2 * Testing driver interface for a simulated network driver
3 * Copyright (c) 2004-2010, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
15 /* Make sure we get winsock2.h for Windows build to get sockaddr_storage */
16 #include "build_config.h"
17 #ifdef CONFIG_NATIVE_WINDOWS
19 #endif /* CONFIG_NATIVE_WINDOWS */
21 #include "utils/includes.h"
23 #ifndef CONFIG_NATIVE_WINDOWS
27 #define DRIVER_TEST_UNIX
28 #endif /* CONFIG_NATIVE_WINDOWS */
30 #include "utils/common.h"
31 #include "utils/eloop.h"
32 #include "utils/list.h"
33 #include "utils/trace.h"
34 #include "common/ieee802_11_defs.h"
35 #include "crypto/sha1.h"
36 #include "l2_packet/l2_packet.h"
42 struct test_client_socket {
43 struct test_client_socket *next;
45 struct sockaddr_un un;
47 struct test_driver_bss *bss;
50 struct test_driver_bss {
51 struct wpa_driver_test_data *drv;
54 char ifname[IFNAMSIZ];
59 size_t wps_beacon_ie_len;
60 u8 *wps_probe_resp_ie;
61 size_t wps_probe_resp_ie_len;
67 struct wpa_driver_test_global {
69 u8 req_addr[ETH_ALEN];
72 struct wpa_driver_test_data {
73 struct wpa_driver_test_global *global;
76 u8 own_addr[ETH_ALEN];
78 #ifdef DRIVER_TEST_UNIX
79 struct sockaddr_un hostapd_addr;
80 #endif /* DRIVER_TEST_UNIX */
82 struct sockaddr_in hostapd_addr_udp;
83 int hostapd_addr_udp_set;
84 char *own_socket_path;
86 #define MAX_SCAN_RESULTS 30
87 struct wpa_scan_res *scanres[MAX_SCAN_RESULTS];
91 size_t assoc_wpa_ie_len;
94 size_t probe_req_ie_len;
95 u8 probe_req_ssid[32];
96 size_t probe_req_ssid_len;
100 struct test_client_socket *cli;
106 int probe_req_report;
107 unsigned int remain_on_channel_freq;
108 unsigned int remain_on_channel_duration;
112 struct p2p_data *p2p;
113 unsigned int off_channel_freq;
114 struct wpabuf *pending_action_tx;
115 u8 pending_action_src[ETH_ALEN];
116 u8 pending_action_dst[ETH_ALEN];
117 u8 pending_action_bssid[ETH_ALEN];
118 unsigned int pending_action_freq;
119 unsigned int pending_listen_freq;
120 unsigned int pending_listen_duration;
121 int pending_p2p_scan;
122 struct sockaddr *probe_from;
123 socklen_t probe_from_len;
127 static void wpa_driver_test_deinit(void *priv);
128 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
129 const char *dir, int ap);
130 static void wpa_driver_test_close_test_socket(
131 struct wpa_driver_test_data *drv);
132 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx);
133 static int wpa_driver_test_init_p2p(struct wpa_driver_test_data *drv);
136 static void test_driver_free_bss(struct test_driver_bss *bss)
139 os_free(bss->wps_beacon_ie);
140 os_free(bss->wps_probe_resp_ie);
145 static void test_driver_free_bsses(struct wpa_driver_test_data *drv)
147 struct test_driver_bss *bss, *tmp;
149 dl_list_for_each_safe(bss, tmp, &drv->bss, struct test_driver_bss,
151 dl_list_del(&bss->list);
152 test_driver_free_bss(bss);
157 static struct test_client_socket *
158 test_driver_get_cli(struct wpa_driver_test_data *drv, struct sockaddr_un *from,
161 struct test_client_socket *cli = drv->cli;
164 if (cli->unlen == fromlen &&
165 strncmp(cli->un.sun_path, from->sun_path,
166 fromlen - sizeof(cli->un.sun_family)) == 0)
175 static int test_driver_send_eapol(void *priv, const u8 *addr, const u8 *data,
176 size_t data_len, int encrypt,
177 const u8 *own_addr, u32 flags)
179 struct test_driver_bss *dbss = priv;
180 struct wpa_driver_test_data *drv = dbss->drv;
181 struct test_client_socket *cli;
184 struct l2_ethhdr eth;
186 if (drv->test_socket < 0)
191 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
197 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
202 memcpy(eth.h_dest, addr, ETH_ALEN);
203 memcpy(eth.h_source, own_addr, ETH_ALEN);
204 eth.h_proto = host_to_be16(ETH_P_EAPOL);
206 io[0].iov_base = "EAPOL ";
208 io[1].iov_base = ð
209 io[1].iov_len = sizeof(eth);
210 io[2].iov_base = (u8 *) data;
211 io[2].iov_len = data_len;
213 memset(&msg, 0, sizeof(msg));
216 msg.msg_name = &cli->un;
217 msg.msg_namelen = cli->unlen;
218 return sendmsg(drv->test_socket, &msg, 0);
222 static int test_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
223 u16 proto, const u8 *data, size_t data_len)
225 struct test_driver_bss *dbss = priv;
226 struct wpa_driver_test_data *drv = dbss->drv;
229 struct l2_ethhdr eth;
231 struct sockaddr_un addr;
234 int ret = 0, broadcast = 0, count = 0;
236 if (drv->test_socket < 0 || drv->test_dir == NULL) {
237 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
239 __func__, drv->test_socket, drv->test_dir);
243 broadcast = memcmp(dst, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
244 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst));
246 memcpy(eth.h_dest, dst, ETH_ALEN);
247 memcpy(eth.h_source, src, ETH_ALEN);
248 eth.h_proto = host_to_be16(proto);
250 io[0].iov_base = "ETHER ";
252 io[1].iov_base = ð
253 io[1].iov_len = sizeof(eth);
254 io[2].iov_base = (u8 *) data;
255 io[2].iov_len = data_len;
257 memset(&msg, 0, sizeof(msg));
261 dir = opendir(drv->test_dir);
263 perror("test_driver: opendir");
266 while ((dent = readdir(dir))) {
267 #ifdef _DIRENT_HAVE_D_TYPE
268 /* Skip the file if it is not a socket. Also accept
269 * DT_UNKNOWN (0) in case the C library or underlying file
270 * system does not support d_type. */
271 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
273 #endif /* _DIRENT_HAVE_D_TYPE */
274 if (strcmp(dent->d_name, ".") == 0 ||
275 strcmp(dent->d_name, "..") == 0)
278 memset(&addr, 0, sizeof(addr));
279 addr.sun_family = AF_UNIX;
280 snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
281 drv->test_dir, dent->d_name);
283 if (strcmp(addr.sun_path, drv->own_socket_path) == 0)
285 if (!broadcast && strstr(dent->d_name, desttxt) == NULL)
288 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
289 __func__, dent->d_name);
291 msg.msg_name = &addr;
292 msg.msg_namelen = sizeof(addr);
293 ret = sendmsg(drv->test_socket, &msg, 0);
295 perror("driver_test: sendmsg");
300 if (!broadcast && count == 0) {
301 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
302 __func__, MAC2STR(dst));
310 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
313 struct test_driver_bss *dbss = priv;
314 struct wpa_driver_test_data *drv = dbss->drv;
318 struct sockaddr_un addr;
323 struct ieee80211_hdr *hdr;
330 union wpa_event_data event;
332 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
333 if (drv->test_socket < 0 || data_len < 10) {
334 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
336 __func__, drv->test_socket,
337 (unsigned long) data_len,
343 broadcast = os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
346 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest));
349 if (drv->remain_on_channel_freq)
350 freq = drv->remain_on_channel_freq;
352 freq = drv->current_freq;
353 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz",
355 os_snprintf(cmd, sizeof(cmd), "MLME freq=%d ", freq);
356 io[0].iov_base = cmd;
357 io[0].iov_len = os_strlen(cmd);
358 io[1].iov_base = (void *) data;
359 io[1].iov_len = data_len;
361 os_memset(&msg, 0, sizeof(msg));
366 if (drv->test_dir == NULL) {
367 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
371 dir = opendir(drv->test_dir);
373 perror("test_driver: opendir");
376 while ((dent = readdir(dir))) {
377 #ifdef _DIRENT_HAVE_D_TYPE
378 /* Skip the file if it is not a socket. Also accept
379 * DT_UNKNOWN (0) in case the C library or underlying file
380 * system does not support d_type. */
381 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
383 #endif /* _DIRENT_HAVE_D_TYPE */
384 if (os_strcmp(dent->d_name, ".") == 0 ||
385 os_strcmp(dent->d_name, "..") == 0)
388 os_memset(&addr, 0, sizeof(addr));
389 addr.sun_family = AF_UNIX;
390 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
391 drv->test_dir, dent->d_name);
393 if (os_strcmp(addr.sun_path, drv->own_socket_path) == 0)
395 if (!broadcast && os_strstr(dent->d_name, desttxt) == NULL)
398 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
399 __func__, dent->d_name);
401 msg.msg_name = &addr;
402 msg.msg_namelen = sizeof(addr);
403 ret = sendmsg(drv->test_socket, &msg, 0);
405 perror("driver_test: sendmsg(test_socket)");
410 if (os_memcmp(dest, dbss->bssid, ETH_ALEN) == 0 ||
411 drv->test_dir == NULL) {
412 if (drv->hostapd_addr_udp_set) {
413 msg.msg_name = &drv->hostapd_addr_udp;
414 msg.msg_namelen = sizeof(drv->hostapd_addr_udp);
416 #ifdef DRIVER_TEST_UNIX
417 msg.msg_name = &drv->hostapd_addr;
418 msg.msg_namelen = sizeof(drv->hostapd_addr);
419 #endif /* DRIVER_TEST_UNIX */
421 } else if (broadcast) {
422 dir = opendir(drv->test_dir);
425 while ((dent = readdir(dir))) {
426 #ifdef _DIRENT_HAVE_D_TYPE
427 /* Skip the file if it is not a socket.
