2016-10-05 01:44:27 +02:00
|
|
|
#!/usr/bin/python3
|
2017-03-26 03:16:53 +02:00
|
|
|
import os, os.path
|
2019-04-20 22:29:01 +02:00
|
|
|
from wiphy import wiphy_map
|
2018-01-30 20:19:49 +01:00
|
|
|
import re
|
2018-05-31 01:39:05 +02:00
|
|
|
import socket
|
2018-01-30 20:19:49 +01:00
|
|
|
|
|
|
|
chan_freq_map = [
|
|
|
|
None,
|
|
|
|
2412,
|
|
|
|
2417,
|
|
|
|
2422,
|
|
|
|
2427,
|
|
|
|
2432,
|
|
|
|
2437,
|
|
|
|
2442,
|
|
|
|
2447,
|
|
|
|
2452,
|
|
|
|
2457,
|
|
|
|
2462,
|
|
|
|
2467,
|
|
|
|
2472,
|
|
|
|
2484
|
|
|
|
]
|
2017-03-26 03:16:53 +02:00
|
|
|
|
2019-04-20 22:29:01 +02:00
|
|
|
hostapd_map = {ifname: intf for wname, wiphy in wiphy_map.items()
|
|
|
|
for ifname, intf in wiphy.interface_map.items()
|
|
|
|
if wiphy.use == 'hostapd'}
|
2016-10-05 01:44:27 +02:00
|
|
|
|
|
|
|
class HostapdCLI:
|
2017-03-26 03:16:53 +02:00
|
|
|
def __init__(self, interface):
|
|
|
|
self.ifname = interface.name
|
2019-04-20 22:29:02 +02:00
|
|
|
self.socket_path = os.path.dirname(interface.ctrl_interface)
|
2016-10-06 20:06:14 +02:00
|
|
|
|
2018-05-31 01:39:05 +02:00
|
|
|
self.cmdline = 'hostapd_cli -p"' + self.socket_path + '" -i"' + \
|
2017-03-26 03:16:53 +02:00
|
|
|
self.ifname + '"'
|
|
|
|
|
2018-01-29 19:37:05 +01:00
|
|
|
self._hostapd_restarted = False
|
|
|
|
|
|
|
|
def __del__(self):
|
|
|
|
if self._hostapd_restarted:
|
|
|
|
os.system('killall hostapd')
|
|
|
|
|
2017-03-26 03:16:53 +02:00
|
|
|
def wps_push_button(self):
|
|
|
|
os.system(self.cmdline + ' wps_pbc')
|
|
|
|
|
2018-09-24 19:02:34 +02:00
|
|
|
def wps_pin(self, pin):
|
|
|
|
os.system(self.cmdline + ' wps_pin any ' + pin)
|
|
|
|
|
2017-03-26 03:16:53 +02:00
|
|
|
def deauthenticate(self, client_address):
|
|
|
|
os.system(self.cmdline + ' deauthenticate ' + client_address)
|
2016-10-06 20:06:14 +02:00
|
|
|
|
2018-05-31 01:39:05 +02:00
|
|
|
def eapol_reauth(self, client_address):
|
|
|
|
cmd = 'IFNAME=' + self.ifname + ' EAPOL_REAUTH ' + client_address
|
|
|
|
s = socket.socket(socket.AF_UNIX, socket.SOCK_DGRAM)
|
|
|
|
s.connect(self.socket_path + '/' + self.ifname)
|
|
|
|
s.sendall(cmd.encode('utf-8'))
|
|
|
|
s.close()
|
|
|
|
|
2017-03-26 03:16:57 +02:00
|
|
|
def reload(self):
|
|
|
|
# Seemingly all three commands needed for the instance to notice
|
|
|
|
# interface's address change
|
|
|
|
cmds = 'reload\ndisable\nenable\n'
|
|
|
|
proc = os.popen(self.cmdline, mode='w')
|
|
|
|
lines = proc.write(cmds)
|
|
|
|
proc.close()
|
|
|
|
|
|
|
|
def list_sta(self):
|
|
|
|
proc = os.popen(self.cmdline + ' list_sta')
|
|
|
|
lines = proc.read()
|
|
|
|
proc.close()
|
|
|
|
|
|
|
|
return [line for line in lines.split('\n') if line]
|
|
|
|
|
|
|
|
def set_neighbor(self, addr, ssid, nr):
|
|
|
|
os.system(self.cmdline + ' set_neighbor ' + addr + ' ssid=\\""' + ssid +
|
|
|
|
'"\\" nr=' + nr)
|
|
|
|
|
2018-01-18 22:36:39 +01:00
|
|
|
def send_bss_transition(self, device, nr_list):
