2 * Testing driver interface for a simulated network driver
3 * Copyright (c) 2004-2010, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
15 /* Make sure we get winsock2.h for Windows build to get sockaddr_storage */
16 #include "build_config.h"
17 #ifdef CONFIG_NATIVE_WINDOWS
19 #endif /* CONFIG_NATIVE_WINDOWS */
21 #include "utils/includes.h"
23 #ifndef CONFIG_NATIVE_WINDOWS
27 #define DRIVER_TEST_UNIX
28 #endif /* CONFIG_NATIVE_WINDOWS */
30 #include "utils/common.h"
31 #include "utils/eloop.h"
32 #include "utils/list.h"
33 #include "utils/trace.h"
34 #include "common/ieee802_11_defs.h"
35 #include "crypto/sha1.h"
36 #include "l2_packet/l2_packet.h"
42 struct test_client_socket {
43 struct test_client_socket *next;
45 struct sockaddr_un un;
47 struct test_driver_bss *bss;
50 struct test_driver_bss {
51 struct wpa_driver_test_data *drv;
54 char ifname[IFNAMSIZ];
59 size_t wps_beacon_ie_len;
60 u8 *wps_probe_resp_ie;
61 size_t wps_probe_resp_ie_len;
67 struct wpa_driver_test_global {
69 u8 req_addr[ETH_ALEN];
72 struct wpa_driver_test_data {
73 struct wpa_driver_test_global *global;
76 u8 own_addr[ETH_ALEN];
78 #ifdef DRIVER_TEST_UNIX
79 struct sockaddr_un hostapd_addr;
80 #endif /* DRIVER_TEST_UNIX */
82 struct sockaddr_in hostapd_addr_udp;
83 int hostapd_addr_udp_set;
84 char *own_socket_path;
86 #define MAX_SCAN_RESULTS 30
87 struct wpa_scan_res *scanres[MAX_SCAN_RESULTS];
91 size_t assoc_wpa_ie_len;
94 size_t probe_req_ie_len;
95 u8 probe_req_ssid[32];
96 size_t probe_req_ssid_len;
100 struct test_client_socket *cli;
106 int probe_req_report;
107 unsigned int remain_on_channel_freq;
108 unsigned int remain_on_channel_duration;
112 struct p2p_data *p2p;
113 unsigned int off_channel_freq;
114 struct wpabuf *pending_action_tx;
115 u8 pending_action_src[ETH_ALEN];
116 u8 pending_action_dst[ETH_ALEN];
117 u8 pending_action_bssid[ETH_ALEN];
118 unsigned int pending_action_freq;
119 unsigned int pending_action_no_cck;
120 unsigned int pending_listen_freq;
121 unsigned int pending_listen_duration;
122 int pending_p2p_scan;
123 struct sockaddr *probe_from;
124 socklen_t probe_from_len;
128 static void wpa_driver_test_deinit(void *priv);
129 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
130 const char *dir, int ap);
131 static void wpa_driver_test_close_test_socket(
132 struct wpa_driver_test_data *drv);
133 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx);
134 static int wpa_driver_test_init_p2p(struct wpa_driver_test_data *drv);
137 static void test_driver_free_bss(struct test_driver_bss *bss)
140 os_free(bss->wps_beacon_ie);
141 os_free(bss->wps_probe_resp_ie);
146 static void test_driver_free_bsses(struct wpa_driver_test_data *drv)
148 struct test_driver_bss *bss, *tmp;
150 dl_list_for_each_safe(bss, tmp, &drv->bss, struct test_driver_bss,
152 dl_list_del(&bss->list);
153 test_driver_free_bss(bss);
158 static struct test_client_socket *
159 test_driver_get_cli(struct wpa_driver_test_data *drv, struct sockaddr_un *from,
162 struct test_client_socket *cli = drv->cli;
165 if (cli->unlen == fromlen &&
166 strncmp(cli->un.sun_path, from->sun_path,
167 fromlen - sizeof(cli->un.sun_family)) == 0)
176 static int test_driver_send_eapol(void *priv, const u8 *addr, const u8 *data,
177 size_t data_len, int encrypt,
178 const u8 *own_addr, u32 flags)
180 struct test_driver_bss *dbss = priv;
181 struct wpa_driver_test_data *drv = dbss->drv;
182 struct test_client_socket *cli;
185 struct l2_ethhdr eth;
187 if (drv->test_socket < 0)
192 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
198 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
203 memcpy(eth.h_dest, addr, ETH_ALEN);
204 memcpy(eth.h_source, own_addr, ETH_ALEN);
205 eth.h_proto = host_to_be16(ETH_P_EAPOL);
207 io[0].iov_base = "EAPOL ";
209 io[1].iov_base = ð
210 io[1].iov_len = sizeof(eth);
211 io[2].iov_base = (u8 *) data;
212 io[2].iov_len = data_len;
214 memset(&msg, 0, sizeof(msg));
217 msg.msg_name = &cli->un;
218 msg.msg_namelen = cli->unlen;
219 return sendmsg(drv->test_socket, &msg, 0);
223 static int test_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
224 u16 proto, const u8 *data, size_t data_len)
226 struct test_driver_bss *dbss = priv;
227 struct wpa_driver_test_data *drv = dbss->drv;
230 struct l2_ethhdr eth;
232 struct sockaddr_un addr;
235 int ret = 0, broadcast = 0, count = 0;
237 if (drv->test_socket < 0 || drv->test_dir == NULL) {
238 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
240 __func__, drv->test_socket, drv->test_dir);
244 broadcast = memcmp(dst, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
245 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst));
247 memcpy(eth.h_dest, dst, ETH_ALEN);
248 memcpy(eth.h_source, src, ETH_ALEN);
249 eth.h_proto = host_to_be16(proto);
251 io[0].iov_base = "ETHER ";
253 io[1].iov_base = ð
254 io[1].iov_len = sizeof(eth);
255 io[2].iov_base = (u8 *) data;
256 io[2].iov_len = data_len;
258 memset(&msg, 0, sizeof(msg));
262 dir = opendir(drv->test_dir);
264 perror("test_driver: opendir");
267 while ((dent = readdir(dir))) {
268 #ifdef _DIRENT_HAVE_D_TYPE
269 /* Skip the file if it is not a socket. Also accept
270 * DT_UNKNOWN (0) in case the C library or underlying file
271 * system does not support d_type. */
272 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
274 #endif /* _DIRENT_HAVE_D_TYPE */
275 if (strcmp(dent->d_name, ".") == 0 ||
276 strcmp(dent->d_name, "..") == 0)
279 memset(&addr, 0, sizeof(addr));
280 addr.sun_family = AF_UNIX;
281 snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
282 drv->test_dir, dent->d_name);
284 if (strcmp(addr.sun_path, drv->own_socket_path) == 0)
286 if (!broadcast && strstr(dent->d_name, desttxt) == NULL)
289 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
290 __func__, dent->d_name);
292 msg.msg_name = &addr;
293 msg.msg_namelen = sizeof(addr);
294 ret = sendmsg(drv->test_socket, &msg, 0);
296 perror("driver_test: sendmsg");
301 if (!broadcast && count == 0) {
302 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
303 __func__, MAC2STR(dst));
311 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
312 size_t data_len, int noack)
314 struct test_driver_bss *dbss = priv;
315 struct wpa_driver_test_data *drv = dbss->drv;
319 struct sockaddr_un addr;
324 struct ieee80211_hdr *hdr;
331 union wpa_event_data event;
333 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
334 if (drv->test_socket < 0 || data_len < 10) {
335 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
337 __func__, drv->test_socket,
338 (unsigned long) data_len,
344 broadcast = os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
347 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest));
350 if (drv->remain_on_channel_freq)
351 freq = drv->remain_on_channel_freq;
353 freq = drv->current_freq;
354 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz",
356 os_snprintf(cmd, sizeof(cmd), "MLME freq=%d ", freq);
357 io[0].iov_base = cmd;
358 io[0].iov_len = os_strlen(cmd);
359 io[1].iov_base = (void *) data;
360 io[1].iov_len = data_len;
362 os_memset(&msg, 0, sizeof(msg));
367 if (drv->test_dir == NULL) {
368 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
372 dir = opendir(drv->test_dir);
374 perror("test_driver: opendir");
377 while ((dent = readdir(dir))) {
378 #ifdef _DIRENT_HAVE_D_TYPE
379 /* Skip the file if it is not a socket. Also accept
380 * DT_UNKNOWN (0) in case the C library or underlying file
381 * system does not support d_type. */
382 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
384 #endif /* _DIRENT_HAVE_D_TYPE */
385 if (os_strcmp(dent->d_name, ".") == 0 ||
386 os_strcmp(dent->d_name, "..") == 0)
389 os_memset(&addr, 0, sizeof(addr));
390 addr.sun_family = AF_UNIX;
391 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
392 drv->test_dir, dent->d_name);
394 if (os_strcmp(addr.sun_path, drv->own_socket_path) == 0)
396 if (!broadcast && os_strstr(dent->d_name, desttxt) == NULL)
399 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
400 __func__, dent->d_name);
402 msg.msg_name = &addr;
403 msg.msg_namelen = sizeof(addr);
404 ret = sendmsg(drv->test_socket, &msg, 0);
406 perror("driver_test: sendmsg(test_socket)");
411 if (os_memcmp(dest, dbss->bssid, ETH_ALEN) == 0 ||
412 drv->test_dir == NULL) {
413 if (drv->hostapd_addr_udp_set) {
414 msg.msg_name = &drv->hostapd_addr_udp;
415 msg.msg_namelen = sizeof(drv->hostapd_addr_udp);
417 #ifdef DRIVER_TEST_UNIX
418 msg.msg_name = &drv->hostapd_addr;
419 msg.msg_namelen = sizeof(drv->hostapd_addr);
420 #endif /* DRIVER_TEST_UNIX */
422 } else if (broadcast) {
423 dir = opendir(drv->test_dir);
426 while ((dent = readdir(dir))) {
427 #ifdef _DIRENT_HAVE_D_TYPE
428 /* Skip the file if it is not a socket.