428 * Also accept DT_UNKNOWN (0) in case
429 * the C library or underlying file
430 * system does not support d_type. */
431 if (dent->d_type != DT_SOCK &&
432 dent->d_type != DT_UNKNOWN)
434 #endif /* _DIRENT_HAVE_D_TYPE */
435 if (os_strcmp(dent->d_name, ".") == 0 ||
436 os_strcmp(dent->d_name, "..") == 0)
438 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
439 __func__, dent->d_name);
440 os_memset(&addr, 0, sizeof(addr));
441 addr.sun_family = AF_UNIX;
442 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
443 "%s/%s", drv->test_dir, dent->d_name);
445 msg.msg_name = &addr;
446 msg.msg_namelen = sizeof(addr);
448 ret = sendmsg(drv->test_socket, &msg, 0);
450 perror("driver_test: sendmsg(test_socket)");
456 os_memset(&addr, 0, sizeof(addr));
457 addr.sun_family = AF_UNIX;
458 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
459 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
460 if (stat(addr.sun_path, &st) < 0) {
461 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
463 drv->test_dir, MAC2STR(dest));
465 msg.msg_name = &addr;
466 msg.msg_namelen = sizeof(addr);
469 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
470 perror("sendmsg(test_socket)");
475 hdr = (struct ieee80211_hdr *) data;
476 fc = le_to_host16(hdr->frame_control);
478 os_memset(&event, 0, sizeof(event));
479 event.tx_status.type = WLAN_FC_GET_TYPE(fc);
480 event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
481 event.tx_status.dst = hdr->addr1;
482 event.tx_status.data = data;
483 event.tx_status.data_len = data_len;
484 event.tx_status.ack = ret >= 0;
485 wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
489 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
490 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
491 if (drv->pending_action_tx == NULL) {
492 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - "
493 "no pending operation");
497 if (os_memcmp(hdr->addr1, drv->pending_action_dst, ETH_ALEN) !=
499 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - "
500 "unknown destination address");
504 wpabuf_free(drv->pending_action_tx);
505 drv->pending_action_tx = NULL;
507 p2p_send_action_cb(drv->p2p, drv->pending_action_freq,
508 drv->pending_action_dst,
509 drv->pending_action_src,
510 drv->pending_action_bssid,
513 #endif /* CONFIG_P2P */
519 static void test_driver_scan(struct wpa_driver_test_data *drv,
520 struct sockaddr_un *from, socklen_t fromlen,
523 char buf[512], *pos, *end;
525 struct test_driver_bss *bss;
529 union wpa_event_data event;
531 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */
533 wpa_printf(MSG_DEBUG, "test_driver: SCAN");
537 hwaddr_aton(data + 1, sa)) {
538 wpa_printf(MSG_DEBUG, "test_driver: Unexpected SCAN "
546 ielen = os_strlen(data) / 2;
547 if (ielen > sizeof(ie))
549 if (hexstr2bin(data, ie, ielen) < 0)
552 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR,
554 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
556 os_memset(&event, 0, sizeof(event));
557 event.rx_probe_req.sa = sa;
558 event.rx_probe_req.ie = ie;
559 event.rx_probe_req.ie_len = ielen;
560 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ, &event);
563 p2p_probe_req_rx(drv->p2p, sa, NULL, NULL, ie, ielen);
564 #endif /* CONFIG_P2P */
567 dl_list_for_each(bss, &drv->bss, struct test_driver_bss, list) {
569 end = buf + sizeof(buf);
571 /* reply: SCANRESP BSSID SSID IEs */
572 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
573 MAC2STR(bss->bssid));
574 if (ret < 0 || ret >= end - pos)
577 pos += wpa_snprintf_hex(pos, end - pos,
578 bss->ssid, bss->ssid_len);
579 ret = snprintf(pos, end - pos, " ");
580 if (ret < 0 || ret >= end - pos)
583 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bss->ielen);
584 pos += wpa_snprintf_hex(pos, end - pos, bss->wps_probe_resp_ie,
585 bss->wps_probe_resp_ie_len);
588 ret = snprintf(pos, end - pos, " PRIVACY");
589 if (ret < 0 || ret >= end - pos)
594 sendto(drv->test_socket, buf, pos - buf, 0,
595 (struct sockaddr *) from, fromlen);
600 static void test_driver_assoc(struct wpa_driver_test_data *drv,
601 struct sockaddr_un *from, socklen_t fromlen,
604 struct test_client_socket *cli;
605 u8 ie[256], ssid[32];
606 size_t ielen, ssid_len = 0;
607 char *pos, *pos2, cmd[50];
608 struct test_driver_bss *bss, *tmp;
610 /* data: STA-addr SSID(hex) IEs(hex) */
612 cli = os_zalloc(sizeof(*cli));
616 if (hwaddr_aton(data, cli->addr)) {
617 printf("test_socket: Invalid MAC address '%s' in ASSOC\n",
625 pos2 = strchr(pos, ' ');
628 ssid_len = (pos2 - pos) / 2;
629 if (hexstr2bin(pos, ssid, ssid_len) < 0) {
630 wpa_printf(MSG_DEBUG, "%s: Invalid SSID", __func__);
634 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_assoc: SSID",
638 ielen = strlen(pos) / 2;
639 if (ielen > sizeof(ie))
641 if (hexstr2bin(pos, ie, ielen) < 0)
646 dl_list_for_each(tmp, &drv->bss, struct test_driver_bss, list) {
647 if (tmp->ssid_len == ssid_len &&
648 os_memcmp(tmp->ssid, ssid, ssid_len) == 0) {
654 wpa_printf(MSG_DEBUG, "%s: No matching SSID found from "
655 "configured BSSes", __func__);
661 memcpy(&cli->un, from, sizeof(cli->un));
662 cli->unlen = fromlen;
663 cli->next = drv->cli;
665 wpa_hexdump_ascii(MSG_DEBUG, "test_socket: ASSOC sun_path",
666 (const u8 *) cli->un.sun_path,
667 cli->unlen - sizeof(cli->un.sun_family));
669 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0",
670 MAC2STR(bss->bssid));
671 sendto(drv->test_socket, cmd, strlen(cmd), 0,
672 (struct sockaddr *) from, fromlen);
674 drv_event_assoc(bss->bss_ctx, cli->addr, ie, ielen, 0);
678 static void test_driver_disassoc(struct wpa_driver_test_data *drv,
679 struct sockaddr_un *from, socklen_t fromlen)
681 struct test_client_socket *cli;
683 cli = test_driver_get_cli(drv, from, fromlen);
687 drv_event_disassoc(drv->ctx, cli->addr);
691 static void test_driver_eapol(struct wpa_driver_test_data *drv,
692 struct sockaddr_un *from, socklen_t fromlen,
693 u8 *data, size_t datalen)
696 struct test_client_socket *cli;
698 const u8 *src = NULL;
701 /* Skip Ethernet header */
702 src = data + ETH_ALEN;
703 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src="
704 MACSTR " proto=%04x",
705 MAC2STR(data), MAC2STR(src),
706 WPA_GET_BE16(data + 2 * ETH_ALEN));
712 cli = test_driver_get_cli(drv, from, fromlen);
714 drv_event_eapol_rx(cli->bss->bss_ctx, cli->addr, data,
717 wpa_printf(MSG_DEBUG, "test_socket: EAPOL from unknown "
722 drv_event_eapol_rx(drv->ctx, src, data, datalen);
727 static void test_driver_ether(struct wpa_driver_test_data *drv,
728 struct sockaddr_un *from, socklen_t fromlen,
729 u8 *data, size_t datalen)
731 struct l2_ethhdr *eth;
733 if (datalen < sizeof(*eth))
736 eth = (struct l2_ethhdr *) data;
737 wpa_printf(MSG_DEBUG, "test_driver: RX ETHER dst=" MACSTR " src="
738 MACSTR " proto=%04x",
739 MAC2STR(eth->h_dest), MAC2STR(eth->h_source),
740 be_to_host16(eth->h_proto));
742 #ifdef CONFIG_IEEE80211R
743 if (be_to_host16(eth->h_proto) == ETH_P_RRB) {
744 union wpa_event_data ev;
745 os_memset(&ev, 0, sizeof(ev));
746 ev.ft_rrb_rx.src = eth->h_source;
747 ev.ft_rrb_rx.data = data + sizeof(*eth);
748 ev.ft_rrb_rx.data_len = datalen - sizeof(*eth);
750 #endif /* CONFIG_IEEE80211R */
754 static void test_driver_mlme(struct wpa_driver_test_data *drv,
755 struct sockaddr_un *from, socklen_t fromlen,
756 u8 *data, size_t datalen)
758 struct ieee80211_hdr *hdr;
760 union wpa_event_data event;
761 int freq = 0, own_freq;
762 struct test_driver_bss *bss;
764 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
766 if (datalen > 6 && os_memcmp(data, "freq=", 5) == 0) {
768 for (pos = 5; pos < datalen; pos++) {
769 if (data[pos] == ' ')
773 freq = atoi((const char *) &data[5]);
774 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME RX on "
775 "freq %d MHz", bss->ifname, freq);
782 if (drv->remain_on_channel_freq)
783 own_freq = drv->remain_on_channel_freq;
785 own_freq = drv->current_freq;
787 if (freq && own_freq && freq != own_freq) {
788 wpa_printf(MSG_DEBUG, "test_driver(%s): Ignore MLME RX on "
789 "another frequency %d MHz (own %d MHz)",
790 bss->ifname, freq, own_freq);
794 hdr = (struct ieee80211_hdr *) data;
796 if (test_driver_get_cli(drv, from, fromlen) == NULL && datalen >= 16) {
797 struct test_client_socket *cli;
798 cli = os_zalloc(sizeof(*cli));
801 wpa_printf(MSG_DEBUG, "Adding client entry for " MACSTR,
802 MAC2STR(hdr->addr2));
803 memcpy(cli->addr, hdr->addr2, ETH_ALEN);
804 memcpy(&cli->un, from, sizeof(cli->un));
805 cli->unlen = fromlen;
806 cli->next = drv->cli;
810 wpa_hexdump(MSG_MSGDUMP, "test_driver_mlme: received frame",
812 fc = le_to_host16(hdr->frame_control);
813 if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) {
814 wpa_printf(MSG_ERROR, "%s: received non-mgmt frame",
819 os_memset(&event, 0, sizeof(event));
820 event.rx_mgmt.frame = data;
821 event.rx_mgmt.frame_len = datalen;
822 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
826 static void test_driver_receive_unix(int sock, void *eloop_ctx, void *sock_ctx)
828 struct wpa_driver_test_data *drv = eloop_ctx;
831 struct sockaddr_un from;
832 socklen_t fromlen = sizeof(from);
834 res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
835 (struct sockaddr *) &from, &fromlen);
837 perror("recvfrom(test_socket)");
842 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
844 if (strncmp(buf, "SCAN", 4) == 0) {
845 test_driver_scan(drv, &from, fromlen, buf + 4);
846 } else if (strncmp(buf, "ASSOC ", 6) == 0) {
847 test_driver_assoc(drv, &from, fromlen, buf + 6);
848 } else if (strcmp(buf, "DISASSOC") == 0) {
849 test_driver_disassoc(drv, &from, fromlen);
850 } else if (strncmp(buf, "EAPOL ", 6) == 0) {
851 test_driver_eapol(drv, &from, fromlen, (u8 *) buf + 6,
853 } else if (strncmp(buf, "ETHER ", 6) == 0) {
854 test_driver_ether(drv, &from, fromlen, (u8 *) buf + 6,
856 } else if (strncmp(buf, "MLME ", 5) == 0) {
857 test_driver_mlme(drv, &from, fromlen, (u8 *) buf + 5, res - 5);
859 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
865 static int test_driver_set_generic_elem(void *priv,
866 const u8 *elem, size_t elem_len)
868 struct test_driver_bss *bss = priv;
878 bss->ie = os_malloc(elem_len);
879 if (bss->ie == NULL) {
884 memcpy(bss->ie, elem, elem_len);
885 bss->ielen = elem_len;
890 static int test_driver_set_ap_wps_ie(void *priv, const struct wpabuf *beacon,
891 const struct wpabuf *proberesp,
892 const struct wpabuf *assocresp)
894 struct test_driver_bss *bss = priv;
897 wpa_printf(MSG_DEBUG, "test_driver: Clear Beacon WPS IE");
899 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Beacon WPS IE",
902 os_free(bss->wps_beacon_ie);
904 if (beacon == NULL) {
905 bss->wps_beacon_ie = NULL;
906 bss->wps_beacon_ie_len = 0;
908 bss->wps_beacon_ie = os_malloc(wpabuf_len(beacon));
