📄 driver_test.c
字号:
/* * WPA Supplicant - testing driver interface * Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#include "includes.h"#include <sys/un.h>#include <dirent.h>#include <sys/stat.h>#include "common.h"#include "driver.h"#include "wpa_supplicant.h"#include "l2_packet.h"#include "eloop.h"#include "sha1.h"#include "wpa.h"#include "mlme.h"struct wpa_driver_test_data { void *ctx; u8 own_addr[ETH_ALEN]; int test_socket; struct sockaddr_un hostapd_addr; int hostapd_addr_set; char *own_socket_path; char *test_dir; u8 bssid[ETH_ALEN]; u8 ssid[32]; size_t ssid_len;#define MAX_SCAN_RESULTS 30 struct wpa_scan_result scanres[MAX_SCAN_RESULTS]; size_t num_scanres; int use_associnfo; u8 assoc_wpa_ie[80]; size_t assoc_wpa_ie_len; int use_mlme;};static int wpa_driver_test_set_wpa(void *priv, int enabled){ wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); return 0;}static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx){ wpa_printf(MSG_DEBUG, "Scan timeout - try to get results"); wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);}static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv, const char *path){ struct dirent *dent; DIR *dir; struct sockaddr_un addr; dir = opendir(path); if (dir == NULL) return; while ((dent = readdir(dir))) { if (os_strncmp(dent->d_name, "AP-", 3) != 0) continue; wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name); os_memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s", path, dent->d_name); if (sendto(drv->test_socket, "SCAN", 4, 0, (struct sockaddr *) &addr, sizeof(addr)) < 0) { perror("sendto(test_socket)"); } } closedir(dir);}static int wpa_driver_test_scan(void *priv, const u8 *ssid, size_t ssid_len){ struct wpa_driver_test_data *drv = priv; wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); drv->num_scanres = 0; if (drv->test_socket >= 0 && drv->test_dir) wpa_driver_scan_dir(drv, drv->test_dir); if (drv->test_socket >= 0 && drv->hostapd_addr_set && sendto(drv->test_socket, "SCAN", 4, 0, (struct sockaddr *) &drv->hostapd_addr, sizeof(drv->hostapd_addr)) < 0) { perror("sendto(test_socket)"); } eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx); eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv, drv->ctx); return 0;}static int wpa_driver_test_get_scan_results(void *priv, struct wpa_scan_result *results, size_t max_size){ struct wpa_driver_test_data *drv = priv; size_t num = drv->num_scanres; if (num > max_size) num = max_size; os_memcpy(results, &drv->scanres, num * sizeof(struct wpa_scan_result)); return num;}static int wpa_driver_test_set_key(void *priv, wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len){ wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", __func__, priv, alg, key_idx, set_tx); if (addr) { wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr)); } if (seq) { wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len); } if (key) { wpa_hexdump(MSG_DEBUG, " key", key, key_len); } return 0;}static int wpa_driver_test_associate( void *priv, struct wpa_driver_associate_params *params){ struct wpa_driver_test_data *drv = priv; wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d " "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d", __func__, priv, params->freq, params->pairwise_suite, params->group_suite, params->key_mgmt_suite, params->auth_alg, params->mode); if (params->bssid) { wpa_printf(MSG_DEBUG, " bssid=" MACSTR, MAC2STR(params->bssid)); } if (params->ssid) { wpa_hexdump_ascii(MSG_DEBUG, " ssid", params->ssid, params->ssid_len); } if (params->wpa_ie) { wpa_hexdump(MSG_DEBUG, " wpa_ie", params->wpa_ie, params->wpa_ie_len); drv->assoc_wpa_ie_len = params->wpa_ie_len; if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie)) drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie); os_memcpy(drv->assoc_wpa_ie, params->wpa_ie, drv->assoc_wpa_ie_len); } else drv->assoc_wpa_ie_len = 0; if (drv->test_dir && params->bssid) { os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr)); drv->hostapd_addr.sun_family = AF_UNIX; os_snprintf(drv->hostapd_addr.sun_path, sizeof(drv->hostapd_addr.sun_path), "%s/AP-" MACSTR, drv->test_dir, MAC2STR(params->bssid)); drv->hostapd_addr_set = 1; } if (drv->test_socket >= 0 && drv->hostapd_addr_set) { char cmd[200], *pos, *end; int ret; end = cmd + sizeof(cmd); pos = cmd; ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ", MAC2STR(drv->own_addr)); if (ret >= 0 && ret < end - pos) pos += ret; pos += wpa_snprintf_hex(pos, end - pos, params->ssid, params->ssid_len); ret = os_snprintf(pos, end - pos, " "); if (ret >= 0 && ret < end - pos) pos += ret; pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie, params->wpa_ie_len); end[-1] = '\0'; if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0, (struct sockaddr *) &drv->hostapd_addr, sizeof(drv->hostapd_addr)) < 0) { perror("sendto(test_socket)"); return -1; } os_memcpy(drv->ssid, params->ssid, params->ssid_len); drv->ssid_len = params->ssid_len; } else wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL); return 0;}static int wpa_driver_test_get_bssid(void *priv, u8 *bssid){ struct wpa_driver_test_data *drv = priv; os_memcpy(bssid, drv->bssid, ETH_ALEN); return 0;}static int wpa_driver_test_get_ssid(void *priv, u8 *ssid){ struct wpa_driver_test_data *drv = priv; os_memcpy(ssid, drv->ssid, 32); return