2018-09-27 03:24:12 +00:00
|
|
|
/* cmd_sniffer example.
|
|
|
|
This example code is in the Public Domain (or CC0 licensed, at your option.)
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, this
|
|
|
|
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
|
|
|
|
CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
*/
|
|
|
|
#include <string.h>
|
|
|
|
#include "argtable3/argtable3.h"
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/task.h"
|
|
|
|
#include "freertos/queue.h"
|
|
|
|
#include "freertos/semphr.h"
|
|
|
|
#include <sys/unistd.h>
|
|
|
|
#include <sys/fcntl.h>
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_wifi.h"
|
|
|
|
#include "esp_console.h"
|
2019-01-25 09:03:01 +00:00
|
|
|
#include "esp_app_trace.h"
|
2018-09-27 03:24:12 +00:00
|
|
|
#include "cmd_sniffer.h"
|
|
|
|
#include "pcap.h"
|
|
|
|
#include "sdkconfig.h"
|
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
#define SNIFFER_DEFAULT_FILE_NAME "esp-sniffer"
|
|
|
|
#define SNIFFER_FILE_NAME_MAX_LEN CONFIG_PCAP_FILE_NAME_MAX_LEN
|
|
|
|
#define SNIFFER_DEFAULT_CHANNEL (1)
|
|
|
|
#define SNIFFER_PAYLOAD_FCS_LEN (4)
|
|
|
|
#define SNIFFER_PROCESS_PACKET_TIMEOUT_MS (100)
|
|
|
|
#define SNIFFER_PROCESS_APPTRACE_TIMEOUT_US (100)
|
|
|
|
#define SNIFFER_APPTRACE_RETRY (10)
|
2018-09-27 03:24:12 +00:00
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
static const char *SNIFFER_TAG = "cmd_sniffer";
|
|
|
|
#define SNIFFER_CHECK(a, str, goto_tag, ...) \
|
|
|
|
do \
|
|
|
|
{ \
|
|
|
|
if (!(a)) \
|
|
|
|
{ \
|
|
|
|
ESP_LOGE(SNIFFER_TAG, "%s(%d): " str, __FUNCTION__, __LINE__, ##__VA_ARGS__); \
|
|
|
|
goto goto_tag; \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2018-09-27 03:24:12 +00:00
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
typedef struct {
|
|
|
|
char *filter_name;
|
|
|
|
uint32_t filter_val;
|
|
|
|
} wlan_filter_table_t;
|
2018-09-27 03:24:12 +00:00
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
typedef struct {
|
|
|
|
bool is_running;
|
|
|
|
sniffer_intf_t interf;
|
|
|
|
uint32_t channel;
|
|
|
|
uint32_t filter;
|
|
|
|
#if CONFIG_SNIFFER_PCAP_DESTINATION_SD
|
|
|
|
char filename[SNIFFER_FILE_NAME_MAX_LEN];
|
|
|
|
#endif
|
|
|
|
pcap_handle_t pcap;
|
|
|
|
TaskHandle_t task;
|
|
|
|
QueueHandle_t work_queue;
|
|
|
|
SemaphoreHandle_t sem_task_over;
|
|
|
|
} sniffer_runtime_t;
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
void *payload;
|
|
|
|
uint32_t length;
|
|
|
|
uint32_t seconds;
|
|
|
|
uint32_t microseconds;
|
2019-01-25 09:03:01 +00:00
|
|
|
} sniffer_packet_info_t;
|
2018-09-27 03:24:12 +00:00
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
static sniffer_runtime_t snf_rt = {0};
|
|
|
|
static wlan_filter_table_t wifi_filter_hash_table[SNIFFER_WLAN_FILTER_MAX] = {0};
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
static uint32_t hash_func(const char *str, uint32_t max_num)
|
|
|
|
{
|
|
|
|
uint32_t ret = 0;
|
|
|
|
char *p = (char *)str;
|
|
|
|
while (*p) {
|
|
|
|
ret += *p;
