]> git.ipfire.org Git - thirdparty/hostap.git/blob - wlantest/wlantest.c
wlantest: Fix bip_protect() memory allocation
[thirdparty/hostap.git] / wlantest / wlantest.c
1 /*
2 * wlantest - IEEE 802.11 protocol monitoring and testing tool
3 * Copyright (c) 2010-2015, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "wlantest.h"
14
15
16 static void wlantest_terminate(int sig, void *signal_ctx)
17 {
18 eloop_terminate();
19 }
20
21
22 static void usage(void)
23 {
24 printf("wlantest [-cddhqqFNt] [-i<ifname>] [-r<pcap file>] "
25 "[-p<passphrase>]\n"
26 " [-I<wired ifname>] [-R<wired pcap file>] "
27 "[-P<RADIUS shared secret>]\n"
28 " [-n<write pcapng file>]\n"
29 " [-w<write pcap file>] [-f<MSK/PMK file>]\n"
30 " [-L<log file>] [-T<PTK file>]\n");
31 }
32
33
34 static void passphrase_deinit(struct wlantest_passphrase *p)
35 {
36 dl_list_del(&p->list);
37 os_free(p);
38 }
39
40
41 static void secret_deinit(struct wlantest_radius_secret *r)
42 {
43 dl_list_del(&r->list);
44 os_free(r);
45 }
46
47
48 static void wlantest_init(struct wlantest *wt)
49 {
50 int i;
51 os_memset(wt, 0, sizeof(*wt));
52 wt->monitor_sock = -1;
53 wt->ctrl_sock = -1;
54 for (i = 0; i < MAX_CTRL_CONNECTIONS; i++)
55 wt->ctrl_socks[i] = -1;
56 dl_list_init(&wt->passphrase);
57 dl_list_init(&wt->bss);
58 dl_list_init(&wt->secret);
59 dl_list_init(&wt->radius);
60 dl_list_init(&wt->pmk);
61 dl_list_init(&wt->ptk);
62 dl_list_init(&wt->wep);
63 }
64
65
66 void radius_deinit(struct wlantest_radius *r)
67 {
68 dl_list_del(&r->list);
69 os_free(r);
70 }
71
72
73 static void ptk_deinit(struct wlantest_ptk *ptk)
74 {
75 dl_list_del(&ptk->list);
76 os_free(ptk);
77 }
78
79
80 static void wlantest_deinit(struct wlantest *wt)
81 {
82 struct wlantest_passphrase *p, *pn;
83 struct wlantest_radius_secret *s, *sn;
84 struct wlantest_radius *r, *rn;
85 struct wlantest_pmk *pmk, *np;
86 struct wlantest_ptk *ptk, *npt;
87 struct wlantest_wep *wep, *nw;
88
89 if (wt->ctrl_sock >= 0)
90 ctrl_deinit(wt);
91 if (wt->monitor_sock >= 0)
92 monitor_deinit(wt);
93 bss_flush(wt);
94 dl_list_for_each_safe(p, pn, &wt->passphrase,
95 struct wlantest_passphrase, list)
96 passphrase_deinit(p);
97 dl_list_for_each_safe(s, sn, &wt->secret,
98 struct wlantest_radius_secret, list)
99 secret_deinit(s);
100 dl_list_for_each_safe(r, rn, &wt->radius, struct wlantest_radius, list)
101 radius_deinit(r);
102 dl_list_for_each_safe(pmk, np, &wt->pmk, struct wlantest_pmk, list)
103 pmk_deinit(pmk);
104 dl_list_for_each_safe(ptk, npt, &wt->ptk, struct wlantest_ptk, list)
105 ptk_deinit(ptk);
106 dl_list_for_each_safe(wep, nw, &wt->wep, struct wlantest_wep, list)
107 os_free(wep);
108 write_pcap_deinit(wt);
109 write_pcapng_deinit(wt);
110 clear_notes(wt);
111 os_free(wt->decrypted);
112 wt->decrypted = NULL;
113 }
114
115
116 static void add_passphrase(struct wlantest *wt, const char *passphrase)
117 {
118 struct wlantest_passphrase *p;
119 size_t len = os_strlen(passphrase);
120
121 if (len < 8 || len > 63)
122 return;
123 p = os_zalloc(sizeof(*p));
124 if (p == NULL)
125 return;
126 os_memcpy(p->passphrase, passphrase, len);