429 * Also accept DT_UNKNOWN (0) in case
430 * the C library or underlying file
431 * system does not support d_type. */
432 if (dent->d_type != DT_SOCK &&
433 dent->d_type != DT_UNKNOWN)
435 #endif /* _DIRENT_HAVE_D_TYPE */
436 if (os_strcmp(dent->d_name, ".") == 0 ||
437 os_strcmp(dent->d_name, "..") == 0)
439 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
440 __func__, dent->d_name);
441 os_memset(&addr, 0, sizeof(addr));
442 addr.sun_family = AF_UNIX;
443 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
444 "%s/%s", drv->test_dir, dent->d_name);
446 msg.msg_name = &addr;
447 msg.msg_namelen = sizeof(addr);
449 ret = sendmsg(drv->test_socket, &msg, 0);
451 perror("driver_test: sendmsg(test_socket)");
457 os_memset(&addr, 0, sizeof(addr));
458 addr.sun_family = AF_UNIX;
459 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
460 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
461 if (stat(addr.sun_path, &st) < 0) {
462 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
464 drv->test_dir, MAC2STR(dest));
466 msg.msg_name = &addr;
467 msg.msg_namelen = sizeof(addr);
470 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
471 perror("sendmsg(test_socket)");
476 hdr = (struct ieee80211_hdr *) data;
477 fc = le_to_host16(hdr->frame_control);
479 os_memset(&event, 0, sizeof(event));
480 event.tx_status.type = WLAN_FC_GET_TYPE(fc);
481 event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
482 event.tx_status.dst = hdr->addr1;
483 event.tx_status.data = data;
484 event.tx_status.data_len = data_len;
485 event.tx_status.ack = ret >= 0;
486 wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
490 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
491 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
492 if (drv->pending_action_tx == NULL) {
493 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - "
494 "no pending operation");
498 if (os_memcmp(hdr->addr1, drv->pending_action_dst, ETH_ALEN) !=
500 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - "
501 "unknown destination address");
505 wpabuf_free(drv->pending_action_tx);
506 drv->pending_action_tx = NULL;
508 p2p_send_action_cb(drv->p2p, drv->pending_action_freq,
509 drv->pending_action_dst,
510 drv->pending_action_src,
511 drv->pending_action_bssid,
514 #endif /* CONFIG_P2P */
520 static void test_driver_scan(struct wpa_driver_test_data *drv,
521 struct sockaddr_un *from, socklen_t fromlen,
524 char buf[512], *pos, *end;
526 struct test_driver_bss *bss;
530 union wpa_event_data event;
532 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */
534 wpa_printf(MSG_DEBUG, "test_driver: SCAN");
538 hwaddr_aton(data + 1, sa)) {
539 wpa_printf(MSG_DEBUG, "test_driver: Unexpected SCAN "
547 ielen = os_strlen(data) / 2;
548 if (ielen > sizeof(ie))
550 if (hexstr2bin(data, ie, ielen) < 0)
553 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR,
555 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
557 os_memset(&event, 0, sizeof(event));
558 event.rx_probe_req.sa = sa;
559 event.rx_probe_req.ie = ie;
560 event.rx_probe_req.ie_len = ielen;
561 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ, &event);
564 p2p_probe_req_rx(drv->p2p, sa, NULL, NULL, ie, ielen);
565 #endif /* CONFIG_P2P */
568 dl_list_for_each(bss, &drv->bss, struct test_driver_bss, list) {
570 end = buf + sizeof(buf);
572 /* reply: SCANRESP BSSID SSID IEs */
573 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
574 MAC2STR(bss->bssid));
575 if (ret < 0 || ret >= end - pos)
578 pos += wpa_snprintf_hex(pos, end - pos,
579 bss->ssid, bss->ssid_len);
580 ret = snprintf(pos, end - pos, " ");
581 if (ret < 0 || ret >= end - pos)
584 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bss->ielen);
585 pos += wpa_snprintf_hex(pos, end - pos, bss->wps_probe_resp_ie,
586 bss->wps_probe_resp_ie_len);
589 ret = snprintf(pos, end - pos, " PRIVACY");
590 if (ret < 0 || ret >= end - pos)
595 sendto(drv->test_socket, buf, pos - buf, 0,
596 (struct sockaddr *) from, fromlen);
601 static void test_driver_assoc(struct wpa_driver_test_data *drv,
602 struct sockaddr_un *from, socklen_t fromlen,
605 struct test_client_socket *cli;
606 u8 ie[256], ssid[32];
607 size_t ielen, ssid_len = 0;
608 char *pos, *pos2, cmd[50];
609 struct test_driver_bss *bss, *tmp;
611 /* data: STA-addr SSID(hex) IEs(hex) */
613 cli = os_zalloc(sizeof(*cli));
617 if (hwaddr_aton(data, cli->addr)) {
618 printf("test_socket: Invalid MAC address '%s' in ASSOC\n",
626 pos2 = strchr(pos, ' ');
629 ssid_len = (pos2 - pos) / 2;
630 if (hexstr2bin(pos, ssid, ssid_len) < 0) {
631 wpa_printf(MSG_DEBUG, "%s: Invalid SSID", __func__);
635 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_assoc: SSID",
639 ielen = strlen(pos) / 2;
640 if (ielen > sizeof(ie))
642 if (hexstr2bin(pos, ie, ielen) < 0)
647 dl_list_for_each(tmp, &drv->bss, struct test_driver_bss, list) {
648 if (tmp->ssid_len == ssid_len &&
649 os_memcmp(tmp->ssid, ssid, ssid_len) == 0) {
655 wpa_printf(MSG_DEBUG, "%s: No matching SSID found from "
656 "configured BSSes", __func__);
662 memcpy(&cli->un, from, sizeof(cli->un));
663 cli->unlen = fromlen;
664 cli->next = drv->cli;
666 wpa_hexdump_ascii(MSG_DEBUG, "test_socket: ASSOC sun_path",
667 (const u8 *) cli->un.sun_path,
668 cli->unlen - sizeof(cli->un.sun_family));
670 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0",
671 MAC2STR(bss->bssid));
672 sendto(drv->test_socket, cmd, strlen(cmd), 0,
673 (struct sockaddr *) from, fromlen);
675 drv_event_assoc(bss->bss_ctx, cli->addr, ie, ielen, 0);
679 static void test_driver_disassoc(struct wpa_driver_test_data *drv,
680 struct sockaddr_un *from, socklen_t fromlen)
682 struct test_client_socket *cli;
684 cli = test_driver_get_cli(drv, from, fromlen);
688 drv_event_disassoc(drv->ctx, cli->addr);
692 static void test_driver_eapol(struct wpa_driver_test_data *drv,
693 struct sockaddr_un *from, socklen_t fromlen,
694 u8 *data, size_t datalen)
697 struct test_client_socket *cli;
699 const u8 *src = NULL;
702 /* Skip Ethernet header */
703 src = data + ETH_ALEN;
704 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src="
705 MACSTR " proto=%04x",
706 MAC2STR(data), MAC2STR(src),
707 WPA_GET_BE16(data + 2 * ETH_ALEN));
713 cli = test_driver_get_cli(drv, from, fromlen);
715 drv_event_eapol_rx(cli->bss->bss_ctx, cli->addr, data,
718 wpa_printf(MSG_DEBUG, "test_socket: EAPOL from unknown "
723 drv_event_eapol_rx(drv->ctx, src, data, datalen);
728 static void test_driver_ether(struct wpa_driver_test_data *drv,
729 struct sockaddr_un *from, socklen_t fromlen,
730 u8 *data, size_t datalen)
732 struct l2_ethhdr *eth;
734 if (datalen < sizeof(*eth))
737 eth = (struct l2_ethhdr *) data;
738 wpa_printf(MSG_DEBUG, "test_driver: RX ETHER dst=" MACSTR " src="
739 MACSTR " proto=%04x",
740 MAC2STR(eth->h_dest), MAC2STR(eth->h_source),
741 be_to_host16(eth->h_proto));
743 #ifdef CONFIG_IEEE80211R
744 if (be_to_host16(eth->h_proto) == ETH_P_RRB) {
745 union wpa_event_data ev;
746 os_memset(&ev, 0, sizeof(ev));
747 ev.ft_rrb_rx.src = eth->h_source;
748 ev.ft_rrb_rx.data = data + sizeof(*eth);
749 ev.ft_rrb_rx.data_len = datalen - sizeof(*eth);
751 #endif /* CONFIG_IEEE80211R */
755 static void test_driver_mlme(struct wpa_driver_test_data *drv,
756 struct sockaddr_un *from, socklen_t fromlen,
757 u8 *data, size_t datalen)
759 struct ieee80211_hdr *hdr;
761 union wpa_event_data event;
762 int freq = 0, own_freq;
763 struct test_driver_bss *bss;
765 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
767 if (datalen > 6 && os_memcmp(data, "freq=", 5) == 0) {
769 for (pos = 5; pos < datalen; pos++) {
770 if (data[pos] == ' ')
774 freq = atoi((const char *) &data[5]);
775 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME RX on "
776 "freq %d MHz", bss->ifname, freq);
783 if (drv->remain_on_channel_freq)
784 own_freq = drv->remain_on_channel_freq;
786 own_freq = drv->current_freq;
788 if (freq && own_freq && freq != own_freq) {
789 wpa_printf(MSG_DEBUG, "test_driver(%s): Ignore MLME RX on "
790 "another frequency %d MHz (own %d MHz)",
791 bss->ifname, freq, own_freq);
795 hdr = (struct ieee80211_hdr *) data;
797 if (test_driver_get_cli(drv, from, fromlen) == NULL && datalen >= 16) {
798 struct test_client_socket *cli;
799 cli = os_zalloc(sizeof(*cli));
802 wpa_printf(MSG_DEBUG, "Adding client entry for " MACSTR,
803 MAC2STR(hdr->addr2));
804 memcpy(cli->addr, hdr->addr2, ETH_ALEN);
805 memcpy(&cli->un, from, sizeof(cli->un));
806 cli->unlen = fromlen;
807 cli->next = drv->cli;
811 wpa_hexdump(MSG_MSGDUMP, "test_driver_mlme: received frame",
813 fc = le_to_host16(hdr->frame_control);
814 if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) {
815 wpa_printf(MSG_ERROR, "%s: received non-mgmt frame",
820 os_memset(&event, 0, sizeof(event));
821 event.rx_mgmt.frame = data;
822 event.rx_mgmt.frame_len = datalen;
823 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
827 static void test_driver_receive_unix(int sock, void *eloop_ctx, void *sock_ctx)
829 struct wpa_driver_test_data *drv = eloop_ctx;
832 struct sockaddr_un from;
833 socklen_t fromlen = sizeof(from);
835 res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
836 (struct sockaddr *) &from, &fromlen);
838 perror("recvfrom(test_socket)");
843 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
845 if (strncmp(buf, "SCAN", 4) == 0) {
846 test_driver_scan(drv, &from, fromlen, buf + 4);
847 } else if (strncmp(buf, "ASSOC ", 6) == 0) {
848 test_driver_assoc(drv, &from, fromlen, buf + 6);
849 } else if (strcmp(buf, "DISASSOC") == 0) {
850 test_driver_disassoc(drv, &from, fromlen);
851 } else if (strncmp(buf, "EAPOL ", 6) == 0) {
852 test_driver_eapol(drv, &from, fromlen, (u8 *) buf + 6,
854 } else if (strncmp(buf, "ETHER ", 6) == 0) {
855 test_driver_ether(drv, &from, fromlen, (u8 *) buf + 6,
857 } else if (strncmp(buf, "MLME ", 5) == 0) {
858 test_driver_mlme(drv, &from, fromlen, (u8 *) buf + 5, res - 5);
860 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
866 static int test_driver_set_generic_elem(void *priv,
867 const u8 *elem, size_t elem_len)
869 struct test_driver_bss *bss = priv;
879 bss->ie = os_malloc(elem_len);
880 if (bss->ie == NULL) {
885 memcpy(bss->ie, elem, elem_len);
886 bss->ielen = elem_len;
891 static int test_driver_set_ap_wps_ie(void *priv, const struct wpabuf *beacon,
892 const struct wpabuf *proberesp,
893 const struct wpabuf *assocresp)
895 struct test_driver_bss *bss = priv;
898 wpa_printf(MSG_DEBUG, "test_driver: Clear Beacon WPS IE");
900 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Beacon WPS IE",
903 os_free(bss->wps_beacon_ie);
905 if (beacon == NULL) {
906 bss->wps_beacon_ie = NULL;
907 bss->wps_beacon_ie_len = 0;