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
return ret % max_num;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void create_wifi_filter_hashtable()
|
|
|
|
{
|
|
|
|
char *wifi_filter_keys[SNIFFER_WLAN_FILTER_MAX] = {"mgmt", "data", "ctrl", "misc", "mpdu", "ampdu"};
|
2019-01-25 09:03:01 +00:00
|
|
|
uint32_t wifi_filter_values[SNIFFER_WLAN_FILTER_MAX] = {WIFI_PROMIS_FILTER_MASK_MGMT, WIFI_PROMIS_FILTER_MASK_DATA,
|
|
|
|
WIFI_PROMIS_FILTER_MASK_CTRL, WIFI_PROMIS_FILTER_MASK_MISC,
|
|
|
|
WIFI_PROMIS_FILTER_MASK_DATA_MPDU, WIFI_PROMIS_FILTER_MASK_DATA_AMPDU
|
|
|
|
};
|
2018-09-27 03:24:12 +00:00
|
|
|
for (int i = 0; i < SNIFFER_WLAN_FILTER_MAX; i++) {
|
|
|
|
uint32_t idx = hash_func(wifi_filter_keys[i], SNIFFER_WLAN_FILTER_MAX);
|
|
|
|
while (wifi_filter_hash_table[idx].filter_name) {
|
|
|
|
idx++;
|
|
|
|
if (idx >= SNIFFER_WLAN_FILTER_MAX) {
|
|
|
|
idx = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wifi_filter_hash_table[idx].filter_name = wifi_filter_keys[i];
|
|
|
|
wifi_filter_hash_table[idx].filter_val = wifi_filter_values[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint32_t search_wifi_filter_hashtable(const char *key)
|
|
|
|
{
|
|
|
|
uint32_t len = strlen(key);
|
|
|
|
uint32_t start_idx = hash_func(key, SNIFFER_WLAN_FILTER_MAX);
|
|
|
|
uint32_t idx = start_idx;
|
|
|
|
while (strncmp(wifi_filter_hash_table[idx].filter_name, key, len)) {
|
|
|
|
idx++;
|
|
|
|
if (idx >= SNIFFER_WLAN_FILTER_MAX) {
|
|
|
|
idx = 0;
|
|
|
|
}
|
|
|
|
/* wrong key */
|
|
|
|
if (idx == start_idx) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return wifi_filter_hash_table[idx].filter_val;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wifi_sniffer_cb(void *recv_buf, wifi_promiscuous_pkt_type_t type)
|
|
|
|
{
|
2019-01-25 09:03:01 +00:00
|
|
|
sniffer_packet_info_t packet_info;
|
|
|
|
wifi_promiscuous_pkt_t *sniffer = (wifi_promiscuous_pkt_t *)recv_buf;
|
|
|
|
/* prepare packet_info */
|
|
|
|
packet_info.seconds = sniffer->rx_ctrl.timestamp / 1000000U;
|
|
|
|
packet_info.microseconds = sniffer->rx_ctrl.timestamp % 1000000U;
|
|
|
|
packet_info.length = sniffer->rx_ctrl.sig_len;
|
|
|
|
/* For now, the sniffer only dumps the length of the MISC type frame */
|
|
|
|
if (type != WIFI_PKT_MISC && !sniffer->rx_ctrl.rx_state) {
|
|
|
|
packet_info.length -= SNIFFER_PAYLOAD_FCS_LEN;
|
|
|
|
void *backup = malloc(packet_info.length);
|
2018-09-27 03:24:12 +00:00
|
|
|
if (backup) {
|
2019-01-25 09:03:01 +00:00
|
|
|
memcpy(backup, sniffer->payload, packet_info.length);
|
2018-09-27 03:24:12 +00:00
|
|
|
packet_info.payload = backup;
|
2019-01-25 09:03:01 +00:00
|
|
|
if (snf_rt.work_queue) {
|
2018-09-27 03:24:12 +00:00
|
|
|
/* send packet_info */
|
2019-01-25 09:03:01 +00:00
|
|
|
if (xQueueSend(snf_rt.work_queue, &packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS)) != pdTRUE) {
|
|
|
|
ESP_LOGE(SNIFFER_TAG, "sniffer work queue full");
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2019-01-25 09:03:01 +00:00
|