909 if (bss->wps_beacon_ie == NULL) {
910 bss->wps_beacon_ie_len = 0;
914 os_memcpy(bss->wps_beacon_ie, wpabuf_head(beacon),
916 bss->wps_beacon_ie_len = wpabuf_len(beacon);
919 if (proberesp == NULL)
920 wpa_printf(MSG_DEBUG, "test_driver: Clear Probe Response WPS "
923 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Probe Response WPS "
926 os_free(bss->wps_probe_resp_ie);
928 if (proberesp == NULL) {
929 bss->wps_probe_resp_ie = NULL;
930 bss->wps_probe_resp_ie_len = 0;
932 bss->wps_probe_resp_ie = os_malloc(wpabuf_len(proberesp));
933 if (bss->wps_probe_resp_ie == NULL) {
934 bss->wps_probe_resp_ie_len = 0;
938 os_memcpy(bss->wps_probe_resp_ie, wpabuf_head(proberesp),
939 wpabuf_len(proberesp));
940 bss->wps_probe_resp_ie_len = wpabuf_len(proberesp);
947 static int test_driver_sta_deauth(void *priv, const u8 *own_addr,
948 const u8 *addr, int reason)
950 struct test_driver_bss *dbss = priv;
951 struct wpa_driver_test_data *drv = dbss->drv;
952 struct test_client_socket *cli;
954 if (drv->test_socket < 0)
959 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
967 return sendto(drv->test_socket, "DEAUTH", 6, 0,
968 (struct sockaddr *) &cli->un, cli->unlen);
972 static int test_driver_sta_disassoc(void *priv, const u8 *own_addr,
973 const u8 *addr, int reason)
975 struct test_driver_bss *dbss = priv;
976 struct wpa_driver_test_data *drv = dbss->drv;
977 struct test_client_socket *cli;
979 if (drv->test_socket < 0)
984 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
992 return sendto(drv->test_socket, "DISASSOC", 8, 0,
993 (struct sockaddr *) &cli->un, cli->unlen);
997 static int test_driver_bss_add(void *priv, const char *ifname, const u8 *bssid,
998 void *bss_ctx, void **drv_priv)
1000 struct test_driver_bss *dbss = priv;
1001 struct wpa_driver_test_data *drv = dbss->drv;
1002 struct test_driver_bss *bss;
1004 wpa_printf(MSG_DEBUG, "%s(ifname=%s bssid=" MACSTR ")",
1005 __func__, ifname, MAC2STR(bssid));
1007 bss = os_zalloc(sizeof(*bss));
1011 bss->bss_ctx = bss_ctx;
1013 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
1014 os_memcpy(bss->bssid, bssid, ETH_ALEN);
1016 dl_list_add(&drv->bss, &bss->list);
1018 drv->global->bss_add_used = 1;
1019 os_memcpy(drv->global->req_addr, bssid, ETH_ALEN);
1029 static int test_driver_bss_remove(void *priv, const char *ifname)
1031 struct test_driver_bss *dbss = priv;
1032 struct wpa_driver_test_data *drv = dbss->drv;
1033 struct test_driver_bss *bss;
1034 struct test_client_socket *cli, *prev_c;
1036 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
1038 dl_list_for_each(bss, &drv->bss, struct test_driver_bss, list) {
1039 if (strcmp(bss->ifname, ifname) != 0)
1042 for (prev_c = NULL, cli = drv->cli; cli;
1043 prev_c = cli, cli = cli->next) {
1044 if (cli->bss != bss)
1047 prev_c->next = cli->next;
1049 drv->cli = cli->next;
1054 dl_list_del(&bss->list);
1055 test_driver_free_bss(bss);
1063 static int test_driver_if_add(void *priv, enum wpa_driver_if_type type,
1064 const char *ifname, const u8 *addr,
1065 void *bss_ctx, void **drv_priv,
1066 char *force_ifname, u8 *if_addr,
1069 struct test_driver_bss *dbss = priv;
1070 struct wpa_driver_test_data *drv = dbss->drv;
1072 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s bss_ctx=%p)",
1073 __func__, type, ifname, bss_ctx);
1075 os_memcpy(if_addr, addr, ETH_ALEN);
1077 drv->alloc_iface_idx++;
1078 if_addr[0] = 0x02; /* locally administered */
1079 sha1_prf(drv->own_addr, ETH_ALEN,
1080 "hostapd test addr generation",
1081 (const u8 *) &drv->alloc_iface_idx,
1082 sizeof(drv->alloc_iface_idx),
1083 if_addr + 1, ETH_ALEN - 1);
1085 if (type == WPA_IF_AP_BSS || type == WPA_IF_P2P_GO ||
1086 type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP)
1087 return test_driver_bss_add(priv, ifname, if_addr, bss_ctx,
1093 static int test_driver_if_remove(void *priv, enum wpa_driver_if_type type,
1096 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s)", __func__, type, ifname);
1097 if (type == WPA_IF_AP_BSS || type == WPA_IF_P2P_GO ||
1098 type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP)
1099 return test_driver_bss_remove(priv, ifname);
1104 static int test_driver_valid_bss_mask(void *priv, const u8 *addr,
1111 static int test_driver_set_ssid(void *priv, const u8 *buf, int len)
1113 struct test_driver_bss *bss = priv;
1115 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, bss->ifname);
1118 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_set_ssid: SSID", buf, len);
1120 if ((size_t) len > sizeof(bss->ssid))
1123 os_memcpy(bss->ssid, buf, len);
1124 bss->ssid_len = len;
1130 static int test_driver_set_privacy(void *priv, int enabled)
1132 struct test_driver_bss *dbss = priv;
1134 wpa_printf(MSG_DEBUG, "%s(enabled=%d)", __func__, enabled);
1135 dbss->privacy = enabled;
1141 static int test_driver_set_sta_vlan(void *priv, const u8 *addr,
1142 const char *ifname, int vlan_id)
1144 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " ifname=%s vlan_id=%d)",
1145 __func__, MAC2STR(addr), ifname, vlan_id);
1150 static int test_driver_sta_add(void *priv,
1151 struct hostapd_sta_add_params *params)
1153 struct test_driver_bss *bss = priv;
1154 struct wpa_driver_test_data *drv = bss->drv;
1155 struct test_client_socket *cli;
1157 wpa_printf(MSG_DEBUG, "%s(ifname=%s addr=" MACSTR " aid=%d "
1158 "capability=0x%x listen_interval=%d)",
1159 __func__, bss->ifname, MAC2STR(params->addr), params->aid,
1160 params->capability, params->listen_interval);
1161 wpa_hexdump(MSG_DEBUG, "test_driver_sta_add - supp_rates",
1162 params->supp_rates, params->supp_rates_len);
1166 if (os_memcmp(cli->addr, params->addr, ETH_ALEN) == 0)
1171 wpa_printf(MSG_DEBUG, "%s: no matching client entry",
1182 static struct wpa_driver_test_data * test_alloc_data(void *ctx,
1185 struct wpa_driver_test_data *drv;
1186 struct test_driver_bss *bss;
1188 drv = os_zalloc(sizeof(struct wpa_driver_test_data));
1190 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1195 bss = os_zalloc(sizeof(struct test_driver_bss));
1202 wpa_trace_add_ref(drv, ctx, ctx);
1203 dl_list_init(&drv->bss);
1204 dl_list_add(&drv->bss, &bss->list);
1205 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
1209 /* Generate a MAC address to help testing with multiple STAs */
1210 drv->own_addr[0] = 0x02; /* locally administered */
1211 sha1_prf((const u8 *) ifname, os_strlen(ifname),
1212 "test mac addr generation",
1213 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
1219 static void * test_driver_init(struct hostapd_data *hapd,
1220 struct wpa_init_params *params)
1222 struct wpa_driver_test_data *drv;
1223 struct sockaddr_un addr_un;
1224 struct sockaddr_in addr_in;
1225 struct sockaddr *addr;
1227 struct test_driver_bss *bss;
1229 drv = test_alloc_data(hapd, params->ifname);
1233 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1234 drv->global = params->global_priv;
1236 bss->bss_ctx = hapd;
1237 os_memcpy(bss->bssid, drv->own_addr, ETH_ALEN);
1238 os_memcpy(params->own_addr, drv->own_addr, ETH_ALEN);
1240 if (params->test_socket) {
1241 if (os_strlen(params->test_socket) >=
1242 sizeof(addr_un.sun_path)) {
1243 printf("Too long test_socket path\n");
1244 wpa_driver_test_deinit(bss);
1247 if (strncmp(params->test_socket, "DIR:", 4) == 0) {
1248 size_t len = strlen(params->test_socket) + 30;
1249 drv->test_dir = os_strdup(params->test_socket + 4);
1250 drv->own_socket_path = os_malloc(len);
1251 if (drv->own_socket_path) {
1252 snprintf(drv->own_socket_path, len,
1254 params->test_socket + 4,
1255 MAC2STR(params->own_addr));
1257 } else if (strncmp(params->test_socket, "UDP:", 4) == 0) {
1258 drv->udp_port = atoi(params->test_socket + 4);
1260 drv->own_socket_path = os_strdup(params->test_socket);
1262 if (drv->own_socket_path == NULL && drv->udp_port == 0) {
1263 wpa_driver_test_deinit(bss);
1267 drv->test_socket = socket(drv->udp_port ? PF_INET : PF_UNIX,
1269 if (drv->test_socket < 0) {
1271 wpa_driver_test_deinit(bss);
1275 if (drv->udp_port) {
1276 os_memset(&addr_in, 0, sizeof(addr_in));
1277 addr_in.sin_family = AF_INET;
1278 addr_in.sin_port = htons(drv->udp_port);
1279 addr = (struct sockaddr *) &addr_in;
1280 alen = sizeof(addr_in);
1282 os_memset(&addr_un, 0, sizeof(addr_un));
1283 addr_un.sun_family = AF_UNIX;
1284 os_strlcpy(addr_un.sun_path, drv->own_socket_path,
1285 sizeof(addr_un.sun_path));
1286 addr = (struct sockaddr *) &addr_un;
1287 alen = sizeof(addr_un);
1289 if (bind(drv->test_socket, addr, alen) < 0) {
1290 perror("bind(PF_UNIX)");
1291 close(drv->test_socket);
1292 if (drv->own_socket_path)
1293 unlink(drv->own_socket_path);
1294 wpa_driver_test_deinit(bss);
1297 eloop_register_read_sock(drv->test_socket,
1298 test_driver_receive_unix, drv, NULL);
1300 drv->test_socket = -1;
1306 static void wpa_driver_test_poll(void *eloop_ctx, void *timeout_ctx)
1308 struct wpa_driver_test_data *drv = eloop_ctx;
1310 #ifdef DRIVER_TEST_UNIX
1311 if (drv->associated && drv->hostapd_addr_set) {
1313 if (stat(drv->hostapd_addr.sun_path, &st) < 0) {
1314 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
1315 __func__, strerror(errno));
1316 drv->associated = 0;
1317 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1320 #endif /* DRIVER_TEST_UNIX */
1322 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1326 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1328 struct wpa_driver_test_data *drv = eloop_ctx;
1329 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1330 if (drv->pending_p2p_scan && drv->p2p) {
1333 for (i = 0; i < drv->num_scanres; i++) {
1334 struct wpa_scan_res *bss = drv->scanres[i];
1335 if (p2p_scan_res_handler(drv->p2p, bss->bssid,
1336 bss->freq, bss->level,
1337 (const u8 *) (bss + 1),
1341 p2p_scan_res_handled(drv->p2p);
1342 #endif /* CONFIG_P2P */
1345 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1349 #ifdef DRIVER_TEST_UNIX
1350 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
1353 struct dirent *dent;
1355 struct sockaddr_un addr;
1356 char cmd[512], *pos, *end;
1359 dir = opendir(path);
1363 end = cmd + sizeof(cmd);
1365 ret = os_snprintf(pos, end - pos, "SCAN " MACSTR,
1366 MAC2STR(drv->own_addr));
1367 if (ret >= 0 && ret < end - pos)
1369 if (drv->probe_req_ie) {
1370 ret = os_snprintf(pos, end - pos, " ");
1371 if (ret >= 0 && ret < end - pos)
1373 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ie,
1374 drv->probe_req_ie_len);
1376 if (drv->probe_req_ssid_len) {
1378 ret = os_snprintf(pos, end - pos, "%02x%02x",
1380 (unsigned int) drv->probe_req_ssid_len);
1381 if (ret >= 0 && ret < end - pos)
1383 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ssid,
1384 drv->probe_req_ssid_len);
1388 while ((dent = readdir(dir))) {
