ctrl.c 34 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364
  1. /*
  2. * wlantest control interface
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include <sys/un.h>
  10. #include "utils/common.h"
  11. #include "utils/eloop.h"
  12. #include "common/defs.h"
  13. #include "common/version.h"
  14. #include "common/ieee802_11_defs.h"
  15. #include "wlantest.h"
  16. #include "wlantest_ctrl.h"
  17. static u8 * attr_get(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr,
  18. size_t *len)
  19. {
  20. u8 *pos = buf;
  21. while (pos + 8 <= buf + buflen) {
  22. enum wlantest_ctrl_attr a;
  23. size_t alen;
  24. a = WPA_GET_BE32(pos);
  25. pos += 4;
  26. alen = WPA_GET_BE32(pos);
  27. pos += 4;
  28. if (pos + alen > buf + buflen) {
  29. wpa_printf(MSG_DEBUG, "Invalid control message "
  30. "attribute");
  31. return NULL;
  32. }
  33. if (a == attr) {
  34. *len = alen;
  35. return pos;
  36. }
  37. pos += alen;
  38. }
  39. return NULL;
  40. }
  41. static u8 * attr_get_macaddr(u8 *buf, size_t buflen,
  42. enum wlantest_ctrl_attr attr)
  43. {
  44. u8 *addr;
  45. size_t addr_len;
  46. addr = attr_get(buf, buflen, attr, &addr_len);
  47. if (addr && addr_len != ETH_ALEN)
  48. addr = NULL;
  49. return addr;
  50. }
  51. static int attr_get_int(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr)
  52. {
  53. u8 *pos;
  54. size_t len;
  55. pos = attr_get(buf, buflen, attr, &len);
  56. if (pos == NULL || len != 4)
  57. return -1;
  58. return WPA_GET_BE32(pos);
  59. }
  60. static u8 * attr_add_str(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  61. const char *str)
  62. {
  63. size_t len = os_strlen(str);
  64. if (pos == NULL || end - pos < 8 + len)
  65. return NULL;
  66. WPA_PUT_BE32(pos, attr);
  67. pos += 4;
  68. WPA_PUT_BE32(pos, len);
  69. pos += 4;
  70. os_memcpy(pos, str, len);
  71. pos += len;
  72. return pos;
  73. }
  74. static u8 * attr_add_be32(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  75. u32 val)
  76. {
  77. if (pos == NULL || end - pos < 12)
  78. return NULL;
  79. WPA_PUT_BE32(pos, attr);
  80. pos += 4;
  81. WPA_PUT_BE32(pos, 4);
  82. pos += 4;
  83. WPA_PUT_BE32(pos, val);
  84. pos += 4;
  85. return pos;
  86. }
  87. static void ctrl_disconnect(struct wlantest *wt, int sock)
  88. {
  89. int i;
  90. wpa_printf(MSG_DEBUG, "Disconnect control interface connection %d",
  91. sock);
  92. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  93. if (wt->ctrl_socks[i] == sock) {
  94. close(wt->ctrl_socks[i]);
  95. eloop_unregister_read_sock(wt->ctrl_socks[i]);
  96. wt->ctrl_socks[i] = -1;
  97. break;
  98. }
  99. }
  100. }
  101. static void ctrl_send(struct wlantest *wt, int sock, const u8 *buf,
  102. size_t len)
  103. {
  104. if (send(sock, buf, len, 0) < 0) {
  105. wpa_printf(MSG_INFO, "send(ctrl): %s", strerror(errno));
  106. ctrl_disconnect(wt, sock);
  107. }
  108. }
  109. static void ctrl_send_simple(struct wlantest *wt, int sock,
  110. enum wlantest_ctrl_cmd cmd)
  111. {
  112. u8 buf[4];
  113. WPA_PUT_BE32(buf, cmd);
  114. ctrl_send(wt, sock, buf, sizeof(buf));
  115. }
  116. static struct wlantest_bss * ctrl_get_bss(struct wlantest *wt, int sock,
  117. u8 *cmd, size_t clen)
  118. {
  119. struct wlantest_bss *bss;
  120. u8 *pos;
  121. size_t len;
  122. pos = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &len);
  123. if (pos == NULL || len != ETH_ALEN) {
  124. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  125. return NULL;
  126. }
  127. bss = bss_find(wt, pos);
  128. if (bss == NULL) {
  129. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  130. return NULL;
  131. }
  132. return bss;
  133. }
  134. static struct wlantest_sta * ctrl_get_sta(struct wlantest *wt, int sock,
  135. u8 *cmd, size_t clen,
  136. struct wlantest_bss *bss)
  137. {
  138. struct wlantest_sta *sta;
  139. u8 *pos;
  140. size_t len;
  141. if (bss == NULL)
  142. return NULL;
  143. pos = attr_get(cmd, clen, WLANTEST_ATTR_STA_ADDR, &len);
  144. if (pos == NULL || len != ETH_ALEN) {
  145. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  146. return NULL;
  147. }
  148. sta = sta_find(bss, pos);
  149. if (sta == NULL) {
  150. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  151. return NULL;
  152. }
  153. return sta;
  154. }
  155. static struct wlantest_sta * ctrl_get_sta2(struct wlantest *wt, int sock,
  156. u8 *cmd, size_t clen,
  157. struct wlantest_bss *bss)
  158. {
  159. struct wlantest_sta *sta;
  160. u8 *pos;
  161. size_t len;
  162. if (bss == NULL)
  163. return NULL;
  164. pos = attr_get(cmd, clen, WLANTEST_ATTR_STA2_ADDR, &len);
  165. if (pos == NULL || len != ETH_ALEN) {
  166. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  167. return NULL;
  168. }
  169. sta = sta_find(bss, pos);
  170. if (sta == NULL) {
  171. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  172. return NULL;
  173. }
  174. return sta;
  175. }
  176. static void ctrl_list_bss(struct wlantest *wt, int sock)
  177. {
  178. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