|
|
ESP_LOGE(SNIFFER_TAG, "No enough memory for promiscuous packet");
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sniffer_task(void *parameters)
|
|
|
|
{
|
2019-01-25 09:03:01 +00:00
|
|
|
sniffer_packet_info_t packet_info;
|
|
|
|
sniffer_runtime_t *sniffer = (sniffer_runtime_t *)parameters;
|
2018-09-27 03:24:12 +00:00
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
while (sniffer->is_running) {
|
2018-09-27 03:24:12 +00:00
|
|
|
/* receive paclet info from queue */
|
2019-01-25 09:03:01 +00:00
|
|
|
if (xQueueReceive(sniffer->work_queue, &packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS)) != pdTRUE) {
|
2018-09-27 03:24:12 +00:00
|
|
|
continue;
|
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
if (pcap_capture_packet(sniffer->pcap, packet_info.payload, packet_info.length,
|
|
|
|
packet_info.seconds, packet_info.microseconds) != ESP_OK) {
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "save captured packet failed");
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
free(packet_info.payload);
|
|
|
|
}
|
|
|
|
/* notify that sniffer task is over */
|
2019-01-25 09:03:01 +00:00
|
|
|
xSemaphoreGive(sniffer->sem_task_over);
|
2018-09-27 03:24:12 +00:00
|
|
|
vTaskDelete(NULL);
|
|
|
|
}
|
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
static esp_err_t sniffer_stop(sniffer_runtime_t *sniffer)
|
2018-09-27 03:24:12 +00:00
|
|
|
{
|
2019-01-25 09:03:01 +00:00
|
|
|
SNIFFER_CHECK(sniffer->is_running, "sniffer is already stopped", err);
|
|
|
|
|
2018-09-27 03:24:12 +00:00
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
/* Disable wifi promiscuous mode */
|
2019-01-25 09:03:01 +00:00
|
|
|
SNIFFER_CHECK(esp_wifi_set_promiscuous(false) == ESP_OK, "stop wifi promiscuous failed", err);
|
2018-09-27 03:24:12 +00:00
|
|
|
break;
|
|
|
|
default:
|
2019-01-25 09:03:01 +00:00
|
|
|
SNIFFER_CHECK(false, "unsupported interface", err);
|
2018-09-27 03:24:12 +00:00
|
|
|
break;
|
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
ESP_LOGI(SNIFFER_TAG, "stop WiFi promiscuous ok");
|
|
|
|
|
2018-09-27 03:24:12 +00:00
|
|
|
/* stop sniffer local task */
|
2019-01-25 09:03:01 +00:00
|
|
|
sniffer->is_running = false;
|
2018-09-27 03:24:12 +00:00
|
|
|
/* wait for task over */
|
2019-01-25 09:03:01 +00:00
|
|
|
xSemaphoreTake(sniffer->sem_task_over, portMAX_DELAY);
|
|
|
|
vSemaphoreDelete(sniffer->sem_task_over);
|
|
|
|
sniffer->sem_task_over = NULL;
|
2018-09-27 03:24:12 +00:00
|
|
|
/* make sure to free all resources in the left items */
|
2019-01-25 09:03:01 +00:00
|
|
|
UBaseType_t left_items = uxQueueMessagesWaiting(sniffer->work_queue);
|
|
|
|
sniffer_packet_info_t packet_info;
|
2018-09-27 03:24:12 +00:00
|
|
|
while (left_items--) {
|
2019-01-25 09:03:01 +00:00
|
|
|
xQueueReceive(sniffer->work_queue, &packet_info, pdMS_TO_TICKS(SNIFFER_PROCESS_PACKET_TIMEOUT_MS));
|
2018-09-27 03:24:12 +00:00
|
|
|
free(packet_info.payload);
|
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
vQueueDelete(sniffer->work_queue);
