2018-09-26 23:24:12 -04:00
|
|
|
/* cmd_sniffer example.
|
|
|
|
This example code is in the Public Domain (or CC0 licensed, at your option.)
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, this
|
|
|
|
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
|
|
|
|
CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
*/
|
|
|
|
#include <string.h>
|
2021-05-13 03:59:03 -04:00
|
|
|
#include <stdlib.h>
|
2018-09-26 23:24:12 -04:00
|
|
|
#include "argtable3/argtable3.h"
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/task.h"
|
|
|
|
#include "freertos/queue.h"
|
|
|
|
#include "freertos/semphr.h"
|
|
|
|
#include <sys/unistd.h>
|
|
|
|
#include <sys/fcntl.h>
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_wifi.h"
|
|
|
|
#include "esp_console.h"
|
2019-01-25 04:03:01 -05:00
|
|
|
#include "esp_app_trace.h"
|
2018-09-26 23:24:12 -04:00
|
|
|
#include "cmd_sniffer.h"
|
2021-05-13 03:59:03 -04:00
|
|
|
#include "cmd_pcap.h"
|
|
|
|
#include "esp_check.h"
|
2018-09-26 23:24:12 -04:00
|
|
|
#include "sdkconfig.h"
|
|
|
|
|
2021-02-03 04:10:10 -05:00
|
|
|
#define SNIFFER_DEFAULT_CHANNEL (1)
|
|
|
|
#define SNIFFER_PAYLOAD_FCS_LEN (4)
|
|
|
|
#define SNIFFER_PROCESS_PACKET_TIMEOUT_MS (100)
|
|
|
|
#define SNIFFER_RX_FCS_ERR (0X41)
|
2021-05-12 13:52:28 -04:00
|
|
|
#define SNIFFER_MAX_ETH_INTFS (3)
|
|
|
|
#define SNIFFER_DECIMAL_NUM (10)
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
static const char *SNIFFER_TAG = "cmd_sniffer";
|
2018-09-26 23:24:12 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
typedef struct {
|
|
|
|
char *filter_name;
|
|
|
|
uint32_t filter_val;
|
|
|
|
} wlan_filter_table_t;
|
2018-09-26 23:24:12 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
typedef struct {
|
|
|
|
bool is_running;
|
|
|
|
sniffer_intf_t interf;
|
2021-05-12 13:52:28 -04:00
|
|
|
uint32_t interf_num;
|
2019-01-25 04:03:01 -05:00
|
|
|
uint32_t channel;
|
|
|
|
uint32_t filter;
|
2021-05-13 03:59:03 -04:00
|
|
|
int32_t packets_to_sniff;
|
2019-01-25 04:03:01 -05:00
|
|
|
TaskHandle_t task;
|
|
|
|
QueueHandle_t work_queue;
|
|
|
|
SemaphoreHandle_t sem_task_over;
|
2021-05-12 13:52:28 -04:00
|
|
|
esp_eth_handle_t eth_handles[SNIFFER_MAX_ETH_INTFS];
|
2019-01-25 04:03:01 -05:00
|
|
|
} sniffer_runtime_t;
|
2018-09-26 23:24:12 -04:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
void *payload;
|
|
|
|
uint32_t length;
|
|
|
|
uint32_t seconds;
|
|
|
|
uint32_t microseconds;
|
2019-01-25 04:03:01 -05:00
|
|
|
} sniffer_packet_info_t;
|
2018-09-26 23:24:12 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
static sniffer_runtime_t snf_rt = {0};
|
|
|
|
static wlan_filter_table_t wifi_filter_hash_table[SNIFFER_WLAN_FILTER_MAX] = {0};
|
2021-05-13 03:59:03 -04:00
|
|
|
static esp_err_t sniffer_stop(sniffer_runtime_t *sniffer);
|
2018-09-26 23:24:12 -04:00
|
|
|
|
|
|
|
static uint32_t hash_func(const char *str, uint32_t max_num)
|
|
|
|
{
|
|
|
|
uint32_t ret = 0;
|
|
|
|
char *p = (char *)str;
|
|
|
|
while (*p) {
|
|
|
|
ret += *p;
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
return ret % max_num;
|
|
|
|
}
|
|
|
|
|
2019-07-16 05:33:30 -04:00
|
|
|
static void create_wifi_filter_hashtable(void)
|
2018-09-26 23:24:12 -04:00
|
|
|
{
|
2021-02-03 04:10:10 -05:00
|
|
|
char *wifi_filter_keys[SNIFFER_WLAN_FILTER_MAX] = {"mgmt", "data", "ctrl", "misc", "mpdu", "ampdu", "fcsfail"};
|
2019-01-25 04:03:01 -05:00
|
|
|
uint32_t wifi_filter_values[SNIFFER_WLAN_FILTER_MAX] = {WIFI_PROMIS_FILTER_MASK_MGMT, WIFI_PROMIS_FILTER_MASK_DATA,
