1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
|
/* $OpenBSD: net80211.c,v 1.17 2016/08/27 04:13:43 guenther Exp $ */
/*
* Copyright (c) 2005 Reyk Floeter <reyk@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <sys/types.h>
#include <sys/time.h>
#include <sys/select.h>
#include <sys/socket.h>
#include <sys/file.h>
#include <sys/ioctl.h>
#include <net/if.h>
#include <netinet/in.h>
#include <netinet/if_ether.h>
#include <net80211/ieee80211.h>
#include <net80211/ieee80211_ioctl.h>
#include <err.h>
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include "netstat.h"
/*
* Dump IEEE802.11 per-interface statistics
*/
void
net80211_ifstats(char *ifname)
{
struct ifreq ifr;
struct ieee80211_stats stats;
int s;
#define p(f, m) printf(m, (unsigned long)stats.f, plural(stats.f))
if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
err(1, "socket(AF_INET)");
ifr.ifr_data = (caddr_t)&stats;
strlcpy(ifr.ifr_name, ifname, sizeof ifr.ifr_name);
if (ioctl(s, SIOCG80211STATS, &ifr) < 0)
err(1, "ioctl(SIOCG80211STATS)");
printf("ieee80211 on %s:\n", ifr.ifr_name);
p(is_rx_badversion, "\t%lu input packet%s with bad version\n");
p(is_rx_tooshort, "\t%lu input packet%s too short\n");
p(is_rx_wrongbss, "\t%lu input packet%s from wrong bssid\n");
p(is_rx_dup, "\t%lu input packet duplicate%s discarded\n");
p(is_rx_wrongdir, "\t%lu input packet%s with wrong direction\n");
p(is_rx_mcastecho, "\t%lu input multicast echo packet%s discarded\n");
p(is_rx_notassoc, "\t%lu input packet%s from unassociated station discarded\n");
p(is_rx_nowep, "\t%lu input encrypted packet%s without wep/wpa config discarded\n");
p(is_rx_unencrypted, "\t%lu input unencrypted packet%s with wep/wpa config discarded\n");
p(is_rx_wepfail, "\t%lu input wep/wpa packet%s processing failed\n");
p(is_rx_decap, "\t%lu input packet decapsulation%s failed\n");
p(is_rx_mgtdiscard, "\t%lu input management packet%s discarded\n");
p(is_rx_ctl, "\t%lu input control packet%s discarded\n");
p(is_rx_rstoobig, "\t%lu input packet%s with truncated rate set\n");
p(is_rx_elem_missing, "\t%lu input packet%s with missing elements\n");
p(is_rx_elem_toobig, "\t%lu input packet%s with elements too big\n");
p(is_rx_elem_toosmall, "\t%lu input packet%s with elements too small\n");
p(is_rx_badchan, "\t%lu input packet%s with invalid channel\n");
p(is_rx_chanmismatch, "\t%lu input packet%s with mismatched channel\n");
p(is_rx_nodealloc, "\t%lu node allocation%s failed\n");
p(is_rx_ssidmismatch, "\t%lu input packet%s with mismatched ssid\n");
p(is_rx_auth_unsupported, "\t%lu input packet%s with unsupported auth algorithm\n");
p(is_rx_auth_fail, "\t%lu input authentication%s failed\n");
p(is_rx_assoc_bss, "\t%lu input association%s from wrong bssid\n");
p(is_rx_assoc_notauth, "\t%lu input association%s without authentication\n");
p(is_rx_assoc_capmismatch, "\t%lu input association%s with mismatched capabilities\n");
p(is_rx_assoc_norate, "\t%lu input association%s without matching rates\n");
p(is_rx_assoc_badrsnie, "\t%lu input association%s with bad rsn ie\n");
p(is_rx_deauth, "\t%lu input deauthentication packet%s\n");
p(is_rx_disassoc, "\t%lu input disassociation packet%s\n");
p(is_rx_badsubtype, "\t%lu input packet%s with unknown subtype\n");
p(is_rx_nombuf, "\t%lu input packet%s failed for lack of mbufs\n");
p(is_rx_decryptcrc, "\t%lu input decryption%s failed on crc\n");
p(is_rx_ahdemo_mgt, "\t%lu input ahdemo management packet%s discarded\n");
p(is_rx_bad_auth, "\t%lu input packet%s with bad auth request\n");
p(is_rx_eapol_key, "\t%lu input eapol-key packet%s\n");
p(is_rx_eapol_badmic, "\t%lu input eapol-key packet%s with bad mic\n");
p(is_rx_eapol_replay, "\t%lu input eapol-key packet%s replayed\n");
p(is_rx_locmicfail, "\t%lu input packet%s with bad tkip mic\n");
p(is_rx_remmicfail, "\t%lu input tkip mic failure notification%s\n");
p(is_rx_unauth, "\t%lu input packet%s on unauthenticated port\n");
p(is_tx_nombuf, "\t%lu output packet%s failed for lack of mbufs\n");
p(is_tx_nonode, "\t%lu output packet%s failed for no nodes\n");
p(is_tx_unknownmgt, "\t%lu output packet%s of unknown management type\n");
p(is_tx_noauth, "\t%lu output packet%s on unauthenticated port\n");
p(is_scan_active, "\t%lu active scan%s started\n");
p(is_scan_passive, "\t%lu passive scan%s started\n");
p(is_node_timeout, "\t%lu node%s timed out\n");
p(is_crypto_nomem, "\t%lu failure%s with no memory for crypto ctx\n");
p(is_ccmp_dec_errs, "\t%lu ccmp decryption error%s\n");
p(is_ccmp_replays, "\t%lu ccmp replayed frame%s \n");
p(is_cmac_icv_errs, "\t%lu cmac icv error%s\n");
p(is_cmac_replays, "\t%lu cmac replayed frame%s\n");
p(is_tkip_icv_errs, "\t%lu tkip icv error%s\n");
p(is_tkip_replays, "\t%lu tkip replay%s\n");
p(is_pbac_errs, "\t%lu pbac error%s\n");
p(is_ht_nego_no_mandatory_mcs, "\t%lu HT negotiation failure%s because "
"peer does not support MCS 0-7\n");
p(is_ht_nego_no_basic_mcs, "\t%lu HT negotiation failure%s because "
"we do not support basic MCS set\n");
p(is_ht_nego_bad_crypto,
"\t%lu HT negotiation failure%s because peer uses bad crypto\n");
p(is_ht_prot_change, "\t%lu HT protection change%s\n");
p(is_ht_rx_ba_agreements, "\t%lu new input block ack agreement%s\n");
p(is_ht_tx_ba_agreements, "\t%lu new output block ack agreement%s\n");
p(is_ht_rx_frame_below_ba_winstart,
"\t%lu input frame%s below block ack window start\n");
p(is_ht_rx_frame_above_ba_winend,
"\t%lu input frame%s above block ack window end\n");
p(is_ht_rx_ba_window_slide, "\t%lu input block ack window slide%s\n");
p(is_ht_rx_ba_window_jump, "\t%lu input block ack window jump%s\n");
p(is_ht_rx_ba_no_buf, "\t%lu duplicate input block ack frame%s\n");
p(is_ht_rx_ba_frame_lost,
"\t%lu expected input block ack frame%s never arrived\n");
p(is_ht_rx_ba_window_gap_timeout,
"\t%lu input block ack window gap%s timed out\n");
p(is_ht_rx_ba_timeout,
"\t%lu input block ack agreement%s timed out\n");
p(is_ht_tx_ba_timeout,
"\t%lu output block ack agreement%s timed out\n");
close(s);
#undef p
}
|