|
|
|
|
sniffer->work_queue = NULL;
|
|
|
|
/* stop pcap session */
|
|
|
|
SNIFFER_CHECK(pcap_deinit(sniffer->pcap) == ESP_OK, "stop pcap session failed", err);
|
2018-09-27 03:24:12 +00:00
|
|
|
return ESP_OK;
|
2019-01-25 09:03:01 +00:00
|
|
|
err:
|
|
|
|
return ESP_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if CONFIG_SNIFFER_PCAP_DESTINATION_JTAG
|
|
|
|
static int trace_writefun(void *cookie, const char *buf, int len)
|
|
|
|
{
|
|
|
|
return esp_apptrace_write(ESP_APPTRACE_DEST_TRAX, buf, len, SNIFFER_PROCESS_APPTRACE_TIMEOUT_US) == ESP_OK ? len : -1;
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
static int trace_closefun(void *cookie)
|
2018-09-27 03:24:12 +00:00
|
|
|
{
|
2019-01-25 09:03:01 +00:00
|
|
|
return esp_apptrace_flush(ESP_APPTRACE_DEST_TRAX, ESP_APPTRACE_TMO_INFINITE) == ESP_OK ? 0 : -1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static esp_err_t sniffer_start(sniffer_runtime_t *sniffer)
|
|
|
|
{
|
|
|
|
pcap_config_t pcap_config;
|
2018-09-27 03:24:12 +00:00
|
|
|
wifi_promiscuous_filter_t wifi_filter;
|
|
|
|
|
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
2019-01-25 09:03:01 +00:00
|
|
|
pcap_config.link_type = PCAP_LINK_TYPE_802_11;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SNIFFER_CHECK(false, "unsupported interface", err);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create file to write, binary format */
|
|
|
|
#if CONFIG_SNIFFER_PCAP_DESTINATION_JTAG
|
|
|
|
pcap_config.fp = funopen("trace", NULL, trace_writefun, NULL, trace_closefun);
|
|
|
|
#elif CONFIG_SNIFFER_PCAP_DESTINATION_SD
|
|
|
|
pcap_config.fp = fopen(sniffer->filename, "wb");
|
|
|
|
#else
|
|
|
|
#error "pcap file destination hasn't specified"
|
|
|
|
#endif
|
|
|
|
SNIFFER_CHECK(pcap_config.fp, "open file failed", err);
|
|
|
|
ESP_LOGI(SNIFFER_TAG, "open file successfully");
|
|
|
|
|
|
|
|
/* init a pcap session */
|
|
|
|
SNIFFER_CHECK(pcap_init(&pcap_config, &sniffer->pcap) == ESP_OK, "init pcap session failed", err);
|
|
|
|
|
|
|
|
sniffer->is_running = true;
|
|
|
|
sniffer->work_queue = xQueueCreate(CONFIG_SNIFFER_WORK_QUEUE_LEN, sizeof(sniffer_packet_info_t));
|
|
|
|
SNIFFER_CHECK(sniffer->work_queue, "create work queue failed", err_queue);
|
|
|
|
sniffer->sem_task_over = xSemaphoreCreateBinary();
|
|
|
|
SNIFFER_CHECK(sniffer->sem_task_over, "create sem failed", err_sem);
|
|
|
|
SNIFFER_CHECK(xTaskCreate(sniffer_task, "snifferT", CONFIG_SNIFFER_TASK_STACK_SIZE,
|
|
|
|
sniffer, CONFIG_SNIFFER_TASK_PRIORITY, &sniffer->task) == pdTRUE,
|
|
|
|
"create task failed", err_task);
|
|
|
|
|
|
|
|
switch (sniffer->interf) {
|
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
/* Start WiFi Promicuous Mode */
|
2018-09-27 03:24:12 +00:00
|
|
|
wifi_filter.filter_mask = sniffer->filter;
|
|
|
|
esp_wifi_set_promiscuous_filter(&wifi_filter);
|
|
|
|
esp_wifi_set_promiscuous_rx_cb(wifi_sniffer_cb);
|
2019-01-25 09:03:01 +00:00
|
|
|
SNIFFER_CHECK(esp_wifi_set_promiscuous(true) == ESP_OK, "start wifi promiscuous failed", err_start);