1389 if (os_strncmp(dent->d_name, "AP-", 3) != 0 &&
1390 os_strncmp(dent->d_name, "STA-", 4) != 0)
1392 if (drv->own_socket_path) {
1394 olen = os_strlen(drv->own_socket_path);
1395 dlen = os_strlen(dent->d_name);
1397 os_strcmp(dent->d_name,
1398 drv->own_socket_path + olen - dlen) == 0)
1401 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
1403 os_memset(&addr, 0, sizeof(addr));
1404 addr.sun_family = AF_UNIX;
1405 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
1406 path, dent->d_name);
1408 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1409 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1410 perror("sendto(test_socket)");
1415 #endif /* DRIVER_TEST_UNIX */
1418 static int wpa_driver_test_scan(void *priv,
1419 struct wpa_driver_scan_params *params)
1421 struct test_driver_bss *dbss = priv;
1422 struct wpa_driver_test_data *drv = dbss->drv;
1425 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
1427 os_free(drv->probe_req_ie);
1428 if (params->extra_ies) {
1429 drv->probe_req_ie = os_malloc(params->extra_ies_len);
1430 if (drv->probe_req_ie == NULL) {
1431 drv->probe_req_ie_len = 0;
1434 os_memcpy(drv->probe_req_ie, params->extra_ies,
1435 params->extra_ies_len);
1436 drv->probe_req_ie_len = params->extra_ies_len;
1438 drv->probe_req_ie = NULL;
1439 drv->probe_req_ie_len = 0;
1442 for (i = 0; i < params->num_ssids; i++)
1443 wpa_hexdump(MSG_DEBUG, "Scan SSID",
1444 params->ssids[i].ssid, params->ssids[i].ssid_len);
1445 drv->probe_req_ssid_len = 0;
1446 if (params->num_ssids) {
1447 os_memcpy(drv->probe_req_ssid, params->ssids[0].ssid,
1448 params->ssids[0].ssid_len);
1449 drv->probe_req_ssid_len = params->ssids[0].ssid_len;
1451 wpa_hexdump(MSG_DEBUG, "Scan extra IE(s)",
1452 params->extra_ies, params->extra_ies_len);
1454 drv->num_scanres = 0;
1456 #ifdef DRIVER_TEST_UNIX
1457 if (drv->test_socket >= 0 && drv->test_dir)
1458 wpa_driver_scan_dir(drv, drv->test_dir);
1460 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
1461 sendto(drv->test_socket, "SCAN", 4, 0,
1462 (struct sockaddr *) &drv->hostapd_addr,
1463 sizeof(drv->hostapd_addr)) < 0) {
1464 perror("sendto(test_socket)");
1466 #endif /* DRIVER_TEST_UNIX */
1468 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1469 sendto(drv->test_socket, "SCAN", 4, 0,
1470 (struct sockaddr *) &drv->hostapd_addr_udp,
1471 sizeof(drv->hostapd_addr_udp)) < 0) {
1472 perror("sendto(test_socket)");
1475 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1476 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
1482 static struct wpa_scan_results * wpa_driver_test_get_scan_results2(void *priv)
1484 struct test_driver_bss *dbss = priv;
1485 struct wpa_driver_test_data *drv = dbss->drv;
1486 struct wpa_scan_results *res;
1489 res = os_zalloc(sizeof(*res));
1493 res->res = os_zalloc(drv->num_scanres * sizeof(struct wpa_scan_res *));
1494 if (res->res == NULL) {
1499 for (i = 0; i < drv->num_scanres; i++) {
1500 struct wpa_scan_res *r;
1501 if (drv->scanres[i] == NULL)
1503 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len);
1506 os_memcpy(r, drv->scanres[i],
1507 sizeof(*r) + drv->scanres[i]->ie_len);
1508 res->res[res->num++] = r;
1515 static int wpa_driver_test_set_key(const char *ifname, void *priv,
1516 enum wpa_alg alg, const u8 *addr,
1517 int key_idx, int set_tx,
1518 const u8 *seq, size_t seq_len,
1519 const u8 *key, size_t key_len)
1521 wpa_printf(MSG_DEBUG, "%s: ifname=%s priv=%p alg=%d key_idx=%d "
1523 __func__, ifname, priv, alg, key_idx, set_tx);
1525 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
1527 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
1529 wpa_hexdump_key(MSG_DEBUG, " key", key, key_len);
1534 static int wpa_driver_update_mode(struct wpa_driver_test_data *drv, int ap)
1536 if (ap && !drv->ap) {
1537 wpa_driver_test_close_test_socket(drv);
1538 wpa_driver_test_attach(drv, drv->test_dir, 1);
1540 } else if (!ap && drv->ap) {
1541 wpa_driver_test_close_test_socket(drv);
1542 wpa_driver_test_attach(drv, drv->test_dir, 0);
1550 static int wpa_driver_test_associate(
1551 void *priv, struct wpa_driver_associate_params *params)
1553 struct test_driver_bss *dbss = priv;
1554 struct wpa_driver_test_data *drv = dbss->drv;
1555 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
1556 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
1557 __func__, priv, params->freq, params->pairwise_suite,
1558 params->group_suite, params->key_mgmt_suite,
1559 params->auth_alg, params->mode);
1560 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1561 if (params->bssid) {
1562 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
1563 MAC2STR(params->bssid));
1566 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
1567 params->ssid, params->ssid_len);
1569 if (params->wpa_ie) {
1570 wpa_hexdump(MSG_DEBUG, " wpa_ie",
1571 params->wpa_ie, params->wpa_ie_len);
1572 drv->assoc_wpa_ie_len = params->wpa_ie_len;
1573 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
1574 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
1575 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
1576 drv->assoc_wpa_ie_len);
1578 drv->assoc_wpa_ie_len = 0;
1580 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1582 drv->ibss = params->mode == IEEE80211_MODE_IBSS;
1583 dbss->privacy = params->key_mgmt_suite &
1584 (WPA_KEY_MGMT_IEEE8021X |
1586 WPA_KEY_MGMT_WPA_NONE |
1587 WPA_KEY_MGMT_FT_IEEE8021X |
1588 WPA_KEY_MGMT_FT_PSK |
1589 WPA_KEY_MGMT_IEEE8021X_SHA256 |
1590 WPA_KEY_MGMT_PSK_SHA256);
1591 if (params->wep_key_len[params->wep_tx_keyidx])
1594 #ifdef DRIVER_TEST_UNIX
1595 if (drv->test_dir && params->bssid &&
1596 params->mode != IEEE80211_MODE_IBSS) {
1597 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
1598 drv->hostapd_addr.sun_family = AF_UNIX;
1599 os_snprintf(drv->hostapd_addr.sun_path,
1600 sizeof(drv->hostapd_addr.sun_path),
1602 drv->test_dir, MAC2STR(params->bssid));
1603 drv->hostapd_addr_set = 1;
1605 #endif /* DRIVER_TEST_UNIX */
1607 if (params->mode == IEEE80211_MODE_AP) {
1608 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1609 dbss->ssid_len = params->ssid_len;
1610 os_memcpy(dbss->bssid, drv->own_addr, ETH_ALEN);
1611 if (params->wpa_ie && params->wpa_ie_len) {
1612 dbss->ie = os_malloc(params->wpa_ie_len);
1614 os_memcpy(dbss->ie, params->wpa_ie,
1615 params->wpa_ie_len);
1616 dbss->ielen = params->wpa_ie_len;
1619 } else if (drv->test_socket >= 0 &&
1620 (drv->hostapd_addr_set || drv->hostapd_addr_udp_set)) {
1621 char cmd[200], *pos, *end;
1623 end = cmd + sizeof(cmd);
1625 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
1626 MAC2STR(drv->own_addr));
1627 if (ret >= 0 && ret < end - pos)
1629 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
1631 ret = os_snprintf(pos, end - pos, " ");
1632 if (ret >= 0 && ret < end - pos)
1634 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
1635 params->wpa_ie_len);
1637 #ifdef DRIVER_TEST_UNIX
1638 if (drv->hostapd_addr_set &&
1639 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1640 (struct sockaddr *) &drv->hostapd_addr,
1641 sizeof(drv->hostapd_addr)) < 0) {
1642 perror("sendto(test_socket)");
1645 #endif /* DRIVER_TEST_UNIX */
1646 if (drv->hostapd_addr_udp_set &&
1647 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1648 (struct sockaddr *) &drv->hostapd_addr_udp,
1649 sizeof(drv->hostapd_addr_udp)) < 0) {
1650 perror("sendto(test_socket)");
1654 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1655 dbss->ssid_len = params->ssid_len;
1657 drv->associated = 1;
1658 if (params->mode == IEEE80211_MODE_IBSS) {
1659 os_memcpy(dbss->ssid, params->ssid, params->ssid_len);
1660 dbss->ssid_len = params->ssid_len;
1662 os_memcpy(dbss->bssid, params->bssid,
1665 os_get_random(dbss->bssid, ETH_ALEN);
1666 dbss->bssid[0] &= ~0x01;
1667 dbss->bssid[0] |= 0x02;
1670 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1677 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
1679 struct test_driver_bss *dbss = priv;
1680 os_memcpy(bssid, dbss->bssid, ETH_ALEN);
1685 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
1687 struct test_driver_bss *dbss = priv;
1688 os_memcpy(ssid, dbss->ssid, 32);
1689 return dbss->ssid_len;
1693 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
1695 #ifdef DRIVER_TEST_UNIX
1696 if (drv->test_socket >= 0 &&
1697 sendto(drv->test_socket, "DISASSOC", 8, 0,
1698 (struct sockaddr *) &drv->hostapd_addr,
1699 sizeof(drv->hostapd_addr)) < 0) {
1700 perror("sendto(test_socket)");
1703 #endif /* DRIVER_TEST_UNIX */
1704 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1705 sendto(drv->test_socket, "DISASSOC", 8, 0,
1706 (struct sockaddr *) &drv->hostapd_addr_udp,
1707 sizeof(drv->hostapd_addr_udp)) < 0) {
1708 perror("sendto(test_socket)");
1715 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
1718 struct test_driver_bss *dbss = priv;
1719 struct wpa_driver_test_data *drv = dbss->drv;
1720 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1721 __func__, MAC2STR(addr), reason_code);
1722 os_memset(dbss->bssid, 0, ETH_ALEN);
1723 drv->associated = 0;
1724 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1725 return wpa_driver_test_send_disassoc(drv);
1729 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
1732 struct test_driver_bss *dbss = priv;
1733 struct wpa_driver_test_data *drv = dbss->drv;
1734 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1735 __func__, MAC2STR(addr), reason_code);
1736 os_memset(dbss->bssid, 0, ETH_ALEN);
1737 drv->associated = 0;
1738 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1739 return wpa_driver_test_send_disassoc(drv);
1743 static const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie)
1745 const u8 *end, *pos;
1747 pos = (const u8 *) (res + 1);
1748 end = pos + res->ie_len;
1750 while (pos + 1 < end) {
1751 if (pos + 2 + pos[1] > end)
1762 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
1763 struct sockaddr *from,
1767 struct wpa_scan_res *res;
1768 const char *pos, *pos2;
1770 u8 *ie_pos, *ie_start, *ie_end;
1771 #define MAX_IE_LEN 1000
1772 const u8 *ds_params;
1774 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
1775 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
1776 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
1781 /* SCANRESP BSSID SSID IEs */
1783 res = os_zalloc(sizeof(*res) + MAX_IE_LEN);
1786 ie_start = ie_pos = (u8 *) (res + 1);
1787 ie_end = ie_pos + MAX_IE_LEN;
1789 if (hwaddr_aton(data, res->bssid)) {
1790 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
1798 pos2 = os_strchr(pos, ' ');
1800 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
1805 len = (pos2 - pos) / 2;
1809 * Generate SSID IE from the SSID field since this IE is not included
1810 * in the main IE field.
