wlantest_cli.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631
  1. /*
  2. * wlantest controller
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include <sys/un.h>
  16. #include "utils/common.h"
  17. #include "wlantest_ctrl.h"
  18. static u8 * attr_get(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr,
  19. size_t *len)
  20. {
  21. u8 *pos = buf;
  22. while (pos + 8 <= buf + buflen) {
  23. enum wlantest_ctrl_attr a;
  24. size_t alen;
  25. a = WPA_GET_BE32(pos);
  26. pos += 4;
  27. alen = WPA_GET_BE32(pos);
  28. pos += 4;
  29. if (pos + alen > buf + buflen) {
  30. printf("Invalid control message attribute\n");
  31. return NULL;
  32. }
  33. if (a == attr) {
  34. *len = alen;
  35. return pos;
  36. }
  37. pos += alen;
  38. }
  39. return NULL;
  40. }
  41. static u8 * attr_hdr_add(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  42. size_t len)
  43. {
  44. if (pos == NULL || end - pos < 8 + len)
  45. return NULL;
  46. WPA_PUT_BE32(pos, attr);
  47. pos += 4;
  48. WPA_PUT_BE32(pos, len);
  49. pos += 4;
  50. return pos;
  51. }
  52. static u8 * attr_add_be32(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
  53. u32 val)
  54. {
  55. if (pos == NULL || end - pos < 12)
  56. return NULL;
  57. WPA_PUT_BE32(pos, attr);
  58. pos += 4;
  59. WPA_PUT_BE32(pos, 4);
  60. pos += 4;
  61. WPA_PUT_BE32(pos, val);
  62. pos += 4;
  63. return pos;
  64. }
  65. static int cmd_send_and_recv(int s, const u8 *cmd, size_t cmd_len,
  66. u8 *resp, size_t max_resp_len)
  67. {
  68. int res;
  69. enum wlantest_ctrl_cmd cmd_resp;
  70. if (send(s, cmd, cmd_len, 0) < 0)
  71. return -1;
  72. res = recv(s, resp, max_resp_len, 0);
  73. if (res < 4)
  74. return -1;
  75. cmd_resp = WPA_GET_BE32(resp);
  76. if (cmd_resp == WLANTEST_CTRL_SUCCESS)
  77. return res;
  78. if (cmd_resp == WLANTEST_CTRL_UNKNOWN_CMD)
  79. printf("Unknown command\n");
  80. else if (cmd_resp == WLANTEST_CTRL_INVALID_CMD)
  81. printf("Invalid command\n");
  82. return -1;
  83. }
  84. static int cmd_simple(int s, enum wlantest_ctrl_cmd cmd)
  85. {
  86. u8 buf[4];
  87. int res;
  88. WPA_PUT_BE32(buf, cmd);
  89. res = cmd_send_and_recv(s, buf, sizeof(buf), buf, sizeof(buf));
  90. return res < 0 ? -1 : 0;
  91. }
  92. static int cmd_ping(int s, int argc, char *argv[])
  93. {
  94. int res = cmd_simple(s, WLANTEST_CTRL_PING);
  95. if (res == 0)
  96. printf("PONG\n");
  97. return res == 0;
  98. }
  99. static int cmd_terminate(int s, int argc, char *argv[])
  100. {
  101. return cmd_simple(s, WLANTEST_CTRL_TERMINATE);
  102. }
  103. static int cmd_list_bss(int s, int argc, char *argv[])
  104. {
  105. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  106. u8 buf[4];
  107. u8 *bssid;
  108. size_t len;
  109. int rlen, i;
  110. WPA_PUT_BE32(buf, WLANTEST_CTRL_LIST_BSS);
  111. rlen = cmd_send_and_recv(s, buf, sizeof(buf), resp, sizeof(resp));
