3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-02 18:19:23 +01:00
iwd/monitor/nlmon.c

8201 lines
211 KiB
C
Raw Normal View History

/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2013-2019 Intel Corporation. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#define _GNU_SOURCE
#include <stdio.h>
#include <errno.h>
#include <ctype.h>
#include <unistd.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <net/ethernet.h>
#include <netinet/ether.h>
#include <linux/if.h>
#include <linux/if_packet.h>
#include <linux/if_ether.h>
#include <linux/netlink.h>
#include <linux/genetlink.h>
#include <linux/rtnetlink.h>
#include <linux/filter.h>
#include <ell/ell.h>
#ifndef ARPHRD_NETLINK
#define ARPHRD_NETLINK 824
#endif
#include "linux/nl80211.h"
2021-03-12 05:31:50 +01:00
#include "ell/useful.h"
#include "src/ie.h"
#include "src/mpdu.h"
#include "src/eapol.h"
#include "src/util.h"
#include "src/p2putil.h"
2019-07-15 20:51:28 +02:00
#include "src/nl80211cmd.h"
#include "monitor/pcap.h"
#include "monitor/display.h"
#include "monitor/nlmon.h"
#include "src/anqputil.h"
#define COLOR_TIMESTAMP COLOR_YELLOW
#define COLOR_REQUEST COLOR_BLUE
#define COLOR_RESPONSE COLOR_MAGENTA
#define COLOR_COMPLETE COLOR_MAGENTA
#define COLOR_RESULT COLOR_MAGENTA
#define COLOR_EVENT COLOR_CYAN
/* BSS Capabilities */
#define BSS_CAPABILITY_ESS (1<<0)
#define BSS_CAPABILITY_IBSS (1<<1)
#define BSS_CAPABILITY_CF_POLLABLE (1<<2)
#define BSS_CAPABILITY_CF_POLL_REQUEST (1<<3)
#define BSS_CAPABILITY_PRIVACY (1<<4)
#define BSS_CAPABILITY_SHORT_PREAMBLE (1<<5)
#define BSS_CAPABILITY_PBCC (1<<6)
#define BSS_CAPABILITY_CHANNEL_AGILITY (1<<7)
#define BSS_CAPABILITY_SPECTRUM_MGMT (1<<8)
#define BSS_CAPABILITY_QOS (1<<9)
#define BSS_CAPABILITY_SHORT_SLOT_TIME (1<<10)
#define BSS_CAPABILITY_APSD (1<<11)
#define BSS_CAPABILITY_DSSS_OFDM (1<<13)
struct nlmon *cur_nlmon;
enum msg_type {
MSG_REQUEST,
MSG_RESPONSE,
MSG_COMPLETE,
MSG_RESULT,
MSG_EVENT,
};
struct nlmon {
uint16_t id;
struct l_io *io;
struct l_io *pae_io;
struct l_queue *req_list;
struct pcap *pcap;
bool nortnl;
bool nowiphy;
bool noscan;
bool noies;
};
struct nlmon_req {
uint32_t seq;
uint32_t pid;
uint16_t flags;
uint8_t cmd;
uint8_t version;
};
typedef void (*attr_func_t) (unsigned int level, const char *label,
const void *data, uint16_t size);
enum attr_type {
ATTR_UNSPEC,
ATTR_FLAG,
ATTR_U8,
ATTR_U16,
ATTR_U32,
ATTR_U64,
ATTR_S8,
ATTR_S32,
ATTR_S64,
ATTR_STRING,
ATTR_ADDRESS,
ATTR_BINARY,
ATTR_NESTED,
ATTR_ARRAY,
ATTR_FLAG_OR_U16,
ATTR_CUSTOM,
};
struct attr_entry {
uint16_t attr;
const char *str;
enum attr_type type;
union {
const struct attr_entry *nested;
enum attr_type array_type;
attr_func_t function;
};
};
2015-10-06 21:33:18 +02:00
static void print_attributes(int indent, const struct attr_entry *table,
const void *buf, uint32_t len);
struct flag_names {
uint16_t flag;
const char *name;
};
struct wlan_iface {
int index;
};
static struct l_hashmap *wlan_iface_list = NULL;
static void wlan_iface_list_free(void *data)
{
struct wlan_iface *iface = data;
l_free(iface);
}
static void nlmon_req_free(void *data)
{
struct nlmon_req *req = data;
l_free(req);
}
static time_t time_offset = ((time_t) -1);
static inline void update_time_offset(const struct timeval *tv)
{
if (tv && time_offset == ((time_t) -1))
time_offset = tv->tv_sec;
}
#define print_indent(indent, color1, prefix, title, color2, fmt, args...) \
do { \
printf("%*c%s%s%s%s" fmt "%s\n", (indent), ' ', \
use_color() ? (color1) : "", prefix, title, \
use_color() ? (color2) : "", ## args, \
use_color() ? COLOR_OFF : ""); \
} while (0)
#define print_text(color, fmt, args...) \
print_indent(4, COLOR_OFF, "", "", color, fmt, ## args)
#define print_field(fmt, args...) \
print_indent(4, COLOR_OFF, "", "", COLOR_OFF, fmt, ## args)
#define print_attr(level, fmt, args...) \
print_indent(4 + (level) * 4, COLOR_OFF, "", "", COLOR_OFF, \
fmt, ## args)
#define print_attr_color(level, color, fmt, args...) \
print_indent(4 + (level) * 4, COLOR_OFF, "", "", color, \
fmt, ## args)
#define print_space(x) printf("%*c", (x), ' ')
static void print_packet(const struct timeval *tv, char ident,
const char *color, const char *label,
const char *text, const char *extra)
{
int col = num_columns();
char line[256], ts_str[64];
int n, ts_len = 0, ts_pos = 0, len = 0, pos = 0;
if (tv) {
if (use_color()) {
n = sprintf(ts_str + ts_pos, "%s", COLOR_TIMESTAMP);
if (n > 0)
ts_pos += n;
}
n = sprintf(ts_str + ts_pos, " %" PRId64 ".%06" PRId64,
(int64_t)tv->tv_sec - time_offset,
(int64_t)tv->tv_usec);
if (n > 0) {
ts_pos += n;
ts_len += n;
}
}
if (use_color()) {
n = sprintf(ts_str + ts_pos, "%s", COLOR_OFF);
if (n > 0)
ts_pos += n;
}
if (use_color()) {
n = sprintf(line + pos, "%s", color);
if (n > 0)
pos += n;
}
n = sprintf(line + pos, "%c %s", ident, label);
if (n > 0) {
pos += n;
len += n;
}
if (text) {
int extra_len = extra ? strlen(extra) : 0;
int max_len = col - len - extra_len - ts_len - 3;
n = snprintf(line + pos, max_len + 1, ": %s", text);
if (n > max_len) {
line[pos + max_len - 1] = '.';
line[pos + max_len - 2] = '.';
if (line[pos + max_len - 3] == ' ')
line[pos + max_len - 3] = '.';
n = max_len;
}
if (n > 0) {
pos += n;
len += n;
}
}
if (use_color()) {
n = sprintf(line + pos, "%s", COLOR_OFF);
if (n > 0)
pos += n;
}
if (extra) {
n = sprintf(line + pos, " %s", extra);
if (n > 0) {
pos += n;
len += n;
}
}
if (ts_len > 0) {
printf("%s", line);
if (len < col)
print_space(col - len - ts_len - 1);
printf("%s%s\n", use_color() ? COLOR_TIMESTAMP : "", ts_str);
} else
printf("%s\n", line);
}
static void print_hexdump(unsigned int level,
const unsigned char *buf, uint16_t len)
{
static const char hexdigits[] = "0123456789abcdef";
char str[68];
uint16_t i;
if (!len)
return;
for (i = 0; i < len; i++) {
str[((i % 16) * 3) + 0] = hexdigits[buf[i] >> 4];
str[((i % 16) * 3) + 1] = hexdigits[buf[i] & 0xf];
str[((i % 16) * 3) + 2] = ' ';
str[(i % 16) + 49] = isprint(buf[i]) ? buf[i] : '.';
if ((i + 1) % 16 == 0) {
str[47] = ' ';
str[48] = ' ';
str[65] = '\0';
print_attr_color(level, COLOR_WHITE, "%s", str);
str[0] = ' ';
}
}
if (i % 16 > 0) {
uint16_t j;
for (j = (i % 16); j < 16; j++) {
str[(j * 3) + 0] = ' ';
str[(j * 3) + 1] = ' ';
str[(j * 3) + 2] = ' ';
str[j + 49] = ' ';
}
str[47] = ' ';
str[48] = ' ';
str[65] = '\0';
print_attr_color(level, COLOR_WHITE, "%s", str);
}
}
static void print_address(unsigned int level, const char *label,
const unsigned char address[6])
{
char addr[18];
snprintf(addr, sizeof(addr), "%02X:%02X:%02X:%02X:%02X:%02X",
address[0], address[1], address[2],
address[3], address[4], address[5]);
print_attr(level, "%s %s", label, addr);
}
static const struct {
const uint8_t oui[3];
const char *str;
} oui_table[] = {
{ { 0x00, 0x03, 0x7f }, "Atheros" },
{ { 0x00, 0x03, 0x93 }, "Apple" },
2017-09-06 12:50:30 +02:00
{ { 0x00, 0x04, 0x0e }, "AVM" },
{ { 0x00, 0x0f, 0xac }, "IEEE 802.11" },
{ { 0x00, 0x10, 0x18 }, "Broadcom" },
{ { 0x00, 0x17, 0xf2 }, "Apple" },
{ { 0x00, 0x40, 0x96 }, "Cisco Systems" },
{ { 0x00, 0x50, 0xf2 }, "Microsoft" },
{ { 0x00, 0x90, 0x4c }, "Epigram" },
{ { 0x50, 0x6f, 0x9a }, "Wi-Fi Alliance" },
{ }
};
static void print_ie_error(unsigned int level, const char *label,
uint16_t len, int err)
{
print_attr(level, "Error decoding %s IE len %d: %s (%d)", label, len,
strerror(-err), err);
}
static void print_ie_ssid(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: %s", label, util_ssid_to_utf8(size, data));
}
static void print_ie_rate(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t *rate = (uint8_t *)data;
int pos = 0, i = 0;
char str[128];
if (!size) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s:", label);
while (i < size) {
bool mandatory = (rate[i] & 0x80);
if (rate[i] == 0xff) {
print_attr(level + 1, "BSS membership HT_PHY");
i++;
continue;
}
pos += snprintf(&str[pos], sizeof(str) - pos, "%.1f%s ",
(rate[i] & 127) * 0.5, mandatory? "(B)": "");
i++;
if (i % 8 && i != size)
continue;
if (pos) {
pos += snprintf(&str[pos], sizeof(str) - pos, "Mbit/s");
print_attr(level + 1, "%s", str);
pos = 0;
}
}
}
2014-12-12 14:51:39 +01:00
static void print_ie_ds(unsigned int level, const char *label,
2014-12-15 23:19:29 +01:00
const void *data, uint16_t size)
2014-12-12 14:51:39 +01:00
{
uint8_t *channel = (uint8_t *)data;
if (!size) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s: channel %d", label, *channel);
}
2014-12-12 14:51:42 +01:00
static void print_ie_tim(unsigned int level, const char *label,
2014-12-15 23:19:29 +01:00
const void *data, uint16_t size)
2014-12-12 14:51:42 +01:00
{
const char *dtim = data;
int t, len = size - 3, pos = 0;
uint8_t bit;
char str[128];
if (size < 4) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "DTIM count %2d %s", dtim[0],
2014-12-15 23:19:29 +01:00
dtim[0] ? "beacon frame(s)" :
"this beacon frame is DTIM");
2014-12-12 14:51:42 +01:00
print_attr(level + 1, "DTIM period %2d beacon frame(s)", dtim[1]);
print_attr(level + 1, "Group buffered %d offset %d",
!!(dtim[2] & 0x01), dtim[2] >> 1);
len = size - 3;
2014-12-15 23:19:29 +01:00
2014-12-12 14:51:42 +01:00
for (t = 0; t < len ; t++) {
if (((t + 1) % 4) == 1) {
pos = 0;
pos += snprintf(&str[pos], sizeof(str) - pos,
"AID %4d - %4d ",
t * 8 + 1,
2014-12-15 23:19:29 +01:00
t + 4 > len ? len * 8 : (t + 4) * 8);
2014-12-12 14:51:42 +01:00
}
for (bit = 0x01; bit; bit <<= 1)
pos += snprintf(&str[pos], sizeof(str) - pos,
"%d", !!(dtim[t + 3] & bit));
pos += snprintf(&str[pos], sizeof(str) - pos, " ");
if ((t + 1) % 4 == 0 || t + 1 == len)
print_attr(level + 1, "%s", str);
}
}
2014-12-12 14:51:37 +01:00
static void print_ie_country(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t *code = (uint8_t *)data;
int i = 3;
if (size < 6 || size % 2) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s: %c%c%c", label, code[0], code[1], code[2]);
while (i < size) {
if (code[i] > 200) {
print_attr(level + 1, "Regulatory ID %3d class %3d "
"coverage class %3d",
code[i], code[i + 1], code[i + 2]);
2014-12-12 17:59:48 +01:00
2014-12-12 14:51:37 +01:00
if (code[i + 2] < 32)
print_attr(level + 1, "%27c (air propagation "
"time %2d µs)", ' ', 3 * code[i + 2]);
} else {
print_attr(level + 1, "First channel %3d number of "
"channels %2d max tx power %2d dBm",
code[i], code[i + 1], code[i + 2]);
}
i += 3;
}
}
2014-12-12 14:51:44 +01:00
static void print_ie_bss_load(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t stations, capacity;
uint8_t utilization;
const uint8_t *bytes = data;
if (size != 5) {
print_ie_error(level, label, size, -EINVAL);
return;
}
stations = bytes[0] | bytes[1] << 8;
utilization = bytes[2];
capacity = bytes[3] | bytes[4] << 8;
print_attr(level, "%s: %2d station(s) utilization %d/255 available "
"capacity %d 32µs/s units",
label, stations, utilization, capacity);
}
2014-12-12 14:51:40 +01:00
static void print_ie_power_constraint(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t *dB = (uint8_t *)data;
if (!size) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s: %2d dB", label, *dB);
}
2014-12-12 14:51:43 +01:00
static void print_ie_tpc(unsigned int level, const char *label,
const void *data, uint16_t size)
{
signed char *dB = (signed char*)data;
if (size != 2) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s: transmit power %2d dB link margin %2d dB",
2014-12-15 23:19:29 +01:00
label, dB[0], dB[1]);
2014-12-12 14:51:43 +01:00
}
2014-12-12 14:51:41 +01:00
static void print_ie_erp(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t *flags = (uint8_t *)data;
if (!size) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "non-ERP present %d", !!(*flags & 0x01));
print_attr(level + 1, "use protection %d", !!(*flags & 0x02));
print_attr(level + 1, "Barker preamble mode %d", !!(*flags & 0x04));
}
struct cipher_suites {
uint32_t cipher;
const char *str;
};
static const struct cipher_suites rsn_cipher_selectors[] = {
{ 0x000fac00, "Use group cipher suite" },
{ 0x000fac01, "WEP-40" },
{ 0x000fac02, "TKIP" },
{ 0x000fac04, "CCMP" },
{ 0x000fac05, "WEP-104" },
{ 0x000fac06, "BIP" },
{ 0x000fac07, "Group traffic not allowed" },
{ 0x00147201, "WPI-SMS4" },
{ },
};
static const struct cipher_suites rsn_akm_selectors[] = {
{ 0x000fac01, "IEEE 802.1X/PMKSA; RSNA/PMKSA caching" },
{ 0x000fac02, "PSK; RSNA PSK" },
{ 0x000fac03, "IEEE 802.1X FT; FT" },
{ 0x000fac04, "PSK FT; FT" },
{ 0x000fac05, "IEEE 802.1X/PMKSA caching SHA256; RSNA/RSNA caching SHA256" },
{ 0x000fac06, "PSK SHA256; RSNA PSK SHA256" },
{ 0x000fac07, "TDLS; TPK" },
{ 0x000fac08, "SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange" },
{ 0x000fac09, "FT SAE SHA256; FT" },
{ 0x000fac0e, "FILS SHA256" },
{ 0x000fac0f, "FILS SHA384" },
{ 0x000fac10, "FILS FT SHA256" },
{ 0x000fac11, "FILS FT SHA3854" },
{ 0x000fac12, "OWE" },
{ 0x506f9a01, "WFA OSEN" },
{ }
};
static const struct cipher_suites wpa_cipher_selectors[] = {
{ 0x0050f200, "Use group cipher suite" },
{ 0x0050f201, "WEP-40" },
{ 0x0050f202, "TKIP" },
{ 0x0050f204, "CCMP" },
{ 0x0050f205, "WEP-104" },
{ },
};
static const struct cipher_suites wpa_akm_selectors[] = {
{ 0x0050f201, "IEEE 802.1X/PMKSA; RSNA/PMKSA caching" },
{ 0x0050f202, "PSK; RSNA PSK" },
{ }
};
static void print_ie_cipher_suite(unsigned int level, const char *label,
const uint32_t cipher,
const struct cipher_suites cipher_table[])
{
const char *str = NULL;
unsigned int i;
unsigned char oui[] = {
(cipher & 0xff000000) >> 24,
(cipher & 0x00ff0000) >> 16,
(cipher & 0x0000ff00) >> 8,
};
char suite_value[32] = "";
for (i = 0; cipher_table[i].str; i++) {
if (cipher_table[i].cipher == cipher) {
str = cipher_table[i].str;
snprintf(suite_value, sizeof(suite_value), " %02x",
cipher & 0x000000ff);
break;
}
}
if (!str) {
for (i = 0; oui_table[i].str; i++) {
if (!memcmp(oui_table[i].oui, oui, 3)) {
str = oui_table[i].str;
snprintf(suite_value, sizeof(suite_value),
" %02x (vendor specific)",
cipher & 0x000000ff);
break;
}
}
}
if (!str) {
str = "unknown";
snprintf(suite_value, sizeof(suite_value), "%02x (unknown)",
cipher & 0x000000ff);
}
if (label)
print_attr(level, "%s: %s (%02x:%02x:%02x) suite %s",
label, str, oui[0], oui[1], oui[2], suite_value);
else
print_attr(level, "%s (%02x:%02x:%02x) suite %s",
str, oui[0], oui[1], oui[2], suite_value);
}
static void print_ie_cipher_suites(unsigned int level, const char *label,
const void *data, uint16_t size,
const struct cipher_suites cipher_table[])
{
uint32_t cipher;
print_attr(level, "%s: len %u", label, size);
while (size >= 4) {
2015-02-23 19:39:20 +01:00
cipher = l_get_be32(data);
print_ie_cipher_suite(level + 1, NULL, cipher, cipher_table);
data += 4;
size -= 4;
}
}
static const char *rsn_capabilities_bitfield[] = {
"Preauthentication",
"No Pairwise",
"",
"",
"",
"",
"Management Frame Protection Required",
"Management Frame Protection Capable",
"Reserved",
"Peerkey Enabled",
"SPP A-MSDU Capable",
"SPP A-MSDU Required",
"PBAC",
"Extended Key ID for Individually Addressed Frames",
2021-09-17 15:21:49 +02:00
"Operating Channel Validation Capable",
"Reserved",
NULL
};
static void print_ie_bitfield(unsigned int level, const char *label,
const uint8_t *bytes, const uint8_t *mask, size_t len,
const char *bitfield_table[])
{
unsigned int i;
for (i = 0; i < len * 8; i++) {
uint8_t byte = i / 8;
uint8_t bit = i % 8;
2021-03-12 20:46:04 +01:00
uint8_t masked = bytes[byte] & mask[byte];
2021-03-12 20:46:04 +01:00
if (!test_bit(&masked, bit))
continue;
print_attr(level, "%s: bit %2d: %s", label, i,
bitfield_table[i]);
}
}
static size_t print_ie_rsn_suites(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t count;
uint16_t orig_size = size;
print_ie_cipher_suites(level + 1, "Group Data Cipher Suite", data, 4,
rsn_cipher_selectors);
data += 4;
size -= 4;
if (size < 2)
goto end;
count = l_get_le16(data) * 4;
data += 2;
size -= 2;
if (size < count)
goto end;
print_ie_cipher_suites(level + 1, "Pairwise Cipher Suite", data,
count, rsn_cipher_selectors);
data += count;
size -= count;
if (size < 2)
goto end;
count = l_get_le16(data) * 4;
data += 2;
size -= 2;
if (size < count)
goto end;
print_ie_cipher_suites(level + 1, "AKM Suite", data, count,
rsn_akm_selectors);
data += count;
size -= count;
if (size < 2)
goto end;
return orig_size - size;
end:
if (size)
print_ie_error(level, label, size, -EINVAL);
return orig_size - size;
}
static void print_ie_rsn(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const void *end = data + size;
uint16_t version, count;
uint8_t bytemask[2];
int i;
const char *rsn_capabilities_replay_counter[] = {
"1 replay counter",
"2 replay counters",
"4 replay counters",
"16 replay counters"
};
print_attr(level, "RSN:");
if (end - data < 2) {
print_ie_error(level, label, size, -EINVAL);
return;
}
version = l_get_le16(data);
if (version != 1) {
print_attr(level, "Unknown RSN version %d", version);
return;
}
data += 2;
if (end - data < 4)
goto end;
data += print_ie_rsn_suites(level, label, data, size);
bytemask[0] = 0x03;
bytemask[1] = 0x00;
print_ie_bitfield(level + 1, "RSN capabilities", data, bytemask,
sizeof(bytemask), rsn_capabilities_bitfield);
count = (*((uint8_t *)data) & 0x0c) >> 2;
print_attr(level + 1, "RSN capabilities: bits 2 - 3: %s per PTKSA",
rsn_capabilities_replay_counter[count]);
count = (*((uint8_t *)data) & 0x30) >> 4;
print_attr(level + 1, "RSN capabilities: bits 4 - 5: %s per GTKSA",
rsn_capabilities_replay_counter[count]);
bytemask[0] = 0xc0;
bytemask[1] = 0xff;
print_ie_bitfield(level + 1, "RSN capabilities", data, bytemask,
sizeof(bytemask), rsn_capabilities_bitfield);
data += 2;
if (end - data < 2)
goto end;
2015-02-23 19:39:20 +01:00
count = l_get_le16(data) * 16;
data += 2;
if (end - data < count)
goto end;
for (i = 0; i < count; i += 16) {
const uint8_t *bytes = data;
print_attr(level + 1, "PMKID: %02x:%02x:%02x:%02x:"
"%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x:"
"%02x:%02x:%02x:%02x",
bytes[i], bytes[i + 1],
bytes[i + 2], bytes[i + 3],
bytes[i + 4], bytes[i + 5],
bytes[i + 6], bytes[i + 7],
bytes[i + 8], bytes[i + 9],
bytes[i + 10], bytes[i + 11],
bytes[i + 12], bytes[i + 13],
bytes[i + 14], bytes[i + 15]);
}
data += count;
if (end - data < 4)
goto end;
print_ie_cipher_suites(level + 1, "Group Management Cipher Suite",
data, 4, rsn_cipher_selectors);
data += 4;
end:
if (end - data)
print_ie_error(level, label, size, -EINVAL);
}
static void print_ie_wpa(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t offset;
uint16_t version, count;
if (size < 2)
return;
offset = 0;
version = l_get_le16(data + offset);
offset += 2;
if (version != 1)
return;
print_attr(level, "WPA:");
print_attr(level + 1, "Version: %d(%04x)", version, version);
if (offset + 4 > size)
goto end;
print_ie_cipher_suites(level + 1, "Group Data Cipher Suite",
data + offset, 4, wpa_cipher_selectors);
offset += 4;
if (offset + 2 > size)
goto end;
count = l_get_le16(data + offset) * 4;
offset += 2;
if (offset + count > size)
goto end;
print_ie_cipher_suites(level + 1, "Pairwise Cipher Suite",
data + offset, count, wpa_cipher_selectors);
offset += count;
if (offset + 2 > size)
goto end;
count = l_get_le16(data + offset) * 4;
offset += 2;
if (offset + count > size)
goto end;
print_ie_cipher_suites(level + 1, "AKM Suite", data + offset, count,
wpa_akm_selectors);
return;
end:
print_ie_error(level, label, size, -EINVAL);
}
static void print_ie_wfa_hs20(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
bool pps_mo_id_present;
bool anpq_domain_id_present;
if (size < 1)
return;
2021-03-12 20:46:04 +01:00
pps_mo_id_present = test_bit(ptr, 1);
anpq_domain_id_present = test_bit(ptr, 2);
print_attr(level + 1, "HS2.0 Indication Element:");
2021-03-12 20:46:04 +01:00
print_attr(level + 2, "DGAF Disabled: %u", test_bit(ptr, 0));
print_attr(level + 2, "PPS MO ID Present: %u", pps_mo_id_present);
print_attr(level + 2, "ANQP Domain ID Present: %u",
anpq_domain_id_present);
2021-03-12 05:31:50 +01:00
switch (bit_field(ptr[0], 4, 7)) {
case 0:
print_attr(level + 2, "Version Number: 1.x");
break;
case 1:
print_attr(level + 2, "Version Number: 2.x");
break;
case 2:
print_attr(level + 2, "Version Number: 3.x");
break;
}
ptr += 1;
size -= 1;
if (pps_mo_id_present) {
if (size < 2)
return;
print_attr(level + 2, "PPS MO ID: %02x %02x", ptr[0], ptr[1]);
ptr += 2;
size -= 2;
}
if (anpq_domain_id_present) {
if (size < 2)
return;
print_attr(level + 2, "ANQP Domain ID: %02x %02x",
ptr[0], ptr[1]);
}
}
2019-07-08 18:59:46 +02:00
static bool print_oui(unsigned int level, const uint8_t *oui)
{
const char *str = NULL;
unsigned int i;
for (i = 0; oui_table[i].str; i++) {
if (!memcmp(oui_table[i].oui, oui, 3)) {
str = oui_table[i].str;
break;
}
}
if (!str) {
print_attr(level + 1, "OUI: %02x:%02x:%02x type:%02x",
oui[0], oui[1], oui[2],
oui[3]);
2019-07-08 18:59:46 +02:00
return false;
}
print_attr(level + 1, "%s (%02x:%02x:%02x) type: %02x", str,
oui[0], oui[1], oui[2],
oui[3]);
2019-07-08 18:59:46 +02:00
return true;
}
static void print_ipv4(unsigned int level, const char *label,
const uint8_t *addr)
{
print_attr(level, "%s: %u.%u.%u.%u", label,
addr[0], addr[1], addr[2], addr[3]);
}
2021-09-16 18:30:43 +02:00
static void print_ie_wfa_owe_transition(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct ie_owe_transition_info info;
2021-09-16 18:30:43 +02:00
if (ie_parse_owe_transition(data, size, &info) < 0) {
2021-09-16 18:30:43 +02:00
print_attr(level + 1, "Error parsing");
return;
}
print_attr(level + 1, "BSSID: "MAC, MAC_STR(info.bssid));
print_attr(level + 1, "SSID: %s", util_ssid_to_utf8(info.ssid_len,
info.ssid));
2021-09-16 18:30:43 +02:00
}
2019-07-08 18:59:46 +02:00
static void print_ie_vendor(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *oui = data;
print_attr(level, "%s: len %u", label, size);
if (size < 4)
return;
if (!print_oui(level, oui))
return;
data += 4;
size -= 4;
if (!memcmp(oui, microsoft_oui, 3)) {
switch (oui[3]) {
case 1: /* MSoft WPA IE */
print_ie_wpa(level + 2, label, data, size);
return;
default:
return;
}
} else if (!memcmp(oui, wifi_alliance_oui, 3)) {
switch (oui[3]) {
case 0x04:
print_attr(level + 1, "IP Address Request KDE");
return;
case 0x05:
print_attr(level + 1, "IP Address Allocation KDE");
if (size < 12)
return;
print_ipv4(level + 2, "Client IP Address", data + 0);
print_ipv4(level + 2, "Subnet Mask", data + 4);
print_ipv4(level + 2, "GO IP Address", data + 8);
return;
case 0x10:
print_ie_wfa_hs20(level + 1, label, data, size);
return;
case 0x12:
print_ie_rsn_suites(level + 1, label, data, size);
return;
2021-09-16 18:30:43 +02:00
case 0x1c:
print_ie_wfa_owe_transition(level + 1, label,
data - 6, size + 6);
return;
default:
return;
}
} else if (!memcmp(oui, ieee_oui, 3)) {
const char *kde;
/* EAPoL-Key KDEs */
switch (oui[3]) {
case 1:
kde = "GTK";
break;
case 3:
kde = "MAC address";
break;
case 4:
kde = "PMKID";
break;
case 5:
kde = "SMK";
break;
case 6:
kde = "Nonce";
break;
case 7:
kde = "Lifetime";
break;
case 8:
kde = "Error";
break;
case 9:
kde = "IGTK";
break;
case 10:
kde = "Key ID";
break;
case 11:
kde = "Multi-band GTK";
break;
case 12:
kde = "Multi-band Key ID";
break;
default:
return;
}
print_attr(level + 1, "%s KDE", kde);
return;
}
}
static void print_ht_capabilities(unsigned int level, const char *label,
const void *data, uint16_t size)
{
static const char *ht_capabilities_info_bitfield[16] = {
[0] = "LDPC Coding Capability",
[1] = "Supported Channel Width Set",
[2] = "SM Power Save",
[3] = "SM Power Save",
[4] = "HT-Greenfield",
[5] = "Short GI for 20Mhz",
[6] = "Short GI for 40Mhz",
[7] = "Tx STBC",
[8] = "Rx STBC",
[9] = "Rx STBC",
[10] = "HT-Delayed Block Ack",
[11] = "Maximum A-MSDU Length",
[12] = "DSSS/CCK Mode in 40Mhz",
[13] = "Reserved",
[14] = "40 Mhz Intolerant",
[15] = "L-SIG TXOP Protection Support",
};
static const char *ht_capabilities_sm_power_save[4] = {
"Static", "Dynamic", "Reserved", "Disabled",
};
static const char *ht_capabilities_rx_stbc[4] = {
"Disabled", "One spatial stream", "One and two spatial streams",
"One, two and three spatial streams"
};
uint8_t info_mask[] = { 0x03, 0xfc };
const uint8_t *htc = data;
uint8_t sm_power_save;
uint8_t rx_stbc;
if (size != 2)
return print_ie_error(level, label, size, -EINVAL);
/* Print bits 0-1 */
print_ie_bitfield(level, "HT Capabilities Info", data, info_mask,
1, ht_capabilities_info_bitfield);
/* Print SM Power Save */
sm_power_save = bit_field(htc[0], 2, 2);
print_attr(level, "HT Capabilities Info: bits 2-3: %s",
ht_capabilities_sm_power_save[sm_power_save]);
/* Print bits 4-7 */
info_mask[0] = 0xf0;
print_ie_bitfield(level, "HT Capabilities Info", data, info_mask,
1, ht_capabilities_info_bitfield);
rx_stbc = bit_field(htc[1], 0, 2);
print_attr(level, "HT Capabilities Info: bits 8-9: %s",
ht_capabilities_rx_stbc[rx_stbc]);
/* Print bits 10-15 */
info_mask[0] = 0x00;
print_ie_bitfield(level, "HT Capabilities Info", data, info_mask,
2, ht_capabilities_info_bitfield);
}
static void print_ht_mcs_set(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
int i;
uint8_t bytemask[16];
uint16_t data_rate;
const char *mcs_set[128] = {
[77] = "Reserved",
[78] = "Reserved",
[79] = "Reserved",
[90] = "Reserved",
[91] = "Reserved",
[92] = "Reserved",
[93] = "Reserved",
[94] = "Reserved",
[95] = "Reserved",
[96] = "Tx MCS set defined",
[97] = "Tx Rx MCS set not equal",
[100] = "Tx unequal modulation supported",
[101] = "Reserved",
[102] = "Reserved",
[103] = "Reserved",
[104] = "Reserved",
[105] = "Reserved",
[106] = "Reserved",
[107] = "Reserved",
[108] = "Reserved",
[109] = "Reserved",
[110] = "Reserved",
[111] = "Reserved",
[112] = "Reserved",
[113] = "Reserved",
[114] = "Reserved",
[115] = "Reserved",
[116] = "Reserved",
[117] = "Reserved",
[118] = "Reserved",
[119] = "Reserved",
[120] = "Reserved",
[121] = "Reserved",
[122] = "Reserved",
[123] = "Reserved",
[124] = "Reserved",
[125] = "Reserved",
[126] = "Reserved",
[127] = "Reserved",
};
if (size != 16)
return print_ie_error(level, label, size, -EINVAL);
for (i = 0; i < 77; i++) {
2021-03-12 20:46:04 +01:00
if (test_bit(bytes, i))
print_attr(level, "%s: MCS %d", label, i);
}
memset(bytemask, 0, sizeof(bytemask));
bytemask[9] = 0xe0;
print_ie_bitfield(level, "MCS set", bytes, bytemask, sizeof(bytemask),
mcs_set);
data_rate = l_get_le16(&bytes[10]) & 0x3ff;
if (data_rate)
print_attr(level, "MCS set: Rx Highest data rate: %d Mbit/s",
data_rate);
bytemask[9] = 0x00;
bytemask[11] = 0xfc;
bytemask[12] = 0x03;
print_ie_bitfield(level, "MCS Set", bytes, bytemask, sizeof(bytemask),
mcs_set);
if (bytes[12] & 0x0c)
print_attr(level,
"MCS set: Tx max spatial streams supported: %d",
((bytes[12] & 0x0c) >> 2) + 1);
bytemask[11] = 0x00;
bytemask[12] = 0xf0;
bytemask[13] = 0xff;
bytemask[14] = 0xff;
bytemask[15] = 0xff;
print_ie_bitfield(level, "MCS set", bytes, bytemask, sizeof(bytemask),
mcs_set);
}
static void print_ie_ht_operation(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const char *secondary_offset[] = {
"no secondary channel",
"above primary channel",
"reserved",
"below primary channel"
};
const char *channel_width[] = {
"20 MHz channel width",
"Any supported channel width"
};
const char *ht_protection[] = {
"No protection",
"Nonmember protection mode",
