2 * ap_search.c from Access Point SNMP Utils for Linux
4 * Copyright (c) 2002 Roman Festchook <roma at polesye dot net>
5 * Copyright (c) 2003 Jan Rafaj <aputils at cedric dot vabo dot cz>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License Version 2 from
9 * June 1991 as published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; if not, write to the Free Software Foundation, Inc.,
18 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 #include <sys/types.h>
27 #include <sys/ioctl.h>
30 #include <sys/sockio.h>
34 #include <sys/socket.h>
41 #include "ap-curses.h"
43 #if defined (__GLIBC__)
49 #define SEARCH_HEADER _("# Type IP Description")
51 extern int atmel410_filter;
60 void scan_local_segment (struct sockaddr_in *from, struct sockaddr_in *to,
63 extern WINDOW *main_sub;
64 extern char *ap_types[];
65 unsigned char message[1024], *start;
67 * sysDescr OIDs used to detect AP type [in order of appearance
68 * according to the 'for' loop below: ATMEL410, NWN, ATMEL12350
70 char Wireless[3][12] = {
71 {0x2B, 0x06, 0x01, 0x04, 0x01, 0x83, 0x1A, 0x01, 0x01, 0x01, 0x01, 0x00},
72 {0x2B, 0x06, 0x01, 0x02, 0x01, 0x01, 0x01, 0x00},
73 {0x2B, 0x06, 0x01, 0x04, 0x01, 0xE0, 0x3E, 0x01, 0x01, 0x01, 0x01, 0x00}
75 int scd_ap_type, last_searched_type=ATMEL12350;
76 int c, s2, errno, len, client_len = SIZE;
77 struct in_addr to_addr_reserv;
81 struct ip_mreq mult = { {0}, {INADDR_ANY} };
84 struct timeval timeout, starttime, curtime;
88 print_help(_("Please wait while scanning, or press 'Q' to quit."));
90 if ((s2 = socket(PF_INET, SOCK_DGRAM, 0)) == -1) {
91 print_helperr(CREATE_SOCKET_ERROR);
96 if (bind(s2, (struct sockaddr *) from, SIZE) == -1) {
97 print_helperr(BIND_SOCKET_ERROR);
102 if (setsockopt (s2, SOL_SOCKET, SO_BROADCAST, &opts,
103 sizeof(struct sopts)) == -1) {
104 print_helperr(_("Can't set broadcast option on socket. "
110 inet_aton("224.0.1.43", &mult.imr_multiaddr);
111 if (setsockopt(s2, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mult,
112 sizeof(struct ip_mreq)) == -1) {
113 print_helperr(_("Can't set multicast membership on socket. "
119 mvwaddstr(main_sub, 15, 1, _("Scanning via network interface:"));
120 sprintf(message, _(" Index: %i"), f_ifctr);
121 mvwaddstr(main_sub, 16, 1, message);
122 sprintf(message, _(" Name: %s"), ifname);
123 mvwaddstr(main_sub, 17, 1, message);
124 sprintf(message, _(" IP: %s"), inet_ntoa(from->sin_addr));
125 mvwaddstr(main_sub, 18, 1, message);
127 if(atmel410_filter) {
128 last_searched_type=ATMEL410;
131 for (scd_ap_type = ATMEL410; scd_ap_type <= last_searched_type; scd_ap_type++) {
132 clear_main_new(19, 20);
133 sprintf(message, _("Scanning for AP type: %s"), ap_types[scd_ap_type]);
134 mvwaddstr(main_sub, 19, 1, message);
137 varbinds[0].oid = Wireless[scd_ap_type];
138 varbinds[0].len_oid =
139 (scd_ap_type == ATMEL410 || scd_ap_type == ATMEL12350) ?
