def extract_cap_handshakes(basedirs):
    """
    Look for cap files with handshakes,
    and extract them to hccap files.
    Does not return anything.
    """


    ###########################################
    # Look for cap/csv handshakes
    
    
    print ""
    print "*** "*30
    print "*** "*30
    print "*** "*30
    print "*** "*30
    print ""
    print "Beginning search for cap files with handshakes"
    print ""
    
    
    handshakes_found = 0
    
    hccap_files = []
    
    for basedir in basedirs:
    
        if basedir[-1] <> '/':
            basedir += '/'
    
        cap_files=[]
        csv_files=[]
        
        for f in os.listdir(basedir):
            name,ext = os.path.splitext(f)
            if ext==".cap":
                if os.path.isfile(basedir+name+".csv"):
                    cap_files.append(basedir+name+".cap")
                    csv_files.append(basedir+name+".csv")
                else: 
                    cap_files.append(basedir+name+".cap")
    
        print ""
        print "[ ] Looking for cap files with handshakes in",basedir
    
    
        for iic, cap_file in enumerate(cap_files):


            f = open(os.devnull, 'w')
            s = subprocess.Popen([WPACLEAN_BIN, '/tmp/cleaned.cap'] + [cap_file], stdout=f, stderr=f)
            s.wait()
            if os.stat('/tmp/cleaned.cap').st_size == 24:
                print '[-] No WPA/WPA2 handshakes captured from %s'%cap_file
                pass
            
            p = open_offline('/tmp/cleaned.cap')
            # filter beacons
            p.filter = 'link[0] == 0x80'
            
            def gotpacket(d, hdr, data):
                bssid = struct.unpack('6B', data[10:16])
                bssid_str = ':'.join(format(x, '02x') for x in bssid)
    
                d.append(bssid_str)
            
            # Parameters are count, callback, user params
            bssid_list = []
            p.loop(-1, gotpacket, bssid_list)


            ##############################33
            # Our BSSID list from the cap file is a 
            # short but interesting set of BSSIDs
            # whose handshakes have been captured.
            #
            for bssid in bssid_list:
        
                BSSID = bssid.upper()
    
                # this is a new bssid
                print '[+] Handshake found!'
                print '    pcap file = %s'%cap_file
                print '    BSSID = %s'%BSSID


                bssid_file = re.sub(r'\:','_',BSSID)
    

                # check if we have a csv file, 
                # airodump-ng dumps a csv file
                # besside-ng does not 
                if csv_files <> []:

                    csv_file = csv_files[iic]
                
                    # extract bssid/essid information
                    stations_list, clients_list = csv2blob(csv_file)
    
                    # stations
                    stations_head, stations_data = parse_aps(stations_list)
    
                    bssid_ix = stations_head.index("BSSID")
                    essid_ix = stations_head.index("ESSID")

                    essid = ''
    
                    all_bssids = [station[bssid_ix].strip() for station in stations_data]
                    all_essids = [station[essid_ix].strip() for station in stations_data]
    
                    if BSSID in all_bssids:
                        this_ix = all_bssids.index(BSSID)
                        this_essid = all_essids[this_ix].strip()
    
                    try:
                        print '    ESSID = %s'%essid
                    except:
                        print '    ESSID N/A'

            
    
                print "    Extracting BSSID handshakes to hccap file [%s] with Aircrack"%( '/tmp'+bssid_file )
                if not DRYRUN:
                    s = subprocess.call([AIRCRACK_BIN, '-J', '/tmp/'+bssid_file, '-b', BSSID, '/tmp/cleaned.cap'],stdout=f,stdin=f)

                src = "/tmp/"+bssid_file+".hccap"
                dest = basedir+bssid_file+".hccap"

                print "    Moving hccap handshake file to [%s]"%(dest)
                if not DRYRUN:
                    s2 = subprocess.call(["cp","-f",src,dest],stdout=f,stdin=f)

                hccap_files.append(dest)
   
                handshakes_found += 1


    
    print ""
    print "Found %d handshakes."%handshakes_found
    
    print ""
    print "*** "*30
    print "*** "*30
    print "*** "*30
    print "*** "*30
    print ""

    return hccap_files
    a += "\n    python  parse_everything.py  [airodump csv file]"
    a += "\n"
    a += "\ne.g., python monitor.py ~/myscan.csv"
    a += "\nor,   python monitor.py /root/dumps/k2015-08-19/everything-04.csv"
    a += "\n"
    raise Exception(a)


import sys

try:
    csvfile = sys.argv[1]
except:
    usage()

stations_list, clients_list = csv2blob(csvfile)


#################################
# Data for
# Stations
# (Access Points)
#################################

from parse_aps import parse_aps

parse_aps(stations_list)


#################################
# Data for