|
|
|
|
WIFI_PROMIS_FILTER_MASK_CTRL, WIFI_PROMIS_FILTER_MASK_MISC,
|
2021-02-03 04:10:10 -05:00
|
|
|
WIFI_PROMIS_FILTER_MASK_DATA_MPDU, WIFI_PROMIS_FILTER_MASK_DATA_AMPDU,
|
|
|
|
WIFI_PROMIS_FILTER_MASK_FCSFAIL
|
2019-01-25 04:03:01 -05:00
|
|
|
};
|
2018-09-26 23:24:12 -04:00
|
|
|
for (int i = 0; i < SNIFFER_WLAN_FILTER_MAX; i++) {
|
|
|
|
uint32_t idx = hash_func(wifi_filter_keys[i], SNIFFER_WLAN_FILTER_MAX);
|
|
|
|
while (wifi_filter_hash_table[idx].filter_name) {
|
|
|
|
idx++;
|
|
|
|
if (idx >= SNIFFER_WLAN_FILTER_MAX) {
|
|
|
|
idx = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wifi_filter_hash_table[idx].filter_name = wifi_filter_keys[i];
|
|
|
|
wifi_filter_hash_table[idx].filter_val = wifi_filter_values[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint32_t search_wifi_filter_hashtable(const char *key)
|
|
|
|
{
|
|
|
|
uint32_t len = strlen(key);
|
|
|
|
uint32_t start_idx = hash_func(key, SNIFFER_WLAN_FILTER_MAX);
|
|
|
|
uint32_t idx = start_idx;
|
|
|
|
while (strncmp(wifi_filter_hash_table[idx].filter_name, key, len)) {
|
|
|
|
idx++;
|
|
|
|
if (idx >= SNIFFER_WLAN_FILTER_MAX) {
|
|
|
|
idx = 0;
|
|
|
|
}
|
|
|
|
/* wrong key */
|
|
|
|
if (idx == start_idx) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return wifi_filter_hash_table[idx].filter_val;
|
|
|
|
}
|
|
|
|
|
2021-05-12 13:52:28 -04:00
|
|
|
static void queue_packet(void *recv_packet, sniffer_packet_info_t *packet_info)
|
|
|
|
{
|
|
|
|
/* Copy a packet from Link Layer driver and queue the copy to be processed by sniffer task */
|
|
|
|
void *packet_to_queue = malloc(packet_info->length);
|
|
|
|
if (packet_to_queue) {
|
|
|
|
memcpy(packet_to_queue, recv_packet, packet_info->length);
|
|
|
|
packet_info->payload = packet_to_queue;
|
|
|
|
if (snf_rt.work_queue) {
|
|
|
|
/* send packet_info */
|
|
|
|
if (xQueueSend(snf_rt.work_queue, packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS)) != pdTRUE) {
|
|
|
|
ESP_LOGE(SNIFFER_TAG, "sniffer work queue full");
|
|
|
|
free(packet_info->payload);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ESP_LOGE(SNIFFER_TAG, "No enough memory for promiscuous packet");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
static void wifi_sniffer_cb(void *recv_buf, wifi_promiscuous_pkt_type_t type)
|
|
|
|
{
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer_packet_info_t packet_info;
|
|
|
|
wifi_promiscuous_pkt_t *sniffer = (wifi_promiscuous_pkt_t *)recv_buf;
|
|
|
|
/* prepare packet_info */
|
|
|
|
packet_info.seconds = sniffer->rx_ctrl.timestamp / 1000000U;
|
|
|
|
packet_info.microseconds = sniffer->rx_ctrl.timestamp % 1000000U;
|
|
|
|
packet_info.length = sniffer->rx_ctrl.sig_len;
|
2021-02-03 04:10:10 -05:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
/* For now, the sniffer only dumps the length of the MISC type frame */
|
|
|
|
if (type != WIFI_PKT_MISC && !sniffer->rx_ctrl.rx_state) {
|
|
|
|
packet_info.length -= SNIFFER_PAYLOAD_FCS_LEN;
|
2021-11-25 03:55:25 -05:00
|
|
|
queue_packet(sniffer->payload, &packet_info);
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-12 13:52:28 -04:00
|
|
|
static esp_err_t eth_sniffer_cb(esp_eth_handle_t eth_handle, uint8_t *buffer, uint32_t length, void *priv)
|
|
|
|
{
|
|
|
|
sniffer_packet_info_t packet_info;
|
|
|
|
struct timeval tv_now;
|
|
|
|
|
|
|
|
// ESP32 Ethernet MAC provides hardware time stamping for incoming frames in its Linked List Descriptors (see TMR, section 10.8.2).
