mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-01 11:48:23 -05:00
2cbaf0de22
It looks like tshark parser was broken at some point for wlan.mesh.config.cap which is now (tshark 2.6.3) pointing to incorrect field (same as wlan.mesh.config.ps_protocol). This used to work with tshark 2.2.6. For now, assume the capability field ends up being the last octet of the frame. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
118 lines
3.7 KiB
Python
118 lines
3.7 KiB
Python
#
|
|
# tshark module - refactored from test_scan.py
|
|
#
|
|
# Copyright (c) 2014, Qualcomm Atheros, Inc.
|
|
# Copyright (c) 2015, Intel Mobile Communications GmbH
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
import time
|
|
import subprocess
|
|
import logging
|
|
logger = logging.getLogger()
|
|
|
|
class UnknownFieldsException(Exception):
|
|
def __init__(self, fields):
|
|
Exception.__init__(self, "unknown tshark fields %s" % ','.join(fields))
|
|
self.fields = fields
|
|
|
|
_tshark_filter_arg = '-Y'
|
|
|
|
def _run_tshark(filename, filter, display=None, wait=True):
|
|
global _tshark_filter_arg
|
|
|
|
if wait:
|
|
# wait a bit to make it more likely for wlantest sniffer to have
|
|
# captured and written the results into a file that we can process here
|
|
time.sleep(0.1)
|
|
|
|
try:
|
|
arg = [ "tshark", "-r", filename,
|
|
_tshark_filter_arg, filter ]
|
|
if display:
|
|
arg.append('-Tfields')
|
|
for d in display:
|
|
arg.append('-e')
|
|
arg.append(d)
|
|
else:
|
|
arg.append('-V')
|
|
cmd = subprocess.Popen(arg, stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE)
|
|
except Exception, e:
|
|
logger.info("Could run run tshark check: " + str(e))
|
|
cmd = None
|
|
return None
|
|
|
|
output = cmd.communicate()
|
|
out = output[0]
|
|
res = cmd.wait()
|
|
if res == 1:
|
|
errmsg = "Some fields aren't valid"
|
|
if errmsg in output[1]:
|
|
errors = output[1].split('\n')
|
|
fields = []
|
|
collect = False
|
|
for f in errors:
|
|
if collect:
|
|
f = f.strip()
|
|
if f:
|
|
fields.append(f)
|
|
continue
|
|
if errmsg in f:
|
|
collect = True
|
|
continue
|
|
raise UnknownFieldsException(fields)
|
|
# remember this for efficiency
|
|
_tshark_filter_arg = '-R'
|
|
arg[3] = '-R'
|
|
cmd = subprocess.Popen(arg, stdout=subprocess.PIPE,
|
|
stderr=open('/dev/null', 'w'))
|
|
out = cmd.communicate()[0]
|
|
cmd.wait()
|
|
if res == 2:
|
|
if "tshark: Neither" in output[1] and "are field or protocol names" in output[1]:
|
|
errors = output[1].split('\n')
|
|
fields = []
|
|
for f in errors:
|
|
if f.startswith("tshark: Neither "):
|
|
f = f.split(' ')[2].strip('"')
|
|
if f:
|
|
fields.append(f)
|
|
continue
|
|
raise UnknownFieldsException(fields)
|
|
|
|
return out
|
|
|
|
def run_tshark(filename, filter, display=None, wait=True):
|
|
if display is None: display = []
|
|
try:
|
|
return _run_tshark(filename, filter, display, wait)
|
|
except UnknownFieldsException, e:
|
|
all_wlan_mgt = True
|
|
for f in e.fields:
|
|
if not f.startswith('wlan_mgt.'):
|
|
all_wlan_mgt = False
|
|
break
|
|
if not all_wlan_mgt:
|
|
raise
|
|
return _run_tshark(filename, filter.replace('wlan_mgt', 'wlan'),
|
|
[x.replace('wlan_mgt', 'wlan') for x in display],
|
|
wait)
|
|
|
|
def run_tshark_json(filename, filter):
|
|
arg = [ "tshark", "-r", filename,
|
|
_tshark_filter_arg, filter ]
|
|
arg.append('-Tjson')
|
|
arg.append('-x')
|
|
try:
|
|
cmd = subprocess.Popen(arg, stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE)
|
|
except Exception, e:
|
|
logger.info("Could run run tshark: " + str(e))
|
|
return None
|
|
output = cmd.communicate()
|
|
out = output[0]
|
|
res = cmd.wait()
|
|
return out
|