1812 *ie_pos++ = WLAN_EID_SSID;
1814 if (hexstr2bin(pos, ie_pos, len) < 0) {
1815 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
1822 pos2 = os_strchr(pos, ' ');
1824 len = os_strlen(pos) / 2;
1826 len = (pos2 - pos) / 2;
1827 if ((int) len > ie_end - ie_pos)
1828 len = ie_end - ie_pos;
1829 if (hexstr2bin(pos, ie_pos, len) < 0) {
1830 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
1835 res->ie_len = ie_pos - ie_start;
1841 if (os_strstr(pos, "PRIVACY"))
1842 res->caps |= IEEE80211_CAP_PRIVACY;
1843 if (os_strstr(pos, "IBSS"))
1844 res->caps |= IEEE80211_CAP_IBSS;
1847 ds_params = wpa_scan_get_ie(res, WLAN_EID_DS_PARAMS);
1848 if (ds_params && ds_params[1] > 0) {
1849 if (ds_params[2] >= 1 && ds_params[2] <= 13)
1850 res->freq = 2407 + ds_params[2] * 5;
1853 os_free(drv->scanres[drv->num_scanres]);
1854 drv->scanres[drv->num_scanres++] = res;
1858 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
1859 struct sockaddr *from,
1863 struct test_driver_bss *bss;
1865 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1867 /* ASSOCRESP BSSID <res> */
1868 if (hwaddr_aton(data, bss->bssid)) {
1869 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
1872 if (drv->use_associnfo) {
1873 union wpa_event_data event;
1874 os_memset(&event, 0, sizeof(event));
1875 event.assoc_info.req_ies = drv->assoc_wpa_ie;
1876 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
1877 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
1879 drv->associated = 1;
1880 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1884 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
1885 struct sockaddr *from,
1888 drv->associated = 0;
1889 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1893 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
1894 struct sockaddr *from,
1896 const u8 *data, size_t data_len)
1899 struct test_driver_bss *bss;
1901 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1903 if (data_len > 14) {
1904 /* Skip Ethernet header */
1905 src = data + ETH_ALEN;
1911 drv_event_eapol_rx(drv->ctx, src, data, data_len);
1915 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
1916 struct sockaddr *from,
1918 const u8 *data, size_t data_len)
1920 int freq = 0, own_freq;
1921 union wpa_event_data event;
1922 const struct ieee80211_mgmt *mgmt;
1924 struct test_driver_bss *bss;
1926 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
1927 if (data_len > 6 && os_memcmp(data, "freq=", 5) == 0) {
1929 for (pos = 5; pos < data_len; pos++) {
1930 if (data[pos] == ' ')
1933 if (pos < data_len) {
1934 freq = atoi((const char *) &data[5]);
1935 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME RX on "
1936 "freq %d MHz", bss->ifname, freq);
1943 if (drv->remain_on_channel_freq)
1944 own_freq = drv->remain_on_channel_freq;
1946 own_freq = drv->current_freq;
1948 if (freq && own_freq && freq != own_freq) {
1949 wpa_printf(MSG_DEBUG, "test_driver(%s): Ignore MLME RX on "
1950 "another frequency %d MHz (own %d MHz)",
1951 bss->ifname, freq, own_freq);
1955 os_memset(&event, 0, sizeof(event));
1956 event.mlme_rx.buf = data;
1957 event.mlme_rx.len = data_len;
1958 event.mlme_rx.freq = freq;
1959 wpa_supplicant_event(drv->ctx, EVENT_MLME_RX, &event);
1961 mgmt = (const struct ieee80211_mgmt *) data;
1962 fc = le_to_host16(mgmt->frame_control);
1964 if (drv->probe_req_report && data_len >= 24) {
1965 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
1966 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_REQ) {
1967 os_memset(&event, 0, sizeof(event));
1968 event.rx_probe_req.sa = mgmt->sa;
1969 event.rx_probe_req.da = mgmt->da;
1970 event.rx_probe_req.bssid = mgmt->bssid;
1971 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
1972 event.rx_probe_req.ie_len =
1973 data_len - (mgmt->u.probe_req.variable - data);
1974 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ,
1978 p2p_probe_req_rx(drv->p2p, mgmt->sa,
1979 mgmt->da, mgmt->bssid,
1980 event.rx_probe_req.ie,
1981 event.rx_probe_req.ie_len);
1982 #endif /* CONFIG_P2P */
1988 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
1989 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
1991 hdr_len = (const u8 *)
1992 &mgmt->u.action.u.vs_public_action.action - data;
1993 p2p_rx_action(drv->p2p, mgmt->da, mgmt->sa, mgmt->bssid,
1994 mgmt->u.action.category,
1995 &mgmt->u.action.u.vs_public_action.action,
1996 data_len - hdr_len, freq);
1998 #endif /* CONFIG_P2P */
2003 static void wpa_driver_test_scan_cmd(struct wpa_driver_test_data *drv,
2004 struct sockaddr *from,
2006 const u8 *data, size_t data_len)
2008 char buf[512], *pos, *end;
2010 struct test_driver_bss *bss;
2012 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
2014 /* data: optional [ STA-addr | ' ' | IEs(hex) ] */
2016 if (drv->probe_req_report && drv->p2p && data_len) {
2017 const char *d = (const char *) data;
2022 if (hwaddr_aton(d, sa))
2027 ielen = os_strlen(d) / 2;
2028 if (ielen > sizeof(ie))
2030 if (hexstr2bin(d, ie, ielen) < 0)
2032 drv->probe_from = from;
2033 drv->probe_from_len = fromlen;
2034 p2p_probe_req_rx(drv->p2p, sa, NULL, NULL, ie, ielen);
2035 drv->probe_from = NULL;
2037 #endif /* CONFIG_P2P */
2043 end = buf + sizeof(buf);
2045 /* reply: SCANRESP BSSID SSID IEs */
2046 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
2047 MAC2STR(bss->bssid));
2048 if (ret < 0 || ret >= end - pos)
2051 pos += wpa_snprintf_hex(pos, end - pos,
2052 bss->ssid, bss->ssid_len);
2053 ret = snprintf(pos, end - pos, " ");
2054 if (ret < 0 || ret >= end - pos)
2057 pos += wpa_snprintf_hex(pos, end - pos, drv->assoc_wpa_ie,
2058 drv->assoc_wpa_ie_len);
2061 ret = snprintf(pos, end - pos, " PRIVACY");
2062 if (ret < 0 || ret >= end - pos)
2067 ret = snprintf(pos, end - pos, " IBSS");
2068 if (ret < 0 || ret >= end - pos)
2072 sendto(drv->test_socket, buf, pos - buf, 0,
2073 (struct sockaddr *) from, fromlen);
2077 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
2080 struct wpa_driver_test_data *drv = eloop_ctx;
2083 struct sockaddr_storage from;
2084 socklen_t fromlen = sizeof(from);
2085 const size_t buflen = 2000;
2088 test_driver_receive_unix(sock, eloop_ctx, sock_ctx);
2092 buf = os_malloc(buflen);
2095 res = recvfrom(sock, buf, buflen - 1, 0,
2096 (struct sockaddr *) &from, &fromlen);
2098 perror("recvfrom(test_socket)");
2104 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
2106 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
2107 wpa_driver_test_scanresp(drv, (struct sockaddr *) &from,
2109 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
2110 wpa_driver_test_assocresp(drv, (struct sockaddr *) &from,
2112 } else if (os_strcmp(buf, "DISASSOC") == 0) {
2113 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
2115 } else if (os_strcmp(buf, "DEAUTH") == 0) {
2116 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
2118 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
2119 wpa_driver_test_eapol(drv, (struct sockaddr *) &from, fromlen,
2120 (const u8 *) buf + 6, res - 6);
2121 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
2122 wpa_driver_test_mlme(drv, (struct sockaddr *) &from, fromlen,
2123 (const u8 *) buf + 5, res - 5);
2124 } else if (os_strncmp(buf, "SCAN ", 5) == 0) {
2125 wpa_driver_test_scan_cmd(drv, (struct sockaddr *) &from,
2127 (const u8 *) buf + 5, res - 5);
2129 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
2136 static void * wpa_driver_test_init2(void *ctx, const char *ifname,
2139 struct wpa_driver_test_data *drv;
2140 struct wpa_driver_test_global *global = global_priv;
2141 struct test_driver_bss *bss;
2143 drv = test_alloc_data(ctx, ifname);
2146 bss = dl_list_first(&drv->bss, struct test_driver_bss, list);
2147 drv->global = global_priv;
2148 drv->test_socket = -1;
2150 /* Set dummy BSSID and SSID for testing. */
2151 bss->bssid[0] = 0x02;
2152 bss->bssid[1] = 0x00;
2153 bss->bssid[2] = 0x00;
2154 bss->bssid[3] = 0x00;
2155 bss->bssid[4] = 0x00;
2156 bss->bssid[5] = 0x01;
2157 os_memcpy(bss->ssid, "test", 5);
2160 if (global->bss_add_used) {
2161 os_memcpy(drv->own_addr, global->req_addr, ETH_ALEN);
2162 global->bss_add_used = 0;
2165 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
2171 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
2173 if (drv->test_socket >= 0) {
2174 eloop_unregister_read_sock(drv->test_socket);
2175 close(drv->test_socket);
2176 drv->test_socket = -1;
2179 if (drv->own_socket_path) {
2180 unlink(drv->own_socket_path);
2181 os_free(drv->own_socket_path);
2182 drv->own_socket_path = NULL;
2187 static void wpa_driver_test_deinit(void *priv)
2189 struct test_driver_bss *dbss = priv;
2190 struct wpa_driver_test_data *drv = dbss->drv;
2191 struct test_client_socket *cli, *prev;
2196 p2p_deinit(drv->p2p);
2197 wpabuf_free(drv->pending_action_tx);
2198 #endif /* CONFIG_P2P */
2208 /* There should be only one BSS remaining at this point. */
2209 if (dl_list_len(&drv->bss) != 1)
2210 wpa_printf(MSG_ERROR, "%s: %u remaining BSS entries",
2211 __func__, dl_list_len(&drv->bss));
2212 #endif /* HOSTAPD */
2214 test_driver_free_bsses(drv);
2216 wpa_driver_test_close_test_socket(drv);
2217 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
2218 eloop_cancel_timeout(wpa_driver_test_poll, drv, NULL);
2219 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2220 os_free(drv->test_dir);
2221 for (i = 0; i < MAX_SCAN_RESULTS; i++)
2222 os_free(drv->scanres[i]);
2223 os_free(drv->probe_req_ie);
2224 wpa_trace_remove_ref(drv, ctx, drv->ctx);
2229 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
2230 const char *dir, int ap)
2232 #ifdef DRIVER_TEST_UNIX
2233 static unsigned int counter = 0;
2234 struct sockaddr_un addr;
2237 os_free(drv->own_socket_path);
2239 len = os_strlen(dir) + 30;
2240 drv->own_socket_path = os_malloc(len);
2241 if (drv->own_socket_path == NULL)
2243 os_snprintf(drv->own_socket_path, len, "%s/%s-" MACSTR,
2244 dir, ap ? "AP" : "STA", MAC2STR(drv->own_addr));