|
|
|
|
// However, this information is not currently accessible via Ethernet driver => do at least software time stamping
|
|
|
|
gettimeofday(&tv_now, NULL);
|
|
|
|
|
|
|
|
packet_info.seconds = tv_now.tv_sec;
|
|
|
|
packet_info.microseconds = tv_now.tv_usec;
|
|
|
|
packet_info.length = length;
|
|
|
|
|
|
|
|
queue_packet(buffer, &packet_info);
|
|
|
|
|
|
|
|
free(buffer);
|
|
|
|
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
static void sniffer_task(void *parameters)
|
|
|
|
{
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer_packet_info_t packet_info;
|
|
|
|
sniffer_runtime_t *sniffer = (sniffer_runtime_t *)parameters;
|
2018-09-26 23:24:12 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
while (sniffer->is_running) {
|
2021-05-13 03:59:03 -04:00
|
|
|
if (sniffer->packets_to_sniff == 0) {
|
|
|
|
sniffer_stop(sniffer);
|
|
|
|
break;
|
|
|
|
}
|
2021-05-12 13:52:28 -04:00
|
|
|
/* receive packet info from queue */
|
2019-01-25 04:03:01 -05:00
|
|
|
if (xQueueReceive(sniffer->work_queue, &packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS)) != pdTRUE) {
|
2018-09-26 23:24:12 -04:00
|
|
|
continue;
|
|
|
|
}
|
2021-05-13 03:59:03 -04:00
|
|
|
if (packet_capture(packet_info.payload, packet_info.length, packet_info.seconds,
|
|
|
|
packet_info.microseconds) != ESP_OK) {
|
2019-01-25 04:03:01 -05:00
|
|
|
ESP_LOGW(SNIFFER_TAG, "save captured packet failed");
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
free(packet_info.payload);
|
2021-05-13 03:59:03 -04:00
|
|
|
if (sniffer->packets_to_sniff > 0) {
|
|
|
|
sniffer->packets_to_sniff--;
|
|
|
|
}
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
/* notify that sniffer task is over */
|
2021-05-13 03:59:03 -04:00
|
|
|
if (sniffer->packets_to_sniff != 0) {
|
|
|
|
xSemaphoreGive(sniffer->sem_task_over);
|
|
|
|
}
|
2018-09-26 23:24:12 -04:00
|
|
|
vTaskDelete(NULL);
|
|
|
|
}
|
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
static esp_err_t sniffer_stop(sniffer_runtime_t *sniffer)
|
2018-09-26 23:24:12 -04:00
|
|
|
{
|
2021-05-12 13:52:28 -04:00
|
|
|
bool eth_set_promiscuous;
|
2021-05-13 03:59:03 -04:00
|
|
|
esp_err_t ret = ESP_OK;
|
2021-05-12 13:52:28 -04:00
|
|
|
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(sniffer->is_running, ESP_ERR_INVALID_STATE, err, SNIFFER_TAG, "sniffer is already stopped");
|
2019-01-25 04:03:01 -05:00
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
/* Disable wifi promiscuous mode */
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_ERROR(esp_wifi_set_promiscuous(false), err, SNIFFER_TAG, "stop wifi promiscuous failed");
|
2018-09-26 23:24:12 -04:00
|
|
|
break;
|
2021-05-12 13:52:28 -04:00
|
|
|
case SNIFFER_INTF_ETH:
|
|
|
|
/* Disable Ethernet Promiscuous Mode */
|
|
|
|
eth_set_promiscuous = false;
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_ERROR(esp_eth_ioctl(sniffer->eth_handles[sniffer->interf_num], ETH_CMD_S_PROMISCUOUS, ð_set_promiscuous),
|
|
|
|
err, SNIFFER_TAG, "stop Ethernet promiscuous failed");
|
2021-05-12 13:52:28 -04:00
|
|
|
esp_eth_update_input_path(sniffer->eth_handles[sniffer->interf_num], NULL, NULL);