|
|
|
|
# Send a BSS transition to a station (device). nr_list should be an
|
|
|
|
# array of tuples containing the BSS address and neighbor report.
|
|
|
|
# Parsing the neighbor report is a bit ugly but it makes it more
|
|
|
|
# consistent with the set_neighbor() API, i.e. the same neighbor report
|
|
|
|
# string could be used in both API's.
|
|
|
|
pref = 1
|
|
|
|
cmd = self.cmdline + ' bss_tm_req ' + device
|
|
|
|
for i in nr_list:
|
|
|
|
addr = i[0]
|
|
|
|
nr = i[1]
|
|
|
|
|
|
|
|
bss_info=str(int(nr[0:8], 16))
|
|
|
|
op_class=str(int(nr[8:10], 16))
|
|
|
|
chan_num=nr[10:12]
|
|
|
|
phy_num=nr[14:16]
|
|
|
|
|
|
|
|
cmd += ' pref=%s neighbor=%s,%s,%s,%s,%s' % \
|
|
|
|
(str(pref), addr, bss_info, op_class, chan_num, phy_num)
|
|
|
|
pref += 1
|
|
|
|
|
|
|
|
os.system(cmd)
|
|
|
|
|
2016-10-06 20:06:14 +02:00
|
|
|
@staticmethod
|
|
|
|
def kill_all():
|
|
|
|
os.system('killall hostapd')
|
2018-01-29 19:37:05 +01:00
|
|
|
|
2018-01-30 20:19:49 +01:00
|
|
|
def get_config_value(self, key):
|
|
|
|
# first find the right config file
|
2019-04-20 22:29:02 +02:00
|
|
|
with open(hostapd_map[self.ifname].config, 'r') as f:
|
|
|
|
# read in config file and search for key
|
|
|
|
cfg = f.read()
|
|
|
|
match = re.search(r'%s=.*' % key, cfg)
|
|
|
|
if match:
|
|
|
|
return match.group(0).split('=')[1]
|
2018-01-30 20:19:49 +01:00
|
|
|
return None
|
|
|
|
|
|
|
|
def get_freq(self):
|
|
|
|
return chan_freq_map[int(self.get_config_value('channel'))]
|
|
|
|
|
2018-01-29 19:37:05 +01:00
|
|
|
def ungraceful_restart(self):
|
|
|
|
'''
|
|
|
|
Ungracefully kill and restart hostapd
|
|
|
|
'''
|
2019-04-20 22:29:02 +02:00
|
|
|
intf = hostapd_map[self.ifname]
|
|
|
|
os.system('killall -9 hostapd')
|
|
|
|
os.system('ifconfig %s down' % intf.name)
|
|
|
|
os.system('ifconfig %s up' % intf.name)
|
|
|
|
os.system('hostapd -g %s -i %s %s &' %
|
|
|
|
(intf.ctrl_interface, intf.name, intf.config))
|
2018-01-29 19:37:05 +01:00
|
|
|
|
|
|
|
# set flag so hostapd can be killed after the test
|
|
|
|
self._hostapd_restarted = True
|