  179. struct wlantest_bss *bss;
  180. pos = buf;
  181. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  182. pos += 4;
  183. WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
  184. pos += 4;
  185. len = pos; /* to be filled */
  186. pos += 4;
  187. dl_list_for_each(bss, &wt->bss, struct wlantest_bss, list) {
  188. if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
  189. break;
  190. os_memcpy(pos, bss->bssid, ETH_ALEN);
  191. pos += ETH_ALEN;
  192. }
  193. WPA_PUT_BE32(len, pos - len - 4);
  194. ctrl_send(wt, sock, buf, pos - buf);
  195. }
  196. static void ctrl_list_sta(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  197. {
  198. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
  199. struct wlantest_bss *bss;
  200. struct wlantest_sta *sta;
  201. bss = ctrl_get_bss(wt, sock, cmd, clen);
  202. if (bss == NULL)
  203. return;
  204. pos = buf;
  205. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  206. pos += 4;
  207. WPA_PUT_BE32(pos, WLANTEST_ATTR_STA_ADDR);
  208. pos += 4;
  209. len = pos; /* to be filled */
  210. pos += 4;
  211. dl_list_for_each(sta, &bss->sta, struct wlantest_sta, list) {
  212. if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
  213. break;
  214. os_memcpy(pos, sta->addr, ETH_ALEN);
  215. pos += ETH_ALEN;
  216. }
  217. WPA_PUT_BE32(len, pos - len - 4);
  218. ctrl_send(wt, sock, buf, pos - buf);
  219. }
  220. static void ctrl_flush(struct wlantest *wt, int sock)
  221. {
  222. wpa_printf(MSG_DEBUG, "Drop all collected BSS data");
  223. bss_flush(wt);
  224. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  225. }
  226. static void ctrl_clear_sta_counters(struct wlantest *wt, int sock, u8 *cmd,
  227. size_t clen)
  228. {
  229. struct wlantest_bss *bss;
  230. struct wlantest_sta *sta;
  231. bss = ctrl_get_bss(wt, sock, cmd, clen);
  232. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  233. if (sta == NULL) {
  234. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  235. return;
  236. }
  237. os_memset(sta->counters, 0, sizeof(sta->counters));
  238. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  239. }
  240. static void ctrl_clear_bss_counters(struct wlantest *wt, int sock, u8 *cmd,
  241. size_t clen)
  242. {
  243. struct wlantest_bss *bss;
  244. bss = ctrl_get_bss(wt, sock, cmd, clen);
  245. if (bss == NULL) {
  246. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  247. return;
  248. }
  249. os_memset(bss->counters, 0, sizeof(bss->counters));
  250. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  251. }
  252. static void ctrl_clear_tdls_counters(struct wlantest *wt, int sock, u8 *cmd,
  253. size_t clen)
  254. {
  255. struct wlantest_bss *bss;
  256. struct wlantest_sta *sta;
  257. struct wlantest_sta *sta2;
  258. struct wlantest_tdls *tdls;
  259. bss = ctrl_get_bss(wt, sock, cmd, clen);
  260. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  261. sta2 = ctrl_get_sta2(wt, sock, cmd, clen, bss);
  262. if (sta == NULL || sta2 == NULL) {
  263. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  264. return;
  265. }
  266. dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) {
  267. if ((tdls->init == sta && tdls->resp == sta2) ||
  268. (tdls->init == sta2 && tdls->resp == sta))
  269. os_memset(tdls->counters, 0, sizeof(tdls->counters));
  270. }
  271. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  272. }
  273. static void ctrl_get_sta_counter(struct wlantest *wt, int sock, u8 *cmd,
  274. size_t clen)
  275. {
  276. u8 *addr;
  277. size_t addr_len;
  278. struct wlantest_bss *bss;
  279. struct wlantest_sta *sta;
  280. u32 counter;
  281. u8 buf[4 + 12], *end, *pos;
  282. bss = ctrl_get_bss(wt, sock, cmd, clen);
  283. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  284. if (sta == NULL)
  285. return;
  286. addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_COUNTER, &addr_len);
  287. if (addr == NULL || addr_len != 4) {
  288. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  289. return;
  290. }
  291. counter = WPA_GET_BE32(addr);
  292. if (counter >= NUM_WLANTEST_STA_COUNTER) {
  293. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  294. return;
  295. }
  296. pos = buf;
  297. end = buf + sizeof(buf);
  298. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  299. pos += 4;
  300. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  301. sta->counters[counter]);
  302. ctrl_send(wt, sock, buf, pos - buf);
  303. }
  304. static void ctrl_get_bss_counter(struct wlantest *wt, int sock, u8 *cmd,
  305. size_t clen)
  306. {
  307. u8 *addr;
  308. size_t addr_len;
  309. struct wlantest_bss *bss;
  310. u32 counter;
  311. u8 buf[4 + 12], *end, *pos;
  312. bss = ctrl_get_bss(wt, sock, cmd, clen);
  313. if (bss == NULL)
  314. return;
  315. addr = attr_get(cmd, clen, WLANTEST_ATTR_BSS_COUNTER, &addr_len);
  316. if (addr == NULL || addr_len != 4) {
  317. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  318. return;
  319. }
  320. counter = WPA_GET_BE32(addr);
  321. if (counter >= NUM_WLANTEST_BSS_COUNTER) {
  322. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  323. return;
  324. }
  325. pos = buf;
  326. end = buf + sizeof(buf);
  327. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  328. pos += 4;
  329. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  330. bss->counters[counter]);
  331. ctrl_send(wt, sock, buf, pos - buf);
  332. }
  333. static void ctrl_get_tdls_counter(struct wlantest *wt, int sock, u8 *cmd,
  334. size_t clen)
  335. {
  336. u8 *addr;
  337. size_t addr_len;
  338. struct wlantest_bss *bss;
  339. struct wlantest_sta *sta;
  340. struct wlantest_sta *sta2;
  341. struct wlantest_tdls *tdls;
  342. u32 counter;
  343. u8 buf[4 + 12], *end, *pos;
  344. int found = 0;
  345. bss = ctrl_get_bss(wt, sock, cmd, clen);
  346. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  347. sta2 = ctrl_get_sta2(wt, sock, cmd, clen, bss);
  348. if (sta == NULL || sta2 == NULL) {
  349. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  350. return;
  351. }
  352. addr = attr_get(cmd, clen, WLANTEST_ATTR_TDLS_COUNTER, &addr_len);
  353. if (addr == NULL || addr_len != 4) {
  354. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  355. return;
  356. }
  357. counter = WPA_GET_BE32(addr);
  358. if (counter >= NUM_WLANTEST_TDLS_COUNTER) {
  359. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  360. return;
  361. }
  362. dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) {
  363. if (tdls->init == sta && tdls->resp == sta2) {
  364. found = 1;
  365. break;
  366. }
  367. }
  368. if (!found) {
  369. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  370. return;
  371. }
  372. pos = buf;
  373. end = buf + sizeof(buf);
  374. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  375. pos += 4;
  376. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  377. tdls->counters[counter]);
  378. ctrl_send(wt, sock, buf, pos - buf);
  379. }
  380. static void build_mgmt_hdr(struct ieee80211_mgmt *mgmt,
  381. struct wlantest_bss *bss, struct wlantest_sta *sta,
  382. int sender_ap, int stype)
  383. {
  384. os_memset(mgmt, 0, 24);
  385. mgmt->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, stype);
  386. if (sender_ap) {
  387. if (sta)
  388. os_memcpy(mgmt->da, sta->addr, ETH_ALEN);
  389. else
  390. os_memset(mgmt->da, 0xff, ETH_ALEN);
  391. os_memcpy(mgmt->sa, bss->bssid, ETH_ALEN);
  392. } else {
  393. os_memcpy(mgmt->da, bss->bssid, ETH_ALEN);
  394. os_memcpy(mgmt->sa, sta->addr, ETH_ALEN);
  395. }
  396. os_memcpy(mgmt->bssid, bss->bssid, ETH_ALEN);
  397. }
  398. static int ctrl_inject_auth(struct wlantest *wt, struct wlantest_bss *bss,
  399. struct wlantest_sta *sta, int sender_ap,
  400. enum wlantest_inject_protection prot)
  401. {
  402. struct ieee80211_mgmt mgmt;
  403. if (prot != WLANTEST_INJECT_NORMAL &&
  404. prot != WLANTEST_INJECT_UNPROTECTED)
  405. return -1; /* Authentication frame is never protected */
  406. if (sta == NULL)
  407. return -1; /* No broadcast Authentication frames */
  408. if (sender_ap)
  409. wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR,
  410. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  411. else
  412. wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR,
  413. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  414. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_AUTH);
  415. mgmt.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
  416. mgmt.u.auth.auth_transaction = host_to_le16(1);
  417. mgmt.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS);
  418. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 6,
  419. WLANTEST_INJECT_UNPROTECTED);
  420. }
  421. static int ctrl_inject_assocreq(struct wlantest *wt, struct wlantest_bss *bss,
  422. struct wlantest_sta *sta, int sender_ap,
  423. enum wlantest_inject_protection prot)
  424. {
  425. u8 *buf;
  426. struct ieee80211_mgmt *mgmt;
  427. int ret;
  428. if (prot != WLANTEST_INJECT_NORMAL &&
  429. prot != WLANTEST_INJECT_UNPROTECTED)
  430. return -1; /* Association Request frame is never protected */
  431. if (sta == NULL)
  432. return -1; /* No broadcast Association Request frames */
  433. if (sender_ap)
  434. return -1; /* No Association Request frame sent by AP */
  435. if (sta->assocreq_ies == NULL) {
  436. wpa_printf(MSG_INFO, "INJECT: No previous (Re)Association "
  437. "Request available for " MACSTR,
  438. MAC2STR(sta->addr));
  439. return -1;
  440. }
  441. wpa_printf(MSG_INFO, "INJECT: AssocReq " MACSTR " -> " MACSTR,
  442. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  443. buf = os_malloc(sizeof(*mgmt) + sta->assocreq_ies_len);
  444. if (buf == NULL)
  445. return -1;
  446. mgmt = (struct ieee80211_mgmt *) buf;
  447. build_mgmt_hdr(mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_ASSOC_REQ);
  448. mgmt->u.assoc_req.capab_info = host_to_le16(sta->assocreq_capab_info);
  449. mgmt->u.assoc_req.listen_interval =
  450. host_to_le16(sta->assocreq_listen_int);
  451. os_memcpy(mgmt->u.assoc_req.variable, sta->assocreq_ies,
  452. sta->assocreq_ies_len);
  453. ret = wlantest_inject(wt, bss, sta, buf,
  454. 24 + 4 + sta->assocreq_ies_len,
  455. WLANTEST_INJECT_UNPROTECTED);
  456. os_free(buf);
  457. return ret;
  458. }
  459. static int ctrl_inject_reassocreq(struct wlantest *wt,
  460. struct wlantest_bss *bss,
  461. struct wlantest_sta *sta, int sender_ap,
  462. enum wlantest_inject_protection prot)
  463. {
  464. u8 *buf;
  465. struct ieee80211_mgmt *mgmt;
  466. int ret;
  467. if (prot != WLANTEST_INJECT_NORMAL &&
  468. prot != WLANTEST_INJECT_UNPROTECTED)
  469. return -1; /* Reassociation Request frame is never protected */
  470. if (sta == NULL)
  471. return -1; /* No broadcast Reassociation Request frames */
  472. if (sender_ap)
  473. return -1; /* No Reassociation Request frame sent by AP */
  474. if (sta->assocreq_ies == NULL) {
  475. wpa_printf(MSG_INFO, "INJECT: No previous (Re)Association "
  476. "Request available for " MACSTR,
  477. MAC2STR(sta->addr));
  478. return -1;
  479. }
  480. wpa_printf(MSG_INFO, "INJECT: ReassocReq " MACSTR " -> " MACSTR,
  481. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  482. buf = os_malloc(sizeof(*mgmt) + sta->assocreq_ies_len);
  483. if (buf == NULL)
  484. return -1;
  485. mgmt = (struct ieee80211_mgmt *) buf;
  486. build_mgmt_hdr(mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_REASSOC_REQ);
  487. mgmt->u.reassoc_req.capab_info =
  488. host_to_le16(sta->assocreq_capab_info);
  489. mgmt->u.reassoc_req.listen_interval =
  490. host_to_le16(sta->assocreq_listen_int);
  491. os_memcpy(mgmt->u.reassoc_req.current_ap, bss->bssid, ETH_ALEN);
  492. os_memcpy(mgmt->u.reassoc_req.variable, sta->assocreq_ies,
  493. sta->assocreq_ies_len);
  494. ret = wlantest_inject(wt, bss, sta, buf,
  495. 24 + 10 + sta->assocreq_ies_len,
  496. WLANTEST_INJECT_UNPROTECTED);
  497. os_free(buf);
  498. return ret;
  499. }
  500. static int ctrl_inject_deauth(struct wlantest *wt, struct wlantest_bss *bss,
  501. struct wlantest_sta *sta, int sender_ap,
  502. enum wlantest_inject_protection prot)
  503. {
  504. struct ieee80211_mgmt mgmt;
  505. if (sender_ap) {
  506. if (sta)
  507. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> "
  508. MACSTR,
  509. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  510. else
  511. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR
  512. " -> broadcast", MAC2STR(bss->bssid));
  513. } else
  514. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> " MACSTR,
  515. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  516. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_DEAUTH);
  517. mgmt.u.deauth.reason_code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  518. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 2, prot);
  519. }
  520. static int ctrl_inject_disassoc(struct wlantest *wt, struct wlantest_bss *bss,
  521. struct wlantest_sta *sta, int sender_ap,
  522. enum wlantest_inject_protection prot)
  523. {
  524. struct ieee80211_mgmt mgmt;
  525. if (sender_ap) {
  526. if (sta)
  527. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR " -> "
  528. MACSTR,
  529. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  530. else
  531. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR
  532. " -> broadcast", MAC2STR(bss->bssid));
  533. } else
  534. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR " -> " MACSTR,
  535. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  536. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_DISASSOC);
  537. mgmt.u.disassoc.reason_code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  538. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 2, prot);
  539. }
  540. static int ctrl_inject_saqueryreq(struct wlantest *wt,
  541. struct wlantest_bss *bss,
  542. struct wlantest_sta *sta, int sender_ap,
  543. enum wlantest_inject_protection prot)
  544. {
  545. struct ieee80211_mgmt mgmt;
  546. if (sta == NULL)
  547. return -1; /* No broadcast SA Query frames */
  548. if (sender_ap)
  549. wpa_printf(MSG_INFO, "INJECT: SA Query Request " MACSTR " -> "
  550. MACSTR, MAC2STR(bss->bssid), MAC2STR(sta->addr));
  551. else
  552. wpa_printf(MSG_INFO, "INJECT: SA Query Request " MACSTR " -> "
  553. MACSTR, MAC2STR(sta->addr), MAC2STR(bss->bssid));
  554. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_ACTION);
  555. mgmt.u.action.category = WLAN_ACTION_SA_QUERY;
  556. mgmt.u.action.u.sa_query_req.action = WLAN_SA_QUERY_REQUEST;
  557. mgmt.u.action.u.sa_query_req.trans_id[0] = 0x12;
  558. mgmt.u.action.u.sa_query_req.trans_id[1] = 0x34;
  559. os_memcpy(sender_ap ? sta->ap_sa_query_tr : sta->sta_sa_query_tr,
  560. mgmt.u.action.u.sa_query_req.trans_id,
  561. WLAN_SA_QUERY_TR_ID_LEN);
  562. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 4, prot);
  563. }
  564. static void ctrl_inject(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  565. {
  566. u8 *bssid, *sta_addr;
  567. struct wlantest_bss *bss;
  568. struct wlantest_sta *sta;
  569. int frame, sender_ap, prot;
  570. int ret = 0;
  571. bssid = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_BSSID);
  572. sta_addr = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_STA_ADDR);
  573. frame = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_FRAME);
  574. sender_ap = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_SENDER_AP);
  575. if (sender_ap < 0)
  576. sender_ap = 0;
  577. prot = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_PROTECTION);
  578. if (bssid == NULL || sta_addr == NULL || frame < 0 || prot < 0) {
  579. wpa_printf(MSG_INFO, "Invalid inject command parameters");
  580. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  581. return;
  582. }
  583. bss = bss_find(wt, bssid);
  584. if (bss == NULL) {
  585. wpa_printf(MSG_INFO, "BSS not found for inject command");
  586. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  587. return;
  588. }
  589. if (is_broadcast_ether_addr(sta_addr)) {
  590. if (!sender_ap) {
  591. wpa_printf(MSG_INFO, "Invalid broadcast inject "
  592. "command without sender_ap set");
  593. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  594. return;
  595. } sta = NULL;
  596. } else {
  597. sta = sta_find(bss, sta_addr);
  598. if (sta == NULL) {
  599. wpa_printf(MSG_INFO, "Station not found for inject "
  600. "command");
  601. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  602. return;
  603. }
  604. }
  605. switch (frame) {
  606. case WLANTEST_FRAME_AUTH:
  607. ret = ctrl_inject_auth(wt, bss, sta, sender_ap, prot);
  608. break;
  609. case WLANTEST_FRAME_ASSOCREQ:
  610. ret = ctrl_inject_assocreq(wt, bss, sta, sender_ap, prot);
  611. break;
  612. case WLANTEST_FRAME_REASSOCREQ:
  613. ret = ctrl_inject_reassocreq(wt, bss, sta, sender_ap, prot);
  614. break;
  615. case WLANTEST_FRAME_DEAUTH:
  616. ret = ctrl_inject_deauth(wt, bss, sta, sender_ap, prot);
  617. break;
  618. case WLANTEST_FRAME_DISASSOC:
  619. ret = ctrl_inject_disassoc(wt, bss, sta, sender_ap, prot);
  620. break;
  621. case WLANTEST_FRAME_SAQUERYREQ:
  622. ret = ctrl_inject_saqueryreq(wt, bss, sta, sender_ap, prot);
  623. break;
  624. default:
  625. wpa_printf(MSG_INFO, "Unsupported inject command frame %d",
  626. frame);
  627. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  628. return;
  629. }
  630. if (ret)
  631. wpa_printf(MSG_INFO, "Failed to inject frame");
  632. else
  633. wpa_printf(MSG_INFO, "Frame injected successfully");
  634. ctrl_send_simple(wt, sock, ret == 0 ? WLANTEST_CTRL_SUCCESS :
  635. WLANTEST_CTRL_FAILURE);
  636. }
  637. static void ctrl_version(struct wlantest *wt, int sock)
  638. {
  639. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos;
  640. pos = buf;
  641. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  642. pos += 4;
  643. pos = attr_add_str(pos, buf + sizeof(buf), WLANTEST_ATTR_VERSION,
  644. VERSION_STR);
  645. ctrl_send(wt, sock, buf, pos - buf);
  646. }
  647. static void ctrl_add_passphrase(struct wlantest *wt, int sock, u8 *cmd,
  648. size_t clen)
  649. {
  650. u8 *passphrase;
  651. size_t len;
  652. struct wlantest_passphrase *p, *pa;
  653. u8 *bssid;
  654. passphrase = attr_get(cmd, clen, WLANTEST_ATTR_PASSPHRASE, &len);
  655. if (passphrase == NULL) {
  656. u8 *wepkey;
  657. char *key;
  658. enum wlantest_ctrl_cmd res;
  659. wepkey = attr_get(cmd, clen, WLANTEST_ATTR_WEPKEY, &len);
  660. if (wepkey == NULL) {
  661. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  662. return;
  663. }
  664. key = os_zalloc(len + 1);
  665. if (key == NULL) {
  666. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  667. return;
  668. }
  669. os_memcpy(key, wepkey, len);
  670. if (add_wep(wt, key) < 0)
  671. res = WLANTEST_CTRL_FAILURE;
  672. else
  673. res = WLANTEST_CTRL_SUCCESS;
  674. os_free(key);
  675. ctrl_send_simple(wt, sock, res);
  676. return;
  677. }
  678. if (len < 8 || len > 63) {
  679. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  680. return;
  681. }
  682. p = os_zalloc(sizeof(*p));
  683. if (p == NULL) {
  684. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  685. return;
  686. }
  687. os_memcpy(p->passphrase, passphrase, len);
  688. wpa_printf(MSG_INFO, "Add passphrase '%s'", p->passphrase);
  689. bssid = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_BSSID);
  690. if (bssid) {
  691. os_memcpy(p->bssid, bssid, ETH_ALEN);
  692. wpa_printf(MSG_INFO, "Limit passphrase for BSSID " MACSTR,
  693. MAC2STR(p->bssid));
  694. }
  695. dl_list_for_each(pa, &wt->passphrase, struct wlantest_passphrase, list)
  696. {
  697. if (os_strcmp(p->passphrase, pa->passphrase) == 0 &&
  698. os_memcmp(p->bssid, pa->bssid, ETH_ALEN) == 0) {
  699. wpa_printf(MSG_INFO, "Passphrase was already known");
  700. os_free(p);
  701. p = NULL;
  702. break;
  703. }
  704. }
  705. if (p) {
  706. struct wlantest_bss *bss;
  707. dl_list_add(&wt->passphrase, &p->list);
  708. dl_list_for_each(bss, &wt->bss, struct wlantest_bss, list) {
  709. if (bssid &&
  710. os_memcmp(p->bssid, bss->bssid, ETH_ALEN) != 0)
  711. continue;
  712. bss_add_pmk_from_passphrase(bss, p->passphrase);