|
|
|
|
break;
|
2018-09-26 23:24:12 -04:00
|
|
|
default:
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(false, ESP_ERR_INVALID_ARG, err, SNIFFER_TAG, "unsupported interface");
|
2018-09-26 23:24:12 -04:00
|
|
|
break;
|
|
|
|
}
|
2021-05-12 13:52:28 -04:00
|
|
|
ESP_LOGI(SNIFFER_TAG, "stop promiscuous ok");
|
2019-01-25 04:03:01 -05:00
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
/* stop sniffer local task */
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer->is_running = false;
|
2018-09-26 23:24:12 -04:00
|
|
|
/* wait for task over */
|
2021-05-13 03:59:03 -04:00
|
|
|
if (sniffer->packets_to_sniff != 0) {
|
|
|
|
xSemaphoreTake(sniffer->sem_task_over, portMAX_DELAY);
|
|
|
|
}
|
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
vSemaphoreDelete(sniffer->sem_task_over);
|
|
|
|
sniffer->sem_task_over = NULL;
|
2018-09-26 23:24:12 -04:00
|
|
|
/* make sure to free all resources in the left items */
|
2019-01-25 04:03:01 -05:00
|
|
|
UBaseType_t left_items = uxQueueMessagesWaiting(sniffer->work_queue);
|
2021-05-13 03:59:03 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer_packet_info_t packet_info;
|
2018-09-26 23:24:12 -04:00
|
|
|
while (left_items--) {
|
2019-01-25 04:03:01 -05:00
|
|
|
xQueueReceive(sniffer->work_queue, &packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS));
|
2018-09-26 23:24:12 -04:00
|
|
|
free(packet_info.payload);
|
|
|
|
}
|
2019-01-25 04:03:01 -05:00
|
|
|
vQueueDelete(sniffer->work_queue);
|
|
|
|
sniffer->work_queue = NULL;
|
2021-05-12 13:52:28 -04:00
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
/* stop pcap session */
|
2021-05-13 03:59:03 -04:00
|
|
|
sniff_packet_stop();
|
2019-01-25 04:03:01 -05:00
|
|
|
err:
|
2021-05-13 03:59:03 -04:00
|
|
|
return ret;
|
2021-05-12 13:52:28 -04:00
|
|
|
}
|
2019-01-25 04:03:01 -05:00
|
|
|
|
|
|
|
static esp_err_t sniffer_start(sniffer_runtime_t *sniffer)
|
|
|
|
{
|
2021-05-13 03:59:03 -04:00
|
|
|
esp_err_t ret = ESP_OK;
|
|
|
|
pcap_link_type_t link_type;
|
2018-09-26 23:24:12 -04:00
|
|
|
wifi_promiscuous_filter_t wifi_filter;
|
2021-05-12 13:52:28 -04:00
|
|
|
bool eth_set_promiscuous;
|
|
|
|
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(!(sniffer->is_running), ESP_ERR_INVALID_STATE, err, SNIFFER_TAG, "sniffer is already running");
|
2018-09-26 23:24:12 -04:00
|
|
|
|
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
2021-05-13 03:59:03 -04:00
|
|
|
link_type = PCAP_LINK_TYPE_802_11;
|
2019-01-25 04:03:01 -05:00
|
|
|
break;
|
2021-05-12 13:52:28 -04:00
|
|
|
case SNIFFER_INTF_ETH:
|
2021-05-13 03:59:03 -04:00
|
|
|
link_type = PCAP_LINK_TYPE_ETHERNET;
|
2021-05-12 13:52:28 -04:00
|
|
|
break;
|
2019-01-25 04:03:01 -05:00
|
|
|
default:
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(false, ESP_ERR_INVALID_ARG, err, SNIFFER_TAG, "unsupported interface");
|
2019-01-25 04:03:01 -05:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* init a pcap session */
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_ERROR(sniff_packet_start(link_type), err, SNIFFER_TAG, "init pcap session failed");
|
2019-01-25 04:03:01 -05:00
|
|
|
|
|
|
|
