
, wfa_oui
, 3) == 0) {
877 printf("%.02x-%.02x-%.02x:%d",
878 data
[0], data
[1] ,data
[2], data
[3]);
882 printf("%.02x-%.02x-%.02x:%d",
883 data
[0], data
[1] ,data
[2], data
[3]);
886 static void _print_rsn_ie(const char *defcipher
, const char *defauth
,
887 uint8_t len
, const uint8_t *data
, int is_osen
)
895 version
= data
[0] + (data
[1] << 8);
896 tab_on_first(&first
);
897 printf("\t * Version: %d\n", version
);
904 tab_on_first(&first
);
905 printf("\t * Group cipher: %s\n", defcipher
);
906 printf("\t * Pairwise ciphers: %s\n", defcipher
);
910 tab_on_first(&first
);
911 printf("\t * Group cipher: ");
919 tab_on_first(&first
);
920 printf("\t * Pairwise ciphers: %s\n", defcipher
);
924 count
= data
[0] | (data
[1] << 8);
925 if (2 + (count
* 4) > len
)
928 tab_on_first(&first
);
929 printf("\t * Pairwise ciphers:");
930 for (i
= 0; i
< count
; i
++) {
932 print_cipher(data
+ 2 + (i
* 4));
936 data
+= 2 + (count
* 4);
937 len
-= 2 + (count
* 4);
940 tab_on_first(&first
);
941 printf("\t * Authentication suites: %s\n", defauth
);
945 count
= data
[0] | (data
[1] << 8);
946 if (2 + (count
* 4) > len
)
949 tab_on_first(&first
);
950 printf("\t * Authentication suites:");
951 for (i
= 0; i
< count
; i
++) {
953 print_auth(data
+ 2 + (i
* 4));
957 data
+= 2 + (count
* 4);
958 len
-= 2 + (count
* 4);
961 capa
= data
[0] | (data
[1] << 8);
962 tab_on_first(&first
);
963 printf("\t * Capabilities:");
967 printf(" NoPairwise");
968 switch ((capa
& 0x000c) >> 2) {
970 printf(" 1-PTKSA-RC");
973 printf(" 2-PTKSA-RC");
976 printf(" 4-PTKSA-RC");
979 printf(" 16-PTKSA-RC");
982 switch ((capa
& 0x0030) >> 4) {
984 printf(" 1-GTKSA-RC");
987 printf(" 2-GTKSA-RC");
990 printf(" 4-GTKSA-RC");
993 printf(" 16-GTKSA-RC");
997 printf(" MFP-required");
999 printf(" MFP-capable");
1001 printf(" Peerkey-enabled");
1003 printf(" SPP-AMSDU-capable");
1005 printf(" SPP-AMSDU-required");
1006 printf(" (0x%.4x)\n", capa
);
1012 int pmkid_count
= data
[0] | (data
[1] << 8);
1014 if (len
>= 2 + 16 * pmkid_count
) {
1015 tab_on_first(&first
);
1016 printf("\t * %d PMKIDs\n", pmkid_count
);
1017 /* not printing PMKID values */
1018 data
+= 2 + 16 * pmkid_count
;
1019 len
-= 2 + 16 * pmkid_count
;
1025 tab_on_first(&first
);
1026 printf("\t * Group mgmt cipher suite: ");
1035 printf("\t\t * bogus tail data (%d):", len
);
1037 printf(" %.2x", *data
);
1045 static void print_rsn_ie(const char *defcipher
, const char *defauth
,
1046 uint8_t len
, const uint8_t *data
)
1048 _print_rsn_ie(defcipher
, defauth
, len
, data
, 0);
1051 static void print_osen_ie(const char *defcipher
, const char *defauth
,
1052 uint8_t len
, const uint8_t *data
)
1055 _print_rsn_ie(defcipher
, defauth
, len
, data
, 1);
1058 static void print_rsn(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1059 const struct print_ies_data
*ie_buffer
)
1061 print_rsn_ie("CCMP", "IEEE 802.1X", len
, data
);
1064 static void print_ht_capa(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1065 const struct print_ies_data
*ie_buffer
)
1068 print_ht_capability(data
[0] | (data
[1] << 8));
1069 print_ampdu_length(data
[2] & 3);
1070 print_ampdu_spacing((data
[2] >> 2) & 7);
1071 print_ht_mcs(data
+ 3);
1074 static const char* ntype_11u(uint8_t t
)
1077 case 0: return "Private";
1078 case 1: return "Private with Guest";
1079 case 2: return "Chargeable Public";
1080 case 3: return "Free Public";
1081 case 4: return "Personal Device";
1082 case 5: return "Emergency Services Only";
1083 case 14: return "Test or Experimental";
1084 case 15: return "Wildcard";
1085 default: return "Reserved";
1089 static const char* vgroup_11u(uint8_t t
)
1092 case 0: return "Unspecified";
1093 case 1: return "Assembly";
1094 case 2: return "Business";
1095 case 3: return "Educational";
1096 case 4: return "Factory and Industrial";
1097 case 5: return "Institutional";
1098 case 6: return "Mercantile";
1099 case 7: return "Residential";
1100 case 8: return "Storage";
1101 case 9: return "Utility and Miscellaneous";
1102 case 10: return "Vehicular";
1103 case 11: return "Outdoor";
1104 default: return "Reserved";
1108 static void print_interworking(const uint8_t type
, uint8_t len
,
1109 const uint8_t *data
,
1110 const struct print_ies_data
*ie_buffer
)
1112 /* See Section 7.3.2.92 in the 802.11u spec. */
1115 uint8_t ano
= data
[0];
1116 printf("\t\tNetwork Options: 0x%hx\n", (unsigned short)(ano
));
1117 printf("\t\t\tNetwork Type: %i (%s)\n",
1118 (int)(ano
& 0xf), ntype_11u(ano
& 0xf));
1120 printf("\t\t\tInternet\n");
1122 printf("\t\t\tASRA\n");
1124 printf("\t\t\tESR\n");
1126 printf("\t\t\tUESA\n");
1128 if ((len
== 3) || (len
== 9)) {
1129 printf("\t\tVenue Group: %i (%s)\n",
1130 (int)(data
[1]), vgroup_11u(data
[1]));
1131 printf("\t\tVenue Type: %i\n", (int)(data
[2]));
