Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / wlantest / wlantest.c
1 /*
2  * wlantest - IEEE 802.11 protocol monitoring and testing tool
3  * Copyright (c) 2010-2015, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "wlantest.h"
14
15
16 static void wlantest_terminate(int sig, void *signal_ctx)
17 {
18         eloop_terminate();
19 }
20
21
22 static void usage(void)
23 {
24         printf("wlantest [-cddhqqFt] [-i<ifname>] [-r<pcap file>] "
25                "[-p<passphrase>]\n"
26                "         [-I<wired ifname>] [-R<wired pcap file>] "
27                "[-P<RADIUS shared secret>]\n"
28                "         [-n<write pcapng file>]\n"
29                "         [-w<write pcap file>] [-f<MSK/PMK file>]\n"
30                "         [-L<log file>] [-T<PTK file>]\n");
31 }
32
33
34 static void passphrase_deinit(struct wlantest_passphrase *p)
35 {
36         dl_list_del(&p->list);
37         os_free(p);
38 }
39
40
41 static void secret_deinit(struct wlantest_radius_secret *r)
42 {
43         dl_list_del(&r->list);
44         os_free(r);
45 }
46
47
48 static void wlantest_init(struct wlantest *wt)
49 {
50         int i;
51         os_memset(wt, 0, sizeof(*wt));
52         wt->monitor_sock = -1;
53         wt->ctrl_sock = -1;
54         for (i = 0; i < MAX_CTRL_CONNECTIONS; i++)
55                 wt->ctrl_socks[i] = -1;
56         dl_list_init(&wt->passphrase);
57         dl_list_init(&wt->bss);
58         dl_list_init(&wt->secret);
59         dl_list_init(&wt->radius);
60         dl_list_init(&wt->pmk);
61         dl_list_init(&wt->ptk);
62         dl_list_init(&wt->wep);
63 }
64
65
66 void radius_deinit(struct wlantest_radius *r)
67 {
68         dl_list_del(&r->list);
69         os_free(r);
70 }
71
72
73 static void ptk_deinit(struct wlantest_ptk *ptk)
74 {
75         dl_list_del(&ptk->list);
76         os_free(ptk);
77 }
78
79
80 static void wlantest_deinit(struct wlantest *wt)
81 {
82         struct wlantest_passphrase *p, *pn;
83         struct wlantest_radius_secret *s, *sn;
84         struct wlantest_radius *r, *rn;
85         struct wlantest_pmk *pmk, *np;
86         struct wlantest_ptk *ptk, *npt;
87         struct wlantest_wep *wep, *nw;
88
89         if (wt->ctrl_sock >= 0)
90                 ctrl_deinit(wt);
91         if (wt->monitor_sock >= 0)
92                 monitor_deinit(wt);
93         bss_flush(wt);
94         dl_list_for_each_safe(p, pn, &wt->passphrase,
95                               struct wlantest_passphrase, list)
96                 passphrase_deinit(p);
97         dl_list_for_each_safe(s, sn, &wt->secret,
98                               struct wlantest_radius_secret, list)
99                 secret_deinit(s);
100         dl_list_for_each_safe(r, rn, &wt->radius, struct wlantest_radius, list)
101                 radius_deinit(r);
102         dl_list_for_each_safe(pmk, np, &wt->pmk, struct wlantest_pmk, list)
103                 pmk_deinit(pmk);
104         dl_list_for_each_safe(ptk, npt, &wt->ptk, struct wlantest_ptk, list)
105                 ptk_deinit(ptk);
106         dl_list_for_each_safe(wep, nw, &wt->wep, struct wlantest_wep, list)
107                 os_free(wep);
108         write_pcap_deinit(wt);
109         write_pcapng_deinit(wt);
110         clear_notes(wt);
111         os_free(wt->decrypted);
112         wt->decrypted = NULL;
113 }
114
115
116 static void add_passphrase(struct wlantest *wt, const char *passphrase)
117 {
118         struct wlantest_passphrase *p;
119         size_t len = os_strlen(passphrase);
120
121         if (len < 8 || len > 63)
122                 return;
123         p = os_zalloc(sizeof(*p));
124         if (p == NULL)
125                 return;
126         os_memcpy(p->passphrase, passphrase, len);
127         dl_list_add(&wt->passphrase, &p->list);
128 }
129
130
131 static void add_secret(struct wlantest *wt, const char *secret)
132 {
133         struct wlantest_radius_secret *s;
134         size_t len = os_strlen(secret);
135
136         if (len >= MAX_RADIUS_SECRET_LEN)
137                 return;
138         s = os_zalloc(sizeof(*s));