  112. if (rlen < 0)
  113. return -1;
  114. bssid = attr_get(resp + 4, rlen - 4, WLANTEST_ATTR_BSSID, &len);
  115. if (bssid == NULL)
  116. return -1;
  117. for (i = 0; i < len / ETH_ALEN; i++)
  118. printf(MACSTR " ", MAC2STR(bssid + ETH_ALEN * i));
  119. printf("\n");
  120. return 0;
  121. }
  122. static int cmd_list_sta(int s, int argc, char *argv[])
  123. {
  124. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  125. u8 buf[100], *pos;
  126. u8 *addr;
  127. size_t len;
  128. int rlen, i;
  129. if (argc < 1) {
  130. printf("list_sta needs one argument: BSSID\n");
  131. return -1;
  132. }
  133. pos = buf;
  134. WPA_PUT_BE32(pos, WLANTEST_CTRL_LIST_STA);
  135. pos += 4;
  136. WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
  137. pos += 4;
  138. WPA_PUT_BE32(pos, ETH_ALEN);
  139. pos += 4;
  140. if (hwaddr_aton(argv[0], pos) < 0) {
  141. printf("Invalid BSSID '%s'\n", argv[0]);
  142. return -1;
  143. }
  144. pos += ETH_ALEN;
  145. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  146. if (rlen < 0)
  147. return -1;
  148. addr = attr_get(resp + 4, rlen - 4, WLANTEST_ATTR_STA_ADDR, &len);
  149. if (addr == NULL)
  150. return -1;
  151. for (i = 0; i < len / ETH_ALEN; i++)
  152. printf(MACSTR " ", MAC2STR(addr + ETH_ALEN * i));
  153. printf("\n");
  154. return 0;
  155. }
  156. static int cmd_flush(int s, int argc, char *argv[])
  157. {
  158. return cmd_simple(s, WLANTEST_CTRL_FLUSH);
  159. }
  160. static int cmd_clear_sta_counters(int s, int argc, char *argv[])
  161. {
  162. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  163. u8 buf[100], *pos;
  164. int rlen;
  165. if (argc < 2) {
  166. printf("clear_sta_counters needs two arguments: BSSID and "
  167. "STA address\n");
  168. return -1;
  169. }
  170. pos = buf;
  171. WPA_PUT_BE32(pos, WLANTEST_CTRL_CLEAR_STA_COUNTERS);
  172. pos += 4;
  173. WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
  174. pos += 4;
  175. WPA_PUT_BE32(pos, ETH_ALEN);
  176. pos += 4;
  177. if (hwaddr_aton(argv[0], pos) < 0) {
  178. printf("Invalid BSSID '%s'\n", argv[0]);
  179. return -1;
  180. }
  181. pos += ETH_ALEN;
  182. WPA_PUT_BE32(pos, WLANTEST_ATTR_STA_ADDR);
  183. pos += 4;
  184. WPA_PUT_BE32(pos, ETH_ALEN);
  185. pos += 4;
  186. if (hwaddr_aton(argv[1], pos) < 0) {
  187. printf("Invalid STA address '%s'\n", argv[1]);
  188. return -1;
  189. }
  190. pos += ETH_ALEN;
  191. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  192. if (rlen < 0)
  193. return -1;
  194. printf("OK\n");
  195. return 0;
  196. }
  197. static int cmd_clear_bss_counters(int s, int argc, char *argv[])
  198. {
  199. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  200. u8 buf[100], *pos;
  201. int rlen;
  202. if (argc < 1) {
  203. printf("clear_bss_counters needs one argument: BSSID\n");
  204. return -1;
  205. }
  206. pos = buf;
  207. WPA_PUT_BE32(pos, WLANTEST_CTRL_CLEAR_BSS_COUNTERS);