1134 printf("\t\tHESSID: %02hx:%02hx:%02hx:%02hx:%02hx:%02hx\n",
1135 data
[3], data
[4], data
[5], data
[6], data
[7], data
[8]);
1137 printf("\t\tHESSID: %02hx:%02hx:%02hx:%02hx:%02hx:%02hx\n",
1138 data
[1], data
[2], data
[3], data
[4], data
[5], data
[6]);
1141 static void print_11u_advert(const uint8_t type
, uint8_t len
,
1142 const uint8_t *data
,
1143 const struct print_ies_data
*ie_buffer
)
1145 /* See Section 7.3.2.93 in the 802.11u spec. */
1146 /* TODO: This code below does not decode private protocol IDs */
1149 while (idx
< (len
- 1)) {
1150 uint8_t qri
= data
[idx
];
1151 uint8_t proto_id
= data
[idx
+ 1];
1152 printf("\t\tQuery Response Info: 0x%hx\n", (unsigned short)(qri
));
1153 printf("\t\t\tQuery Response Length Limit: %i\n",
1156 printf("\t\t\tPAME-BI\n");
1159 printf("\t\t\tANQP\n"); break;
1161 printf("\t\t\tMIH Information Service\n"); break;
1163 printf("\t\t\tMIH Command and Event Services Capability Discovery\n"); break;
1165 printf("\t\t\tEmergency Alert System (EAS)\n"); break;
1167 printf("\t\t\tVendor Specific\n"); break;
1169 printf("\t\t\tReserved: %i\n", proto_id
); break;
1175 static void print_11u_rcon(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1176 const struct print_ies_data
*ie_buffer
)
1178 /* See Section 7.3.2.96 in the 802.11u spec. */
1180 int ln0
= data
[1] & 0xf;
1181 int ln1
= ((data
[1] & 0xf0) >> 4);
1186 ln2
= len
- 2 - ln0
- ln1
;
1188 printf("\t\tANQP OIs: %i\n", data
[0]);
1191 printf("\t\tOI 1: ");
1192 if (2 + ln0
> len
) {
1193 printf("Invalid IE length.\n");
1195 for (idx
= 0; idx
< ln0
; idx
++) {
1196 printf("%02hx", data
[2 + idx
]);
1203 printf("\t\tOI 2: ");
1204 if (2 + ln0
+ ln1
> len
) {
1205 printf("Invalid IE length.\n");
1207 for (idx
= 0; idx
< ln1
; idx
++) {
1208 printf("%02hx", data
[2 + ln0
+ idx
]);
1215 printf("\t\tOI 3: ");
1216 if (2 + ln0
+ ln1
+ ln2
> len
) {
1217 printf("Invalid IE length.\n");
1219 for (idx
= 0; idx
< ln2
; idx
++) {
1220 printf("%02hx", data
[2 + ln0
+ ln1
+ idx
]);
1227 static const char *ht_secondary_offset
[4] = {
1234 static void print_ht_op(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1235 const struct print_ies_data
*ie_buffer
)
1237 static const char *protection
[4] = {
1243 static const char *sta_chan_width
[2] = {
1249 printf("\t\t * primary channel: %d\n", data
[0]);
1250 printf("\t\t * secondary channel offset: %s\n",
1251 ht_secondary_offset
[data
[1] & 0x3]);
1252 printf("\t\t * STA channel width: %s\n", sta_chan_width
[(data
[1] & 0x4)>>2]);
1253 printf("\t\t * RIFS: %d\n", (data
[1] & 0x8)>>3);
1254 printf("\t\t * HT protection: %s\n", protection
[data
[2] & 0x3]);
1255 printf("\t\t * non-GF present: %d\n", (data
[2] & 0x4) >> 2);
1256 printf("\t\t * OBSS non-GF present: %d\n", (data
[2] & 0x10) >> 4);
1257 printf("\t\t * dual beacon: %d\n", (data
[4] & 0x40) >> 6);
1258 printf("\t\t * dual CTS protection: %d\n", (data
[4] & 0x80) >> 7);
1259 printf("\t\t * STBC beacon: %d\n", data
[5] & 0x1);
1260 printf("\t\t * L-SIG TXOP Prot: %d\n", (data
[5] & 0x2) >> 1);
1261 printf("\t\t * PCO active: %d\n", (data
[5] & 0x4) >> 2);
1262 printf("\t\t * PCO phase: %d\n", (data
[5] & 0x8) >> 3);
1265 static void print_capabilities(const uint8_t type
, uint8_t len
,
1266 const uint8_t *data
,
1267 const struct print_ies_data
*ie_buffer
)
1269 int i
, base
, bit
, si_duration
= 0, max_amsdu
= 0;
1270 bool s_psmp_support
= false, is_vht_cap
= false;
1271 unsigned char *ie
= ie_buffer
->ie
;
1272 int ielen
= ie_buffer
->ielen
;
1274 while (ielen
>= 2 && ielen
>= ie
[1]) {
1283 for (i
= 0; i
< len
; i
++) {
1286 for (bit
= 0; bit
< 8; bit
++) {
1287 if (!(data
[i
] & (1 << bit
)))
1292 #define CAPA(bit, name) case bit: printf(" " name); break
1294 /* if the capability 'cap' exists add 'val' to 'sum'
1295 * otherwise print 'Reserved' */
1296 #define ADD_BIT_VAL(bit, cap, sum, val) case (bit): do { \
1298 printf(" Reserved"); \
1305 switch (bit
+ base
) {
1306 CAPA(0, "HT Information Exchange Supported");
1307 CAPA(1, "reserved (On-demand Beacon)");
1308 CAPA(2, "Extended Channel Switching");
1309 CAPA(3, "reserved (Wave Indication)");
1310 CAPA(4, "PSMP Capability");
1311 CAPA(5, "reserved (Service Interval Granularity)");
1314 s_psmp_support
= true;
1315 printf(" S-PSMP Capability");
1319 CAPA(8, "Diagnostics");
1320 CAPA(9, "Multicast Diagnostics");
1321 CAPA(10, "Location Tracking");
1323 CAPA(12, "Proxy ARP Service");
1324 CAPA(13, "Collocated Interference Reporting");
1325 CAPA(14, "Civic Location");
1326 CAPA(15, "Geospatial Location");
1328 CAPA(17, "WNM-Sleep Mode");
1329 CAPA(18, "TIM Broadcast");
1330 CAPA(19, "BSS Transition");
1331 CAPA(20, "QoS Traffic Capability");
1332 CAPA(21, "AC Station Count");
1333 CAPA(22, "Multiple BSSID");
1334 CAPA(23, "Timing Measurement");
1335 CAPA(24, "Channel Usage");
1336 CAPA(25, "SSID List");