2246 drv->own_socket_path = os_malloc(100);
2247 if (drv->own_socket_path == NULL)
2249 os_snprintf(drv->own_socket_path, 100,
2250 "/tmp/wpa_supplicant_test-%d-%d",
2251 getpid(), counter++);
2254 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
2255 if (drv->test_socket < 0) {
2256 perror("socket(PF_UNIX)");
2257 os_free(drv->own_socket_path);
2258 drv->own_socket_path = NULL;
2262 os_memset(&addr, 0, sizeof(addr));
2263 addr.sun_family = AF_UNIX;
2264 os_strlcpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
2265 if (bind(drv->test_socket, (struct sockaddr *) &addr,
2266 sizeof(addr)) < 0) {
2267 perror("bind(PF_UNIX)");
2268 close(drv->test_socket);
2269 unlink(drv->own_socket_path);
2270 os_free(drv->own_socket_path);
2271 drv->own_socket_path = NULL;
2275 eloop_register_read_sock(drv->test_socket,
2276 wpa_driver_test_receive_unix, drv, NULL);
2279 #else /* DRIVER_TEST_UNIX */
2281 #endif /* DRIVER_TEST_UNIX */
2285 static int wpa_driver_test_attach_udp(struct wpa_driver_test_data *drv,
2290 pos = os_strchr(dst, ':');
2294 wpa_printf(MSG_DEBUG, "%s: addr=%s port=%s", __func__, dst, pos);
2296 drv->test_socket = socket(PF_INET, SOCK_DGRAM, 0);
2297 if (drv->test_socket < 0) {
2298 perror("socket(PF_INET)");
2302 os_memset(&drv->hostapd_addr_udp, 0, sizeof(drv->hostapd_addr_udp));
2303 drv->hostapd_addr_udp.sin_family = AF_INET;
2304 #if defined(CONFIG_NATIVE_WINDOWS) || defined(CONFIG_ANSI_C_EXTRA)
2308 sscanf(dst, "%d.%d.%d.%d", &a[0], &a[1], &a[2], &a[3]);
2309 pos = (u8 *) &drv->hostapd_addr_udp.sin_addr;
2315 #else /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2316 inet_aton(dst, &drv->hostapd_addr_udp.sin_addr);
2317 #endif /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2318 drv->hostapd_addr_udp.sin_port = htons(atoi(pos));
2320 drv->hostapd_addr_udp_set = 1;
2322 eloop_register_read_sock(drv->test_socket,
2323 wpa_driver_test_receive_unix, drv, NULL);
2329 static int wpa_driver_test_set_param(void *priv, const char *param)
2331 struct test_driver_bss *dbss = priv;
2332 struct wpa_driver_test_data *drv = dbss->drv;
2335 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
2339 wpa_driver_test_close_test_socket(drv);
2341 #ifdef DRIVER_TEST_UNIX
2342 pos = os_strstr(param, "test_socket=");
2348 pos2 = os_strchr(pos, ' ');
2352 len = os_strlen(pos);
2353 if (len > sizeof(drv->hostapd_addr.sun_path))
2355 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
2356 drv->hostapd_addr.sun_family = AF_UNIX;
2357 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
2358 drv->hostapd_addr_set = 1;
2360 #endif /* DRIVER_TEST_UNIX */
2362 pos = os_strstr(param, "test_dir=");
2365 os_free(drv->test_dir);
2366 drv->test_dir = os_strdup(pos + 9);
2367 if (drv->test_dir == NULL)
2369 end = os_strchr(drv->test_dir, ' ');
2372 if (wpa_driver_test_attach(drv, drv->test_dir, 0))
2375 pos = os_strstr(param, "test_udp=");
2378 dst = os_strdup(pos + 9);
2381 epos = os_strchr(dst, ' ');
2384 if (wpa_driver_test_attach_udp(drv, dst))
2387 } else if (wpa_driver_test_attach(drv, NULL, 0))
2391 if (os_strstr(param, "use_associnfo=1")) {
2392 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
2393 drv->use_associnfo = 1;
2396 if (os_strstr(param, "p2p_mgmt=1")) {
2397 wpa_printf(MSG_DEBUG, "test_driver: Use internal P2P "
2399 if (wpa_driver_test_init_p2p(drv) < 0)
2407 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
2409 struct test_driver_bss *dbss = priv;
2410 struct wpa_driver_test_data *drv = dbss->drv;
2411 wpa_printf(MSG_DEBUG, "%s", __func__);
2412 return drv->own_addr;
2416 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
2417 const u8 *data, size_t data_len)
2419 struct test_driver_bss *dbss = priv;
2420 struct wpa_driver_test_data *drv = dbss->drv;
2423 struct l2_ethhdr eth;
2424 struct sockaddr *addr;
2426 #ifdef DRIVER_TEST_UNIX
2427 struct sockaddr_un addr_un;
2428 #endif /* DRIVER_TEST_UNIX */
2430 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
2432 os_memset(ð, 0, sizeof(eth));
2433 os_memcpy(eth.h_dest, dest, ETH_ALEN);
2434 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
2435 eth.h_proto = host_to_be16(proto);
2437 msg_len = 6 + sizeof(eth) + data_len;
2438 msg = os_malloc(msg_len);
2441 os_memcpy(msg, "EAPOL ", 6);
2442 os_memcpy(msg + 6, ð, sizeof(eth));
2443 os_memcpy(msg + 6 + sizeof(eth), data, data_len);
2445 if (os_memcmp(dest, dbss->bssid, ETH_ALEN) == 0 ||
2446 drv->test_dir == NULL) {
2447 if (drv->hostapd_addr_udp_set) {
2448 addr = (struct sockaddr *) &drv->hostapd_addr_udp;
2449 alen = sizeof(drv->hostapd_addr_udp);
2451 #ifdef DRIVER_TEST_UNIX
2452 addr = (struct sockaddr *) &drv->hostapd_addr;
2453 alen = sizeof(drv->hostapd_addr);
2454 #else /* DRIVER_TEST_UNIX */
2457 #endif /* DRIVER_TEST_UNIX */
2460 #ifdef DRIVER_TEST_UNIX
2462 os_memset(&addr_un, 0, sizeof(addr_un));
2463 addr_un.sun_family = AF_UNIX;
2464 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2465 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
2466 if (stat(addr_un.sun_path, &st) < 0) {
2467 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2469 drv->test_dir, MAC2STR(dest));
2471 addr = (struct sockaddr *) &addr_un;
2472 alen = sizeof(addr_un);
2473 #else /* DRIVER_TEST_UNIX */
2476 #endif /* DRIVER_TEST_UNIX */
2479 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
2480 perror("sendmsg(test_socket)");
2490 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
2492 struct test_driver_bss *dbss = priv;
2493 struct wpa_driver_test_data *drv = dbss->drv;
2494 os_memset(capa, 0, sizeof(*capa));
2495 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
2496 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
2497 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
2498 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
2499 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE |
2500 WPA_DRIVER_CAPA_KEY_MGMT_FT |
2501 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2502 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
2503 WPA_DRIVER_CAPA_ENC_WEP104 |
2504 WPA_DRIVER_CAPA_ENC_TKIP |
2505 WPA_DRIVER_CAPA_ENC_CCMP;
2506 capa->auth = WPA_DRIVER_AUTH_OPEN |
2507 WPA_DRIVER_AUTH_SHARED |
2508 WPA_DRIVER_AUTH_LEAP;
2510 capa->flags |= WPA_DRIVER_FLAGS_P2P_MGMT;
2511 capa->flags |= WPA_DRIVER_FLAGS_AP;
2512 capa->flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
2513 capa->flags |= WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE;
2514 capa->flags |= WPA_DRIVER_FLAGS_P2P_CAPABLE;
2515 capa->max_scan_ssids = 2;
2516 capa->max_remain_on_chan = 60000;
2522 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
2526 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
2527 __func__, protect_type, key_type);
2530 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
2531 __func__, MAC2STR(addr));
2538 static int wpa_driver_test_set_channel(void *priv,
2539 enum hostapd_hw_mode phymode,
2542 struct test_driver_bss *dbss = priv;
2543 struct wpa_driver_test_data *drv = dbss->drv;
2544 wpa_printf(MSG_DEBUG, "%s: phymode=%d chan=%d freq=%d",
2545 __func__, phymode, chan, freq);
2546 drv->current_freq = freq;
2551 static int wpa_driver_test_mlme_add_sta(void *priv, const u8 *addr,
2552 const u8 *supp_rates,
2553 size_t supp_rates_len)
2555 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2560 static int wpa_driver_test_mlme_remove_sta(void *priv, const u8 *addr)
2562 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2567 static int wpa_driver_test_set_ssid(void *priv, const u8 *ssid,
2570 wpa_printf(MSG_DEBUG, "%s", __func__);
2575 static int wpa_driver_test_set_bssid(void *priv, const u8 *bssid)
2577 wpa_printf(MSG_DEBUG, "%s: bssid=" MACSTR, __func__, MAC2STR(bssid));
2582 static void * wpa_driver_test_global_init(void)
2584 struct wpa_driver_test_global *global;
2586 global = os_zalloc(sizeof(*global));
2591 static void wpa_driver_test_global_deinit(void *priv)
2593 struct wpa_driver_test_global *global = priv;
2598 static struct wpa_interface_info *
2599 wpa_driver_test_get_interfaces(void *global_priv)
2601 /* struct wpa_driver_test_global *global = priv; */
2602 struct wpa_interface_info *iface;
2604 iface = os_zalloc(sizeof(*iface));
2607 iface->ifname = os_strdup("sta0");
2608 iface->desc = os_strdup("test interface 0");
2609 iface->drv_name = "test";
2610 iface->next = os_zalloc(sizeof(*iface));
2612 iface->next->ifname = os_strdup("sta1");
2613 iface->next->desc = os_strdup("test interface 1");
2614 iface->next->drv_name = "test";
2621 static struct hostapd_hw_modes *
2622 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
2624 struct hostapd_hw_modes *modes;
2629 modes = os_zalloc(*num_modes * sizeof(struct hostapd_hw_modes));
2632 modes[0].mode = HOSTAPD_MODE_IEEE80211G;
2633 modes[0].num_channels = 11;
2634 modes[0].num_rates = 12;
2636 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2637 modes[0].rates = os_zalloc(modes[0].num_rates * sizeof(int));
2638 if (modes[0].channels == NULL || modes[0].rates == NULL)
2640 for (i = 0; i < 11; i++) {
2641 modes[0].channels[i].chan = i + 1;
2642 modes[0].channels[i].freq = 2412 + 5 * i;
2643 modes[0].channels[i].flag = 0;
2645 modes[0].rates[0] = 10;
2646 modes[0].rates[1] = 20;
2647 modes[0].rates[2] = 55;
2648 modes[0].rates[3] = 110;
2649 modes[0].rates[4] = 60;
2650 modes[0].rates[5] = 90;
2651 modes[0].rates[6] = 120;
2652 modes[0].rates[7] = 180;
2653 modes[0].rates[8] = 240;
2654 modes[0].rates[9] = 360;
2655 modes[0].rates[10] = 480;
2656 modes[0].rates[11] = 540;
2658 modes[1].mode = HOSTAPD_MODE_IEEE80211B;
2659 modes[1].num_channels = 11;
2660 modes[1].num_rates = 4;
2662 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2663 modes[1].rates = os_zalloc(modes[1].num_rates * sizeof(int));
2664 if (modes[1].channels == NULL || modes[1].rates == NULL)
2666 for (i = 0; i < 11; i++) {
2667 modes[1].channels[i].chan = i + 1;
2668 modes[1].channels[i].freq = 2412 + 5 * i;
2669 modes[1].channels[i].flag = 0;
