| /* |
| * wpa_supplicant - EAPOL fuzzer |
| * Copyright (c) 2015, Jouni Malinen <j@w1.fi> |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "utils/includes.h" |
| |
| #include "utils/common.h" |
| #include "utils/eloop.h" |
| #include "eapol_supp/eapol_supp_sm.h" |
| #include "rsn_supp/wpa.h" |
| |
| |
| struct arg_ctx { |
| const char *fname; |
| struct wpa_sm *wpa; |
| struct eapol_sm *eapol; |
| }; |
| |
| |
| static void test_send_eapol(void *eloop_data, void *user_ctx) |
| { |
| struct arg_ctx *ctx = eloop_data; |
| char *data; |
| size_t len; |
| u8 src[ETH_ALEN] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x01 }; |
| u8 wpa_ie[200]; |
| size_t wpa_ie_len; |
| |
| wpa_printf(MSG_INFO, "eapol-fuzzer: Send '%s'", ctx->fname); |
| |
| data = os_readfile(ctx->fname, &len); |
| if (!data) { |
| wpa_printf(MSG_ERROR, "Could not read '%s'", ctx->fname); |
| goto out; |
| } |
| |
| wpa_hexdump(MSG_MSGDUMP, "fuzzer - EAPOL", data, len); |
| |
| eapol_sm_notify_portEnabled(ctx->eapol, TRUE); |
| |
| wpa_sm_set_param(ctx->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); |
| wpa_sm_set_param(ctx->wpa, WPA_PARAM_RSN_ENABLED, 1); |
| wpa_sm_set_param(ctx->wpa, WPA_PARAM_KEY_MGMT, WPA_KEY_MGMT_PSK); |
| wpa_sm_set_param(ctx->wpa, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); |
| wpa_sm_set_param(ctx->wpa, WPA_PARAM_GROUP, WPA_CIPHER_CCMP); |
| |
| wpa_ie_len = sizeof(wpa_ie); |
| wpa_sm_set_assoc_wpa_ie_default(ctx->wpa, wpa_ie, &wpa_ie_len); |
| |
| if (eapol_sm_rx_eapol(ctx->eapol, src, (u8 *) data, len) <= 0) |
| wpa_sm_rx_eapol(ctx->wpa, src, (u8 *) data, len); |
| |
| out: |
| os_free(data); |
| eloop_terminate(); |
| } |
| |
| |
| static void * get_network_ctx(void *arg) |
| { |
| return (void *) 1; |
| } |
| |
| |
| static void set_state(void *arg, enum wpa_states state) |
| { |
| } |
| |
| |
| static void deauthenticate(void *arg, int reason_code) |
| { |
| } |
| |
| |
| static u8 * alloc_eapol(void *arg, u8 type, |
| const void *data, u16 data_len, |
| size_t *msg_len, void **data_pos) |
| { |
| struct ieee802_1x_hdr *hdr; |
| |
| *msg_len = sizeof(*hdr) + data_len; |
| hdr = os_malloc(*msg_len); |
| if (hdr == NULL) |
| return NULL; |
| |
| hdr->version = 2; |
| hdr->type = type; |
| hdr->length = host_to_be16(data_len); |
| |
| if (data) |
| os_memcpy(hdr + 1, data, data_len); |
| else |
| os_memset(hdr + 1, 0, data_len); |
| |
| if (data_pos) |
| *data_pos = hdr + 1; |
| |
| return (u8 *) hdr; |
| } |
| |
| |
| static int ether_send(void *arg, const u8 *dest, u16 proto, |
| const u8 *buf, size_t len) |
| { |
| return 0; |
| } |
| |
| |
| static int get_bssid(void *ctx, u8 *bssid) |
| { |
| return -1; |
| } |
| |
| |
| static int eapol_send(void *ctx, int type, const u8 *buf, size_t len) |
| { |
| return 0; |
| } |
| |
| |
| static int init_wpa(struct arg_ctx *arg) |
| { |
| struct wpa_sm_ctx *ctx; |
| |
| ctx = os_zalloc(sizeof(*ctx)); |
| if (ctx == NULL) { |
| wpa_printf(MSG_ERROR, "Failed to allocate WPA context."); |
| return -1; |
| } |
| |
| ctx->ctx = arg; |
| ctx->msg_ctx = arg; |
| ctx->get_network_ctx = get_network_ctx; |
| ctx->set_state = set_state; |
| ctx->deauthenticate = deauthenticate; |
| ctx->alloc_eapol = alloc_eapol; |
| ctx->ether_send = ether_send; |
| ctx->get_bssid = get_bssid; |
| |
| arg->wpa = wpa_sm_init(ctx); |
| return arg->wpa ? 0 : -1; |
| } |
| |
| |
| static int init_eapol(struct arg_ctx *arg) |
| { |
| struct eapol_ctx *ctx; |
| |
| ctx = os_zalloc(sizeof(*ctx)); |
| if (ctx == NULL) { |
| wpa_printf(MSG_ERROR, "Failed to allocate EAPOL context."); |
| return -1; |
| } |
| |
| ctx->ctx = arg; |
| ctx->msg_ctx = arg; |
| ctx->eapol_send = eapol_send; |
| |
| arg->eapol = eapol_sm_init(ctx); |
| return arg->eapol ? 0 : -1; |
| } |
| |
| |
| int main(int argc, char *argv[]) |
| { |
| struct arg_ctx ctx; |
| int ret = -1; |
| |
| if (argc < 2) { |
| printf("usage: %s <file>\n", argv[0]); |
| return -1; |
| } |
| |
| if (os_program_init()) |
| return -1; |
| |
| wpa_debug_level = 0; |
| wpa_debug_show_keys = 1; |
| |
| if (eloop_init()) { |
| wpa_printf(MSG_ERROR, "Failed to initialize event loop"); |
| return -1; |
| } |
| |
| os_memset(&ctx, 0, sizeof(ctx)); |
| ctx.fname = argv[1]; |
| if (init_wpa(&ctx) || init_eapol(&ctx)) |
| goto fail; |
| |
| eloop_register_timeout(0, 0, test_send_eapol, &ctx, NULL); |
| |
| wpa_printf(MSG_DEBUG, "Starting eloop"); |
| eloop_run(); |
| wpa_printf(MSG_DEBUG, "eloop done"); |
| |
| ret = 0; |
| fail: |
| if (ctx.wpa) |
| wpa_sm_deinit(ctx.wpa); |
| if (ctx.eapol) |
| eapol_sm_deinit(ctx.eapol); |
| |
| eloop_destroy(); |
| os_program_deinit(); |
| |
| return ret; |
| } |