909 bss->wps_beacon_ie = os_malloc(wpabuf_len(beacon));
910 if (bss->wps_beacon_ie == NULL) {
911 bss->wps_beacon_ie_len = 0;
915 os_memcpy(bss->wps_beacon_ie, wpabuf_head(beacon),
917 bss->wps_beacon_ie_len = wpabuf_len(beacon);
920 if (proberesp == NULL)
921 wpa_printf(MSG_DEBUG, "test_driver: Clear Probe Response WPS "
924 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Probe Response WPS "
927 os_free(bss->wps_probe_resp_ie);
929 if (proberesp == NULL) {
930 bss->wps_probe_resp_ie = NULL;
931 bss->wps_probe_resp_ie_len = 0;
933 bss->wps_probe_resp_ie = os_malloc(wpabuf_len(proberesp));
934 if (bss->wps_probe_resp_ie == NULL) {
935 bss->wps_probe_resp_ie_len = 0;
939 os_memcpy(bss->wps_probe_resp_ie, wpabuf_head(proberesp),
940 wpabuf_len(proberesp));
941 bss->wps_probe_resp_ie_len = wpabuf_len(proberesp);
948 static int test_driver_sta_deauth(void *priv, const u8 *own_addr,
949 const u8 *addr, int reason)
951 struct test_driver_bss *dbss = priv;
952 struct wpa_driver_test_data *drv = dbss->drv;
953 struct test_client_socket *cli;
955 if (drv->test_socket < 0)
960 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
968 return sendto(drv->test_socket, "DEAUTH", 6, 0,
969 (struct sockaddr *) &cli->un, cli->unlen);
973 static int test_driver_sta_disassoc(void *priv, const u8 *own_addr,
974 const u8 *addr, int reason)
976 struct test_driver_bss *dbss = priv;
977 struct wpa_driver_test_data *drv = dbss->drv;
978 struct test_client_socket *cli;
980 if (drv->test_socket < 0)
985 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
993 return sendto(drv->test_socket, "DISASSOC", 8, 0,
994 (struct sockaddr *) &cli->un, cli->unlen);
998 static int test_driver_bss_add(void *priv, const char *ifname, const u8 *bssid,
999 void *bss_ctx, void **drv_priv)
1001 struct test_driver_bss *dbss = priv;
1002 struct wpa_driver_test_data *drv = dbss->drv;
1003 struct test_driver_bss *bss;
1005 wpa_printf(MSG_DEBUG, "%s(ifname=%s bssid=" MACSTR ")",
1006 __func__, ifname, MAC2STR(bssid));
1008 bss = os_zalloc(sizeof(*bss));
1012 bss->bss_ctx = bss_ctx;
1014 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
1015 os_memcpy(bss->bssid, bssid, ETH_ALEN);
1017 dl_list_add(&drv->bss, &bss->list);
1019 drv->global->bss_add_used = 1;
1020 os_memcpy(drv->global->req_addr, bssid, ETH_ALEN);
1030 static int test_driver_bss_remove(void *priv, const char *ifname)
1032 struct test_driver_bss *dbss = priv;
1033 struct wpa_driver_test_data *drv = dbss->drv;
1034 struct test_driver_bss *bss;
1035 struct test_client_socket *cli, *prev_c;
1037 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
1039 dl_list_for_each(bss, &drv->bss, struct test_driver_bss, list) {
1040 if (strcmp(bss->ifname, ifname) != 0)
1043 for (prev_c = NULL, cli = drv->cli; cli;
1044 prev_c = cli, cli = cli->next) {
1045 if (cli->bss != bss)
1048 prev_c->next = cli->next;
1050 drv->cli = cli->next;
1055 dl_list_del(&bss->list);
1056 test_driver_free_bss(bss);
1064 static int test_driver_if_add(void *priv, enum wpa_driver_if_type type,
1065 const char *ifname, const u8 *addr,
1066 void *bss_ctx, void **drv_priv,
1067 char *force_ifname, u8 *if_addr,
1070 struct test_driver_bss *dbss = priv;
1071 struct wpa_driver_test_data *drv = dbss->drv;
1073 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s bss_ctx=%p)",
1074 __func__, type, ifname, bss_ctx);
1076 os_memcpy(if_addr, addr, ETH_ALEN);
1078 drv->alloc_iface_idx++;
1079 if_addr[0] = 0x02; /* locally administered */
1080 sha1_prf(drv->own_addr, ETH_ALEN,
1081 "hostapd test addr generation",
1082 (const u8 *) &drv->alloc_iface_idx,
1083 sizeof(drv->alloc_iface_idx),
1084 if_addr + 1, ETH_ALEN - 1);
1086 if (type == WPA_IF_AP_BSS || type == WPA_IF_P2P_GO ||
1087 type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP)
1088 return test_driver_bss_add(priv, ifname, if_addr, bss_ctx,
1094 static int test_driver_if_remove(void *priv, enum wpa_driver_if_type type,
1097 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s)", __func__, type, ifname);
1098 if (type == WPA_IF_AP_BSS || type == WPA_IF_P2P_GO ||
1099 type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP)
1100 return test_driver_bss_remove(priv, ifname);
1105 static int test_driver_set_ssid(void *priv, const u8 *buf, int len)
1107 struct test_driver_bss *bss = priv;
1109 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, bss->ifname);
1112 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_set_ssid: SSID", buf, len);
1114 if ((size_t) len > sizeof(bss->ssid))
1117 os_memcpy(bss->ssid, buf, len);
1118 bss->ssid_len = len;
1124 static int test_driver_set_privacy(void *priv, int enabled)
1126 struct test_driver_bss *dbss = priv;
1128 wpa_printf(MSG_DEBUG, "%s(enabled=%d)", __func__, enabled);
1129 dbss->privacy = enabled;
1135 static int test_driver_set_sta_vlan(void *priv, const u8 *addr,
1136 const char *ifname, int vlan_id)
1138 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " ifname=%s vlan_id=%d)",
1139 __func__, MAC2STR(addr), ifname, vlan_id);
1144 static int test_driver_sta_add(void *priv,
1145 struct hostapd_sta_add_params *params)
1147 struct test_driver_bss *bss = priv;
1148 struct wpa_driver_test_data *drv = bss->drv;
1149 struct test_client_socket *cli;
1151 wpa_printf(MSG_DEBUG, "%s(ifname=%s addr=" MACSTR " aid=%d "
1152 "capability=0x%x listen_interval=%d)",
1153 __func__, bss->ifname, MAC2STR(params->addr), params->aid,
1154 params->capability, params->listen_interval);
1155 wpa_hexdump(MSG_DEBUG, "test_driver_sta_add - supp_rates",
1156 params->supp_rates, params->supp_rates_len);
1160 if (os_memcmp(cli->addr, params->addr, ETH_ALEN) == 0)
1165 wpa_printf(MSG_DEBUG, "%s: no matching client entry",
1176 static struct wpa_driver_test_data * test_alloc_data(void *ctx,
1179 struct wpa_driver_test_data *drv;
1180 struct test_driver_bss *bss;
1182 drv = os_zalloc(sizeof(struct wpa_driver_test_data));
1184 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1189 bss = os_zalloc(sizeof(struct test_driver_bss));
1196 wpa_trace_add_ref(drv, ctx, ctx);
1197 dl_list_init(&drv->bss);
1198 dl_list_add(&drv->bss, &bss->list);
1199 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
1203 /* Generate a MAC address to help testing with multiple STAs */
1204 drv->own_addr[0] = 0x02; /* locally administered */
1205 sha1_prf((const u8 *) ifname, os_strlen(ifname),
1206 "test mac addr generation",
1207 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
1213 static void * test_driver_init(struct hostapd_data *hapd,
1214 struct wpa_init_params *params)
1216 struct wpa_driver_test_data *drv;
1217 struct sockaddr_un addr_un;
1218 struct sockaddr_in addr_in;
1219 struct sockaddr *addr;
1221 struct test_driver_bss *bss;
1223 drv = test_alloc_data(hapd, params->ifname);
1227 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1228 drv->global = params->global_priv;
1230 bss->bss_ctx = hapd;
1231 os_memcpy(bss->bssid, drv->own_addr, ETH_ALEN);
1232 os_memcpy(params->own_addr, drv->own_addr, ETH_ALEN);
1234 if (params->test_socket) {
1235 if (os_strlen(params->test_socket) >=
1236 sizeof(addr_un.sun_path)) {
1237 printf("Too long test_socket path\n");
1238 wpa_driver_test_deinit(bss);
1241 if (strncmp(params->test_socket, "DIR:", 4) == 0) {
1242 size_t len = strlen(params->test_socket) + 30;
1243 drv->test_dir = os_strdup(params->test_socket + 4);
1244 drv->own_socket_path = os_malloc(len);
1245 if (drv->own_socket_path) {
1246 snprintf(drv->own_socket_path, len,
1248 params->test_socket + 4,
1249 MAC2STR(params->own_addr));
1251 } else if (strncmp(params->test_socket, "UDP:", 4) == 0) {
1252 drv->udp_port = atoi(params->test_socket + 4);
1254 drv->own_socket_path = os_strdup(params->test_socket);
1256 if (drv->own_socket_path == NULL && drv->udp_port == 0) {
1257 wpa_driver_test_deinit(bss);
1261 drv->test_socket = socket(drv->udp_port ? PF_INET : PF_UNIX,
1263 if (drv->test_socket < 0) {
1265 wpa_driver_test_deinit(bss);
1269 if (drv->udp_port) {
1270 os_memset(&addr_in, 0, sizeof(addr_in));
1271 addr_in.sin_family = AF_INET;
1272 addr_in.sin_port = htons(drv->udp_port);
1273 addr = (struct sockaddr *) &addr_in;
1274 alen = sizeof(addr_in);
1276 os_memset(&addr_un, 0, sizeof(addr_un));
1277 addr_un.sun_family = AF_UNIX;
1278 os_strlcpy(addr_un.sun_path, drv->own_socket_path,
1279 sizeof(addr_un.sun_path));
1280 addr = (struct sockaddr *) &addr_un;
1281 alen = sizeof(addr_un);
1283 if (bind(drv->test_socket, addr, alen) < 0) {
1284 perror("bind(PF_UNIX)");
1285 close(drv->test_socket);
1286 if (drv->own_socket_path)
1287 unlink(drv->own_socket_path);
1288 wpa_driver_test_deinit(bss);
1291 eloop_register_read_sock(drv->test_socket,
1292 test_driver_receive_unix, drv, NULL);
1294 drv->test_socket = -1;
1300 static void wpa_driver_test_poll(void *eloop_ctx, void *timeout_ctx)
1302 struct wpa_driver_test_data *drv = eloop_ctx;
1304 #ifdef DRIVER_TEST_UNIX
1305 if (drv->associated && drv->hostapd_addr_set) {
1307 if (stat(drv->hostapd_addr.sun_path, &st) < 0) {
1308 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
1309 __func__, strerror(errno));
1310 drv->associated = 0;
1311 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1314 #endif /* DRIVER_TEST_UNIX */
1316 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1320 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1322 struct wpa_driver_test_data *drv = eloop_ctx;
1323 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1324 if (drv->pending_p2p_scan && drv->p2p) {
1327 for (i = 0; i < drv->num_scanres; i++) {
1328 struct wpa_scan_res *bss = drv->scanres[i];
1329 if (p2p_scan_res_handler(drv->p2p, bss->bssid,
1330 bss->freq, bss->level,
1331 (const u8 *) (bss + 1),
1335 p2p_scan_res_handled(drv->p2p);
1336 #endif /* CONFIG_P2P */
1339 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1343 #ifdef DRIVER_TEST_UNIX
1344 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
1347 struct dirent *dent;
1349 struct sockaddr_un addr;
1350 char cmd[512], *pos, *end;
1353 dir = opendir(path);
1357 end = cmd + sizeof(cmd);
1359 ret = os_snprintf(pos, end - pos, "SCAN " MACSTR,
1360 MAC2STR(drv->own_addr));
1361 if (ret >= 0 && ret < end - pos)
1363 if (drv->probe_req_ie) {
1364 ret = os_snprintf(pos, end - pos, " ");
1365 if (ret >= 0 && ret < end - pos)
1367 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ie,
1368 drv->probe_req_ie_len);
1370 if (drv->probe_req_ssid_len) {
1372 ret = os_snprintf(pos, end - pos, "%02x%02x",
1374 (unsigned int) drv->probe_req_ssid_len);
1375 if (ret >= 0 && ret < end - pos)
1377 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ssid,
1378 drv->probe_req_ssid_len);
1382 while ((dent = readdir(dir))) {