127 dl_list_add(&wt->passphrase, &p->list);
128 }
129
130
131 static void add_secret(struct wlantest *wt, const char *secret)
132 {
133 struct wlantest_radius_secret *s;
134 size_t len = os_strlen(secret);
135
136 if (len >= MAX_RADIUS_SECRET_LEN)
137 return;
138 s = os_zalloc(sizeof(*s));
139 if (s == NULL)
140 return;
141 os_memcpy(s->secret, secret, len);
142 dl_list_add(&wt->secret, &s->list);
143 }
144
145
146 static int add_pmk_file(struct wlantest *wt, const char *pmk_file)
147 {
148 FILE *f;
149 u8 pmk[32];
150 char buf[300], *pos;
151 struct wlantest_pmk *p;
152
153 f = fopen(pmk_file, "r");
154 if (f == NULL) {
155 wpa_printf(MSG_ERROR, "Could not open '%s'", pmk_file);
156 return -1;
157 }
158
159 while (fgets(buf, sizeof(buf), f)) {
160 pos = buf;
161 while (*pos && *pos != '\r' && *pos != '\n')
162 pos++;
163 *pos = '\0';
164 if (pos - buf < 2 * 32)
165 continue;
166 if (hexstr2bin(buf, pmk, 32) < 0)
167 continue;
168 p = os_zalloc(sizeof(*p));
169 if (p == NULL)
170 break;
171 os_memcpy(p->pmk, pmk, 32);
172 dl_list_add(&wt->pmk, &p->list);
173 wpa_hexdump(MSG_DEBUG, "Added PMK from file", pmk, 32);
174 }
175
176 fclose(f);
177 return 0;
178 }
179
180
181 static int add_ptk_file(struct wlantest *wt, const char *ptk_file)
182 {
183 FILE *f;
184 u8 ptk[64];
185 size_t ptk_len;
186 char buf[300], *pos;
187 struct wlantest_ptk *p;
188
189 f = fopen(ptk_file, "r");
190 if (f == NULL) {
191 wpa_printf(MSG_ERROR, "Could not open '%s'", ptk_file);
192 return -1;
193 }
194
195 while (fgets(buf, sizeof(buf), f)) {
196 pos = buf;
197 while (*pos && *pos != '\r' && *pos != '\n')
198 pos++;
199 *pos = '\0';
200 ptk_len = pos - buf;
201 if (ptk_len & 1)
202 continue;
203 ptk_len /= 2;
204 if (ptk_len != 16 && ptk_len != 32 &&
205 ptk_len != 48 && ptk_len != 64)
206 continue;
207 if (hexstr2bin(buf, ptk, ptk_len) < 0)
208 continue;
209 p = os_zalloc(sizeof(*p));
210 if (p == NULL)
211 break;
212 if (ptk_len < 48) {
213 os_memcpy(p->ptk.tk, ptk, ptk_len);
214 p->ptk.tk_len = ptk_len;
215 p->ptk_len = 32 + ptk_len;
216 } else {
217 os_memcpy(p->ptk.kck, ptk, 16);
218 p->ptk.kck_len = 16;
219 os_memcpy(p->ptk.kek, ptk + 16, 16);
220 p->ptk.kek_len = 16;
221 os_memcpy(p->ptk.tk, ptk + 32, ptk_len - 32);
222 p->ptk.tk_len = ptk_len - 32;
223 p->ptk_len = ptk_len;
224 }
225 dl_list_add(&wt->ptk, &p->list);
226 wpa_hexdump(MSG_DEBUG, "Added PTK from file", ptk, ptk_len);
227 }
228
229 fclose(f);
230 return 0;
231 }
232
233
234 int add_wep(struct wlantest *wt, const char *key)
235 {
236 struct wlantest_wep *w;
237 size_t len = os_strlen(key);
238
239 if (len != 2 * 5 && len != 2 * 13) {
240 wpa_printf(MSG_INFO, "Invalid WEP key '%s'", key);
241 return -1;
242 }
243 w = os_zalloc(sizeof(*w));
244 if (w == NULL)
245 return -1;
246 if (hexstr2bin(key, w->key, len / 2) < 0) {
247 os_free(w);
248 wpa_printf(MSG_INFO, "Invalid WEP key '%s'", key);
249 return -1;
250 }
251 w->key_len = len / 2;
252 dl_list_add(&wt->wep, &w->list);
253 return 0;
254 }
255
256
257 void add_note(struct wlantest *wt, int level, const char *fmt, ...)