"20 MHz protection mode",
"non-HT mixed mode"
};
const char *ht_ops_bitfield[] = {
"",
"",
"",
"RIFS permitted",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"",
"",
"Non-greenfield HT STAs present",
"Reserved",
"OBSS non-HT STAs present",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
"Dual beacon",
"Dual CTS protection",
"STBC beacon",
"L-SIG TXOP protection full support",
"PCO active",
"PCO Phase",
"Reserved",
"Reserved",
"Reserved",
"Reserved",
NULL
};
uint8_t *bytes = (uint8_t *) data;
uint8_t bytemask[5];
int i;
if (size < 22) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr (level, "%s:", label);
print_attr (level + 1, "Primary channel %d", bytes[0]);
i = bytes[1] & 0x03;
print_attr (level + 1,
"Information: Secondary Channel Offset: %s",
secondary_offset[i]);
i = (bytes[1] & 0x04) >> 2;
print_attr (level + 1,
"Information: Channel width: bit 2: %s",
channel_width[i]);
memset(bytemask, 0, sizeof(bytemask));
bytemask[0] = 0xf8;
print_ie_bitfield(level + 1,
"Information", &bytes[1], bytemask,
sizeof(bytemask), ht_ops_bitfield);
i = bytes[2] & 0x03;
print_attr(level + 1,
"Information: HT Protection: bits 8 - 9: %s",
ht_protection[i]);
bytemask[0] = 0x00;
bytemask[1] = 0xfc;
bytemask[2] = 0xff;
bytemask[3] = 0xff;
bytemask[4] = 0xff;
print_ie_bitfield(level + 1, "Information", &bytes[1],
bytemask, sizeof(bytemask), ht_ops_bitfield);
print_ht_mcs_set(level + 1, "Basic MCS set", &bytes[6], 16);
}
static void print_spatial_stream_map(unsigned int level, const char *label,
const uint8_t *map)
{
static const char *spatial_streams[] = {
"0 - MCS 0-7 supported",
"1 - MCS 0-8 supported",
"2 - MCS 0-9 supported",
"3 - No MCS support",
};
print_attr(level + 1, "%s 1 Streams: %s", label,
spatial_streams[bit_field(map[0], 0, 2)]);
print_attr(level + 1, "%s 2 Streams: %s", label,
spatial_streams[bit_field(map[0], 2, 2)]);
print_attr(level + 1, "%s 3 Streams: %s", label,
spatial_streams[bit_field(map[0], 4, 2)]);
print_attr(level + 1, "%s 4 Streams: %s", label,
spatial_streams[bit_field(map[0], 6, 2)]);
print_attr(level + 1, "%s 5 Streams: %s", label,
spatial_streams[bit_field(map[1], 0, 2)]);
print_attr(level + 1, "%s 6 Streams: %s", label,
spatial_streams[bit_field(map[1], 2, 2)]);
print_attr(level + 1, "%s 7 Streams: %s", label,
spatial_streams[bit_field(map[1], 4, 2)]);
print_attr(level + 1, "%s 8 Streams: %s", label,
spatial_streams[bit_field(map[1], 6, 2)]);
}
static void print_ie_vht_operation(unsigned int level, const char *label,
const void *data, uint16_t size)
{
static const char *channel_width[] = {
"0 - 20 or 40 Mhz channel width",
"1 - 80 Mhz",
"2 - 160 Mhz",
"3 - 80+80 Mhz",
};
uint8_t *bytes = (uint8_t *) data;
if (size < 5) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "Channel Width %s", bytes[0] > 3 ? "Reserved" :
channel_width[bytes[0]]);
print_attr(level + 1, "Channel Center Frequency 1: %d", bytes[1]);
print_attr(level + 1, "Channel Center Frequency 2: %d", bytes[2]);
print_spatial_stream_map(level + 1, "Basic VHT-MCS", bytes + 3);
}
static const char *extended_capabilities_bitfield[80] = {
[0] = "20/40 BSS coexistence management support",
[1] = "Reserved",
[2] = "Extended channel switching",
[3] = "Reserved",
[4] = "PSMP capability",
[5] = "Reserved",
[6] = "S-PSMP support",
[7] = "Event",
[8] = "Diagnostics",
[9] = "Multicast diagnostics",
[10] = "Location tracking",
[11] = "FMS",
[12] = "Proxy ARP service",
[13] = "Collocated interference reporting",
[14] = "Civic location",
[15] = "Geospatial location",
[16] = "TFS",
[17] = "WNM-Sleep mode",
[18] = "TIM broadcast",
[19] = "BSS transition",
[20] = "QoS traffic capability",
[21] = "AC station count",
[22] = "Multiple BSSID",
[23] = "Timing measurement",
[24] = "Channel usage",
[25] = "SSID list",
[26] = "DMS",
[27] = "UTC TSF offset",
[28] = "TDLS Peer U-APSD buffer STA support",
[29] = "TDLS Peer PSM support",
[30] = "TDLS channel switching",
[31] = "Interworking",
[32] = "QoS Map",
[33] = "EBR",
[34] = "SSPN Interface",
[35] = "Reserved",
[36] = "MSGCF Capability",
[37] = "TDLS Support",
[38] = "TDLS Prohibited",
[39] = "TDLS Channel Switching Prohibited",
[40] = "Reject Unadmitted Frame",
[41 ... 43] = "Reserved",
[44] = "Identifier Location",
[45] = "U-APSD Coexistence",
[46] = "WNM- Notification",
[47] = "Reserved",
[48] = "UTF-8 SSID",
[49] = "QMF Activated",
[50] = "QMF Reconfiguration Activated",
[51] = "Robust AV Streaming",
[52] = "Advanced GCR",
[53] = "Mesh GCR",
[54] = "SCS",
[55] = "QLoad Report",
[56] = "Alternate EDCA",
[57] = "Unprotected TXOP Negotiation",
[58] = "Protected TXOP Negotiation",
[59] = "Reserved",
[60] = "Protected QLoad Report",
[61] = "TDLS Wider Bandwidth",
[62] = "Opmode Notification",
[65] = "Channel Schedule Management",
[66] = "Geodatabase Inband Enabling Signal",
[67] = "Network Channel Control",
[68] = "White Space Map",
[69] = "Channel Availability Query",
[70] = "Fine Timing Measurement Responder",
[71] = "Fine Timing Measurement Initiator",
[72] = "FILS Capability",
[73] = "Extended Spectrum Management Capable",
[74] = "Future Channel Guidance",
};
static void print_ie_extended_capabilities(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
uint8_t bytemask1[] = { 0xff, 0xff, 0xff, 0xff,
0xff, 0x01 };
uint8_t bytemask2[] = { 0x00, 0x00, 0x00, 0x00,
0x00, 0xf0, 0xff, 0xff };
uint8_t interval;
size_t bytes;
bool spsmp;
print_attr(level, "%s: len %u", label, size);
if (size == 0)
return;
2021-03-12 20:46:04 +01:00
spsmp = test_bit(data, 6);
bytes = size < sizeof(bytemask1) ? size : sizeof(bytemask1);
/* Print first 40 bits */
print_ie_bitfield(level + 1, "Capability", data, bytemask1,
bytes, extended_capabilities_bitfield);
if (size <= bytes)
return;
/* Print Service Interval Granularity */
if (spsmp) {
2021-03-12 05:31:50 +01:00
interval = bit_field(*((uint8_t *) data + 5), 1, 3);
print_attr(level + 1,
"Shortest Service Interval Granularity: %d ms",
interval * 5 + 5);
}
bytes = size < sizeof(bytemask2) ? size : sizeof(bytemask2);
/* Print remainder */
print_ie_bitfield(level + 1, "Capability", data, bytemask2,
bytes, extended_capabilities_bitfield);
}
static void print_ie_ht_capabilities(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
static const char *ht_capabilities_min_mpdu_start_spacing[8] = {
"No restriction", "1/4 us", "1/2 us", "1 us", "2 us",
"4 us", "8 us", "16 us",
};
static const char *ht_capabilities_pco_transition_time[4] = {
"No transition", "400 us", "1.5 ms", "5 ms",
};
static const char *ht_capabilities_mcs_feedback[4] = {
"No feedback", "Reserved", "Unsolicited", "Both",
};
const uint8_t *htc = data;
uint8_t ampdu_exponent;
bool pco;
bool plus_htc;
bool rd_responder;
uint8_t bits;
print_attr(level, "%s: len %u", label, size);
if (size != 26)
return;
print_ht_capabilities(level + 1, "HT Capabilities Info", htc, 2);
2021-03-12 05:31:50 +01:00
ampdu_exponent = bit_field(htc[2], 0, 2);
print_attr(level + 1, "A-MPDU Parameters: "
"Maximum A-MPDU Length Exponent: %d", ampdu_exponent);
2021-03-12 05:31:50 +01:00
bits = bit_field(htc[2], 2, 3);
print_attr(level + 1, "A-MPDU Parameters: "
"Minimum MPDU Start Spacing: %s",
ht_capabilities_min_mpdu_start_spacing[bits]);
print_ht_mcs_set(level + 1, "Supported MCS", htc + 3, 16);
2021-03-12 20:46:04 +01:00
pco = test_bit(htc + 18, 0);
print_attr(level + 1, "HT Extended Capabilities: PCO: %s",
bits ? "supported" : "not supported");
if (pco) {
2021-03-12 05:31:50 +01:00
bits = bit_field(htc[18], 1, 2);
print_attr(level + 1, "HT Extended Capabilities: "
"PCO Transition Time: %s",
ht_capabilities_pco_transition_time[bits]);
}
2021-03-12 05:31:50 +01:00
bits = bit_field(htc[19], 0, 2);
print_attr(level + 1, "HT Extended Capabilities: "
"MCS Feedback: %s", ht_capabilities_mcs_feedback[bits]);
2021-03-12 20:46:04 +01:00
plus_htc = test_bit(htc + 19, 2);
print_attr(level + 1, "HT Extended Capabilities: "
"+HTC: %s", plus_htc ? "supported" : "not supported");
2021-03-12 20:46:04 +01:00
rd_responder = test_bit(htc + 19, 3);
print_attr(level + 1, "HT Extended Capabilities: "
"RD Responder: %s",
rd_responder ? "supported" : "not supported");
/* TODO: Transmit Beamforming Capabilities field */
/* TODO: ASEL Capability field */
}
static void print_ie_vht_capabilities(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
static const char *vht_capabilities_info_bitfield[] = {
[0 ... 1] = "Maximum MPDU Length",
[2 ... 3] = "Supported Channel Width Set",
[4] = "RX LDPC",
[5] = "Short GI for 80 Mhz",
[6] = "Short GI for 160 and 80+80 Mhz",
[7] = "Tx STBC",
[8 ... 10] = "Rx STBC",
[11] = "SU Beamformer Capable",
[12] = "SU Beamformee Capable",
[13 ... 15] = "Beamformee STS Capability",
[16 ... 18] = "Number of Sounding Dimensions",
[19] = "MU Beamformer Capable",
[20] = "MU Beamformee Capable",
[21] = "TXOP PS",
[22] = "+HTC-VHT Capable",
[23 ... 25] = "Maximum A-MPDU Length Exponent",
[26 ... 27] = "VHT Link Adapation Capable",
[28] = "RX Antenna Pattern Consistency",
[29] = "TX Antenna Pattern Consistency",
[30 ... 31] = "Extended NSS BW Support",
};
uint8_t info_mask[] = { 0xf0, 0x18, 0x78, 0x30 };
print_attr(level, "%s: len %u", label, size);
if (size != 12)
return;
print_ie_bitfield(level + 1, "VHT Capabilities Info", data, info_mask,
4, vht_capabilities_info_bitfield);
print_spatial_stream_map(level + 1, "RxVHT-MCS", data + 4);
print_attr(level + 1, "Rx Highest Supported Long GI Data Rate: %d",
l_get_le16(data + 6) & 0x1f);
print_spatial_stream_map(level + 1, "TxVHT-MCS", data + 8);
print_attr(level + 1, "Tx Highest Supported Long GI Data Rate: %d",
l_get_le16(data + 10) & 0x1f);
if (test_bit(data + 4, 61))
print_attr(level + 1, "VHT Extended NSS BW Capable");
}
static void print_ie_rm_enabled_caps(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
static const char *capabilities[40] = {
[0] = "Link Measurement",
[1] = "Neighbor Report",
[2] = "Parallel Measurements",
[3] = "Repeated Measurements",
[4] = "Beacon Passive Measurement",
[5] = "Beacon Active Measurement",
[6] = "Beacon Table Measurement",
[7] = "Beacon Measurement Reporting Conditions",
[8] = "Frame Measurement",
[9] = "Channel Load Measurement",
[10] = "Noise Histogram Measurement",
[11] = "Statistics Measurement",
[12] = "LCI Measurement",
[13] = "LCI Azimuth",
[14] = "Transmit Stream / Category Measurement",
[15] = "Triggered Transmit Stream / Category Measurement",
[16] = "AP Channel Report",
[17] = "RM MIB",
[27] = "Measurement Pilot Transmission Information",
[28] = "Neighbor Report TSF Offset",
[29] = "RCPI Measurement capability enabled",
[30] = "RSNI Measurement",
[31] = "BSS Average Access Delay",
[32] = "BSS Available Admission Capacity",
[33] = "Antenna capability",
};
const uint8_t *bytes;
uint8_t bytemask1[3] = { 0xff, 0xff, 0x03 };
uint8_t bytemask2[2] = { 0xf8, 0x03 };
uint8_t byte;
print_attr(level, "%s: len %u", label, size);
if (size != 5)
return;
bytes = data;
print_ie_bitfield(level + 1, "Enabled", bytes,
bytemask1, sizeof(bytemask1), capabilities);
2021-03-12 05:31:50 +01:00
byte = bit_field(bytes[2], 2, 3);
print_attr(level + 1, "Operating Channel Max Measurement Duration: %u",
byte);
2021-03-12 05:31:50 +01:00
byte = bit_field(bytes[2], 5, 3);
print_attr(level + 1, "Non-Operating Channel Max Measurement "
"Duration: %u", byte);
2021-03-12 05:31:50 +01:00
byte = bit_field(bytes[3], 0, 3);
print_attr(level + 1, "Measurement Pilot Capability: %u", byte);
print_ie_bitfield(level + 1, "Enabled", bytes + sizeof(bytemask1),
bytemask2, sizeof(bytemask2), capabilities);
}
static void print_ie_interworking(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
const char *msg;
uint8_t type;
bool venue = false;
bool hessid = false;
print_attr(level, "%s: len %u", label, size);
2021-03-12 05:31:50 +01:00
type = bit_field(ptr[0], 0, 3);
switch (type) {
case 0:
msg = "Private network";
break;
case 1:
msg = "Private network w/ guest access";
break;
case 2:
msg = "Chargeable public network";
break;
case 3:
msg = "Free public network";
break;
case 4:
msg = "Personal device network";
break;
case 5:
msg = "Emergency services only network";
break;
case 14:
msg = "Test/Experimental";
break;
case 15:
msg = "Wildcard";
break;
default:
return;
}
print_attr(level + 1, "Network Type: %s", msg);
2021-03-12 20:46:04 +01:00
print_attr(level + 1, "Internet: %u", test_bit(ptr, 4));
print_attr(level + 1, "ASRA: %u", test_bit(ptr, 5));
print_attr(level + 1, "ESR: %u", test_bit(ptr, 6));
print_attr(level + 1, "UESA: %u", test_bit(ptr, 7));
size--;
ptr++;
if (!size)
return;
/*
* There is venue/hessid info optionally, and no way of determining if
* they exist except looking at the length.
*/
if (size == 2)
venue = true;
else if (size == 6)
hessid = true;
else if (size == 8) {
venue = true;
hessid = true;
}
if (venue) {
switch (ptr[0]) {
case 0:
msg = "Unspecified";
break;
case 1:
msg = "Assembly";
break;
case 2:
msg = "Business";
break;
case 3:
msg = "Educational";
break;
case 5:
msg = "Factory and Industrial";
break;
case 6:
msg = "Institutional";
break;
case 7:
msg = "Mercantile";
break;
case 8:
msg = "Residential";
break;
case 9:
msg = "Utility and Miscellaneous";
break;
case 10:
msg = "Vehicular";
break;
case 11:
msg = "Outdoor";
break;
default:
return;
}
/*
* Each of the above groups have many group types, but if
* anyone really cares they can cross reference the integer
* type with IEEE 802.11-2016 Table 9-62
*/
print_attr(level + 1, "Venue: %s, type: %u", msg, ptr[1]);
ptr += 2;
size -= 2;
}
if (hessid)
print_attr(level + 1, "HESSID: "MAC, MAC_STR(ptr));
}
static void print_ie_advertisement(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
const char *msg = NULL;
print_attr(level, "%s: len %u", label, size);
while (size) {
2021-03-12 05:31:50 +01:00
uint8_t qr_len = bit_field(ptr[0], 0, 7);
uint8_t id = ptr[1];
switch (id) {
case IE_ADVERTISEMENT_ANQP:
msg = "ANQP";
break;
case IE_ADVERTISEMENT_MIH_SERVICE:
msg = "MIH Information Service";
break;
case IE_ADVERTISEMENT_MIH_DISCOVERY:
msg = "MIH Command and Event Services";
break;
case IE_ADVERTISEMENT_EAS:
msg = "EAS";
break;
case IE_ADVERTISEMENT_RLQP:
msg = "RLQP";
break;
case IE_ADVERTISEMENT_VENDOR_SPECIFIC:
msg = "Vendor Specific";
break;
default:
return;
}
if (id == IE_ADVERTISEMENT_VENDOR_SPECIFIC) {
size -= ptr[3];
ptr += ptr[3];
} else {
size -= 2;
ptr += 2;
}
print_attr(level + 1, "Protocol: %s, Query Resp Limit: %u",
msg, qr_len);
}
}
static void print_ie_owe(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
uint16_t group;
print_attr(level, "%s: len %u", label, size);
group = l_get_le16(data);
print_attr(level + 1, "ECC Group: %u", group);
print_attr(level + 1, "Public Key:");
print_hexdump(level + 2, data + 2, size - 2);
}
static void print_fils_indication(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
print_attr(level, "FILS Indication: len %u", size);
print_attr(level + 1, "Num Public Key Identifiers: %u",
2021-03-12 05:31:50 +01:00
bit_field(*bytes, 0, 3));
print_attr(level + 1, "Num Realm Identifiers: %u",
2021-03-12 05:31:50 +01:00
bit_field(*bytes, 3, 3));
2021-03-12 20:46:04 +01:00
print_attr(level + 1, "IP configuration: %u", test_bit(bytes, 6));
print_attr(level + 1, "Cache Identifier Included: %u",
2021-03-12 20:46:04 +01:00
test_bit(bytes, 7));
bytes++;
2021-03-12 20:46:04 +01:00
print_attr(level + 1, "HES-SID Included: %u", test_bit(bytes, 0));
print_attr(level + 1, "SK Auth without PFS supported: %u",
2021-03-12 20:46:04 +01:00
test_bit(bytes, 1));
print_attr(level + 1, "SK Auth with PFS supported: %u",
2021-03-12 20:46:04 +01:00
test_bit(bytes, 2));
print_attr(level + 1, "PK Auth supported: %u", test_bit(bytes, 3));
bytes++;
print_hexdump(level + 1, bytes, size - 2);
}
static void print_fils_key_confirmation(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "FILS Key Confirmation (KeyAuth): len %u", size);
}
static void print_fils_session(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "FILS Session: len %u", size);
}
static void print_ie_supported_operating_classes(unsigned int level,
const char *label,
const void *data,
uint16_t size)
{
const void *end = data + size;
if (size < 1) {
print_ie_error(level, label, size, -EINVAL);
return;
}
print_attr(level, "Current Operating Class: %u", l_get_u8(data));
data += 1;
while (end - data) {
uint8_t cls = l_get_u8(data);
/*
* TODO: Support Current Operating Class Extension Sequence
* and Operating Class Duple Sequence
*/
if (cls == 130 || cls == 0) {
data = end;
break;
}
print_attr(level, "Supported Operating Class: %u", cls);
data += 1;
}
if (end - data)
print_ie_error(level, label, size, -EINVAL);
}
static void print_qos_map(unsigned int level, const char *label,
const void *data,
uint16_t size)
{
print_attr(level, "QoS Map");
}
static void print_measurement_request_beacon(unsigned int level,
const void *data,
uint16_t size)
{
uint8_t mode;
if (size < 13)
return;
print_attr(level, "Operating Class: %u", l_get_u8(data));
print_attr(level, "Channel: %u", l_get_u8(data + 1));
print_attr(level, "Randomization Interval: %u", l_get_le16(data + 2));
print_attr(level, "Duration: %u", l_get_le16(data + 4));
mode = l_get_u8(data + 6);
switch (mode) {
case 0:
print_attr(level, "Measurement: Passive");
break;
case 1:
print_attr(level, "Measurement: Active");
break;
case 2:
print_attr(level, "Measurement: Table");
break;
default:
print_attr(level, "Measurement: Invalid (%u)", mode);
return;
}
print_attr(level, "BSSID: "MAC, MAC_STR(((const uint8_t *)data + 7)));
}
static const char *rrm_measurement_types[] = {
[0] = "Basic",
[1] = "Clear Channel Assessment",
[2] = "Receive Power Indication",
[3] = "Channel Load",
[4] = "Noise Histogram",
[5] = "Beacon",
[6] = "Frame",
[7] = "STA Statistics",
[8] = "LCI",
[9] = "Transmit Stream/Category Measurement",
[10] = "Multicast Diagnostics",
[11] = "Location Civic",
[12] = "Location Identifier",
[13] = "Directional Channel Quality",
[14] = "Directional Measurement",
[15] = "Directional Statistics",
[16] = "Fine Timing Measurement Range",
[255] = "Measurement Pause"
};
static void print_measurement_request(unsigned int level, const char *label,
const void *data,
uint16_t size)
{
uint8_t mode;
uint8_t type;
print_attr(level, "Measurement Request");
if (size < 3)
return;
print_attr(level + 1, "Token: %u", l_get_u8(data));
mode = l_get_u8(data + 1);
print_attr(level + 1, "Request Mode: %u", mode);
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 0))
print_attr(level + 2, "Parallel bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 1))
print_attr(level + 2, "Enable bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 2))
print_attr(level + 2, "Request bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 3))
print_attr(level + 2, "Report bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 4))
print_attr(level + 2, "Duration Mandatory set");
type = l_get_u8(data + 2);
if (type > 16 && type != 255) {
print_attr(level + 1, "Type: Invalid (%u)", type);
return;
}
print_attr(level + 1, "Type: %s", rrm_measurement_types[type]);
switch (type) {
case 5:
print_measurement_request_beacon(level + 1, data + 3, size - 3);
break;
}
}
static void print_measurement_report_beacon(unsigned int level,
const void *data,
uint16_t size)
{
uint8_t frame_info;
if (size < 26)
return;
print_attr(level, "Operating Class: %u", l_get_u8(data));
print_attr(level, "Channel: %u", l_get_u8(data + 1));
print_attr(level, "Start Time: %"PRIu64, l_get_le64(data + 2));
print_attr(level, "Duration: %u", l_get_le16(data + 10));
frame_info = l_get_u8(data + 12);
2021-03-12 05:31:50 +01:00
print_attr(level, "PHY Type: %u", bit_field(frame_info, 0, 7));
2021-03-12 20:46:04 +01:00
print_attr(level, "Frame Type: %u", test_bit(&frame_info, 7));
print_attr(level, "RCPI: %u", l_get_u8(data + 13));
print_attr(level, "RSNI: %u", l_get_u8(data + 14));
print_attr(level, "BSSID: "MAC, MAC_STR(((const uint8_t *)data + 15)));
print_attr(level, "Antenna ID: %u", l_get_u8(data + 21));
print_attr(level, "Parent TSF: %u", l_get_le32(data + 22));
}
static void print_measurement_report(unsigned int level, const char *label,
const void *data,
uint16_t size)
{
uint8_t mode;
uint8_t type;
print_attr(level, "Measurement Report");
if (size < 3)
return;
print_attr(level + 1, "Token: %u", l_get_u8(data));
mode = l_get_u8(data + 1);
print_attr(level + 1, "Report Mode: %u", mode);
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 0))
print_attr(level + 2, "Late bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 1))
print_attr(level + 2, "Incapable bit set");
2021-03-12 20:46:04 +01:00
if (test_bit(&mode, 2))
print_attr(level + 2, "Refused bit set");
type = l_get_u8(data + 2);
if (type > 16 && type != 255) {
print_attr(level + 1, "Type: Invalid (%u)", type);
return;
}
print_attr(level + 1, "Type: %s", rrm_measurement_types[type]);
switch (type) {
case 5:
print_measurement_report_beacon(level + 1, data + 3, size - 3);
break;
}
}
static void print_fast_bss_transition(unsigned int level, const char *label,
const void *data,
uint16_t size)
{
struct ie_ft_info ft_info;
uint32_t mic_len = 16;
/* Most likely the MIC is 16 bytes */
if (ie_parse_fast_bss_transition_from_data(data - 2, size + 2,
mic_len, &ft_info) < 0) {
mic_len = 24;
/* Must be FILS, try 24 */
if (ie_parse_fast_bss_transition_from_data(data - 2, size + 2,
mic_len, &ft_info) < 0) {
print_attr(level + 1, "error parsing");
return;
}
}
print_attr(level, "%s", label);
if (ft_info.rsnxe_used)
print_attr(level + 1, "RSNXE Used set");
print_attr(level + 1, "MIC Element Count: %u",
ft_info.mic_element_count);
print_attr(level + 1, "MIC:");
print_hexdump(level + 2, ft_info.mic, mic_len);
print_attr(level + 1, "ANONCE:");
print_hexdump(level + 2, ft_info.anonce, sizeof(ft_info.anonce));
print_attr(level + 1, "SNONCE:");
print_hexdump(level + 2, ft_info.snonce, sizeof(ft_info.snonce));
print_attr(level + 1, "R0KHID:");
print_hexdump(level + 2, ft_info.r0khid, ft_info.r0khid_len);
if (ft_info.r1khid_present) {
print_attr(level + 1, "R1KHID:");
print_hexdump(level + 2, ft_info.r1khid,
sizeof(ft_info.r1khid));
}
if (ft_info.gtk_len) {
print_attr(level + 1, "GTK Key ID: %u", ft_info.gtk_key_id);
print_attr(level + 1, "GTK RSC:");
print_hexdump(level + 2, ft_info.gtk_rsc,
sizeof(ft_info.gtk_rsc));
print_attr(level + 1, "GTK:");
print_hexdump(level + 2, ft_info.gtk, ft_info.gtk_len);
}
if (ft_info.igtk_len) {
print_attr(level + 1, "IGTK Key ID: %u", ft_info.igtk_key_id);
print_attr(level + 1, "IGTK IPN:");
print_hexdump(level + 2, ft_info.igtk_ipn,
sizeof(ft_info.igtk_ipn));
print_attr(level + 1, "IGTK:");
print_hexdump(level + 2, ft_info.igtk, ft_info.igtk_len);
}
}
2021-09-21 22:44:47 +02:00
static void print_mobility_domain(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t mdid;
bool ft_over_ds;
bool resource_req;
print_attr(level, "%s", label);
if (ie_parse_mobility_domain_from_data(data - 2, size + 2, &mdid,
&ft_over_ds, &resource_req) < 0) {
print_attr(level + 1, "error parsing");
return;
}
print_attr(level + 1, "MDID: %04x", mdid);
if (ft_over_ds)
print_attr(level + 1, "FT-over-DS bit set");
if (resource_req)
print_attr(level + 1, "Resource Request Protocol bit set");
}
2021-09-21 22:44:48 +02:00
static void print_rsnx(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
uint8_t field_size = bit_field(ptr[0], 0, 4);
print_attr(level, "%s", label);
print_attr(level + 1, "Field Size: %u", field_size);
if (test_bit(ptr, 4))
print_attr(level + 1, "Protected TWT Operations Support");
if (test_bit(ptr, 5))
print_attr(level + 1, "SAE Hash-to-Element");
}
static struct attr_entry ie_entry[] = {
2015-05-07 04:55:55 +02:00
{ IE_TYPE_SSID, "SSID",
ATTR_CUSTOM, { .function = print_ie_ssid } },
{ IE_TYPE_SUPPORTED_RATES, "Supported rates",
ATTR_CUSTOM, { .function = print_ie_rate } },
{ IE_TYPE_DSSS_PARAMETER_SET, "DSSS parameter set",
ATTR_CUSTOM, { .function = print_ie_ds } },
{ IE_TYPE_TIM, "TIM",
ATTR_CUSTOM, { .function = print_ie_tim } },
{ IE_TYPE_COUNTRY, "Country",
ATTR_CUSTOM, { .function = print_ie_country } },
{ IE_TYPE_BSS_LOAD, "BSS load",
ATTR_CUSTOM, { .function = print_ie_bss_load } },
{ IE_TYPE_POWER_CONSTRAINT, "Power constraint",
ATTR_CUSTOM, { .function = print_ie_power_constraint } },
{ IE_TYPE_TPC_REPORT, "TPC report",
ATTR_CUSTOM, { .function = print_ie_tpc } },
{ IE_TYPE_ERP, "ERP Information",
ATTR_CUSTOM, { .function = print_ie_erp } },
{ IE_TYPE_RSN, "RSN",
ATTR_CUSTOM, { .function = print_ie_rsn } },
{ IE_TYPE_EXTENDED_SUPPORTED_RATES, "Extended supported rates",
ATTR_CUSTOM, { .function = print_ie_rate } },
{ IE_TYPE_HT_OPERATION, "HT Operation",
ATTR_CUSTOM, { .function = print_ie_ht_operation } },
{ IE_TYPE_VHT_OPERATION, "VHT Operation",
ATTR_CUSTOM, { .function = print_ie_vht_operation } },
2015-05-07 04:55:55 +02:00
{ IE_TYPE_VENDOR_SPECIFIC, "Vendor specific",
ATTR_CUSTOM, { .function = print_ie_vendor } },
{ IE_TYPE_EXTENDED_CAPABILITIES, "Extended Capabilities",
ATTR_CUSTOM, { .function = print_ie_extended_capabilities } },
{ IE_TYPE_HT_CAPABILITIES, "HT Capabilities",
ATTR_CUSTOM, { .function = print_ie_ht_capabilities } },
{ IE_TYPE_VHT_CAPABILITIES, "VHT Capabilities",
ATTR_CUSTOM, { .function = print_ie_vht_capabilities } },
{ IE_TYPE_RM_ENABLED_CAPABILITIES, "RM Enabled Capabilities",
ATTR_CUSTOM, { .function = print_ie_rm_enabled_caps } },
{ IE_TYPE_INTERWORKING, "Interworking",
ATTR_CUSTOM, { .function = print_ie_interworking } },
{ IE_TYPE_ADVERTISEMENT_PROTOCOL, "Advertisement Protocol",
ATTR_CUSTOM, { .function = print_ie_advertisement } },
{ IE_TYPE_OWE_DH_PARAM, "OWE Diffie-Hellman Parameter",
ATTR_CUSTOM, { .function = print_ie_owe } },
{ IE_TYPE_FILS_INDICATION, "FILS Indication",
ATTR_CUSTOM, { .function = print_fils_indication } },
{ IE_TYPE_FILS_KEY_CONFIRMATION, "FILS Key Confirmation",
ATTR_CUSTOM, { .function = print_fils_key_confirmation } },
{ IE_TYPE_FILS_SESSION, "FILS Session",
ATTR_CUSTOM, { .function = print_fils_session } },
{ IE_TYPE_SUPPORTED_OPERATING_CLASSES, "Supported Operating Classes",
ATTR_CUSTOM,
{ .function = print_ie_supported_operating_classes } },
{ IE_TYPE_QOS_MAP_SET, "QoS Map",
ATTR_CUSTOM, { .function = print_qos_map } },
{ IE_TYPE_MEASUREMENT_REQUEST, "Measurement Request",
ATTR_CUSTOM, { .function = print_measurement_request } },
{ IE_TYPE_MEASUREMENT_REPORT, "Measurement Report",
ATTR_CUSTOM, { .function = print_measurement_report } },
{ IE_TYPE_FAST_BSS_TRANSITION, "Fast BSS Transition",
ATTR_CUSTOM, { .function = print_fast_bss_transition } },
2021-09-21 22:44:47 +02:00
{ IE_TYPE_MOBILITY_DOMAIN, "Mobility Domain",
ATTR_CUSTOM, { .function = print_mobility_domain } },
2021-09-21 22:44:48 +02:00
{ IE_TYPE_RSNX, "RSNX",
ATTR_CUSTOM, { .function = print_rsnx } },
{ },
};
static void print_ie(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct ie_tlv_iter iter;
int i;
print_attr(level, "%s: len %u", label, size);
ie_tlv_iter_init(&iter, data, size);
while (ie_tlv_iter_next(&iter)) {
uint16_t tag = ie_tlv_iter_get_tag(&iter);
struct attr_entry *entry = NULL;
for (i = 0; ie_entry[i].str; i++) {
if (ie_entry[i].attr == tag) {
entry = &ie_entry[i];
break;
}
}
if (cur_nlmon && cur_nlmon->noies && tag != IE_TYPE_SSID)
continue;
if (entry && entry->function)