1338 CAPA(27, "UTC TSF Offset");
1339 CAPA(28, "TDLS Peer U-APSD Buffer STA Support");
1340 CAPA(29, "TDLS Peer PSM Support");
1341 CAPA(30, "TDLS channel switching");
1342 CAPA(31, "Interworking");
1343 CAPA(32, "QoS Map");
1345 CAPA(34, "SSPN Interface");
1346 CAPA(35, "Reserved");
1347 CAPA(36, "MSGCF Capability");
1348 CAPA(37, "TDLS Support");
1349 CAPA(38, "TDLS Prohibited");
1350 CAPA(39, "TDLS Channel Switching Prohibited");
1351 CAPA(40, "Reject Unadmitted Frame");
1353 ADD_BIT_VAL(41, s_psmp_support
, si_duration
, 1);
1354 ADD_BIT_VAL(42, s_psmp_support
, si_duration
, 2);
1355 ADD_BIT_VAL(43, s_psmp_support
, si_duration
, 4);
1357 CAPA(44, "Identifier Location");
1358 CAPA(45, "U-APSD Coexistence");
1359 CAPA(46, "WNM-Notification");
1360 CAPA(47, "Reserved");
1361 CAPA(48, "UTF-8 SSID");
1362 CAPA(49, "QMFActivated");
1363 CAPA(50, "QMFReconfigurationActivated");
1364 CAPA(51, "Robust AV Streaming");
1365 CAPA(52, "Advanced GCR");
1366 CAPA(53, "Mesh GCR");
1368 CAPA(55, "QLoad Report");
1369 CAPA(56, "Alternate EDCA");
1370 CAPA(57, "Unprotected TXOP Negotiation");
1371 CAPA(58, "Protected TXOP egotiation");
1372 CAPA(59, "Reserved");
1373 CAPA(60, "Protected QLoad Report");
1374 CAPA(61, "TDLS Wider Bandwidth");
1375 CAPA(62, "Operating Mode Notification");
1377 ADD_BIT_VAL(63, is_vht_cap
, max_amsdu
, 1);
1378 ADD_BIT_VAL(64, is_vht_cap
, max_amsdu
, 2);
1380 CAPA(65, "Channel Schedule Management");
1381 CAPA(66, "Geodatabase Inband Enabling Signal");
1382 CAPA(67, "Network Channel Control");
1383 CAPA(68, "White Space Map");
1384 CAPA(69, "Channel Availability Query");
1385 CAPA(70, "FTM Responder");
1386 CAPA(71, "FTM Initiator");
1387 CAPA(72, "Reserved");
1388 CAPA(73, "Extended Spectrum Management Capable");
1389 CAPA(74, "Reserved");
1400 printf("\n\t\t * Service Interval Granularity is %d ms",
1401 (si_duration
+ 1) * 5);
1404 printf("\n\t\t * Max Number Of MSDUs In A-MSDU is ");
1405 switch (max_amsdu
) {
1407 printf("unlimited");
1426 static void print_tim(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1427 const struct print_ies_data
*ie_buffer
)
1429 printf(" DTIM Count %u DTIM Period %u Bitmap Control 0x%x "
1431 data
[0], data
[1], data
[2], data
[3]);
1433 printf(" (+ %u octet%s)", len
- 4, len
- 4 == 1 ? "" : "s");
1437 static void print_ibssatim(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1438 const struct print_ies_data
*ie_buffer
)
1440 printf(" %d TUs\n", (data
[1] << 8) + data
[0]);
1443 static void print_vht_capa(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1444 const struct print_ies_data
*ie_buffer
)
1447 print_vht_info(data
[0] | (data
[1] << 8) |
1448 (data
[2] << 16) | (data
[3] << 24),
1452 static void print_vht_oper(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1453 const struct print_ies_data
*ie_buffer
)
1455 const char *chandwidths
[] = {
1456 [0] = "20 or 40 MHz",
1463 printf("\t\t * channel width: %d (%s)\n", data
[0],
1464 data
[0] < ARRAY_SIZE(chandwidths
) ? chandwidths
[data
[0]] : "unknown");
1465 printf("\t\t * center freq segment 1: %d\n", data
[1]);
1466 printf("\t\t * center freq segment 2: %d\n", data
[2]);
1467 printf("\t\t * VHT basic MCS set: 0x%.2x%.2x\n", data
[4], data
[3]);
1470 static void print_supp_op_classes(const uint8_t type
, uint8_t len
,
1471 const uint8_t *data
,
1472 const struct print_ies_data
*ie_buffer
)
1474 uint8_t *p
= (uint8_t*) data
;
1475 const uint8_t *next_data
= p
+ len
;
1476 int zero_delimiter
= 0;
1477 int one_hundred_thirty_delimiter
= 0;
1480 printf("\t\t * current operating class: %d\n", *p
);
1481 while (++p
< next_data
) {
1483 one_hundred_thirty_delimiter
= 1;
1490 printf("\t\t * operating class: %d\n", *p
);
1492 if (one_hundred_thirty_delimiter
)
1493 while (++p
< next_data
) {
1494 printf("\t\t * current operating class extension: %d\n", *p
);
1497 while (++p
< next_data
- 1) {
1498 printf("\t\t * operating class tuple: %d %d\n", p
[0], p
[1]);
1504 static void print_obss_scan_params(const uint8_t type
, uint8_t len
,
1505 const uint8_t *data
,
1506 const struct print_ies_data
*ie_buffer
)
1509 printf("\t\t * passive dwell: %d TUs\n", (data
[1] << 8) | data
[0]);
1510 printf("\t\t * active dwell: %d TUs\n", (data
[3] << 8) | data
[2]);
1511 printf("\t\t * channel width trigger scan interval: %d s\n", (data
[5] << 8) | data
[4]);
1512 printf("\t\t * scan passive total per channel: %d TUs\n", (data
[7] << 8) | data
[6]);
1513 printf("\t\t * scan active total per channel: %d TUs\n", (data
[9] << 8) | data
[8]);
1514 printf("\t\t * BSS width channel transition delay factor: %d\n", (data
[11] << 8) | data
[10]);
1515 printf("\t\t * OBSS Scan Activity Threshold: %d.%02d %%\n",
1516 ((data
[13] << 8) | data
[12]) / 100, ((data
[13] << 8) | data
[12]) % 100);
1519 static void print_secchan_offs(const uint8_t type
, uint8_t len