139         if (s == NULL)
140                 return;
141         os_memcpy(s->secret, secret, len);
142         dl_list_add(&wt->secret, &s->list);
143 }
144
145
146 static int add_pmk_file(struct wlantest *wt, const char *pmk_file)
147 {
148         FILE *f;
149         u8 pmk[32];
150         char buf[300], *pos;
151         struct wlantest_pmk *p;
152
153         f = fopen(pmk_file, "r");
154         if (f == NULL) {
155                 wpa_printf(MSG_ERROR, "Could not open '%s'", pmk_file);
156                 return -1;
157         }
158
159         while (fgets(buf, sizeof(buf), f)) {
160                 pos = buf;
161                 while (*pos && *pos != '\r' && *pos != '\n')
162                         pos++;
163                 *pos = '\0';
164                 if (pos - buf < 2 * 32)
165                         continue;
166                 if (hexstr2bin(buf, pmk, 32) < 0)
167                         continue;
168                 p = os_zalloc(sizeof(*p));
169                 if (p == NULL)
170                         break;
171                 os_memcpy(p->pmk, pmk, 32);
172                 dl_list_add(&wt->pmk, &p->list);
173                 wpa_hexdump(MSG_DEBUG, "Added PMK from file", pmk, 32);
174         }
175
176         fclose(f);
177         return 0;
178 }
179
180
181 static int add_ptk_file(struct wlantest *wt, const char *ptk_file)
182 {
183         FILE *f;
184         u8 ptk[64];
185         size_t ptk_len;
186         char buf[300], *pos;
187         struct wlantest_ptk *p;
188
189         f = fopen(ptk_file, "r");
190         if (f == NULL) {
191                 wpa_printf(MSG_ERROR, "Could not open '%s'", ptk_file);
192                 return -1;
193         }
194
195         while (fgets(buf, sizeof(buf), f)) {
196                 pos = buf;
197                 while (*pos && *pos != '\r' && *pos != '\n')
198                         pos++;
199                 *pos = '\0';
200                 ptk_len = pos - buf;
201                 if (ptk_len & 1)
202                         continue;
203                 ptk_len /= 2;
204                 if (ptk_len != 16 && ptk_len != 32 &&
205                     ptk_len != 48 && ptk_len != 64)
206                         continue;
207                 if (hexstr2bin(buf, ptk, ptk_len) < 0)
208                         continue;
209                 p = os_zalloc(sizeof(*p));
210                 if (p == NULL)
211                         break;
212                 if (ptk_len < 48) {
213                         os_memcpy(p->ptk.tk, ptk, ptk_len);
214                         p->ptk.tk_len = ptk_len;
215                         p->ptk_len = 32 + ptk_len;
216                 } else {
217                         os_memcpy(p->ptk.kck, ptk, 16);
218                         p->ptk.kck_len = 16;
219                         os_memcpy(p->ptk.kek, ptk + 16, 16);
220                         p->ptk.kek_len = 16;
221                         os_memcpy(p->ptk.tk, ptk + 32, ptk_len - 32);
222                         p->ptk.tk_len = ptk_len - 32;
223                         p->ptk_len = ptk_len;
224                 }
225                 dl_list_add(&wt->ptk, &p->list);
226                 wpa_hexdump(MSG_DEBUG, "Added PTK from file", ptk, ptk_len);
227         }
228
229         fclose(f);
230         return 0;
231 }
232
233
234 int add_wep(struct wlantest *wt, const char *key)
235 {
236         struct wlantest_wep *w;
237         size_t len = os_strlen(key);
238
239         if (len != 2 * 5 && len != 2 * 13) {
240                 wpa_printf(MSG_INFO, "Invalid WEP key '%s'", key);
241                 return -1;
242         }
243         w = os_zalloc(sizeof(*w));
244         if (w == NULL)
245                 return -1;
246         if (hexstr2bin(key, w->key, len / 2) < 0) {
247                 os_free(w);
248                 wpa_printf(MSG_INFO, "Invalid WEP key '%s'", key);
249                 return -1;
250         }
251         w->key_len = len / 2;
252         dl_list_add(&wt->wep, &w->list);
253         return 0;
254 }
255
256
257 void add_note(struct wlantest *wt, int level, const char *fmt, ...)