140 sizeof(Wireless[scd_ap_type]) : 8;
141 varbinds[0].len_val = 0;
142 varbinds[0].type = NULL_VALUE;
143 len = ber(message, varbinds, 1, GET);
145 if (scd_ap_type == NWN) {
146 to_addr_reserv = to->sin_addr;
147 to->sin_addr = mult.imr_multiaddr;
151 if (sendto(s2, message, len, 0, (struct sockaddr *) to, SIZE) == -1) {
152 sprintf(message, _("Failure in sendto(): %s. Press any key."),
154 print_helperr(message);
161 gettimeofday(&starttime, &tz);
170 * Compute time difference. Note that for portability reasons,
171 * we may not rely on select() below setting up timeout to
172 * remaining time upon its return, although this works on Linux.
174 gettimeofday(&curtime, &tz);
175 c = (curtime.tv_sec * 1000000 + curtime.tv_usec) -
176 (starttime.tv_sec * 1000000 + starttime.tv_usec);
177 if (c < (2 * 1000000 + 0)) {
178 c = (2 * 1000000 + 0) - c;
179 timeout.tv_sec = c / 1000000;
180 timeout.tv_usec = c - timeout.tv_sec * 1000000;
182 /* Return if nothing has been received after timeout secs. */
185 c = select(s2 + 1, &rds, NULL, NULL, &timeout);
195 /* Key pressed. If it is 'Q', return. */
196 if (FD_ISSET(0, &rds)) {
198 if (c == 'q' || c == 'Q') {
204 /* If data are available for reading on s2, try to read them now. */
205 if (FD_ISSET(s2, &rds))
206 if ((len = recvfrom(s2, message, 512, 0,
207 (struct sockaddr *) from, &client_len)) == -1)
211 if (*start != ASN_HEADER)
214 start += (start[1] & 0x80) ? (start[1] & 0x7F) + 2 : 2;
215 start += *(start + 4) + 5;
217 if (*start != RESPONSE)
220 start += (start[1] & 0x80) ? (start[1] & 0x7F) + 2 : 2;
222 if (*(start + 5) || *(start + 9) != ASN_HEADER)
225 start += (start[10] & 0x80) ? (start[10] & 0x7F) + 11 : 11;
227 if (*(start) != ASN_HEADER)
230 start += (start[1] & 0x80) ? (start[1] & 0x7F) + 2 : 2;
231 start += *(start + 1) + 2;
233 if (start[1] & 0x80) {
234 varbinds[0].len_val = start[2];
235 start += (start[1] & 0x7F) + 2;
237 varbinds[0].len_val = start[1];
242 * Dupe check. There are 2 reasons why to do this:
243 * 1. If interface-based IP aliases are used (f.e. on Linux),
244 * it may well happen that their broadcast addresses may
245 * inadvertedly overlap each other, so the same AP IPs would
246 * answer twice (for a specific interface and its alias
248 * 2. ATMEL410 devices are capable to answer both queries with
249 * 410 as well as 12350 IDs, while ATMEL12350 device only
250 * answers queries with 12350 ID. Hence, we need to check
251 * for duplicate responses from ATMEL410 devices, when
252 * ATMEL410 check has already performed and ATMEL12350 one
254 * Note, that ATMEL410 devices may, under certain circumstances,
255 * fail to pass the ATMEL410 check, and can be accidentally
256 * marked as an ATMEL12350 device. This is a known bug and
257 * should be eventually solved in any of upcomming releases (TODO).
260 int dupcnt = 0, j = i - 1;
263 if (from->sin_addr.s_addr == fapsa[j].ip.s_addr)
271 /* new AP (unique IP/APtype pair) found */
273 fapsa[i].ip = from->sin_addr;
274 fapsa[i].type = scd_ap_type;
276 sprintf(message, "%2X %11s %15s", i, ap_types[fapsa[i].type],
277 inet_ntoa(fapsa[i].ip));
281 mvwaddstr(main_sub, i, 0, message);
282 for (len = 0; len < varbinds[0].len_val && start[len]; len++)
283 mvwaddch(main_sub, i, len + 31, start[len]);
286 /* Bail out if the number of found devices exceeds sane limit. */
291 if (scd_ap_type == NWN)
292 to->sin_addr = to_addr_reserv;
303 extern WINDOW *main_sub;
305 unsigned int ilen = 256;
306 struct sockaddr_in from, to;
309 char *ifbuf_ptr = NULL, *ifrec_ptr;
311 print_title(_("Access Points Search"));
312 mvwaddstr(main_sub, 0, 0, SEARCH_HEADER);
315 if ((s1 = socket(PF_INET, SOCK_DGRAM, 0)) == -1) {
316 print_helperr(CREATE_SOCKET_ERROR);
323 * Find all IPs of locally available IPv4 interfaces and corresponding
324 * broadcast and/or point-to-point addresses.