drv->ssid_len;}static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv){ if (drv->test_socket >= 0 && sendto(drv->test_socket, "DISASSOC", 8, 0, (struct sockaddr *) &drv->hostapd_addr, sizeof(drv->hostapd_addr)) < 0) { perror("sendto(test_socket)"); return -1; } return 0;}static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr, int reason_code){ struct wpa_driver_test_data *drv = priv; wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d", __func__, MAC2STR(addr), reason_code); os_memset(drv->bssid, 0, ETH_ALEN); wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL); return wpa_driver_test_send_disassoc(drv);}static int wpa_driver_test_disassociate(void *priv, const u8 *addr, int reason_code){ struct wpa_driver_test_data *drv = priv; wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d", __func__, MAC2STR(addr), reason_code); os_memset(drv->bssid, 0, ETH_ALEN); wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL); return wpa_driver_test_send_disassoc(drv);}static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, const char *data){ struct wpa_scan_result *res; const char *pos, *pos2; size_t len; u8 ie[200], *ipos, *end; wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data); if (drv->num_scanres >= MAX_SCAN_RESULTS) { wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan " "result"); return; } /* SCANRESP BSSID SSID IEs */ res = &drv->scanres[drv->num_scanres]; os_memset(res, 0, sizeof(*res)); if (hwaddr_aton(data, res->bssid)) { wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres"); return; } pos = data + 17; while (*pos == ' ') pos++; pos2 = os_strchr(pos, ' '); if (pos2 == NULL) { wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination " "in scanres"); return; } len = (pos2 - pos) / 2; if (len > sizeof(res->ssid)) len = sizeof(res->ssid); if (hexstr2bin(pos, res->ssid, len) < 0) { wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres"); return; } res->ssid_len = len; pos = pos2 + 1; pos2 = os_strchr(pos, ' '); if (pos2 == NULL) len = os_strlen(pos) / 2; else len = (pos2 - pos) / 2; if (len > sizeof(ie)) len = sizeof(ie); if (hexstr2bin(pos, ie, len) < 0) { wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres"); return; } ipos = ie; end = ipos + len; while (ipos + 1 < end && ipos + 2 + ipos[1] <= end) { len = 2 + ipos[1]; if (len > SSID_MAX_WPA_IE_LEN) len = SSID_MAX_WPA_IE_LEN; if (ipos[0] == RSN_INFO_ELEM) { os_memcpy(res->rsn_ie, ipos, len); res->rsn_ie_len = len; } else if (ipos[0] == GENERIC_INFO_ELEM) { os_memcpy(res->wpa_ie, ipos, len); res->wpa_ie_len = len; } ipos += 2 + ipos[1]; } if (pos2) { pos = pos2 + 1; while (*pos == ' ') pos++; if (os_strncmp(pos, "PRIVACY", 7) == 0) res->caps |= IEEE80211_CAP_PRIVACY; } drv->num_scanres++;}static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, const char *data){ /* ASSOCRESP BSSID <res> */ if (hwaddr_aton(data, drv->bssid)) { wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in " "assocresp"); } if (drv->use_associnfo) { union wpa_event_data event; os_memset(&event, 0, sizeof(event)); event.assoc_info.req_ies = drv->assoc_wpa_ie; event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len; wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event); } wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);}static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen){ wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);}static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, const u8 *data, size_t data_len){ const u8 *src = drv->bssid; if (data_len > 14) { /* Skip Ethernet header */ src = data + ETH_ALEN; data += 14; data_len -= 14; } wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len);}static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, const u8 *data, size_t data_len){ struct ieee80211_rx_status rx_status; os_memset(&rx_status, 0, sizeof(rx_status)); ieee80211_sta_rx(drv->ctx, data, data_len, &rx_status);}static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx, void *sock_ctx){ struct wpa_driver_test_data *drv = eloop_ctx; char *buf; int res; struct sockaddr_un from; socklen_t fromlen = sizeof(from); const size_t buflen = 2000; buf = os_malloc(buflen); if (buf == NULL) return; res = recvfrom(sock, buf, buflen - 1, 0, (struct sockaddr *) &from, &fromlen); if (res < 0) { perror("recvfrom(test_socket)"); os_free(buf); return; } buf[res] = '\0'; wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res); if (os_strncmp(buf, "SCANRESP ", 9) == 0) { wpa_driver_test_scanresp(drv, &from, fromlen, buf + 9); } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) { wpa_driver_test_assocresp(drv, &from, fromlen, buf + 10); } else if (os_strcmp(buf, "DISASSOC") == 0) { wpa_driver_test_disassoc(drv, &from, fromlen); } else if (os_strcmp(buf, "DEAUTH") == 0) { wpa_driver_test_disassoc(drv, &from, fromlen); } else if (os_strncmp(buf, "EAPOL ", 6) == 0) { wpa_driver_test_eapol(drv, &from, fromlen, (const u8 *) buf + 6, res - 6); } else if (os_strncmp(buf, "MLME ", 5) == 0) { wpa_driver_test_mlme(drv, &from, fromlen, (const u8 *) buf + 5, res - 5); } else { wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command", (u8 *) buf, res); } os_free(buf);}static void * wpa_driver_test_init(void *ctx, const char *ifname){
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -