ctrl.c 33 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330
  1. /*
  2. * wlantest control interface
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include <sys/un.h>
  16. #include "utils/common.h"
  17. #include "utils/eloop.h"
  18. #include "common/defs.h"
  19. #include "common/version.h"
  20. #include "common/ieee802_11_defs.h"
  21. #include "wlantest.h"
  22. #include "wlantest_ctrl.h"
  23. static u8 * attr_get(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr,
  24. size_t *len)
  25. {
  26. u8 *pos = buf;
  27. while (pos + 8 <= buf + buflen) {
  28. enum wlantest_ctrl_attr a;
  29. size_t alen;
  30. a = WPA_GET_BE32(pos);
  31. pos += 4;
  32. alen = WPA_GET_BE32(pos);
  33. pos += 4;
  34. if (pos + alen > buf + buflen) {
  35. wpa_printf(MSG_DEBUG, "Invalid control message "
  36. "attribute");
  37. return NULL;
  38. }
  39. if (a == attr) {
  40. *len = alen;
  41. return pos;
  42. }
  43. pos += alen;
  44. }
  45. return NULL;
  46. }
  47. static u8 * attr_get_macaddr(u8 *buf, size_t buflen,
  48. enum wlantest_ctrl_attr attr)
  49. {
  50. u8 *addr;
  51. size_t addr_len;
  52. addr = attr_get(buf, buflen, attr, &addr_len);
  53. if (addr && addr_len != ETH_ALEN)
  54. addr = NULL;
  55. return addr;
  56. }
  57. static int attr_get_int(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr)
  58. {
  59. u8 *pos;
  60. size_t len;
  61. pos = attr_get(buf, buflen, attr, &len);
  62. if (pos == NULL || len != 4)
  63. return -1;
  64. return WPA_GET_BE32(pos);
  65. }
  66. static u8 * attr_add_str(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  67. const char *str)
  68. {
  69. size_t len = os_strlen(str);
  70. if (pos == NULL || end - pos < 8 + len)
  71. return NULL;
  72. WPA_PUT_BE32(pos, attr);
  73. pos += 4;
  74. WPA_PUT_BE32(pos, len);
  75. pos += 4;
  76. os_memcpy(pos, str, len);
  77. pos += len;
  78. return pos;
  79. }
  80. static u8 * attr_add_be32(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  81. u32 val)
  82. {
  83. if (pos == NULL || end - pos < 12)
  84. return NULL;
  85. WPA_PUT_BE32(pos, attr);
  86. pos += 4;
  87. WPA_PUT_BE32(pos, 4);
  88. pos += 4;
  89. WPA_PUT_BE32(pos, val);
  90. pos += 4;
  91. return pos;
  92. }
  93. static void ctrl_disconnect(struct wlantest *wt, int sock)
  94. {
  95. int i;
  96. wpa_printf(MSG_DEBUG, "Disconnect control interface connection %d",
  97. sock);
  98. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  99. if (wt->ctrl_socks[i] == sock) {
  100. close(wt->ctrl_socks[i]);
  101. eloop_unregister_read_sock(wt->ctrl_socks[i]);
  102. wt->ctrl_socks[i] = -1;
  103. break;
  104. }
  105. }
  106. }
  107. static void ctrl_send(struct wlantest *wt, int sock, const u8 *buf,
  108. size_t len)
  109. {
  110. if (send(sock, buf, len, 0) < 0) {
  111. wpa_printf(MSG_INFO, "send(ctrl): %s", strerror(errno));
  112. ctrl_disconnect(wt, sock);
  113. }
  114. }
  115. static void ctrl_send_simple(struct wlantest *wt, int sock,
  116. enum wlantest_ctrl_cmd cmd)
  117. {
  118. u8 buf[4];
  119. WPA_PUT_BE32(buf, cmd);
  120. ctrl_send(wt, sock, buf, sizeof(buf));
  121. }
  122. static struct wlantest_bss * ctrl_get_bss(struct wlantest *wt, int sock,
  123. u8 *cmd, size_t clen)
  124. {
  125. struct wlantest_bss *bss;
  126. u8 *pos;
  127. size_t len;
  128. pos = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &len);
  129. if (pos == NULL || len != ETH_ALEN) {
  130. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  131. return NULL;
  132. }
  133. bss = bss_find(wt, pos);
  134. if (bss == NULL) {
  135. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  136. return NULL;
  137. }
  138. return bss;
  139. }
  140. static struct wlantest_sta * ctrl_get_sta(struct wlantest *wt, int sock,
  141. u8 *cmd, size_t clen,
  142. struct wlantest_bss *bss)
  143. {
  144. struct wlantest_sta *sta;
  145. u8 *pos;
  146. size_t len;
  147. if (bss == NULL)
  148. return NULL;
  149. pos = attr_get(cmd, clen, WLANTEST_ATTR_STA_ADDR, &len);
  150. if (pos == NULL || len != ETH_ALEN) {
  151. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  152. return NULL;
  153. }
  154. sta = sta_find(bss, pos);
  155. if (sta == NULL) {
  156. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  157. return NULL;
  158. }
  159. return sta;
  160. }
  161. static struct wlantest_sta * ctrl_get_sta2(struct wlantest *wt, int sock,
  162. u8 *cmd, size_t clen,
  163. struct wlantest_bss *bss)
  164. {
  165. struct wlantest_sta *sta;
  166. u8 *pos;
  167. size_t len;
  168. if (bss == NULL)
  169. return NULL;
  170. pos = attr_get(cmd, clen, WLANTEST_ATTR_STA2_ADDR, &len);
  171. if (pos == NULL || len != ETH_ALEN) {
  172. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  173. return NULL;
  174. }
  175. sta = sta_find(bss, pos);
  176. if (sta == NULL) {
  177. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  178. return NULL;
  179. }
  180. return sta;
  181. }
  182. static void ctrl_list_bss(struct wlantest *wt, int sock)
  183. {
  184. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
  185. struct wlantest_bss *bss;
  186. pos = buf;
  187. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  188. pos += 4;
  189. WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
  190. pos += 4;
  191. len = pos; /* to be filled */
  192. pos += 4;
  193. dl_list_for_each(bss, &wt->bss, struct wlantest_bss, list) {
  194. if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
  195. break;
  196. os_memcpy(pos, bss->bssid, ETH_ALEN);
  197. pos += ETH_ALEN;
  198. }
  199. WPA_PUT_BE32(len, pos - len - 4);
  200. ctrl_send(wt, sock, buf, pos - buf);
  201. }
  202. static void ctrl_list_sta(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  203. {
  204. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
  205. struct wlantest_bss *bss;
  206. struct wlantest_sta *sta;
  207. bss = ctrl_get_bss(wt, sock, cmd, clen);
  208. if (bss == NULL)
  209. return;
  210. pos = buf;
  211. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  212. pos += 4;
  213. WPA_PUT_BE32(pos, WLANTEST_ATTR_STA_ADDR);
  214. pos += 4;
  215. len = pos; /* to be filled */
  216. pos += 4;
  217. dl_list_for_each(sta, &bss->sta, struct wlantest_sta, list) {
  218. if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
  219. break;
  220. os_memcpy(pos, sta->addr, ETH_ALEN);
  221. pos += ETH_ALEN;
  222. }
  223. WPA_PUT_BE32(len, pos - len - 4);
  224. ctrl_send(wt, sock, buf, pos - buf);
  225. }
  226. static void ctrl_flush(struct wlantest *wt, int sock)
  227. {
  228. wpa_printf(MSG_DEBUG, "Drop all collected BSS data");
  229. bss_flush(wt);
  230. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  231. }
  232. static void ctrl_clear_sta_counters(struct wlantest *wt, int sock, u8 *cmd,
  233. size_t clen)
  234. {
  235. struct wlantest_bss *bss;
  236. struct wlantest_sta *sta;
  237. bss = ctrl_get_bss(wt, sock, cmd, clen);
  238. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  239. if (sta == NULL) {
  240. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  241. return;
  242. }
  243. os_memset(sta->counters, 0, sizeof(sta->counters));
  244. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  245. }
  246. static void ctrl_clear_bss_counters(struct wlantest *wt, int sock, u8 *cmd,
  247. size_t clen)
  248. {
  249. struct wlantest_bss *bss;
  250. bss = ctrl_get_bss(wt, sock, cmd, clen);
  251. if (bss == NULL) {
  252. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  253. return;
  254. }
  255. os_memset(bss->counters, 0, sizeof(bss->counters));
  256. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  257. }
  258. static void ctrl_clear_tdls_counters(struct wlantest *wt, int sock, u8 *cmd,
  259. size_t clen)
  260. {
  261. struct wlantest_bss *bss;
  262. struct wlantest_sta *sta;
  263. struct wlantest_sta *sta2;
  264. struct wlantest_tdls *tdls;
  265. bss = ctrl_get_bss(wt, sock, cmd, clen);
  266. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  267. sta2 = ctrl_get_sta2(wt, sock, cmd, clen, bss);
  268. if (sta == NULL || sta2 == NULL) {
  269. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  270. return;
  271. }
  272. dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) {
  273. if ((tdls->init == sta && tdls->resp == sta2) ||
  274. (tdls->init == sta2 && tdls->resp == sta))
  275. os_memset(tdls->counters, 0, sizeof(tdls->counters));
  276. }
  277. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  278. }
  279. static void ctrl_get_sta_counter(struct wlantest *wt, int sock, u8 *cmd,
  280. size_t clen)
  281. {
  282. u8 *addr;
  283. size_t addr_len;
  284. struct wlantest_bss *bss;
  285. struct wlantest_sta *sta;
  286. u32 counter;
  287. u8 buf[4 + 12], *end, *pos;
  288. bss = ctrl_get_bss(wt, sock, cmd, clen);
  289. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  290. if (sta == NULL)
  291. return;
  292. addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_COUNTER, &addr_len);
  293. if (addr == NULL || addr_len != 4) {
  294. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  295. return;
  296. }
  297. counter = WPA_GET_BE32(addr);
  298. if (counter >= NUM_WLANTEST_STA_COUNTER) {
  299. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  300. return;
  301. }
  302. pos = buf;
  303. end = buf + sizeof(buf);
  304. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  305. pos += 4;
  306. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  307. sta->counters[counter]);
  308. ctrl_send(wt, sock, buf, pos - buf);
  309. }
  310. static void ctrl_get_bss_counter(struct wlantest *wt, int sock, u8 *cmd,
  311. size_t clen)
  312. {
  313. u8 *addr;
  314. size_t addr_len;
  315. struct wlantest_bss *bss;
  316. u32 counter;
  317. u8 buf[4 + 12], *end, *pos;
  318. bss = ctrl_get_bss(wt, sock, cmd, clen);
  319. if (bss == NULL)
  320. return;
  321. addr = attr_get(cmd, clen, WLANTEST_ATTR_BSS_COUNTER, &addr_len);
  322. if (addr == NULL || addr_len != 4) {
  323. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  324. return;
  325. }
  326. counter = WPA_GET_BE32(addr);
  327. if (counter >= NUM_WLANTEST_BSS_COUNTER) {
  328. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  329. return;
  330. }
  331. pos = buf;
  332. end = buf + sizeof(buf);
  333. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  334. pos += 4;
  335. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  336. bss->counters[counter]);
  337. ctrl_send(wt, sock, buf, pos - buf);
  338. }
  339. static void ctrl_get_tdls_counter(struct wlantest *wt, int sock, u8 *cmd,
  340. size_t clen)
  341. {
  342. u8 *addr;
  343. size_t addr_len;
  344. struct wlantest_bss *bss;
  345. struct wlantest_sta *sta;
  346. struct wlantest_sta *sta2;
  347. struct wlantest_tdls *tdls;
  348. u32 counter;
  349. u8 buf[4 + 12], *end, *pos;
  350. int found = 0;
  351. bss = ctrl_get_bss(wt, sock, cmd, clen);
  352. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  353. sta2 = ctrl_get_sta2(wt, sock, cmd, clen, bss);
  354. if (sta == NULL || sta2 == NULL) {
  355. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  356. return;
  357. }
  358. addr = attr_get(cmd, clen, WLANTEST_ATTR_TDLS_COUNTER, &addr_len);
  359. if (addr == NULL || addr_len != 4) {
  360. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  361. return;
  362. }
  363. counter = WPA_GET_BE32(addr);
  364. if (counter >= NUM_WLANTEST_TDLS_COUNTER) {
  365. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  366. return;
  367. }
  368. dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) {
  369. if (tdls->init == sta && tdls->resp == sta2) {
  370. found = 1;
  371. break;
  372. }
  373. }
  374. if (!found) {
  375. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  376. return;
  377. }
  378. pos = buf;
  379. end = buf + sizeof(buf);
  380. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  381. pos += 4;
  382. pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
  383. tdls->counters[counter]);
  384. ctrl_send(wt, sock, buf, pos - buf);
  385. }
  386. static void build_mgmt_hdr(struct ieee80211_mgmt *mgmt,
  387. struct wlantest_bss *bss, struct wlantest_sta *sta,
  388. int sender_ap, int stype)
  389. {
  390. os_memset(mgmt, 0, 24);
  391. mgmt->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, stype);
  392. if (sender_ap) {
  393. if (sta)
  394. os_memcpy(mgmt->da, sta->addr, ETH_ALEN);
  395. else
  396. os_memset(mgmt->da, 0xff, ETH_ALEN);
  397. os_memcpy(mgmt->sa, bss->bssid, ETH_ALEN);
  398. } else {
  399. os_memcpy(mgmt->da, bss->bssid, ETH_ALEN);
  400. os_memcpy(mgmt->sa, sta->addr, ETH_ALEN);
  401. }
  402. os_memcpy(mgmt->bssid, bss->bssid, ETH_ALEN);
  403. }
  404. static int ctrl_inject_auth(struct wlantest *wt, struct wlantest_bss *bss,
  405. struct wlantest_sta *sta, int sender_ap,
  406. enum wlantest_inject_protection prot)
  407. {
  408. struct ieee80211_mgmt mgmt;
  409. if (prot != WLANTEST_INJECT_NORMAL &&
  410. prot != WLANTEST_INJECT_UNPROTECTED)
  411. return -1; /* Authentication frame is never protected */
  412. if (sta == NULL)
  413. return -1; /* No broadcast Authentication frames */
  414. if (sender_ap)
  415. wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR,
  416. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  417. else
  418. wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR,
  419. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  420. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_AUTH);
  421. mgmt.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
  422. mgmt.u.auth.auth_transaction = host_to_le16(1);
  423. mgmt.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS);
  424. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 6,
  425. WLANTEST_INJECT_UNPROTECTED);
  426. }
  427. static int ctrl_inject_assocreq(struct wlantest *wt, struct wlantest_bss *bss,
  428. struct wlantest_sta *sta, int sender_ap,
  429. enum wlantest_inject_protection prot)
  430. {
  431. u8 *buf;
  432. struct ieee80211_mgmt *mgmt;
  433. int ret;
  434. if (prot != WLANTEST_INJECT_NORMAL &&
  435. prot != WLANTEST_INJECT_UNPROTECTED)
  436. return -1; /* Association Request frame is never protected */
  437. if (sta == NULL)
  438. return -1; /* No broadcast Association Request frames */
  439. if (sender_ap)
  440. return -1; /* No Association Request frame sent by AP */
  441. if (sta->assocreq_ies == NULL) {
  442. wpa_printf(MSG_INFO, "INJECT: No previous (Re)Association "
  443. "Request available for " MACSTR,
  444. MAC2STR(sta->addr));
  445. return -1;
  446. }
  447. wpa_printf(MSG_INFO, "INJECT: AssocReq " MACSTR " -> " MACSTR,
  448. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  449. buf = os_malloc(sizeof(*mgmt) + sta->assocreq_ies_len);
  450. if (buf == NULL)
  451. return -1;
  452. mgmt = (struct ieee80211_mgmt *) buf;
  453. build_mgmt_hdr(mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_ASSOC_REQ);
  454. mgmt->u.assoc_req.capab_info = host_to_le16(sta->assocreq_capab_info);
  455. mgmt->u.assoc_req.listen_interval =
  456. host_to_le16(sta->assocreq_listen_int);
  457. os_memcpy(mgmt->u.assoc_req.variable, sta->assocreq_ies,
  458. sta->assocreq_ies_len);
  459. ret = wlantest_inject(wt, bss, sta, buf,
  460. 24 + 4 + sta->assocreq_ies_len,
  461. WLANTEST_INJECT_UNPROTECTED);
  462. os_free(buf);
  463. return ret;
  464. }
  465. static int ctrl_inject_reassocreq(struct wlantest *wt,
  466. struct wlantest_bss *bss,
  467. struct wlantest_sta *sta, int sender_ap,
  468. enum wlantest_inject_protection prot)
  469. {
  470. u8 *buf;
  471. struct ieee80211_mgmt *mgmt;
  472. int ret;
  473. if (prot != WLANTEST_INJECT_NORMAL &&
  474. prot != WLANTEST_INJECT_UNPROTECTED)
  475. return -1; /* Reassociation Request frame is never protected */
  476. if (sta == NULL)
  477. return -1; /* No broadcast Reassociation Request frames */
  478. if (sender_ap)
  479. return -1; /* No Reassociation Request frame sent by AP */
  480. if (sta->assocreq_ies == NULL) {
  481. wpa_printf(MSG_INFO, "INJECT: No previous (Re)Association "
  482. "Request available for " MACSTR,
  483. MAC2STR(sta->addr));
  484. return -1;
  485. }
  486. wpa_printf(MSG_INFO, "INJECT: ReassocReq " MACSTR " -> " MACSTR,
  487. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  488. buf = os_malloc(sizeof(*mgmt) + sta->assocreq_ies_len);
  489. if (buf == NULL)
  490. return -1;
  491. mgmt = (struct ieee80211_mgmt *) buf;
  492. build_mgmt_hdr(mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_REASSOC_REQ);
  493. mgmt->u.reassoc_req.capab_info =
  494. host_to_le16(sta->assocreq_capab_info);
  495. mgmt->u.reassoc_req.listen_interval =
  496. host_to_le16(sta->assocreq_listen_int);
  497. os_memcpy(mgmt->u.reassoc_req.current_ap, bss->bssid, ETH_ALEN);
  498. os_memcpy(mgmt->u.reassoc_req.variable, sta->assocreq_ies,
  499. sta->assocreq_ies_len);
  500. ret = wlantest_inject(wt, bss, sta, buf,
  501. 24 + 10 + sta->assocreq_ies_len,
  502. WLANTEST_INJECT_UNPROTECTED);
  503. os_free(buf);
  504. return ret;
  505. }
  506. static int ctrl_inject_deauth(struct wlantest *wt, struct wlantest_bss *bss,
  507. struct wlantest_sta *sta, int sender_ap,
  508. enum wlantest_inject_protection prot)
  509. {
  510. struct ieee80211_mgmt mgmt;
  511. if (sender_ap) {
  512. if (sta)
  513. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> "
  514. MACSTR,
  515. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  516. else
  517. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR
  518. " -> broadcast", MAC2STR(bss->bssid));
  519. } else
  520. wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> " MACSTR,
  521. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  522. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_DEAUTH);
  523. mgmt.u.deauth.reason_code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  524. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 2, prot);
  525. }
  526. static int ctrl_inject_disassoc(struct wlantest *wt, struct wlantest_bss *bss,
  527. struct wlantest_sta *sta, int sender_ap,
  528. enum wlantest_inject_protection prot)
  529. {
  530. struct ieee80211_mgmt mgmt;
  531. if (sender_ap) {
  532. if (sta)
  533. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR " -> "
  534. MACSTR,
  535. MAC2STR(bss->bssid), MAC2STR(sta->addr));
  536. else
  537. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR
  538. " -> broadcast", MAC2STR(bss->bssid));
  539. } else
  540. wpa_printf(MSG_INFO, "INJECT: Disassoc " MACSTR " -> " MACSTR,
  541. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  542. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_DISASSOC);
  543. mgmt.u.disassoc.reason_code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  544. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 2, prot);
  545. }
  546. static int ctrl_inject_saqueryreq(struct wlantest *wt,
  547. struct wlantest_bss *bss,
  548. struct wlantest_sta *sta, int sender_ap,
  549. enum wlantest_inject_protection prot)
  550. {
  551. struct ieee80211_mgmt mgmt;
  552. if (sta == NULL)
  553. return -1; /* No broadcast SA Query frames */
  554. if (sender_ap)
  555. wpa_printf(MSG_INFO, "INJECT: SA Query Request " MACSTR " -> "
  556. MACSTR, MAC2STR(bss->bssid), MAC2STR(sta->addr));
  557. else
  558. wpa_printf(MSG_INFO, "INJECT: SA Query Request " MACSTR " -> "
  559. MACSTR, MAC2STR(sta->addr), MAC2STR(bss->bssid));
  560. build_mgmt_hdr(&mgmt, bss, sta, sender_ap, WLAN_FC_STYPE_ACTION);
  561. mgmt.u.action.category = WLAN_ACTION_SA_QUERY;
  562. mgmt.u.action.u.sa_query_req.action = WLAN_SA_QUERY_REQUEST;
  563. mgmt.u.action.u.sa_query_req.trans_id[0] = 0x12;
  564. mgmt.u.action.u.sa_query_req.trans_id[1] = 0x34;
  565. os_memcpy(sender_ap ? sta->ap_sa_query_tr : sta->sta_sa_query_tr,
  566. mgmt.u.action.u.sa_query_req.trans_id,
  567. WLAN_SA_QUERY_TR_ID_LEN);
  568. return wlantest_inject(wt, bss, sta, (u8 *) &mgmt, 24 + 4, prot);
  569. }
  570. static void ctrl_inject(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  571. {
  572. u8 *bssid, *sta_addr;
  573. struct wlantest_bss *bss;
  574. struct wlantest_sta *sta;
  575. int frame, sender_ap, prot;
  576. int ret = 0;
  577. bssid = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_BSSID);
  578. sta_addr = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_STA_ADDR);
  579. frame = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_FRAME);
  580. sender_ap = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_SENDER_AP);
  581. if (sender_ap < 0)
  582. sender_ap = 0;
  583. prot = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_PROTECTION);
  584. if (bssid == NULL || sta_addr == NULL || frame < 0 || prot < 0) {
  585. wpa_printf(MSG_INFO, "Invalid inject command parameters");
  586. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  587. return;
  588. }
  589. bss = bss_find(wt, bssid);
  590. if (bss == NULL) {
  591. wpa_printf(MSG_INFO, "BSS not found for inject command");
  592. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  593. return;
  594. }
  595. if (is_broadcast_ether_addr(sta_addr)) {
  596. if (!sender_ap) {
  597. wpa_printf(MSG_INFO, "Invalid broadcast inject "
  598. "command without sender_ap set");
  599. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  600. return;
  601. } sta = NULL;
  602. } else {
  603. sta = sta_find(bss, sta_addr);
  604. if (sta == NULL) {
  605. wpa_printf(MSG_INFO, "Station not found for inject "
  606. "command");
  607. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  608. return;
  609. }
  610. }
  611. switch (frame) {
  612. case WLANTEST_FRAME_AUTH:
  613. ret = ctrl_inject_auth(wt, bss, sta, sender_ap, prot);
  614. break;
  615. case WLANTEST_FRAME_ASSOCREQ:
  616. ret = ctrl_inject_assocreq(wt, bss, sta, sender_ap, prot);
  617. break;
  618. case WLANTEST_FRAME_REASSOCREQ:
  619. ret = ctrl_inject_reassocreq(wt, bss, sta, sender_ap, prot);
  620. break;
  621. case WLANTEST_FRAME_DEAUTH:
  622. ret = ctrl_inject_deauth(wt, bss, sta, sender_ap, prot);
  623. break;
  624. case WLANTEST_FRAME_DISASSOC:
  625. ret = ctrl_inject_disassoc(wt, bss, sta, sender_ap, prot);
  626. break;
  627. case WLANTEST_FRAME_SAQUERYREQ:
  628. ret = ctrl_inject_saqueryreq(wt, bss, sta, sender_ap, prot);
  629. break;
  630. default:
  631. wpa_printf(MSG_INFO, "Unsupported inject command frame %d",
  632. frame);
  633. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  634. return;
  635. }
  636. if (ret)
  637. wpa_printf(MSG_INFO, "Failed to inject frame");
  638. else
  639. wpa_printf(MSG_INFO, "Frame injected successfully");
  640. ctrl_send_simple(wt, sock, ret == 0 ? WLANTEST_CTRL_SUCCESS :
  641. WLANTEST_CTRL_FAILURE);
  642. }
  643. static void ctrl_version(struct wlantest *wt, int sock)
  644. {
  645. u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos;
  646. pos = buf;
  647. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  648. pos += 4;
  649. pos = attr_add_str(pos, buf + sizeof(buf), WLANTEST_ATTR_VERSION,
  650. VERSION_STR);
  651. ctrl_send(wt, sock, buf, pos - buf);
  652. }
  653. static void ctrl_add_passphrase(struct wlantest *wt, int sock, u8 *cmd,
  654. size_t clen)
  655. {
  656. u8 *passphrase;
  657. size_t len;
  658. struct wlantest_passphrase *p, *pa;
  659. u8 *bssid;
  660. passphrase = attr_get(cmd, clen, WLANTEST_ATTR_PASSPHRASE, &len);
  661. if (passphrase == NULL || len < 8 || len > 63) {
  662. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  663. return;
  664. }
  665. p = os_zalloc(sizeof(*p));
  666. if (p == NULL) {
  667. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  668. return;
  669. }
  670. os_memcpy(p->passphrase, passphrase, len);
  671. wpa_printf(MSG_INFO, "Add passphrase '%s'", p->passphrase);
  672. bssid = attr_get_macaddr(cmd, clen, WLANTEST_ATTR_BSSID);
  673. if (bssid) {
  674. os_memcpy(p->bssid, bssid, ETH_ALEN);
  675. wpa_printf(MSG_INFO, "Limit passphrase for BSSID " MACSTR,
  676. MAC2STR(p->bssid));
  677. }
  678. dl_list_for_each(pa, &wt->passphrase, struct wlantest_passphrase, list)
  679. {
  680. if (os_strcmp(p->passphrase, pa->passphrase) == 0 &&
  681. os_memcmp(p->bssid, pa->bssid, ETH_ALEN) == 0) {
  682. wpa_printf(MSG_INFO, "Passphrase was already known");
  683. os_free(p);
  684. p = NULL;
  685. break;
  686. }
  687. }
  688. if (p) {
  689. struct wlantest_bss *bss;
  690. dl_list_add(&wt->passphrase, &p->list);
  691. dl_list_for_each(bss, &wt->bss, struct wlantest_bss, list) {
  692. if (bssid &&
  693. os_memcmp(p->bssid, bss->bssid, ETH_ALEN) != 0)
  694. continue;
  695. bss_add_pmk_from_passphrase(bss, p->passphrase);
  696. }
  697. }
  698. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  699. }
  700. static void info_print_proto(char *buf, size_t len, int proto)
  701. {
  702. char *pos, *end;
  703. if (proto == 0) {
  704. os_snprintf(buf, len, "OPEN");
  705. return;
  706. }
  707. pos = buf;
  708. end = buf + len;
  709. if (proto & WPA_PROTO_WPA)
  710. pos += os_snprintf(pos, end - pos, "%sWPA",
  711. pos == buf ? "" : " ");
  712. if (proto & WPA_PROTO_RSN)
  713. pos += os_snprintf(pos, end - pos, "%sWPA2",
  714. pos == buf ? "" : " ");
  715. }
  716. static void info_print_cipher(char *buf, size_t len, int cipher)
  717. {
  718. char *pos, *end;
  719. if (cipher == 0) {
  720. os_snprintf(buf, len, "N/A");
  721. return;
  722. }
  723. pos = buf;
  724. end = buf + len;
  725. if (cipher & WPA_CIPHER_NONE)
  726. pos += os_snprintf(pos, end - pos, "%sNONE",
  727. pos == buf ? "" : " ");
  728. if (cipher & WPA_CIPHER_WEP40)
  729. pos += os_snprintf(pos, end - pos, "%sWEP40",
  730. pos == buf ? "" : " ");
  731. if (cipher & WPA_CIPHER_WEP104)
  732. pos += os_snprintf(pos, end - pos, "%sWEP104",
  733. pos == buf ? "" : " ");
  734. if (cipher & WPA_CIPHER_TKIP)
  735. pos += os_snprintf(pos, end - pos, "%sTKIP",
  736. pos == buf ? "" : " ");
  737. if (cipher & WPA_CIPHER_CCMP)
  738. pos += os_snprintf(pos, end - pos, "%sCCMP",
  739. pos == buf ? "" : " ");
  740. if (cipher & WPA_CIPHER_AES_128_CMAC)
  741. pos += os_snprintf(pos, end - pos, "%sBIP",
  742. pos == buf ? "" : " ");
  743. }
  744. static void info_print_key_mgmt(char *buf, size_t len, int key_mgmt)
  745. {
  746. char *pos, *end;
  747. if (key_mgmt == 0) {
  748. os_snprintf(buf, len, "N/A");
  749. return;
  750. }
  751. pos = buf;
  752. end = buf + len;
  753. if (key_mgmt & WPA_KEY_MGMT_IEEE8021X)
  754. pos += os_snprintf(pos, end - pos, "%sEAP",
  755. pos == buf ? "" : " ");
  756. if (key_mgmt & WPA_KEY_MGMT_PSK)
  757. pos += os_snprintf(pos, end - pos, "%sPSK",
  758. pos == buf ? "" : " ");
  759. if (key_mgmt & WPA_KEY_MGMT_WPA_NONE)
  760. pos += os_snprintf(pos, end - pos, "%sWPA-NONE",
  761. pos == buf ? "" : " ");
  762. if (key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X)
  763. pos += os_snprintf(pos, end - pos, "%sFT-EAP",
  764. pos == buf ? "" : " ");
  765. if (key_mgmt & WPA_KEY_MGMT_FT_PSK)
  766. pos += os_snprintf(pos, end - pos, "%sFT-PSK",
  767. pos == buf ? "" : " ");
  768. if (key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256)
  769. pos += os_snprintf(pos, end - pos, "%sEAP-SHA256",
  770. pos == buf ? "" : " ");
  771. if (key_mgmt & WPA_KEY_MGMT_PSK_SHA256)
  772. pos += os_snprintf(pos, end - pos, "%sPSK-SHA256",
  773. pos == buf ? "" : " ");
  774. }
  775. static void info_print_rsn_capab(char *buf, size_t len, int capab)
  776. {
  777. char *pos, *end;
  778. pos = buf;
  779. end = buf + len;
  780. if (capab & WPA_CAPABILITY_PREAUTH)
  781. pos += os_snprintf(pos, end - pos, "%sPREAUTH",
  782. pos == buf ? "" : " ");
  783. if (capab & WPA_CAPABILITY_NO_PAIRWISE)
  784. pos += os_snprintf(pos, end - pos, "%sNO_PAIRWISE",
  785. pos == buf ? "" : " ");
  786. if (capab & WPA_CAPABILITY_MFPR)
  787. pos += os_snprintf(pos, end - pos, "%sMFPR",
  788. pos == buf ? "" : " ");
  789. if (capab & WPA_CAPABILITY_MFPC)
  790. pos += os_snprintf(pos, end - pos, "%sMFPC",
  791. pos == buf ? "" : " ");
  792. if (capab & WPA_CAPABILITY_PEERKEY_ENABLED)
  793. pos += os_snprintf(pos, end - pos, "%sPEERKEY",
  794. pos == buf ? "" : " ");
  795. }
  796. static void info_print_state(char *buf, size_t len, int state)
  797. {
  798. switch (state) {
  799. case STATE1:
  800. os_strlcpy(buf, "NOT-AUTH", len);
  801. break;
  802. case STATE2:
  803. os_strlcpy(buf, "AUTH", len);
  804. break;
  805. case STATE3:
  806. os_strlcpy(buf, "AUTH+ASSOC", len);
  807. break;
  808. }
  809. }
  810. static void ctrl_info_sta(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  811. {
  812. u8 *addr;
  813. size_t addr_len;
  814. struct wlantest_bss *bss;
  815. struct wlantest_sta *sta;
  816. enum wlantest_sta_info info;
  817. u8 buf[4 + 108], *end, *pos;
  818. char resp[100];
  819. bss = ctrl_get_bss(wt, sock, cmd, clen);
  820. sta = ctrl_get_sta(wt, sock, cmd, clen, bss);
  821. if (sta == NULL)
  822. return;
  823. addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_INFO, &addr_len);
  824. if (addr == NULL || addr_len != 4) {
  825. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  826. return;
  827. }
  828. info = WPA_GET_BE32(addr);
  829. resp[0] = '\0';
  830. switch (info) {
  831. case WLANTEST_STA_INFO_PROTO:
  832. info_print_proto(resp, sizeof(resp), sta->proto);
  833. break;
  834. case WLANTEST_STA_INFO_PAIRWISE:
  835. info_print_cipher(resp, sizeof(resp), sta->pairwise_cipher);
  836. break;
  837. case WLANTEST_STA_INFO_KEY_MGMT:
  838. info_print_key_mgmt(resp, sizeof(resp), sta->key_mgmt);
  839. break;
  840. case WLANTEST_STA_INFO_RSN_CAPAB:
  841. info_print_rsn_capab(resp, sizeof(resp), sta->rsn_capab);
  842. break;
  843. case WLANTEST_STA_INFO_STATE:
  844. info_print_state(resp, sizeof(resp), sta->state);
  845. break;
  846. default:
  847. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  848. return;
  849. }
  850. pos = buf;
  851. end = buf + sizeof(buf);
  852. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  853. pos += 4;
  854. pos = attr_add_str(pos, end, WLANTEST_ATTR_INFO, resp);
  855. ctrl_send(wt, sock, buf, pos - buf);
  856. }
  857. static void ctrl_info_bss(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  858. {
  859. u8 *addr;
  860. size_t addr_len;
  861. struct wlantest_bss *bss;
  862. enum wlantest_bss_info info;
  863. u8 buf[4 + 108], *end, *pos;
  864. char resp[100];
  865. bss = ctrl_get_bss(wt, sock, cmd, clen);
  866. if (bss == NULL)
  867. return;
  868. addr = attr_get(cmd, clen, WLANTEST_ATTR_BSS_INFO, &addr_len);
  869. if (addr == NULL || addr_len != 4) {
  870. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  871. return;
  872. }
  873. info = WPA_GET_BE32(addr);
  874. resp[0] = '\0';
  875. switch (info) {
  876. case WLANTEST_BSS_INFO_PROTO:
  877. info_print_proto(resp, sizeof(resp), bss->proto);
  878. break;
  879. case WLANTEST_BSS_INFO_PAIRWISE:
  880. info_print_cipher(resp, sizeof(resp), bss->pairwise_cipher);
  881. break;
  882. case WLANTEST_BSS_INFO_GROUP:
  883. info_print_cipher(resp, sizeof(resp), bss->group_cipher);
  884. break;
  885. case WLANTEST_BSS_INFO_GROUP_MGMT:
  886. info_print_cipher(resp, sizeof(resp), bss->mgmt_group_cipher);
  887. break;
  888. case WLANTEST_BSS_INFO_KEY_MGMT:
  889. info_print_key_mgmt(resp, sizeof(resp), bss->key_mgmt);
  890. break;
  891. case WLANTEST_BSS_INFO_RSN_CAPAB:
  892. info_print_rsn_capab(resp, sizeof(resp), bss->rsn_capab);
  893. break;
  894. default:
  895. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  896. return;
  897. }
  898. pos = buf;
  899. end = buf + sizeof(buf);
  900. WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
  901. pos += 4;
  902. pos = attr_add_str(pos, end, WLANTEST_ATTR_INFO, resp);
  903. ctrl_send(wt, sock, buf, pos - buf);
  904. }
  905. static void ctrl_send_(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
  906. {
  907. struct wlantest_bss *bss;
  908. struct wlantest_sta *sta;
  909. u8 *bssid, *sta_addr;
  910. int prot;
  911. u8 *frame;
  912. size_t frame_len;
  913. int ret = 0;
  914. struct ieee80211_hdr *hdr;
  915. u16 fc;
  916. frame = attr_get(cmd, clen, WLANTEST_ATTR_FRAME, &frame_len);
  917. prot = attr_get_int(cmd, clen, WLANTEST_ATTR_INJECT_PROTECTION);
  918. if (frame == NULL || frame_len < 24 || prot < 0) {
  919. wpa_printf(MSG_INFO, "Invalid send command parameters");
  920. ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
  921. return;
  922. }
  923. hdr = (struct ieee80211_hdr *) frame;
  924. fc = le_to_host16(hdr->frame_control);
  925. switch (WLAN_FC_GET_TYPE(fc)) {
  926. case WLAN_FC_TYPE_MGMT:
  927. bssid = hdr->addr3;
  928. if (os_memcmp(hdr->addr2, hdr->addr3, ETH_ALEN) == 0)
  929. sta_addr = hdr->addr1;
  930. else
  931. sta_addr = hdr->addr2;
  932. break;
  933. case WLAN_FC_TYPE_DATA:
  934. switch (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) {
  935. case 0:
  936. bssid = hdr->addr3;
  937. sta_addr = hdr->addr2;
  938. break;
  939. case WLAN_FC_TODS:
  940. bssid = hdr->addr1;
  941. sta_addr = hdr->addr2;
  942. break;
  943. case WLAN_FC_FROMDS:
  944. bssid = hdr->addr2;
  945. sta_addr = hdr->addr1;
  946. break;
  947. default:
  948. wpa_printf(MSG_INFO, "Unsupported inject frame");
  949. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  950. return;
  951. }
  952. break;
  953. default:
  954. wpa_printf(MSG_INFO, "Unsupported inject frame");
  955. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  956. return;
  957. }
  958. bss = bss_find(wt, bssid);
  959. if (bss == NULL) {
  960. wpa_printf(MSG_INFO, "Unknown BSSID");
  961. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  962. return;
  963. }
  964. sta = sta_find(bss, sta_addr);
  965. if (sta == NULL) {
  966. wpa_printf(MSG_INFO, "Unknown STA address");
  967. ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
  968. return;
  969. }
  970. ret = wlantest_inject(wt, bss, sta, frame, frame_len, prot);
  971. if (ret)
  972. wpa_printf(MSG_INFO, "Failed to inject frame");
  973. else
  974. wpa_printf(MSG_INFO, "Frame injected successfully");
  975. ctrl_send_simple(wt, sock, ret == 0 ? WLANTEST_CTRL_SUCCESS :
  976. WLANTEST_CTRL_FAILURE);
  977. }
  978. static void ctrl_read(int sock, void *eloop_ctx, void *sock_ctx)
  979. {
  980. struct wlantest *wt = eloop_ctx;
  981. u8 buf[WLANTEST_CTRL_MAX_CMD_LEN];
  982. int len;
  983. enum wlantest_ctrl_cmd cmd;
