]>
Commit | Line | Data |
---|---|---|
6fc6879b JM |
1 | /* |
2 | * WPA Supplicant - test code for pre-authentication | |
3 | * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> | |
4 | * | |
0f3d578e JM |
5 | * This software may be distributed under the terms of the BSD license. |
6 | * See README for more details. | |
6fc6879b JM |
7 | * |
8 | * IEEE 802.1X Supplicant test code (to be used in place of wpa_supplicant.c. | |
9 | * Not used in production version. | |
10 | */ | |
11 | ||
12 | #include "includes.h" | |
13 | #include <assert.h> | |
14 | ||
15 | #include "common.h" | |
16 | #include "config.h" | |
17 | #include "eapol_supp/eapol_supp_sm.h" | |
18 | #include "eloop.h" | |
3acb5005 | 19 | #include "rsn_supp/wpa.h" |
6fc6879b JM |
20 | #include "eap_peer/eap.h" |
21 | #include "wpa_supplicant_i.h" | |
22 | #include "l2_packet/l2_packet.h" | |
23 | #include "ctrl_iface.h" | |
24 | #include "pcsc_funcs.h" | |
3acb5005 JM |
25 | #include "rsn_supp/preauth.h" |
26 | #include "rsn_supp/pmksa_cache.h" | |
c5121837 | 27 | #include "drivers/driver.h" |
6fc6879b JM |
28 | |
29 | ||
c5121837 | 30 | struct wpa_driver_ops *wpa_drivers[] = { NULL }; |
6fc6879b JM |
31 | |
32 | ||
33 | struct preauth_test_data { | |
34 | int auth_timed_out; | |
35 | }; | |
36 | ||
37 | ||
6fc6879b JM |
38 | static void _wpa_supplicant_deauthenticate(void *wpa_s, int reason_code) |
39 | { | |
40 | wpa_supplicant_deauthenticate(wpa_s, reason_code); | |
41 | } | |
42 | ||
43 | ||
44 | static u8 * wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, | |
45 | const void *data, u16 data_len, | |
46 | size_t *msg_len, void **data_pos) | |
47 | { | |
48 | struct ieee802_1x_hdr *hdr; | |
49 | ||
50 | *msg_len = sizeof(*hdr) + data_len; | |
51 | hdr = os_malloc(*msg_len); | |
52 | if (hdr == NULL) | |
53 | return NULL; | |
54 | ||
55 | hdr->version = wpa_s->conf->eapol_version; | |
56 | hdr->type = type; | |
57 | hdr->length = htons(data_len); | |
58 | ||
59 | if (data) | |
60 | os_memcpy(hdr + 1, data, data_len); | |
61 | else | |
62 | os_memset(hdr + 1, 0, data_len); | |
63 | ||
64 | if (data_pos) | |
65 | *data_pos = hdr + 1; | |
66 | ||
67 | return (u8 *) hdr; | |
68 | } | |
69 | ||
70 | ||
71 | static u8 * _wpa_alloc_eapol(void *wpa_s, u8 type, | |
72 | const void *data, u16 data_len, | |
73 | size_t *msg_len, void **data_pos) | |
74 | { | |
75 | return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); | |
76 | } | |
77 | ||
78 | ||
71934751 | 79 | static void _wpa_supplicant_set_state(void *ctx, enum wpa_states state) |
6fc6879b JM |
80 | { |
81 | struct wpa_supplicant *wpa_s = ctx; | |
82 | wpa_s->wpa_state = state; | |
83 | } | |
84 | ||
85 | ||
71934751 | 86 | static enum wpa_states _wpa_supplicant_get_state(void *ctx) |
6fc6879b JM |
87 | { |
88 | struct wpa_supplicant *wpa_s = ctx; | |
89 | return wpa_s->wpa_state; | |
90 | } | |
91 | ||
92 | ||
93 | static int wpa_ether_send(void *wpa_s, const u8 *dest, u16 proto, | |