|
2018-09-27 03:24:12 +00:00
|
|
|
esp_wifi_set_channel(sniffer->channel, WIFI_SECOND_CHAN_NONE);
|
2019-01-25 09:03:01 +00:00
|
|
|
ESP_LOGI(SNIFFER_TAG, "start WiFi promiscuous ok");
|
2018-09-27 03:24:12 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ESP_OK;
|
2019-01-25 09:03:01 +00:00
|
|
|
err_start:
|
|
|
|
vTaskDelete(sniffer->task);
|
|
|
|
sniffer->task = NULL;
|
|
|
|
err_task:
|
|
|
|
vSemaphoreDelete(sniffer->sem_task_over);
|
|
|
|
sniffer->sem_task_over = NULL;
|
|
|
|
err_sem:
|
|
|
|
vQueueDelete(sniffer->work_queue);
|
|
|
|
sniffer->work_queue = NULL;
|
|
|
|
err_queue:
|
|
|
|
sniffer->is_running = false;
|
|
|
|
pcap_deinit(sniffer->pcap);
|
|
|
|
err:
|
|
|
|
return ESP_FAIL;
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct {
|
|
|
|
struct arg_str *file;
|
|
|
|
struct arg_str *interface;
|
|
|
|
struct arg_str *filter;
|
|
|
|
struct arg_int *channel;
|
|
|
|
struct arg_lit *stop;
|
|
|
|
struct arg_end *end;
|
|
|
|
} sniffer_args;
|
|
|
|
|
|
|
|
static int do_sniffer_cmd(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int nerrors = arg_parse(argc, argv, (void **)&sniffer_args);
|
|
|
|
if (nerrors != 0) {
|
|
|
|
arg_print_errors(stderr, sniffer_args.end, argv[0]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
/* Check whether or not to stop sniffer: "--stop" option */
|
|
|
|
if (sniffer_args.stop->count) {
|
|
|
|
/* stop sniffer */
|
|
|
|
sniffer_stop(&snf_rt);
|
|
|
|
return 0;
|
|
|
|
}
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
/* Check interface: "-i" option */
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.interf = SNIFFER_INTF_WLAN;
|
2018-09-27 03:24:12 +00:00
|
|
|
if (sniffer_args.interface->count) {
|
|
|
|
if (!strncmp(sniffer_args.interface->sval[0], "wlan", 4)) {
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.interf = SNIFFER_INTF_WLAN;
|
2018-09-27 03:24:12 +00:00
|
|
|
} else {
|
2019-01-25 09:03:01 +00:00
|
|
|
ESP_LOGE(SNIFFER_TAG, "unsupported interface %s", sniffer_args.interface->sval[0]);
|
2018-09-27 03:24:12 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
|
2018-09-27 03:24:12 +00:00
|
|
|
/* Check channel: "-c" option */
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.channel = SNIFFER_DEFAULT_CHANNEL;
|
2018-09-27 03:24:12 +00:00
|
|
|
if (sniffer_args.channel->count) {
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.channel = sniffer_args.channel->ival[0];
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
|
2019-01-25 09:03:01 +00:00
|
|
|
#if CONFIG_SNIFFER_PCAP_DESTINATION_SD
|
2018-09-27 03:24:12 +00:00
|
|
|
/* set pcap file name: "-f" option */
|
2019-01-25 09:03:01 +00:00
|
|
|
int len = snprintf(snf_rt.filename, sizeof(snf_rt.filename), "%s/%s.pcap", CONFIG_SNIFFER_MOUNT_POINT, SNIFFER_DEFAULT_FILE_NAME);
|
2018-09-27 03:24:12 +00:00
|
|
|
if (sniffer_args.file->count) {
|
2019-01-25 09:03:01 +00:00
|
|
|
len = snprintf(snf_rt.filename, sizeof(snf_rt.filename), "%s/%s.pcap", CONFIG_SNIFFER_MOUNT_POINT, sniffer_args.file->sval[0]);
