Annotation of src/usr.bin/netstat/net80211.c, Revision 1.7
1.7 ! fgsch 1: /* $OpenBSD: net80211.c,v 1.6 2008/12/17 19:27:40 jcs Exp $ */
1.1 reyk 2:
3: /*
1.3 reyk 4: * Copyright (c) 2005 Reyk Floeter <reyk@openbsd.org>
1.1 reyk 5: *
6: * Permission to use, copy, modify, and distribute this software for any
7: * purpose with or without fee is hereby granted, provided that the above
8: * copyright notice and this permission notice appear in all copies.
9: *
10: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17: */
18:
19: #include <sys/cdefs.h>
20: #include <sys/param.h>
21: #include <sys/time.h>
22: #include <sys/socket.h>
23: #include <sys/file.h>
24: #include <sys/ioctl.h>
25:
26: #include <net/if.h>
27:
28: #include <netinet/in.h>
29: #include <netinet/in_systm.h>
30: #include <netinet/if_ether.h>
31:
32: #include <net80211/ieee80211.h>
33: #include <net80211/ieee80211_ioctl.h>
34:
1.4 ray 35: #include <err.h>
1.1 reyk 36: #include <stdio.h>
37: #include <string.h>
38: #include <unistd.h>
39: #include "netstat.h"
40:
41: /*
42: * Dump IEEE802.11 per-interface statistics
43: */
44: void
45: net80211_ifstats(char *ifname)
46: {
47: struct ifreq ifr;
48: struct ieee80211_stats stats;
49: int s;
50:
51: #define p(f, m) printf(m, (unsigned long)stats.f, plural(stats.f))
52:
1.2 reyk 53: if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
54: err(1, "socket(AF_INET)");
1.1 reyk 55:
56: ifr.ifr_data = (caddr_t)&stats;
57: strlcpy(ifr.ifr_name, ifname, sizeof ifr.ifr_name);
1.2 reyk 58:
59: if (ioctl(s, SIOCG80211STATS, &ifr) < 0)
60: err(1, "ioctl(SIOCG80211STATS)");
61:
1.1 reyk 62: printf("ieee80211 on %s:\n", ifr.ifr_name);
63:
64: p(is_rx_badversion, "\t%lu input packet%s with bad version\n");
65: p(is_rx_tooshort, "\t%lu input packet%s too short\n");
66: p(is_rx_wrongbss, "\t%lu input packet%s from wrong bssid\n");
67: p(is_rx_dup, "\t%lu input packet duplicate%s discarded\n");
68: p(is_rx_wrongdir, "\t%lu input packet%s with wrong direction\n");
69: p(is_rx_mcastecho, "\t%lu input multicast echo packet%s discarded\n");
70: p(is_rx_notassoc, "\t%lu input packet%s from unassociated station discarded\n");
1.6 jcs 71: p(is_rx_nowep, "\t%lu input encrypted packet%s without wep/wpa config discarded\n");
72: p(is_rx_unencrypted, "\t%lu input unencrypted packet%s with wep/wpa config discarded\n");
73: p(is_rx_wepfail, "\t%lu input wep/wpa packet%s processing failed\n");
1.1 reyk 74: p(is_rx_decap, "\t%lu input packet decapsulation%s failed\n");
75: p(is_rx_mgtdiscard, "\t%lu input management packet%s discarded\n");
76: p(is_rx_ctl, "\t%lu input control packet%s discarded\n");
77: p(is_rx_rstoobig, "\t%lu input packet%s with truncated rate set\n");
78: p(is_rx_elem_missing, "\t%lu input packet%s with missing elements\n");
79: p(is_rx_elem_toobig, "\t%lu input packet%s with elements too big\n");
80: p(is_rx_elem_toosmall, "\t%lu input packet%s with elements too small\n");
81: p(is_rx_badchan, "\t%lu input packet%s with invalid channel\n");
82: p(is_rx_chanmismatch, "\t%lu input packet%s with mismatched channel\n");
83: p(is_rx_nodealloc, "\t%lu input packet%s dropped\n");
84: p(is_rx_ssidmismatch, "\t%lu input packet%s with mismatched ssid\n");
85: p(is_rx_auth_unsupported, "\t%lu input packet%s with unsupported auth algorithm\n");
86: p(is_rx_auth_fail, "\t%lu input authentication%s failed\n");
87: p(is_rx_assoc_bss, "\t%lu input association%s from wrong bssid\n");
88: p(is_rx_assoc_notauth, "\t%lu input association%s without authentication\n");
89: p(is_rx_assoc_capmismatch, "\t%lu input association%s with mismatched capabilities\n");
90: p(is_rx_assoc_norate, "\t%lu input association%s without matching rates\n");
1.6 jcs 91: p(is_rx_assoc_badrsnie, "\t%lu input association%s with bad rsn ie\n");
1.1 reyk 92: p(is_rx_deauth, "\t%lu input deauthentication packet%s\n");
93: p(is_rx_disassoc, "\t%lu input disassociation packet%s\n");
94: p(is_rx_badsubtype, "\t%lu input packet%s with unknown subtype\n");
95: p(is_rx_nombuf, "\t%lu input packet%s failed for lack of mbufs\n");
96: p(is_rx_decryptcrc, "\t%lu input decryption%s failed on crc\n");
97: p(is_rx_ahdemo_mgt, "\t%lu input ahdemo management packet%s discarded\n");
98: p(is_rx_bad_auth, "\t%lu input packet%s with bad auth request\n");
1.6 jcs 99: p(is_rx_eapol_key, "\t%lu input eapol-key packet%s\n");
100: p(is_rx_eapol_badmic, "\t%lu input eapol-key packet%s with bad mic\n");
101: p(is_rx_eapol_replay, "\t%lu input eapol-key packet%s replayed\n");
102: p(is_rx_locmicfail, "\t%lu input packet%s with bad tkip mic\n");
103: p(is_rx_remmicfail, "\t%lu input tkip mic failure notification%s\n");
104: p(is_rx_unauth, "\t%lu input packet%s on unauthenticated port\n");
1.1 reyk 105: p(is_tx_nombuf, "\t%lu output packet%s failed for lack of mbufs\n");
106: p(is_tx_nonode, "\t%lu output packet%s failed for no nodes\n");
107: p(is_tx_unknownmgt, "\t%lu output packet%s of unknown management type\n");
1.6 jcs 108: p(is_tx_noauth, "\t%lu output packet%s on unauthenticated port\n");
1.1 reyk 109: p(is_scan_active, "\t%lu active scan%s started\n");
110: p(is_scan_passive, "\t%lu passive scan%s started\n");
111: p(is_node_timeout, "\t%lu node%s timed out\n");
112: p(is_crypto_nomem, "\t%lu failure%s with no memory for crypto ctx\n");
1.6 jcs 113: p(is_ccmp_dec_errs, "\t%lu ccmp decryption error%s\n");
114: p(is_ccmp_replays, "\t%lu ccmp replayed frame%s \n");
115: p(is_cmac_icv_errs, "\t%lu cmac icv error%s\n");
116: p(is_cmac_replays, "\t%lu cmac replayed frame%s\n");
117: p(is_tkip_icv_errs, "\t%lu tkip icv error%s\n");
118: p(is_tkip_replays, "\t%lu tkip replay%s\n");
1.1 reyk 119:
120: close(s);
121:
122: #undef p
123: }