258 {
259 va_list ap;
260 size_t len = 1000;
261 int wlen;
262
263 if (wt->num_notes == MAX_NOTES)
264 return;
265
266 wt->notes[wt->num_notes] = os_malloc(len);
267 if (wt->notes[wt->num_notes] == NULL)
268 return;
269 va_start(ap, fmt);
270 wlen = vsnprintf(wt->notes[wt->num_notes], len, fmt, ap);
271 va_end(ap);
272 if (wlen < 0) {
273 os_free(wt->notes[wt->num_notes]);
274 wt->notes[wt->num_notes] = NULL;
275 return;
276 }
277 if (wlen >= len)
278 wt->notes[wt->num_notes][len - 1] = '\0';
279 wpa_printf(level, "%s", wt->notes[wt->num_notes]);
280 wt->num_notes++;
281 }
282
283
284 void clear_notes(struct wlantest *wt)
285 {
286 size_t i;
287
288 for (i = 0; i < wt->num_notes; i++) {
289 os_free(wt->notes[i]);
290 wt->notes[i] = NULL;
291 }
292
293 wt->num_notes = 0;
294 }
295
296
297 size_t notes_len(struct wlantest *wt, size_t hdrlen)
298 {
299 size_t i;
300 size_t len = wt->num_notes * hdrlen;
301
302 for (i = 0; i < wt->num_notes; i++)
303 len += os_strlen(wt->notes[i]);
304
305 return len;
306 }
307
308
309 int wlantest_relog(struct wlantest *wt)
310 {
311 int ret = 0;
312
313 wpa_printf(MSG_INFO, "Re-open log/capture files");
314 if (wpa_debug_reopen_file())
315 ret = -1;
316
317 if (wt->write_file) {
318 write_pcap_deinit(wt);
319 if (write_pcap_init(wt, wt->write_file) < 0)
320 ret = -1;
321 }
322
323 if (wt->pcapng_file) {
324 write_pcapng_deinit(wt);
325 if (write_pcapng_init(wt, wt->pcapng_file) < 0)
326 ret = -1;
327 }
328
329 return ret;
330 }
331
332
333 int main(int argc, char *argv[])
334 {
335 int c;
336 const char *read_file = NULL;
337 const char *read_wired_file = NULL;
338 const char *ifname = NULL;
339 const char *ifname_wired = NULL;
340 const char *logfile = NULL;
341 struct wlantest wt;
342 int ctrl_iface = 0;
343
344 wpa_debug_level = MSG_INFO;
345 wpa_debug_show_keys = 1;
346
347 if (os_program_init())
348 return -1;
349
350 wlantest_init(&wt);
351
352 for (;;) {
353 c = getopt(argc, argv, "cdf:Fhi:I:L:n:Np:P:qr:R:tT:w:W:");
354 if (c < 0)
355 break;
356 switch (c) {
357 case 'c':
358 ctrl_iface = 1;
359 break;
360 case 'd':
361 if (wpa_debug_level > 0)
362 wpa_debug_level--;
363 break;
364 case 'f':
365 if (add_pmk_file(&wt, optarg) < 0)
366 return -1;
367 break;
368 case 'F':
369 wt.assume_fcs = 1;
370 break;
371 case 'h':
372 usage();
373 return 0;
374 case 'i':
375 ifname = optarg;
376 break;
377 case 'I':
378 ifname_wired = optarg;
379 break;
380 case 'L':
381 logfile = optarg;
382 break;
383 case 'n':
384 wt.pcapng_file = optarg;
385 break;
386 case 'N':
387 wt.pcap_no_buffer = 1;
388 break;
389 case 'p':
390 add_passphrase(&wt, optarg);
391 break;
392 case 'P':
393 add_secret(&wt, optarg);
394 break;
395 case 'q':
396 wpa_debug_level++;
397 break;
398 case 'r':
399 read_file = optarg;
400 break;
401 case 'R':
402 read_wired_file = optarg;
403 break;
404 case 't':
405 wpa_debug_timestamp = 1;
406 break;
407 case 'T':
408 if (add_ptk_file(&wt, optarg) < 0)
409 return -1;
410 break;
411 case 'w':
412 wt.write_file = optarg;
413 break;
414 case 'W':
415 if (add_wep(&wt, optarg) < 0)
416 return -1;
417 break;
418 default:
419 usage();
420 return -1;
421 }
422 }
423
424 if (ifname == NULL && ifname_wired == NULL &&
425 read_file == NULL && read_wired_file == NULL) {
426 usage();
427 return 0;
428 }
429
430 if (eloop_init())
431 return -1;
432
433 if (logfile)
434 wpa_debug_open_file(logfile);
435
436 if (wt.write_file && write_pcap_init(&wt, wt.write_file) < 0)
437 return -1;
438
439 if (wt.pcapng_file && write_pcapng_init(&wt, wt.pcapng_file) < 0)
440 return -1;
441
442 if (read_wired_file && read_wired_cap_file(&wt, read_wired_file) < 0)
443 return -1;
444
445 if (read_file && read_cap_file(&wt, read_file) < 0)
446 return -1;
447
448 if (ifname && monitor_init(&wt, ifname) < 0)
449 return -1;
450
451 if (ifname_wired && monitor_init_wired(&wt, ifname_wired) < 0)
452 return -1;
453
454 if (ctrl_iface && ctrl_init(&wt) < 0)
455 return -1;
456
457 eloop_register_signal_terminate(wlantest_terminate, &wt);
458
459 eloop_run();
460
461 wpa_printf(MSG_INFO, "Processed: rx_mgmt=%u rx_ctrl=%u rx_data=%u "
462 "fcs_error=%u",
463 wt.rx_mgmt, wt.rx_ctrl, wt.rx_data, wt.fcs_error);
464
465 wlantest_deinit(&wt);
466
467 wpa_debug_close_file();
468 eloop_destroy();
469 os_program_deinit();
470
471 return 0;
472 }