1383 if (os_strncmp(dent->d_name, "AP-", 3) != 0 &&
1384 os_strncmp(dent->d_name, "STA-", 4) != 0)
1386 if (drv->own_socket_path) {
1388 olen = os_strlen(drv->own_socket_path);
1389 dlen = os_strlen(dent->d_name);
1391 os_strcmp(dent->d_name,
1392 drv->own_socket_path + olen - dlen) == 0)
1395 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
1397 os_memset(&addr, 0, sizeof(addr));
1398 addr.sun_family = AF_UNIX;
1399 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
1400 path, dent->d_name);
1402 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1403 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1404 perror("sendto(test_socket)");
1409 #endif /* DRIVER_TEST_UNIX */
1412 static int wpa_driver_test_scan(void *priv,
1413 struct wpa_driver_scan_params *params)
1415 struct test_driver_bss *dbss = priv;
1416 struct wpa_driver_test_data *drv = dbss->drv;
1419 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
1421 os_free(drv->probe_req_ie);
1422 if (params->extra_ies) {
1423 drv->probe_req_ie = os_malloc(params->extra_ies_len);
1424 if (drv->probe_req_ie == NULL) {
1425 drv->probe_req_ie_len = 0;
1428 os_memcpy(drv->probe_req_ie, params->extra_ies,
1429 params->extra_ies_len);
1430 drv->probe_req_ie_len = params->extra_ies_len;
1432 drv->probe_req_ie = NULL;
1433 drv->probe_req_ie_len = 0;
1436 for (i = 0; i < params->num_ssids; i++)
1437 wpa_hexdump(MSG_DEBUG, "Scan SSID",
1438 params->ssids[i].ssid, params->ssids[i].ssid_len);
1439 drv->probe_req_ssid_len = 0;
1440 if (params->num_ssids) {
1441 os_memcpy(drv->probe_req_ssid, params->ssids[0].ssid,
1442 params->ssids[0].ssid_len);
1443 drv->probe_req_ssid_len = params->ssids[0].ssid_len;
1445 wpa_hexdump(MSG_DEBUG, "Scan extra IE(s)",
1446 params->extra_ies, params->extra_ies_len);
1448 drv->num_scanres = 0;
1450 #ifdef DRIVER_TEST_UNIX
1451 if (drv->test_socket >= 0 && drv->test_dir)
1452 wpa_driver_scan_dir(drv, drv->test_dir);
1454 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
1455 sendto(drv->test_socket, "SCAN", 4, 0,
1456 (struct sockaddr *) &drv->hostapd_addr,
1457 sizeof(drv->hostapd_addr)) < 0) {
1458 perror("sendto(test_socket)");
1460 #endif /* DRIVER_TEST_UNIX */
1462 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1463 sendto(drv->test_socket, "SCAN", 4, 0,
1464 (struct sockaddr *) &drv->hostapd_addr_udp,
1465 sizeof(drv->hostapd_addr_udp)) < 0) {
1466 perror("sendto(test_socket)");
1469 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1470 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
1476 static struct wpa_scan_results * wpa_driver_test_get_scan_results2(void *priv)
1478 struct test_driver_bss *dbss = priv;
1479 struct wpa_driver_test_data *drv = dbss->drv;
1480 struct wpa_scan_results *res;
1483 res = os_zalloc(sizeof(*res));
1487 res->res = os_zalloc(drv->num_scanres * sizeof(struct wpa_scan_res *));
1488 if (res->res == NULL) {
1493 for (i = 0; i < drv->num_scanres; i++) {
1494 struct wpa_scan_res *r;
1495 if (drv->scanres[i] == NULL)
1497 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len);
1500 os_memcpy(r, drv->scanres[i],
1501 sizeof(*r) + drv->scanres[i]->ie_len);
1502 res->res[res->num++] = r;
1509 static int wpa_driver_test_set_key(const char *ifname, void *priv,
1510 enum wpa_alg alg, const u8 *addr,
1511 int key_idx, int set_tx,
1512 const u8 *seq, size_t seq_len,
1513 const u8 *key, size_t key_len)
1515 wpa_printf(MSG_DEBUG, "%s: ifname=%s priv=%p alg=%d key_idx=%d "
1517 __func__, ifname, priv, alg, key_idx, set_tx);
1519 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
1521 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
1523 wpa_hexdump_key(MSG_DEBUG, " key", key, key_len);
1528 static int wpa_driver_update_mode(struct wpa_driver_test_data *drv, int ap)
1530 if (ap && !drv->ap) {
1531 wpa_driver_test_close_test_socket(drv);
1532 wpa_driver_test_attach(drv, drv->test_dir, 1);
1534 } else if (!ap && drv->ap) {
1535 wpa_driver_test_close_test_socket(drv);
1536 wpa_driver_test_attach(drv, drv->test_dir, 0);
1544 static int wpa_driver_test_associate(
1545 void *priv, struct wpa_driver_associate_params *params)
1547 struct test_driver_bss *dbss = priv;
1548 struct wpa_driver_test_data *drv = dbss->drv;
1549 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
1550 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
1551 __func__, priv, params->freq, params->pairwise_suite,
1552 params->group_suite, params->key_mgmt_suite,
1553 params->auth_alg, params->mode);
1554 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1555 if (params->bssid) {
1556 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
1557 MAC2STR(params->bssid));
1560 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
1561 params->ssid, params->ssid_len);
1563 if (params->wpa_ie) {
1564 wpa_hexdump(MSG_DEBUG, " wpa_ie",
1565 params->wpa_ie, params->wpa_ie_len);
1566 drv->assoc_wpa_ie_len = params->wpa_ie_len;
1567 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
1568 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
1569 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
1570 drv->assoc_wpa_ie_len);
1572 drv->assoc_wpa_ie_len = 0;
1574 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1576 drv->ibss = params->mode == IEEE80211_MODE_IBSS;
1577 dbss->privacy = params->key_mgmt_suite &
1578 (WPA_KEY_MGMT_IEEE8021X |
1580 WPA_KEY_MGMT_WPA_NONE |
1581 WPA_KEY_MGMT_FT_IEEE8021X |
1582 WPA_KEY_MGMT_FT_PSK |
1583 WPA_KEY_MGMT_IEEE8021X_SHA256 |
1584 WPA_KEY_MGMT_PSK_SHA256);
1585 if (params->wep_key_len[params->wep_tx_keyidx])
1588 #ifdef DRIVER_TEST_UNIX
1589 if (drv->test_dir && params->bssid &&
1590 params->mode != IEEE80211_MODE_IBSS) {
1591 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
1592 drv->hostapd_addr.sun_family = AF_UNIX;
1593 os_snprintf(drv->hostapd_addr.sun_path,
1594 sizeof(drv->hostapd_addr.sun_path),
1596 drv->test_dir, MAC2STR(params->bssid));
1597 drv->hostapd_addr_set = 1;
1599 #endif /* DRIVER_TEST_UNIX */
1601 if (params->mode == IEEE80211_MODE_AP) {
1602 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1603 dbss->ssid_len = params->ssid_len;
1604 os_memcpy(dbss->bssid, drv->own_addr, ETH_ALEN);
1605 if (params->wpa_ie && params->wpa_ie_len) {
1606 dbss->ie = os_malloc(params->wpa_ie_len);
1608 os_memcpy(dbss->ie, params->wpa_ie,
1609 params->wpa_ie_len);
1610 dbss->ielen = params->wpa_ie_len;
1613 } else if (drv->test_socket >= 0 &&
1614 (drv->hostapd_addr_set || drv->hostapd_addr_udp_set)) {
1615 char cmd[200], *pos, *end;
1617 end = cmd + sizeof(cmd);
1619 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
1620 MAC2STR(drv->own_addr));
1621 if (ret >= 0 && ret < end - pos)
1623 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
1625 ret = os_snprintf(pos, end - pos, " ");
1626 if (ret >= 0 && ret < end - pos)
1628 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
1629 params->wpa_ie_len);
1631 #ifdef DRIVER_TEST_UNIX
1632 if (drv->hostapd_addr_set &&
1633 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1634 (struct sockaddr *) &drv->hostapd_addr,
1635 sizeof(drv->hostapd_addr)) < 0) {
1636 perror("sendto(test_socket)");
1639 #endif /* DRIVER_TEST_UNIX */
1640 if (drv->hostapd_addr_udp_set &&
1641 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1642 (struct sockaddr *) &drv->hostapd_addr_udp,
1643 sizeof(drv->hostapd_addr_udp)) < 0) {
1644 perror("sendto(test_socket)");
1648 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1649 dbss->ssid_len = params->ssid_len;
1651 drv->associated = 1;
1652 if (params->mode == IEEE80211_MODE_IBSS) {
1653 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1654 dbss->ssid_len = params->ssid_len;
1656 os_memcpy(dbss->bssid, params->bssid,
1659 os_get_random(dbss->bssid, ETH_ALEN);
1660 dbss->bssid[0] &= ~0x01;
1661 dbss->bssid[0] |= 0x02;
1664 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1671 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
1673 struct test_driver_bss *dbss = priv;
1674 os_memcpy(bssid, dbss->bssid, ETH_ALEN);
1679 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
1681 struct test_driver_bss *dbss = priv;
1682 os_memcpy(ssid, dbss->ssid, 32);
1683 return dbss->ssid_len;
1687 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
1689 #ifdef DRIVER_TEST_UNIX
1690 if (drv->test_socket >= 0 &&
1691 sendto(drv->test_socket, "DISASSOC", 8, 0,
1692 (struct sockaddr *) &drv->hostapd_addr,
1693 sizeof(drv->hostapd_addr)) < 0) {
1694 perror("sendto(test_socket)");
1697 #endif /* DRIVER_TEST_UNIX */
1698 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1699 sendto(drv->test_socket, "DISASSOC", 8, 0,
1700 (struct sockaddr *) &drv->hostapd_addr_udp,
1701 sizeof(drv->hostapd_addr_udp)) < 0) {
1702 perror("sendto(test_socket)");
1709 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
1712 struct test_driver_bss *dbss = priv;
1713 struct wpa_driver_test_data *drv = dbss->drv;
1714 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1715 __func__, MAC2STR(addr), reason_code);
1716 os_memset(dbss->bssid, 0, ETH_ALEN);
1717 drv->associated = 0;
1718 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1719 return wpa_driver_test_send_disassoc(drv);
1723 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
1726 struct test_driver_bss *dbss = priv;
1727 struct wpa_driver_test_data *drv = dbss->drv;
1728 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1729 __func__, MAC2STR(addr), reason_code);
1730 os_memset(dbss->bssid, 0, ETH_ALEN);
1731 drv->associated = 0;
1732 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1733 return wpa_driver_test_send_disassoc(drv);
1737 static const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie)
1739 const u8 *end, *pos;
1741 pos = (const u8 *) (res + 1);
1742 end = pos + res->ie_len;
1744 while (pos + 1 < end) {
1745 if (pos + 2 + pos[1] > end)
1756 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
1757 struct sockaddr *from,
1761 struct wpa_scan_res *res;
1762 const char *pos, *pos2;
1764 u8 *ie_pos, *ie_start, *ie_end;
1765 #define MAX_IE_LEN 1000
1766 const u8 *ds_params;
1768 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
1769 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
1770 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
1775 /* SCANRESP BSSID SSID IEs */
1777 res = os_zalloc(sizeof(*res) + MAX_IE_LEN);
1780 ie_start = ie_pos = (u8 *) (res + 1);
1781 ie_end = ie_pos + MAX_IE_LEN;
1783 if (hwaddr_aton(data, res->bssid)) {
1784 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
1792 pos2 = os_strchr(pos, ' ');
1794 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
1799 len = (pos2 - pos) / 2;
1803 * Generate SSID IE from the SSID field since this IE is not included
1804 * in the main IE field.