  984. wpa_printf(MSG_EXCESSIVE, "New control interface message from %d",
  985. sock);
  986. len = recv(sock, buf, sizeof(buf), 0);
  987. if (len < 0) {
  988. wpa_printf(MSG_INFO, "recv(ctrl): %s", strerror(errno));
  989. ctrl_disconnect(wt, sock);
  990. return;
  991. }
  992. if (len == 0) {
  993. ctrl_disconnect(wt, sock);
  994. return;
  995. }
  996. if (len < 4) {
  997. wpa_printf(MSG_INFO, "Too short control interface command "
  998. "from %d", sock);
  999. ctrl_disconnect(wt, sock);
  1000. return;
  1001. }
  1002. cmd = WPA_GET_BE32(buf);
  1003. wpa_printf(MSG_EXCESSIVE, "Control interface command %d from %d",
  1004. cmd, sock);
  1005. switch (cmd) {
  1006. case WLANTEST_CTRL_PING:
  1007. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  1008. break;
  1009. case WLANTEST_CTRL_TERMINATE:
  1010. ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
  1011. eloop_terminate();
  1012. break;
  1013. case WLANTEST_CTRL_LIST_BSS:
  1014. ctrl_list_bss(wt, sock);
  1015. break;
  1016. case WLANTEST_CTRL_LIST_STA:
  1017. ctrl_list_sta(wt, sock, buf + 4, len - 4);
  1018. break;
  1019. case WLANTEST_CTRL_FLUSH:
  1020. ctrl_flush(wt, sock);
  1021. break;
  1022. case WLANTEST_CTRL_CLEAR_STA_COUNTERS:
  1023. ctrl_clear_sta_counters(wt, sock, buf + 4, len - 4);
  1024. break;
  1025. case WLANTEST_CTRL_CLEAR_BSS_COUNTERS:
  1026. ctrl_clear_bss_counters(wt, sock, buf + 4, len - 4);
  1027. break;
  1028. case WLANTEST_CTRL_CLEAR_TDLS_COUNTERS:
  1029. ctrl_clear_tdls_counters(wt, sock, buf + 4, len - 4);
  1030. break;
  1031. case WLANTEST_CTRL_GET_STA_COUNTER:
  1032. ctrl_get_sta_counter(wt, sock, buf + 4, len - 4);
  1033. break;
  1034. case WLANTEST_CTRL_GET_BSS_COUNTER:
  1035. ctrl_get_bss_counter(wt, sock, buf + 4, len - 4);
  1036. break;
  1037. case WLANTEST_CTRL_GET_TDLS_COUNTER:
  1038. ctrl_get_tdls_counter(wt, sock, buf + 4, len - 4);
  1039. break;
  1040. case WLANTEST_CTRL_INJECT:
  1041. ctrl_inject(wt, sock, buf + 4, len - 4);
  1042. break;
  1043. case WLANTEST_CTRL_VERSION:
  1044. ctrl_version(wt, sock);
  1045. break;
  1046. case WLANTEST_CTRL_ADD_PASSPHRASE:
  1047. ctrl_add_passphrase(wt, sock, buf + 4, len - 4);
  1048. break;
  1049. case WLANTEST_CTRL_INFO_STA:
  1050. ctrl_info_sta(wt, sock, buf + 4, len - 4);
  1051. break;
  1052. case WLANTEST_CTRL_INFO_BSS:
  1053. ctrl_info_bss(wt, sock, buf + 4, len - 4);
  1054. break;
  1055. case WLANTEST_CTRL_SEND:
  1056. ctrl_send_(wt, sock, buf + 4, len - 4);
  1057. break;
  1058. default:
  1059. ctrl_send_simple(wt, sock, WLANTEST_CTRL_UNKNOWN_CMD);
  1060. break;
  1061. }
  1062. }
  1063. static void ctrl_connect(int sock, void *eloop_ctx, void *sock_ctx)
  1064. {
  1065. struct wlantest *wt = eloop_ctx;
  1066. int conn, i;
  1067. conn = accept(sock, NULL, NULL);
  1068. if (conn < 0) {
  1069. wpa_printf(MSG_INFO, "accept(ctrl): %s", strerror(errno));
  1070. return;
  1071. }
  1072. wpa_printf(MSG_MSGDUMP, "New control interface connection %d", conn);
  1073. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  1074. if (wt->ctrl_socks[i] < 0)
  1075. break;
  1076. }
  1077. if (i == MAX_CTRL_CONNECTIONS) {
  1078. wpa_printf(MSG_INFO, "No room for new control connection");
  1079. close(conn);
  1080. return;
  1081. }
  1082. wt->ctrl_socks[i] = conn;
  1083. eloop_register_read_sock(conn, ctrl_read, wt, NULL);
  1084. }
  1085. int ctrl_init(struct wlantest *wt)
  1086. {
  1087. struct sockaddr_un addr;
  1088. wt->ctrl_sock = socket(AF_UNIX, SOCK_SEQPACKET, 0);
  1089. if (wt->ctrl_sock < 0) {
  1090. wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
  1091. return -1;
  1092. }
  1093. os_memset(&addr, 0, sizeof(addr));
  1094. addr.sun_family = AF_UNIX;
  1095. os_strlcpy(addr.sun_path + 1, WLANTEST_SOCK_NAME,
  1096. sizeof(addr.sun_path) - 1);
  1097. if (bind(wt->ctrl_sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  1098. wpa_printf(MSG_ERROR, "bind: %s", strerror(errno));
  1099. close(wt->ctrl_sock);
  1100. wt->ctrl_sock = -1;
  1101. return -1;
  1102. }
  1103. if (listen(wt->ctrl_sock, 5) < 0) {
  1104. wpa_printf(MSG_ERROR, "listen: %s", strerror(errno));
  1105. close(wt->ctrl_sock);
  1106. wt->ctrl_sock = -1;
  1107. return -1;
  1108. }
  1109. if (eloop_register_read_sock(wt->ctrl_sock, ctrl_connect, wt, NULL)) {
  1110. close(wt->ctrl_sock);
  1111. wt->ctrl_sock = -1;
  1112. return -1;
  1113. }
  1114. return 0;
  1115. }
  1116. void ctrl_deinit(struct wlantest *wt)
  1117. {
  1118. int i;
  1119. if (wt->ctrl_sock < 0)
  1120. return;
  1121. for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
  1122. if (wt->ctrl_socks[i] >= 0) {
  1123. close(wt->ctrl_socks[i]);
  1124. eloop_unregister_read_sock(wt->ctrl_socks[i]);
  1125. wt->ctrl_socks[i] = -1;
  1126. }
  1127. }
  1128. eloop_unregister_read_sock(wt->ctrl_sock);
  1129. close(wt->ctrl_sock);
  1130. wt->ctrl_sock = -1;
  1131. }