]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/drivers/driver_test.c
Fixed build without CONFIG_CLIENT_MLME
[thirdparty/hostap.git] / src / drivers / driver_test.c
1 /*
2 * WPA Supplicant - testing driver interface
3 * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15 #include "includes.h"
16 #include <sys/un.h>
17 #include <dirent.h>
18 #include <sys/stat.h>
19
20 #include "common.h"
21 #include "driver.h"
22 #include "l2_packet/l2_packet.h"
23 #include "eloop.h"
24 #include "sha1.h"
25 #include "ieee802_11_defs.h"
26
27
28 struct wpa_driver_test_data {
29 void *ctx;
30 u8 own_addr[ETH_ALEN];
31 int test_socket;
32 struct sockaddr_un hostapd_addr;
33 int hostapd_addr_set;
34 char *own_socket_path;
35 char *test_dir;
36 u8 bssid[ETH_ALEN];
37 u8 ssid[32];
38 size_t ssid_len;
39 #define MAX_SCAN_RESULTS 30
40 struct wpa_scan_res *scanres[MAX_SCAN_RESULTS];
41 size_t num_scanres;
42 int use_associnfo;
43 u8 assoc_wpa_ie[80];
44 size_t assoc_wpa_ie_len;
45 int use_mlme;
46 int associated;
47 };
48
49
50 static void wpa_driver_test_poll(void *eloop_ctx, void *timeout_ctx)
51 {
52 struct wpa_driver_test_data *drv = eloop_ctx;
53
54 if (drv->associated && drv->hostapd_addr_set) {
55 struct stat st;
56 if (stat(drv->hostapd_addr.sun_path, &st) < 0) {
57 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
58 __func__, strerror(errno));
59 drv->associated = 0;
60 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
61 }
62 }
63
64 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
65 }
66
67
68 static int wpa_driver_test_set_wpa(void *priv, int enabled)
69 {
70 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
71 return 0;
72 }
73
74
75 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
76 {
77 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
78 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
79 }
80
81
82 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
83 const char *path)
84 {
85 struct dirent *dent;
86 DIR *dir;
87 struct sockaddr_un addr;
88
89 dir = opendir(path);
90 if (dir == NULL)
91 return;
92
93 while ((dent = readdir(dir))) {
94 if (os_strncmp(dent->d_name, "AP-", 3) != 0)
95 continue;
96 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
97
98 os_memset(&addr, 0, sizeof(addr));
99 addr.sun_family = AF_UNIX;
100 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
101 path, dent->d_name);
102
103 if (sendto(drv->test_socket, "SCAN", 4, 0,
104 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
105 perror("sendto(test_socket)");
106 }
107 }
108 closedir(dir);
109 }
110
111
112 static int wpa_driver_test_scan(void *priv, const u8 *ssid, size_t ssid_len)
113 {
114 struct wpa_driver_test_data *drv = priv;
115 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
116
117 drv->num_scanres = 0;
118
119 if (drv->test_socket >= 0 && drv->test_dir)
120 wpa_driver_scan_dir(drv, drv->test_dir);
121
122 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
123 sendto(drv->test_socket, "SCAN", 4, 0,
124 (struct sockaddr *) &drv->hostapd_addr,
125 sizeof(drv->hostapd_addr)) < 0) {
126 perror("sendto(test_socket)");
127 }
128
129 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
130 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
131 drv->ctx);
132 return 0;
133 }
134
135
136 static struct wpa_scan_results * wpa_driver_test_get_scan_results2(void *priv)
137 {
138 struct wpa_driver_test_data *drv = priv;
139 struct wpa_scan_results *res;
140 size_t i;
141
142 res = os_zalloc(sizeof(*res));
143 if (res == NULL)
144 return NULL;
145
146 res->res = os_zalloc(drv->num_scanres * sizeof(struct wpa_scan_res *));
147 if (res->res == NULL) {
148 os_free(res);
149 return NULL;
150 }
151
152 for (i = 0; i < drv->num_scanres; i++) {
153 struct wpa_scan_res *r;
154 if (drv->scanres[i] == NULL)
155 continue;
156 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len);
157 if (r == NULL)
158 break;
159 os_memcpy(r, drv->scanres[i],
160 sizeof(*r) + drv->scanres[i]->ie_len);
161 res->res[res->num++] = r;
162 }
163
164 return res;
165 }
166
167
168 static int wpa_driver_test_set_key(void *priv, wpa_alg alg, const u8 *addr,
169 int key_idx, int set_tx,
170 const u8 *seq, size_t seq_len,
171 const u8 *key, size_t key_len)
172 {