2671 modes[1].rates[0] = 10;
2672 modes[1].rates[1] = 20;
2673 modes[1].rates[2] = 55;
2674 modes[1].rates[3] = 110;
2676 modes[2].mode = HOSTAPD_MODE_IEEE80211A;
2677 modes[2].num_channels = 1;
2678 modes[2].num_rates = 8;
2679 modes[2].channels = os_zalloc(sizeof(struct hostapd_channel_data));
2680 modes[2].rates = os_zalloc(modes[2].num_rates * sizeof(int));
2681 if (modes[2].channels == NULL || modes[2].rates == NULL)
2683 modes[2].channels[0].chan = 60;
2684 modes[2].channels[0].freq = 5300;
2685 modes[2].channels[0].flag = 0;
2686 modes[2].rates[0] = 60;
2687 modes[2].rates[1] = 90;
2688 modes[2].rates[2] = 120;
2689 modes[2].rates[3] = 180;
2690 modes[2].rates[4] = 240;
2691 modes[2].rates[5] = 360;
2692 modes[2].rates[6] = 480;
2693 modes[2].rates[7] = 540;
2699 for (i = 0; i < *num_modes; i++) {
2700 os_free(modes[i].channels);
2701 os_free(modes[i].rates);
2709 static int wpa_driver_test_set_freq(void *priv,
2710 struct hostapd_freq_params *freq)
2712 struct test_driver_bss *dbss = priv;
2713 struct wpa_driver_test_data *drv = dbss->drv;
2714 wpa_printf(MSG_DEBUG, "test: set_freq %u MHz", freq->freq);
2715 drv->current_freq = freq->freq;
2720 static int wpa_driver_test_send_action(void *priv, unsigned int freq,
2722 const u8 *dst, const u8 *src,
2724 const u8 *data, size_t data_len)
2726 struct test_driver_bss *dbss = priv;
2727 struct wpa_driver_test_data *drv = dbss->drv;
2730 struct ieee80211_hdr *hdr;
2732 wpa_printf(MSG_DEBUG, "test: Send Action frame");
2734 if ((drv->remain_on_channel_freq &&
2735 freq != drv->remain_on_channel_freq) ||
2736 (drv->remain_on_channel_freq == 0 &&
2737 freq != (unsigned int) drv->current_freq)) {
2738 wpa_printf(MSG_DEBUG, "test: Reject Action frame TX on "
2739 "unexpected channel: freq=%u MHz (current_freq=%u "
2740 "MHz, remain-on-channel freq=%u MHz)",
2741 freq, drv->current_freq,
2742 drv->remain_on_channel_freq);
2746 buf = os_zalloc(24 + data_len);
2749 os_memcpy(buf + 24, data, data_len);
2750 hdr = (struct ieee80211_hdr *) buf;
2751 hdr->frame_control =
2752 IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
2753 os_memcpy(hdr->addr1, dst, ETH_ALEN);
2754 os_memcpy(hdr->addr2, src, ETH_ALEN);
2755 os_memcpy(hdr->addr3, bssid, ETH_ALEN);
2757 ret = wpa_driver_test_send_mlme(priv, buf, 24 + data_len);
2764 static void test_send_action_cb(void *eloop_ctx, void *timeout_ctx)
2766 struct wpa_driver_test_data *drv = eloop_ctx;
2768 if (drv->pending_action_tx == NULL)
2771 if (drv->off_channel_freq != drv->pending_action_freq) {
2772 wpa_printf(MSG_DEBUG, "P2P: Pending Action frame TX "
2773 "waiting for another freq=%u",
2774 drv->pending_action_freq);
2777 wpa_printf(MSG_DEBUG, "P2P: Sending pending Action frame to "
2778 MACSTR, MAC2STR(drv->pending_action_dst));
2779 wpa_driver_test_send_action(drv, drv->pending_action_freq, 0,
2780 drv->pending_action_dst,
2781 drv->pending_action_src,
2782 drv->pending_action_bssid,
2783 wpabuf_head(drv->pending_action_tx),
2784 wpabuf_len(drv->pending_action_tx));
2786 #endif /* CONFIG_P2P */
2789 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx)
2791 struct wpa_driver_test_data *drv = eloop_ctx;
2792 union wpa_event_data data;
2794 wpa_printf(MSG_DEBUG, "test: Remain-on-channel timeout");
2796 os_memset(&data, 0, sizeof(data));
2797 data.remain_on_channel.freq = drv->remain_on_channel_freq;
2798 data.remain_on_channel.duration = drv->remain_on_channel_duration;
2801 drv->off_channel_freq = 0;
2803 drv->remain_on_channel_freq = 0;
2805 wpa_supplicant_event(drv->ctx, EVENT_CANCEL_REMAIN_ON_CHANNEL, &data);
2809 static int wpa_driver_test_remain_on_channel(void *priv, unsigned int freq,
2810 unsigned int duration)
2812 struct test_driver_bss *dbss = priv;
2813 struct wpa_driver_test_data *drv = dbss->drv;
2814 union wpa_event_data data;
2816 wpa_printf(MSG_DEBUG, "%s(freq=%u, duration=%u)",
2817 __func__, freq, duration);
2818 if (drv->remain_on_channel_freq &&
2819 drv->remain_on_channel_freq != freq) {
2820 wpa_printf(MSG_DEBUG, "test: Refuse concurrent "
2821 "remain_on_channel request");
2825 drv->remain_on_channel_freq = freq;
2826 drv->remain_on_channel_duration = duration;
2827 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2828 eloop_register_timeout(duration / 1000, (duration % 1000) * 1000,
2829 test_remain_on_channel_timeout, drv, NULL);
2831 os_memset(&data, 0, sizeof(data));
2832 data.remain_on_channel.freq = freq;
2833 data.remain_on_channel.duration = duration;
2834 wpa_supplicant_event(drv->ctx, EVENT_REMAIN_ON_CHANNEL, &data);
2838 drv->off_channel_freq = drv->remain_on_channel_freq;
2839 test_send_action_cb(drv, NULL);
2840 if (drv->off_channel_freq == drv->pending_listen_freq) {
2841 p2p_listen_cb(drv->p2p, drv->pending_listen_freq,
2842 drv->pending_listen_duration);
2843 drv->pending_listen_freq = 0;
2846 #endif /* CONFIG_P2P */
2852 static int wpa_driver_test_cancel_remain_on_channel(void *priv)
2854 struct test_driver_bss *dbss = priv;
2855 struct wpa_driver_test_data *drv = dbss->drv;
2856 wpa_printf(MSG_DEBUG, "%s", __func__);
2857 if (!drv->remain_on_channel_freq)
2859 drv->remain_on_channel_freq = 0;
2860 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2865 static int wpa_driver_test_probe_req_report(void *priv, int report)
2867 struct test_driver_bss *dbss = priv;
2868 struct wpa_driver_test_data *drv = dbss->drv;
2869 wpa_printf(MSG_DEBUG, "%s(report=%d)", __func__, report);
2870 drv->probe_req_report = report;
2877 static int wpa_driver_test_p2p_find(void *priv, unsigned int timeout, int type)
2879 struct wpa_driver_test_data *drv = priv;
2880 wpa_printf(MSG_DEBUG, "%s(timeout=%u)", __func__, timeout);
2883 return p2p_find(drv->p2p, timeout, type, 0, NULL);
2887 static int wpa_driver_test_p2p_stop_find(void *priv)
2889 struct wpa_driver_test_data *drv = priv;
2890 wpa_printf(MSG_DEBUG, "%s", __func__);
2893 p2p_stop_find(drv->p2p);
2898 static int wpa_driver_test_p2p_listen(void *priv, unsigned int timeout)
2900 struct wpa_driver_test_data *drv = priv;
2901 wpa_printf(MSG_DEBUG, "%s(timeout=%u)", __func__, timeout);
2904 return p2p_listen(drv->p2p, timeout);
2908 static int wpa_driver_test_p2p_connect(void *priv, const u8 *peer_addr,
2909 int wps_method, int go_intent,
2910 const u8 *own_interface_addr,
2911 unsigned int force_freq,
2912 int persistent_group)
2914 struct wpa_driver_test_data *drv = priv;
2915 wpa_printf(MSG_DEBUG, "%s(peer_addr=" MACSTR " wps_method=%d "
2917 "own_interface_addr=" MACSTR " force_freq=%u "
2918 "persistent_group=%d)",
2919 __func__, MAC2STR(peer_addr), wps_method, go_intent,
2920 MAC2STR(own_interface_addr), force_freq, persistent_group);
2923 return p2p_connect(drv->p2p, peer_addr, wps_method, go_intent,
2924 own_interface_addr, force_freq, persistent_group);
2928 static int wpa_driver_test_wps_success_cb(void *priv, const u8 *peer_addr)
2930 struct wpa_driver_test_data *drv = priv;
2931 wpa_printf(MSG_DEBUG, "%s(peer_addr=" MACSTR ")",
2932 __func__, MAC2STR(peer_addr));
2935 p2p_wps_success_cb(drv->p2p, peer_addr);
2940 static int wpa_driver_test_p2p_group_formation_failed(void *priv)
2942 struct wpa_driver_test_data *drv = priv;
2943 wpa_printf(MSG_DEBUG, "%s", __func__);
2946 p2p_group_formation_failed(drv->p2p);
2951 static int wpa_driver_test_p2p_set_params(void *priv,
2952 const struct p2p_params *params)
2954 struct wpa_driver_test_data *drv = priv;
2955 wpa_printf(MSG_DEBUG, "%s", __func__);
2958 if (p2p_set_dev_name(drv->p2p, params->dev_name) < 0 ||
2959 p2p_set_pri_dev_type(drv->p2p, params->pri_dev_type) < 0 ||
2960 p2p_set_sec_dev_types(drv->p2p, params->sec_dev_type,
2961 params->num_sec_dev_types) < 0)
2967 static int test_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
2968 unsigned int num_req_dev_types,
2969 const u8 *req_dev_types)
2971 struct wpa_driver_test_data *drv = ctx;
2972 struct wpa_driver_scan_params params;
2974 struct wpabuf *wps_ie, *ies;
2975 int social_channels[] = { 2412, 2437, 2462, 0, 0 };
2978 wpa_printf(MSG_DEBUG, "%s(type=%d freq=%d)",
2979 __func__, type, freq);
2981 os_memset(¶ms, 0, sizeof(params));
2983 /* P2P Wildcard SSID */
2984 params.num_ssids = 1;
2985 params.ssids[0].ssid = (u8 *) P2P_WILDCARD_SSID;
2986 params.ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
2988 #if 0 /* TODO: WPS IE */
2989 wpa_s->wps->dev.p2p = 1;
2990 wps_ie = wps_build_probe_req_ie(0, &wpa_s->wps->dev, wpa_s->wps->uuid,
2993 wps_ie = wpabuf_alloc(1);
2998 ielen = p2p_scan_ie_buf_len(drv->p2p);
2999 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
3001 wpabuf_free(wps_ie);
3004 wpabuf_put_buf(ies, wps_ie);
3005 wpabuf_free(wps_ie);
3007 p2p_scan_ie(drv->p2p, ies);
3009 params.extra_ies = wpabuf_head(ies);
3010 params.extra_ies_len = wpabuf_len(ies);
3013 case P2P_SCAN_SOCIAL:
3014 params.freqs = social_channels;
3018 case P2P_SCAN_SPECIFIC:
3019 social_channels[0] = freq;
3020 social_channels[1] = 0;
3021 params.freqs = social_channels;
3023 case P2P_SCAN_SOCIAL_PLUS_ONE:
3024 social_channels[3] = freq;
3025 params.freqs = social_channels;
3029 drv->pending_p2p_scan = 1;
3030 ret = wpa_driver_test_scan(drv, ¶ms);
3038 static int test_send_action(void *ctx, unsigned int freq, const u8 *dst,
3039 const u8 *src, const u8 *bssid, const u8 *buf,
3040 size_t len, unsigned int wait_time)
3042 struct wpa_driver_test_data *drv = ctx;
3044 wpa_printf(MSG_DEBUG, "%s(freq=%u dst=" MACSTR " src=" MACSTR
3045 " bssid=" MACSTR " len=%d",
3046 __func__, freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid),
3049 wpa_printf(MSG_WARNING, "P2P: No frequency specified for "
3054 if (drv->pending_action_tx) {
3055 wpa_printf(MSG_DEBUG, "P2P: Dropped pending Action frame TX "
3056 "to " MACSTR, MAC2STR(drv->pending_action_dst));
3057 wpabuf_free(drv->pending_action_tx);
3059 drv->pending_action_tx = wpabuf_alloc(len);
3060 if (drv->pending_action_tx == NULL)
3062 wpabuf_put_data(drv->pending_action_tx, buf, len);