  208. pos += 4;
  209. WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
  210. pos += 4;
  211. WPA_PUT_BE32(pos, ETH_ALEN);
  212. pos += 4;
  213. if (hwaddr_aton(argv[0], pos) < 0) {
  214. printf("Invalid BSSID '%s'\n", argv[0]);
  215. return -1;
  216. }
  217. pos += ETH_ALEN;
  218. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  219. if (rlen < 0)
  220. return -1;
  221. printf("OK\n");
  222. return 0;
  223. }
  224. struct sta_counters {
  225. const char *name;
  226. enum wlantest_sta_counter num;
  227. };
  228. static const struct sta_counters sta_counters[] = {
  229. { "auth_tx", WLANTEST_STA_COUNTER_AUTH_TX },
  230. { "auth_rx", WLANTEST_STA_COUNTER_AUTH_RX },
  231. { "assocreq_tx", WLANTEST_STA_COUNTER_ASSOCREQ_TX },
  232. { "reassocreq_tx", WLANTEST_STA_COUNTER_REASSOCREQ_TX },
  233. { "ptk_learned", WLANTEST_STA_COUNTER_PTK_LEARNED },
  234. { "valid_deauth_tx", WLANTEST_STA_COUNTER_VALID_DEAUTH_TX },
  235. { "valid_deauth_rx", WLANTEST_STA_COUNTER_VALID_DEAUTH_RX },
  236. { "invalid_deauth_tx", WLANTEST_STA_COUNTER_INVALID_DEAUTH_TX },
  237. { "invalid_deauth_rx", WLANTEST_STA_COUNTER_INVALID_DEAUTH_RX },
  238. { "valid_disassoc_tx", WLANTEST_STA_COUNTER_VALID_DISASSOC_TX },
  239. { "valid_disassoc_rx", WLANTEST_STA_COUNTER_VALID_DISASSOC_RX },
  240. { "invalid_disassoc_tx", WLANTEST_STA_COUNTER_INVALID_DISASSOC_TX },
  241. { "invalid_disassoc_rx", WLANTEST_STA_COUNTER_INVALID_DISASSOC_RX },
  242. { "valid_saqueryreq_tx", WLANTEST_STA_COUNTER_VALID_SAQUERYREQ_TX },
  243. { "valid_saqueryreq_rx", WLANTEST_STA_COUNTER_VALID_SAQUERYREQ_RX },
  244. { "invalid_saqueryreq_tx",
  245. WLANTEST_STA_COUNTER_INVALID_SAQUERYREQ_TX },
  246. { "invalid_saqueryreq_rx",
  247. WLANTEST_STA_COUNTER_INVALID_SAQUERYREQ_RX },
  248. { "valid_saqueryresp_tx", WLANTEST_STA_COUNTER_VALID_SAQUERYRESP_TX },
  249. { "valid_saqueryresp_rx", WLANTEST_STA_COUNTER_VALID_SAQUERYRESP_RX },
  250. { "invalid_saqueryresp_tx",
  251. WLANTEST_STA_COUNTER_INVALID_SAQUERYRESP_TX },
  252. { "invalid_saqueryresp_rx",
  253. WLANTEST_STA_COUNTER_INVALID_SAQUERYRESP_RX },
  254. { NULL, 0 }
  255. };
  256. static int cmd_get_sta_counter(int s, int argc, char *argv[])
  257. {
  258. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  259. u8 buf[100], *end, *pos;
  260. int rlen, i;
  261. size_t len;
  262. if (argc != 3) {
  263. printf("get_sta_counter needs at three arguments: "
  264. "counter name, BSSID, and STA address\n");
  265. return -1;
  266. }
  267. pos = buf;
  268. end = buf + sizeof(buf);
  269. WPA_PUT_BE32(pos, WLANTEST_CTRL_GET_STA_COUNTER);
  270. pos += 4;
  271. for (i = 0; sta_counters[i].name; i++) {
  272. if (os_strcasecmp(sta_counters[i].name, argv[0]) == 0)
  273. break;
  274. }
  275. if (sta_counters[i].name == NULL) {
  276. printf("Unknown STA counter '%s'\n", argv[0]);
  277. printf("Counters:");