entry->function(level + 1, entry->str,
iter.data, iter.len);
else
print_attr(level + 1, "Tag %u: len %u", tag,
iter.len);
print_hexdump(level + 2, iter.data, iter.len);
}
}
static void print_wsc_byte(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 1) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %u", label, bytes[0]);
}
static void print_wsc_bytes(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: (len: %d)", label, size);
print_hexdump(level + 1, data, size);
}
static void print_wsc_bool(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 1) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %s", label, bytes[0] ? "True" : "False");
}
2015-07-24 23:58:13 +02:00
static void print_wsc_ascii_string(unsigned int level, const char *label,
const void *data, uint16_t size,
uint16_t max_len)
{
const char *p = data;
unsigned int i;
if (size >= max_len) {
printf("malformed packet\n");
return;
}
for (i = 0; i < size; i++) {
if (!p[i])
break;
if (!l_ascii_isprint(p[i]))
goto invalid_ascii;
}
print_attr(level, "%s: %.*s", label, i, p);
return;
invalid_ascii:
print_attr(level, "%s: (Non-Ascii, len: %d)", label, size);
print_hexdump(level + 1, data, size);
}
2015-07-25 03:38:11 +02:00
static void print_wsc_utf8_string(unsigned int level, const char *label,
const void *data, uint16_t size,
uint16_t max_len)
{
const char *p = data;
unsigned int i;
if (size >= max_len) {
printf("malformed packet\n");
return;
}
for (i = 0; i < size; i++) {
if (!p[i])
break;
}
if (!l_utf8_validate((const char *) p, i, NULL))
goto invalid_utf8;
print_attr(level, "%s: %.*s", label, i, p);
return;
invalid_utf8:
print_attr(level, "%s: (Non-utf8, len: %d)", label, size);
print_hexdump(level + 1, data, size);
}
static void print_wsc_uuid(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 16) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %02x%02x%02x%02x-%02x%02x-%02x%02x-"
"%02x%02x-%02x%02x%02x%02x%02x%02x",
label,
bytes[0], bytes[1], bytes[2], bytes[3],
bytes[4], bytes[5], bytes[6], bytes[7],
bytes[8], bytes[9], bytes[10], bytes[11],
bytes[12], bytes[13], bytes[14], bytes[15]);
}
static void print_wsc_association_state(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t state;
static const char *state_table[] = {
"Not Associated",
"Connection Success",
"Configuration Failure",
"Association Failure",
"IP Failure",
};
if (size != 2) {
printf("malformed packet\n");
return;
}
state = l_get_be16(data);
if (state > 4)
print_attr(level, "%s: Reserved", label);
else
print_attr(level, "%s: %s", label, state_table[state]);
}
static void print_wsc_auth_type_flags(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t v;
if (size != 2)
return;
v = l_get_be16(data);
print_attr(level, "%s:", label);
if (v & WSC_AUTHENTICATION_TYPE_OPEN)
print_attr(level + 1, "Open");
if (v & WSC_AUTHENTICATION_TYPE_WPA_PERSONAL)
print_attr(level + 1, "WPA-Personal");
if (v & WSC_AUTHENTICATION_TYPE_SHARED)
print_attr(level + 1, "Shared");
if (v & WSC_AUTHENTICATION_TYPE_WPA_ENTERPRISE)
print_attr(level + 1, "WPA-Enterprise");
if (v & WSC_AUTHENTICATION_TYPE_WPA2_ENTERPRISE)
print_attr(level + 1, "WPA2-Enterprise");
if (v & WSC_AUTHENTICATION_TYPE_WPA2_PERSONAL)
print_attr(level + 1, "WPA2-Personal");
if (v & 0xffc0)
print_attr(level + 1, "Unknown: %04x", v & 0xffc0);
}
static void print_wsc_authenticator(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *a = data;
if (size != 8)
return;
print_attr(level, "%s: %02x%02x%02x%02x%02x%02x%02x%02x",
label, a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7]);
}
static void print_wsc_configuration_error(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t error;
static const char *error_table[] = {
"No Error",
"OOB Interface Read Error",
"Decryption CRC Failure",
"2.4 channel not supported",
"5.0 channel not supported",
"Signal too weak",
"Network auth failure",
"Network association failure",
"No DHCP response",
"Failed DHCP config",
"IP Address conflict",
"Couldn't connect to Registrar",
"Multiple PBC sessions detected",
"Rogue activity suspected",
"Device busy",
"Setup locked",
"Message timeout",
"Registration session timeout",
"Device Password Auth Failure",
"60 Ghz channel not supported",
"Public Key Hash Mismatch",
};
if (size != 2) {
printf("malformed packet\n");
return;
}
error = l_get_be16(data);
if (error > 20)
print_attr(level, "%s: Reserved", label);
else
print_attr(level, "%s: %s", label, error_table[error]);
}
static void print_wsc_config_methods(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t v;
uint16_t flags;
if (size != 2) {
printf("malformed packet\n");
return;
}
v = l_get_be16(data);
print_attr(level, "%s:", label);
if ((v & WSC_CONFIGURATION_METHOD_PHYSICAL_DISPLAY_PIN) ==
WSC_CONFIGURATION_METHOD_PHYSICAL_DISPLAY_PIN)
print_attr(level + 1, "Physical Display PIN");
if ((v & WSC_CONFIGURATION_METHOD_VIRTUAL_DISPLAY_PIN) ==
WSC_CONFIGURATION_METHOD_VIRTUAL_DISPLAY_PIN)
print_attr(level + 1, "Virtual Display PIN");
flags = WSC_CONFIGURATION_METHOD_PHYSICAL_DISPLAY_PIN |
WSC_CONFIGURATION_METHOD_VIRTUAL_DISPLAY_PIN;
if (v & flags)
v &= ~flags;
if (v & WSC_CONFIGURATION_METHOD_P2P) {
print_attr(level + 1, "P2P");
v &= ~WSC_CONFIGURATION_METHOD_P2P;
}
if ((v & WSC_CONFIGURATION_METHOD_PHYSICAL_PUSH_BUTTON) ==
WSC_CONFIGURATION_METHOD_PHYSICAL_PUSH_BUTTON)
print_attr(level + 1, "Physical PushButton");
if ((v & WSC_CONFIGURATION_METHOD_VIRTUAL_PUSH_BUTTON) ==
WSC_CONFIGURATION_METHOD_VIRTUAL_PUSH_BUTTON)
print_attr(level + 1, "Virtual PushButton");
flags = WSC_CONFIGURATION_METHOD_PHYSICAL_PUSH_BUTTON |
WSC_CONFIGURATION_METHOD_VIRTUAL_PUSH_BUTTON;
if (v & flags)
v &= ~flags;
if (v & WSC_CONFIGURATION_METHOD_KEYPAD) {
print_attr(level + 1, "Keypad");
v &= ~WSC_CONFIGURATION_METHOD_KEYPAD;
}
if (v & WSC_CONFIGURATION_METHOD_PUSH_BUTTON) {
print_attr(level + 1, "PushButton");
v &= ~WSC_CONFIGURATION_METHOD_PUSH_BUTTON;
}
if (v & WSC_CONFIGURATION_METHOD_NFC_INTERFACE) {
print_attr(level + 1, "NFC Interface");
v &= ~WSC_CONFIGURATION_METHOD_NFC_INTERFACE;
}
if (v & WSC_CONFIGURATION_METHOD_INTEGRATED_NFC_TOKEN) {
print_attr(level + 1, "Integrated NFC Token");
v &= ~WSC_CONFIGURATION_METHOD_INTEGRATED_NFC_TOKEN;
}
if (v & WSC_CONFIGURATION_METHOD_EXTERNAL_NFC_TOKEN) {
print_attr(level + 1, "External NFC Token");
v &= ~WSC_CONFIGURATION_METHOD_EXTERNAL_NFC_TOKEN;
}
if (v & WSC_CONFIGURATION_METHOD_DISPLAY) {
print_attr(level + 1, "Display");
v &= ~WSC_CONFIGURATION_METHOD_DISPLAY;
}
if (v & WSC_CONFIGURATION_METHOD_LABEL) {
print_attr(level + 1, "Label");
v &= ~WSC_CONFIGURATION_METHOD_LABEL;
}
if (v & WSC_CONFIGURATION_METHOD_ETHERNET) {
print_attr(level + 1, "Ethernet");
v &= ~WSC_CONFIGURATION_METHOD_ETHERNET;
}
if (v & WSC_CONFIGURATION_METHOD_USBA) {
print_attr(level + 1, "USBA");
v &= ~WSC_CONFIGURATION_METHOD_USBA;
}
if (v)
print_attr(level + 1, "Unknown: %04x", v);
}
static void print_wsc_connection_type_flags(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
uint8_t v;
if (size != 1)
return;
v = *((uint8_t *) data);
print_attr(level, "%s:", label);
if (v & WSC_CONNECTION_TYPE_ESS)
print_attr(level + 1, "ESS");
if (v & WSC_CONNECTION_TYPE_IBSS)
print_attr(level + 1, "IBSS");
if (v & 0xfffc)
print_attr(level + 1, "Unknown: %04x", v & 0xfffc);
}
2015-07-25 03:38:11 +02:00
static void print_wsc_device_name(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_wsc_utf8_string(level, label, data, size, 32);
}
static void print_wsc_device_password_id(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t v;
static const char *device_password_id_table[] = {
"Default (PIN)",
"User-specified",
"Machine-specified",
"Rekey",
"PushButton",
"Registrar-specified",
"Reserved (for IBSS with WPS)",
"NFC-Connection-Handover",
"P2Ps (Reserved for WPS P2P Services Specification",
};
if (size != 2) {
printf("malformed packet\n");
return;
}
v = l_get_be16(data);
if (v <= 0x0008)
print_attr(level, "%s: %s", label, device_password_id_table[v]);
else if (v <= 0x000F)
print_attr(level, "%s: Reserved (%02x)", label, v);
else
print_attr(level, "%s: Random via OOB (%02x)", label, v);
}
static void print_wsc_encryption_type_flags(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
uint16_t v;
if (size != 2)
return;
v = l_get_be16(data);
print_attr(level, "%s:", label);
if (v & WSC_ENCRYPTION_TYPE_NONE)
print_attr(level + 1, "None");
if (v & WSC_ENCRYPTION_TYPE_WEP)
print_attr(level + 1, "WEP");
if (v & WSC_ENCRYPTION_TYPE_TKIP)
print_attr(level + 1, "TKIP");
if (v & WSC_ENCRYPTION_TYPE_AES)
print_attr(level + 1, "AES");
if (v & 0xfff0)
print_attr(level + 1, "Unknown: %04x", v & 0xfff0);
}
2016-09-15 05:15:23 +02:00
static void print_wsc_mac_address(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const char *str;
if (size != 6)
return;
str = util_address_to_string(data);
print_attr(level, "%s: %s", label, str);
}
2015-07-24 23:58:13 +02:00
static void print_wsc_manufacturer(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_wsc_ascii_string(level, label, data, size, 64);
}
2016-09-15 05:07:52 +02:00
static void print_wsc_message_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
static const char *message_type_table[] = {
"Reserved",
"Beacon",
"Probe Request",
"Probe Response",
"M1",
"M2",
"M2D",
"M3",
"M4",
"M5",
"M6",
"M7",
"M8",
"WSC_ACK",
"WSC_NACK",
"WSC_DONE"
};
const char *s = "Reserved";
uint8_t t = ((uint8_t *) data)[0];
if (size != 1) {
printf("malformed packet\n");
return;
}
if (t <= 0x0f)
s = message_type_table[t];
print_attr(level, "%s: %s", label, s);
}
2015-07-25 00:06:10 +02:00
static void print_wsc_model_name(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_wsc_ascii_string(level, label, data, size, 32);
}
2015-07-25 00:07:51 +02:00
static void print_wsc_model_number(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_wsc_ascii_string(level, label, data, size, 32);
}
2016-09-15 17:55:22 +02:00
static void print_wsc_os_version(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint32_t version;
if (size != 4)
return;
version = l_get_be32(data);
print_attr(level, "%s: %u", label, version & 0x7fffffff);
}
static void print_wsc_primary_device_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
uint16_t category;
uint16_t subcategory;
uint8_t oui[4];
static const char *category_table[256] = {
[0] = "Reserved",
[1] = "Computer",
[2] = "Input Device",
[3] = "Printer/Scanner/Fax/Copier",
[4] = "Camera",
[5] = "Storage",
[6] = "Network Infrastructure",
[7] = "Displays",
[8] = "Multimedia Devices",
[9] = "Gaming Devices",
[10] = "Telephony",
[11] = "Audio Devices",
[12] = "Docking Devices",
[13 ... 254] = "Reserved",
[255] = "Others",
};
if (size != 8) {
printf("malformed packet\n");
return;
}
category = l_get_be16(bytes);
subcategory = l_get_be16(bytes + 6);
memcpy(oui, bytes + 2, 4);
if (category > 255) {
print_attr(level, "%s: %04x-%02x%02x%02x%02x-%04x",
label, category, oui[0], oui[1], oui[2], oui[3],
subcategory);
return;
}
print_attr(level, "%s: %s", label, category_table[category]);
print_attr(level + 1, "OUI: %02x%02x%02x%02x",
oui[0], oui[1], oui[2], oui[3]);
print_attr(level + 1, "SubCategory: %02x", subcategory);
}
2015-09-02 00:10:41 +02:00
static void print_wsc_request_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
static const char *request_type_table[] = {
"Enrollee Info",
"Enrollee Open 802.1X",
"Registrar",
"WLAN Manager Registrar",
};
if (size != 1 || bytes[0] > 3) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %s", label, request_type_table[bytes[0]]);
}
2015-07-24 23:32:22 +02:00
static void print_wsc_response_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
static const char *response_type_table[] = {
"Enrollee Info",
"Enrollee Open 802.1X",
"Registrar",
"AP",
};
if (size != 1 || bytes[0] > 3) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %s", label, response_type_table[bytes[0]]);
}
2015-07-25 04:12:24 +02:00
static void print_wsc_rf_bands(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
char bands[256];
uint16_t pos = 0;
if (size != 1) {
printf("malformed packet\n");
return;
}
if (bytes[0] >= 0x08) {
print_attr(level, "%s: %02x", label, bytes[0]);
return;
}
if (bytes[0] & WSC_RF_BAND_2_4_GHZ)
pos += sprintf(bands + pos, " 2.4 GHz,");
if (bytes[0] & WSC_RF_BAND_5_0_GHZ)
pos += sprintf(bands + pos, " 5 GHz,");
if (bytes[0] & WSC_RF_BAND_60_GHZ)
pos += sprintf(bands + pos, " 60 GHz,");
bands[pos - 1] = '\0';
print_attr(level, "%s: %s", label, bands);
}
2015-07-25 00:09:23 +02:00
static void print_wsc_serial_number(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_wsc_ascii_string(level, label, data, size, 32);
}
static void print_wsc_version(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 1) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %x", label, bytes[0]);
}
2015-07-24 23:19:08 +02:00
static void print_wsc_state(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
static const char *state_table[3] = {
"Reserved",
"Not Configured",
"Configured"
};
if (size != 1 || bytes[0] == 0 || bytes[0] > 2) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %s", label, state_table[bytes[0]]);
}
static void print_wsc_wfa_ext_version2(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 1) {
printf("malformed packet\n");
return;
}
print_attr(level, "%s: %x.%x", label, bytes[0] >> 4, bytes[0] & 0xf);
}
static void print_wsc_wfa_ext_authorized_macs(unsigned int level,
const char *label,
const void *data, uint16_t size)
{
if (size > 30 || size % 6 != 0) {
printf("malformed packet\n");
return;
}
for (; size; size -= 6, data += 6)
print_attr(level, "%s: %s", label, util_address_to_string(data));
}
static struct attr_entry wsc_wfa_ext_attr_entry[] = {
{ WSC_WFA_EXTENSION_VERSION2, "Version2",
ATTR_CUSTOM, { .function = print_wsc_wfa_ext_version2 } },
{ WSC_WFA_EXTENSION_AUTHORIZED_MACS, "Authorized MAC",
ATTR_CUSTOM,
{ .function = print_wsc_wfa_ext_authorized_macs } },
{ WSC_WFA_EXTENSION_NETWORK_KEY_SHAREABLE,
"Network Key Shareable",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_WFA_EXTENSION_REQUEST_TO_ENROLL, "Request to Enroll",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ },
};
static void print_wsc_wfa_ext_attributes(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct wsc_wfa_ext_iter iter;
int i;
print_attr(level, "%s: len %u", label, size);
wsc_wfa_ext_iter_init(&iter, data, size);
while (wsc_wfa_ext_iter_next(&iter)) {
uint8_t type = wsc_wfa_ext_iter_get_type(&iter);
uint8_t len = wsc_wfa_ext_iter_get_length(&iter);
const void *attr = wsc_wfa_ext_iter_get_data(&iter);
struct attr_entry *entry = NULL;
for (i = 0; wsc_wfa_ext_attr_entry[i].str; i++) {
if (wsc_wfa_ext_attr_entry[i].attr == type) {
entry = &wsc_wfa_ext_attr_entry[i];
break;
}
}
if (entry && entry->function)
entry->function(level + 1, entry->str, attr, len);
else {
print_attr(level + 1, "Type: 0x%02x: len %u",
type, len);
print_hexdump(level + 2, attr, len);
}
}
}
static void print_wsc_vendor_extension(unsigned int level, const char *label,
const void *data, uint16_t size){
const uint8_t *bytes = data;
if (size < 3) {
printf("malformed packet\n");
return;
}
if (memcmp(data, wsc_wfa_oui, sizeof(wsc_wfa_oui))) {
print_attr(level, "%s: OUI: 0x%02x 0x%02x 0x%02x: len %u",
label, bytes[0], bytes[1], bytes[2], size);
print_hexdump(level + 1, data + 3, size - 3);
return;
}
print_wsc_wfa_ext_attributes(level, "WFA Vendor Extension",
data + 3, size - 3);
}
static struct attr_entry wsc_attr_entry[] = {
{ WSC_ATTR_8021X_ENABLED, "802.1X Enabled",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_AP_SETUP_LOCKED, "AP Setup Locked",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_ASSOCIATION_STATE, "Association State",
ATTR_CUSTOM, { .function = print_wsc_association_state } },
{ WSC_ATTR_AUTHENTICATION_TYPE_FLAGS, "Authentication Type Flags",
ATTR_CUSTOM, { .function = print_wsc_auth_type_flags } },
{ WSC_ATTR_AUTHENTICATOR, "Authenticator",
ATTR_CUSTOM, { .function = print_wsc_authenticator } },
{ WSC_ATTR_CONFIGURATION_ERROR, "Configuration Error",
ATTR_CUSTOM, { .function = print_wsc_configuration_error } },
{ WSC_ATTR_CONFIGURATION_METHODS, "Configuration Methods",
ATTR_CUSTOM, { .function = print_wsc_config_methods } },
{ WSC_ATTR_CONNECTION_TYPE_FLAGS, "Connection Type Flags",
ATTR_CUSTOM, { .function =
print_wsc_connection_type_flags } },
2015-07-25 03:38:11 +02:00
{ WSC_ATTR_DEVICE_NAME, "Device Name",
ATTR_CUSTOM, { .function = print_wsc_device_name } },
{ WSC_ATTR_DEVICE_PASSWORD_ID, "Device Password Id",
ATTR_CUSTOM, { .function = print_wsc_device_password_id } },
{ WSC_ATTR_E_HASH1, "E-Hash1",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_E_HASH2, "E-Hash2",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_ENCRYPTED_SETTINGS, "Encrypted Settings",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_ENCRYPTION_TYPE_FLAGS, "Encryption Type Flags",
ATTR_CUSTOM, { .function =
print_wsc_encryption_type_flags } },
{ WSC_ATTR_ENROLLEE_NONCE, "Enrollee Nonce",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_KEY_PROVIDED_AUTOMATICALLY, "Key Provided Automatically",
ATTR_CUSTOM, { .function = print_wsc_bool } },
2016-09-15 05:15:23 +02:00
{ WSC_ATTR_MAC_ADDRESS, "MAC Address",
ATTR_CUSTOM, { .function = print_wsc_mac_address } },
2015-07-24 23:58:13 +02:00
{ WSC_ATTR_MANUFACTURER, "Manufacturer",
ATTR_CUSTOM, { .function = print_wsc_manufacturer } },
2016-09-15 05:07:52 +02:00
{ WSC_ATTR_MESSAGE_TYPE, "Message Type",
ATTR_CUSTOM, { .function = print_wsc_message_type } },
2015-07-25 00:06:10 +02:00
{ WSC_ATTR_MODEL_NAME, "Model Name",
ATTR_CUSTOM, { .function = print_wsc_model_name } },
2015-07-25 00:07:51 +02:00
{ WSC_ATTR_MODEL_NUMBER, "Model Number",
ATTR_CUSTOM, { .function = print_wsc_model_number } },
{ WSC_ATTR_NETWORK_INDEX, "Network Index",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_NETWORK_KEY_INDEX, "Network Key Index (Reserved)",
ATTR_CUSTOM, { .function = print_wsc_byte } },
2016-09-15 17:55:22 +02:00
{ WSC_ATTR_OS_VERSION, "OS Version",
ATTR_CUSTOM, { .function = print_wsc_os_version } },
{ WSC_ATTR_PORTABLE_DEVICE, "Portable Device",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_PRIMARY_DEVICE_TYPE, "Primary Device Type",
ATTR_CUSTOM, { .function = print_wsc_primary_device_type } },
{ WSC_ATTR_PSK_CURRENT, "PSK Current",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_PSK_MAX, "PSK Max",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_PUBLIC_KEY, "Public Key",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_RADIO_ENABLED, "Radio Enabled",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_REBOOT, "Reboot",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_REGISTRAR_CURRENT, "Registrar Current",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_REGISTRAR_ESTABLISHED, "Registrar Established",
ATTR_CUSTOM, { .function = print_wsc_bool } },
{ WSC_ATTR_REGISTRAR_MAX, "Registrar Max",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_REGISTRAR_NONCE, "Registrar Nonce",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
2015-09-02 00:10:41 +02:00
{ WSC_ATTR_REQUEST_TYPE, "Request Type",
ATTR_CUSTOM, { .function = print_wsc_request_type } },
2015-07-24 23:32:22 +02:00
{ WSC_ATTR_RESPONSE_TYPE, "Response Type",
ATTR_CUSTOM, { .function = print_wsc_response_type } },
2015-07-25 04:12:24 +02:00
{ WSC_ATTR_RF_BANDS, "RF Bands",
ATTR_CUSTOM, { .function = print_wsc_rf_bands } },
{ WSC_ATTR_R_HASH1, "R_Hash1",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_R_HASH2, "R_Hash2",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ WSC_ATTR_SELECTED_REGISTRAR, "Selected Registrar",
ATTR_CUSTOM, { .function = print_wsc_bool } },
2015-07-25 00:09:23 +02:00
{ WSC_ATTR_SERIAL_NUMBER, "Serial Number",
ATTR_CUSTOM, { .function = print_wsc_serial_number } },
{ WSC_ATTR_TOTAL_NETWORKS, "Total Networks",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ WSC_ATTR_UUID_E, "UUID-E",
ATTR_CUSTOM, { .function = print_wsc_uuid } },
{ WSC_ATTR_UUID_R, "UUID-R",
ATTR_CUSTOM, { .function = print_wsc_uuid } },
{ WSC_ATTR_VENDOR_EXTENSION, "Vendor Extension",
ATTR_CUSTOM, { .function = print_wsc_vendor_extension } },
{ WSC_ATTR_VERSION, "Version",
ATTR_CUSTOM, { .function = print_wsc_version } },
2015-07-24 23:19:08 +02:00
{ WSC_ATTR_WSC_STATE, "WSC State",
ATTR_CUSTOM, { .function = print_wsc_state } },
{ },
};
static void print_wsc_attributes(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct wsc_attr_iter iter;
int i;
print_attr(level, "%s: len %u", label, size);
wsc_attr_iter_init(&iter, data, size);
while (wsc_attr_iter_next(&iter)) {
uint16_t type = wsc_attr_iter_get_type(&iter);
uint16_t len = wsc_attr_iter_get_length(&iter);
const void *attr = wsc_attr_iter_get_data(&iter);
struct attr_entry *entry = NULL;
for (i = 0; wsc_attr_entry[i].str; i++) {
if (wsc_attr_entry[i].attr == type) {
entry = &wsc_attr_entry[i];
break;
}
}
if (entry && entry->function)
entry->function(level + 1, entry->str, attr, len);
else {
print_attr(level + 1, "Type: 0x%02x: len %u",
type, len);
print_hexdump(level + 2, attr, len);
}
}
}
static void print_p2p_status(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
static const struct p2p_status_desc {
uint8_t code;
const char *desc;
} descs[] = {
{ P2P_STATUS_SUCCESS, "Success" },
{ P2P_STATUS_FAIL_INFO_NOT_AVAIL, "Fail; information is "
"currently unavailable" },
{ P2P_STATUS_FAIL_INCOMPATIBLE_PARAMS, "Fail; incompatible "
"parameters" },
{ P2P_STATUS_FAIL_LIMIT_REACHED, "Fail; limit reached" },
{ P2P_STATUS_FAIL_INVALID_PARAMS, "Fail; invalid parameters" },
{ P2P_STATUS_FAIL_UNABLE_TO_ACCOMMODATE_REQUEST, "Fail; unable "
2020-01-21 07:21:38 +01:00
"to accommodate request" },
{ P2P_STATUS_FAIL_PREV_PROTOCOL_ERROR, "Fail; previous protocol"
" error, or distruptive behavior" },
{ P2P_STATUS_FAIL_NO_COMMON_CHANNELS, "Fail; no common "
"channels" },
{ P2P_STATUS_FAIL_UNKNOWN_P2P_GROUP, "Fail; unknown P2P "
"Group" },
{ P2P_STATUS_FAIL_INTENT_15_IN_GO_NEGOTIATION, "Fail; both P2P "
"Devices indicated an Intent of 15 in Group Owner "
"Negotiation" },
{ P2P_STATUS_FAIL_INCOMPATIBLE_PROVISIONING, "Fail; "
"incompatible provisioning method" },
{ P2P_STATUS_FAIL_REJECTED_BY_USER, "Fail; rejected by user" },
{ P2P_STATUS_SUCCESS_ACCEPTED_BY_USER, "Success; accepted by "
"user" },
{}
};
int i;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
for (i = 0; descs[i].desc; i++)
if (descs[i].code == bytes[0])
break;
if (descs[i].desc)
print_attr(level, "%s: %s", label, descs[i].desc);
else
print_attr(level, "%s: 0x%02x", label, bytes[0]);
}
#define CHECK_CAPS_BIT(v, str) \
do { \
if (caps & (v)) { \
print_attr(level + 1, "%s", (str)); \
caps &= ~(v); \
} \
} while(0)
static void print_p2p_device_capability(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t caps;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
caps = *(const uint8_t *) data;
print_attr(level, "%s:%s", label, !caps ? " None" : "");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_SVC_DISCOVERY,
"Service Discovery");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_CLIENT_DISCOVERABILITY,
"P2P Client Discoverability");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_CONCURRENT_OP,
"Concurrent Operation");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_INFRASTRUCTURE_MANAGED,
"P2P Infrastructure Managed");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_DEVICE_LIMIT,
"P2P Device Limit");
CHECK_CAPS_BIT(P2P_DEVICE_CAP_INVITATION_PROCEDURE,
"P2P Invitation Procedure");
if (caps)
print_attr(level + 1, "Reserved: 0x%02x", caps);
}
static void print_p2p_capability(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t caps;
if (size != 2) {
printf("malformed P2P %s\n", label);
return;
}
print_p2p_device_capability(level, "P2P Device Capability", data++, 1);
caps = *(const uint8_t *) data++;
print_attr(level, "P2P Group Capability:%s", !caps ? " None" : "");
CHECK_CAPS_BIT(P2P_GROUP_CAP_GO,
"P2P Group Owner");
CHECK_CAPS_BIT(P2P_GROUP_CAP_PERSISTENT_GROUP,
"Persistent P2P Group");
CHECK_CAPS_BIT(P2P_GROUP_CAP_GROUP_LIMIT,
"P2P Group Limit");
CHECK_CAPS_BIT(P2P_GROUP_CAP_INTRA_BSS_DISTRIBUTION,
"Intra-BSS Distribution");
CHECK_CAPS_BIT(P2P_GROUP_CAP_CROSS_CONNECT,
"Cross Connection");
CHECK_CAPS_BIT(P2P_GROUP_CAP_PERSISTENT_RECONNECT,
"Persistent Reconnect");
CHECK_CAPS_BIT(P2P_GROUP_CAP_GROUP_FORMATION,
"Group Formation");
CHECK_CAPS_BIT(P2P_GROUP_CAP_IP_ALLOCATION,
"IP Address Allocation");
}
static void print_p2p_go_intent(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s: Intent %u out of 15, tie breaker %u", label,
bytes[0] >> 1, bytes[0] & 1);
}
static void print_p2p_config_timeout(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 2) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s: GO Timeout %ums, Client Timeout %ums", label,
bytes[0] * 10, bytes[1] * 10);
}
static void print_p2p_oper_channel(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 5) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "Country %c%c table %u", bytes[0], bytes[1],
bytes[2]);
print_attr(level + 1, "Operating Class %u", bytes[3]);
print_attr(level + 1, "Channel Number %u", bytes[4]);
}
static void print_p2p_extended_timing(unsigned int level, const char *label,
const void *data, uint16_t size)
{
if (size != 4) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s: Availability period: %ums, interval: %ums", label,
l_get_le16(data + 0), l_get_le16(data + 2));
}
static void print_p2p_manageability(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t val;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
#define CHECK_BIT(v, str) \
do { \
if (val & (v)) { \
print_attr(level + 1, "%s", (str)); \
val &= ~(v); \
} \
} while(0)
val = *(const uint8_t *) data;
print_attr(level, "%s:%s", label, !val ? " None" : "");
CHECK_BIT(P2P_MANAGEABILITY_DEVICE_MGMT, "P2P Device Management");
CHECK_BIT(P2P_MANAGEABILITY_CROSS_CONNECT,
"Cross Connection Permitted");
CHECK_BIT(P2P_MANAGEABILITY_COEXIST_OPTIONAL, "Coexistence Optional");
if (val)
print_attr(level + 1, "Reserved: 0x%02x", val);
#undef CHECK_BIT
}
static void print_p2p_channel_list(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size < 3) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "Country %c%c table %u", bytes[0], bytes[1],
bytes[2]);
bytes += 3;
size -= 3;
while (size) {
uint8_t channels;
struct l_string *string;
char *str;
bool first = true;
if (size < 2 || size < 2 + bytes[1]) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level + 1, "Operating Class %u channels:", *bytes++);
channels = *bytes++;
size -= 2 + channels;
string = l_string_new(128);
while (channels--) {
l_string_append_printf(string, "%s%u",
first ? "" : ", ",
(int ) *bytes++);
first = false;
}
str = l_string_unwrap(string);
print_attr(level + 2, "%s", str);
l_free(str);
}
}
static void print_p2p_notice_of_absence(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size < 2) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s %u:", label, bytes[0]);
print_attr(level + 1, "GO uses Opportunistic Power Save: %s",
(bytes[1] & 0x80) ? "true" : "false");
print_attr(level + 1, "Client Traffic window len: %u TUs",
bytes[1] & 0x7f);
bytes += 2;
size -= 2;
while (size) {
