| /* |
| * wpa_supplicant - P2P fuzzer |
| * Copyright (c) 2015, Jouni Malinen <j@w1.fi> |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "utils/includes.h" |
| |
| #include "utils/common.h" |
| #include "utils/eloop.h" |
| #include "common/ieee802_11_defs.h" |
| #include "p2p/p2p.h" |
| |
| |
| static void debug_print(void *ctx, int level, const char *msg) |
| { |
| wpa_printf(level, "P2P: %s", msg); |
| } |
| |
| |
| static void find_stopped(void *ctx) |
| { |
| } |
| |
| |
| static int start_listen(void *ctx, unsigned int freq, |
| unsigned int duration, |
| const struct wpabuf *probe_resp_ie) |
| { |
| return 0; |
| } |
| |
| |
| static void stop_listen(void *ctx) |
| { |
| } |
| |
| |
| static void dev_found(void *ctx, const u8 *addr, |
| const struct p2p_peer_info *info, |
| int new_device) |
| { |
| } |
| |
| |
| static void dev_lost(void *ctx, const u8 *dev_addr) |
| { |
| } |
| |
| |
| static int send_action(void *ctx, unsigned int freq, const u8 *dst, |
| const u8 *src, const u8 *bssid, const u8 *buf, |
| size_t len, unsigned int wait_time) |
| { |
| return 0; |
| } |
| |
| |
| static void send_action_done(void *ctx) |
| { |
| } |
| |
| |
| static void go_neg_req_rx(void *ctx, const u8 *src, u16 dev_passwd_id) |
| { |
| } |
| |
| |
| static struct p2p_data * init_p2p(void) |
| { |
| struct p2p_config p2p; |
| |
| os_memset(&p2p, 0, sizeof(p2p)); |
| p2p.max_peers = 100; |
| p2p.passphrase_len = 8; |
| p2p.channels.reg_classes = 1; |
| p2p.channels.reg_class[0].reg_class = 81; |
| p2p.channels.reg_class[0].channel[0] = 1; |
| p2p.channels.reg_class[0].channel[1] = 2; |
| p2p.channels.reg_class[0].channels = 2; |
| p2p.debug_print = debug_print; |
| p2p.find_stopped = find_stopped; |
| p2p.start_listen = start_listen; |
| p2p.stop_listen = stop_listen; |
| p2p.dev_found = dev_found; |
| p2p.dev_lost = dev_lost; |
| p2p.send_action = send_action; |
| p2p.send_action_done = send_action_done; |
| p2p.go_neg_req_rx = go_neg_req_rx; |
| |
| return p2p_init(&p2p); |
| } |
| |
| |
| struct arg_ctx { |
| struct p2p_data *p2p; |
| const char *fname; |
| }; |
| |
| |
| static void test_send_proberesp(void *eloop_data, void *user_ctx) |
| { |
| struct arg_ctx *ctx = eloop_data; |
| char *data; |
| size_t len; |
| struct os_reltime rx_time; |
| |
| wpa_printf(MSG_INFO, "p2p-fuzzer: Send proberesp '%s'", ctx->fname); |
| |
| data = os_readfile(ctx->fname, &len); |
| if (!data) { |
| wpa_printf(MSG_ERROR, "Could not read '%s'", ctx->fname); |
| return; |
| } |
| |
| wpa_hexdump(MSG_MSGDUMP, "fuzzer - IEs", data, len); |
| |
| os_memset(&rx_time, 0, sizeof(rx_time)); |
| p2p_scan_res_handler(ctx->p2p, (u8 *) "\x02\x00\x00\x00\x01\x00", 2412, |
| &rx_time, 0, (u8 *) data, len); |
| p2p_scan_res_handled(ctx->p2p); |
| |
| os_free(data); |
| eloop_terminate(); |
| } |
| |
| |
| static void test_send_action(void *eloop_data, void *user_ctx) |
| { |
| struct arg_ctx *ctx = eloop_data; |
| char *data; |
| size_t len; |
| struct os_reltime rx_time; |
| struct ieee80211_mgmt *mgmt; |
| |
| wpa_printf(MSG_INFO, "p2p-fuzzer: Send action '%s'", ctx->fname); |
| |
| data = os_readfile(ctx->fname, &len); |
| if (!data) { |
| wpa_printf(MSG_ERROR, "Could not read '%s'", ctx->fname); |
| return; |
| } |
| if (len < IEEE80211_HDRLEN + 1) |
| goto out; |
| |
| wpa_hexdump(MSG_MSGDUMP, "fuzzer - action", data, len); |
| |
| mgmt = (struct ieee80211_mgmt *) data; |
| os_memset(&rx_time, 0, sizeof(rx_time)); |
| p2p_rx_action(ctx->p2p, mgmt->da, mgmt->sa, mgmt->bssid, |
| mgmt->u.action.category, |
| (u8 *) data + IEEE80211_HDRLEN + 1, |
| len - IEEE80211_HDRLEN - 1, 2412); |
| |
| out: |
| os_free(data); |
| eloop_terminate(); |
| } |
| |
| |
| int main(int argc, char *argv[]) |
| { |
| struct p2p_data *p2p; |
| struct arg_ctx ctx; |
| |
| /* TODO: probreq and wpas_p2p_probe_req_rx() */ |
| |
| if (argc < 3) { |
| printf("usage: %s <proberesp|action> <file>\n", argv[0]); |
| return -1; |
| } |
| |
| if (os_program_init()) |
| return -1; |
| |
| wpa_debug_level = 0; |
| wpa_debug_show_keys = 1; |
| |
| if (eloop_init()) { |
| wpa_printf(MSG_ERROR, "Failed to initialize event loop"); |
| return -1; |
| } |
| |
| p2p = init_p2p(); |
| if (!p2p) { |
| wpa_printf(MSG_ERROR, "P2P init failed"); |
| return -1; |
| } |
| |
| ctx.p2p = p2p; |
| ctx.fname = argv[2]; |
| |
| if (os_strcmp(argv[1], "proberesp") == 0) { |
| eloop_register_timeout(0, 0, test_send_proberesp, &ctx, NULL); |
| } else if (os_strcmp(argv[1], "action") == 0) { |
| eloop_register_timeout(0, 0, test_send_action, &ctx, NULL); |
| } else { |
| wpa_printf(MSG_ERROR, "Unsupported test type '%s'", argv[1]); |
| return -1; |
| } |
| |
| wpa_printf(MSG_DEBUG, "Starting eloop"); |
| eloop_run(); |
| wpa_printf(MSG_DEBUG, "eloop done"); |
| |
| p2p_deinit(p2p); |
| eloop_destroy(); |
| os_program_deinit(); |
| |
| return 0; |
| } |