94 | const u8 *buf, size_t len) | |
95 | { | |
96 | printf("%s - not implemented\n", __func__); | |
97 | return -1; | |
98 | } | |
99 | ||
100 | ||
101 | static void * wpa_supplicant_get_network_ctx(void *wpa_s) | |
102 | { | |
103 | return wpa_supplicant_get_ssid(wpa_s); | |
104 | } | |
105 | ||
106 | ||
107 | static void _wpa_supplicant_cancel_auth_timeout(void *wpa_s) | |
108 | { | |
109 | wpa_supplicant_cancel_auth_timeout(wpa_s); | |
110 | } | |
111 | ||
112 | ||
113 | static int wpa_supplicant_get_beacon_ie(void *wpa_s) | |
114 | { | |
115 | printf("%s - not implemented\n", __func__); | |
116 | return -1; | |
117 | } | |
118 | ||
119 | ||
120 | static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) | |
121 | { | |
122 | printf("%s - not implemented\n", __func__); | |
123 | return -1; | |
124 | } | |
125 | ||
126 | ||
71934751 | 127 | static int wpa_supplicant_set_key(void *wpa_s, enum wpa_alg alg, |
6fc6879b JM |
128 | const u8 *addr, int key_idx, int set_tx, |
129 | const u8 *seq, size_t seq_len, | |
130 | const u8 *key, size_t key_len) | |
131 | { | |
132 | printf("%s - not implemented\n", __func__); | |
133 | return -1; | |
134 | } | |
135 | ||
136 | ||
137 | static int wpa_supplicant_mlme_setprotection(void *wpa_s, const u8 *addr, | |
138 | int protection_type, | |
139 | int key_type) | |
140 | { | |
141 | printf("%s - not implemented\n", __func__); | |
142 | return -1; | |
143 | } | |
144 | ||
145 | ||
146 | static int wpa_supplicant_add_pmkid(void *wpa_s, | |
147 | const u8 *bssid, const u8 *pmkid) | |
148 | { | |
149 | printf("%s - not implemented\n", __func__); | |
150 | return -1; | |
151 | } | |
152 | ||
153 | ||
154 | static int wpa_supplicant_remove_pmkid(void *wpa_s, | |
155 | const u8 *bssid, const u8 *pmkid) | |
156 | { | |
157 | printf("%s - not implemented\n", __func__); | |
158 | return -1; | |
159 | } | |
160 | ||
161 | ||
162 | static void wpa_supplicant_set_config_blob(void *ctx, | |
163 | struct wpa_config_blob *blob) | |
164 | { | |
165 | struct wpa_supplicant *wpa_s = ctx; | |
166 | wpa_config_set_blob(wpa_s->conf, blob); | |
167 | } | |
168 | ||
169 | ||
170 | static const struct wpa_config_blob * | |
171 | wpa_supplicant_get_config_blob(void *ctx, const char *name) | |
172 | { | |
173 | struct wpa_supplicant *wpa_s = ctx; | |
174 | return wpa_config_get_blob(wpa_s->conf, name); | |
175 | } | |
176 | ||
177 | ||
178 | static void test_eapol_clean(struct wpa_supplicant *wpa_s) | |
179 | { | |
180 | rsn_preauth_deinit(wpa_s->wpa); | |
181 | pmksa_candidate_free(wpa_s->wpa); | |
182 | wpa_sm_deinit(wpa_s->wpa); | |
183 | scard_deinit(wpa_s->scard); | |
184 | if (wpa_s->ctrl_iface) { | |
185 | wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface); | |
186 | wpa_s->ctrl_iface = NULL; | |
187 | } | |
188 | wpa_config_free(wpa_s->conf); | |
189 | } | |
190 | ||
191 | ||
192 | static void eapol_test_timeout(void *eloop_ctx, void *timeout_ctx) | |
193 | { | |
194 | struct preauth_test_data *p = eloop_ctx; | |
