+ /* maybe there is offset to the actual ieee802.11 frame,
+ for example prism header ...
+ in that case, hack the source! */
+ if(info->mode&MODE_IEEE80211) {
+ package=(unsigned char *)pkg;
+ prismhdr=NULL;
+ }
+ else if(info->mode&MODE_PRISM) {
+ package=(unsigned char *)pkg+sizeof(t_prism_hdr);
+ prismhdr=(t_prism_hdr *)pkg;
+ }
+
+ /* management */
+ if(FCTL_TYPE(package[0])==FCTL_TYPE_MGMT) {
+ info->count_m++;
+
+ /* beacon frames */
+ if(FCTL_STYPE(package[0])==FCTL_STYPE_BEACON) {
+ f3hdr=(t_frame3_hdr *)package;
+ beacon_fb=(t_beacon_fb *)(package+sizeof(t_frame3_hdr));
+ // check sta
+ memcpy(new_sta.addr,f3hdr->addr2,ADDR_LEN);
+ ret=list_search_data(&(info->sniffed_sta),&new_sta,ADDR_LEN);
+ if((ret==L_EMPTY_LIST)|(ret==L_NO_SUCH_ELEMENT)) {
+ list_add_element(&(info->sniffed_sta),&new_sta,sizeof(t_sta));
+ sta=(t_sta *)info->sniffed_sta.current->data;
+ new=1;
+ }
+ else sta=(t_sta *)info->sniffed_sta.current->data;
+ // fill in stuff ...
+ memcpy(sta->ssid,beacon_fb->ssid,beacon_fb->ssid_length);
+ if((CAP_INFO_ESS(beacon_fb->cap_info))&
+ (CAP_INFO_IBSS(beacon_fb->cap_info)==0)) sta->ap=AP;
+ if(CAP_INFO_PRIVACY(beacon_fb->cap_info)) sta->wep=WEP;
+ sta->count_mgmt++;
+ switch_active_state(&(sta->active));
+ if(info->mode&MODE_IEEE80211) sta->sq=0;
+ else if(info->mode&MODE_PRISM)
+ sta->sq=(prismhdr->signal.data)-(prismhdr->noise.data);
+ strncpy(string,"last: beacon, source: ",MESSAGE_MAX);
+ for(i=0;i<ADDR_LEN;i++)
+ snprintf(&string[22+3*i],4,"%02x%c",sta->addr[i],
+ (i==ADDR_LEN-1)?'.':':');
+ string[22+3*ADDR_LEN+1]=0;
+ display_console(info,string);
+ if(new) {
+ snprintf(sc,MAX_SYSCALL_CHARS,
+ "flite 'access point found: %s'",
+ sta->ssid);
+ system(sc);
+ if(sta->wep&WEP) strncpy(sc,"flite ' crypted'",MAX_SYSCALL_CHARS);
+ else strncpy(sc,"flite 'not crypted'",MAX_SYSCALL_CHARS);
+ system(sc);
+ }
+ }
+
+ }
+
+ /* control */
+ else if(FCTL_TYPE(package[0])==FCTL_TYPE_CTRL) {
+ info->count_c++;
+ display_console(info,"last: got control frame");
+ }