,
1520 const uint8_t *data
,
1521 const struct print_ies_data
*ie_buffer
)
1523 if (data
[0] < ARRAY_SIZE(ht_secondary_offset
))
1524 printf(" %s (%d)\n", ht_secondary_offset
[data
[0]], data
[0]);
1526 printf(" %d\n", data
[0]);
1529 static void print_bss_load(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1530 const struct print_ies_data
*ie_buffer
)
1533 printf("\t\t * station count: %d\n", (data
[1] << 8) | data
[0]);
1534 printf("\t\t * channel utilisation: %d/255\n", data
[2]);
1535 printf("\t\t * available admission capacity: %d [*32us]\n", (data
[4] << 8) | data
[3]);
1538 static void print_mesh_conf(const uint8_t type
, uint8_t len
,
1539 const uint8_t *data
,
1540 const struct print_ies_data
*ie_buffer
)
1543 printf("\t\t * Active Path Selection Protocol ID: %d\n", data
[0]);
1544 printf("\t\t * Active Path Selection Metric ID: %d\n", data
[1]);
1545 printf("\t\t * Congestion Control Mode ID: %d\n", data
[2]);
1546 printf("\t\t * Synchronization Method ID: %d\n", data
[3]);
1547 printf("\t\t * Authentication Protocol ID: %d\n", data
[4]);
1548 printf("\t\t * Mesh Formation Info:\n");
1549 printf("\t\t\t Number of Peerings: %d\n", (data
[5] & 0x7E) >> 1);
1551 printf("\t\t\t Connected to Mesh Gate\n");
1553 printf("\t\t\t Connected to AS\n");
1554 printf("\t\t * Mesh Capability\n");
1556 printf("\t\t\t Accepting Additional Mesh Peerings\n");
1558 printf("\t\t\t MCCA Supported\n");
1560 printf("\t\t\t MCCA Enabled\n");
1562 printf("\t\t\t Forwarding\n");
1564 printf("\t\t\t MBCA Supported\n");
1566 printf("\t\t\t TBTT Adjusting\n");
1568 printf("\t\t\t Mesh Power Save Level\n");
1573 void (*print
)(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1574 const struct print_ies_data
*ie_buffer
);
1575 uint8_t minlen
, maxlen
;
1579 static void print_ie(const struct ie_print
*p
, const uint8_t type
, uint8_t len
,
1580 const uint8_t *data
,
1581 const struct print_ies_data
*ie_buffer
)
1588 printf("\t%s:", p
->name
);
1589 if (len
< p
->minlen
|| len
> p
->maxlen
) {
1591 printf(" <invalid: %d bytes:", len
);
1592 for (i
= 0; i
< len
; i
++)
1593 printf(" %.02x", data
[i
]);
1596 printf(" <invalid: 1 byte: %.02x>\n", data
[0]);
1598 printf(" <invalid: no data>\n");
1602 p
->print(type
, len
, data
, ie_buffer
);
1605 #define PRINT_IGN { \
1612 static const struct ie_print ieprinters
[] = {
1613 [0] = { "SSID", print_ssid
, 0, 32, BIT(PRINT_SCAN
) | BIT(PRINT_LINK
), },
1614 [1] = { "Supported rates", print_supprates
, 0, 255, BIT(PRINT_SCAN
), },
1615 [3] = { "DS Parameter set", print_ds
, 1, 1, BIT(PRINT_SCAN
), },
1616 [5] = { "TIM", print_tim
, 4, 255, BIT(PRINT_SCAN
), },
1617 [6] = { "IBSS ATIM window", print_ibssatim
, 2, 2, BIT(PRINT_SCAN
), },
1618 [7] = { "Country", print_country
, 3, 255, BIT(PRINT_SCAN
), },
1619 [11] = { "BSS Load", print_bss_load
, 5, 5, BIT(PRINT_SCAN
), },
1620 [32] = { "Power constraint", print_powerconstraint
, 1, 1, BIT(PRINT_SCAN
), },
1621 [35] = { "TPC report", print_tpcreport
, 2, 2, BIT(PRINT_SCAN
), },
1622 [42] = { "ERP", print_erp
, 1, 255, BIT(PRINT_SCAN
), },
1623 [45] = { "HT capabilities", print_ht_capa
, 26, 26, BIT(PRINT_SCAN
), },
1624 [47] = { "ERP D4.0", print_erp
, 1, 255, BIT(PRINT_SCAN
), },
1625 [59] = { "Supported operating classes", print_supp_op_classes
, 1, 255, BIT(PRINT_SCAN
), },
1626 [74] = { "Overlapping BSS scan params", print_obss_scan_params
, 14, 255, BIT(PRINT_SCAN
), },
1627 [61] = { "HT operation", print_ht_op
, 22, 22, BIT(PRINT_SCAN
), },
1628 [62] = { "Secondary Channel Offset", print_secchan_offs
, 1, 1, BIT(PRINT_SCAN
), },
1629 [191] = { "VHT capabilities", print_vht_capa
, 12, 255, BIT(PRINT_SCAN
), },
1630 [192] = { "VHT operation", print_vht_oper
, 5, 255, BIT(PRINT_SCAN
), },
1631 [48] = { "RSN", print_rsn
, 2, 255, BIT(PRINT_SCAN
), },
1632 [50] = { "Extended supported rates", print_supprates
, 0, 255, BIT(PRINT_SCAN
), },
1633 [70] = { "RM enabled capabilities", print_rm_enabled_capabilities
, 5, 5, BIT(PRINT_SCAN
), },
1634 [113] = { "MESH Configuration", print_mesh_conf
, 7, 7, BIT(PRINT_SCAN
), },
1635 [114] = { "MESH ID", print_ssid
, 0, 32, BIT(PRINT_SCAN
) | BIT(PRINT_LINK
), },
1636 [127] = { "Extended capabilities", print_capabilities
, 0, 255, BIT(PRINT_SCAN
), },
1637 [107] = { "802.11u Interworking", print_interworking
, 0, 255, BIT(PRINT_SCAN
), },
1638 [108] = { "802.11u Advertisement", print_11u_advert
, 0, 255, BIT(PRINT_SCAN
), },
1639 [111] = { "802.11u Roaming Consortium", print_11u_rcon
, 0, 255, BIT(PRINT_SCAN
), },
1642 static void print_wifi_wpa(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1643 const struct print_ies_data
*ie_buffer
)
1645 print_rsn_ie("TKIP", "IEEE 802.1X", len
, data
);
1648 static void print_wifi_osen(const uint8_t type
, uint8_t len
,
1649 const uint8_t *data
,
1650 const struct print_ies_data