327 if (!(ifbuf_ptr = realloc(ifbuf_ptr, ilen))) {
328 print_helperr(_("realloc() error."));
332 ifc.ifc_buf = ifbuf_ptr;
334 if (ioctl(s1, SIOCGIFCONF, &ifc) >= 0)
335 /* Stupid condition thx to BSD and 2 SIOCGIFCONF implementations */
336 if (ifc.ifc_len + sizeof(struct ifreq) + 64 < ilen)
340 print_helperr(_("Network interface discovery error."));
343 ilen += 100 + (ilen >> 2);
345 ifrec_ptr = ifbuf_ptr;
346 while (ifrec_ptr < ifbuf_ptr + ifc.ifc_len) {
347 memset(&from.sin_addr, 0, sizeof(struct in_addr));
348 memset(&to.sin_addr, 0, sizeof(struct in_addr));
349 ifr = (struct ifreq *) ifrec_ptr;
351 ilen = sizeof(ifr->ifr_name) + ifr->ifr_addr.sa_len;
352 if (ilen < sizeof(*ifr))
355 if (ifr->ifr_addr.sa_family == AF_INET)
356 if (ioctl(s1, SIOCGIFFLAGS, ifrec_ptr) == 0)
357 if (ifr->ifr_flags & IFF_UP)
358 if (!(ifr->ifr_flags & IFF_LOOPBACK)) {
360 ((struct sockaddr_in *)&ifr->ifr_addr)->sin_addr;
361 if (ifr->ifr_flags & IFF_POINTOPOINT) {
362 ioctl(s1, SIOCGIFDSTADDR, ifrec_ptr);
364 ((struct sockaddr_in *)&ifr->ifr_dstaddr)->sin_addr;
366 ioctl(s1, SIOCGIFBRDADDR, ifrec_ptr);
368 ((struct sockaddr_in *)&ifr->ifr_broadaddr)->sin_addr;
374 if (ioctl(s1, SIOCGIFFLAGS, ifrec_ptr) == 0)
375 if (ifr->ifr_flags & IFF_UP)
376 if (!(ifr->ifr_flags & IFF_LOOPBACK)) {
377 if (ifr->ifr_flags & IFF_POINTOPOINT) {
378 ioctl(s1, SIOCGIFDSTADDR, ifrec_ptr);
380 ((struct sockaddr_in *)&ifr->ifr_dstaddr)->sin_addr;
382 ioctl(s1, SIOCGIFBRDADDR, ifrec_ptr);
384 ((struct sockaddr_in *)&ifr->ifr_broadaddr)->sin_addr;
386 if (ioctl(s1, SIOCGIFADDR, ifrec_ptr) == 0)
387 if (ifr->ifr_addr.sa_family == AF_INET)
389 ((struct sockaddr_in *)&ifr->ifr_addr)->sin_addr;
392 if (from.sin_addr.s_addr && to.sin_addr.s_addr) {
394 from.sin_family = to.sin_family = AF_INET;
395 from.sin_port = INADDR_ANY;
396 to.sin_port = htons(161);
397 scan_local_segment(&from, &to, ifr->ifr_name);
398 clear_main_new(15, 20);
401 /* No need to process next interfaces if the table is already full, */
405 /* or if someone pressed 'Q'. */
415 print_helperr(_("No local network interfaces found. Press any key."));
417 print_help(_("No directly reachable Access Points found. "
421 mvwaddstr(main_sub, 19, 1, _("Program-hardcoded maximum number "
425 print_help(_("# - connect to AP; Q - quit"));
427 switch (ac = getch()) {
441 if (ac-'0' > (i - 1))
445 connect_options(fapsa[ac-'0'].ip.s_addr,
446 fapsa[ac-'0'].type + 1);