  278. for (i = 0; sta_counters[i].name; i++)
  279. printf(" %s", sta_counters[i].name);
  280. printf("\n");
  281. return -1;
  282. }
  283. pos = attr_add_be32(pos, end, WLANTEST_ATTR_STA_COUNTER,
  284. sta_counters[i].num);
  285. pos = attr_hdr_add(pos, end, WLANTEST_ATTR_BSSID, ETH_ALEN);
  286. if (hwaddr_aton(argv[1], pos) < 0) {
  287. printf("Invalid BSSID '%s'\n", argv[1]);
  288. return -1;
  289. }
  290. pos += ETH_ALEN;
  291. pos = attr_hdr_add(pos, end, WLANTEST_ATTR_STA_ADDR, ETH_ALEN);
  292. if (hwaddr_aton(argv[2], pos) < 0) {
  293. printf("Invalid STA address '%s'\n", argv[2]);
  294. return -1;
  295. }
  296. pos += ETH_ALEN;
  297. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  298. if (rlen < 0)
  299. return -1;
  300. pos = attr_get(resp + 4, rlen - 4, WLANTEST_ATTR_COUNTER, &len);
  301. if (pos == NULL || len != 4)
  302. return -1;
  303. printf("%u\n", WPA_GET_BE32(pos));
  304. return 0;
  305. }
  306. struct bss_counters {
  307. const char *name;
  308. enum wlantest_bss_counter num;
  309. };
  310. static const struct bss_counters bss_counters[] = {
  311. { "valid_bip_mmie", WLANTEST_BSS_COUNTER_VALID_BIP_MMIE },
  312. { "invalid_bip_mmie", WLANTEST_BSS_COUNTER_INVALID_BIP_MMIE },
  313. { "missing_bip_mmie", WLANTEST_BSS_COUNTER_MISSING_BIP_MMIE },
  314. { NULL, 0 }
  315. };
  316. static int cmd_get_bss_counter(int s, int argc, char *argv[])
  317. {
  318. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  319. u8 buf[100], *end, *pos;
  320. int rlen, i;
  321. size_t len;
  322. if (argc != 2) {
  323. printf("get_bss_counter needs at three arguments: "
  324. "counter name and BSSID\n");
  325. return -1;
  326. }
  327. pos = buf;
  328. end = buf + sizeof(buf);
  329. WPA_PUT_BE32(pos, WLANTEST_CTRL_GET_BSS_COUNTER);
  330. pos += 4;
  331. for (i = 0; bss_counters[i].name; i++) {
  332. if (os_strcasecmp(bss_counters[i].name, argv[0]) == 0)
  333. break;
  334. }
  335. if (bss_counters[i].name == NULL) {
  336. printf("Unknown BSS counter '%s'\n", argv[0]);
  337. printf("Counters:");
  338. for (i = 0; bss_counters[i].name; i++)
  339. printf(" %s", bss_counters[i].name);
  340. printf("\n");
  341. return -1;
  342. }
  343. pos = attr_add_be32(pos, end, WLANTEST_ATTR_BSS_COUNTER,
  344. bss_counters[i].num);
  345. pos = attr_hdr_add(pos, end, WLANTEST_ATTR_BSSID, ETH_ALEN);
  346. if (hwaddr_aton(argv[1], pos) < 0) {
  347. printf("Invalid BSSID '%s'\n", argv[1]);
  348. return -1;
  349. }
  350. pos += ETH_ALEN;
  351. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  352. if (rlen < 0)
  353. return -1;
  354. pos = attr_get(resp + 4, rlen - 4, WLANTEST_ATTR_COUNTER, &len);
  355. if (pos == NULL || len != 4)
  356. return -1;
  357. printf("%u\n", WPA_GET_BE32(pos));
  358. return 0;
  359. }
  360. struct inject_frames {
  361. const char *name;
  362. enum wlantest_inject_frame frame;
  363. };