*ie_buffer
)
1652 print_osen_ie("OSEN", "OSEN", len
, data
);
1655 static bool print_wifi_wmm_param(const uint8_t *data
, uint8_t len
)
1658 static const char *aci_tbl
[] = { "BE", "BK", "VI", "VO" };
1664 printf("Parameter: not version 1: ");
1668 printf("\t * Parameter version 1");
1673 printf("\n\t\t * u-APSD");
1677 for (i
= 0; i
< 4; i
++) {
1678 printf("\n\t\t * %s:", aci_tbl
[(data
[0] >> 5) & 3]);
1681 printf(" CW %d-%d", (1 << (data
[1] & 0xf)) - 1,
1682 (1 << (data
[1] >> 4)) - 1);
1683 printf(", AIFSN %d", data
[0] & 0xf);
1684 if (data
[2] | data
[3])
1685 printf(", TXOP %d usec", (data
[2] + (data
[3] << 8)) * 32);
1693 printf("invalid: ");
1697 static void print_wifi_wmm(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1698 const struct print_ies_data
*ie_buffer
)
1704 printf(" information:");
1707 if (print_wifi_wmm_param(data
+ 1, len
- 1))
1711 printf(" type %d:", data
[0]);
1715 for(i
= 1; i
< len
; i
++)
1716 printf(" %.02x", data
[i
]);
1720 static const char * wifi_wps_dev_passwd_id(uint16_t id
)
1724 return "Default (PIN)";
1726 return "User-specified";
1728 return "Machine-specified";
1732 return "PushButton";
1734 return "Registrar-specified";
1740 static void print_wifi_wps(const uint8_t type
, uint8_t len
, const uint8_t *data
,
1741 const struct print_ies_data
*ie_buffer
)
1744 __u16 subtype
, sublen
;
1747 subtype
= (data
[0] << 8) + data
[1];
1748 sublen
= (data
[2] << 8) + data
[3];
1754 tab_on_first(&first
);
1755 printf("\t * Version: %d.%d\n", data
[4] >> 4, data
[4] & 0xF);
1758 tab_on_first(&first
);
1759 printf("\t * Device name: %.*s\n", sublen
, data
+ 4);
1763 tab_on_first(&first
);
1765 printf("\t * Device Password ID: (invalid "
1766 "length %d)\n", sublen
);
1769 id
= data
[4] << 8 | data
[5];
1770 printf("\t * Device Password ID: %u (%s)\n",
1771 id
, wifi_wps_dev_passwd_id(id
));
1775 tab_on_first(&first
);
1776 printf("\t * Manufacturer: %.*s\n", sublen
, data
+ 4);
1779 tab_on_first(&first
);
1780 printf("\t * Model: %.*s\n", sublen
, data
+ 4);
1783 tab_on_first(&first
);
1784 printf("\t * Model Number: %.*s\n", sublen
, data
+ 4);
1788 tab_on_first(&first
);
1789 printf("\t * Response Type: %d%s\n",
1790 val
, val
== 3 ? " (AP)" : "");
1795 tab_on_first(&first
);
1796 printf("\t * RF Bands: 0x%x\n", val
);
1801 tab_on_first(&first
);
1802 printf("\t * Selected Registrar: 0x%x\n", val
);
1806 tab_on_first(&first
);
1807 printf("\t * Serial Number: %.*s\n", sublen
, data
+ 4);
1811 tab_on_first(&first
);
1812 printf("\t * Wi-Fi Protected Setup State: %d%s%s\n",
1814 val
== 1 ? " (Unconfigured)" : "",
1815 val
== 2 ? " (Configured)" : "");
1819 tab_on_first(&first
);
1820 printf("\t * UUID: ");
1822 printf("(invalid, length=%d)\n", sublen
);
1825 printf("%02x%02x%02x%02x-%02x%02x-%02x%02x-"
1826 "%02x%02x-%02x%02x%02x%02x%02x%02x\n",
1827 data
[4], data
[5], data
[6], data
[7],
1828 data
[8], data
[9], data
[10], data
[11],
1829 data
[12], data
[13], data
[14], data
[15],
1830 data
[16], data
[17], data
[18], data
[19]);
1833 tab_on_first(&first
);
1835 printf("\t * Primary Device Type: (invalid "
1836 "length %d)\n", sublen
);
1839 printf("\t * Primary Device Type: "
1840 "%u-%02x%02x%02x%02x-%u\n",
1841 data
[4] << 8 | data
[5],
1842 data
[6], data
[7], data
[8], data
[9],
1843 data
[10] << 8 | data
[11]);
1848 tab_on_first(&first
);
1849 printf("\t * AP setup locked: 0x%.2x\n", val
);
1854 __u16 meth
= (data
[4] << 8) + data
[5];
1856 tab_on_first(&first
);
1857 printf("\t * %sConfig methods:",
1858 subtype
== 0x1053 ? "Selected Registrar ": "");
1859 #define T(bit, name) do { \
1860 if (meth & (1<<bit)) { \
1880 const __u8
*subdata
= data
+ 4;
1881 __u16 tmplen
= sublen
;
1883 tab_on_first(&first
);
1884 printf("\t * Unknown TLV (%#.4x, %d bytes):",
1887 printf(" %.2x", *subdata
);
1901 printf("\t\t * bogus tail data (%d):", len
);
1903 printf(" %.2x", *data
);
1911 static const struct ie_print wifiprinters
[] = {
1912 [1] = { "WPA", print_wifi_wpa
, 2, 255, BIT(PRINT_SCAN
), },
1913 [2] = { "WMM", print_wifi_wmm
, 1, 255, BIT(PRINT_SCAN
), },
1914 [4] = { "WPS", print_wifi_wps
, 0, 255, BIT(PRINT_SCAN
), },
1917 static inline void print_p2p(const uint8_t type
, uint8_t len
,
1918 const uint8_t *data
,
1919 const struct print_ies_data
*ie_buffer
)
1927 sublen
= (data
[2] << 8) + data
[1];
1929 if (sublen
> len
- 3)
1933 case 0x02: /* capability */
1934 tab_on_first(&first
);
1936 printf("\t * malformed capability\n");
1939 printf("\t * Group capa: 0x%.2x, Device capa: 0x%.2x\n",
1942 case 0x0d: /* device info */
1943 if (sublen
< 6 + 2 + 8 + 1) {
1944 printf("\t * malformed device info\n");
1948 case 0x00: /* status */
1949 case 0x01: /* minor reason */
1950 case 0x03: /* device ID */
1951 case 0x04: /* GO intent */
1952 case 0x05: /* configuration timeout */