195 | printf("EAPOL test timed out\n"); | |
196 | p->auth_timed_out = 1; | |
197 | eloop_terminate(); | |
198 | } | |
199 | ||
200 | ||
201 | static void eapol_test_poll(void *eloop_ctx, void *timeout_ctx) | |
202 | { | |
203 | struct wpa_supplicant *wpa_s = eloop_ctx; | |
204 | if (!rsn_preauth_in_progress(wpa_s->wpa)) | |
205 | eloop_terminate(); | |
206 | else { | |
207 | eloop_register_timeout(0, 100000, eapol_test_poll, eloop_ctx, | |
208 | timeout_ctx); | |
209 | } | |
210 | } | |
211 | ||
212 | ||
213 | static struct wpa_driver_ops dummy_driver; | |
214 | ||
215 | ||
216 | static void wpa_init_conf(struct wpa_supplicant *wpa_s, const char *ifname) | |
217 | { | |
218 | struct l2_packet_data *l2; | |
219 | struct wpa_sm_ctx *ctx; | |
220 | ||
221 | os_memset(&dummy_driver, 0, sizeof(dummy_driver)); | |
222 | wpa_s->driver = &dummy_driver; | |
223 | ||
224 | ctx = os_zalloc(sizeof(*ctx)); | |
225 | assert(ctx != NULL); | |
226 | ||
227 | ctx->ctx = wpa_s; | |
0f057fb2 | 228 | ctx->msg_ctx = wpa_s; |
6fc6879b JM |
229 | ctx->set_state = _wpa_supplicant_set_state; |
230 | ctx->get_state = _wpa_supplicant_get_state; | |
6fc6879b | 231 | ctx->deauthenticate = _wpa_supplicant_deauthenticate; |
6fc6879b JM |
232 | ctx->set_key = wpa_supplicant_set_key; |
233 | ctx->get_network_ctx = wpa_supplicant_get_network_ctx; | |
234 | ctx->get_bssid = wpa_supplicant_get_bssid; | |
235 | ctx->ether_send = wpa_ether_send; | |
236 | ctx->get_beacon_ie = wpa_supplicant_get_beacon_ie; | |
237 | ctx->alloc_eapol = _wpa_alloc_eapol; | |
238 | ctx->cancel_auth_timeout = _wpa_supplicant_cancel_auth_timeout; | |
239 | ctx->add_pmkid = wpa_supplicant_add_pmkid; | |
240 | ctx->remove_pmkid = wpa_supplicant_remove_pmkid; | |
241 | ctx->set_config_blob = wpa_supplicant_set_config_blob; | |
242 | ctx->get_config_blob = wpa_supplicant_get_config_blob; | |
243 | ctx->mlme_setprotection = wpa_supplicant_mlme_setprotection; | |
244 | ||
245 | wpa_s->wpa = wpa_sm_init(ctx); | |
246 | assert(wpa_s->wpa != NULL); | |
247 | wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); | |
248 | ||
249 | os_strlcpy(wpa_s->ifname, ifname, sizeof(wpa_s->ifname)); | |
250 | wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL); | |
251 | ||
252 | l2 = l2_packet_init(wpa_s->ifname, NULL, ETH_P_RSN_PREAUTH, NULL, | |
253 | NULL, 0); | |
254 | assert(l2 != NULL); | |
255 | if (l2_packet_get_own_addr(l2, wpa_s->own_addr)) { | |
256 | wpa_printf(MSG_WARNING, "Failed to get own L2 address\n"); | |
257 | exit(-1); | |
258 | } | |
259 | l2_packet_deinit(l2); | |
260 | wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr); | |
261 | } | |
262 | ||
263 | ||
0456ea16 | 264 | static void eapol_test_terminate(int sig, void *signal_ctx) |
6fc6879b | 265 | { |
0456ea16 | 266 | struct wpa_supplicant *wpa_s = signal_ctx; |
6fc6879b JM |
267 | wpa_msg(wpa_s, MSG_INFO, "Signal %d received - terminating", sig); |
268 | eloop_terminate(); | |
269 | } | |
270 | ||
271 | ||