if (size < 13) {
printf("malformed P2P Channel List\n");
return;
}
print_attr(level + 1, "Notice:");
print_attr(level + 2, "Count/Type: %u", bytes[0]);
print_attr(level + 2, "Duration: %uus", l_get_le32(bytes + 1));
print_attr(level + 2, "Interval: %uus", l_get_le32(bytes + 5));
print_attr(level + 2, "Start Time: %u", l_get_le32(bytes + 8));
bytes += 13;
size -= 13;
}
}
static void print_p2p_device_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
int secondary_types;
if (size < 17 || size < 17 + bytes[16] * 8 + 4) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_wsc_mac_address(level + 1, "P2P Device address", bytes, 6);
print_wsc_config_methods(level + 1, "Config Methods", bytes + 6, 2);
print_wsc_primary_device_type(level + 1, "Primary Device Type",
bytes + 8, 8);
secondary_types = bytes[16];
bytes += 17;
size -= 17;
while (secondary_types--) {
print_wsc_primary_device_type(level + 1,
"Secondary Device Type",
bytes, 8);
bytes += 8;
size -= 8;
}
if (l_get_be16(bytes) != WSC_ATTR_DEVICE_NAME ||
4 + l_get_be16(bytes + 2) > size) {
printf("malformed P2P %s\n", label);
return;
}
print_wsc_device_name(level + 1, "Device Name", bytes + 4,
l_get_be16(bytes + 2));
}
static void print_p2p_group_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
print_attr(level, "%s:", label);
while (size) {
size_t desc_size = bytes[0];
int secondary_types;
if (1 + desc_size > size || desc_size < 24 ||
desc_size < (size_t) 24 + bytes[24] * 8 + 4) {
printf("malformed P2P Client Info Descriptor\n");
return;
}
size -= 1 + desc_size;
print_attr(level + 1, "P2P Client Info Descriptor:");
print_wsc_mac_address(level + 2, "P2P Device address",
bytes + 1, 6);
print_wsc_mac_address(level + 2, "P2P Interface address",
bytes + 7, 6);
print_p2p_device_capability(level + 2, "P2P Device Capability",
bytes + 13, 1);
print_wsc_config_methods(level + 2, "Config Methods",
bytes + 14, 2);
print_wsc_primary_device_type(level + 2, "Primary Device Type",
bytes + 16, 8);
secondary_types = bytes[24];
bytes += 25;
desc_size -= 24;
while (secondary_types--) {
print_wsc_primary_device_type(level + 2,
"Secondary Device Type",
bytes, 8);
bytes += 8;
desc_size -= 8;
}
if (l_get_be16(bytes) != WSC_ATTR_DEVICE_NAME ||
(size_t) 4 + l_get_be16(bytes + 2) >
desc_size) {
printf("malformed P2P Client Info Descriptor\n");
return;
}
print_wsc_device_name(level + 1, "Device Name", bytes + 4,
l_get_be16(bytes + 2));
bytes += 4 + l_get_be16(bytes + 2);
}
}
static void print_p2p_group_id(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size < 6 || size > 38) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_wsc_mac_address(level + 1, "P2P Device address",
bytes, 6);
print_ie_ssid(level + 1, "SSID", bytes + 6, size - 6);
}
static void print_p2p_interface(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
int addr_count;
if (size < 7 || size < 7 + bytes[6] * 6) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_wsc_mac_address(level + 1, "P2P Device Address",
bytes, 6);
addr_count = bytes[6];
print_attr(level + 1, "P2P Interface Address Count: %u", addr_count);
bytes += 7;
size -= 7;
while (addr_count--) {
print_wsc_mac_address(level + 2, "Interface Address", bytes, 6);
bytes += 6;
}
}
static void print_p2p_invite_flags(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t flags;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
flags = *(const uint8_t *) data;
print_attr(level, "Invitation Type: %s",
(flags & 1) ? "re-invoke a Persistent Group" :
"join active group");
flags &= ~1;
if (flags)
print_attr(level, "Invitation Flags: reserved 0x%02x", flags);
}
static void print_p2p_oob_neg_channel(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
const char *role;
if (size != 6) {
printf("malformed P2P %s\n", label);
return;
}
print_p2p_oper_channel(level, label, bytes + 0, 5);
switch (bytes[5]) {
case 0x00:
role = "not in a group";
break;
case 0x01:
role = "client";
break;
case 0x02:
role = "Group Owner";
break;
default:
role = "reserved";
break;
}
print_attr(level + 1, "Current group role indication: %s", role);
}
static void print_p2p_service_hash(unsigned int level, const char *label,
const void *data, uint16_t size)
{
if (size % 6 != 0) {
printf("malformed P2P %s\n", label);
return;
}
while (size) {
print_wsc_bytes(level, "Service Hash", data, 6);
data += 6;
size -= 6;
}
}
static void print_p2p_connection_caps(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint8_t caps;
const char *first;
if (size != 1) {
printf("malformed P2P %s\n", label);
return;
}
caps = *(const uint8_t *) data;
if (caps & 1)
first = "New";
else if (caps & 2)
first = "Cli";
else if (caps & ~4)
first = "Unknown";
else
first = "GO";
print_attr(level, "%s: %s%s", label, first,
(caps & ~4) && (caps & 4) ? ", GO" : "");
}
static void print_p2p_advertisement_id(unsigned int level, const char *label,
const void *data, uint16_t size)
{
if (size != 10) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s: 0x%08x", label, l_get_le32(data + 0));
print_wsc_mac_address(level + 1, "Service MAC Address", data + 4, 6);
}
static void print_p2p_advertised_svc_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
while (size) {
if (size < 7 || size < 7 + bytes[6]) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
2020-01-21 07:21:38 +01:00
print_attr(level, "Service advertisement: ID 0x%08x",
l_get_le32(bytes + 0));
print_wsc_utf8_string(level + 1, "Service Name",
bytes + 6, bytes[6], 255);
print_wsc_config_methods(level + 1, "Service Config Methods",
bytes + 4, 2);
size -= 7 + bytes[6];
bytes += 7 + bytes[6];
}
}
static void print_p2p_session_id(unsigned int level, const char *label,
const void *data, uint16_t size)
{
if (size != 10) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s: 0x%08x", label, l_get_le32(data + 0));
print_wsc_mac_address(level + 1, "Session MAC Address", data + 4, 6);
}
static void print_p2p_feature_caps(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 2) {
printf("malformed P2P %s\n", label);
return;
}
print_attr(level, "%s:", label);
if (bytes[0] == 0x01)
print_attr(level + 1, "Coordination Protocol Transport: UDP");
else
print_attr(level + 1, "Coordination Protocol Transport: "
"reserved 0x%02x", bytes[1]);
}
static struct attr_entry p2p_attr_entry[] = {
{ P2P_ATTR_STATUS, "Status",
ATTR_CUSTOM, { .function = print_p2p_status } },
{ P2P_ATTR_MINOR_REASON_CODE, "Minor Reason Code",
ATTR_CUSTOM, { .function = print_wsc_byte } },
{ P2P_ATTR_P2P_CAPABILITY, "P2P Capability",
ATTR_CUSTOM, { .function = print_p2p_capability } },
{ P2P_ATTR_P2P_DEVICE_ID, "P2P Device ID",
ATTR_CUSTOM, { .function = print_wsc_mac_address } },
{ P2P_ATTR_GO_INTENT, "Group Owner Intent",
ATTR_CUSTOM, { .function = print_p2p_go_intent } },
{ P2P_ATTR_CONFIGURATION_TIMEOUT, "Configuration Timeout",
ATTR_CUSTOM, { .function = print_p2p_config_timeout } },
{ P2P_ATTR_LISTEN_CHANNEL, "Listen Channel",
ATTR_CUSTOM, { .function = print_p2p_oper_channel } },
{ P2P_ATTR_P2P_GROUP_BSSID, "P2P Group BSSID",
ATTR_CUSTOM, { .function = print_wsc_mac_address } },
{ P2P_ATTR_EXTENDED_LISTEN_TIMING, "Extended Listen Timing",
ATTR_CUSTOM, { .function = print_p2p_extended_timing } },
{ P2P_ATTR_INTENDED_P2P_INTERFACE_ADDR, "Intended P2P Interface "
"Address",
ATTR_CUSTOM, { .function = print_wsc_mac_address } },
{ P2P_ATTR_P2P_MANAGEABILITY, "P2P Manageability",
ATTR_CUSTOM, { .function = print_p2p_manageability } },
{ P2P_ATTR_CHANNEL_LIST, "Channel List",
ATTR_CUSTOM, { .function = print_p2p_channel_list } },
{ P2P_ATTR_NOTICE_OF_ABSENCE, "Notice of Absence",
ATTR_CUSTOM, { .function = print_p2p_notice_of_absence } },
{ P2P_ATTR_P2P_DEVICE_INFO, "P2P Device Info",
ATTR_CUSTOM, { .function = print_p2p_device_info } },
{ P2P_ATTR_P2P_GROUP_INFO, "P2P Group Info",
ATTR_CUSTOM, { .function = print_p2p_group_info } },
{ P2P_ATTR_P2P_GROUP_ID, "P2P Group ID",
ATTR_CUSTOM, { .function = print_p2p_group_id } },
{ P2P_ATTR_P2P_INTERFACE, "P2P Interface",
ATTR_CUSTOM, { .function = print_p2p_interface } },
{ P2P_ATTR_OPERATING_CHANNEL, "Operating Channel",
ATTR_CUSTOM, { .function = print_p2p_oper_channel } },
{ P2P_ATTR_INVITATION_FLAGS, "Invitation Flags",
ATTR_CUSTOM, { .function = print_p2p_invite_flags } },
{ P2P_ATTR_OOB_GO_NEGOTIATION_CHANNEL, "Out-of-Band Group Owner "
"Negotiation Channel",
ATTR_CUSTOM, { .function = print_p2p_oob_neg_channel } },
{ P2P_ATTR_SVC_HASH, "Service Hash",
ATTR_CUSTOM, { .function = print_p2p_service_hash } },
{ P2P_ATTR_SESSION_INFO_DATA_INFO, "Session Information Data Info",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ P2P_ATTR_CONNECTION_CAPABILITY_INFO, "Connection Capability Info",
ATTR_CUSTOM, { .function = print_p2p_connection_caps } },
{ P2P_ATTR_ADVERTISEMENT_ID_INFO, "Advertisement_ID Info",
ATTR_CUSTOM, { .function = print_p2p_advertisement_id } },
{ P2P_ATTR_ADVERTISED_SVC_INFO, "Advertised Service Info",
ATTR_CUSTOM, { .function = print_p2p_advertised_svc_info } },
{ P2P_ATTR_SESSION_ID_INFO, "Session ID Info",
ATTR_CUSTOM, { .function = print_p2p_session_id } },
{ P2P_ATTR_FEATURE_CAPABILITY, "Feature Capability",
ATTR_CUSTOM, { .function = print_p2p_feature_caps } },
{ P2P_ATTR_PERSISTENT_GROUP_INFO, "Persistent Group Info",
ATTR_CUSTOM, { .function = print_p2p_group_id } },
{ P2P_ATTR_VENDOR_SPECIFIC_ATTR, "Vendor specific attribute",
ATTR_CUSTOM, { .function = print_wsc_bytes } },
{ },
};
static void print_p2p_attributes(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct p2p_attr_iter iter;
int i;
print_attr(level, "%s: len %u", label, size);
p2p_attr_iter_init(&iter, data, size);
while (p2p_attr_iter_next(&iter)) {
uint16_t type = p2p_attr_iter_get_type(&iter);
uint16_t len = p2p_attr_iter_get_length(&iter);
const void *attr = p2p_attr_iter_get_data(&iter);
struct attr_entry *entry = NULL;
for (i = 0; p2p_attr_entry[i].str; i++) {
if (p2p_attr_entry[i].attr == type) {
entry = &p2p_attr_entry[i];
break;
}
}
if (entry && entry->function)
entry->function(level + 1, entry->str, attr, len);
else {
print_attr(level + 1, "Type: 0x%02x: len %u",
type, len);
print_hexdump(level + 2, attr, len);
}
}
}
static void print_wfd_device_info_flags(unsigned int level, const char *label,
uint16_t caps)
{
static const char *dev_type[] = {
[WFD_DEV_INFO_TYPE_SOURCE] = "Source",
[WFD_DEV_INFO_TYPE_PRIMARY_SINK] = "Primary sink",
[WFD_DEV_INFO_TYPE_SECONDARY_SINK] = "Secondary sink",
[WFD_DEV_INFO_TYPE_DUAL_ROLE] = "Dual-role possible",
};
static const char *session_avail[] = {
[0] = "Not available for WFD Session",
[1] = "Available for WFD Session",
[2] = "Reserved (0b10)",
[3] = "Reserved (0b11)",
};
print_attr(level, "%s:", label);
print_attr(level + 1, "Device Type: %s",
dev_type[caps & WFD_DEV_INFO_DEVICE_TYPE]);
CHECK_CAPS_BIT(WFD_DEV_INFO_COUPLED_SINK_AT_SOURCE_OK,
"Coupled Sink Operation supported by WFD Source");
CHECK_CAPS_BIT(WFD_DEV_INFO_COUPLED_SINK_AT_SINK_OK,
"Coupled Sink Operation supported by WFD Sink");
print_attr(level + 1, "Session Availability: %s",
session_avail[(caps &
WFD_DEV_INFO_SESSION_AVAILABILITY) >> 4]);
CHECK_CAPS_BIT(WFD_DEV_INFO_SERVICE_DISCOVERY_SUPPORT,
"WFD Service Discovery (WSD) supported");
print_attr(level + 1, "Preferred Connectivity (PC): %s",
(caps & WFD_DEV_INFO_PREFER_TDLS_CONNECTIVITY) ?
"TLDS" : "P2P");
CHECK_CAPS_BIT(WFD_DEV_INFO_CONTENT_PROTECTION_SUPPORT,
"Content Protection using HDCP system 2.x supported");
CHECK_CAPS_BIT(WFD_DEV_INFO_8021AS_TIME_SYNC_SUPPORT,
"Time Synchronization using 802.1AS supported");
CHECK_CAPS_BIT(WFD_DEV_INFO_NO_AUDIO_AT_PRIMARY_SINK,
"WFD Primary Sink does not support audio rendering");
CHECK_CAPS_BIT(WFD_DEV_INFO_AUDIO_ONLY_AT_SOURCE,
"WFD Source supports audio-only element stream");
CHECK_CAPS_BIT(WFD_DEV_INFO_TDLS_PERSISTENT_GROUP,
"TDLS persistent group intended");
CHECK_CAPS_BIT(WFD_DEV_INFO_REINVOKE_TDLS_GROUP,
"Request for re-invocation of TDLS persistent group");
caps &= ~0x00ff;
if (caps)
print_attr(level + 1, "Reserved: 0x%04x", caps);
}
static void print_wfd_device_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 6) {
printf("malformed WFD %s\n", label);
return;
}
print_wfd_device_info_flags(level, label, l_get_be16(bytes + 0));
print_attr(level, "%s: Session Management Control port %i",
label, l_get_be16(bytes + 2));
print_attr(level, "%s: Maximum Throughput %i Mbps",
label, l_get_be16(bytes + 4));
}
static void print_wfd_coupled_sink_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
static const char *status[4] = {
[0] = "Not couple/Available for Coupling",
[1] = "Coupled",
[2] = "Teardown Coupling",
[3] = "Reserved (0b11)",
};
if (size != 7) {
printf("malformed WFD %s\n", label);
return;
}
print_attr(level, "%s:", label);
print_attr(level + 1, "Status: %s", status[bytes[0] & 3]);
if (bytes[0] & ~3)
print_attr(level + 1, "Reserved: 0x%02x", bytes[0] & ~3);
print_address(level + 1, "Coupled Sink MAC Address", bytes + 1);
}
static void print_wfd_extended_caps(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
uint16_t caps;
if (size != 2) {
printf("malformed WFD %s\n", label);
return;
}
print_attr(level, "%s:", label);
caps = l_get_be16(bytes + 0);
CHECK_CAPS_BIT(0x0001, "UIBC support");
CHECK_CAPS_BIT(0x0002, "I2C Read/Write support");
CHECK_CAPS_BIT(0x0004, "Preferred Display mode support");
CHECK_CAPS_BIT(0x0008, "Standby and Resume Control support");
CHECK_CAPS_BIT(0x0010, "TDLS Persistent support");
CHECK_CAPS_BIT(0x0020, "TDLS Persistent BSSID support");
if (caps)
print_attr(level + 1, "Reserved: 0x%04x", caps);
}
static void print_wfd_local_ip(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *bytes = data;
if (size != 5) {
printf("malformed WFD %s\n", label);
return;
}
if (bytes[0] != 1) {
print_attr(level, "%s: Unknown version", label);
return;
}
print_attr(level, "%s: %i.%i.%i.%i", label,
bytes[1], bytes[2], bytes[3], bytes[4]);
}
static void print_wfd_session_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
int i = 1;
if (size % 24 != 0) {
printf("malformed WFD %s\n", label);
return;
}
print_attr(level, "%s:", label);
while (size) {
const uint8_t *bytes = data;
if (bytes[0] != 23) {
print_attr(level + 1,
"malformed WFD Device Info Descriptor");
continue;
}
print_attr(level + 1, "Device Info for client %i:", i++);
if (bytes[0] != 1) {
print_attr(level, "%s: Unknown version", label);
return;
}
print_address(level + 2, "Device address", bytes + 1);
if (l_memeqzero(bytes + 7, 6))
print_attr(level+ + 2, "Not associated to an "
"infrastructure AP");
else
print_address(level + 2, "Associated BSSID", bytes + 7);
print_wfd_device_info_flags(level + 2, "WFD Device Information",
l_get_be16(bytes + 13));
print_attr(level + 2, "WFD Device Maximum Throughput %i Mbps",
l_get_be16(bytes + 15));
print_wfd_coupled_sink_info(level + 2,
"Coupled Sink Information",
bytes + 17, 7);
data += 24;
size -= 24;
}
}
static void print_wfd_r2_device_info(unsigned int level, const char *label,
const void *data, uint16_t size)
{
static const char *dev_type[4] = {
[0] = "WFD R2 Source",
[1] = "WFD R2 Primary sink",
[2] = "Reserved (0b10)",
[3] = "Dual-role possible",
};
const uint8_t *bytes = data;
uint16_t caps;
if (size < 2) {
printf("malformed WFD %s\n", label);
return;
}
print_attr(level, "%s:", label);
caps = l_get_be16(bytes + 0);
print_attr(level + 1, "WFD R2 Device Type: %s", dev_type[caps & 3]);
if (caps & ~3)
print_attr(level + 1, "Reserved: 0x%04x", caps & ~3);
}
static struct attr_entry wfd_subelem_entry[] = {
{ WFD_SUBELEM_WFD_DEVICE_INFORMATION, "WFD Device Information",
ATTR_CUSTOM, { .function = print_wfd_device_info } },
{ WFD_SUBELEM_ASSOCIATED_BSSID, "Associated BSSID",
ATTR_ADDRESS },
{ WFD_SUBELEM_COUPLED_SINK_INFORMATION, "Coupled Sink Information",
ATTR_CUSTOM, { .function = print_wfd_coupled_sink_info } },
{ WFD_SUBELEM_EXTENDED_CAPABILITY, "WFD Extended Capability",
ATTR_CUSTOM, { .function = print_wfd_extended_caps } },
{ WFD_SUBELEM_LOCAL_IP_ADDRESS, "Local IP Address",
ATTR_CUSTOM, { .function = print_wfd_local_ip } },
{ WFD_SUBELEM_SESION_INFORMATION, "WFD Session Information",
ATTR_CUSTOM, { .function = print_wfd_session_info } },
{ WFD_SUBELEM_ALTERNATIVE_MAC_ADDRESS, "Alternative MAC Address",
ATTR_ADDRESS },
{ WFD_SUBELEM_R2_DEVICE_INFORMATION, "WFD R2 Device Information",
ATTR_CUSTOM, { .function = print_wfd_r2_device_info } },
{ },
};
static void print_wfd_subelements(unsigned int level, const char *label,
const void *data, uint16_t size)
{
struct wfd_subelem_iter iter;
int i;
print_attr(level, "%s: len %u", label, size);
wfd_subelem_iter_init(&iter, data, size);
while (wfd_subelem_iter_next(&iter)) {
uint16_t type = wfd_subelem_iter_get_type(&iter);
uint16_t len = wfd_subelem_iter_get_length(&iter);
const void *attr = wfd_subelem_iter_get_data(&iter);
struct attr_entry *entry = NULL;
for (i = 0; wfd_subelem_entry[i].str; i++) {
if (wfd_subelem_entry[i].attr == type) {
entry = &wfd_subelem_entry[i];
break;
}
}
if (!entry)
continue;
switch (entry->type) {
case ATTR_ADDRESS:
if (len != 6) {
print_attr(level + 1, "malformed %s",
entry->str);
break;
}
print_address(level + 1, entry->str, attr);
break;
default:
if (entry->function)
entry->function(level + 1, entry->str, attr,
len);
else {
print_attr(level + 1, "Type: 0x%02x: len %u",
type, len);
print_hexdump(level + 2, attr, len);
}
break;
}
}
}
static void print_management_ies(unsigned int level, const char *label,
const void *data, uint16_t size)
{
void *wsc_data, *p2p_data, *wfd_data;
ssize_t wsc_len, p2p_len, wfd_len;
print_ie(level, label, data, size);
if (cur_nlmon && cur_nlmon->noies)
return;
wsc_data = ie_tlv_extract_wsc_payload(data, size, &wsc_len);
if (wsc_data) {
print_wsc_attributes(level + 1, "WSC Payload",
wsc_data, wsc_len);
l_free(wsc_data);
}
p2p_data = ie_tlv_extract_p2p_payload(data, size, &p2p_len);
if (p2p_data) {
print_p2p_attributes(level + 1, "P2P Attributes",
p2p_data, p2p_len);
l_free(p2p_data);
}
wfd_data = ie_tlv_extract_wfd_payload(data, size, &wfd_len);
if (wfd_data) {
print_wfd_subelements(level + 1, "WFD Payload",
wfd_data, wfd_len);
l_free(wfd_data);
}
}
static void print_reason_code(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t rc;
/* 802.11-2012, Table 8-36 */
static const char *reason_code_table[] = {
[0] = "Reserved",
[1] = "Unspecified reason",
[2] = "Previous authentication no longer valid",
[3] = "Leaving",
[4] = "Disassociation due to inactivity",
[5] = "Disassociated because AP is unable to handle all"
" currently associated STAs",
[6] = "Class 2 frame received from nonauthenticated STA",
[7] = "Class 3 frame received from nonassociated STA",
[8] = "Disassociated because sending STA is leaving",
[9] = "STA requesting (re)association is not authenticated "
"with responding STA",
[10] = "Disassociated because the information in the Power "
"Capability element is unacceptable",
[11] = "Disassociated because the information in the Supported "
"Channels element is unacceptable",
[12] = "Disassociated due to BSS Transition Management",
[13] = "Invalid element",
[14] = "MIC failure",
[15] = "4-Way Handshake timeout",
[16] = "Group Key Handshake timeout",
[17] = "Element in 4-Way Handshake different from "
"(Re)Association Request/Probe Response/Beacon frame",
[18] = "Invalid group cipher",
[19] = "Invalid pairwise cipher",
[20] = "Invalid AKMP",
[21] = "Unsupported RSNE version",
[22] = "Invalid RSNE capabilities",
[23] = "IEEE 802.1X authentication failed",
[24] = "Cipher suite rejected because of the security policy",
[25] = "TDLS direct-link teardown due to TDLS peer STA "
"unreachable via the TDLS direct link",
[26] = "TDLS direct-link teardown for unspecified reason",
[27] = "Disassociated because session terminated by SSP "
"request",
[28] = "Disassociated because of lack of SSP roaming agreement",
[29] = "Requested service rejected because of SSP cipher "
"suite or AKM requirement",
[30] = "Requested service not authorized in this location",
[31] = "TS deleted because QoS AP lacks sufficient bandwidth "
"for this QoS STA due to a change in BSS service "
"characteristics or operational mode",
[32] = "Disassociated for unspecified, QoS-related reason",
[33] = "Disassociated because QoS AP lacks sufficient "
"bandwidth for this QoS STA",
[34] = "Disassociated because excessive number of frames need "
"to be acknowledged, but are not acknowledged due to "
"AP transmissions and/or poor channel conditions",
[35] = "Disassociated because STA is transmitting outside the "
"limits of its TXOPs",
[36] = "Requested from peer STA as the STA is leaving",
[37] = "Requested from peer STA as it does not want to use the "
"mechanism",
[38] = "Requested from peer STA as the STA received frames "
"using the mechanism for which a setup is required",
[39] = "Requested from peer STA due to timeout",
[40 ... 44] = "Reserved",
[45] = "Peer STA does not support the requested cipher suite",
[46] = "The teardown was initiated by the DLS peer | "
"Disassociated because authorized access limit reached",
[47] = "The teardown was initiated by the AP | "
"Disassociated due to external service requirements",
[48] = "Invalid FT Action frame count",
[49] = "Invalid PMKI",
[50] = "Invalid MDE",
[51] = "Invalid FTE",
[52] = "SME cancels the mesh peering instance with the reason "
"other than reaching the maximum number of peer mesh "
"STAs",
[53] = "The mesh STA has reached the supported maximum number "
"of peer mesh STAs",
[54] = "The received information violates the Mesh "
"Configuration policy configured in the mesh STA "
"profile",
[55] = "The mesh STA has received a Mesh Peering Close message "
"requesting to close the mesh peering.",
[56] = "The mesh STA has resent dot11MeshMaxRetries Mesh "
"Peering Open messages, without receiving a Mesh "
"Peering Confirm message.",
[57] = "The confirmTimer for the mesh peering instance times "
"out.",
[58] = "The mesh STA fails to unwrap the GTK or the values in "
"the wrapped contents do not match",
[59] = "The mesh STA receives inconsistent information about "
"the mesh parameters between Mesh Peering Management "
"frames",
[60] = "The mesh STA fails the authenticated mesh peering "
"exchange because due to failure in selecting either "
"the pairwise ciphersuite or group ciphersuite",
[61] = "The mesh STA does not have proxy information for this "
"external destination.",
[62] = "The mesh STA does not have forwarding information for "
"this destination.",
[63] = "The mesh STA determines that the link to the next hop "
"of an active path in its forwarding information is "
"no longer usable.",
[64] = "The Deauthentication frame was sent because the MAC "
"address of the STA already exists in the mesh BSS. "
"See 10.3.6.",
[65] = "The mesh STA performs channel switch to meet "
"regulatory requirements.",
[66] = "The mesh STA performs channel switch with unspecified "
"reason.",
};
if (size != 2)
return;
rc = *((uint16_t *) data);
if (rc >= L_ARRAY_SIZE(reason_code_table))
print_attr(level, "%s: Reserved", label);
else
print_attr(level, "%s: %s", label, reason_code_table[rc]);
}
static void print_mpdu_frame_control(unsigned int level,
const struct mpdu_fc *fc)
{
print_attr(level, "Frame Control: protocol: %02u type: %02u "
"subtype: %02u to: %02u from: %02u more_frags: %02u",
fc->protocol_version, fc->type, fc->subtype,
fc->to_ds, fc->from_ds, fc->more_fragments);
print_attr(level + 1, "retry: %02u power_mgmt: %02u more_data: %02u "
"protected: %02u order: %02u",
fc->retry, fc->power_mgmt, fc->more_data,
fc->protected_frame, fc->order);
}
static void print_mmpdu_header(unsigned int level,
const struct mmpdu_header *mmpdu)
{
print_attr(level, "Duration: %u", L_LE16_TO_CPU(mmpdu->duration));
print_address(level, "Address 1 (RA):", mmpdu->address_1);
print_address(level, "Address 2 (TA):", mmpdu->address_2);
print_address(level, "Address 3:", mmpdu->address_3);
print_attr(level, "Fragment Number: %u", mmpdu->fragment_number);
print_attr(level, "Sequence Number: %u",
MPDU_SEQUENCE_NUMBER(*mmpdu));
}
static void print_association_mgmt_frame(unsigned int level,
const struct mmpdu_header *mmpdu,
size_t size)
{
const struct mmpdu_association_response *body;
body = mmpdu_body(mmpdu);
print_attr(level, "Association Response:");
print_mpdu_frame_control(level + 1, &mmpdu->fc);
print_mmpdu_header(level + 1, mmpdu);
print_attr(level + 1, "Status Code: %u", body->status_code);
print_attr(level + 1, "AID: %u", body->aid);
print_management_ies(level, "IEs", body->ies,
size - 6 - sizeof(struct mmpdu_header));
}
static void print_authentication_mgmt_frame(unsigned int level,
const struct mmpdu_header *mmpdu,
size_t size)
{
const char *str;
const struct mmpdu_authentication *body;
if (!mmpdu)
return;
body = mmpdu_body(mmpdu);
print_attr(level, "Authentication:");
print_mpdu_frame_control(level + 1, &mmpdu->fc);
print_mmpdu_header(level + 1, mmpdu);
switch (L_LE16_TO_CPU(body->algorithm)) {
case MMPDU_AUTH_ALGO_OPEN_SYSTEM:
str = "Open";
break;
case MMPDU_AUTH_ALGO_SHARED_KEY:
str = "Shared key";
break;
case MMPDU_AUTH_ALGO_FT:
str = "FT";
break;
case MMPDU_AUTH_ALGO_SAE:
str = "SAE";
break;
default:
str = "Reserved";
break;
}
print_attr(level + 1, "Algorithm: %s (seq: %u, status: %u)", str,
L_LE16_TO_CPU(body->transaction_sequence),
L_LE16_TO_CPU(body->status));
if (L_LE16_TO_CPU(body->algorithm) != MMPDU_AUTH_ALGO_SHARED_KEY)
return;
if (L_LE16_TO_CPU(body->transaction_sequence) < 2 ||
L_LE16_TO_CPU(body->transaction_sequence) > 3)
return;
print_ie(level + 1, "IEs", body->ies,
(const uint8_t *) mmpdu + size - body->ies);
}
static void print_deauthentication_mgmt_frame(unsigned int level,
const struct mmpdu_header *mmpdu)
{
const struct mmpdu_deauthentication *body;
if (!mmpdu)
return;
body = mmpdu_body(mmpdu);
print_attr(level, "Deauthentication:");
print_mpdu_frame_control(level + 1, &mmpdu->fc);
print_mmpdu_header(level + 1, mmpdu);
print_attr(level + 1, "Reason code: %u",
L_LE16_TO_CPU(body->reason_code));
}
static void print_p2p_public_action_frame(unsigned int level,
const uint8_t *body,
size_t body_len)
{
const char *subtype;
/* P2P v1.7 Table 60 */
static const char *p2p_public_table[] = {
[0] = "GO Negotiation Request",
[1] = "GO Negotiation Response",
[2] = "GO Negotiation Confirmation",
[3] = "P2P Invitation Request",
[4] = "P2P Invitation Response",
[5] = "Device Discoverability Request",
[6] = "Device Discoverability Response",
[7] = "Provision Discovery Request",
[8] = "Provision Discovery Response",
};
if (body_len < 2)
return;
if (body[1] < L_ARRAY_SIZE(p2p_public_table) &&
p2p_public_table[body[0]])
subtype = p2p_public_table[body[0]];
else
subtype = "Unknown";
print_attr(level, "OUI Type: P2P public action frame");
print_attr(level, "OUI Subtype: %s (%u)", subtype, body[0]);
print_attr(level + 1, "Dialog Token: %u", body[1]);
print_management_ies(level, "IEs", body + 2, body_len - 2);
}
2019-07-08 18:59:50 +02:00
static void print_p2p_action_frame(unsigned int level, const uint8_t *body,
size_t body_len)
{
const char *subtype;
/* P2P v1.7 Table 74 */
static const char *p2p_action_table[] = {
[0] = "Notice of Absence",
[1] = "P2P Presence Request",
[2] = "P2P Presence Response",
[3] = "GO Discoverability Request",
};
if (body_len < 2)
return;