1953 case 0x06: /* listen channel */
1954 case 0x07: /* group BSSID */
1955 case 0x08: /* ext listen timing */
1956 case 0x09: /* intended interface address */
1957 case 0x0a: /* manageability */
1958 case 0x0b: /* channel list */
1959 case 0x0c: /* NoA */
1960 case 0x0e: /* group info */
1961 case 0x0f: /* group ID */
1962 case 0x10: /* interface */
1963 case 0x11: /* operating channel */
1964 case 0x12: /* invitation flags */
1965 case 0xdd: /* vendor specific */
1967 const __u8
*subdata
= data
+ 4;
1968 __u16 tmplen
= sublen
;
1970 tab_on_first(&first
);
1971 printf("\t * Unknown TLV (%#.2x, %d bytes):",
1974 printf(" %.2x", *subdata
);
1988 tab_on_first(&first
);
1989 printf("\t * bogus tail data (%d):", len
);
1991 printf(" %.2x", *data
);
1999 static inline void print_hs20_ind(const uint8_t type
, uint8_t len
,
2000 const uint8_t *data
,
2001 const struct print_ies_data
*ie_buffer
)
2003 /* I can't find the spec for this...just going off what wireshark uses. */
2006 printf("\t\tDGAF: %i\n", (int)(data
[0] & 0x1));
2008 printf("\t\tUnexpected length: %i\n", len
);
2011 static void print_wifi_owe_tarns(const uint8_t type
, uint8_t len
,
2012 const uint8_t *data
,
2013 const struct print_ies_data
*ie_buffer
)
2022 mac_addr_n2a(mac_addr
, data
);
2023 printf("\t\tBSSID: %s\n", mac_addr
);
2026 if (ssid_len
> len
- 7)
2028 printf("\t\tSSID: ");
2029 print_ssid_escaped(ssid_len
, data
+ 7);
2032 /* optional elements */
2033 if (len
>= ssid_len
+ 9) {
2034 printf("\t\tBand Info: %u\n", data
[ssid_len
+ 7]);
2035 printf("\t\tChannel Info: %u\n", data
[ssid_len
+ 8]);
2039 static const struct ie_print wfa_printers
[] = {
2040 [9] = { "P2P", print_p2p
, 2, 255, BIT(PRINT_SCAN
), },
2041 [16] = { "HotSpot 2.0 Indication", print_hs20_ind
, 1, 255, BIT(PRINT_SCAN
), },
2042 [18] = { "HotSpot 2.0 OSEN", print_wifi_osen
, 1, 255, BIT(PRINT_SCAN
), },
2043 [28] = { "OWE Transition Mode", print_wifi_owe_tarns
, 7, 255, BIT(PRINT_SCAN
), },
2046 static void print_vendor(unsigned char len
, unsigned char *data
,
2047 bool unknown
, enum print_ie_type ptype
)
2052 printf("\tVendor specific: <too short> data:");
2053 for(i
= 0; i
< len
; i
++)
2054 printf(" %.02x", data
[i
]);
2059 if (len
>= 4 && memcmp(data
, ms_oui
, 3) == 0) {
2060 if (data
[3] < ARRAY_SIZE(wifiprinters
) &&
2061 wifiprinters
[data
[3]].name
&&
2062 wifiprinters
[data
[3]].flags
& BIT(ptype
)) {
2063 print_ie(&wifiprinters
[data
[3]],
2064 data
[3], len
- 4, data
+ 4,
2070 printf("\tMS/WiFi %#.2x, data:", data
[3]);
2071 for(i
= 0; i
< len
- 4; i
++)
2072 printf(" %.02x", data
[i
+ 4]);
2077 if (len
>= 4 && memcmp(data
, wfa_oui
, 3) == 0) {
2078 if (data
[3] < ARRAY_SIZE(wfa_printers
) &&
2079 wfa_printers
[data
[3]].name
&&
2080 wfa_printers
[data
[3]].flags
& BIT(ptype
)) {
2081 print_ie(&wfa_printers
[data
[3]],
2082 data
[3], len
- 4, data
+ 4,
2088 printf("\tWFA %#.2x, data:", data
[3]);
2089 for(i
= 0; i
< len
- 4; i
++)
2090 printf(" %.02x", data
[i
+ 4]);
2098 printf("\tVendor specific: OUI %.2x:%.2x:%.2x, data:",
2099 data
[0], data
[1], data
[2]);
2100 for (i
= 3; i
< len
; i
++)
2101 printf(" %.2x", data
[i
]);
2105 void print_ies(unsigned char *ie
, int ielen
, bool unknown
,
2106 enum print_ie_type ptype
)
2108 struct print_ies_data ie_buffer
= {
2112 while (ielen
>= 2 && ielen
>= ie
[1]) {
2113 if (ie
[0] < ARRAY_SIZE(ieprinters
) &&
2114 ieprinters
[ie
[0]].name
&&
2115 ieprinters
[ie
[0]].flags
& BIT(ptype
)) {
2116 print_ie(&ieprinters
[ie
[0]],
2117 ie
[0], ie
[1], ie
+ 2, &ie_buffer
);
2118 } else if (ie
[0] == 221 /* vendor */) {
2119 print_vendor(ie
[1], ie
+ 2, unknown
, ptype
);
2120 } else if (unknown
) {
2123 printf("\tUnknown IE (%d):", ie
[0]);
2124 for (i
=0; i
<ie
[1]; i
++)
2125 printf(" %.2x", ie
[2+i
]);
2133 static void print_capa_dmg(__u16 capa
)
2135 switch (capa
& WLAN_CAPABILITY_DMG_TYPE_MASK
) {
2136 case WLAN_CAPABILITY_DMG_TYPE_AP
:
2139 case WLAN_CAPABILITY_DMG_TYPE_PBSS
:
2142 case WLAN_CAPABILITY_DMG_TYPE_IBSS
:
2143 printf(" DMG_IBSS");
2147 if (capa
& WLAN_CAPABILITY_DMG_CBAP_ONLY
)
2148 printf(" CBAP_Only");
2149 if (capa
& WLAN_CAPABILITY_DMG_CBAP_SOURCE
)
2150 printf(" CBAP_Src");
2151 if (capa
& WLAN_CAPABILITY_DMG_PRIVACY
)
2153 if (capa
& WLAN_CAPABILITY_DMG_ECPAC
)
2155 if (capa
& WLAN_CAPABILITY_DMG_SPECTRUM_MGMT
)
2156 printf(" SpectrumMgmt");
2157 if (capa
& WLAN_CAPABILITY_DMG_RADIO_MEASURE
)
2158 printf(" RadioMeasure");
2161 static void print_capa_non_dmg(__u16 capa
)
2163 if (capa
& WLAN_CAPABILITY_ESS
)
2165 if (capa
& WLAN_CAPABILITY_IBSS
)
2167 if (capa
& WLAN_CAPABILITY_CF_POLLABLE
)
2168 printf(" CfPollable");
2169 if (capa
& WLAN_CAPABILITY_CF_POLL_REQUEST
)
2170 printf(" CfPollReq");
2171 if (capa
& WLAN_CAPABILITY_PRIVACY
)
2173 if (capa
& WLAN_CAPABILITY_SHORT_PREAMBLE
)
2174 printf(" ShortPreamble");
2175 if (capa