3063 os_memcpy(drv->pending_action_src, src, ETH_ALEN);
3064 os_memcpy(drv->pending_action_dst, dst, ETH_ALEN);
3065 os_memcpy(drv->pending_action_bssid, bssid, ETH_ALEN);
3066 drv->pending_action_freq = freq;
3068 if (drv->off_channel_freq == freq) {
3069 /* Already on requested channel; send immediately */
3070 /* TODO: Would there ever be need to extend the current
3071 * duration on the channel? */
3072 eloop_cancel_timeout(test_send_action_cb, drv, NULL);
3073 eloop_register_timeout(0, 0, test_send_action_cb, drv, NULL);
3077 wpa_printf(MSG_DEBUG, "P2P: Schedule Action frame to be transmitted "
3078 "once the driver gets to the requested channel");
3079 if (wpa_driver_test_remain_on_channel(drv, freq, wait_time) < 0) {
3080 wpa_printf(MSG_DEBUG, "P2P: Failed to request driver "
3081 "to remain on channel (%u MHz) for Action "
3090 static void test_send_action_done(void *ctx)
3092 wpa_printf(MSG_DEBUG, "%s", __func__);
3097 static void test_go_neg_completed(void *ctx, struct p2p_go_neg_results *res)
3099 struct wpa_driver_test_data *drv = ctx;
3100 union wpa_event_data event;
3101 wpa_printf(MSG_DEBUG, "%s", __func__);
3102 os_memset(&event, 0, sizeof(event));
3103 event.p2p_go_neg_completed.res = res;
3104 wpa_supplicant_event(drv->ctx, EVENT_P2P_GO_NEG_COMPLETED, &event);
3108 static void test_go_neg_req_rx(void *ctx, const u8 *src, u16 dev_passwd_id)
3110 struct wpa_driver_test_data *drv = ctx;
3111 union wpa_event_data event;
3112 wpa_printf(MSG_DEBUG, "%s(src=" MACSTR ")", __func__, MAC2STR(src));
3113 os_memset(&event, 0, sizeof(event));
3114 event.p2p_go_neg_req_rx.src = src;
3115 event.p2p_go_neg_req_rx.dev_passwd_id = dev_passwd_id;
3116 wpa_supplicant_event(drv->ctx, EVENT_P2P_GO_NEG_REQ_RX, &event);
3120 static void test_dev_found(void *ctx, const u8 *addr,
3121 const struct p2p_peer_info *info, int new_device)
3123 struct wpa_driver_test_data *drv = ctx;
3124 union wpa_event_data event;
3125 char devtype[WPS_DEV_TYPE_BUFSIZE];
3126 wpa_printf(MSG_DEBUG, "%s(" MACSTR " p2p_dev_addr=" MACSTR
3127 " pri_dev_type=%s name='%s' config_methods=0x%x "
3128 "dev_capab=0x%x group_capab=0x%x)",
3129 __func__, MAC2STR(addr), MAC2STR(info->p2p_device_addr),
3130 wps_dev_type_bin2str(info->pri_dev_type, devtype,
3132 info->device_name, info->config_methods, info->dev_capab,
3135 os_memset(&event, 0, sizeof(event));
3136 event.p2p_dev_found.addr = addr;
3137 event.p2p_dev_found.dev_addr = info->p2p_device_addr;
3138 event.p2p_dev_found.pri_dev_type = info->pri_dev_type;
3139 event.p2p_dev_found.dev_name = info->device_name;
3140 event.p2p_dev_found.config_methods = info->config_methods;
3141 event.p2p_dev_found.dev_capab = info->dev_capab;
3142 event.p2p_dev_found.group_capab = info->group_capab;
3143 wpa_supplicant_event(drv->ctx, EVENT_P2P_DEV_FOUND, &event);
3147 static int test_start_listen(void *ctx, unsigned int freq,
3148 unsigned int duration,
3149 const struct wpabuf *probe_resp_ie)
3151 struct wpa_driver_test_data *drv = ctx;
3153 wpa_printf(MSG_DEBUG, "%s(freq=%u duration=%u)",
3154 __func__, freq, duration);
3156 if (wpa_driver_test_probe_req_report(drv, 1) < 0)
3159 drv->pending_listen_freq = freq;
3160 drv->pending_listen_duration = duration;
3162 if (wpa_driver_test_remain_on_channel(drv, freq, duration) < 0) {
3163 drv->pending_listen_freq = 0;
3171 static void test_stop_listen(void *ctx)
3173 wpa_printf(MSG_DEBUG, "%s", __func__);
3178 static int test_send_probe_resp(void *ctx, const struct wpabuf *buf)
3180 struct wpa_driver_test_data *drv = ctx;
3181 char resp[512], *pos, *end;
3183 const struct ieee80211_mgmt *mgmt;
3184 const u8 *ie, *ie_end;
3186 wpa_printf(MSG_DEBUG, "%s", __func__);
3187 wpa_hexdump_buf(MSG_MSGDUMP, "Probe Response", buf);
3188 if (wpabuf_len(buf) < 24)
3190 if (!drv->probe_from) {
3191 wpa_printf(MSG_DEBUG, "%s: probe_from not set", __func__);
3196 end = resp + sizeof(resp);
3198 mgmt = wpabuf_head(buf);
3200 /* reply: SCANRESP BSSID SSID IEs */
3201 ret = os_snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
3202 MAC2STR(mgmt->bssid));
3203 if (ret < 0 || ret >= end - pos)
3207 ie = mgmt->u.probe_resp.variable;
3208 ie_end = wpabuf_head_u8(buf) + wpabuf_len(buf);
3209 if (ie_end - ie < 2 || ie[0] != WLAN_EID_SSID ||
3210 ie + 2 + ie[1] > ie_end)
3212 pos += wpa_snprintf_hex(pos, end - pos, ie + 2, ie[1]);
3214 ret = os_snprintf(pos, end - pos, " ");
3215 if (ret < 0 || ret >= end - pos)
3218 pos += wpa_snprintf_hex(pos, end - pos, ie, ie_end - ie);
3220 sendto(drv->test_socket, resp, pos - resp, 0,
3221 drv->probe_from, drv->probe_from_len);
3227 static void test_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
3228 u16 update_indic, const u8 *tlvs, size_t tlvs_len)
3230 wpa_printf(MSG_DEBUG, "%s", __func__);
3235 static void test_sd_response(void *ctx, const u8 *sa, u16 update_indic,
3236 const u8 *tlvs, size_t tlvs_len)
3238 wpa_printf(MSG_DEBUG, "%s", __func__);
3243 static void test_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
3244 const u8 *dev_addr, const u8 *pri_dev_type,
3245 const char *dev_name, u16 supp_config_methods,
3246 u8 dev_capab, u8 group_capab)
3248 wpa_printf(MSG_DEBUG, "%s(peer=" MACSTR " config_methods=0x%x)",
3249 __func__, MAC2STR(peer), config_methods);
3254 static void test_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods)
3256 wpa_printf(MSG_DEBUG, "%s(peer=" MACSTR " config_methods=0x%x)",
3257 __func__, MAC2STR(peer), config_methods);
3261 #endif /* CONFIG_P2P */
3264 static int wpa_driver_test_init_p2p(struct wpa_driver_test_data *drv)
3267 struct p2p_config p2p;
3271 os_memset(&p2p, 0, sizeof(p2p));
3272 p2p.msg_ctx = drv->ctx;
3274 p2p.p2p_scan = test_p2p_scan;
3275 p2p.send_action = test_send_action;
3276 p2p.send_action_done = test_send_action_done;
3277 p2p.go_neg_completed = test_go_neg_completed;
3278 p2p.go_neg_req_rx = test_go_neg_req_rx;
3279 p2p.dev_found = test_dev_found;
3280 p2p.start_listen = test_start_listen;
3281 p2p.stop_listen = test_stop_listen;
3282 p2p.send_probe_resp = test_send_probe_resp;
3283 p2p.sd_request = test_sd_request;
3284 p2p.sd_response = test_sd_response;
3285 p2p.prov_disc_req = test_prov_disc_req;
3286 p2p.prov_disc_resp = test_prov_disc_resp;
3288 os_memcpy(p2p.dev_addr, drv->own_addr, ETH_ALEN);
3290 p2p.reg_class = 12; /* TODO: change depending on location */
3292 * Pick one of the social channels randomly as the listen
3295 os_get_random((u8 *) &r, sizeof(r));
3296 p2p.channel = 1 + (r % 3) * 5;
3298 /* TODO: change depending on location */
3299 p2p.op_reg_class = 12;
3301 * For initial tests, pick the operation channel randomly.
3302 * TODO: Use scan results (etc.) to select the best channel.
3304 p2p.op_channel = 1 + r % 11;
3306 os_memcpy(p2p.country, "US ", 3);
3308 /* FIX: fetch available channels from the driver */
3309 p2p.channels.reg_classes = 1;
3310 p2p.channels.reg_class[0].reg_class = 12; /* US/12 = 2.4 GHz band */
3311 p2p.channels.reg_class[0].channels = 11;
3312 for (i = 0; i < 11; i++)
3313 p2p.channels.reg_class[0].channel[i] = i + 1;
3315 p2p.max_peers = 100;
3317 drv->p2p = p2p_init(&p2p);
3318 if (drv->p2p == NULL)
3321 #else /* CONFIG_P2P */
3322 wpa_printf(MSG_INFO, "driver_test: P2P support not included");
3324 #endif /* CONFIG_P2P */
3328 const struct wpa_driver_ops wpa_driver_test_ops = {
3330 "wpa_supplicant test driver",
3331 .hapd_init = test_driver_init,
3332 .hapd_deinit = wpa_driver_test_deinit,
3333 .hapd_send_eapol = test_driver_send_eapol,
3334 .send_mlme = wpa_driver_test_send_mlme,
3335 .set_generic_elem = test_driver_set_generic_elem,
3336 .sta_deauth = test_driver_sta_deauth,
3337 .sta_disassoc = test_driver_sta_disassoc,
3338 .get_hw_feature_data = wpa_driver_test_get_hw_feature_data,
3339 .if_add = test_driver_if_add,
3340 .if_remove = test_driver_if_remove,
3341 .valid_bss_mask = test_driver_valid_bss_mask,
3342 .hapd_set_ssid = test_driver_set_ssid,
3343 .set_privacy = test_driver_set_privacy,
3344 .set_sta_vlan = test_driver_set_sta_vlan,
3345 .sta_add = test_driver_sta_add,
3346 .send_ether = test_driver_send_ether,
3347 .set_ap_wps_ie = test_driver_set_ap_wps_ie,
3348 .get_bssid = wpa_driver_test_get_bssid,
3349 .get_ssid = wpa_driver_test_get_ssid,
3350 .set_key = wpa_driver_test_set_key,
3351 .deinit = wpa_driver_test_deinit,
3352 .set_param = wpa_driver_test_set_param,
3353 .deauthenticate = wpa_driver_test_deauthenticate,
3354 .disassociate = wpa_driver_test_disassociate,
3355 .associate = wpa_driver_test_associate,
3356 .get_capa = wpa_driver_test_get_capa,
3357 .get_mac_addr = wpa_driver_test_get_mac_addr,
3358 .send_eapol = wpa_driver_test_send_eapol,
3359 .mlme_setprotection = wpa_driver_test_mlme_setprotection,
3360 .set_channel = wpa_driver_test_set_channel,
3361 .set_ssid = wpa_driver_test_set_ssid,
3362 .set_bssid = wpa_driver_test_set_bssid,
3363 .mlme_add_sta = wpa_driver_test_mlme_add_sta,
3364 .mlme_remove_sta = wpa_driver_test_mlme_remove_sta,
3365 .get_scan_results2 = wpa_driver_test_get_scan_results2,
3366 .global_init = wpa_driver_test_global_init,
3367 .global_deinit = wpa_driver_test_global_deinit,
3368 .init2 = wpa_driver_test_init2,
3369 .get_interfaces = wpa_driver_test_get_interfaces,
3370 .scan2 = wpa_driver_test_scan,
3371 .set_freq = wpa_driver_test_set_freq,
3372 .send_action = wpa_driver_test_send_action,
3373 .remain_on_channel = wpa_driver_test_remain_on_channel,
3374 .cancel_remain_on_channel = wpa_driver_test_cancel_remain_on_channel,
3375 .probe_req_report = wpa_driver_test_probe_req_report,
3377 .p2p_find = wpa_driver_test_p2p_find,
3378 .p2p_stop_find = wpa_driver_test_p2p_stop_find,
3379 .p2p_listen = wpa_driver_test_p2p_listen,
3380 .p2p_connect = wpa_driver_test_p2p_connect,
3381 .wps_success_cb = wpa_driver_test_wps_success_cb,
3382 .p2p_group_formation_failed =
3383 wpa_driver_test_p2p_group_formation_failed,
3384 .p2p_set_params = wpa_driver_test_p2p_set_params,
3385 #endif /* CONFIG_P2P */