258 {
259         va_list ap;
260         size_t len = 1000;
261         int wlen;
262
263         if (wt->num_notes == MAX_NOTES)
264                 return;
265
266         wt->notes[wt->num_notes] = os_malloc(len);
267         if (wt->notes[wt->num_notes] == NULL)
268                 return;
269         va_start(ap, fmt);
270         wlen = vsnprintf(wt->notes[wt->num_notes], len, fmt, ap);
271         va_end(ap);
272         if (wlen < 0) {
273                 os_free(wt->notes[wt->num_notes]);
274                 wt->notes[wt->num_notes] = NULL;
275                 return;
276         }
277         if (wlen >= len)
278                 wt->notes[wt->num_notes][len - 1] = '\0';
279         wpa_printf(level, "%s", wt->notes[wt->num_notes]);
280         wt->num_notes++;
281 }
282
283
284 void clear_notes(struct wlantest *wt)
285 {
286         size_t i;
287
288         for (i = 0; i < wt->num_notes; i++) {
289                 os_free(wt->notes[i]);
290                 wt->notes[i] = NULL;
291         }
292
293         wt->num_notes = 0;
294 }
295
296
297 size_t notes_len(struct wlantest *wt, size_t hdrlen)
298 {
299         size_t i;
300         size_t len = wt->num_notes * hdrlen;
301
302         for (i = 0; i < wt->num_notes; i++)
303                 len += os_strlen(wt->notes[i]);
304
305         return len;
306 }
307
308
309 int wlantest_relog(struct wlantest *wt)
310 {
311         int ret = 0;
312
313         wpa_printf(MSG_INFO, "Re-open log/capture files");
314         if (wpa_debug_reopen_file())
315                 ret = -1;
316
317         if (wt->write_file) {
318                 write_pcap_deinit(wt);
319                 if (write_pcap_init(wt, wt->write_file) < 0)
320                         ret = -1;
321         }
322
323         if (wt->pcapng_file) {
324                 write_pcapng_deinit(wt);
325                 if (write_pcapng_init(wt, wt->pcapng_file) < 0)
326                         ret = -1;
327         }
328
329         return ret;
330 }
331
332
333 int main(int argc, char *argv[])
334 {
335         int c;
336         const char *read_file = NULL;
337         const char *read_wired_file = NULL;
338         const char *ifname = NULL;
339         const char *ifname_wired = NULL;
340         const char *logfile = NULL;
341         struct wlantest wt;
342         int ctrl_iface = 0;
343
344         wpa_debug_level = MSG_INFO;
345         wpa_debug_show_keys = 1;
346
347         if (os_program_init())
348                 return -1;
349
350         wlantest_init(&wt);
351
352         for (;;) {
353                 c = getopt(argc, argv, "cdf:Fhi:I:L:n:p:P:qr:R:tT:w:W:");
354                 if (c < 0)
355                         break;
356                 switch (c) {
357                 case 'c':
358                         ctrl_iface = 1;
359                         break;
360                 case 'd':
361                         if (wpa_debug_level > 0)
362                                 wpa_debug_level--;
363                         break;
364                 case 'f':
365                         if (add_pmk_file(&wt, optarg) < 0)
366                                 return -1;
367                         break;
368                 case 'F':
369                         wt.assume_fcs = 1;
370                         break;
371                 case 'h':
372                         usage();
373                         return 0;
374                 case 'i':
375                         ifname = optarg;
376                         break;
377                 case 'I':
378                         ifname_wired = optarg;
379                         break;
380                 case 'L':
381                         logfile = optarg;
382                         break;
383                 case 'n':
384                         wt.pcapng_file = optarg;
385                         break;
386                 case 'p':
387                         add_passphrase(&wt, optarg);
388                         break;
389                 case 'P':
390                         add_secret(&wt, optarg);
391                         break;
392                 case 'q':
393                         wpa_debug_level++;
394                         break;
395                 case 'r':
396                         read_file = optarg;
397                         break;
398                 case 'R':
399                         read_wired_file = optarg;
400                         break;
401                 case 't':
402                         wpa_debug_timestamp = 1;
403                         break;
404                 case 'T':
405                         if (add_ptk_file(&wt, optarg) < 0)
406                                 return -1;
407                         break;
408                 case 'w':
409                         wt.write_file = optarg;
410                         break;
411                 case 'W':
412                         if (add_wep(&wt, optarg) < 0)
413                                 return -1;
414                         break;
415                 default:
416                         usage();
417                         return -1;
418                 }
419         }
420
421         if (ifname == NULL && ifname_wired == NULL &&
422             read_file == NULL && read_wired_file == NULL) {
423                 usage();
424                 return 0;
425         }
426
427         if (eloop_init())
428                 return -1;
429
430         if (logfile)
431                 wpa_debug_open_file(logfile);
432
433         if (wt.write_file && write_pcap_init(&wt, wt.write_file) < 0)
434                 return -1;
435
436         if (wt.pcapng_file && write_pcapng_init(&wt, wt.pcapng_file) < 0)
437                 return -1;
438
439         if (read_wired_file && read_wired_cap_file(&wt, read_wired_file) < 0)
440                 return -1;
441
442         if (read_file && read_cap_file(&wt, read_file) < 0)
443                 return -1;
444
445         if (ifname && monitor_init(&wt, ifname) < 0)
446                 return -1;
447
448         if (ifname_wired && monitor_init_wired(&wt, ifname_wired) < 0)
449                 return -1;
450
451         if (ctrl_iface && ctrl_init(&wt) < 0)
452                 return -1;
453
454         eloop_register_signal_terminate(wlantest_terminate, &wt);
455
456         eloop_run();
457
458         wpa_printf(MSG_INFO, "Processed: rx_mgmt=%u rx_ctrl=%u rx_data=%u "
459                    "fcs_error=%u",
460                    wt.rx_mgmt, wt.rx_ctrl, wt.rx_data, wt.fcs_error);
461
462         wlantest_deinit(&wt);
463
464         wpa_debug_close_file();
465         eloop_destroy();
466         os_program_deinit();
467
468         return 0;
469 }