272 | int main(int argc, char *argv[]) | |
273 | { | |
274 | struct wpa_supplicant wpa_s; | |
275 | int ret = 1; | |
276 | u8 bssid[ETH_ALEN]; | |
277 | struct preauth_test_data preauth_test; | |
278 | ||
279 | if (os_program_init()) | |
280 | return -1; | |
281 | ||
282 | os_memset(&preauth_test, 0, sizeof(preauth_test)); | |
283 | ||
284 | wpa_debug_level = 0; | |
285 | wpa_debug_show_keys = 1; | |
286 | ||
287 | if (argc != 4) { | |
288 | printf("usage: preauth_test <conf> <target MAC address> " | |
289 | "<ifname>\n"); | |
290 | return -1; | |
291 | } | |
292 | ||
293 | if (hwaddr_aton(argv[2], bssid)) { | |
294 | printf("Failed to parse target address '%s'.\n", argv[2]); | |
295 | return -1; | |
296 | } | |
297 | ||
12760815 | 298 | if (eap_register_methods()) { |
6fc6879b JM |
299 | wpa_printf(MSG_ERROR, "Failed to register EAP methods"); |
300 | return -1; | |
301 | } | |
302 | ||
0456ea16 | 303 | if (eloop_init()) { |
6fc6879b JM |
304 | wpa_printf(MSG_ERROR, "Failed to initialize event loop"); |
305 | return -1; | |
306 | } | |
307 | ||
308 | os_memset(&wpa_s, 0, sizeof(wpa_s)); | |
e6304cad | 309 | wpa_s.conf = wpa_config_read(argv[1], NULL); |
6fc6879b JM |
310 | if (wpa_s.conf == NULL) { |
311 | printf("Failed to parse configuration file '%s'.\n", argv[1]); | |
312 | return -1; | |
313 | } | |
314 | if (wpa_s.conf->ssid == NULL) { | |
315 | printf("No networks defined.\n"); | |
316 | return -1; | |
317 | } | |
318 | ||
319 | wpa_init_conf(&wpa_s, argv[3]); | |
320 | wpa_s.ctrl_iface = wpa_supplicant_ctrl_iface_init(&wpa_s); | |
321 | if (wpa_s.ctrl_iface == NULL) { | |
322 | printf("Failed to initialize control interface '%s'.\n" | |
323 | "You may have another preauth_test process already " | |
324 | "running or the file was\n" | |
325 | "left by an unclean termination of preauth_test in " | |
326 | "which case you will need\n" | |
327 | "to manually remove this file before starting " | |
328 | "preauth_test again.\n", | |
329 | wpa_s.conf->ctrl_interface); | |
330 | return -1; | |
331 | } | |
332 | if (wpa_supplicant_scard_init(&wpa_s, wpa_s.conf->ssid)) | |
333 | return -1; | |
334 | ||
335 | if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) | |
336 | return -1; | |
337 | ||
338 | eloop_register_timeout(30, 0, eapol_test_timeout, &preauth_test, NULL); | |
339 | eloop_register_timeout(0, 100000, eapol_test_poll, &wpa_s, NULL); | |
0456ea16 JM |
340 | eloop_register_signal_terminate(eapol_test_terminate, &wpa_s); |
341 | eloop_register_signal_reconfig(eapol_test_terminate, &wpa_s); | |
6fc6879b JM |
342 | eloop_run(); |
343 | ||
344 | if (preauth_test.auth_timed_out) | |
345 | ret = -2; | |
346 | else { | |
347 | ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0) | |
348 | ? 0 : -3; | |
349 | } | |
350 | ||
351 | test_eapol_clean(&wpa_s); | |
352 | ||
353 | eap_peer_unregister_methods(); | |
354 | ||
355 | eloop_destroy(); | |
356 | ||
357 | os_program_deinit(); | |
358 | ||
359 | return ret; | |
360 | } |