  713. }
  714. }
  715. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  716. }
  717. static void info_print_proto(char *buf, size_t len, int proto)
  718. {
  719. char *pos, *end;
  720. if (proto == 0) {
  721. os_snprintf(buf, len, "OPEN");
  722. return;
  723. }
  724. pos = buf;
  725. end = buf + len;
  726. if (proto & WPA_PROTO_WPA)
  727. pos += os_snprintf(pos, end - pos, "%sWPA",
  728. pos == buf ? "" : " ");
  729. if (proto & WPA_PROTO_RSN)
  730. pos += os_snprintf(pos, end - pos, "%sWPA2",
  731. pos == buf ? "" : " ");
  732. }
  733. static void info_print_cipher(char *buf, size_t len, int cipher)
  734. {
  735. char *pos, *end;
  736. if (cipher == 0) {
  737. os_snprintf(buf, len, "N/A");
  738. return;
  739. }
  740. pos = buf;
  741. end = buf + len;
  742. if (cipher & WPA_CIPHER_NONE)
  743. pos += os_snprintf(pos, end - pos, "%sNONE",
  744. pos == buf ? "" : " ");
  745. if (cipher & WPA_CIPHER_WEP40)
  746. pos += os_snprintf(pos, end - pos, "%sWEP40",
  747. pos == buf ? "" : " ");
  748. if (cipher & WPA_CIPHER_WEP104)
  749. pos += os_snprintf(pos, end - pos, "%sWEP104",
  750. pos == buf ? "" : " ");
  751. if (cipher & WPA_CIPHER_TKIP)
  752. pos += os_snprintf(pos, end - pos, "%sTKIP",
  753. pos == buf ? "" : " ");
  754. if (cipher & WPA_CIPHER_CCMP)
  755. pos += os_snprintf(pos, end - pos, "%sCCMP",
  756. pos == buf ? "" : " ");
  757. if (cipher & WPA_CIPHER_AES_128_CMAC)
  758. pos += os_snprintf(pos, end - pos, "%sBIP",
  759. pos == buf ? "" : " ");
  760. }
  761. static void info_print_key_mgmt(char *buf, size_t len, int key_mgmt)
  762. {
  763. char *pos, *end;
  764. if (key_mgmt == 0) {
  765. os_snprintf(buf, len, "N/A");
  766. return;
  767. }
  768. pos = buf;
  769. end = buf + len;
  770. if (key_mgmt & WPA_KEY_MGMT_IEEE8021X)
  771. pos += os_snprintf(pos, end - pos, "%sEAP",
  772. pos == buf ? "" : " ");
  773. if (key_mgmt & WPA_KEY_MGMT_PSK)
  774. pos += os_snprintf(pos, end - pos, "%sPSK",
  775. pos == buf ? "" : " ");
  776. if (key_mgmt & WPA_KEY_MGMT_WPA_NONE)
  777. pos += os_snprintf(pos, end - pos, "%sWPA-NONE",
  778. pos == buf ? "" : " ");
  779. if (key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X)
  780. pos += os_snprintf(pos, end - pos, "%sFT-EAP",
  781. pos == buf ? "" : " ");
  782. if (key_mgmt & WPA_KEY_MGMT_FT_PSK)
  783. pos += os_snprintf(pos, end - pos, "%sFT-PSK",
  784. pos == buf ? "" : " ");
  785. if (key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256)
  786. pos += os_snprintf(pos, end - pos, "%sEAP-SHA256",
  787. pos == buf ? "" : " ");
  788. if (key_mgmt & WPA_KEY_MGMT_PSK_SHA256)
  789. pos += os_snprintf(pos, end - pos, "%sPSK-SHA256",
  790. pos == buf ? "" : " ");
  791. }
  792. static void info_print_rsn_capab(char *buf, size_t len, int capab)
  793. {
  794. char *pos, *end;
  795. pos = buf;
  796. end = buf + len;
  797. if (capab & WPA_CAPABILITY_PREAUTH)
  798. pos += os_snprintf(pos, end - pos, "%sPREAUTH",
  799. pos == buf ? "" : " ");
  800. if (capab & WPA_CAPABILITY_NO_PAIRWISE)
  801. pos += os_snprintf(pos, end - pos, "%sNO_PAIRWISE",
  802. pos == buf ? "" : " ");
  803. if (capab & WPA_CAPABILITY_MFPR)
  804. pos += os_snprintf(pos, end - pos, "%sMFPR",
  805. pos == buf ? "" : " ");
  806. if (capab & WPA_CAPABILITY_MFPC)
  807. pos += os_snprintf(pos, end - pos, "%sMFPC",
  808. pos == buf ? "" : " ");
  809. if (capab & WPA_CAPABILITY_PEERKEY_ENABLED)
  810. pos += os_snprintf(pos, end - pos, "%sPEERKEY",
  811. pos == buf ? "" : " ");
  812. }
  813. static void info_print_state(char *buf, size_t len, int state)
  814. {
  815. switch (state) {
  816. case STATE1:
  817. os_strlcpy(buf, "NOT-AUTH", len);
  818. break;
  819. case STATE2:
  820. os_strlcpy(buf, "AUTH", len);
  821. break;
  822. case STATE3:
  823. os_strlcpy(buf, "AUTH+ASSOC", len);
  824. break;
  825. }
  826. }
  827. static void info_print_gtk(char *buf, size_t len, struct wlantest_sta *sta)
  828. {
  829. size_t pos;
  830. pos = os_snprintf(buf, len, "IDX=%d,GTK=", sta->gtk_idx);
  831. wpa_snprintf_hex(buf + pos, len - pos, sta->gtk, sta->gtk_len);
  832. }
  833. static void ctrl_info_sta(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  834. {
  835. u8 *addr;
  836. size_t addr_len;
  837. struct wlantest_bss *bss;
  838. struct wlantest_sta *sta;
  839. enum wlantest_sta_info info;
  840. u8 buf[4 + 108], *end, *pos;
  841. char resp[100];
  842. bss = ctrl_get_bss(wt, sock, cmd, clen);
  843. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  844. if (sta == NULL)
  845. return;
  846. addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_INFO, &addr_len);
  847. if (addr == NULL || addr_len != 4) {
  848. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  849. return;
  850. }
  851. info = WPA_GET_BE32(addr);
  852. resp[0] = '\0';
  853. switch (info) {
  854. case WLANTEST_STA_INFO_PROTO:
  855. info_print_proto(resp, sizeof(resp), sta->proto);
  856. break;
  857. case WLANTEST_STA_INFO_PAIRWISE:
  858. info_print_cipher(resp, sizeof(resp), sta->pairwise_cipher);