|
|
|
|
}
|
|
|
|
if (len >= sizeof(snf_rt.filename)) {
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "pcap file name too long, try to enlarge memory in menuconfig");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#if CONFIG_SNIFFER_PCAP_DESTINATION_JTAG
|
|
|
|
uint32_t retry = 0;
|
|
|
|
/* wait until apptrace communication established or timeout */
|
|
|
|
while (!esp_apptrace_host_is_connected(ESP_APPTRACE_DEST_TRAX) && (retry < SNIFFER_APPTRACE_RETRY)) {
|
|
|
|
retry++;
|
|
|
|
ESP_LOGW(SNIFFER_TAG, "waiting for apptrace established");
|
|
|
|
vTaskDelay(pdMS_TO_TICKS(1000));
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
if (retry >= SNIFFER_APPTRACE_RETRY) {
|
|
|
|
ESP_LOGE(SNIFFER_TAG, "waiting for apptrace established timeout");
|
2018-09-27 03:24:12 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2019-01-25 09:03:01 +00:00
|
|
|
#endif
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
/* Check filter setting: "-F" option */
|
2019-01-25 09:03:01 +00:00
|
|
|
switch (snf_rt.interf) {
|
2018-09-27 03:24:12 +00:00
|
|
|
case SNIFFER_INTF_WLAN:
|
|
|
|
if (sniffer_args.filter->count) {
|
|
|
|
for (int i = 0; i < sniffer_args.filter->count; i++) {
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.filter += search_wifi_filter_hashtable(sniffer_args.filter->sval[i]);
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
/* When filter conditions are all wrong */
|
2019-01-25 09:03:01 +00:00
|
|
|
if (snf_rt.filter == 0) {
|
|
|
|
snf_rt.filter = WIFI_PROMIS_FILTER_MASK_ALL;
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
} else {
|
2019-01-25 09:03:01 +00:00
|
|
|
snf_rt.filter = WIFI_PROMIS_FILTER_MASK_ALL;
|
2018-09-27 03:24:12 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* start sniffer */
|
2019-01-25 09:03:01 +00:00
|
|
|
sniffer_start(&snf_rt);
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void register_sniffer()
|
|
|
|
{
|
|
|
|
sniffer_args.file = arg_str0("f", "file", "<file>",
|
|
|
|
"name of the file storing the packets in pcap format");
|
|
|
|
sniffer_args.interface = arg_str0("i", "interface", "<wlan>",
|
|
|
|
"which interface to capture packet");
|
|
|
|
sniffer_args.filter = arg_strn("F", "filter", "<mgmt|data|ctrl|misc|mpdu|ampdu>", 0, 6, "filter parameters");
|
|
|
|
sniffer_args.channel = arg_int0("c", "channel", "<channel>", "communication channel to use");
|
|
|
|
sniffer_args.stop = arg_lit0(NULL, "stop", "stop running sniffer");
|
|
|
|
sniffer_args.end = arg_end(1);
|
2019-01-25 09:03:01 +00:00
|
|
|
const esp_console_cmd_t sniffer_cmd = {
|
2018-09-27 03:24:12 +00:00
|
|
|
.command = "sniffer",
|
|
|
|
.help = "Capture specific packet and store in pcap format",
|
|
|
|
.hint = NULL,
|
|
|
|
.func = &do_sniffer_cmd,
|
|
|
|
.argtable = &sniffer_args
|
|
|
|
};
|
2019-01-25 09:03:01 +00:00
|
|
|
ESP_ERROR_CHECK(esp_console_cmd_register(&sniffer_cmd));
|
2018-09-27 03:24:12 +00:00
|
|
|
|
|
|
|
create_wifi_filter_hashtable();
|
|
|
|
}
|