1806 *ie_pos++ = WLAN_EID_SSID;
1808 if (hexstr2bin(pos, ie_pos, len) < 0) {
1809 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
1816 pos2 = os_strchr(pos, ' ');
1818 len = os_strlen(pos) / 2;
1820 len = (pos2 - pos) / 2;
1821 if ((int) len > ie_end - ie_pos)
1822 len = ie_end - ie_pos;
1823 if (hexstr2bin(pos, ie_pos, len) < 0) {
1824 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
1829 res->ie_len = ie_pos - ie_start;
1835 if (os_strstr(pos, "PRIVACY"))
1836 res->caps |= IEEE80211_CAP_PRIVACY;
1837 if (os_strstr(pos, "IBSS"))
1838 res->caps |= IEEE80211_CAP_IBSS;
1841 ds_params = wpa_scan_get_ie(res, WLAN_EID_DS_PARAMS);
1842 if (ds_params && ds_params[1] > 0) {
1843 if (ds_params[2] >= 1 && ds_params[2] <= 13)
1844 res->freq = 2407 + ds_params[2] * 5;
1847 os_free(drv->scanres[drv->num_scanres]);
1848 drv->scanres[drv->num_scanres++] = res;
1852 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
1853 struct sockaddr *from,
1857 struct test_driver_bss *bss;
1859 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1861 /* ASSOCRESP BSSID <res> */
1862 if (hwaddr_aton(data, bss->bssid)) {
1863 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
1866 if (drv->use_associnfo) {
1867 union wpa_event_data event;
1868 os_memset(&event, 0, sizeof(event));
1869 event.assoc_info.req_ies = drv->assoc_wpa_ie;
1870 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
1871 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
1873 drv->associated = 1;
1874 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1878 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
1879 struct sockaddr *from,
1882 drv->associated = 0;
1883 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1887 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
1888 struct sockaddr *from,
1890 const u8 *data, size_t data_len)
1893 struct test_driver_bss *bss;
1895 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1897 if (data_len > 14) {
1898 /* Skip Ethernet header */
1899 src = data + ETH_ALEN;
1905 drv_event_eapol_rx(drv->ctx, src, data, data_len);
1909 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
1910 struct sockaddr *from,
1912 const u8 *data, size_t data_len)
1914 int freq = 0, own_freq;
1915 union wpa_event_data event;
1916 const struct ieee80211_mgmt *mgmt;
1918 struct test_driver_bss *bss;
1920 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1921 if (data_len > 6 && os_memcmp(data, "freq=", 5) == 0) {
1923 for (pos = 5; pos < data_len; pos++) {
1924 if (data[pos] == ' ')
1927 if (pos < data_len) {
1928 freq = atoi((const char *) &data[5]);
1929 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME RX on "
1930 "freq %d MHz", bss->ifname, freq);
1937 if (drv->remain_on_channel_freq)
1938 own_freq = drv->remain_on_channel_freq;
1940 own_freq = drv->current_freq;
1942 if (freq && own_freq && freq != own_freq) {
1943 wpa_printf(MSG_DEBUG, "test_driver(%s): Ignore MLME RX on "
1944 "another frequency %d MHz (own %d MHz)",
1945 bss->ifname, freq, own_freq);
1949 os_memset(&event, 0, sizeof(event));
1950 event.mlme_rx.buf = data;
1951 event.mlme_rx.len = data_len;
1952 event.mlme_rx.freq = freq;
1953 wpa_supplicant_event(drv->ctx, EVENT_MLME_RX, &event);
1955 mgmt = (const struct ieee80211_mgmt *) data;
1956 fc = le_to_host16(mgmt->frame_control);
1958 if (drv->probe_req_report && data_len >= 24) {
1959 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
1960 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_REQ) {
1961 os_memset(&event, 0, sizeof(event));
1962 event.rx_probe_req.sa = mgmt->sa;
1963 event.rx_probe_req.da = mgmt->da;
1964 event.rx_probe_req.bssid = mgmt->bssid;
1965 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
1966 event.rx_probe_req.ie_len =
1967 data_len - (mgmt->u.probe_req.variable - data);
1968 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ,
1972 p2p_probe_req_rx(drv->p2p, mgmt->sa,
1973 mgmt->da, mgmt->bssid,
1974 event.rx_probe_req.ie,
1975 event.rx_probe_req.ie_len);
1976 #endif /* CONFIG_P2P */
1982 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
1983 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
1985 hdr_len = (const u8 *)
1986 &mgmt->u.action.u.vs_public_action.action - data;
1987 p2p_rx_action(drv->p2p, mgmt->da, mgmt->sa, mgmt->bssid,
1988 mgmt->u.action.category,
1989 &mgmt->u.action.u.vs_public_action.action,
1990 data_len - hdr_len, freq);
1992 #endif /* CONFIG_P2P */
1997 static void wpa_driver_test_scan_cmd(struct wpa_driver_test_data *drv,
1998 struct sockaddr *from,
2000 const u8 *data, size_t data_len)
2002 char buf[512], *pos, *end;
2004 struct test_driver_bss *bss;
2006 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
2008 /* data: optional [ STA-addr | ' ' | IEs(hex) ] */
2010 if (drv->probe_req_report && drv->p2p && data_len) {
2011 const char *d = (const char *) data;
2016 if (hwaddr_aton(d, sa))
2021 ielen = os_strlen(d) / 2;
2022 if (ielen > sizeof(ie))
2024 if (hexstr2bin(d, ie, ielen) < 0)
2026 drv->probe_from = from;
2027 drv->probe_from_len = fromlen;
2028 p2p_probe_req_rx(drv->p2p, sa, NULL, NULL, ie, ielen);
2029 drv->probe_from = NULL;
2031 #endif /* CONFIG_P2P */
2037 end = buf + sizeof(buf);
2039 /* reply: SCANRESP BSSID SSID IEs */
2040 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
2041 MAC2STR(bss->bssid));
2042 if (ret < 0 || ret >= end - pos)
2045 pos += wpa_snprintf_hex(pos, end - pos,
2046 bss->ssid, bss->ssid_len);
2047 ret = snprintf(pos, end - pos, " ");
2048 if (ret < 0 || ret >= end - pos)
2051 pos += wpa_snprintf_hex(pos, end - pos, drv->assoc_wpa_ie,
2052 drv->assoc_wpa_ie_len);
2055 ret = snprintf(pos, end - pos, " PRIVACY");
2056 if (ret < 0 || ret >= end - pos)
2061 ret = snprintf(pos, end - pos, " IBSS");
2062 if (ret < 0 || ret >= end - pos)
2066 sendto(drv->test_socket, buf, pos - buf, 0,
2067 (struct sockaddr *) from, fromlen);
2071 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
2074 struct wpa_driver_test_data *drv = eloop_ctx;
2077 struct sockaddr_storage from;
2078 socklen_t fromlen = sizeof(from);
2079 const size_t buflen = 2000;
2082 test_driver_receive_unix(sock, eloop_ctx, sock_ctx);
2086 buf = os_malloc(buflen);
2089 res = recvfrom(sock, buf, buflen - 1, 0,
2090 (struct sockaddr *) &from, &fromlen);
2092 perror("recvfrom(test_socket)");
2098 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
2100 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
2101 wpa_driver_test_scanresp(drv, (struct sockaddr *) &from,
2103 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
2104 wpa_driver_test_assocresp(drv, (struct sockaddr *) &from,
2106 } else if (os_strcmp(buf, "DISASSOC") == 0) {
2107 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
2109 } else if (os_strcmp(buf, "DEAUTH") == 0) {
2110 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
2112 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
2113 wpa_driver_test_eapol(drv, (struct sockaddr *) &from, fromlen,
2114 (const u8 *) buf + 6, res - 6);
2115 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
2116 wpa_driver_test_mlme(drv, (struct sockaddr *) &from, fromlen,
2117 (const u8 *) buf + 5, res - 5);
2118 } else if (os_strncmp(buf, "SCAN ", 5) == 0) {
2119 wpa_driver_test_scan_cmd(drv, (struct sockaddr *) &from,
2121 (const u8 *) buf + 5, res - 5);
2123 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
2130 static void * wpa_driver_test_init2(void *ctx, const char *ifname,
2133 struct wpa_driver_test_data *drv;
2134 struct wpa_driver_test_global *global = global_priv;
2135 struct test_driver_bss *bss;
2137 drv = test_alloc_data(ctx, ifname);
2140 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
2141 drv->global = global_priv;
2142 drv->test_socket = -1;
2144 /* Set dummy BSSID and SSID for testing. */
2145 bss->bssid[0] = 0x02;
2146 bss->bssid[1] = 0x00;
2147 bss->bssid[2] = 0x00;
2148 bss->bssid[3] = 0x00;
2149 bss->bssid[4] = 0x00;
2150 bss->bssid[5] = 0x01;
2151 os_memcpy(bss->ssid, "test", 5);
2154 if (global->bss_add_used) {
2155 os_memcpy(drv->own_addr, global->req_addr, ETH_ALEN);
2156 global->bss_add_used = 0;
2159 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
2165 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
2167 if (drv->test_socket >= 0) {
2168 eloop_unregister_read_sock(drv->test_socket);
2169 close(drv->test_socket);
2170 drv->test_socket = -1;
2173 if (drv->own_socket_path) {
2174 unlink(drv->own_socket_path);
2175 os_free(drv->own_socket_path);
2176 drv->own_socket_path = NULL;
2181 static void wpa_driver_test_deinit(void *priv)
2183 struct test_driver_bss *dbss = priv;
2184 struct wpa_driver_test_data *drv = dbss->drv;
2185 struct test_client_socket *cli, *prev;
2190 p2p_deinit(drv->p2p);
2191 wpabuf_free(drv->pending_action_tx);
2192 #endif /* CONFIG_P2P */
2202 /* There should be only one BSS remaining at this point. */
2203 if (dl_list_len(&drv->bss) != 1)
2204 wpa_printf(MSG_ERROR, "%s: %u remaining BSS entries",
2205 __func__, dl_list_len(&drv->bss));
2206 #endif /* HOSTAPD */
2208 test_driver_free_bsses(drv);
2210 wpa_driver_test_close_test_socket(drv);
2211 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
2212 eloop_cancel_timeout(wpa_driver_test_poll, drv, NULL);
2213 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2214 os_free(drv->test_dir);
2215 for (i = 0; i < MAX_SCAN_RESULTS; i++)
2216 os_free(drv->scanres[i]);
2217 os_free(drv->probe_req_ie);
2218 wpa_trace_remove_ref(drv, ctx, drv->ctx);
2223 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
2224 const char *dir, int ap)
2226 #ifdef DRIVER_TEST_UNIX
2227 static unsigned int counter = 0;
2228 struct sockaddr_un addr;