  364. static const struct inject_frames inject_frames[] = {
  365. { "auth", WLANTEST_FRAME_AUTH },
  366. { "assocreq", WLANTEST_FRAME_ASSOCREQ },
  367. { "reassocreq", WLANTEST_FRAME_REASSOCREQ },
  368. { "deauth", WLANTEST_FRAME_DEAUTH },
  369. { "disassoc", WLANTEST_FRAME_DISASSOC },
  370. { "saqueryreq", WLANTEST_FRAME_SAQUERYREQ },
  371. { NULL, 0 }
  372. };
  373. static int cmd_inject(int s, int argc, char *argv[])
  374. {
  375. u8 resp[WLANTEST_CTRL_MAX_RESP_LEN];
  376. u8 buf[100], *end, *pos;
  377. int rlen, i;
  378. enum wlantest_inject_protection prot;
  379. /* <frame> <prot> <sender> <BSSID> <STA/ff:ff:ff:ff:ff:ff> */
  380. if (argc < 5) {
  381. printf("inject needs five arguments: frame, protection, "
  382. "sender, BSSID, STA/ff:ff:ff:ff:ff:ff\n");
  383. return -1;
  384. }
  385. pos = buf;
  386. end = buf + sizeof(buf);
  387. WPA_PUT_BE32(pos, WLANTEST_CTRL_INJECT);
  388. pos += 4;
  389. for (i = 0; inject_frames[i].name; i++) {
  390. if (os_strcasecmp(inject_frames[i].name, argv[0]) == 0)
  391. break;
  392. }
  393. if (inject_frames[i].name == NULL) {
  394. printf("Unknown inject frame '%s'\n", argv[0]);
  395. printf("Frames:");
  396. for (i = 0; inject_frames[i].name; i++)
  397. printf(" %s", inject_frames[i].name);
  398. printf("\n");
  399. return -1;
  400. }
  401. pos = attr_add_be32(pos, end, WLANTEST_ATTR_INJECT_FRAME,
  402. inject_frames[i].frame);
  403. if (os_strcasecmp(argv[1], "normal") == 0)
  404. prot = WLANTEST_INJECT_NORMAL;
  405. else if (os_strcasecmp(argv[1], "protected") == 0)
  406. prot = WLANTEST_INJECT_PROTECTED;
  407. else if (os_strcasecmp(argv[1], "unprotected") == 0)
  408. prot = WLANTEST_INJECT_UNPROTECTED;
  409. else if (os_strcasecmp(argv[1], "incorrect") == 0)
  410. prot = WLANTEST_INJECT_INCORRECT_KEY;
  411. else {
  412. printf("Unknown protection type '%s'\n", argv[1]);
  413. printf("Protection types: normal protected unprotected "
  414. "incorrect\n");
  415. return -1;
  416. }
  417. pos = attr_add_be32(pos, end, WLANTEST_ATTR_INJECT_PROTECTION, prot);
  418. if (os_strcasecmp(argv[2], "ap") == 0) {
  419. pos = attr_add_be32(pos, end, WLANTEST_ATTR_INJECT_SENDER_AP,
  420. 1);
  421. } else if (os_strcasecmp(argv[2], "sta") == 0) {
  422. pos = attr_add_be32(pos, end, WLANTEST_ATTR_INJECT_SENDER_AP,
  423. 0);
  424. } else {
  425. printf("Unknown sender '%s'\n", argv[2]);
  426. printf("Sender types: ap sta\n");
  427. return -1;
  428. }
  429. pos = attr_hdr_add(pos, end, WLANTEST_ATTR_BSSID, ETH_ALEN);
  430. if (hwaddr_aton(argv[3], pos) < 0) {
  431. printf("Invalid BSSID '%s'\n", argv[3]);
  432. return -1;
  433. }
  434. pos += ETH_ALEN;
  435. pos = attr_hdr_add(pos, end, WLANTEST_ATTR_STA_ADDR, ETH_ALEN);
  436. if (hwaddr_aton(argv[4], pos) < 0) {
  437. printf("Invalid STA '%s'\n", argv[4]);
  438. return -1;
  439. }
  440. pos += ETH_ALEN;
  441. rlen = cmd_send_and_recv(s, buf, pos - buf, resp, sizeof(resp));