& WLAN_CAPABILITY_PBCC
)
2177 if (capa
& WLAN_CAPABILITY_CHANNEL_AGILITY
)
2178 printf(" ChannelAgility");
2179 if (capa
& WLAN_CAPABILITY_SPECTRUM_MGMT
)
2180 printf(" SpectrumMgmt");
2181 if (capa
& WLAN_CAPABILITY_QOS
)
2183 if (capa
& WLAN_CAPABILITY_SHORT_SLOT_TIME
)
2184 printf(" ShortSlotTime");
2185 if (capa
& WLAN_CAPABILITY_APSD
)
2187 if (capa
& WLAN_CAPABILITY_RADIO_MEASURE
)
2188 printf(" RadioMeasure");
2189 if (capa
& WLAN_CAPABILITY_DSSS_OFDM
)
2190 printf(" DSSS-OFDM");
2191 if (capa
& WLAN_CAPABILITY_DEL_BACK
)
2192 printf(" DelayedBACK");
2193 if (capa
& WLAN_CAPABILITY_IMM_BACK
)
2194 printf(" ImmediateBACK");
2197 static int print_bss_handler(struct nl_msg
*msg
, void *arg
)
2199 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
2200 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
2201 struct nlattr
*bss
[NL80211_BSS_MAX
+ 1];
2202 char mac_addr
[20], dev
[20];
2203 static struct nla_policy bss_policy
[NL80211_BSS_MAX
+ 1] = {
2204 [NL80211_BSS_TSF
] = { .type
= NLA_U64
},
2205 [NL80211_BSS_FREQUENCY
] = { .type
= NLA_U32
},
2206 [NL80211_BSS_BSSID
] = { },
2207 [NL80211_BSS_BEACON_INTERVAL
] = { .type
= NLA_U16
},
2208 [NL80211_BSS_CAPABILITY
] = { .type
= NLA_U16
},
2209 [NL80211_BSS_INFORMATION_ELEMENTS
] = { },
2210 [NL80211_BSS_SIGNAL_MBM
] = { .type
= NLA_U32
},
2211 [NL80211_BSS_SIGNAL_UNSPEC
] = { .type
= NLA_U8
},
2212 [NL80211_BSS_STATUS
] = { .type
= NLA_U32
},
2213 [NL80211_BSS_SEEN_MS_AGO
] = { .type
= NLA_U32
},
2214 [NL80211_BSS_BEACON_IES
] = { },
2216 struct scan_params
*params
= arg
;
2217 int show
= params
->show_both_ie_sets
? 2 : 1;
2218 bool is_dmg
= false;
2220 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
2221 genlmsg_attrlen(gnlh
, 0), NULL
);
2223 if (!tb
[NL80211_ATTR_BSS
]) {
2224 fprintf(stderr
, "bss info missing!\n");
2227 if (nla_parse_nested(bss
, NL80211_BSS_MAX
,
2228 tb
[NL80211_ATTR_BSS
],
2230 fprintf(stderr
, "failed to parse nested attributes!\n");
2234 if (!bss
[NL80211_BSS_BSSID
])
2237 mac_addr_n2a(mac_addr
, nla_data(bss
[NL80211_BSS_BSSID
]));
2238 printf("BSS %s", mac_addr
);
2239 if (tb
[NL80211_ATTR_IFINDEX
]) {
2240 if_indextoname(nla_get_u32(tb
[NL80211_ATTR_IFINDEX
]), dev
);
2241 printf("(on %s)", dev
);
2244 if (bss
[NL80211_BSS_STATUS
]) {
2245 switch (nla_get_u32(bss
[NL80211_BSS_STATUS
])) {
2246 case NL80211_BSS_STATUS_AUTHENTICATED
:
2247 printf(" -- authenticated");
2249 case NL80211_BSS_STATUS_ASSOCIATED
:
2250 printf(" -- associated");
2252 case NL80211_BSS_STATUS_IBSS_JOINED
:
2253 printf(" -- joined");
2256 printf(" -- unknown status: %d",
2257 nla_get_u32(bss
[NL80211_BSS_STATUS
]));
2263 if (bss
[NL80211_BSS_LAST_SEEN_BOOTTIME
]) {
2264 unsigned long long bt
;
2265 bt
= (unsigned long long)nla_get_u64(bss
[NL80211_BSS_LAST_SEEN_BOOTTIME
]);
2266 printf("\tlast seen: %llu.%.3llus [boottime]\n", bt
/1000000000, (bt
%1000000000)/1000000);
2269 if (bss
[NL80211_BSS_TSF
]) {
2270 unsigned long long tsf
;
2271 tsf
= (unsigned long long)nla_get_u64(bss
[NL80211_BSS_TSF
]);
2272 printf("\tTSF: %llu usec (%llud, %.2lld:%.2llu:%.2llu)\n",
2273 tsf
, tsf
/1000/1000/60/60/24, (tsf
/1000/1000/60/60) % 24,
2274 (tsf
/1000/1000/60) % 60, (tsf
/1000/1000) % 60);
2276 if (bss
[NL80211_BSS_FREQUENCY
]) {
2277 int freq
= nla_get_u32(bss
[NL80211_BSS_FREQUENCY
]);
2278 printf("\tfreq: %d\n", freq
);
2282 if (bss
[NL80211_BSS_BEACON_INTERVAL
])
2283 printf("\tbeacon interval: %d TUs\n",
2284 nla_get_u16(bss
[NL80211_BSS_BEACON_INTERVAL
]));
2285 if (bss
[NL80211_BSS_CAPABILITY
]) {
2286 __u16 capa
= nla_get_u16(bss
[NL80211_BSS_CAPABILITY
]);
2287 printf("\tcapability:");
2289 print_capa_dmg(capa
);
2291 print_capa_non_dmg(capa
);
2292 printf(" (0x%.4x)\n", capa
);
2294 if (bss
[NL80211_BSS_SIGNAL_MBM
]) {
2295 int s
= nla_get_u32(bss
[NL80211_BSS_SIGNAL_MBM
]);
2296 printf("\tsignal: %d.%.2d dBm\n", s
/100, s
%100);
2298 if (bss
[NL80211_BSS_SIGNAL_UNSPEC
]) {
2299 unsigned char s
= nla_get_u8(bss
[NL80211_BSS_SIGNAL_UNSPEC
]);
2300 printf("\tsignal: %d/100\n", s
);
2302 if (bss
[NL80211_BSS_SEEN_MS_AGO
]) {
2303 int age
= nla_get_u32(bss
[NL80211_BSS_SEEN_MS_AGO
]);
2304 printf("\tlast seen: %d ms ago\n", age
);
2307 if (bss
[NL80211_BSS_INFORMATION_ELEMENTS
] && show
--) {
2308 struct nlattr
*ies
= bss
[NL80211_BSS_INFORMATION_ELEMENTS
];
2309 struct nlattr
*bcnies
= bss
[NL80211_BSS_BEACON_IES
];
2311 if (bss
[NL80211_BSS_PRESP_DATA
] ||
2312 (bcnies
&& (nla_len(ies
) != nla_len(bcnies
) ||
2313 memcmp(nla_data(ies
), nla_data(bcnies
),
2315 printf("\tInformation elements from Probe Response "
2317 print_ies(nla_data(ies
), nla_len(ies
),
2318 params
->unknown
, params
->type
);
2320 if (bss
[NL80211_BSS_BEACON_IES
] && show
--) {
2321 printf("\tInformation elements from Beacon frame:\n");
2322 print_ies(nla_data(bss
[NL80211_BSS_BEACON_IES
]),