2231 os_free(drv->own_socket_path);
2233 len = os_strlen(dir) + 30;
2234 drv->own_socket_path = os_malloc(len);
2235 if (drv->own_socket_path == NULL)
2237 os_snprintf(drv->own_socket_path, len, "%s/%s-" MACSTR,
2238 dir, ap ? "AP" : "STA", MAC2STR(drv->own_addr));
2240 drv->own_socket_path = os_malloc(100);
2241 if (drv->own_socket_path == NULL)
2243 os_snprintf(drv->own_socket_path, 100,
2244 "/tmp/wpa_supplicant_test-%d-%d",
2245 getpid(), counter++);
2248 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
2249 if (drv->test_socket < 0) {
2250 perror("socket(PF_UNIX)");
2251 os_free(drv->own_socket_path);
2252 drv->own_socket_path = NULL;
2256 os_memset(&addr, 0, sizeof(addr));
2257 addr.sun_family = AF_UNIX;
2258 os_strlcpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
2259 if (bind(drv->test_socket, (struct sockaddr *) &addr,
2260 sizeof(addr)) < 0) {
2261 perror("bind(PF_UNIX)");
2262 close(drv->test_socket);
2263 unlink(drv->own_socket_path);
2264 os_free(drv->own_socket_path);
2265 drv->own_socket_path = NULL;
2269 eloop_register_read_sock(drv->test_socket,
2270 wpa_driver_test_receive_unix, drv, NULL);
2273 #else /* DRIVER_TEST_UNIX */
2275 #endif /* DRIVER_TEST_UNIX */
2279 static int wpa_driver_test_attach_udp(struct wpa_driver_test_data *drv,
2284 pos = os_strchr(dst, ':');
2288 wpa_printf(MSG_DEBUG, "%s: addr=%s port=%s", __func__, dst, pos);
2290 drv->test_socket = socket(PF_INET, SOCK_DGRAM, 0);
2291 if (drv->test_socket < 0) {
2292 perror("socket(PF_INET)");
2296 os_memset(&drv->hostapd_addr_udp, 0, sizeof(drv->hostapd_addr_udp));
2297 drv->hostapd_addr_udp.sin_family = AF_INET;
2298 #if defined(CONFIG_NATIVE_WINDOWS) || defined(CONFIG_ANSI_C_EXTRA)
2302 sscanf(dst, "%d.%d.%d.%d", &a[0], &a[1], &a[2], &a[3]);
2303 pos = (u8 *) &drv->hostapd_addr_udp.sin_addr;
2309 #else /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2310 inet_aton(dst, &drv->hostapd_addr_udp.sin_addr);
2311 #endif /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2312 drv->hostapd_addr_udp.sin_port = htons(atoi(pos));
2314 drv->hostapd_addr_udp_set = 1;
2316 eloop_register_read_sock(drv->test_socket,
2317 wpa_driver_test_receive_unix, drv, NULL);
2323 static int wpa_driver_test_set_param(void *priv, const char *param)
2325 struct test_driver_bss *dbss = priv;
2326 struct wpa_driver_test_data *drv = dbss->drv;
2329 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
2333 wpa_driver_test_close_test_socket(drv);
2335 #ifdef DRIVER_TEST_UNIX
2336 pos = os_strstr(param, "test_socket=");
2342 pos2 = os_strchr(pos, ' ');
2346 len = os_strlen(pos);
2347 if (len > sizeof(drv->hostapd_addr.sun_path))
2349 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
2350 drv->hostapd_addr.sun_family = AF_UNIX;
2351 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
2352 drv->hostapd_addr_set = 1;
2354 #endif /* DRIVER_TEST_UNIX */
2356 pos = os_strstr(param, "test_dir=");
2359 os_free(drv->test_dir);
2360 drv->test_dir = os_strdup(pos + 9);
2361 if (drv->test_dir == NULL)
2363 end = os_strchr(drv->test_dir, ' ');
2366 if (wpa_driver_test_attach(drv, drv->test_dir, 0))
2369 pos = os_strstr(param, "test_udp=");
2372 dst = os_strdup(pos + 9);
2375 epos = os_strchr(dst, ' ');
2378 if (wpa_driver_test_attach_udp(drv, dst))
2381 } else if (wpa_driver_test_attach(drv, NULL, 0))
2385 if (os_strstr(param, "use_associnfo=1")) {
2386 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
2387 drv->use_associnfo = 1;
2390 if (os_strstr(param, "p2p_mgmt=1")) {
2391 wpa_printf(MSG_DEBUG, "test_driver: Use internal P2P "
2393 if (wpa_driver_test_init_p2p(drv) < 0)
2401 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
2403 struct test_driver_bss *dbss = priv;
2404 struct wpa_driver_test_data *drv = dbss->drv;
2405 wpa_printf(MSG_DEBUG, "%s", __func__);
2406 return drv->own_addr;
2410 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
2411 const u8 *data, size_t data_len)
2413 struct test_driver_bss *dbss = priv;
2414 struct wpa_driver_test_data *drv = dbss->drv;
2417 struct l2_ethhdr eth;
2418 struct sockaddr *addr;
2420 #ifdef DRIVER_TEST_UNIX
2421 struct sockaddr_un addr_un;
2422 #endif /* DRIVER_TEST_UNIX */
2424 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
2426 os_memset(ð, 0, sizeof(eth));
2427 os_memcpy(eth.h_dest, dest, ETH_ALEN);
2428 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
2429 eth.h_proto = host_to_be16(proto);
2431 msg_len = 6 + sizeof(eth) + data_len;
2432 msg = os_malloc(msg_len);
2435 os_memcpy(msg, "EAPOL ", 6);
2436 os_memcpy(msg + 6, ð, sizeof(eth));
2437 os_memcpy(msg + 6 + sizeof(eth), data, data_len);
2439 if (os_memcmp(dest, dbss->bssid, ETH_ALEN) == 0 ||
2440 drv->test_dir == NULL) {
2441 if (drv->hostapd_addr_udp_set) {
2442 addr = (struct sockaddr *) &drv->hostapd_addr_udp;
2443 alen = sizeof(drv->hostapd_addr_udp);
2445 #ifdef DRIVER_TEST_UNIX
2446 addr = (struct sockaddr *) &drv->hostapd_addr;
2447 alen = sizeof(drv->hostapd_addr);
2448 #else /* DRIVER_TEST_UNIX */
2451 #endif /* DRIVER_TEST_UNIX */
2454 #ifdef DRIVER_TEST_UNIX
2456 os_memset(&addr_un, 0, sizeof(addr_un));
2457 addr_un.sun_family = AF_UNIX;
2458 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2459 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
2460 if (stat(addr_un.sun_path, &st) < 0) {
2461 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2463 drv->test_dir, MAC2STR(dest));
2465 addr = (struct sockaddr *) &addr_un;
2466 alen = sizeof(addr_un);
2467 #else /* DRIVER_TEST_UNIX */
2470 #endif /* DRIVER_TEST_UNIX */
2473 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
2474 perror("sendmsg(test_socket)");
2484 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
2486 struct test_driver_bss *dbss = priv;
2487 struct wpa_driver_test_data *drv = dbss->drv;
2488 os_memset(capa, 0, sizeof(*capa));
2489 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
2490 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
2491 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
2492 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
2493 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE |
2494 WPA_DRIVER_CAPA_KEY_MGMT_FT |
2495 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2496 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
2497 WPA_DRIVER_CAPA_ENC_WEP104 |
2498 WPA_DRIVER_CAPA_ENC_TKIP |
2499 WPA_DRIVER_CAPA_ENC_CCMP;
2500 capa->auth = WPA_DRIVER_AUTH_OPEN |
2501 WPA_DRIVER_AUTH_SHARED |
2502 WPA_DRIVER_AUTH_LEAP;
2504 capa->flags |= WPA_DRIVER_FLAGS_P2P_MGMT;
2505 capa->flags |= WPA_DRIVER_FLAGS_AP;
2506 capa->flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
2507 capa->flags |= WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE;
2508 capa->flags |= WPA_DRIVER_FLAGS_P2P_CAPABLE;
2509 capa->max_scan_ssids = 2;
2510 capa->max_remain_on_chan = 60000;
2516 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
2520 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
2521 __func__, protect_type, key_type);
2524 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
2525 __func__, MAC2STR(addr));
2532 static void * wpa_driver_test_global_init(void)
2534 struct wpa_driver_test_global *global;
2536 global = os_zalloc(sizeof(*global));
2541 static void wpa_driver_test_global_deinit(void *priv)
2543 struct wpa_driver_test_global *global = priv;
2548 static struct wpa_interface_info *
2549 wpa_driver_test_get_interfaces(void *global_priv)
2551 /* struct wpa_driver_test_global *global = priv; */
2552 struct wpa_interface_info *iface;
2554 iface = os_zalloc(sizeof(*iface));
2557 iface->ifname = os_strdup("sta0");
2558 iface->desc = os_strdup("test interface 0");
2559 iface->drv_name = "test";
2560 iface->next = os_zalloc(sizeof(*iface));
2562 iface->next->ifname = os_strdup("sta1");
2563 iface->next->desc = os_strdup("test interface 1");
2564 iface->next->drv_name = "test";
2571 static struct hostapd_hw_modes *
2572 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
2574 struct hostapd_hw_modes *modes;
2579 modes = os_zalloc(*num_modes * sizeof(struct hostapd_hw_modes));
2582 modes[0].mode = HOSTAPD_MODE_IEEE80211G;
2583 modes[0].num_channels = 11;
2584 modes[0].num_rates = 12;
2586 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2587 modes[0].rates = os_zalloc(modes[0].num_rates * sizeof(int));
2588 if (modes[0].channels == NULL || modes[0].rates == NULL)
2590 for (i = 0; i < 11; i++) {
2591 modes[0].channels[i].chan = i + 1;
2592 modes[0].channels[i].freq = 2412 + 5 * i;
2593 modes[0].channels[i].flag = 0;
2595 modes[0].rates[0] = 10;
2596 modes[0].rates[1] = 20;
2597 modes[0].rates[2] = 55;
2598 modes[0].rates[3] = 110;
2599 modes[0].rates[4] = 60;
2600 modes[0].rates[5] = 90;
2601 modes[0].rates[6] = 120;
2602 modes[0].rates[7] = 180;
2603 modes[0].rates[8] = 240;
2604 modes[0].rates[9] = 360;
2605 modes[0].rates[10] = 480;
2606 modes[0].rates[11] = 540;
2608 modes[1].mode = HOSTAPD_MODE_IEEE80211B;
2609 modes[1].num_channels = 11;
2610 modes[1].num_rates = 4;
2612 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2613 modes[1].rates = os_zalloc(modes[1].num_rates * sizeof(int));
2614 if (modes[1].channels == NULL || modes[1].rates == NULL)
2616 for (i = 0; i < 11; i++) {
2617 modes[1].channels[i].chan = i + 1;
2618 modes[1].channels[i].freq = 2412 + 5 * i;
2619 modes[1].channels[i].flag = 0;
2621 modes[1].rates[0] = 10;
2622 modes[1].rates[1] = 20;
2623 modes[1].rates[2] = 55;
2624 modes[1].rates[3] = 110;
2626 modes[2].mode = HOSTAPD_MODE_IEEE80211A;
2627 modes[2].num_channels = 1;
2628 modes[2].num_rates = 8;
2629 modes[2].channels = os_zalloc(sizeof(struct hostapd_channel_data));