  442. if (rlen < 0)
  443. return -1;
  444. printf("OK\n");
  445. return 0;
  446. }
  447. struct wlantest_cli_cmd {
  448. const char *cmd;
  449. int (*handler)(int s, int argc, char *argv[]);
  450. const char *usage;
  451. };
  452. static const struct wlantest_cli_cmd wlantest_cli_commands[] = {
  453. { "ping", cmd_ping, "= test connection to wlantest" },
  454. { "terminate", cmd_terminate, "= terminate wlantest" },
  455. { "list_bss", cmd_list_bss, "= get BSS list" },
  456. { "list_sta", cmd_list_sta, "<BSSID> = get STA list" },
  457. { "flush", cmd_flush, "= drop all collected BSS data" },
  458. { "clear_sta_counters", cmd_clear_sta_counters,
  459. "<BSSID> <STA> = clear STA counters" },
  460. { "clear_bss_counters", cmd_clear_bss_counters,
  461. "<BSSID> = clear BSS counters" },
  462. { "get_sta_counter", cmd_get_sta_counter,
  463. "<counter> <BSSID> <STA> = get STA counter value" },
  464. { "get_bss_counter", cmd_get_bss_counter,
  465. "<counter> <BSSID> = get BSS counter value" },
  466. { "inject", cmd_inject,
  467. "<frame> <prot> <sender> <BSSID> <STA/ff:ff:ff:ff:ff:ff>" },
  468. { NULL, NULL, NULL }
  469. };
  470. static int ctrl_command(int s, int argc, char *argv[])
  471. {
  472. const struct wlantest_cli_cmd *cmd, *match = NULL;
  473. int count = 0;
  474. int ret = 0;
  475. for (cmd = wlantest_cli_commands; cmd->cmd; cmd++) {
  476. if (os_strncasecmp(cmd->cmd, argv[0], os_strlen(argv[0])) == 0)
  477. {
  478. match = cmd;
  479. if (os_strcasecmp(cmd->cmd, argv[0]) == 0) {
  480. /* exact match */
  481. count = 1;
  482. break;
  483. }
  484. count++;
  485. }
  486. }
  487. if (count > 1) {
  488. printf("Ambiguous command '%s'; possible commands:", argv[0]);
  489. for (cmd = wlantest_cli_commands; cmd->cmd; cmd++) {
  490. if (os_strncasecmp(cmd->cmd, argv[0],
  491. os_strlen(argv[0])) == 0) {
  492. printf(" %s", cmd->cmd);
  493. }
  494. }
  495. printf("\n");
  496. ret = 1;
  497. } else if (count == 0) {
  498. printf("Unknown command '%s'\n", argv[0]);
  499. ret = 1;
  500. } else {
  501. ret = match->handler(s, argc - 1, &argv[1]);
  502. }
  503. return ret;
  504. }
  505. int main(int argc, char *argv[])
  506. {
  507. int s;
  508. struct sockaddr_un addr;
  509. int ret = 0;
  510. s = socket(AF_UNIX, SOCK_SEQPACKET, 0);
  511. if (s < 0) {
  512. perror("socket");
  513. return -1;
  514. }
  515. os_memset(&addr, 0, sizeof(addr));
  516. addr.sun_family = AF_UNIX;
  517. os_strlcpy(addr.sun_path + 1, WLANTEST_SOCK_NAME,
  518. sizeof(addr.sun_path) - 1);
  519. if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  520. perror("connect");
  521. close(s);
  522. return -1;
  523. }
  524. if (argc > 1) {
  525. ret = ctrl_command(s, argc - 1, &argv[1]);
  526. if (ret < 0)
  527. printf("FAIL\n");
  528. } else {
  529. /* TODO: interactive */
  530. }
  531. close(s);
  532. return ret;
  533. }