sniffer->is_running = true;
|
|
|
|
sniffer->work_queue = xQueueCreate(CONFIG_SNIFFER_WORK_QUEUE_LEN, sizeof(sniffer_packet_info_t));
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(sniffer->work_queue, ESP_FAIL, err_queue, SNIFFER_TAG, "create work queue failed");
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer->sem_task_over = xSemaphoreCreateBinary();
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(sniffer->sem_task_over, ESP_FAIL, err_sem, SNIFFER_TAG, "create work queue failed");
|
|
|
|
ESP_GOTO_ON_FALSE(xTaskCreate(sniffer_task, "snifferT", CONFIG_SNIFFER_TASK_STACK_SIZE,
|
|
|
|
sniffer, CONFIG_SNIFFER_TASK_PRIORITY, &sniffer->task), ESP_FAIL,
|
|
|
|
err_task, SNIFFER_TAG, "create task failed");
|
2019-01-25 04:03:01 -05:00
|
|
|
|
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
2021-05-12 13:52:28 -04:00
|
|
|
/* Start WiFi Promiscuous Mode */
|
2018-09-26 23:24:12 -04:00
|
|
|
wifi_filter.filter_mask = sniffer->filter;
|
|
|
|
esp_wifi_set_promiscuous_filter(&wifi_filter);
|
|
|
|
esp_wifi_set_promiscuous_rx_cb(wifi_sniffer_cb);
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_ERROR(esp_wifi_set_promiscuous(true), err_start, SNIFFER_TAG, "create work queue failed");
|
2018-09-26 23:24:12 -04:00
|
|
|
esp_wifi_set_channel(sniffer->channel, WIFI_SECOND_CHAN_NONE);
|
2019-01-25 04:03:01 -05:00
|
|
|
ESP_LOGI(SNIFFER_TAG, "start WiFi promiscuous ok");
|
2018-09-26 23:24:12 -04:00
|
|
|
break;
|
2021-05-12 13:52:28 -04:00
|
|
|
case SNIFFER_INTF_ETH:
|
|
|
|
/* Start Ethernet Promiscuous Mode */
|
|
|
|
eth_set_promiscuous = true;
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_ERROR(esp_eth_ioctl(sniffer->eth_handles[sniffer->interf_num], ETH_CMD_S_PROMISCUOUS, ð_set_promiscuous),
|
|
|
|
err_start, SNIFFER_TAG, "start Ethernet promiscuous failed");
|
2021-05-12 13:52:28 -04:00
|
|
|
esp_eth_update_input_path(sniffer->eth_handles[sniffer->interf_num], eth_sniffer_cb, NULL);
|
|
|
|
ESP_LOGI(SNIFFER_TAG, "start Ethernet promiscuous ok");
|
|
|
|
break;
|
2018-09-26 23:24:12 -04:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2021-05-13 03:59:03 -04:00
|
|
|
return ret;
|
2019-01-25 04:03:01 -05:00
|
|
|
err_start:
|
|
|
|
vTaskDelete(sniffer->task);
|
|
|
|
sniffer->task = NULL;
|
|
|
|
err_task:
|
|
|
|
vSemaphoreDelete(sniffer->sem_task_over);
|
|
|
|
sniffer->sem_task_over = NULL;
|
|
|
|
err_sem:
|
|
|
|
vQueueDelete(sniffer->work_queue);
|
|
|
|
sniffer->work_queue = NULL;
|
|
|
|
err_queue:
|
|
|
|
sniffer->is_running = false;
|
|
|
|
err:
|
2021-05-13 03:59:03 -04:00
|
|
|
return ret;
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct {
|
|
|
|
struct arg_str *interface;
|
|
|
|
struct arg_str *filter;
|
|
|
|
struct arg_int *channel;
|
|
|
|
struct arg_lit *stop;
|
2021-05-13 03:59:03 -04:00
|
|
|
struct arg_int *number;
|
2018-09-26 23:24:12 -04:00
|
|
|
struct arg_end *end;
|
|
|
|
} sniffer_args;
|
|
|
|
|
2021-05-12 13:52:28 -04:00
|
|
|
esp_err_t sniffer_reg_eth_intf(esp_eth_handle_t eth_handle)
|
|
|
|
{
|
2021-05-13 03:59:03 -04:00
|
|
|
esp_err_t ret = ESP_OK;
|
2021-05-12 13:52:28 -04:00
|
|
|
int32_t i = 0;
|
|
|
|