if (body[1] < L_ARRAY_SIZE(p2p_action_table) &&
p2p_action_table[body[0]])
subtype = p2p_action_table[body[0]];
else
subtype = "Unknown";
print_attr(level, "OUI Type: P2P action frame");
print_attr(level, "OUI Subtype: %s (%u)", subtype, body[0]);
print_attr(level + 1, "Dialog Token: %u", body[1]);
print_management_ies(level, "IEs", body + 2, body_len - 2);
}
static void print_anqp_frame(unsigned int level, const uint8_t *anqp,
size_t anqp_len)
{
struct anqp_iter iter;
uint16_t id, len;
const void *data;
static const char *anqp_elements[] = {
[ANQP_QUERY_LIST] = "Query List",
[ANQP_CAPABILITY_LIST] = "Capability List",
[ANQP_VENUE_NAME] = "Venue Name",
[ANQP_EMERGENCY_CALL_NUMBER] = "Emergency Call Number",
[ANQP_NETWORK_AUTH_TYPE] = "Network Authentication Type",
[ANQP_ROAMING_CONSORTIUM] = "Roaming Consortium",
[ANQP_IP_ADDRESS_TYPE_AVAILABILITY] = "IP Address type avail",
[ANQP_NAI_REALM] = "NAI Realm",
[ANQP_3GPP_CELLULAR_NETWORK] = "3GPP Cellular Network",
[ANQP_AP_GEOSPATIAL_LOCATION] = "AP Geospatial location",
[ANQP_AP_CIVIC_LOCATION] = "AP Civic Location",
[ANQP_AP_LOCATION_PUBLIC_ID] = "AP Location Public ID",
[ANQP_DOMAIN_NAME] = "Domain Name",
[ANQP_EMERGENCY_ALERT_ID_URI] = "Emergency Alery ID URI",
[ANQP_TDLS_CAPABILITY] = "TDLS Capability",
[ANQP_EMERGENCY_NAI] = "Emergency NAI",
[ANQP_NEIGHBOR_REPORT] = "Neighbor Report",
[ANQP_VENUE_URI] = "Venue URI",
[ANQP_ADVICE_OF_CHARGE] = "Advice of Charge",
[ANQP_LOCAL_CONTENT] = "Local Content",
[ANQP_NETWORK_AUTH_TYPE_WITH_TIMESTAMP] =
"Network Auth Type with Timestamp",
[ANQP_VENDOR_SPECIFIC] = "Vendor Specific"
};
anqp_iter_init(&iter, anqp, anqp_len);
while (anqp_iter_next(&iter, &id, &len, &data)) {
const char *str;
char **nai_realms;
int i;
if (id >= L_ARRAY_SIZE(anqp_elements) || id < ANQP_QUERY_LIST)
str = "Unknown";
else
str = anqp_elements[id];
print_attr(level, "ANQP ID: %s, Len: %u", str, len);
switch (id) {
case ANQP_NAI_REALM:
nai_realms = anqp_parse_nai_realms(data, len);
if (!nai_realms) {
print_attr(level + 1, "bad NAI Realm data");
break;
}
for (i = 0; nai_realms[i]; i++)
print_attr(level + 2, "Realm[%u] %s", i,
nai_realms[i]);
l_strv_free(nai_realms);
break;
default:
print_hexdump(level + 1, anqp + 4, len);
}
}
}
static void print_public_action_frame(unsigned int level, const uint8_t *body,
size_t body_len)
{
const char *category;
const uint8_t *oui = body + 1;
/* 802.11-2016, Table 9-307 */
static const char *public_action_table[] = {
[0] = "20/40 BSS Coexistence Management",
[1] = "DSE enablement",
[2] = "DSE deenablement",
[3] = "DSE Registered Location Announcement",
[4] = "Extended Channel Switch Announcement",
[5] = "DSE measurement request",
[6] = "DSE measurement report",
[7] = "Measurement Pilot",
[8] = "DSE power constraint",
[9] = "Vendor-specific",
[10] = "GAS Initial Request",
[11] = "GAS Initial Response",
[12] = "GAS Comeback Request",
[13] = "GAS Comeback Response",
[14] = "TDLS Discovery Response",
[15] = "Location Track Notification",
[16] = "QAB Request frame",
[17] = "QAB Response frame",
[18] = "QMF Policy",
[19] = "QMF Policy Change",
[20] = "QLoad Request",
[21] = "QLoad Report",
[22] = "HCCA TXOP Advertisement",
[23] = "HCCA TXOP Response",
[24] = "Public Key",
2020-01-21 07:21:38 +01:00
[25] = "Channel Availability Query",
[26] = "Channel Schedule Management",
[27] = "Contact Verification Signal",
[28] = "GDD Enablement Request",
[29] = "GDD Enablement Response",
[30] = "Network Channel Control",
[31] = "White Space Map Announcement",
[32] = "Fine Timing Measurement Request",
[33] = "Fine Timing Measurement",
};
if (body_len < 1)
return;
if (body[0] < L_ARRAY_SIZE(public_action_table) &&
public_action_table[body[0]])
category = public_action_table[body[0]];
else
category = "Unknown";
print_attr(level, "Public Action: %s (%u)", category, body[0]);
if (body_len < 5)
return;
if (!memcmp(oui, wifi_alliance_oui, 3) && oui[3] == 0x09) {
if (body[0] != 9)
return;
if (!print_oui(level, oui))
return;
print_p2p_public_action_frame(level + 1, body + 5,
body_len - 5);
} else if (body[0] == 0x0a) {
if (body_len < 9)
return;
if (body[2] != IE_TYPE_ADVERTISEMENT_PROTOCOL)
return;
if (body[5] != IE_ADVERTISEMENT_ANQP)
return;
if (body_len < l_get_le16(body + 6) + 8u)
return;
print_anqp_frame(level + 1, body + 8, l_get_le16(body + 6));
} else if (body[0] == 0x0b) {
if (body_len < 10)
return;
print_attr(level + 1, "Dialog Token: %u", body[1]);
print_attr(level + 1, "Status: %u", l_get_le16(body + 2));
print_attr(level + 1, "Delay: %u", l_get_le16(body + 4));
if (body[6] != IE_TYPE_ADVERTISEMENT_PROTOCOL)
return;
if (body_len < body[7] + 7u)
return;
if (body_len < l_get_le16(body + 8 + body[7]) + 10u)
return;
print_anqp_frame(level + 1, body + 10 + body[7],
l_get_le16(body + 8 + body[7]));
}
}
static void print_rm_request(unsigned int level, const uint8_t *body,
size_t body_len)
{
if (body_len < 3)
return;
print_attr(level, "Dialog Token: %u", body[0]);
print_attr(level, "Repetitions: %u", l_get_le16(body + 1));
print_ie(level, "IEs", body + 3, body_len - 3);
}
static void print_rm_report(unsigned int level, const uint8_t *body,
size_t body_len)
{
if (body_len < 1)
return;
print_attr(level, "Dialog Token: %u", body[0]);
print_ie(level, "IEs", body + 1, body_len - 1);
}
static void print_rm_action_frame(unsigned int level, const uint8_t *body,
size_t body_len)
{
const char *category;
/* 802.11-2016, Table 9-306 */
static const char *rm_action_table[] = {
[0] = "Radio Measurement Request",
[1] = "Radio Measurement Report",
[2] = "Link Measurement Request",
[3] = "Link Measurement Report",
[4] = "Neighbor Report Request",
[5] = "Neighbor Report Response",
};
if (body_len < 1)
return;
if (body[0] < L_ARRAY_SIZE(rm_action_table) && rm_action_table[body[0]])
category = rm_action_table[body[0]];
else
category = "Unknown";
print_attr(level, "Radio Measurement Action: %s (%u)", category, body[0]);
switch (body[0]) {
case 0:
print_rm_request(level + 1, body + 1, body_len - 1);
break;
case 1:
print_rm_report(level + 1, body + 1, body_len - 1);
break;
}
}
static void print_ft_request(unsigned int level,
const uint8_t *body, size_t body_len)
{
struct ie_tlv_iter iter;
switch (body[0]) {
case 1:
if (body_len < 13)
return;
print_attr(level + 1, "FT Request");
break;
case 2:
if (body_len < 15)
return;
print_attr(level + 1, "FT Response");
break;
case 3:
/* FT Confirm/Ack are not yet supported */
print_attr(level + 1, "FT Confirm");
return;
case 4:
print_attr(level + 1, "FT ACK");
return;
}
print_attr(level + 1, "STA Address: "MAC, MAC_STR(body + 1));
print_attr(level + 1, "Target AP Address: "MAC, MAC_STR(body + 7));
if (body[0] == 2) {
print_attr(level + 1, "Status: %u", l_get_le16(body + 13));
body += 15;
body_len -= 15;
} else {
body += 13;
body_len -= 15;
}
ie_tlv_iter_init(&iter, body, body_len);
while (ie_tlv_iter_next(&iter)) {
uint8_t tag = ie_tlv_iter_get_tag(&iter);
size_t len = ie_tlv_iter_get_length(&iter);
const void *data = ie_tlv_iter_get_data(&iter);
switch (tag) {
case IE_TYPE_RSN:
print_ie_rsn(level + 1, "RSN", data, len);
break;
case IE_TYPE_MOBILITY_DOMAIN:
print_mobility_domain(level + 1, "Mobility Domain",
data, len);
break;
case IE_TYPE_FAST_BSS_TRANSITION:
print_fast_bss_transition(level + 1,
"Fast BSS Transition",
data, len);
break;
}
}
}
2019-07-08 18:59:46 +02:00
static void print_action_mgmt_frame(unsigned int level,
const struct mmpdu_header *mmpdu,
size_t total_len, bool no_ack)
{
const uint8_t *body;
size_t body_len;
const char *category;
/* 802.11-2016, Table 9-47 */
static const char *category_table[] = {
[0] = "Sepctrum Management",
[1] = "QoS",
[2] = "DLS",
[3] = "Block Ack",
[4] = "Public",
[5] = "Radio Measurement",
[6] = "Fast BSS Transition",
[7] = "HT",
[8] = "SA Query",
[9] = "Protected Dual of Public Action",
[10] = "WNM",
[11] = "Unprotected WNM",
[12] = "TDLS",
[13] = "Mesh",
[14] = "Multihop",
[15] = "Self-protected",
[16] = "DMG",
[18] = "Fast Session Transfer",
[19] = "Robust AV Streaming",
[20] = "Unprotected DMG",
[21] = "VHT",
[126] = "Vendor-specific Protected",
[127] = "Vendor-specific",
[128 ... 255] = "Error",
};
body = mmpdu_body(mmpdu);
body_len = total_len - (body - (uint8_t *) mmpdu);
if (category_table[body[0]])
category = category_table[body[0]];
else
category = "Unknown";
print_attr(level, "Subtype: Action%s", no_ack ? " No Ack" : "");
print_attr(level, "Action Category: %s (%u)", category, body[0]);
if (body[0] == 4) {
print_public_action_frame(level, body + 1, body_len - 1);
return;
} else if (body[0] == 5) {
print_rm_action_frame(level, body + 1, body_len - 1);
return;
} else if ((body[0] == 126 || body[0] == 127) && body_len >= 5) {
2019-07-08 18:59:46 +02:00
const uint8_t *oui = body + 1;
2019-07-08 18:59:50 +02:00
if (!print_oui(level, oui))
return;
if (!memcmp(oui, wifi_alliance_oui, 3) && oui[3] == 0x09)
2019-07-08 18:59:50 +02:00
print_p2p_action_frame(level + 1, body + 5,
body_len - 5);
} else if (body[0] == 6) {
print_ft_request(level, body + 1, body_len - 1);
return;
2019-07-08 18:59:46 +02:00
}
print_mpdu_frame_control(level + 1, &mmpdu->fc);
print_mmpdu_header(level + 1, mmpdu);
}
static void print_frame_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t frame_type = *((uint16_t *) data);
uint8_t type = frame_type & 0x000c;
uint8_t subtype = (frame_type & 0x00f0) >> 4;
const struct mmpdu_header *mpdu = NULL;
const char *str;
print_attr(level, "%s: 0x%04x", label, frame_type);
switch (type) {
case 0x00:
str = "Management";
mpdu = mpdu_validate(data, size);
break;
default:
str = "Reserved";
break;
}
print_attr(level + 1, "Type: %s (%u)", str, type);
str = NULL;
switch (subtype) {
case 0x00:
str = "Association request";
break;
case 0x01:
if (mpdu)
print_association_mgmt_frame(level + 1, mpdu, size);
else
str = "Association response";
break;
case 0x02:
str = "Reassociation request";
break;
case 0x03:
str = "Reassociation response";
break;
case 0x04:
str = "Probe request";
break;
case 0x05:
str = "Probe response";
break;
case 0x06:
str = "Timing Advertisement";
break;
case 0x08:
str = "Beacon";
break;
case 0x09:
str = "ATIM";
break;
case 0x0a:
str = "Disassociation";
break;
case 0x0b:
if (mpdu)
print_authentication_mgmt_frame(level + 1, mpdu, size);
else
str = "Authentication";
break;
case 0x0c:
if (mpdu)
print_deauthentication_mgmt_frame(level + 1, mpdu);
else
str = "Deauthentication";
break;
case 0x0d:
case 0x0e:
2019-07-08 18:59:46 +02:00
if (mpdu)
print_action_mgmt_frame(level + 1, mpdu, size,
subtype == 0x0e);
else if (subtype == 0x0d)
str = "Action";
else
str = "Action No Ack";
break;
default:
str = "Reserved";
break;
}
if (str)
print_attr(level + 1, "Subtype: %s (%u)", str, subtype);
}
static void print_frame(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: len %u", label, size);
print_frame_type(level + 1, "Frame Type", data, size);
print_hexdump(level + 1, data, size);
}
static void print_cipher_suite(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint32_t cipher = *((uint32_t *) data);
if (size != 4)
return;
print_ie_cipher_suite(level, label, cipher, rsn_cipher_selectors);
}
static void print_cipher_suites(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s:", label);
while (size >= 4) {
print_cipher_suite(level + 1, NULL, data, 4);
data += 4;
size -= 4;
}
}
2015-04-17 19:10:19 +02:00
static void print_akm_suites(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s:", label);
while (size >= 4) {
uint32_t akm = *((uint32_t *) data);
2018-11-16 23:22:45 +01:00
print_ie_cipher_suite(level + 1, NULL, akm, rsn_akm_selectors);
2015-04-17 19:10:19 +02:00
data += 4;
size -= 4;
}
}
static const struct attr_entry iftype_table[] = {
{ NL80211_IFTYPE_ADHOC, "Ad-hoc", ATTR_FLAG },
{ NL80211_IFTYPE_STATION, "Station", ATTR_FLAG },
{ NL80211_IFTYPE_AP, "AP", ATTR_FLAG },
{ NL80211_IFTYPE_AP_VLAN, "AP-VLAN", ATTR_FLAG },
{ NL80211_IFTYPE_WDS, "WDS", ATTR_FLAG },
{ NL80211_IFTYPE_MONITOR, "Monitor", ATTR_FLAG },
{ NL80211_IFTYPE_MESH_POINT, "Mesh-point", ATTR_FLAG },
{ NL80211_IFTYPE_P2P_CLIENT, "P2P-Client", ATTR_FLAG },
{ NL80211_IFTYPE_P2P_GO, "P2P-GO", ATTR_FLAG },
{ NL80211_IFTYPE_P2P_DEVICE, "P2P-Device", ATTR_FLAG },
{ }
};
static const struct attr_entry bss_param_table[] = {
{ NL80211_STA_BSS_PARAM_CTS_PROT, "CTS protection", ATTR_FLAG },
{ NL80211_STA_BSS_PARAM_SHORT_PREAMBLE, "Short Preamble", ATTR_FLAG },
{ NL80211_STA_BSS_PARAM_SHORT_SLOT_TIME,"Short Slot Time", ATTR_FLAG },
{ NL80211_STA_BSS_PARAM_DTIM_PERIOD, "DTIM Period", ATTR_U8 },
{ NL80211_STA_BSS_PARAM_BEACON_INTERVAL,"Beacon Interval", ATTR_U16 },
{ }
};
static const struct attr_entry sta_flag_table[] = {
{ NL80211_STA_FLAG_AUTHORIZED, "Authorized", ATTR_FLAG },
{ NL80211_STA_FLAG_SHORT_PREAMBLE, "ShortPreamble",ATTR_FLAG },
{ NL80211_STA_FLAG_WME, "WME", ATTR_FLAG },
{ NL80211_STA_FLAG_MFP, "MFP", ATTR_FLAG },
{ NL80211_STA_FLAG_AUTHENTICATED, "Authenticated",ATTR_FLAG },
{ NL80211_STA_FLAG_TDLS_PEER, "TDLS-Peer", ATTR_FLAG },
{ NL80211_STA_FLAG_ASSOCIATED, "Associated", ATTR_FLAG },
{ }
};
static void print_sta_flag_update(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct nl80211_sta_flag_update *flags = data;
unsigned int i;
print_attr(level, "%s: len %u", label, size);
print_attr(level + 1, "Mask: 0x%08x", flags->mask);
for (i = 0; sta_flag_table[i].str; i++) {
if (flags->mask & (1 << sta_flag_table[i].attr))
print_attr(level + 2, "%s", sta_flag_table[i].str);
}
print_attr(level + 1, "Set: 0x%08x", flags->set);
for (i = 0; sta_flag_table[i].str; i++) {
if (flags->set & (1 << sta_flag_table[i].attr))
print_attr(level + 2, "%s", sta_flag_table[i].str);
}
}
static const struct attr_entry rate_info_table[] = {
{ NL80211_RATE_INFO_BITRATE, "Bit Rate (Legacy)", ATTR_U16 },
{ NL80211_RATE_INFO_MCS, "MCS Index", ATTR_U8 },
{ NL80211_RATE_INFO_40_MHZ_WIDTH, "40 Mhz Width", ATTR_FLAG },
{ NL80211_RATE_INFO_SHORT_GI, "Short GI", ATTR_FLAG },
{ NL80211_RATE_INFO_BITRATE32, "Bit Rate", ATTR_U32 },
{ NL80211_RATE_INFO_VHT_MCS, "VHT MCS Index", ATTR_U8 },
{ NL80211_RATE_INFO_VHT_NSS, "# VHT Streams", ATTR_U8 },
{ NL80211_RATE_INFO_80_MHZ_WIDTH, "80 Mhz Width", ATTR_FLAG },
{ NL80211_RATE_INFO_80P80_MHZ_WIDTH, "80P80 Mhz Width", ATTR_FLAG },
{ NL80211_RATE_INFO_160_MHZ_WIDTH, "160 Mhz Width", ATTR_FLAG },
{ }
};
static const struct attr_entry sta_info_table[] = {
{ NL80211_STA_INFO_INACTIVE_TIME,
"Inactivity time", ATTR_U32 },
{ NL80211_STA_INFO_RX_BYTES, "Total RX bytes", ATTR_U32 },
{ NL80211_STA_INFO_TX_BYTES, "Total TX bytes", ATTR_U32 },
{ NL80211_STA_INFO_RX_BYTES64, "Total RX bytes", ATTR_U64 },
{ NL80211_STA_INFO_TX_BYTES64, "Total TX bytes", ATTR_U64 },
{ NL80211_STA_INFO_SIGNAL, "Signal strength", ATTR_S8 },
{ NL80211_STA_INFO_TX_BITRATE, "TX bitrate",
ATTR_NESTED, { rate_info_table } },
{ NL80211_STA_INFO_RX_PACKETS, "RX packets", ATTR_U32 },
{ NL80211_STA_INFO_TX_PACKETS, "TX packets", ATTR_U32 },
{ NL80211_STA_INFO_TX_RETRIES, "TX retries", ATTR_U32 },
{ NL80211_STA_INFO_TX_FAILED, "TX failed", ATTR_U32 },
{ NL80211_STA_INFO_SIGNAL_AVG, "Signal strength average",
ATTR_S8 },
{ NL80211_STA_INFO_LLID, "Mesh LLID", ATTR_U16 },
{ NL80211_STA_INFO_PLID, "Mesh PLID", ATTR_U16 },
{ NL80211_STA_INFO_PLINK_STATE, "P-Link state" },
{ NL80211_STA_INFO_RX_BITRATE, "RX bitrate",
ATTR_NESTED, { rate_info_table } },
{ NL80211_STA_INFO_BSS_PARAM, "BSS parameters",
ATTR_NESTED, { bss_param_table } },
{ NL80211_STA_INFO_CONNECTED_TIME,
"Connected time", ATTR_U32 },
{ NL80211_STA_INFO_STA_FLAGS, "Station flags",
ATTR_CUSTOM, { .function = print_sta_flag_update } },
{ NL80211_STA_INFO_BEACON_LOSS, "Beacon loss", ATTR_U32 },
{ NL80211_STA_INFO_T_OFFSET, "Timing offset", ATTR_S64 },
{ NL80211_STA_INFO_LOCAL_PM, "Local mesh PM", ATTR_U32 },
{ NL80211_STA_INFO_PEER_PM, "Peer mesh PM", ATTR_U32 },
{ NL80211_STA_INFO_NONPEER_PM, "Neighbor mesh PM", ATTR_U32 },
{ NL80211_STA_INFO_CHAIN_SIGNAL,
"Per-chain signal strength" },
{ NL80211_STA_INFO_CHAIN_SIGNAL_AVG,
"Per-chain signal strength average" },
{ NL80211_STA_INFO_EXPECTED_THROUGHPUT,
"Expected Throughput", ATTR_U32 },
{ }
};
static void print_bss_capability(unsigned int level, const char *label,
const void *data, uint16_t size)
{
uint16_t cap = *(uint16_t *) data;
print_attr(level, "%s: %"PRIu16" (0x%04"PRIx16")", label, cap, cap);
if (cap & BSS_CAPABILITY_ESS)
print_attr(level + 1, "ESS");
if (cap & BSS_CAPABILITY_IBSS)
print_attr(level + 1, "IBSS");
if (cap & BSS_CAPABILITY_PRIVACY)
print_attr(level + 1, "Privacy");
if (cap & BSS_CAPABILITY_SHORT_PREAMBLE)
print_attr(level + 1, "ShortPreamble");
if (cap & BSS_CAPABILITY_PBCC)
print_attr(level + 1, "PBCC");
if (cap & BSS_CAPABILITY_CHANNEL_AGILITY)
print_attr(level + 1, "ChannelAgility");
if (cap & BSS_CAPABILITY_SPECTRUM_MGMT)
print_attr(level + 1, "SpectrumMgmt");
if (cap & BSS_CAPABILITY_QOS)
print_attr(level + 1, "QoS");
if (cap & BSS_CAPABILITY_SHORT_SLOT_TIME)
print_attr(level + 1, "ShortSlotTime");
if (cap & BSS_CAPABILITY_APSD)
print_attr(level + 1, "APSD");
if (cap & BSS_CAPABILITY_DSSS_OFDM)
print_attr(level + 1, "DSSS-OFDM");
}
static const struct attr_entry bss_table[] = {
{ NL80211_BSS_BSSID, "BSSID", ATTR_ADDRESS },
{ NL80211_BSS_FREQUENCY, "Frequency", ATTR_U32 },
{ NL80211_BSS_TSF, "TSF", ATTR_U64 },
{ NL80211_BSS_BEACON_INTERVAL, "Beacon Interval",
ATTR_U16 },
{ NL80211_BSS_CAPABILITY, "Capability", ATTR_CUSTOM,
{ .function = print_bss_capability } },
{ NL80211_BSS_INFORMATION_ELEMENTS, "IEs",
ATTR_CUSTOM, { .function = print_management_ies } },
{ NL80211_BSS_SIGNAL_MBM, "Signal mBm", ATTR_S32 },
{ NL80211_BSS_SIGNAL_UNSPEC, "Signal Unspec",ATTR_U8 },
{ NL80211_BSS_STATUS, "Status", ATTR_U32 },
{ NL80211_BSS_SEEN_MS_AGO, "Seen ms ago", ATTR_U32 },
{ NL80211_BSS_BEACON_IES, "Beacon IEs",
ATTR_CUSTOM, { .function = print_management_ies } },
{ NL80211_BSS_CHAN_WIDTH, "Chan Width", ATTR_U32 },
{ NL80211_BSS_BEACON_TSF, "Beacon TSF", ATTR_U64 },
{ NL80211_BSS_PRESP_DATA, "Probe Response", ATTR_FLAG },
2019-11-15 19:39:24 +01:00
{ NL80211_BSS_PARENT_TSF, "Parent TSF", ATTR_U64 },
2021-02-03 18:00:40 +01:00
{ NL80211_BSS_PARENT_BSSID, "Parent BSSID", ATTR_ADDRESS },
{ NL80211_BSS_LAST_SEEN_BOOTTIME, "Timestamp", ATTR_U64 },
{ NL80211_BSS_FREQUENCY_OFFSET, "Freq Offset", ATTR_U32 },
{ }
};
static const struct attr_entry frame_types_field_table[] = {
{ NL80211_ATTR_FRAME_TYPE,
"Frame Type", ATTR_CUSTOM,
{ .function = print_frame_type } },
{ }
};
static const struct attr_entry frame_types_table[] = {
{ NL80211_IFTYPE_ADHOC, "Ad-hoc", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_STATION, "Station", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_AP, "AP", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_AP_VLAN, "AP-VLAN", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_WDS, "WDS", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_MONITOR, "Monitor", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_MESH_POINT, "Mesh-point", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_P2P_CLIENT, "P2P-Client", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_P2P_GO, "P2P-GO", ATTR_NESTED,
{ frame_types_field_table } },
{ NL80211_IFTYPE_P2P_DEVICE, "P2P-Device", ATTR_NESTED,
{ frame_types_field_table } },
{ }
};
static const struct attr_entry survey_info_table[] = {
{ NL80211_SURVEY_INFO_FREQUENCY, "Frequency", ATTR_U32 },
{ NL80211_SURVEY_INFO_NOISE, "Noise dBm", ATTR_S8 },
{ NL80211_SURVEY_INFO_IN_USE, "Channel Currently In Use", ATTR_FLAG },
{ NL80211_SURVEY_INFO_TIME, "Survey Time", ATTR_U64 },
{ NL80211_SURVEY_INFO_TIME_BUSY, "Busy Time", ATTR_U64 },
{ NL80211_SURVEY_INFO_TIME_EXT_BUSY, "Busy Time Extension Channel", ATTR_U64 },
{ NL80211_SURVEY_INFO_TIME_RX, "RX Time", ATTR_U64 },
{ NL80211_SURVEY_INFO_TIME_TX, "TX Time", ATTR_U64 },
{ NL80211_SURVEY_INFO_TIME_SCAN, "Scan Time", ATTR_U64 },
{ }
};
2020-05-02 04:40:07 +02:00
static void print_cqm_event(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint32_t *event = data;
switch (*event) {
case NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW:
print_attr(level, "%s: %s", label, "Low");
break;
case NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH:
print_attr(level, "%s: %s", label, "High");
break;
case NL80211_CQM_RSSI_BEACON_LOSS_EVENT:
print_attr(level, "%s: %s", label, "Beacon Loss (unused)");
break;
default:
print_attr(level, "%s: %s", label, "Unknown");
break;
}
}
static const struct attr_entry cqm_table[] = {
{ NL80211_ATTR_CQM_RSSI_THOLD, "RSSI threshold", ATTR_U32 },
{ NL80211_ATTR_CQM_RSSI_HYST, "RSSI hysteresis", ATTR_U32 },
{ NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT,
2020-05-02 04:40:07 +02:00
"RSSI threshold event", ATTR_CUSTOM,
{ .function = print_cqm_event } },
{ NL80211_ATTR_CQM_PKT_LOSS_EVENT,
"Packet loss event", ATTR_U32 },
{ NL80211_ATTR_CQM_TXE_RATE, "TX error rate", ATTR_U32 },
{ NL80211_ATTR_CQM_TXE_PKTS, "TX error packets", ATTR_U32 },
{ NL80211_ATTR_CQM_TXE_INTVL, "TX error interval", ATTR_U32 },
2015-05-01 00:47:23 +02:00
{ NL80211_ATTR_CQM_BEACON_LOSS_EVENT, "Beacon Loss Event", ATTR_FLAG },
2020-05-02 04:40:07 +02:00
{ NL80211_ATTR_CQM_RSSI_LEVEL, "CQM RSSI Level", ATTR_S32 },
{ }
};
static const struct attr_entry key_default_type_table[] = {
{ NL80211_KEY_DEFAULT_TYPE_UNICAST, "Unicast", ATTR_FLAG },
{ NL80211_KEY_DEFAULT_TYPE_MULTICAST, "Multicast", ATTR_FLAG },
{ }
};
static void print_rekey_kek(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: len %u", label, size);
if (size != NL80211_KEK_LEN)
printf("malformed packet");
print_hexdump(level + 1, data, size);
}
static void print_rekey_kck(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: len %u", label, size);
if (size != NL80211_KCK_LEN)
printf("malformed packet");
print_hexdump(level + 1, data, size);
}
static void print_rekey_replay_ctr(unsigned int level, const char *label,
const void *data, uint16_t size)
{
print_attr(level, "%s: len %u", label, size);
if (size != NL80211_REPLAY_CTR_LEN)
printf("malformed packet");
print_hexdump(level + 1, data, size);
}
static const struct attr_entry rekey_table[] = {
{ NL80211_REKEY_DATA_KEK, "KEK", ATTR_CUSTOM,
{ .function = print_rekey_kek } },
{ NL80211_REKEY_DATA_KCK, "KCK", ATTR_CUSTOM,
{ .function = print_rekey_kck } },
{ NL80211_REKEY_DATA_REPLAY_CTR, "Replay CTR", ATTR_CUSTOM,
{ .function = print_rekey_replay_ctr } },
{ }
};
#define NLA_OK(nla,len) ((len) >= (int) sizeof(struct nlattr) && \
(nla)->nla_len >= sizeof(struct nlattr) && \
(nla)->nla_len <= (len))
#define NLA_NEXT(nla,attrlen) ((attrlen) -= NLA_ALIGN((nla)->nla_len), \
(struct nlattr*)(((char*)(nla)) + \
NLA_ALIGN((nla)->nla_len)))
#define NLA_LENGTH(len) (NLA_ALIGN(sizeof(struct nlattr)) + (len))
#define NLA_DATA(nla) ((void*)(((char*)(nla)) + NLA_LENGTH(0)))
#define NLA_PAYLOAD(nla) ((int)((nla)->nla_len - NLA_LENGTH(0)))
static void print_supported_commands(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct nlattr *nla;
print_attr(level, "%s:", label);
for (nla = data; NLA_OK(nla, size); nla = NLA_NEXT(nla, size)) {
uint32_t cmd = *((uint32_t *) NLA_DATA(nla));
2019-07-15 20:51:28 +02:00
print_attr(level + 1, "%s [%d]",
nl80211cmd_to_string(cmd), cmd);
}
}
2015-10-06 21:33:18 +02:00
static const struct attr_entry frequency_attr_table[] = {
{ NL80211_FREQUENCY_ATTR_FREQ, "Frequency", ATTR_U32 },
{ NL80211_FREQUENCY_ATTR_DISABLED, "Disabled", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_IR, "No IR", ATTR_FLAG },
{ __NL80211_FREQUENCY_ATTR_NO_IBSS, "No IBSS", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_RADAR, "Radar Detection", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_MAX_TX_POWER, "Max TX Power", ATTR_U32 },
{ NL80211_FREQUENCY_ATTR_DFS_STATE, "DFS State", ATTR_U32 },
{ NL80211_FREQUENCY_ATTR_DFS_TIME, "DFS Time", ATTR_U32 },
{ NL80211_FREQUENCY_ATTR_NO_HT40_MINUS, "No HT40-", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_HT40_PLUS, "No HT40+", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_80MHZ, "No 80 Mhz", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_160MHZ, "No 160 Mhz", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_DFS_CAC_TIME, "DFS CAC Time", ATTR_U32 },
{ NL80211_FREQUENCY_ATTR_INDOOR_ONLY, "Indoor only", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_GO_CONCURRENT, "Go Concurrent", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_20MHZ, "No 20 Mhz", ATTR_FLAG },
{ NL80211_FREQUENCY_ATTR_NO_10MHZ, "No 10 Mhz", ATTR_FLAG },
{ }
};
static void print_band_frequencies(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct nlattr *nla;
uint16_t nla_type;
print_attr(level, "%s: len %u", label, size);
for (nla = data; NLA_OK(nla, size); nla = NLA_NEXT(nla, size)) {
nla_type = nla->nla_type & NLA_TYPE_MASK;
print_attr(level + 1, "Frequency %u: len %u", nla_type,
NLA_PAYLOAD(nla));
print_attributes(level + 2, frequency_attr_table,
NLA_DATA(nla), NLA_PAYLOAD(nla));
}
}
2019-10-28 18:32:17 +01:00
static const struct attr_entry bitrate_attr_table[] = {
{ NL80211_BITRATE_ATTR_RATE, "Bitrate (100kbps multiple)", ATTR_U32 },
{ NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE,
"2GHZ Short Preamble", ATTR_FLAG },
{ }
};
static void print_band_rates(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct nlattr *nla;
uint16_t nla_type;
print_attr(level, "%s: len %u", label, size);
for (nla = data; NLA_OK(nla, size); nla = NLA_NEXT(nla, size)) {
nla_type = nla->nla_type & NLA_TYPE_MASK;
print_attr(level + 1, "Bitrate %u: len %u", nla_type,
NLA_PAYLOAD(nla));
print_attributes(level + 2, bitrate_attr_table,
NLA_DATA(nla), NLA_PAYLOAD(nla));
}
}
2015-10-06 21:33:18 +02:00
static const struct attr_entry wiphy_bands_table[] = {
{ NL80211_BAND_ATTR_FREQS, "Frequencies",
ATTR_CUSTOM, { .function = print_band_frequencies } },
2019-10-28 18:32:17 +01:00
{ NL80211_BAND_ATTR_RATES, "Rates",
ATTR_CUSTOM, { .function = print_band_rates } },
{ NL80211_BAND_ATTR_HT_MCS_SET, "HT MCS Set",
ATTR_CUSTOM, { .function = print_ht_mcs_set } },
{ NL80211_BAND_ATTR_HT_CAPA, "HT Capabilities",
ATTR_CUSTOM, { .function = print_ht_capabilities } },
2015-10-06 21:33:18 +02:00
{ NL80211_BAND_ATTR_HT_AMPDU_FACTOR, "AMPDU Factor" },
{ NL80211_BAND_ATTR_HT_AMPDU_DENSITY, "AMPDU Density" },
{ NL80211_BAND_ATTR_VHT_MCS_SET, "VHT MCS Set" },
{ NL80211_BAND_ATTR_VHT_CAPA, "VHT Capabilities" },
{ }
};
static void print_wiphy_bands(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct nlattr *nla;
uint16_t nla_type;
print_attr(level, "%s: len %u", label, size);
for (nla = data; NLA_OK(nla, size); nla = NLA_NEXT(nla, size)) {
nla_type = nla->nla_type & NLA_TYPE_MASK;
print_attr(level + 1, "Band %u: len %u", nla_type,
NLA_PAYLOAD(nla));
print_attributes(level + 2, wiphy_bands_table,
NLA_DATA(nla), NLA_PAYLOAD(nla));
}
}
static void print_eapol_key(unsigned int level, const void *data, uint32_t size)
{
const struct eapol_key *ek = (struct eapol_key *)data;
size_t mic_lengths[] = { 16, 24, 32 };
size_t mic_len = 0;
int i;
/*
* The MIC length is not encoded anywhere in the frame, and should be
* determined by AKM. To even further complicate things, some non
* 802.11 AKMs define their own MIC lengths. But since the only valid
* lengths are 16, 24 and 32 its trivial to try each until we find a
* matching length.