  859. break;
  860. case WLANTEST_STA_INFO_KEY_MGMT:
  861. info_print_key_mgmt(resp, sizeof(resp), sta->key_mgmt);
  862. break;
  863. case WLANTEST_STA_INFO_RSN_CAPAB:
  864. info_print_rsn_capab(resp, sizeof(resp), sta->rsn_capab);
  865. break;
  866. case WLANTEST_STA_INFO_STATE:
  867. info_print_state(resp, sizeof(resp), sta->state);
  868. break;
  869. case WLANTEST_STA_INFO_GTK:
  870. info_print_gtk(resp, sizeof(resp), sta);
  871. break;
  872. default:
  873. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  874. return;
  875. }
  876. pos = buf;
  877. end = buf + sizeof(buf);
  878. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  879. pos += 4;
  880. pos = attr_add_str(pos, end, WLANTEST_ATTR_INFO, resp);
  881. ctrl_send(wt, sock, buf, pos - buf);
  882. }
  883. static void ctrl_info_bss(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  884. {
  885. u8 *addr;
  886. size_t addr_len;
  887. struct wlantest_bss *bss;
  888. enum wlantest_bss_info info;
  889. u8 buf[4 + 108], *end, *pos;
  890. char resp[100];
  891. bss = ctrl_get_bss(wt, sock, cmd, clen);
  892. if (bss == NULL)
  893. return;
  894. addr = attr_get(cmd, clen, WLANTEST_ATTR_BSS_INFO, &addr_len);
  895. if (addr == NULL || addr_len != 4) {
  896. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  897. return;
  898. }
  899. info = WPA_GET_BE32(addr);
  900. resp[0] = '\0';
  901. switch (info) {
  902. case WLANTEST_BSS_INFO_PROTO:
  903. info_print_proto(resp, sizeof(resp), bss->proto);
  904. break;
  905. case WLANTEST_BSS_INFO_PAIRWISE:
  906. info_print_cipher(resp, sizeof(resp), bss->pairwise_cipher);
  907. break;
  908. case WLANTEST_BSS_INFO_GROUP:
  909. info_print_cipher(resp, sizeof(resp), bss->group_cipher);
  910. break;
  911. case WLANTEST_BSS_INFO_GROUP_MGMT:
  912. info_print_cipher(resp, sizeof(resp), bss->mgmt_group_cipher);
  913. break;
  914. case WLANTEST_BSS_INFO_KEY_MGMT:
  915. info_print_key_mgmt(resp, sizeof(resp), bss->key_mgmt);
  916. break;
  917. case WLANTEST_BSS_INFO_RSN_CAPAB:
  918. info_print_rsn_capab(resp, sizeof(resp), bss->rsn_capab);
  919. break;
  920. default:
  921. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  922. return;
  923. }
  924. pos = buf;
  925. end = buf + sizeof(buf);
  926. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  927. pos += 4;
  928. pos = attr_add_str(pos, end, WLANTEST_ATTR_INFO, resp);
  929. ctrl_send(wt, sock, buf, pos - buf);
  930. }
  931. static void ctrl_send_(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  932. {
  933. struct wlantest_bss *bss;
  934. struct wlantest_sta *sta;
  935. u8 *bssid, *sta_addr;
  936. int prot;
  937. u8 *frame;
  938. size_t frame_len;
  939. int ret = 0;
  940. struct ieee80211_hdr *hdr;
  941. u16 fc;
  942. frame = attr_get(cmd, clen, WLANTEST_ATTR_FRAME, &frame_len);
  943. prot = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_PROTECTION);
  944. if (frame == NULL || frame_len < 24 || prot < 0) {
  945. wpa_printf(MSG_INFO, "Invalid send command parameters");
  946. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  947. return;
  948. }
  949. hdr = (struct ieee80211_hdr *) frame;
  950. fc = le_to_host16(hdr->frame_control);
  951. switch (WLAN_FC_GET_TYPE(fc)) {
  952. case WLAN_FC_TYPE_MGMT:
  953. bssid = hdr->addr3;
  954. if (os_memcmp(hdr->addr2, hdr->addr3, ETH_ALEN) == 0)
  955. sta_addr = hdr->addr1;
  956. else
  957. sta_addr = hdr->addr2;
  958. break;
  959. case WLAN_FC_TYPE_DATA:
  960. switch (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) {
  961. case 0:
  962. bssid = hdr->addr3;
  963. sta_addr = hdr->addr2;
  964. break;
  965. case WLAN_FC_TODS:
  966. bssid = hdr->addr1;
  967. sta_addr = hdr->addr2;
  968. break;
  969. case WLAN_FC_FROMDS:
  970. bssid = hdr->addr2;
  971. sta_addr = hdr->addr1;
  972. break;
  973. default:
  974. wpa_printf(MSG_INFO, "Unsupported inject frame");
  975. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  976. return;
  977. }
  978. break;
  979. default:
  980. wpa_printf(MSG_INFO, "Unsupported inject frame");
  981. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  982. return;
  983. }
  984. bss = bss_find(wt, bssid);
  985. if (bss == NULL && prot != WLANTEST_INJECT_UNPROTECTED) {
  986. wpa_printf(MSG_INFO, "Unknown BSSID");
  987. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  988. return;
  989. }
  990. if (bss)
  991. sta = sta_find(bss, sta_addr);
  992. else
  993. sta = NULL;
  994. if (sta == NULL && prot != WLANTEST_INJECT_UNPROTECTED) {
  995. wpa_printf(MSG_INFO, "Unknown STA address");
  996. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  997. return;
  998. }
  999. ret = wlantest_inject(wt, bss, sta, frame, frame_len, prot);
  1000. if (ret)
  1001. wpa_printf(MSG_INFO, "Failed to inject frame");
  1002. else
  1003. wpa_printf(MSG_INFO, "Frame injected successfully");
  1004. ctrl_send_simple(wt, sock, ret == 0 ? WLANTEST_CTRL_SUCCESS :
  1005. WLANTEST_CTRL_FAILURE);
  1006. }
  1007. static void ctrl_read(int sock, void *eloop_ctx, void *sock_ctx)