2630 modes[2].rates = os_zalloc(modes[2].num_rates * sizeof(int));
2631 if (modes[2].channels == NULL || modes[2].rates == NULL)
2633 modes[2].channels[0].chan = 60;
2634 modes[2].channels[0].freq = 5300;
2635 modes[2].channels[0].flag = 0;
2636 modes[2].rates[0] = 60;
2637 modes[2].rates[1] = 90;
2638 modes[2].rates[2] = 120;
2639 modes[2].rates[3] = 180;
2640 modes[2].rates[4] = 240;
2641 modes[2].rates[5] = 360;
2642 modes[2].rates[6] = 480;
2643 modes[2].rates[7] = 540;
2649 for (i = 0; i < *num_modes; i++) {
2650 os_free(modes[i].channels);
2651 os_free(modes[i].rates);
2659 static int wpa_driver_test_set_freq(void *priv,
2660 struct hostapd_freq_params *freq)
2662 struct test_driver_bss *dbss = priv;
2663 struct wpa_driver_test_data *drv = dbss->drv;
2664 wpa_printf(MSG_DEBUG, "test: set_freq %u MHz", freq->freq);
2665 drv->current_freq = freq->freq;
2670 static int wpa_driver_test_send_action(void *priv, unsigned int freq,
2672 const u8 *dst, const u8 *src,
2674 const u8 *data, size_t data_len,
2677 struct test_driver_bss *dbss = priv;
2678 struct wpa_driver_test_data *drv = dbss->drv;
2681 struct ieee80211_hdr *hdr;
2683 wpa_printf(MSG_DEBUG, "test: Send Action frame");
2685 if ((drv->remain_on_channel_freq &&
2686 freq != drv->remain_on_channel_freq) ||
2687 (drv->remain_on_channel_freq == 0 &&
2688 freq != (unsigned int) drv->current_freq)) {
2689 wpa_printf(MSG_DEBUG, "test: Reject Action frame TX on "
2690 "unexpected channel: freq=%u MHz (current_freq=%u "
2691 "MHz, remain-on-channel freq=%u MHz)",
2692 freq, drv->current_freq,
2693 drv->remain_on_channel_freq);
2697 buf = os_zalloc(24 + data_len);
2700 os_memcpy(buf + 24, data, data_len);
2701 hdr = (struct ieee80211_hdr *) buf;
2702 hdr->frame_control =
2703 IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
2704 os_memcpy(hdr->addr1, dst, ETH_ALEN);
2705 os_memcpy(hdr->addr2, src, ETH_ALEN);
2706 os_memcpy(hdr->addr3, bssid, ETH_ALEN);
2708 ret = wpa_driver_test_send_mlme(priv, buf, 24 + data_len, 0);
2715 static void test_send_action_cb(void *eloop_ctx, void *timeout_ctx)
2717 struct wpa_driver_test_data *drv = eloop_ctx;
2719 if (drv->pending_action_tx == NULL)
2722 if (drv->off_channel_freq != drv->pending_action_freq) {
2723 wpa_printf(MSG_DEBUG, "P2P: Pending Action frame TX "
2724 "waiting for another freq=%u",
2725 drv->pending_action_freq);
2728 wpa_printf(MSG_DEBUG, "P2P: Sending pending Action frame to "
2729 MACSTR, MAC2STR(drv->pending_action_dst));
2730 wpa_driver_test_send_action(drv, drv->pending_action_freq, 0,
2731 drv->pending_action_dst,
2732 drv->pending_action_src,
2733 drv->pending_action_bssid,
2734 wpabuf_head(drv->pending_action_tx),
2735 wpabuf_len(drv->pending_action_tx),
2736 drv->pending_action_no_cck);
2738 #endif /* CONFIG_P2P */
2741 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx)
2743 struct wpa_driver_test_data *drv = eloop_ctx;
2744 union wpa_event_data data;
2746 wpa_printf(MSG_DEBUG, "test: Remain-on-channel timeout");
2748 os_memset(&data, 0, sizeof(data));
2749 data.remain_on_channel.freq = drv->remain_on_channel_freq;
2750 data.remain_on_channel.duration = drv->remain_on_channel_duration;
2753 drv->off_channel_freq = 0;
2755 drv->remain_on_channel_freq = 0;
2757 wpa_supplicant_event(drv->ctx, EVENT_CANCEL_REMAIN_ON_CHANNEL, &data);
2761 static int wpa_driver_test_remain_on_channel(void *priv, unsigned int freq,
2762 unsigned int duration)
2764 struct test_driver_bss *dbss = priv;
2765 struct wpa_driver_test_data *drv = dbss->drv;
2766 union wpa_event_data data;
2768 wpa_printf(MSG_DEBUG, "%s(freq=%u, duration=%u)",
2769 __func__, freq, duration);
2770 if (drv->remain_on_channel_freq &&
2771 drv->remain_on_channel_freq != freq) {
2772 wpa_printf(MSG_DEBUG, "test: Refuse concurrent "
2773 "remain_on_channel request");
2777 drv->remain_on_channel_freq = freq;
2778 drv->remain_on_channel_duration = duration;
2779 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2780 eloop_register_timeout(duration / 1000, (duration % 1000) * 1000,
2781 test_remain_on_channel_timeout, drv, NULL);
2783 os_memset(&data, 0, sizeof(data));
2784 data.remain_on_channel.freq = freq;
2785 data.remain_on_channel.duration = duration;
2786 wpa_supplicant_event(drv->ctx, EVENT_REMAIN_ON_CHANNEL, &data);
2790 drv->off_channel_freq = drv->remain_on_channel_freq;
2791 test_send_action_cb(drv, NULL);
2792 if (drv->off_channel_freq == drv->pending_listen_freq) {
2793 p2p_listen_cb(drv->p2p, drv->pending_listen_freq,
2794 drv->pending_listen_duration);
2795 drv->pending_listen_freq = 0;
2798 #endif /* CONFIG_P2P */
2804 static int wpa_driver_test_cancel_remain_on_channel(void *priv)
2806 struct test_driver_bss *dbss = priv;
2807 struct wpa_driver_test_data *drv = dbss->drv;
2808 wpa_printf(MSG_DEBUG, "%s", __func__);
2809 if (!drv->remain_on_channel_freq)
2811 drv->remain_on_channel_freq = 0;
2812 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2817 static int wpa_driver_test_probe_req_report(void *priv, int report)
2819 struct test_driver_bss *dbss = priv;
2820 struct wpa_driver_test_data *drv = dbss->drv;
2821 wpa_printf(MSG_DEBUG, "%s(report=%d)", __func__, report);
2822 drv->probe_req_report = report;
2829 static int wpa_driver_test_p2p_find(void *priv, unsigned int timeout, int type)
2831 struct wpa_driver_test_data *drv = priv;
2832 wpa_printf(MSG_DEBUG, "%s(timeout=%u)", __func__, timeout);
2835 return p2p_find(drv->p2p, timeout, type, 0, NULL);
2839 static int wpa_driver_test_p2p_stop_find(void *priv)
2841 struct wpa_driver_test_data *drv = priv;
2842 wpa_printf(MSG_DEBUG, "%s", __func__);
2845 p2p_stop_find(drv->p2p);
2850 static int wpa_driver_test_p2p_listen(void *priv, unsigned int timeout)
2852 struct wpa_driver_test_data *drv = priv;
2853 wpa_printf(MSG_DEBUG, "%s(timeout=%u)", __func__, timeout);
2856 return p2p_listen(drv->p2p, timeout);
2860 static int wpa_driver_test_p2p_connect(void *priv, const u8 *peer_addr,
2861 int wps_method, int go_intent,
2862 const u8 *own_interface_addr,
2863 unsigned int force_freq,
2864 int persistent_group)
2866 struct wpa_driver_test_data *drv = priv;
2867 wpa_printf(MSG_DEBUG, "%s(peer_addr=" MACSTR " wps_method=%d "
2869 "own_interface_addr=" MACSTR " force_freq=%u "
2870 "persistent_group=%d)",
2871 __func__, MAC2STR(peer_addr), wps_method, go_intent,
2872 MAC2STR(own_interface_addr), force_freq, persistent_group);
2875 return p2p_connect(drv->p2p, peer_addr, wps_method, go_intent,
2876 own_interface_addr, force_freq, persistent_group);
2880 static int wpa_driver_test_wps_success_cb(void *priv, const u8 *peer_addr)
2882 struct wpa_driver_test_data *drv = priv;
2883 wpa_printf(MSG_DEBUG, "%s(peer_addr=" MACSTR ")",
2884 __func__, MAC2STR(peer_addr));
2887 p2p_wps_success_cb(drv->p2p, peer_addr);
2892 static int wpa_driver_test_p2p_group_formation_failed(void *priv)
2894 struct wpa_driver_test_data *drv = priv;
2895 wpa_printf(MSG_DEBUG, "%s", __func__);
2898 p2p_group_formation_failed(drv->p2p);
2903 static int wpa_driver_test_p2p_set_params(void *priv,
2904 const struct p2p_params *params)
2906 struct wpa_driver_test_data *drv = priv;
2907 wpa_printf(MSG_DEBUG, "%s", __func__);
2910 if (p2p_set_dev_name(drv->p2p, params->dev_name) < 0 ||
2911 p2p_set_pri_dev_type(drv->p2p, params->pri_dev_type) < 0 ||
2912 p2p_set_sec_dev_types(drv->p2p, params->sec_dev_type,
2913 params->num_sec_dev_types) < 0)
2919 static int test_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
2920 unsigned int num_req_dev_types,
2921 const u8 *req_dev_types)
2923 struct wpa_driver_test_data *drv = ctx;
2924 struct wpa_driver_scan_params params;
2926 struct wpabuf *wps_ie, *ies;
2927 int social_channels[] = { 2412, 2437, 2462, 0, 0 };
2930 wpa_printf(MSG_DEBUG, "%s(type=%d freq=%d)",
2931 __func__, type, freq);
2933 os_memset(¶ms, 0, sizeof(params));
2935 /* P2P Wildcard SSID */
2936 params.num_ssids = 1;
2937 params.ssids[0].ssid = (u8 *) P2P_WILDCARD_SSID;
2938 params.ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
2940 #if 0 /* TODO: WPS IE */
2941 wpa_s->wps->dev.p2p = 1;
2942 wps_ie = wps_build_probe_req_ie(0, &wpa_s->wps->dev, wpa_s->wps->uuid,
2945 wps_ie = wpabuf_alloc(1);
2950 ielen = p2p_scan_ie_buf_len(drv->p2p);
2951 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
2953 wpabuf_free(wps_ie);
2956 wpabuf_put_buf(ies, wps_ie);
2957 wpabuf_free(wps_ie);
2959 p2p_scan_ie(drv->p2p, ies);
2961 params.extra_ies = wpabuf_head(ies);
2962 params.extra_ies_len = wpabuf_len(ies);
2965 case P2P_SCAN_SOCIAL:
2966 params.freqs = social_channels;
2970 case P2P_SCAN_SPECIFIC:
2971 social_channels[0] = freq;
2972 social_channels[1] = 0;
2973 params.freqs = social_channels;
2975 case P2P_SCAN_SOCIAL_PLUS_ONE:
2976 social_channels[3] = freq;
2977 params.freqs = social_channels;
2981 drv->pending_p2p_scan = 1;
2982 ret = wpa_driver_test_scan(drv, ¶ms);
2990 static int test_send_action(void *ctx, unsigned int freq, const u8 *dst,
2991 const u8 *src, const u8 *bssid, const u8 *buf,
2992 size_t len, unsigned int wait_time)
2994 struct wpa_driver_test_data *drv = ctx;
2996 wpa_printf(MSG_DEBUG, "%s(freq=%u dst=" MACSTR " src=" MACSTR
2997 " bssid=" MACSTR " len=%d",
2998 __func__, freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid),
3001 wpa_printf(MSG_WARNING, "P2P: No frequency specified for "
3006 if (drv->pending_action_tx) {
3007 wpa_printf(MSG_DEBUG, "P2P: Dropped pending Action frame TX "
3008 "to " MACSTR, MAC2STR(drv->pending_action_dst));
3009 wpabuf_free(drv->pending_action_tx);
3011 drv->pending_action_tx = wpabuf_alloc(len);
3012 if (drv->pending_action_tx == NULL)
3014 wpabuf_put_data(drv->pending_action_tx, buf, len);