*/
for (i = 0; i < 3; i++) {
size_t mlen = mic_lengths[i];
if (size < EAPOL_FRAME_LEN(mlen))
break;
if (size == EAPOL_FRAME_LEN(mlen) +
EAPOL_KEY_DATA_LEN(ek, mlen)) {
mic_len = mlen;
break;
}
}
/* could not determine MIC length, malformed packet? */
if (!mic_len)
return;
ek = eapol_key_validate(data, size, mic_len);
if (!ek)
return;
print_attr(level, "Descriptor Type: %u", ek->descriptor_type);
print_attr(level, "Key MIC: %s", ek->key_mic ? "true" : "false");
print_attr(level, "Secure: %s", ek->secure ? "true" : "false");
print_attr(level, "Error: %s", ek->error ? "true" : "false");
print_attr(level, "Request: %s", ek->request ? "true" : "false");
print_attr(level, "Encrypted Key Data: %s",
ek->encrypted_key_data ? "true" : "false");
print_attr(level, "SMK Message: %s",
ek->smk_message ? "true" : "false");
print_attr(level, "Key Descriptor Version: %d (%02x)",
ek->key_descriptor_version,
ek->key_descriptor_version);
print_attr(level, "Key Type: %s", ek->key_type ? "true" : "false");
if (ek->descriptor_type == EAPOL_DESCRIPTOR_TYPE_WPA)
print_attr(level, "Key Id: %u", ek->wpa_key_id);
print_attr(level, "Install: %s", ek->install ? "true" : "false");
print_attr(level, "Key ACK: %s", ek->key_ack ? "true" : "false");
print_attr(level, "Key Length: %d", L_BE16_TO_CPU(ek->key_length));
print_attr(level, "Key Replay Counter: %" PRIu64,
L_BE64_TO_CPU(ek->key_replay_counter));
print_attr(level, "Key NONCE");
print_hexdump(level + 1, ek->key_nonce, 32);
print_attr(level, "Key IV");
print_hexdump(level + 1, ek->eapol_key_iv, 16);
print_attr(level, "Key RSC ");
print_hexdump(level + 1, ek->key_rsc, 8);
print_attr(level, "Key MIC Data");
print_hexdump(level + 1, EAPOL_KEY_MIC(ek), mic_len);
if (ek->encrypted_key_data) {
print_attr(level, "Key Data: len %d",
EAPOL_KEY_DATA_LEN(ek, mic_len));
print_hexdump(level + 1, EAPOL_KEY_DATA(ek, mic_len),
EAPOL_KEY_DATA_LEN(ek, mic_len));
return;
}
print_ie(level, "Key Data", EAPOL_KEY_DATA(ek, mic_len),
EAPOL_KEY_DATA_LEN(ek, mic_len));
}
static void print_eap_wsc(unsigned int level,
const uint8_t *eap_wsc, uint32_t size)
{
const char *str;
if (size < 2)
return;
switch (eap_wsc[0]) {
case 0x01:
str = "WSC-Start";
break;
case 0x02:
str = "WSC-Ack";
break;
case 0x03:
str = "WSC-Nack";
break;
case 0x04:
str = "WSC-Msg";
break;
case 0x05:
str = "WSC-Done";
break;
case 0x06:
str = "WSC-Frag-Ack";
break;
default:
str = "Reserved";
break;
}
print_attr(level, "Op-Code: %u (%s)", eap_wsc[0], str);
print_attr(level, "Flags: %02x", eap_wsc[1]);
if (eap_wsc[1] == 0)
print_wsc_attributes(level + 1, "EAP-WSC Payload",
eap_wsc + 2, size - 2);
}
static void print_eap(unsigned int level, const void *data, uint32_t size)
{
static const uint8_t wfa_smi[3] = { 0x00, 0x37, 0x2a };
const uint8_t *eap = data;
const char *str;
if (size < 5)
return;
switch (eap[0]) {
case 0x01:
str = "Request";
break;
case 0x02:
str = "Response";
break;
case 0x03:
str = "Success";
break;
case 0x04:
str = "Failure";
break;
default:
str = "Reserved";
break;
}
print_attr(level, "Code: %u (%s)", eap[0], str);
print_attr(level, "Identifier: %u", eap[1]);
print_attr(level, "Length: %u", l_get_be16(eap + 2));
switch (eap[4]) {
case 1:
str = "Identity";
break;
case 2:
str = "Notification";
break;
case 3:
str = "Nak";
break;
case 4:
str = "MD5 Challenge";
break;
case 13:
str = "TLS EAP";
break;
case 21:
str = "TTLS";
break;
case 254:
str = "Expanded";
break;
default:
str = "Reserved";
break;
}
print_attr(level, "Type: %u (%s)", eap[4], str);
if (eap[4] == 254) {
if (size < 12)
return;
if (memcmp(eap + 5, wfa_smi, 3))
return;
if (l_get_be32(eap + 8) == 1)
print_eap_wsc(level, eap + 12, size - 12);
}
}
static void print_eapol(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const struct eapol_header *eh;
const char *str;
print_attr(level, "%s: len %u", label, size);
if (size < 4)
return;
eh = data;
switch (eh->protocol_version) {
case 0x01:
str = "802.1X-2001";
break;
case 0x02:
str = "802.1X-2004";
break;
case 0x03:
str = "802.1X-2010";
break;
default:
str = "Reserved";
break;
}
print_attr(level + 1, "Protocol Version: %u (%s)",
eh->protocol_version, str);
switch (eh->packet_type) {
case 0x00:
str = "EAP";
break;
case 0x01:
str = "Start";
break;
case 0x02:
str = "Logoff";
break;
case 0x03:
str = "Key";
break;
case 0x04:
str = "Encapsulated-ASF-Alert";
break;
case 0x05:
str = "MKA";
break;
case 0x06:
str = "Announcement (Generic)";
break;
case 0x07:
str = "Announcement (Specific)";
break;
case 0x08:
str = "Announcement-Req";
break;
default:
str = "Reserved";
break;
}
print_attr(level + 1, "Type: %u (%s)", eh->packet_type, str);
print_attr(level + 1, "Length: %d", L_BE16_TO_CPU(eh->packet_len));
switch (eh->packet_type) {
case 0x03:
print_eapol_key(level + 1, data, size);
break;
case 0x00:
print_eap(level + 1, data + 4, size - 4);
}
print_hexdump(level + 1, data, size);
}
#define EXT_ENTRY(a) #a
static const char *ext_feature_map[] = {
EXT_ENTRY(NL80211_EXT_FEATURE_VHT_IBSS),
EXT_ENTRY(NL80211_EXT_FEATURE_RRM),
EXT_ENTRY(NL80211_EXT_FEATURE_MU_MIMO_AIR_SNIFFER),
EXT_ENTRY(NL80211_EXT_FEATURE_SCAN_START_TIME),
EXT_ENTRY(NL80211_EXT_FEATURE_BSS_PARENT_TSF),
EXT_ENTRY(NL80211_EXT_FEATURE_SET_SCAN_DWELL),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_RATE_LEGACY),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_RATE_HT),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_RATE_VHT),
EXT_ENTRY(NL80211_EXT_FEATURE_FILS_STA),
EXT_ENTRY(NL80211_EXT_FEATURE_MGMT_TX_RANDOM_TA),
EXT_ENTRY(NL80211_EXT_FEATURE_MGMT_TX_RANDOM_TA_CONNECTED),
EXT_ENTRY(NL80211_EXT_FEATURE_SCHED_SCAN_RELATIVE_RSSI),
EXT_ENTRY(NL80211_EXT_FEATURE_CQM_RSSI_LIST),
EXT_ENTRY(NL80211_EXT_FEATURE_FILS_SK_OFFLOAD),
EXT_ENTRY(NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK),
EXT_ENTRY(NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X),
EXT_ENTRY(NL80211_EXT_FEATURE_FILS_MAX_CHANNEL_TIME),
EXT_ENTRY(NL80211_EXT_FEATURE_ACCEPT_BCAST_PROBE_RESP),
EXT_ENTRY(NL80211_EXT_FEATURE_OCE_PROBE_REQ_HIGH_TX_RATE),
EXT_ENTRY(NL80211_EXT_FEATURE_OCE_PROBE_REQ_DEFERRAL_SUPPRESSION),
EXT_ENTRY(NL80211_EXT_FEATURE_MFP_OPTIONAL),
EXT_ENTRY(NL80211_EXT_FEATURE_LOW_SPAN_SCAN),
EXT_ENTRY(NL80211_EXT_FEATURE_LOW_POWER_SCAN),
EXT_ENTRY(NL80211_EXT_FEATURE_HIGH_ACCURACY_SCAN),
EXT_ENTRY(NL80211_EXT_FEATURE_DFS_OFFLOAD),
EXT_ENTRY(NL80211_EXT_FEATURE_CONTROL_PORT_OVER_NL80211),
EXT_ENTRY(NL80211_EXT_FEATURE_ACK_SIGNAL_SUPPORT),
EXT_ENTRY(NL80211_EXT_FEATURE_TXQS),
EXT_ENTRY(NL80211_EXT_FEATURE_SCAN_RANDOM_SN),
EXT_ENTRY(NL80211_EXT_FEATURE_SCAN_MIN_PREQ_CONTENT),
EXT_ENTRY(NL80211_EXT_FEATURE_CAN_REPLACE_PTK0),
EXT_ENTRY(NL80211_EXT_FEATURE_ENABLE_FTM_RESPONDER),
EXT_ENTRY(NL80211_EXT_FEATURE_AIRTIME_FAIRNESS),
EXT_ENTRY(NL80211_EXT_FEATURE_AP_PMKSA_CACHING),
EXT_ENTRY(NL80211_EXT_FEATURE_SCHED_SCAN_BAND_SPECIFIC_RSSI_THOLD),
EXT_ENTRY(NL80211_EXT_FEATURE_EXT_KEY_ID),
EXT_ENTRY(NL80211_EXT_FEATURE_STA_TX_PWR),
EXT_ENTRY(NL80211_EXT_FEATURE_SAE_OFFLOAD),
EXT_ENTRY(NL80211_EXT_FEATURE_VLAN_OFFLOAD),
EXT_ENTRY(NL80211_EXT_FEATURE_AQL),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_PROTECTION),
EXT_ENTRY(NL80211_EXT_FEATURE_CONTROL_PORT_NO_PREAUTH),
EXT_ENTRY(NL80211_EXT_FEATURE_PROTECTED_TWT),
EXT_ENTRY(NL80211_EXT_FEATURE_DEL_IBSS_STA),
EXT_ENTRY(NL80211_EXT_FEATURE_MULTICAST_REGISTRATIONS),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_PROTECTION_CLIENT),
EXT_ENTRY(NL80211_EXT_FEATURE_SCAN_FREQ_KHZ),
EXT_ENTRY(NL80211_EXT_FEATURE_CONTROL_PORT_OVER_NL80211_TX_STATUS),
EXT_ENTRY(NL80211_EXT_FEATURE_OPERATING_CHANNEL_VALIDATION),
EXT_ENTRY(NL80211_EXT_FEATURE_4WAY_HANDSHAKE_AP_PSK),
EXT_ENTRY(NL80211_EXT_FEATURE_SAE_OFFLOAD_AP),
EXT_ENTRY(NL80211_EXT_FEATURE_FILS_DISCOVERY),
EXT_ENTRY(NL80211_EXT_FEATURE_UNSOL_BCAST_PROBE_RESP),
EXT_ENTRY(NL80211_EXT_FEATURE_BEACON_RATE_HE),
};
static void print_ext_features(unsigned int level, const char *label,
const void *data, uint16_t size)
{
int i;
uint16_t bits;
if (L_ARRAY_SIZE(ext_feature_map) < size * 8)
bits = L_ARRAY_SIZE(ext_feature_map);
else
bits = size * 8;
print_attr(level, "Extended Features:");
for (i = 0; i < bits; i++) {
if (test_bit(data, i))
print_attr(level + 1, "%s", ext_feature_map[i]);
}
}
/*
* Control Port sends a EAPoL frame inside ATTR_FRAME and not a management
* frame. So a separate table with all the possible attributes is provided
*/
static const struct attr_entry control_port_attr_table[] = {
{ NL80211_ATTR_CONTROL_PORT_ETHERTYPE,
"Control Port Ethertype", ATTR_FLAG_OR_U16 },
{ NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT,
"Control Port No Encrypt", ATTR_FLAG },
{ NL80211_ATTR_MAC,
"MAC Address", ATTR_ADDRESS },
{ NL80211_ATTR_FRAME,
"Frame", ATTR_CUSTOM, { .function = print_eapol } },
{ NL80211_ATTR_WDEV,
"Wireless Device", ATTR_U64 },
{ NL80211_ATTR_IFINDEX,
"Interface Index", ATTR_U32 },
{ NL80211_ATTR_WIPHY,
"Wiphy", ATTR_U32 },
{ }
};
static const struct attr_entry scan_flag_table[] = {
{ NL80211_SCAN_FLAG_LOW_PRIORITY, "LowPriority", ATTR_FLAG },
{ NL80211_SCAN_FLAG_FLUSH, "Flush", ATTR_FLAG },
{ NL80211_SCAN_FLAG_AP, "AP", ATTR_FLAG },
{ NL80211_SCAN_FLAG_RANDOM_ADDR, "RandomMAC", ATTR_FLAG },
{ NL80211_SCAN_FLAG_FILS_MAX_CHANNEL_TIME,
"FILSMaxTime", ATTR_FLAG },
{ NL80211_SCAN_FLAG_ACCEPT_BCAST_PROBE_RESP,
"BcastPrespOK", ATTR_FLAG },
{ NL80211_SCAN_FLAG_OCE_PROBE_REQ_HIGH_TX_RATE,
"OCEHighTX", ATTR_FLAG },
{ NL80211_SCAN_FLAG_OCE_PROBE_REQ_DEFERRAL_SUPPRESSION,
"OCEDeferSupp", ATTR_FLAG },
{ NL80211_SCAN_FLAG_LOW_SPAN, "LowSpan", ATTR_FLAG },
{ NL80211_SCAN_FLAG_LOW_POWER, "LowPower", ATTR_FLAG },
{ NL80211_SCAN_FLAG_HIGH_ACCURACY, "HighAccuracy", ATTR_FLAG },
{ NL80211_SCAN_FLAG_RANDOM_SN, "RandomSN", ATTR_FLAG },
{ NL80211_SCAN_FLAG_MIN_PREQ_CONTENT, "MinPreqCont", ATTR_FLAG },
{ NL80211_SCAN_FLAG_FREQ_KHZ, "FreqKHz", ATTR_FLAG },
{ NL80211_SCAN_FLAG_COLOCATED_6GHZ, "Colocated6G", ATTR_FLAG },
{ }
};
static void print_scan_flags(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint32_t *flags = data;
unsigned int i;
print_attr(level, "%s: Mask: 0x%08x len %u", label, *flags, size);
for (i = 0; scan_flag_table[i].str; i++) {
if (*flags & scan_flag_table[i].attr)
print_attr(level + 2, "%s", scan_flag_table[i].str);
}
}
static void print_key_type(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
const char *str;
switch (*ptr) {
case NL80211_KEYTYPE_GROUP:
str = "Group";
break;
case NL80211_KEYTYPE_PAIRWISE:
str = "Pairwise";
break;
case NL80211_KEYTYPE_PEERKEY:
str = "Peerkey";
break;
default:
str = "Unknown";
}
print_attr(level, "%s: %s", label, str);
}
static void print_key_mode(unsigned int level, const char *label,
const void *data, uint16_t size)
{
const uint8_t *ptr = data;
const char *str;
switch (*ptr) {
case NL80211_KEY_RX_TX:
str = "RX/TX";
break;
case NL80211_KEY_NO_TX:
str = "RX Only";
break;
case NL80211_KEY_SET_TX:
str = "Set TX";
break;
default:
str = "Unknown";
}
print_attr(level, "%s: %s", label, str);
}
static const struct attr_entry default_key_type_table[] = {
{ NL80211_KEY_DEFAULT_TYPE_UNICAST, "Unicast", ATTR_FLAG },
{ NL80211_KEY_DEFAULT_TYPE_MULTICAST, "Multicast", ATTR_FLAG },
{ }
};
static const struct attr_entry key_table[] = {
{ NL80211_KEY_DATA, "Key Data", ATTR_BINARY },
{ NL80211_KEY_IDX, "Key Index", ATTR_U8 },
{ NL80211_KEY_CIPHER, "Key Cipher", ATTR_CUSTOM,
{ .function = print_cipher_suite } },
{ NL80211_KEY_SEQ, "Key Sequence", ATTR_BINARY },
{ NL80211_KEY_DEFAULT, "Default", ATTR_FLAG },
{ NL80211_KEY_DEFAULT_MGMT, "Default Management", ATTR_FLAG },
{ NL80211_KEY_TYPE, "Key Type", ATTR_CUSTOM,
{ .function = print_key_type} },
{ NL80211_KEY_DEFAULT_TYPES, "Default Key Types", ATTR_NESTED,
{ default_key_type_table } },
{ NL80211_KEY_MODE, "Key Mode", ATTR_CUSTOM,
{ .function = print_key_mode } },
{ NL80211_KEY_DEFAULT_BEACON, "Default Beacon", ATTR_FLAG },
{ }
};
static const struct attr_entry attr_table[] = {
{ NL80211_ATTR_WIPHY,
"Wiphy", ATTR_U32 },
{ NL80211_ATTR_WIPHY_NAME,
"Wiphy Name", ATTR_STRING },
{ NL80211_ATTR_IFINDEX,
"Interface Index", ATTR_U32 },
{ NL80211_ATTR_IFNAME,
"Interface Name", ATTR_STRING },
{ NL80211_ATTR_IFTYPE,
"Interface Type", ATTR_U32 },
{ NL80211_ATTR_MAC,
"MAC Address", ATTR_ADDRESS },
{ NL80211_ATTR_KEY_DATA,
"Key Data", ATTR_BINARY },
{ NL80211_ATTR_KEY_IDX,
"Key Index", ATTR_U8 },
{ NL80211_ATTR_KEY_CIPHER,
"Key Cipher", ATTR_CUSTOM,
{ .function = print_cipher_suite } },
{ NL80211_ATTR_KEY_SEQ,
"Key Sequence", ATTR_BINARY },
{ NL80211_ATTR_KEY_DEFAULT,
"Key Default", ATTR_FLAG },
{ NL80211_ATTR_BEACON_INTERVAL,
"Beacon Interval", ATTR_U32 },
{ NL80211_ATTR_DTIM_PERIOD,
"DTIM Period", ATTR_U32 },
{ NL80211_ATTR_BEACON_HEAD,
"Beacon Head", ATTR_BINARY },
{ NL80211_ATTR_BEACON_TAIL,
"Beacon Tail", ATTR_BINARY },
{ NL80211_ATTR_STA_AID,
"Station AID", ATTR_U16 },
{ NL80211_ATTR_STA_FLAGS,
"Station Flags", ATTR_NESTED, { sta_flag_table } },
{ NL80211_ATTR_STA_LISTEN_INTERVAL,
"Station Listen Interval", ATTR_U16 },
{ NL80211_ATTR_STA_SUPPORTED_RATES,
"Station Supported Rates", ATTR_BINARY },
{ NL80211_ATTR_STA_VLAN,
"Station VLAN", ATTR_U32 },
{ NL80211_ATTR_STA_INFO,
"Station Info", ATTR_NESTED, { sta_info_table } },
{ NL80211_ATTR_WIPHY_BANDS,
2015-10-06 21:33:18 +02:00
"Wiphy Bands", ATTR_CUSTOM,
{ .function = print_wiphy_bands } },
{ NL80211_ATTR_MNTR_FLAGS,
"MNTR Flags" },
{ NL80211_ATTR_MESH_ID,
"Mesh ID", ATTR_BINARY },
{ NL80211_ATTR_STA_PLINK_ACTION,
"Station P-Link Action", ATTR_U8 },
{ NL80211_ATTR_MPATH_NEXT_HOP,
"Mesh Path Next Hop", ATTR_U32 },
{ NL80211_ATTR_MPATH_INFO,
"Mesh Path Info" },
{ NL80211_ATTR_BSS_CTS_PROT,
"BSS CTS Protection", ATTR_U8 },
{ NL80211_ATTR_BSS_SHORT_PREAMBLE,
"BSS Short Preamble", ATTR_U8 },
{ NL80211_ATTR_BSS_SHORT_SLOT_TIME,
"BSS Short Slot Time", ATTR_U8 },
{ NL80211_ATTR_HT_CAPABILITY, "HT Capability",
ATTR_CUSTOM, { .function = print_ie_ht_capabilities } },
{ NL80211_ATTR_SUPPORTED_IFTYPES,
"Supported Interface Types", ATTR_NESTED,
{ iftype_table } },
{ NL80211_ATTR_REG_ALPHA2,
"Regulatory Alpha2", ATTR_STRING },
{ NL80211_ATTR_REG_RULES,
"Regulatory Rules" },
{ NL80211_ATTR_MESH_CONFIG,
"Mesh Configuration" },
{ NL80211_ATTR_BSS_BASIC_RATES,
"BSS Basic Rates", ATTR_BINARY },
{ NL80211_ATTR_WIPHY_TXQ_PARAMS,
"Wiphy TXQ Parameters" },
{ NL80211_ATTR_WIPHY_FREQ,
"Wiphy Frequency", ATTR_U32 },
{ NL80211_ATTR_WIPHY_CHANNEL_TYPE,
"Wiphy Channel Type", ATTR_U32 },
{ NL80211_ATTR_KEY_DEFAULT_MGMT,
"Key Default Management", ATTR_FLAG },
{ NL80211_ATTR_MGMT_SUBTYPE,
"Management Subtype", ATTR_U8 },
{ NL80211_ATTR_IE,
"Information Elements", ATTR_CUSTOM,
{ .function = print_management_ies } },
{ NL80211_ATTR_MAX_NUM_SCAN_SSIDS,
"Max Number Scan SSIDs", ATTR_U8 },
{ NL80211_ATTR_SCAN_FREQUENCIES,
"Scan Frequencies", ATTR_ARRAY,
{ .array_type = ATTR_U32 } },
{ NL80211_ATTR_SCAN_SSIDS,
"Scan SSIDs", ATTR_ARRAY,
{ .array_type = ATTR_BINARY } },
{ NL80211_ATTR_GENERATION,
"Generation", ATTR_U32 },
{ NL80211_ATTR_BSS,
"BSS", ATTR_NESTED, { bss_table } },
{ NL80211_ATTR_REG_INITIATOR,
"Regulatory Initiator" },
{ NL80211_ATTR_REG_TYPE,
"Regulatory Type" },
{ NL80211_ATTR_SUPPORTED_COMMANDS,
"Supported Commands", ATTR_CUSTOM,
{ .function = print_supported_commands } },
{ NL80211_ATTR_FRAME,
"Frame", ATTR_CUSTOM, { .function = print_frame } },
{ NL80211_ATTR_SSID,
"SSID", ATTR_BINARY },
{ NL80211_ATTR_AUTH_TYPE,
"Auth Type", ATTR_U32 },
{ NL80211_ATTR_REASON_CODE,
"Reason Code", ATTR_CUSTOM,
{ .function = print_reason_code } },
{ NL80211_ATTR_KEY_TYPE,
"Key Type", ATTR_U32 },
{ NL80211_ATTR_MAX_SCAN_IE_LEN,
"Max Scan IE Length", ATTR_U16 },
{ NL80211_ATTR_CIPHER_SUITES,
"Cipher Suites", ATTR_CUSTOM,
{ .function = print_cipher_suites } },
{ NL80211_ATTR_FREQ_BEFORE,
"Frequency Before" },
{ NL80211_ATTR_FREQ_AFTER,
"Frequency After" },
{ NL80211_ATTR_FREQ_FIXED,
"Frequency Fixed", ATTR_FLAG },
{ NL80211_ATTR_WIPHY_RETRY_SHORT,
"Wiphy Retry Short", ATTR_U8 },
{ NL80211_ATTR_WIPHY_RETRY_LONG,
"Wiphy Retry Long", ATTR_U8 },
{ NL80211_ATTR_WIPHY_FRAG_THRESHOLD,
"Wiphy Frag Threshold", ATTR_U32 },
{ NL80211_ATTR_WIPHY_RTS_THRESHOLD,
"Wiphy RTS Threshold", ATTR_U32 },
{ NL80211_ATTR_TIMED_OUT,
"Timed Out", ATTR_FLAG },
{ NL80211_ATTR_USE_MFP,
"Use MFP", ATTR_U32 },
{ NL80211_ATTR_STA_FLAGS2,
"Station Flags 2", ATTR_CUSTOM,
{ .function = print_sta_flag_update } },
{ NL80211_ATTR_CONTROL_PORT,
"Control Port", ATTR_FLAG },
{ NL80211_ATTR_TESTDATA,
"Test Data" },
{ NL80211_ATTR_PRIVACY,
"Privacy", ATTR_FLAG },
{ NL80211_ATTR_DISCONNECTED_BY_AP,
"Disconnect by AP", ATTR_FLAG },
{ NL80211_ATTR_STATUS_CODE,
"Status Code", ATTR_U16 },
{ NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
"Cipher Suites Pairwise", ATTR_CUSTOM,
{ .function = print_cipher_suites } },
{ NL80211_ATTR_CIPHER_SUITE_GROUP,
"Cipher Suite Group", ATTR_CUSTOM,
{ .function = print_cipher_suite } },
{ NL80211_ATTR_WPA_VERSIONS,
"WPA Versions", ATTR_U32 },
{ NL80211_ATTR_AKM_SUITES,
2015-04-17 19:10:19 +02:00
"AKM Suites", ATTR_CUSTOM,
{ .function = print_akm_suites } },
{ NL80211_ATTR_REQ_IE,
"Request IE", ATTR_CUSTOM,
{ .function = print_management_ies } },
{ NL80211_ATTR_RESP_IE,
"Response IE", ATTR_CUSTOM,
{.function = print_management_ies } },
{ NL80211_ATTR_PREV_BSSID,
"Previous BSSID", ATTR_ADDRESS },
{ NL80211_ATTR_KEY,
"Key", ATTR_NESTED, { key_table } },
{ NL80211_ATTR_KEYS,
"Keys" },
{ NL80211_ATTR_PID,
"PID", ATTR_U32 },
{ NL80211_ATTR_4ADDR,
"4-Address", ATTR_U8 },
{ NL80211_ATTR_SURVEY_INFO,
"Survey Info", ATTR_NESTED, { survey_info_table } },
{ NL80211_ATTR_PMKID,
"PMKID", ATTR_BINARY },
{ NL80211_ATTR_MAX_NUM_PMKIDS,
"Max Number PMKIDs", ATTR_U8 },
{ NL80211_ATTR_DURATION,
"Duration", ATTR_U32 },
{ NL80211_ATTR_COOKIE,
"Cookie", ATTR_U64 },
{ NL80211_ATTR_WIPHY_COVERAGE_CLASS,
"Wiphy Coverage Class", ATTR_U8 },
{ NL80211_ATTR_TX_RATES,
"TX Rates" },
{ NL80211_ATTR_FRAME_MATCH,
"Frame Match", ATTR_BINARY },
{ NL80211_ATTR_ACK,
"ACK", ATTR_FLAG },
{ NL80211_ATTR_PS_STATE,
"PS State", ATTR_U32 },
{ NL80211_ATTR_CQM,
"CQM", ATTR_NESTED, { cqm_table } },
{ NL80211_ATTR_LOCAL_STATE_CHANGE,
"Local State Change", ATTR_FLAG },
{ NL80211_ATTR_AP_ISOLATE,
"AP Isolate", ATTR_U8 },
{ NL80211_ATTR_WIPHY_TX_POWER_SETTING,
"Wiphy TX Power Setting", ATTR_U32 },
{ NL80211_ATTR_WIPHY_TX_POWER_LEVEL,
"Wiphy TX Power Level", ATTR_U32 },
{ NL80211_ATTR_TX_FRAME_TYPES,
"TX Frame Types", ATTR_NESTED,
{ frame_types_table } },
{ NL80211_ATTR_RX_FRAME_TYPES,
"RX Frame Types", ATTR_NESTED,
{ frame_types_table } },
{ NL80211_ATTR_FRAME_TYPE,
"Frame Type", ATTR_CUSTOM,
{ .function = print_frame_type } },
{ NL80211_ATTR_SUPPORT_IBSS_RSN,
"Support IBSS RSN", ATTR_FLAG },
{ NL80211_ATTR_WIPHY_ANTENNA_TX,
"Wiphy Antenna TX", ATTR_U32 },
{ NL80211_ATTR_WIPHY_ANTENNA_RX,
"Wiphy Antenna RX", ATTR_U32 },
{ NL80211_ATTR_MCAST_RATE,
"Multicast Rate", ATTR_U32 },
{ NL80211_ATTR_OFFCHANNEL_TX_OK,
"Offchannel TX OK", ATTR_FLAG },
{ NL80211_ATTR_BSS_HT_OPMODE,
"BSS HT Operation Mode", ATTR_U16 },
{ NL80211_ATTR_KEY_DEFAULT_TYPES,
"Key Default Types", ATTR_NESTED,
{ key_default_type_table } },
{ NL80211_ATTR_MAX_REMAIN_ON_CHANNEL_DURATION,
"Max Remain on Channel Duration ", ATTR_U32 },
{ NL80211_ATTR_MESH_SETUP,
"Mesh Setup" },
{ NL80211_ATTR_WIPHY_ANTENNA_AVAIL_TX,
"Wiphy Antenna Avail TX" },
{ NL80211_ATTR_WIPHY_ANTENNA_AVAIL_RX,
"Wiphy Antenna Avail RX" },
{ NL80211_ATTR_SUPPORT_MESH_AUTH,
"Support Mesh Auth", ATTR_FLAG },
{ NL80211_ATTR_STA_PLINK_STATE,
"Station P-Link State" },
{ NL80211_ATTR_WOWLAN_TRIGGERS,
"WoWLAN Triggers" },
{ NL80211_ATTR_WOWLAN_TRIGGERS_SUPPORTED,
"WoWLAN Triggers Supported" },
{ NL80211_ATTR_SCHED_SCAN_INTERVAL,
"Scheduled Scan Interval", ATTR_U32 },
{ NL80211_ATTR_INTERFACE_COMBINATIONS,
"Interface Combinations" },
{ NL80211_ATTR_SOFTWARE_IFTYPES,
"Software Interface Types", ATTR_NESTED,
{ iftype_table } },
{ NL80211_ATTR_REKEY_DATA,
"Rekey Data", ATTR_NESTED, { rekey_table } },
{ NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS,
"Max Num Sched Scan SSIDs", ATTR_U8 },
{ NL80211_ATTR_MAX_SCHED_SCAN_IE_LEN,
"Max Sched Scan IE Len", ATTR_U16 },
{ NL80211_ATTR_SCAN_SUPP_RATES,
"Scan Supported Rates" },
{ NL80211_ATTR_HIDDEN_SSID,
"Hidden SSID", ATTR_U32 },
{ NL80211_ATTR_IE_PROBE_RESP,
"IE Probe Response", ATTR_CUSTOM,
{ .function = print_management_ies } },
{ NL80211_ATTR_IE_ASSOC_RESP,
"IE Assoc Response", ATTR_CUSTOM,
{ .function = print_management_ies } },
{ NL80211_ATTR_STA_WME,
"Station WME" },
{ NL80211_ATTR_SUPPORT_AP_UAPSD,
"Support AP UAPSD", ATTR_FLAG },
{ NL80211_ATTR_ROAM_SUPPORT,
"Roaming Support", ATTR_FLAG },
{ NL80211_ATTR_SCHED_SCAN_MATCH,
"Scheduled Scan Match" },
{ NL80211_ATTR_MAX_MATCH_SETS,
"Max Match Sets", ATTR_U8 },
{ NL80211_ATTR_PMKSA_CANDIDATE,
"PMKSA Candidate" },
{ NL80211_ATTR_TX_NO_CCK_RATE,
"TX No CCK Rate", ATTR_FLAG },
{ NL80211_ATTR_TDLS_ACTION,
"TDLS Action", ATTR_U8 },
{ NL80211_ATTR_TDLS_DIALOG_TOKEN,
"TDLS Dialog Token", ATTR_U8 },
{ NL80211_ATTR_TDLS_OPERATION,
"TDLS Operation", ATTR_U8 },
{ NL80211_ATTR_TDLS_SUPPORT,
"TDLS Support", ATTR_FLAG },
{ NL80211_ATTR_TDLS_EXTERNAL_SETUP,
"TDLS External Setup", ATTR_FLAG },
{ NL80211_ATTR_DEVICE_AP_SME,
"Device AP SME" },
{ NL80211_ATTR_DONT_WAIT_FOR_ACK,
"Don't Wait for Ack", ATTR_FLAG },
{ NL80211_ATTR_FEATURE_FLAGS,
"Feature Flags" },
{ NL80211_ATTR_PROBE_RESP_OFFLOAD,
"Probe Response Offload" },
{ NL80211_ATTR_PROBE_RESP,
"Probe Response" },
{ NL80211_ATTR_DFS_REGION,
"DFS Region", ATTR_U8 },
{ NL80211_ATTR_DISABLE_HT,
"Disable HT", ATTR_FLAG },
{ NL80211_ATTR_HT_CAPABILITY_MASK,
"HT Capability Mask" },
{ NL80211_ATTR_NOACK_MAP,
"No-Ack Map", ATTR_U16 },
{ NL80211_ATTR_INACTIVITY_TIMEOUT,
"Inactivity Timeout", ATTR_U16 },
{ NL80211_ATTR_RX_SIGNAL_DBM,
2016-09-06 23:43:30 +02:00
"RX Signal dBm", ATTR_S32 },
{ NL80211_ATTR_BG_SCAN_PERIOD,
"Background Scan Period", ATTR_U16 },
{ NL80211_ATTR_WDEV,
"Wireless Device", ATTR_U64 },
{ NL80211_ATTR_USER_REG_HINT_TYPE,
"User Regulatroy Hint Type", ATTR_U32 },