  1008. {
  1009. struct wlantest *wt = eloop_ctx;
  1010. u8 buf[WLANTEST_CTRL_MAX_CMD_LEN];
  1011. int len;
  1012. enum wlantest_ctrl_cmd cmd;
  1013. wpa_printf(MSG_EXCESSIVE, "New control interface message from %d",
  1014. sock);
  1015. len = recv(sock, buf, sizeof(buf), 0);
  1016. if (len < 0) {
  1017. wpa_printf(MSG_INFO, "recv(ctrl): %s", strerror(errno));
  1018. ctrl_disconnect(wt, sock);
  1019. return;
  1020. }
  1021. if (len == 0) {
  1022. ctrl_disconnect(wt, sock);
  1023. return;
  1024. }
  1025. if (len < 4) {
  1026. wpa_printf(MSG_INFO, "Too short control interface command "
  1027. "from %d", sock);
  1028. ctrl_disconnect(wt, sock);
  1029. return;
  1030. }
  1031. cmd = WPA_GET_BE32(buf);
  1032. wpa_printf(MSG_EXCESSIVE, "Control interface command %d from %d",
  1033. cmd, sock);
  1034. switch (cmd) {
  1035. case WLANTEST_CTRL_PING:
  1036. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  1037. break;
  1038. case WLANTEST_CTRL_TERMINATE:
  1039. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  1040. eloop_terminate();
  1041. break;
  1042. case WLANTEST_CTRL_LIST_BSS:
  1043. ctrl_list_bss(wt, sock);
  1044. break;
  1045. case WLANTEST_CTRL_LIST_STA:
  1046. ctrl_list_sta(wt, sock, buf + 4, len - 4);
  1047. break;
  1048. case WLANTEST_CTRL_FLUSH:
  1049. ctrl_flush(wt, sock);
  1050. break;
  1051. case WLANTEST_CTRL_CLEAR_STA_COUNTERS:
  1052. ctrl_clear_sta_counters(wt, sock, buf + 4, len - 4);
  1053. break;
  1054. case WLANTEST_CTRL_CLEAR_BSS_COUNTERS:
  1055. ctrl_clear_bss_counters(wt, sock, buf + 4, len - 4);
  1056. break;
  1057. case WLANTEST_CTRL_CLEAR_TDLS_COUNTERS:
  1058. ctrl_clear_tdls_counters(wt, sock, buf + 4, len - 4);
  1059. break;
  1060. case WLANTEST_CTRL_GET_STA_COUNTER:
  1061. ctrl_get_sta_counter(wt, sock, buf + 4, len - 4);
  1062. break;
  1063. case WLANTEST_CTRL_GET_BSS_COUNTER:
  1064. ctrl_get_bss_counter(wt, sock, buf + 4, len - 4);
  1065. break;
  1066. case WLANTEST_CTRL_GET_TDLS_COUNTER:
  1067. ctrl_get_tdls_counter(wt, sock, buf + 4, len - 4);
  1068. break;
  1069. case WLANTEST_CTRL_INJECT:
  1070. ctrl_inject(wt, sock, buf + 4, len - 4);
  1071. break;
  1072. case WLANTEST_CTRL_VERSION:
  1073. ctrl_version(wt, sock);
  1074. break;
  1075. case WLANTEST_CTRL_ADD_PASSPHRASE:
  1076. ctrl_add_passphrase(wt, sock, buf + 4, len - 4);
  1077. break;
  1078. case WLANTEST_CTRL_INFO_STA:
  1079. ctrl_info_sta(wt, sock, buf + 4, len - 4);
  1080. break;
  1081. case WLANTEST_CTRL_INFO_BSS:
  1082. ctrl_info_bss(wt, sock, buf + 4, len - 4);
  1083. break;
  1084. case WLANTEST_CTRL_SEND:
  1085. ctrl_send_(wt, sock, buf + 4, len - 4);
  1086. break;
  1087. default:
  1088. ctrl_send_simple(wt, sock, WLANTEST_CTRL_UNKNOWN_CMD);
  1089. break;
  1090. }
  1091. }
  1092. static void ctrl_connect(int sock, void *eloop_ctx, void *sock_ctx)
  1093. {
  1094. struct wlantest *wt = eloop_ctx;
  1095. int conn, i;
  1096. conn = accept(sock, NULL, NULL);
  1097. if (conn < 0) {
  1098. wpa_printf(MSG_INFO, "accept(ctrl): %s", strerror(errno));
  1099. return;
  1100. }
  1101. wpa_printf(MSG_MSGDUMP, "New control interface connection %d", conn);
  1102. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  1103. if (wt->ctrl_socks[i] < 0)
  1104. break;
  1105. }
  1106. if (i == MAX_CTRL_CONNECTIONS) {
  1107. wpa_printf(MSG_INFO, "No room for new control connection");
  1108. close(conn);
  1109. return;
  1110. }
  1111. wt->ctrl_socks[i] = conn;
  1112. eloop_register_read_sock(conn, ctrl_read, wt, NULL);
  1113. }
  1114. int ctrl_init(struct wlantest *wt)
  1115. {
  1116. struct sockaddr_un addr;
  1117. wt->ctrl_sock = socket(AF_UNIX, SOCK_SEQPACKET, 0);
  1118. if (wt->ctrl_sock < 0) {
  1119. wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
  1120. return -1;
  1121. }
  1122. os_memset(&addr, 0, sizeof(addr));
  1123. addr.sun_family = AF_UNIX;
  1124. os_strlcpy(addr.sun_path + 1, WLANTEST_SOCK_NAME,
  1125. sizeof(addr.sun_path) - 1);
  1126. if (bind(wt->ctrl_sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  1127. wpa_printf(MSG_ERROR, "bind: %s", strerror(errno));
  1128. close(wt->ctrl_sock);
  1129. wt->ctrl_sock = -1;
  1130. return -1;
  1131. }
  1132. if (listen(wt->ctrl_sock, 5) < 0) {
  1133. wpa_printf(MSG_ERROR, "listen: %s", strerror(errno));
  1134. close(wt->ctrl_sock);
  1135. wt->ctrl_sock = -1;
  1136. return -1;
  1137. }
  1138. if (eloop_register_read_sock(wt->ctrl_sock, ctrl_connect, wt, NULL)) {
  1139. close(wt->ctrl_sock);
  1140. wt->ctrl_sock = -1;
  1141. return -1;
  1142. }
  1143. return 0;
  1144. }
  1145. void ctrl_deinit(struct wlantest *wt)
  1146. {
  1147. int i;
  1148. if (wt->ctrl_sock < 0)
  1149. return;
  1150. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  1151. if (wt->ctrl_socks[i] >= 0) {
  1152. close(wt->ctrl_socks[i]);
  1153. eloop_unregister_read_sock(wt->ctrl_socks[i]);
  1154. wt->ctrl_socks[i] = -1;
  1155. }
  1156. }
  1157. eloop_unregister_read_sock(wt->ctrl_sock);
  1158. close(wt->ctrl_sock);
  1159. wt->ctrl_sock = -1;
  1160. }