2323 nla_len(bss
[NL80211_BSS_BEACON_IES
]),
2324 params
->unknown
, params
->type
);
2330 static struct scan_params scan_params
;
2332 static int handle_scan_dump(struct nl80211_state
*state
,
2334 int argc
, char **argv
,
2340 memset(&scan_params
, 0, sizeof(scan_params
));
2342 if (argc
== 1 && !strcmp(argv
[0], "-u"))
2343 scan_params
.unknown
= true;
2344 else if (argc
== 1 && !strcmp(argv
[0], "-b"))
2345 scan_params
.show_both_ie_sets
= true;
2347 scan_params
.type
= PRINT_SCAN
;
2349 register_handler(print_bss_handler
, &scan_params
);
2353 static int handle_scan_combined(struct nl80211_state
*state
,
2355 int argc
, char **argv
,
2359 static char *dump_argv
[] = {
2365 static const __u32 cmds
[] = {
2366 NL80211_CMD_NEW_SCAN_RESULTS
,
2367 NL80211_CMD_SCAN_ABORTED
,
2369 int trig_argc
, dump_argc
, err
;
2372 if (argc
>= 3 && !strcmp(argv
[2], "-u")) {
2374 dump_argv
[3] = "-u";
2375 } else if (argc
>= 3 && !strcmp(argv
[2], "-b")) {
2377 dump_argv
[3] = "-b";
2381 trig_argc
= 3 + (argc
- 2) + (3 - dump_argc
);
2382 trig_argv
= calloc(trig_argc
, sizeof(*trig_argv
));
2385 trig_argv
[0] = argv
[0];
2386 trig_argv
[1] = "scan";
2387 trig_argv
[2] = "trigger";
2389 for (i
= 0; i
< argc
- 2 - (dump_argc
- 3); i
++)
2390 trig_argv
[i
+ 3] = argv
[i
+ 2 + (dump_argc
- 3)];
2391 err
= handle_cmd(state
, id
, trig_argc
, trig_argv
);
2397 * WARNING: DO NOT COPY THIS CODE INTO YOUR APPLICATION
2399 * This code has a bug, which requires creating a separate
2400 * nl80211 socket to fix:
2401 * It is possible for a NL80211_CMD_NEW_SCAN_RESULTS or
2402 * NL80211_CMD_SCAN_ABORTED message to be sent by the kernel
2403 * before (!) we listen to it, because we only start listening
2404 * after we send our scan request.
2406 * Doing it the other way around has a race condition as well,
2407 * if you first open the events socket you may get a notification
2408 * for a previous scan.
2410 * The only proper way to fix this would be to listen to events
2411 * before sending the command, and for the kernel to send the
2412 * scan request along with the event, so that you can match up
2413 * whether the scan you requested was finished or aborted (this
2414 * may result in processing a scan that another application
2415 * requested, but that doesn't seem to be a problem).
2417 * Alas, the kernel doesn't do that (yet).
2420 if (listen_events(state
, ARRAY_SIZE(cmds
), cmds
) ==
2421 NL80211_CMD_SCAN_ABORTED
) {
2422 printf("scan aborted!\n");
2426 dump_argv
[0] = argv
[0];
2427 return handle_cmd(state
, id
, dump_argc
, dump_argv
);
2429 TOPLEVEL(scan
, "[-u] [freq <freq>*] [duration <dur>] [ies <hex as 00:11:..>] [meshid <meshid>] [lowpri,flush,ap-force,duration-mandatory] [randomise[=<addr>/<mask>]] [ssid <ssid>*|passive]", 0, 0,
2430 CIB_NETDEV
, handle_scan_combined
,
2431 "Scan on the given frequencies and probe for the given SSIDs\n"
2432 "(or wildcard if not given) unless passive scanning is requested.\n"
2433 "If -u is specified print unknown data in the scan results.\n"
2434 "Specified (vendor) IEs must be well-formed.");
2435 COMMAND(scan
, dump
, "[-u]",
2436 NL80211_CMD_GET_SCAN
, NLM_F_DUMP
, CIB_NETDEV
, handle_scan_dump
,
2437 "Dump the current scan results. If -u is specified, print unknown\n"
2438 "data in scan results.");
2439 COMMAND(scan
, trigger
, "[freq <freq>*] [duration <dur>] [ies <hex as 00:11:..>] [meshid <meshid>] [lowpri,flush,ap-force,duration-mandatory] [randomise[=<addr>/<mask>]] [ssid <ssid>*|passive]",
2440 NL80211_CMD_TRIGGER_SCAN
, 0, CIB_NETDEV
, handle_scan
,
2441 "Trigger a scan on the given frequencies with probing for the given\n"
2442 "SSIDs (or wildcard if not given) unless passive scanning is requested.\n"
2443 "Duration(in TUs), if specified, will be used to set dwell times.\n");
2446 static int handle_scan_abort(struct nl80211_state
*state
,
2448 int argc
, char **argv
,
2453 COMMAND(scan
, abort
, "",
2454 NL80211_CMD_ABORT_SCAN
, 0, CIB_NETDEV
, handle_scan_abort
,
2455 "Abort ongoing scan");
2457 static int handle_start_sched_scan(struct nl80211_state
*state
,
2459 int argc
, char **argv
, enum id_input id
)
2461 return parse_sched_scan(msg
, &argc
, &argv
);
2464 static int handle_stop_sched_scan(struct nl80211_state
*state
,
2465 struct nl_msg
*msg
, int argc
, char **argv
,
2474 COMMAND(scan
, sched_start
,
2476 NL80211_CMD_START_SCHED_SCAN
, 0, CIB_NETDEV
, handle_start_sched_scan
,
2477 "Start a scheduled scan at the specified interval on the given frequencies\n"
2478 "with probing for the given SSIDs (or wildcard if not given) unless passive\n"
2479 "scanning is requested. If matches are specified, only matching results\n"
2480 "will be returned.");
2481 COMMAND(scan
, sched_stop
, "",
2482 NL80211_CMD_STOP_SCHED_SCAN
, 0, CIB_NETDEV
, handle_stop_sched_scan
,
2483 "Stop an ongoing scheduled scan.");