{ NL80211_ATTR_CONN_FAILED_REASON,
"Connection Failed Reason" },
{ NL80211_ATTR_AUTH_DATA,
"Auth Data" },
{ NL80211_ATTR_VHT_CAPABILITY,
"VHT Capability" },
{ NL80211_ATTR_SCAN_FLAGS, "Scan Flags", ATTR_CUSTOM,
{ .function = print_scan_flags } },
{ NL80211_ATTR_CHANNEL_WIDTH,
"Channel Width", ATTR_U32 },
{ NL80211_ATTR_CENTER_FREQ1,
"Center Frequency 1", ATTR_U32 },
{ NL80211_ATTR_CENTER_FREQ2,
"Center Frequency 2", ATTR_U32 },
{ NL80211_ATTR_P2P_CTWINDOW,
"P2P CT Window", ATTR_U8 },
{ NL80211_ATTR_P2P_OPPPS,
"P2P OP PPS", ATTR_U8 },
{ NL80211_ATTR_LOCAL_MESH_POWER_MODE,
"Local Mesh Power Mode" },
{ NL80211_ATTR_ACL_POLICY,
"ACL Policy", ATTR_U32 },
{ NL80211_ATTR_MAC_ADDRS,
2019-06-21 19:22:08 +02:00
"MAC Addresses", ATTR_ARRAY,
{ .array_type = ATTR_ADDRESS } },
{ NL80211_ATTR_MAC_ACL_MAX,
"MAC ACL Max" },
{ NL80211_ATTR_RADAR_EVENT,
"Radar Event" },
{ NL80211_ATTR_EXT_CAPA,
"Extended Capabilities", ATTR_CUSTOM,
{ .function = print_ie_extended_capabilities } },
{ NL80211_ATTR_EXT_CAPA_MASK,
"Extended Capabilities Mask" },
{ NL80211_ATTR_STA_CAPABILITY,
"Station Capability", ATTR_U16 },
{ NL80211_ATTR_STA_EXT_CAPABILITY,
"Station Extended Capability" },
{ NL80211_ATTR_PROTOCOL_FEATURES,
"Protocol Features", ATTR_U32 },
{ NL80211_ATTR_SPLIT_WIPHY_DUMP,
"Split Wiphy Dump", ATTR_FLAG},
{ NL80211_ATTR_DISABLE_VHT,
"Disable VHT" },
{ NL80211_ATTR_VHT_CAPABILITY_MASK,
"VHT Capability Mask" },
{ NL80211_ATTR_MDID,
"MDID", ATTR_U16 },
{ NL80211_ATTR_IE_RIC,
"IE RIC", ATTR_BINARY },
{ NL80211_ATTR_CRIT_PROT_ID,
"Critical Protocol ID" },
{ NL80211_ATTR_MAX_CRIT_PROT_DURATION,
"Max Critical Protocol Duration" },
{ NL80211_ATTR_PEER_AID,
"Peer AID", ATTR_U16 },
{ NL80211_ATTR_COALESCE_RULE,
"Coalesce Rule" },
{ NL80211_ATTR_CH_SWITCH_COUNT,
"Channel Switch Count", ATTR_U32 },
{ NL80211_ATTR_CH_SWITCH_BLOCK_TX,
"Channel Switch Block TX", ATTR_FLAG },
{ NL80211_ATTR_CSA_IES,
"CSA IEs" },
{ NL80211_ATTR_CSA_C_OFF_BEACON,
"CSA C Off Beacon" },
{ NL80211_ATTR_CSA_C_OFF_PRESP,
"CSA C Off Response" },
{ NL80211_ATTR_RXMGMT_FLAGS,
"RX Management Flags", ATTR_U32 },
{ NL80211_ATTR_STA_SUPPORTED_CHANNELS,
"Station Supported Channels" },
{ NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
"Station Supported Operation Classes" },
{ NL80211_ATTR_HANDLE_DFS,
"Handle DFS", ATTR_FLAG },
{ NL80211_ATTR_SUPPORT_5_MHZ,
"Support 5 MHz" },
{ NL80211_ATTR_SUPPORT_10_MHZ,
"Support 10 MHz" },
{ NL80211_ATTR_OPMODE_NOTIF,
"Operation Mode Notification", ATTR_U8 },
{ NL80211_ATTR_VENDOR_ID,
"Vendor ID", ATTR_U32 },
{ NL80211_ATTR_VENDOR_SUBCMD,
"Vendor Subcommand", ATTR_U32 },
{ NL80211_ATTR_VENDOR_DATA,
"Vendor Data", ATTR_BINARY },
{ NL80211_ATTR_VENDOR_EVENTS,
"Vendor Events" },
{ NL80211_ATTR_QOS_MAP,
"QoS Map", ATTR_BINARY },
{ NL80211_ATTR_MAC_HINT,
"MAC Hint", ATTR_ADDRESS },
{ NL80211_ATTR_WIPHY_FREQ_HINT,
"Wiphy Frequency Hint", ATTR_U32 },
{ NL80211_ATTR_MAX_AP_ASSOC_STA,
"Max AP Assoc Station" },
{ NL80211_ATTR_TDLS_PEER_CAPABILITY,
"TDLS Peer Capability", ATTR_U32 },
{ NL80211_ATTR_SOCKET_OWNER,
"Socket Owns Interface/Connection", ATTR_FLAG },
{ NL80211_ATTR_CSA_C_OFFSETS_TX,
"CSA C Offsets TX" },
{ NL80211_ATTR_MAX_CSA_COUNTERS,
"Max CSA Counters" },
2019-07-10 17:47:19 +02:00
{ NL80211_ATTR_TDLS_INITIATOR,
"TDLS Initiator" },
{ NL80211_ATTR_USE_RRM,
"Use RRM", ATTR_FLAG },
{ NL80211_ATTR_EXT_FEATURES,
"Extended Features", ATTR_CUSTOM,
{ .function = print_ext_features} },
{ NL80211_ATTR_FILS_KEK,
"FILS KEK" },
{ NL80211_ATTR_FILS_NONCES,
"FILS Nonces" },
2019-07-10 17:47:19 +02:00
{ NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED,
"Multicast to Unicast Enabled", ATTR_FLAG },
{ NL80211_ATTR_BSSID,
"BSSID", ATTR_ADDRESS },
{ NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI,
"Scheduled Scan Relative RSSI" },
{ NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST,
"Scheduled Scan RSSI Adjust" },
{ NL80211_ATTR_TIMEOUT_REASON,
"Timeout Reason" },
{ NL80211_ATTR_FILS_ERP_USERNAME,
"FILS ERP Username" },
{ NL80211_ATTR_FILS_ERP_REALM,
"FILS ERP Realm" },
{ NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM,
"FILS ERP Next Sequence Number" },
{ NL80211_ATTR_FILS_ERP_RRK,
"FILS ERP RRK" },
{ NL80211_ATTR_FILS_CACHE_ID,
"FILS Cache ID" },
{ NL80211_ATTR_PMK,
"PMK" },
{ NL80211_ATTR_SCHED_SCAN_MULTI,
"Scheduled Scan Multi" },
{ NL80211_ATTR_SCHED_SCAN_MAX_REQS,
"Scheduled Scan Maximum Requests" },
{ NL80211_ATTR_WANT_1X_4WAY_HS,
"Want 1X 4Way Handshake" },
{ NL80211_ATTR_PMKR0_NAME,
"PMKR0 Name" },
{ NL80211_ATTR_PORT_AUTHORIZED,
"Port Authorized" },
{ NL80211_ATTR_EXTERNAL_AUTH_ACTION,
"External Auth Action" },
{ NL80211_ATTR_EXTERNAL_AUTH_SUPPORT,
"External Auth Support" },
{ NL80211_ATTR_NSS,
"NSS" },
{ NL80211_ATTR_ACK_SIGNAL,
"Ack Signal" },
{ NL80211_ATTR_CONTROL_PORT_OVER_NL80211,
"Control Port over NL80211", ATTR_FLAG },
{ NL80211_ATTR_TXQ_STATS,
"TXQ Stats" },
{ NL80211_ATTR_TXQ_LIMIT,
"TXQ Limit" },
{ NL80211_ATTR_TXQ_MEMORY_LIMIT,
"TXQ Memory Limit" },
{ NL80211_ATTR_TXQ_QUANTUM,
"TXQ Quantum" },
{ NL80211_ATTR_HE_CAPABILITY,
"HE Capability" },
{ NL80211_ATTR_FTM_RESPONDER,
"FTM Responder" },
{ NL80211_ATTR_FTM_RESPONDER_STATS,
"FTM Responder Stats" },
{ NL80211_ATTR_SCAN_START_TIME_TSF,
"Scan Start Time", ATTR_U64 },
{ NL80211_ATTR_SCAN_START_TIME_TSF_BSSID,
"Scan Start Time BSSID", ATTR_ADDRESS },
{ NL80211_ATTR_MEASUREMENT_DURATION,
"Scan Duration", ATTR_U16 },
{ NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY,
"Scan Duration Mandatory", ATTR_FLAG },
{ }
};
static void print_value(int indent, const char *label, enum attr_type type,
const void *buf, uint32_t len)
{
uint16_t val_u16;
uint32_t val_u32;
switch (type) {
case ATTR_U16:
val_u16 = *((uint16_t *) buf);
print_attr(indent, "%s: %u (0x%04x)", label, val_u16, val_u16);
if (len != 2)
printf("malformed packet\n");
break;
case ATTR_U32:
val_u32 = *((uint32_t *) buf);
print_attr(indent, "%s: %u (0x%08x)", label, val_u32, val_u32);
if (len != 4)
printf("malformed packet\n");
break;
case ATTR_ADDRESS:
print_address(indent, label, buf);
break;
case ATTR_UNSPEC:
case ATTR_FLAG:
case ATTR_U8:
case ATTR_U64:
case ATTR_S8:
case ATTR_S32:
case ATTR_S64:
case ATTR_STRING:
case ATTR_BINARY:
case ATTR_NESTED:
case ATTR_ARRAY:
case ATTR_FLAG_OR_U16:
case ATTR_CUSTOM:
print_attr(indent, "%s: len %u", label, len);
print_hexdump(indent + 1, buf, len);
break;
}
}
static void print_array(int indent, enum attr_type type,
const void *buf, uint32_t len)
{
const struct nlattr *nla;
for (nla = buf ; NLA_OK(nla, len); nla = NLA_NEXT(nla, len)) {
uint16_t nla_type = nla->nla_type & NLA_TYPE_MASK;
char str[8];
snprintf(str, sizeof(str), "%u", nla_type);
print_value(indent, str, type,
NLA_DATA(nla), NLA_PAYLOAD(nla));
}
}
static void print_attributes(int indent, const struct attr_entry *table,
const void *buf, uint32_t len)
{
const struct nlattr *nla;
const char *str;
int i;
for (nla = buf ; NLA_OK(nla, len); nla = NLA_NEXT(nla, len)) {
uint16_t nla_type = nla->nla_type & NLA_TYPE_MASK;
enum attr_type type;
enum attr_type array_type;
const struct attr_entry *nested;
attr_func_t function;
uint64_t val64;
uint32_t val32;
uint16_t val16;
uint8_t val8;
int8_t val_s8;
int32_t val_s32;
int64_t val_s64;
uint8_t *ptr;
str = "Reserved";
type = ATTR_UNSPEC;
array_type = ATTR_UNSPEC;
nested = NULL;
if (table) {
for (i = 0; table[i].str; i++) {
if (nla_type == table[i].attr) {
str = table[i].str;
type = table[i].type;
nested = table[i].nested;
array_type = table[i].array_type;
function = table[i].function;
break;
}
}
}
switch (type) {
case ATTR_UNSPEC:
print_attr(indent, "%s: len %u", str,
NLA_PAYLOAD(nla));
print_hexdump(indent + 1,
NLA_DATA(nla), NLA_PAYLOAD(nla));
break;
case ATTR_FLAG:
print_attr(indent, "%s: true", str);
if (NLA_PAYLOAD(nla) != 0)
printf("malformed packet\n");
break;
case ATTR_U8:
val8 = *((uint8_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRIu8" (0x%02"PRIx8")",
str, val8, val8);
if (NLA_PAYLOAD(nla) != 1)
printf("malformed packet\n");
break;
case ATTR_U16:
val16 = *((uint16_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRIu16" (0x%04"PRIx16")",
str, val16, val16);
if (NLA_PAYLOAD(nla) != 2)
printf("malformed packet\n");
break;
case ATTR_U32:
val32 = *((uint32_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRIu32" (0x%08"PRIx32")",
str, val32, val32);
if (NLA_PAYLOAD(nla) != 4)
printf("malformed packet\n");
break;
case ATTR_U64:
val64 = *((uint64_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRIu64" (0x%016"PRIx64")",
str, val64, val64);
if (NLA_PAYLOAD(nla) != 8)
printf("malformed packet\n");
break;
case ATTR_S8:
val_s8 = *((int8_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRId8, str, val_s8);
if (NLA_PAYLOAD(nla) != 1)
printf("malformed packet\n");
break;
case ATTR_S32:
val_s32 = *((int32_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRId32, str, val_s32);
if (NLA_PAYLOAD(nla) != 4)
printf("malformed packet\n");
break;
case ATTR_S64:
val_s64 = *((int64_t *) NLA_DATA(nla));
print_attr(indent, "%s: %"PRId64, str, val_s64);
if (NLA_PAYLOAD(nla) != 4)
printf("malformed packet\n");
break;
case ATTR_STRING:
print_attr(indent, "%s: %s", str,
(char *) NLA_DATA(nla));
break;
case ATTR_ADDRESS:
ptr = NLA_DATA(nla);
print_address(indent, str, ptr);
if (NLA_PAYLOAD(nla) != 6)
printf("malformed packet\n");
break;
case ATTR_BINARY:
print_attr(indent, "%s: len %u", str,
NLA_PAYLOAD(nla));
print_hexdump(indent + 1,
NLA_DATA(nla), NLA_PAYLOAD(nla));
break;
case ATTR_NESTED:
print_attr(indent, "%s: len %u", str,
NLA_PAYLOAD(nla));
if (!nested)
printf("missing table\n");
print_attributes(indent + 1, nested,
NLA_DATA(nla), NLA_PAYLOAD(nla));
break;
case ATTR_ARRAY:
print_attr(indent, "%s: len %u", str,
NLA_PAYLOAD(nla));
if (array_type == ATTR_UNSPEC)
printf("missing type\n");
print_array(indent + 1, array_type,
NLA_DATA(nla), NLA_PAYLOAD(nla));
break;
case ATTR_FLAG_OR_U16:
if (NLA_PAYLOAD(nla) == 0)
print_attr(indent, "%s: true", str);
else if (NLA_PAYLOAD(nla) == 2) {
val16 = *((uint16_t *) NLA_DATA(nla));
print_attr(indent,
"%s: %"PRIu16" (0x%04"PRIx16")",
str, val16, val16);
} else
printf("malformed packet\n");
break;
case ATTR_CUSTOM:
if (function)
function(indent, str, NLA_DATA(nla),
NLA_PAYLOAD(nla));
else
printf("missing function\n");
break;
}
}
}
static void netlink_str(char *str, size_t size,
uint16_t type, uint16_t flags, uint32_t len)
{
int pos;
bool get_req = false, new_req = false;
pos = sprintf(str, "(0x%02x) len %u", type, len);
switch (type) {
case RTM_GETLINK:
case RTM_GETADDR:
case RTM_GETROUTE:
get_req = true;
break;
case RTM_NEWLINK:
case RTM_NEWADDR:
case RTM_NEWROUTE:
new_req = true;
break;
}
if (flags) {
pos += sprintf(str + pos, " [");
if (flags & NLM_F_REQUEST) {
flags &= ~NLM_F_REQUEST;
pos += sprintf(str + pos, "request%c",
flags ? ',' : ']');
}
if (flags & NLM_F_MULTI) {
flags &= ~NLM_F_MULTI;
pos += sprintf(str + pos, "multi%c", flags ? ',' : ']');
}
if (flags & NLM_F_ACK) {
flags &= ~NLM_F_ACK;
pos += sprintf(str + pos, "ack%c", flags ? ',' : ']');
}
if (flags & NLM_F_ECHO) {
flags &= ~NLM_F_ECHO;
pos += sprintf(str + pos, "echo%c", flags ? ',' : ']');
}
if (get_req && (flags & NLM_F_DUMP) == NLM_F_DUMP) {
flags &= ~NLM_F_DUMP;
pos += sprintf(str + pos, "dump%c", flags ? ',' : ']');
}
if (get_req && flags & NLM_F_ROOT) {
flags &= ~NLM_F_ROOT;
pos += sprintf(str + pos, "root%c", flags ? ',' : ']');
}
if (get_req && flags & NLM_F_MATCH) {
flags &= ~NLM_F_MATCH;
pos += sprintf(str + pos, "match%c", flags ? ',' : ']');
}
if (get_req && flags & NLM_F_ATOMIC) {
flags &= ~NLM_F_ATOMIC;
pos += sprintf(str + pos, "atomic%c",
flags ? ',' : ']');
}
if (new_req && flags & NLM_F_REPLACE) {
flags &= ~NLM_F_REPLACE;
pos += sprintf(str + pos, "replace%c",
flags ? ',' : ']');
}
if (new_req && flags & NLM_F_EXCL) {
flags &= ~NLM_F_EXCL;
pos += sprintf(str + pos, "excl%c", flags ? ',' : ']');
}
if (new_req && flags & NLM_F_CREATE) {
flags &= ~NLM_F_CREATE;
pos += sprintf(str + pos, "create%c",
flags ? ',' : ']');
}
if (new_req && flags & NLM_F_APPEND) {
flags &= ~NLM_F_APPEND;
pos += sprintf(str + pos, "append%c",
flags ? ',' : ']');
}
if (flags)
pos += sprintf(str + pos, "0x%x]", flags);
}
}
static void print_message(struct nlmon *nlmon, const struct timeval *tv,
enum msg_type type,
uint16_t flags, int status,
uint8_t cmd, uint8_t version,
const void *data, uint32_t len)
{
char extra_str[64];
const char *label = "";
const char *color = COLOR_OFF;
const char *cmd_str;
bool out = false;
if (nlmon->nowiphy && (cmd == NL80211_CMD_NEW_WIPHY))
return;
if (nlmon->noscan && ((cmd == NL80211_CMD_NEW_SCAN_RESULTS) ||
(cmd == NL80211_CMD_TRIGGER_SCAN)))
return;
switch (type) {
case MSG_REQUEST:
label = "Request";
color = COLOR_REQUEST;
out = true;
break;
case MSG_RESPONSE:
label = "Response";
color = COLOR_RESPONSE;
break;
case MSG_COMPLETE:
label = "Complete";
color = COLOR_COMPLETE;
break;
case MSG_RESULT:
label = "Result";
color = COLOR_RESULT;
break;
case MSG_EVENT:
label = "Event";
color = COLOR_EVENT;
break;
}
2019-07-15 20:51:28 +02:00
cmd_str = nl80211cmd_to_string(cmd);
netlink_str(extra_str, sizeof(extra_str), cmd, flags, len);
print_packet(tv, out ? '<' : '>', color, label, cmd_str, extra_str);
switch (type) {
case MSG_REQUEST:
case MSG_RESULT:
case MSG_EVENT:
cur_nlmon = nlmon;
switch (cmd) {
case NL80211_CMD_CONTROL_PORT_FRAME:
print_attributes(0, control_port_attr_table, data, len);
break;
default:
print_attributes(0, attr_table, data, len);
}
cur_nlmon = NULL;
break;
case MSG_RESPONSE:
print_field("Status: %s (%d)", strerror(status), status);
break;
case MSG_COMPLETE:
if (status < 0)
print_field("Status: %s (%d)",
strerror(-status), -status);
else
print_field("Status: %d", status);
break;
}
}
struct nlmon_req_match {
uint32_t seq;
uint32_t pid;
};
static bool nlmon_req_match(const void *a, const void *b)
{
const struct nlmon_req *req = a;
const struct nlmon_req_match *match = b;
return (req->seq == match->seq && req->pid == match->pid);
}
static void store_packet(struct nlmon *nlmon, const struct timeval *tv,
uint16_t pkt_type,
uint16_t arphrd_type,
uint16_t proto_type,
const void *data, uint32_t size)
{
uint8_t sll_hdr[16], *buf = sll_hdr;
if (!nlmon->pcap)
return;
memset(sll_hdr, 0, sizeof(sll_hdr));
l_put_be16(pkt_type, buf);
l_put_be16(arphrd_type, buf + 2);
l_put_be16(proto_type, buf + 14);
pcap_write(nlmon->pcap, tv, &sll_hdr, sizeof(sll_hdr), data, size);
}
static void store_netlink(struct nlmon *nlmon, const struct timeval *tv,
uint16_t proto_type,
const struct nlmsghdr *nlmsg)
{
store_packet(nlmon, tv, PACKET_HOST, ARPHRD_NETLINK, proto_type,
nlmsg, nlmsg->nlmsg_len);
}
static void store_message(struct nlmon *nlmon, const struct timeval *tv,
const struct nlmsghdr *nlmsg)
{
store_netlink(nlmon, tv, NETLINK_GENERIC, nlmsg);
}
static void nlmon_message(struct nlmon *nlmon, const struct timeval *tv,
const struct tpacket_auxdata *tp,
const struct nlmsghdr *nlmsg)
{
struct nlmon_req *req;
if (nlmsg->nlmsg_type < NLMSG_MIN_TYPE) {
struct nlmon_req_match match = {
.seq = nlmsg->nlmsg_seq,
.pid = nlmsg->nlmsg_pid
};
req = l_queue_remove_if(nlmon->req_list,
nlmon_req_match, &match);
if (req) {
enum msg_type type;
struct nlmsgerr *err;
int status;
switch (nlmsg->nlmsg_type) {
case NLMSG_ERROR:
type = MSG_RESPONSE;
err = NLMSG_DATA(nlmsg);
status = -err->error;
break;
case NLMSG_DONE:
type = MSG_COMPLETE;
status = *((int *) NLMSG_DATA(nlmsg));
break;
default:
return;
}
store_message(nlmon, tv, nlmsg);
print_message(nlmon, tv, type, nlmsg->nlmsg_flags, status,
req->cmd, req->version,
NULL, sizeof(status));
nlmon_req_free(req);
}
return;
}
if (nlmsg->nlmsg_type != nlmon->id) {
if (nlmsg->nlmsg_type == GENL_ID_CTRL)
store_message(nlmon, tv, nlmsg);
return;
}
if (nlmsg->nlmsg_flags & NLM_F_REQUEST) {
const struct genlmsghdr *genlmsg = NLMSG_DATA(nlmsg);
uint32_t flags = nlmsg->nlmsg_flags & ~NLM_F_REQUEST;
req = l_new(struct nlmon_req, 1);
req->seq = nlmsg->nlmsg_seq;
req->pid = nlmsg->nlmsg_pid;
req->flags = nlmsg->nlmsg_flags;
req->cmd = genlmsg->cmd;
req->version = genlmsg->version;
l_queue_push_tail(nlmon->req_list, req);
store_message(nlmon, tv, nlmsg);
print_message(nlmon, tv, MSG_REQUEST, flags, 0,
req->cmd, req->version,
NLMSG_DATA(nlmsg) + GENL_HDRLEN,
NLMSG_PAYLOAD(nlmsg, GENL_HDRLEN));
} else {
const struct genlmsghdr *genlmsg = NLMSG_DATA(nlmsg);
enum msg_type type = MSG_EVENT;
struct nlmon_req_match match = {
.seq = nlmsg->nlmsg_seq,
.pid = nlmsg->nlmsg_pid
};
req = l_queue_find(nlmon->req_list, nlmon_req_match, &match);
if (req) {
if (!(req->flags & NLM_F_ACK)) {
l_queue_remove(nlmon->req_list, req);
nlmon_req_free(req);
}
type = MSG_RESULT;
}
store_message(nlmon, tv, nlmsg);
print_message(nlmon, tv, type, nlmsg->nlmsg_flags, 0,
genlmsg->cmd, genlmsg->version,
NLMSG_DATA(nlmsg) + GENL_HDRLEN,
NLMSG_PAYLOAD(nlmsg, GENL_HDRLEN));
}
}
struct nlmon *nlmon_create(uint16_t id)
{
struct nlmon *nlmon;
nlmon = l_new(struct nlmon, 1);
nlmon->id = id;
nlmon->req_list = l_queue_new();
return nlmon;
}
void nlmon_destroy(struct nlmon *nlmon)
{
if (!nlmon)
return;
l_queue_destroy(nlmon->req_list, nlmon_req_free);
l_free(nlmon);
}
static void genl_ctrl(struct nlmon *nlmon, const void *data, uint32_t len)
{
const struct genlmsghdr *genlmsg = data;
const struct nlattr *nla;
char name[GENL_NAMSIZ];
uint16_t id = 0;
if (genlmsg->cmd != CTRL_CMD_NEWFAMILY)
return;
for (nla = data + GENL_HDRLEN; NLA_OK(nla, len);
nla = NLA_NEXT(nla, len)) {
switch (nla->nla_type & NLA_TYPE_MASK) {
case CTRL_ATTR_FAMILY_ID:
id = *((uint16_t *) NLA_DATA(nla));
break;
case CTRL_ATTR_FAMILY_NAME:
strncpy(name, NLA_DATA(nla), GENL_NAMSIZ - 1);
break;
}
}
if (id == 0)
return;
if (!strcmp(name, NL80211_GENL_NAME))
nlmon->id = id;
}
2020-10-06 05:40:29 +02:00
static const char *scope_to_string(uint8_t scope)
{
switch (scope) {
case RT_SCOPE_UNIVERSE:
return "global";
case RT_SCOPE_SITE:
return "site";
case RT_SCOPE_LINK:
return "link";
case RT_SCOPE_HOST:
return "host";
case RT_SCOPE_NOWHERE:
return "nowhere";
default:
return "unknown";
}
}
static void print_ifi_addr(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
struct ether_addr eth;
if (size != ETH_ALEN) {
printf("malformed packet\n");
return;
}
memcpy(&eth, buf, ETH_ALEN);
print_attr(indent, "%s: %s", str, ether_ntoa(&eth));
}
static const char *oper_state_to_ascii(const uint8_t state)
{
switch(state) {
case IF_OPER_UNKNOWN:
return "unknown";
case IF_OPER_NOTPRESENT:
return "not present";
case IF_OPER_DOWN:
return "down";
case IF_OPER_LOWERLAYERDOWN:
return "lower layer down";
case IF_OPER_TESTING:
return "testing";
case IF_OPER_DORMANT:
return "dormant";
case IF_OPER_UP:
return "up";
}
return NULL;
}
static void print_oper_state(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
uint8_t oper_state;
if (size != 1) {
printf("malformed packet\n");
return;
}
oper_state = ((uint8_t *)buf)[0];
print_attr(indent, "%s: %s (%d)", str,
oper_state_to_ascii(oper_state), oper_state);
}
static const char *link_mode_to_ascii(const uint8_t mode)
{
switch(mode) {
case 0:
return "kernel controlled";
case 1:
return "userspace controlled";
}
return NULL;
}
static void print_link_mode(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
uint8_t link_mode;
if (size != 1) {
printf("malformed packet\n");
return;
}
link_mode = ((uint8_t *)buf)[0];
print_attr(indent, "%s: %s (%d)", str,
link_mode_to_ascii(link_mode), link_mode);
}
static void flags_str(const struct flag_names *table,
char *str, size_t size, uint16_t flags)
{
int pos, i;
pos = sprintf(str, "(0x%02x)", flags);
if (!flags)
return;
pos += sprintf(str + pos, " [");
for (i = 0; table[i].name; i++) {
if (flags & table[i].flag) {
flags &= ~table[i].flag;
pos += sprintf(str + pos, "%s%s", table[i].name,
flags ? "," : "");
}
}
pos += sprintf(str + pos, "]");
}
2019-07-23 16:31:05 +02:00
static struct attr_entry link_info_entry[] = {
{ IFLA_INFO_KIND, "Kind", ATTR_STRING },
{ },
};
static struct attr_entry info_entry[] = {
{ IFLA_ADDRESS, "Interface Address", ATTR_CUSTOM,
{ .function = print_ifi_addr } },
{ IFLA_BROADCAST, "Broadcast Address", ATTR_CUSTOM,
{ .function = print_ifi_addr } },
{ IFLA_IFNAME, "IfName", ATTR_STRING },
{ IFLA_MASTER, "Master", ATTR_U32 },
{ IFLA_MTU, "MTU", ATTR_U32 },
{ IFLA_TXQLEN, "Txqlen", ATTR_U32 },
{ IFLA_OPERSTATE, "OperState", ATTR_CUSTOM,
{ .function = print_oper_state } },
{ IFLA_LINKMODE, "LinkMode", ATTR_CUSTOM,
{ .function = print_link_mode } },
{ IFLA_LINK, "Link", ATTR_S32 },
{ IFLA_QDISC, "Qdisc", ATTR_STRING },
{ IFLA_STATS, "Stats", ATTR_BINARY },
{ IFLA_MAP, "Map", ATTR_BINARY },
{ IFLA_WIRELESS, "Wireless", ATTR_BINARY },
{ IFLA_COST, "Cost", ATTR_BINARY },
{ IFLA_PRIORITY, "Priority", ATTR_BINARY },
{ IFLA_PROTINFO, "ProtInfo", ATTR_BINARY },
{ IFLA_WEIGHT, "Weight", ATTR_BINARY },
{ IFLA_NET_NS_PID, "NetNSPid", ATTR_BINARY },
{ IFLA_IFALIAS, "IFAlias", ATTR_BINARY },
2019-07-23 16:31:05 +02:00
{ IFLA_LINKINFO, "LinkInfo",
ATTR_NESTED, { link_info_entry } },
{ },
};
static struct flag_names ifa_flags[] = {
{ IFA_F_SECONDARY, "temporary" },
{ IFA_F_NODAD, "nodad" },
{ IFA_F_OPTIMISTIC, "optimistic" },
{ IFA_F_DADFAILED, "dadfailed" },
{ IFA_F_HOMEADDRESS, "homeaddress" },
{ IFA_F_DEPRECATED, "deprecated" },
{ IFA_F_TENTATIVE, "tentative" },
{ IFA_F_PERMANENT, "permanent" },
{ IFA_F_MANAGETEMPADDR, "managetempaddr" },
{ IFA_F_NOPREFIXROUTE, "noprefixroute" },
{ IFA_F_MCAUTOJOIN, "mcautojoin" },
{ IFA_F_STABLE_PRIVACY, "stableprivacy" },
{ },
};
static void print_ifa_flags(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
uint32_t flags;
char str_flags[1024];
if (size != 4)
return;
flags = l_get_u32(buf);
flags_str(ifa_flags, str_flags, sizeof(str_flags), flags);
print_attr(indent, "%s: %s", str, str_flags);
}
static void print_inet_addr(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
2020-11-04 21:29:21 +01:00
int family;
char ip[INET6_ADDRSTRLEN];
2020-11-04 21:29:21 +01:00