3015 os_memcpy(drv->pending_action_src, src, ETH_ALEN);
3016 os_memcpy(drv->pending_action_dst, dst, ETH_ALEN);
3017 os_memcpy(drv->pending_action_bssid, bssid, ETH_ALEN);
3018 drv->pending_action_freq = freq;
3019 drv->pending_action_no_cck = 1;
3021 if (drv->off_channel_freq == freq) {
3022 /* Already on requested channel; send immediately */
3023 /* TODO: Would there ever be need to extend the current
3024 * duration on the channel? */
3025 eloop_cancel_timeout(test_send_action_cb, drv, NULL);
3026 eloop_register_timeout(0, 0, test_send_action_cb, drv, NULL);
3030 wpa_printf(MSG_DEBUG, "P2P: Schedule Action frame to be transmitted "
3031 "once the driver gets to the requested channel");
3032 if (wpa_driver_test_remain_on_channel(drv, freq, wait_time) < 0) {
3033 wpa_printf(MSG_DEBUG, "P2P: Failed to request driver "
3034 "to remain on channel (%u MHz) for Action "
3043 static void test_send_action_done(void *ctx)
3045 wpa_printf(MSG_DEBUG, "%s", __func__);
3050 static void test_go_neg_completed(void *ctx, struct p2p_go_neg_results *res)
3052 struct wpa_driver_test_data *drv = ctx;
3053 union wpa_event_data event;
3054 wpa_printf(MSG_DEBUG, "%s", __func__);
3055 os_memset(&event, 0, sizeof(event));
3056 event.p2p_go_neg_completed.res = res;
3057 wpa_supplicant_event(drv->ctx, EVENT_P2P_GO_NEG_COMPLETED, &event);
3061 static void test_go_neg_req_rx(void *ctx, const u8 *src, u16 dev_passwd_id)
3063 struct wpa_driver_test_data *drv = ctx;
3064 union wpa_event_data event;
3065 wpa_printf(MSG_DEBUG, "%s(src=" MACSTR ")", __func__, MAC2STR(src));
3066 os_memset(&event, 0, sizeof(event));
3067 event.p2p_go_neg_req_rx.src = src;
3068 event.p2p_go_neg_req_rx.dev_passwd_id = dev_passwd_id;
3069 wpa_supplicant_event(drv->ctx, EVENT_P2P_GO_NEG_REQ_RX, &event);
3073 static void test_dev_found(void *ctx, const u8 *addr,
3074 const struct p2p_peer_info *info, int new_device)
3076 struct wpa_driver_test_data *drv = ctx;
3077 union wpa_event_data event;
3078 char devtype[WPS_DEV_TYPE_BUFSIZE];
3079 wpa_printf(MSG_DEBUG, "%s(" MACSTR " p2p_dev_addr=" MACSTR
3080 " pri_dev_type=%s name='%s' config_methods=0x%x "
3081 "dev_capab=0x%x group_capab=0x%x)",
3082 __func__, MAC2STR(addr), MAC2STR(info->p2p_device_addr),
3083 wps_dev_type_bin2str(info->pri_dev_type, devtype,
3085 info->device_name, info->config_methods, info->dev_capab,
3088 os_memset(&event, 0, sizeof(event));
3089 event.p2p_dev_found.addr = addr;
3090 event.p2p_dev_found.dev_addr = info->p2p_device_addr;
3091 event.p2p_dev_found.pri_dev_type = info->pri_dev_type;
3092 event.p2p_dev_found.dev_name = info->device_name;
3093 event.p2p_dev_found.config_methods = info->config_methods;
3094 event.p2p_dev_found.dev_capab = info->dev_capab;
3095 event.p2p_dev_found.group_capab = info->group_capab;
3096 wpa_supplicant_event(drv->ctx, EVENT_P2P_DEV_FOUND, &event);
3100 static int test_start_listen(void *ctx, unsigned int freq,
3101 unsigned int duration,
3102 const struct wpabuf *probe_resp_ie)
3104 struct wpa_driver_test_data *drv = ctx;
3106 wpa_printf(MSG_DEBUG, "%s(freq=%u duration=%u)",
3107 __func__, freq, duration);
3109 if (wpa_driver_test_probe_req_report(drv, 1) < 0)
3112 drv->pending_listen_freq = freq;
3113 drv->pending_listen_duration = duration;
3115 if (wpa_driver_test_remain_on_channel(drv, freq, duration) < 0) {
3116 drv->pending_listen_freq = 0;
3124 static void test_stop_listen(void *ctx)
3126 wpa_printf(MSG_DEBUG, "%s", __func__);
3131 static int test_send_probe_resp(void *ctx, const struct wpabuf *buf)
3133 struct wpa_driver_test_data *drv = ctx;
3134 char resp[512], *pos, *end;
3136 const struct ieee80211_mgmt *mgmt;
3137 const u8 *ie, *ie_end;
3139 wpa_printf(MSG_DEBUG, "%s", __func__);
3140 wpa_hexdump_buf(MSG_MSGDUMP, "Probe Response", buf);
3141 if (wpabuf_len(buf) < 24)
3143 if (!drv->probe_from) {
3144 wpa_printf(MSG_DEBUG, "%s: probe_from not set", __func__);
3149 end = resp + sizeof(resp);
3151 mgmt = wpabuf_head(buf);
3153 /* reply: SCANRESP BSSID SSID IEs */
3154 ret = os_snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
3155 MAC2STR(mgmt->bssid));
3156 if (ret < 0 || ret >= end - pos)
3160 ie = mgmt->u.probe_resp.variable;
3161 ie_end = wpabuf_head_u8(buf) + wpabuf_len(buf);
3162 if (ie_end - ie < 2 || ie[0] != WLAN_EID_SSID ||
3163 ie + 2 + ie[1] > ie_end)
3165 pos += wpa_snprintf_hex(pos, end - pos, ie + 2, ie[1]);
3167 ret = os_snprintf(pos, end - pos, " ");
3168 if (ret < 0 || ret >= end - pos)
3171 pos += wpa_snprintf_hex(pos, end - pos, ie, ie_end - ie);
3173 sendto(drv->test_socket, resp, pos - resp, 0,
3174 drv->probe_from, drv->probe_from_len);
3180 static void test_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
3181 u16 update_indic, const u8 *tlvs, size_t tlvs_len)
3183 wpa_printf(MSG_DEBUG, "%s", __func__);
3188 static void test_sd_response(void *ctx, const u8 *sa, u16 update_indic,
3189 const u8 *tlvs, size_t tlvs_len)
3191 wpa_printf(MSG_DEBUG, "%s", __func__);
3196 static void test_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
3197 const u8 *dev_addr, const u8 *pri_dev_type,
3198 const char *dev_name, u16 supp_config_methods,
3199 u8 dev_capab, u8 group_capab)
3201 wpa_printf(MSG_DEBUG, "%s(peer=" MACSTR " config_methods=0x%x)",
3202 __func__, MAC2STR(peer), config_methods);
3207 static void test_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods)
3209 wpa_printf(MSG_DEBUG, "%s(peer=" MACSTR " config_methods=0x%x)",
3210 __func__, MAC2STR(peer), config_methods);
3214 #endif /* CONFIG_P2P */
3217 static int wpa_driver_test_init_p2p(struct wpa_driver_test_data *drv)
3220 struct p2p_config p2p;
3224 os_memset(&p2p, 0, sizeof(p2p));
3225 p2p.msg_ctx = drv->ctx;
3227 p2p.p2p_scan = test_p2p_scan;
3228 p2p.send_action = test_send_action;
3229 p2p.send_action_done = test_send_action_done;
3230 p2p.go_neg_completed = test_go_neg_completed;
3231 p2p.go_neg_req_rx = test_go_neg_req_rx;
3232 p2p.dev_found = test_dev_found;
3233 p2p.start_listen = test_start_listen;
3234 p2p.stop_listen = test_stop_listen;
3235 p2p.send_probe_resp = test_send_probe_resp;
3236 p2p.sd_request = test_sd_request;
3237 p2p.sd_response = test_sd_response;
3238 p2p.prov_disc_req = test_prov_disc_req;
3239 p2p.prov_disc_resp = test_prov_disc_resp;
3241 os_memcpy(p2p.dev_addr, drv->own_addr, ETH_ALEN);
3243 p2p.reg_class = 12; /* TODO: change depending on location */
3245 * Pick one of the social channels randomly as the listen
3248 os_get_random((u8 *) &r, sizeof(r));
3249 p2p.channel = 1 + (r % 3) * 5;
3251 /* TODO: change depending on location */
3252 p2p.op_reg_class = 12;
3254 * For initial tests, pick the operation channel randomly.
3255 * TODO: Use scan results (etc.) to select the best channel.
3257 p2p.op_channel = 1 + r % 11;
3259 os_memcpy(p2p.country, "US ", 3);
3261 /* FIX: fetch available channels from the driver */
3262 p2p.channels.reg_classes = 1;
3263 p2p.channels.reg_class[0].reg_class = 12; /* US/12 = 2.4 GHz band */
3264 p2p.channels.reg_class[0].channels = 11;
3265 for (i = 0; i < 11; i++)
3266 p2p.channels.reg_class[0].channel[i] = i + 1;
3268 p2p.max_peers = 100;
3270 drv->p2p = p2p_init(&p2p);
3271 if (drv->p2p == NULL)
3274 #else /* CONFIG_P2P */
3275 wpa_printf(MSG_INFO, "driver_test: P2P support not included");
3277 #endif /* CONFIG_P2P */
3281 const struct wpa_driver_ops wpa_driver_test_ops = {
3283 "wpa_supplicant test driver",
3284 .hapd_init = test_driver_init,
3285 .hapd_deinit = wpa_driver_test_deinit,
3286 .hapd_send_eapol = test_driver_send_eapol,
3287 .send_mlme = wpa_driver_test_send_mlme,
3288 .set_generic_elem = test_driver_set_generic_elem,
3289 .sta_deauth = test_driver_sta_deauth,
3290 .sta_disassoc = test_driver_sta_disassoc,
3291 .get_hw_feature_data = wpa_driver_test_get_hw_feature_data,
3292 .if_add = test_driver_if_add,
3293 .if_remove = test_driver_if_remove,
3294 .hapd_set_ssid = test_driver_set_ssid,
3295 .set_privacy = test_driver_set_privacy,
3296 .set_sta_vlan = test_driver_set_sta_vlan,
3297 .sta_add = test_driver_sta_add,
3298 .send_ether = test_driver_send_ether,
3299 .set_ap_wps_ie = test_driver_set_ap_wps_ie,
3300 .get_bssid = wpa_driver_test_get_bssid,
3301 .get_ssid = wpa_driver_test_get_ssid,
3302 .set_key = wpa_driver_test_set_key,
3303 .deinit = wpa_driver_test_deinit,
3304 .set_param = wpa_driver_test_set_param,
3305 .deauthenticate = wpa_driver_test_deauthenticate,
3306 .disassociate = wpa_driver_test_disassociate,
3307 .associate = wpa_driver_test_associate,
3308 .get_capa = wpa_driver_test_get_capa,
3309 .get_mac_addr = wpa_driver_test_get_mac_addr,
3310 .send_eapol = wpa_driver_test_send_eapol,
3311 .mlme_setprotection = wpa_driver_test_mlme_setprotection,
3312 .get_scan_results2 = wpa_driver_test_get_scan_results2,
3313 .global_init = wpa_driver_test_global_init,
3314 .global_deinit = wpa_driver_test_global_deinit,
3315 .init2 = wpa_driver_test_init2,
3316 .get_interfaces = wpa_driver_test_get_interfaces,
3317 .scan2 = wpa_driver_test_scan,
3318 .set_freq = wpa_driver_test_set_freq,
3319 .send_action = wpa_driver_test_send_action,
3320 .remain_on_channel = wpa_driver_test_remain_on_channel,
3321 .cancel_remain_on_channel = wpa_driver_test_cancel_remain_on_channel,
3322 .probe_req_report = wpa_driver_test_probe_req_report,
3324 .p2p_find = wpa_driver_test_p2p_find,
3325 .p2p_stop_find = wpa_driver_test_p2p_stop_find,
3326 .p2p_listen = wpa_driver_test_p2p_listen,
3327 .p2p_connect = wpa_driver_test_p2p_connect,
3328 .wps_success_cb = wpa_driver_test_wps_success_cb,
3329 .p2p_group_formation_failed =
3330 wpa_driver_test_p2p_group_formation_failed,
3331 .p2p_set_params = wpa_driver_test_p2p_set_params,
3332 #endif /* CONFIG_P2P */