while ((snf_rt.eth_handles[i] != NULL) && (i < SNIFFER_MAX_ETH_INTFS)) {
|
|
|
|
i++;
|
|
|
|
}
|
2021-05-13 03:59:03 -04:00
|
|
|
ESP_GOTO_ON_FALSE(i < SNIFFER_MAX_ETH_INTFS, ESP_FAIL, err, SNIFFER_TAG, "maximum num. of eth interfaces registered");
|
2021-05-12 13:52:28 -04:00
|
|
|
snf_rt.eth_handles[i] = eth_handle;
|
|
|
|
|
|
|
|
err:
|
2021-05-13 03:59:03 -04:00
|
|
|
return ret;
|
2021-05-12 13:52:28 -04:00
|
|
|
}
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
static int do_sniffer_cmd(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int nerrors = arg_parse(argc, argv, (void **)&sniffer_args);
|
2021-05-12 13:52:28 -04:00
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
if (nerrors != 0) {
|
|
|
|
arg_print_errors(stderr, sniffer_args.end, argv[0]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-01-25 04:03:01 -05:00
|
|
|
/* Check whether or not to stop sniffer: "--stop" option */
|
|
|
|
if (sniffer_args.stop->count) {
|
|
|
|
/* stop sniffer */
|
|
|
|
sniffer_stop(&snf_rt);
|
|
|
|
return 0;
|
|
|
|
}
|
2018-09-26 23:24:12 -04:00
|
|
|
|
|
|
|
/* Check interface: "-i" option */
|
|
|
|
if (sniffer_args.interface->count) {
|
|
|
|
if (!strncmp(sniffer_args.interface->sval[0], "wlan", 4)) {
|
2019-01-25 04:03:01 -05:00
|
|
|
snf_rt.interf = SNIFFER_INTF_WLAN;
|
2021-05-12 13:52:28 -04:00
|
|
|
} else if (!strncmp(sniffer_args.interface->sval[0], "eth", 3)
|
2021-05-13 03:59:03 -04:00
|
|
|
&& strlen(sniffer_args.interface->sval[0]) >= 4) {
|
2021-05-12 13:52:28 -04:00
|
|
|
char *end_ptr = NULL;
|
|
|
|
const char *eth_num_str_start = sniffer_args.interface->sval[0] + 3;
|
|
|
|
int32_t eth_intf_num = strtol(eth_num_str_start, &end_ptr, SNIFFER_DECIMAL_NUM);
|
|
|
|
|
|
|
|
if ((eth_intf_num >= 0) && (eth_intf_num < SNIFFER_MAX_ETH_INTFS)
|
|
|
|
&& (eth_num_str_start != end_ptr) && (snf_rt.eth_handles[eth_intf_num] != NULL)) {
|
|
|
|
snf_rt.interf = SNIFFER_INTF_ETH;
|
|
|
|
snf_rt.interf_num = eth_intf_num;
|
|
|
|
} else {
|
2022-07-22 11:13:04 -04:00
|
|
|
ESP_LOGE(SNIFFER_TAG, "interface %s not found", sniffer_args.interface->sval[0]);
|
2021-05-12 13:52:28 -04:00
|
|
|
return 1;
|
|
|
|
}
|
2018-09-26 23:24:12 -04:00
|
|
|
} else {
|
2022-07-22 11:13:04 -04:00
|
|
|
ESP_LOGE(SNIFFER_TAG, "interface %s not found", sniffer_args.interface->sval[0]);
|
2018-09-26 23:24:12 -04:00
|
|
|
return 1;
|
|
|
|
}
|
2021-05-13 03:59:03 -04:00
|
|
|
} else {
|
2021-05-12 13:52:28 -04:00
|
|
|
snf_rt.interf = SNIFFER_INTF_WLAN;
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "sniffing interface set to wlan by default");
|
|
|
|
}
|
2019-01-25 04:03:01 -05:00
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
/* Check channel: "-c" option */
|
2021-05-12 13:52:28 -04:00
|
|
|
switch (snf_rt.interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
snf_rt.channel = SNIFFER_DEFAULT_CHANNEL;
|
|
|
|
if (sniffer_args.channel->count) {
|
|
|
|
snf_rt.channel = sniffer_args.channel->ival[0];
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SNIFFER_INTF_ETH:
|
|
|
|
if (sniffer_args.channel->count) {