if (size == sizeof(struct in_addr))
family = AF_INET;
else if (size == sizeof(struct in6_addr))
family = AF_INET6;
else
return;
2020-11-04 21:29:21 +01:00
inet_ntop(family, buf, ip, sizeof(ip));
print_attr(indent, "%s: %s", str, ip);
}
static void print_cacheinfo(unsigned int indent, const char *str,
const void *buf, uint16_t size)
{
const struct ifa_cacheinfo *cinfo = buf;
print_attr(indent, "%s:", str);
if (size != sizeof(struct ifa_cacheinfo)) {
printf("malformed packet\n");
return;
}
if (cinfo->ifa_prefered == 0xffffffffu)
print_attr(indent + 1, "ifa_prefered: infinite");
else
print_attr(indent + 1, "ifa_prefered: %u", cinfo->ifa_prefered);
if (cinfo->ifa_valid == 0xffffffffu)
print_attr(indent + 1, "ifa_valid: infinite");
else
print_attr(indent + 1, "ifa_valid: %u", cinfo->ifa_valid);
print_attr(indent + 1, "tstamp: %u, cstamp: %u",
cinfo->tstamp, cinfo->cstamp);
}
static struct attr_entry addr_entry[] = {
{ IFA_ADDRESS, "Interface Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ IFA_LOCAL, "Local Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ IFA_BROADCAST, "Broadcast Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ IFA_ANYCAST, "Anycast Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ IFA_LABEL, "Label", ATTR_STRING },
{ IFA_CACHEINFO, "CacheInfo", ATTR_CUSTOM,
{ .function = print_cacheinfo } },
{ IFA_FLAGS, "Flags", ATTR_CUSTOM,
{ .function = print_ifa_flags } },
{ },
};
static const struct attr_entry metrics_table[] = {
{ RTAX_MTU, "MTU", ATTR_U32 },
{ }
};
static struct attr_entry route_entry[] = {
{ RTA_DST, "Destination Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ RTA_SRC, "Source Address", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ RTA_IIF, "Input Interface Index", ATTR_S32 },
{ RTA_OIF, "Output Interface Index", ATTR_S32 },
{ RTA_GATEWAY, "Gateway", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ RTA_PRIORITY, "Priority of the route", ATTR_S32 },
{ RTA_TABLE, "Routing Table", ATTR_U32 },
{ RTA_EXPIRES, "Route lifetime", ATTR_U32 },
{ RTA_PREF, "Route Preference", ATTR_U8 },
{ RTA_PREFSRC, "Preferred Source", ATTR_CUSTOM,
{ .function = print_inet_addr } },
{ RTA_METRICS, "Metrics",
ATTR_NESTED, { metrics_table } },
{ },
};
static void print_rtnl_attributes(int indent, const struct attr_entry *table,
struct rtattr *rt_attr, int len)
{
struct rtattr *attr;
if (!table || !rt_attr)
return;
for (attr = rt_attr; RTA_OK(attr, len); attr = RTA_NEXT(attr, len)) {
uint16_t rta_type = attr->rta_type;
enum attr_type type = ATTR_UNSPEC;
attr_func_t function;
const struct attr_entry *nested;
uint64_t val64;
uint32_t val32;
uint16_t val16;
uint8_t val8;
int8_t val_s8;
int32_t val_s32;
int64_t val_s64;
const char *str;
int i, payload;
str = "Reserved";
for (i = 0; table[i].str; i++) {
if (rta_type == table[i].attr) {
str = table[i].str;
type = table[i].type;
function = table[i].function;
nested = table[i].nested;
break;
}
}
payload = RTA_PAYLOAD(attr);
switch (type) {
case ATTR_CUSTOM:
if (function)
function(indent, str, RTA_DATA(attr), payload);
else
printf("missing function\n");
break;
case ATTR_STRING:
print_attr(indent, "%s (len:%d): %s", str, payload,
(char *) RTA_DATA(attr));
break;
case ATTR_U8:
val8 = *((uint8_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRIu8" (0x%02"PRIx8")", str,
val8, val8);
if (payload != 1)
printf("malformed packet\n");
break;
case ATTR_U16:
val16 = *((uint16_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRIu16" (0x%04"PRIx16")", str,
val16, val16);
if (payload != 2)
printf("malformed packet\n");
break;
case ATTR_U32:
val32 = *((uint32_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRIu32" (0x%08"PRIx32")", str,
val32, val32);
if (payload != 4)
printf("malformed packet\n");
break;
case ATTR_U64:
val64 = *((uint64_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRIu64" (0x%016"PRIx64")",
str, val64, val64);
if (payload != 8)
printf("malformed packet\n");
break;
case ATTR_S8:
val_s8 = *((int8_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRId8, str, val_s8);
if (payload != 1)
printf("malformed packet\n");
break;
case ATTR_S32:
val_s32 = *((int32_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRId32, str, val_s32);
if (payload != 4)
printf("malformed packet\n");
break;
case ATTR_S64:
val_s64 = *((int64_t *) RTA_DATA(attr));
print_attr(indent, "%s: %"PRId64, str, val_s64);
if (payload != 8)
printf("malformed packet\n");
break;
case ATTR_FLAG:
print_attr(indent, "%s: true", str);
if (payload != 0)
printf("malformed packet\n");
break;
case ATTR_FLAG_OR_U16:
if (payload == 0)
print_attr(indent, "%s: true", str);
else if (payload == 2) {
val16 = *((uint16_t *) RTA_DATA(attr));
print_attr(indent,
"%s: %"PRIu16" (0x%04"PRIx16")",
str, val16, val16);
} else
printf("malformed packet\n");
break;
case ATTR_NESTED:
print_attr(indent, "%s: len %u", str, payload);
if (!nested)
printf("missing table\n");
print_rtnl_attributes(indent + 1, nested,
RTA_DATA(attr), payload);
break;
case ATTR_BINARY:
print_attr(indent, "%s: len %d", str, payload);
print_hexdump(indent + 1, RTA_DATA(attr), payload);
break;
case ATTR_ADDRESS:
case ATTR_ARRAY:
case ATTR_UNSPEC:
print_attr(indent, "%s: len %d", str, payload);
break;
}
}
}
static const char *family_to_string(uint8_t family)
{
switch (family) {
case AF_INET:
return "AF_INET";
case AF_INET6:
return "AF_INET6";
default:
return "Unknown";
}
}
2020-11-04 20:33:26 +01:00
static const char *protocol_to_string(uint8_t proto)
{
switch (proto) {
case RTPROT_DHCP:
return "dhcp";
case RTPROT_RA:
return "ra";
case RTPROT_KERNEL:
return "kernel";
case RTPROT_BOOT:
return "boot";
case RTPROT_STATIC:
return "static";
default:
return "Unknown";
}
}
static void print_ifinfomsg(const struct ifinfomsg *info)
{
2019-07-23 14:24:20 +02:00
static struct flag_names iff_flags[] = {
{ IFF_UP, "up" },
{ IFF_BROADCAST, "broadcast" },
{ IFF_DEBUG, "debug" },
{ IFF_LOOPBACK, "loopback" },
{ IFF_POINTOPOINT, "pointopoint"},
{ IFF_NOTRAILERS, "notrailers" },
{ IFF_RUNNING, "running" },
{ IFF_NOARP, "noarp" },
{ IFF_PROMISC, "promisc" },
{ IFF_ALLMULTI, "allmulti" },
{ IFF_MASTER, "master" },
{ IFF_SLAVE, "slave" },
{ IFF_MULTICAST, "multicast" },
{ IFF_PORTSEL, "portsel" },
{ IFF_AUTOMEDIA, "automedia" },
{ IFF_DYNAMIC, "dynamic" },
{ },
};
char str[256];
if (!info)
return;
print_field("IFLA Family: %s", family_to_string(info->ifi_family));
print_field("IFLA Type: %u", info->ifi_type);
print_field("IFLA Index: %d", info->ifi_index);
print_field("IFLA ChangeMask: %u", info->ifi_change);
2019-07-23 14:24:20 +02:00
flags_str(iff_flags, str, sizeof(str), info->ifi_flags);
print_field("IFLA Flags: %s", str);
}
static void print_ifaddrmsg(const struct ifaddrmsg *addr)
{
char str[1024];
if (!addr)
return;
print_field("IFA Family: %s", family_to_string(addr->ifa_family));
print_field("IFA Prefixlen: %u", addr->ifa_prefixlen);
print_field("IFA Index: %d", addr->ifa_index);
2020-10-06 05:40:29 +02:00
print_field("IFA Scope: %s", scope_to_string(addr->ifa_scope));
flags_str(ifa_flags, str, sizeof(str), addr->ifa_flags);
print_field("IFA Flags: %s", str);
}
static void print_rtmsg(const struct rtmsg *msg)
{
static struct flag_names rtm_flags[] = {
{ RTM_F_NOTIFY, "notify" },
{ RTM_F_CLONED, "cloned" },
{ RTM_F_EQUALIZE, "multipath-equalizer" },
{ },
};
char str[256];
print_field("RTM Family: %s", family_to_string(msg->rtm_family));
print_field("RTM Destination Len: %hhu", msg->rtm_dst_len);
print_field("RTM Source Len: %hhu", msg->rtm_src_len);
print_field("RTM TOS Field: %hhu", msg->rtm_tos);
print_field("RTM Table: %hhu", msg->rtm_table);
2020-11-04 20:33:26 +01:00
print_field("RTM Protocol: %s",
protocol_to_string(msg->rtm_protocol));
2020-10-06 05:40:29 +02:00
print_field("RTM Scope: %s", scope_to_string(msg->rtm_scope));
print_field("RTM Type: %hhu", msg->rtm_type);
flags_str(rtm_flags, str, sizeof(str), msg->rtm_flags);
print_field("RTM Flags: %s", str);
}
static void read_uevent(const char *ifname, int index)
{
char filename[64], line[128];
FILE *f;
snprintf(filename, sizeof(filename), "/sys/class/net/%s/uevent",
ifname);
f = fopen(filename, "re");
if (!f) {
printf("%s do not exist\n", filename);
return;
}
while (fgets(line, sizeof(line), f)) {
char *pos;
pos = strchr(line, '\n');
if (!pos)
continue;
pos[0] = '\0';
if (strncmp(line, "DEVTYPE=", 8) != 0)
continue;
if (strcmp(line + 8, "wlan") == 0) {
struct wlan_iface *iface;
iface = l_new(struct wlan_iface, 1);
iface->index = index;
if (!l_hashmap_insert(wlan_iface_list,
2015-02-05 03:49:38 +01:00
L_INT_TO_PTR(index), iface))
l_free(iface);
}
}
fclose(f);
}
static char *rtnl_get_ifname(const struct ifinfomsg *ifi, int len)
{
struct rtattr *attr;
char *ifname = NULL;
if (!ifi)
return NULL;
for (attr = IFLA_RTA(ifi); RTA_OK(attr, len);
attr = RTA_NEXT(attr, len))
if (attr->rta_type == IFLA_IFNAME)
ifname = (char *) RTA_DATA(attr);
return ifname;
}
static void print_rtm_link(uint16_t type, const struct ifinfomsg *info, int len)
{
struct wlan_iface *iface;
char *ifname;
if (!info || len <= 0)
return;
if (type == RTM_NEWLINK) {
ifname = rtnl_get_ifname(info, len);
if (!ifname)
return;
read_uevent(ifname, info->ifi_index);
}
iface = l_hashmap_lookup(wlan_iface_list,
L_INT_TO_PTR(info->ifi_index));
if (!iface)
return;
print_ifinfomsg(info);
print_rtnl_attributes(1, info_entry, IFLA_RTA(info), len);
if (type == RTM_DELLINK) {
iface = l_hashmap_remove(wlan_iface_list,
L_INT_TO_PTR(info->ifi_index));
if (!iface)
return;
l_free(iface);
}
}
static void print_rtm_route(uint16_t type, const struct rtmsg *msg, size_t len)
{
if (!msg || len < sizeof(struct rtmsg))
return;
print_rtmsg(msg);
print_rtnl_attributes(1, route_entry, RTM_RTA(msg), len);
}
static void print_rtm_addr(uint16_t type, const struct ifaddrmsg *msg,
size_t len)
{
if (!msg || len < sizeof(struct ifaddrmsg))
return;
print_ifaddrmsg(msg);
print_rtnl_attributes(1, addr_entry, IFA_RTA(msg), len);
}
static const char *nlmsg_type_to_str(uint32_t msg_type)
{
const char *str = NULL;
switch (msg_type) {
case NLMSG_NOOP:
str = "Noop";
break;
case NLMSG_ERROR:
str = "Error";
break;
case NLMSG_DONE:
str = "Done";
break;
case NLMSG_OVERRUN:
str = "Overrun";
break;
case RTM_NEWLINK:
str = "New Link";
break;
case RTM_DELLINK:
str = "Delete Link";
break;
case RTM_GETLINK:
str = "Get Link";
break;
case RTM_SETLINK:
str = "Set Link";
break;
case RTM_NEWADDR:
str = "New Address";
break;
case RTM_DELADDR:
str = "Delete Address";
break;
case RTM_GETADDR:
str = "Get Address";
break;
case RTM_NEWROUTE:
str = "New Route";
break;
case RTM_DELROUTE:
str = "Delete Route";
break;
case RTM_GETROUTE:
str = "Get Route";
break;
default:
str = "Reserved";
break;
}
return str;
}
static void print_nlmsghdr(const struct timeval *tv,
const struct nlmsghdr *nlmsg)
{
char extra_str[256];
const char *str;
bool out;
str = nlmsg_type_to_str(nlmsg->nlmsg_type);
out = !!(nlmsg->nlmsg_flags & NLM_F_REQUEST);
netlink_str(extra_str, sizeof(extra_str), nlmsg->nlmsg_type,
nlmsg->nlmsg_flags, NLMSG_PAYLOAD(nlmsg, 0));
print_packet(tv, out ? '<' : '>', COLOR_YELLOW, "RTNL", str, extra_str);
2019-07-23 14:41:53 +02:00
print_field("Flags: %hu (0x%03x)", nlmsg->nlmsg_flags,
nlmsg->nlmsg_flags);
2019-07-23 14:41:53 +02:00
print_field("Sequence number: %u (0x%08x)",
nlmsg->nlmsg_seq, nlmsg->nlmsg_seq);
2020-11-04 17:56:13 +01:00
print_field("Port ID: %d", nlmsg->nlmsg_pid);
}
static void print_nlmsg(const struct timeval *tv, const struct nlmsghdr *nlmsg)
{
struct nlmsgerr *err;
int status;
print_nlmsghdr(tv, nlmsg);
switch (nlmsg->nlmsg_type) {
case NLMSG_ERROR:
err = NLMSG_DATA(nlmsg);
status = err->error;
if (status < 0)
print_field("Error: %d (%s)",
status, strerror(-status));
else
print_field("ACK: %d", status);
break;
case NLMSG_DONE:
status = *((int *) NLMSG_DATA(nlmsg));
print_field("Status: %d", status);
break;
case NLMSG_NOOP:
case NLMSG_OVERRUN:
break;
}
}
static void print_rtnl_msg(const struct timeval *tv,
const struct nlmsghdr *nlmsg)
{
struct ifinfomsg *info;
struct ifaddrmsg *addr;
struct rtmsg *rtm;
struct wlan_iface *iface;
int len;
switch (nlmsg->nlmsg_type) {
case RTM_NEWLINK:
case RTM_DELLINK:
case RTM_SETLINK:
case RTM_GETLINK:
info = (struct ifinfomsg *) NLMSG_DATA(nlmsg);
len = IFLA_PAYLOAD(nlmsg);
print_nlmsghdr(tv, nlmsg);
print_rtm_link(nlmsg->nlmsg_type, info, len);
break;
case RTM_NEWROUTE:
case RTM_GETROUTE:
case RTM_DELROUTE:
rtm = (struct rtmsg *) NLMSG_DATA(nlmsg);
len = RTM_PAYLOAD(nlmsg);
if (!rtm || len <= (int) sizeof(struct rtmsg))
return;
/* Skip 'kernel' and 'default' tables */
if (rtm->rtm_table == RT_TABLE_LOCAL ||
rtm->rtm_table == RT_TABLE_DEFAULT)
return;
print_nlmsghdr(tv, nlmsg);
print_rtm_route(nlmsg->nlmsg_type, rtm, len);
break;
case RTM_NEWADDR:
case RTM_DELADDR:
case RTM_GETADDR:
addr = (struct ifaddrmsg *) NLMSG_DATA(nlmsg);
len = IFA_PAYLOAD(nlmsg);
if (!addr || len <= 0)
return;
iface = l_hashmap_lookup(wlan_iface_list,
L_INT_TO_PTR(addr->ifa_index));
if (!iface)
return;
print_nlmsghdr(tv, nlmsg);
print_rtm_addr(nlmsg->nlmsg_type, addr, len);
break;
}
}
void nlmon_print_rtnl(struct nlmon *nlmon, const struct timeval *tv,
const void *data, uint32_t size)
{
uint32_t aligned_size = NLMSG_ALIGN(size);
const struct nlmsghdr *nlmsg;
update_time_offset(tv);
for (nlmsg = data; NLMSG_OK(nlmsg, aligned_size);
nlmsg = NLMSG_NEXT(nlmsg, aligned_size)) {
switch (nlmsg->nlmsg_type) {
case NLMSG_NOOP:
case NLMSG_OVERRUN:
case NLMSG_ERROR:
case NLMSG_DONE:
print_nlmsg(tv, nlmsg);
break;
case RTM_NEWLINK:
case RTM_DELLINK:
case RTM_SETLINK:
case RTM_GETLINK:
case RTM_NEWADDR:
case RTM_DELADDR:
case RTM_GETADDR:
case RTM_NEWROUTE:
case RTM_GETROUTE:
case RTM_DELROUTE:
print_rtnl_msg(tv, nlmsg);
break;
}
}
}
void nlmon_print_genl(struct nlmon *nlmon, const struct timeval *tv,
const void *data, uint32_t size)
{
const struct nlmsghdr *nlmsg;
update_time_offset(tv);
for (nlmsg = data; NLMSG_OK(nlmsg, size);
nlmsg = NLMSG_NEXT(nlmsg, size)) {
if (nlmsg->nlmsg_type == GENL_ID_CTRL)
genl_ctrl(nlmon, NLMSG_DATA(nlmsg),
NLMSG_PAYLOAD(nlmsg, 0));
else
nlmon_message(nlmon, tv, NULL, nlmsg);
}
}
static bool nlmon_receive(struct l_io *io, void *user_data)
{
struct nlmon *nlmon = user_data;
struct nlmsghdr *nlmsg;
struct msghdr msg;
struct sockaddr_ll sll;
struct iovec iov;
struct cmsghdr *cmsg;
struct timeval copy_tv;
struct tpacket_auxdata copy_tp;
const struct timeval *tv = NULL;
const struct tpacket_auxdata *tp = NULL;
uint16_t proto_type;
unsigned char buf[8192];
unsigned char control[32];
ssize_t bytes_read;
int nlmsg_len;
int fd;
fd = l_io_get_fd(io);
if (fd < 0)
return false;
memset(&sll, 0, sizeof(sll));
memset(&iov, 0, sizeof(iov));
iov.iov_base = buf;
iov.iov_len = sizeof(buf);
memset(&msg, 0, sizeof(msg));
msg.msg_name = &sll;
msg.msg_namelen = sizeof(sll);
msg.msg_iov = &iov;
msg.msg_iovlen = 1;
msg.msg_control = control;
msg.msg_controllen = sizeof(control);
bytes_read = recvmsg(fd, &msg, 0);
if (bytes_read < 0) {
if (errno != EAGAIN && errno != EINTR)
return false;
return true;
}
if (sll.sll_hatype != ARPHRD_NETLINK)
return true;
proto_type = ntohs(sll.sll_protocol);
for (cmsg = CMSG_FIRSTHDR(&msg); cmsg;
cmsg = CMSG_NXTHDR(&msg, cmsg)) {
if (cmsg->cmsg_level == SOL_SOCKET &&
cmsg->cmsg_type == SCM_TIMESTAMP) {
memcpy(&copy_tv, CMSG_DATA(cmsg), sizeof(copy_tv));
tv = &copy_tv;
}
if (cmsg->cmsg_level == SOL_PACKET &&
cmsg->cmsg_type != PACKET_AUXDATA) {
memcpy(&copy_tp, CMSG_DATA(cmsg), sizeof(copy_tp));
tp = &copy_tp;
}
}
nlmsg_len = bytes_read;
for (nlmsg = iov.iov_base; NLMSG_OK(nlmsg, nlmsg_len);
nlmsg = NLMSG_NEXT(nlmsg, nlmsg_len)) {
switch (proto_type) {
case NETLINK_ROUTE:
store_netlink(nlmon, tv, proto_type, nlmsg);
if (!nlmon->nortnl)
nlmon_print_rtnl(nlmon, tv, nlmsg,
nlmsg->nlmsg_len);
break;
case NETLINK_GENERIC:
nlmon_message(nlmon, tv, tp, nlmsg);
break;
}
}
return true;
}
/*
* BPF filter to match skb->dev->type == 824 (ARPHRD_NETLINK) and
* either match skb->protocol == 0x0000 (NETLINK_ROUTE) or match
* skb->protocol == 0x0010 (NETLINK_GENERIC).
*/
static struct sock_filter mon_filter[] = {
{ 0x28, 0, 0, 0xfffff01c }, /* ldh #hatype */
{ 0x15, 0, 3, 0x00000338 }, /* jne #824, drop */
{ 0x28, 0, 0, 0xfffff000 }, /* ldh #proto */
{ 0x15, 2, 0, 0000000000 }, /* jeq #0x0000, pass */
{ 0x15, 1, 0, 0x00000010 }, /* jeq #0x0010, pass */
{ 0x06, 0, 0, 0000000000 }, /* drop: ret #0 */
{ 0x06, 0, 0, 0xffffffff }, /* pass: ret #-1 */
};
static const struct sock_fprog mon_fprog = { .len = 7, .filter = mon_filter };
static struct l_io *open_packet(const char *name)
{
struct l_io *io;
struct sockaddr_ll sll;
struct packet_mreq mr;
struct ifreq ifr;
int fd, opt = 1;
fd = socket(PF_PACKET, SOCK_RAW | SOCK_CLOEXEC | SOCK_NONBLOCK, 0);
if (fd < 0) {
perror("Failed to create packet socket");
return NULL;
}
strncpy(ifr.ifr_name, name, IFNAMSIZ - 1);
if (ioctl(fd, SIOCGIFINDEX, &ifr) < 0) {
perror("Failed to get monitor index");
close(fd);
return NULL;
}
memset(&sll, 0, sizeof(sll));
sll.sll_family = AF_PACKET;
sll.sll_protocol = htons(ETH_P_ALL);
sll.sll_ifindex = ifr.ifr_ifindex;
if (bind(fd, (struct sockaddr *) &sll, sizeof(sll)) < 0) {
perror("Failed to bind packet socket");
close(fd);
return NULL;
}
memset(&mr, 0, sizeof(mr));
mr.mr_ifindex = ifr.ifr_ifindex;
mr.mr_type = PACKET_MR_ALLMULTI;
if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP,
&mr, sizeof(mr)) < 0) {
perror("Failed to enable all multicast");
close(fd);
return NULL;
}
if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER,
&mon_fprog, sizeof(mon_fprog)) < 0) {
perror("Failed to enable monitor filter");
close(fd);
return NULL;
}
if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, &opt, sizeof(opt)) < 0) {
perror("Failed to enable monitor timestamps");
close(fd);
return NULL;
}
io = l_io_new(fd);
l_io_set_close_on_destroy(io, true);
return io;
}
void nlmon_print_pae(struct nlmon *nlmon, const struct timeval *tv,
uint8_t type, int index,
const void *data, uint32_t size)
{
char extra_str[16];
update_time_offset(tv);
sprintf(extra_str, "len %u", size);
print_packet(tv, (type == PACKET_HOST) ? '>' : '<',
COLOR_YELLOW, "PAE", extra_str, "");
if (index >= 0)
print_attr(0, "Interface Index: %u", index);
print_eapol(0, "EAPoL", data, size);
}
static bool pae_receive(struct l_io *io, void *user_data)
{
struct nlmon *nlmon = user_data;
struct msghdr msg;
struct sockaddr_ll sll;
struct iovec iov;
struct cmsghdr *cmsg;
struct timeval copy_tv;
const struct timeval *tv = NULL;
unsigned char buf[8192];
unsigned char control[32];
ssize_t bytes_read;
int fd;
fd = l_io_get_fd(io);
if (fd < 0)
return false;
memset(&sll, 0, sizeof(sll));
memset(&iov, 0, sizeof(iov));
iov.iov_base = buf;
iov.iov_len = sizeof(buf);
memset(&msg, 0, sizeof(msg));
msg.msg_name = &sll;
msg.msg_namelen = sizeof(sll);
msg.msg_iov = &iov;
msg.msg_iovlen = 1;
msg.msg_control = control;
msg.msg_controllen = sizeof(control);
bytes_read = recvmsg(fd, &msg, 0);
if (bytes_read < 0) {
if (errno != EAGAIN && errno != EINTR)
return false;
return true;
}
if (sll.sll_hatype != ARPHRD_ETHER)
return true;
for (cmsg = CMSG_FIRSTHDR(&msg); cmsg;
cmsg = CMSG_NXTHDR(&msg, cmsg)) {
if (cmsg->cmsg_level == SOL_SOCKET &&
cmsg->cmsg_type == SCM_TIMESTAMP) {
memcpy(&copy_tv, CMSG_DATA(cmsg), sizeof(copy_tv));
tv = &copy_tv;
}
}
store_packet(nlmon, tv, sll.sll_pkttype, ARPHRD_ETHER,
ntohs(sll.sll_protocol), buf, bytes_read);
nlmon_print_pae(nlmon, tv, sll.sll_pkttype, sll.sll_ifindex,
buf, bytes_read);
return true;
}
/*
* BPF filter to match skb->dev->type == 1 (ARPHRD_ETHER) and
* match skb->protocol == 0x888e (PAE) or 0x88c7 (preauthentication).
*/
static struct sock_filter pae_filter[] = {
{ 0x28, 0, 0, 0xfffff01c }, /* ldh #hatype */
{ 0x15, 0, 4, 0x00000001 }, /* jne #1, drop */
{ 0x28, 0, 0, 0xfffff000 }, /* ldh #proto */
{ 0x15, 1, 0, 0x0000888e }, /* je #0x888e, keep */
{ 0x15, 0, 1, 0x000088c7 }, /* jne #0x88c7, drop */
{ 0x06, 0, 0, 0xffffffff }, /* keep: ret #-1 */
{ 0x06, 0, 0, 0000000000 }, /* drop: ret #0 */
};
static const struct sock_fprog pae_fprog = { .len = 7, .filter = pae_filter };
static struct l_io *open_pae(void)
{
struct l_io *io;
int fd, opt = 1;
fd = socket(PF_PACKET, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK,
htons(ETH_P_ALL));
if (fd < 0) {
perror("Failed to create authentication socket");
return NULL;
}
if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER,
&pae_fprog, sizeof(pae_fprog)) < 0) {
perror("Failed to enable authentication filter");
close(fd);
return NULL;
}
if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, &opt, sizeof(opt)) < 0) {
perror("Failed to enable authentication timestamps");
close(fd);
return NULL;
}
io = l_io_new(fd);
l_io_set_close_on_destroy(io, true);
return io;
}
struct nlmon *nlmon_open(const char *ifname, uint16_t id, const char *pathname,
const struct nlmon_config *config)
{
struct nlmon *nlmon;
struct l_io *io, *pae_io;
struct pcap *pcap;
io = open_packet(ifname);
if (!io)
return NULL;
pae_io = open_pae();
if (!pae_io) {
l_io_destroy(io);
return NULL;
}
if (pathname) {
pcap = pcap_create(pathname);
if (!pcap) {
l_io_destroy(pae_io);
l_io_destroy(io);
return NULL;
}
} else
pcap = NULL;
nlmon = l_new(struct nlmon, 1);
nlmon->id = id;
nlmon->io = io;
nlmon->pae_io = pae_io;
nlmon->req_list = l_queue_new();
nlmon->pcap = pcap;
nlmon->nortnl = config->nortnl;
nlmon->nowiphy = config->nowiphy;
nlmon->noscan = config->noscan;
nlmon->noies = config->noies;
l_io_set_read_handler(nlmon->io, nlmon_receive, nlmon, NULL);
l_io_set_read_handler(nlmon->pae_io, pae_receive, nlmon, NULL);
wlan_iface_list = l_hashmap_new();
return nlmon;
}
void nlmon_close(struct nlmon *nlmon)
{
if (!nlmon)
return;
l_io_destroy(nlmon->io);
l_io_destroy(nlmon->pae_io);
l_queue_destroy(nlmon->req_list, nlmon_req_free);
l_hashmap_destroy(wlan_iface_list, wlan_iface_list_free);
wlan_iface_list = NULL;
if (nlmon->pcap)
pcap_close(nlmon->pcap);
l_free(nlmon);
}