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "'channel' option is not available for Ethernet");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check filter setting: "-F" option */
|
2019-01-25 04:03:01 -05:00
|
|
|
switch (snf_rt.interf) {
|
2018-09-26 23:24:12 -04:00
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
if (sniffer_args.filter->count) {
|
2021-05-12 13:52:28 -04:00
|
|
|
snf_rt.filter = 0;
|
2018-09-26 23:24:12 -04:00
|
|
|
for (int i = 0; i < sniffer_args.filter->count; i++) {
|
2019-01-25 04:03:01 -05:00
|
|
|
snf_rt.filter += search_wifi_filter_hashtable(sniffer_args.filter->sval[i]);
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
/* When filter conditions are all wrong */
|
2019-01-25 04:03:01 -05:00
|
|
|
if (snf_rt.filter == 0) {
|
|
|
|
snf_rt.filter = WIFI_PROMIS_FILTER_MASK_ALL;
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
} else {
|
2019-01-25 04:03:01 -05:00
|
|
|
snf_rt.filter = WIFI_PROMIS_FILTER_MASK_ALL;
|
2018-09-26 23:24:12 -04:00
|
|
|
}
|
|
|
|
break;
|
2021-05-12 13:52:28 -04:00
|
|
|
case SNIFFER_INTF_ETH:
|
|
|
|
if (sniffer_args.filter->count) {
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "'filter' option is not available for Ethernet");
|
|
|
|
}
|
2018-09-26 23:24:12 -04:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-05-13 03:59:03 -04:00
|
|
|
/* Check the number of captured packages: "-n" option */
|
|
|
|
snf_rt.packets_to_sniff = -1;
|
|
|
|
if (sniffer_args.number->count) {
|
|
|
|
snf_rt.packets_to_sniff = sniffer_args.number->ival[0];
|
2022-12-15 10:15:39 -05:00
|
|
|
ESP_LOGI(SNIFFER_TAG, "%" PRIi32 " packages will be captured", snf_rt.packets_to_sniff);
|
2021-05-13 03:59:03 -04:00
|
|
|
}
|
|
|
|
|
2018-09-26 23:24:12 -04:00
|
|
|
/* start sniffer */
|
2019-01-25 04:03:01 -05:00
|
|
|
sniffer_start(&snf_rt);
|
2018-09-26 23:24:12 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-05-13 03:59:03 -04:00
|
|
|
void register_sniffer_cmd(void)
|
2018-09-26 23:24:12 -04:00
|
|
|
{
|
2021-05-13 03:59:03 -04:00
|
|
|
sniffer_args.number = arg_int0("n", "number", "<num>",
|
|
|
|
"the number of the packets to be captured");
|
2021-05-12 13:52:28 -04:00
|
|
|
sniffer_args.interface = arg_str0("i", "interface", "<wlan|eth0|eth1|...>",
|
2018-09-26 23:24:12 -04:00
|
|
|
"which interface to capture packet");
|
2021-02-03 04:10:10 -05:00
|
|
|
sniffer_args.filter = arg_strn("F", "filter", "<mgmt|data|ctrl|misc|mpdu|ampdu|fcsfail>", 0, 7, "filter parameters");
|
2018-09-26 23:24:12 -04:00
|
|
|
sniffer_args.channel = arg_int0("c", "channel", "<channel>", "communication channel to use");
|
|
|
|
sniffer_args.stop = arg_lit0(NULL, "stop", "stop running sniffer");
|
|
|
|
sniffer_args.end = arg_end(1);
|
2019-01-25 04:03:01 -05:00
|
|
|
const esp_console_cmd_t sniffer_cmd = {
|
2018-09-26 23:24:12 -04:00
|
|
|
.command = "sniffer",
|
|
|
|
.help = "Capture specific packet and store in pcap format",
|
|
|
|
.hint = NULL,
|
|
|
|
.func = &do_sniffer_cmd,
|
|
|
|
.argtable = &sniffer_args
|
|
|
|
};
|
2019-01-25 04:03:01 -05:00
|
|
|
ESP_ERROR_CHECK(esp_console_cmd_register(&sniffer_cmd));
|
2018-09-26 23:24:12 -04:00
|
|
|
|
|
|
|
create_wifi_filter_hashtable();
|
|
|
|
}
|