173 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
174 __func__, priv, alg, key_idx, set_tx);
175 if (addr) {
176 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
177 }
178 if (seq) {
179 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
180 }
181 if (key) {
182 wpa_hexdump(MSG_DEBUG, " key", key, key_len);
183 }
184 return 0;
185 }
186
187
188 static int wpa_driver_test_associate(
189 void *priv, struct wpa_driver_associate_params *params)
190 {
191 struct wpa_driver_test_data *drv = priv;
192 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
193 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
194 __func__, priv, params->freq, params->pairwise_suite,
195 params->group_suite, params->key_mgmt_suite,
196 params->auth_alg, params->mode);
197 if (params->bssid) {
198 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
199 MAC2STR(params->bssid));
200 }
201 if (params->ssid) {
202 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
203 params->ssid, params->ssid_len);
204 }
205 if (params->wpa_ie) {
206 wpa_hexdump(MSG_DEBUG, " wpa_ie",
207 params->wpa_ie, params->wpa_ie_len);
208 drv->assoc_wpa_ie_len = params->wpa_ie_len;
209 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
210 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
211 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
212 drv->assoc_wpa_ie_len);
213 } else
214 drv->assoc_wpa_ie_len = 0;
215
216 if (drv->test_dir && params->bssid) {
217 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
218 drv->hostapd_addr.sun_family = AF_UNIX;
219 os_snprintf(drv->hostapd_addr.sun_path,
220 sizeof(drv->hostapd_addr.sun_path),
221 "%s/AP-" MACSTR,
222 drv->test_dir, MAC2STR(params->bssid));
223 drv->hostapd_addr_set = 1;
224 }
225
226 if (drv->test_socket >= 0 && drv->hostapd_addr_set) {
227 char cmd[200], *pos, *end;
228 int ret;
229 end = cmd + sizeof(cmd);
230 pos = cmd;
231 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
232 MAC2STR(drv->own_addr));
233 if (ret >= 0 && ret < end - pos)
234 pos += ret;
235 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
236 params->ssid_len);
237 ret = os_snprintf(pos, end - pos, " ");
238 if (ret >= 0 && ret < end - pos)
239 pos += ret;
240 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
241 params->wpa_ie_len);
242 end[-1] = '\0';
243 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
244 (struct sockaddr *) &drv->hostapd_addr,
245 sizeof(drv->hostapd_addr)) < 0) {
246 perror("sendto(test_socket)");
247 return -1;
248 }
249
250 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
251 drv->ssid_len = params->ssid_len;
252 } else {
253 drv->associated = 1;
254 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
255 }
256
257 return 0;
258 }
259
260
261 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
262 {
263 struct wpa_driver_test_data *drv = priv;
264 os_memcpy(bssid, drv->bssid, ETH_ALEN);
265 return 0;
266 }
267
268
269 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
270 {
271 struct wpa_driver_test_data *drv = priv;
272 os_memcpy(ssid, drv->ssid, 32);
273 return drv->ssid_len;
274 }
275
276
277 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
278 {
279 if (drv->test_socket >= 0 &&
280 sendto(drv->test_socket, "DISASSOC", 8, 0,
281 (struct sockaddr *) &drv->hostapd_addr,
282 sizeof(drv->hostapd_addr)) < 0) {
283 perror("sendto(test_socket)");
284 return -1;
285 }
286 return 0;
287 }
288
289
290 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
291 int reason_code)
292 {
293 struct wpa_driver_test_data *drv = priv;
294 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
295 __func__, MAC2STR(addr), reason_code);
296 os_memset(drv->bssid, 0, ETH_ALEN);
297 drv->associated = 0;
298 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
299 return wpa_driver_test_send_disassoc(drv);
300 }
301
302
303 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
304 int reason_code)
305 {
306 struct wpa_driver_test_data *drv = priv;
307 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
308 __func__, MAC2STR(addr), reason_code);
309 os_memset(drv->bssid, 0, ETH_ALEN);
310 drv->associated = 0;
311 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
312 return wpa_driver_test_send_disassoc(drv);
313 }
314
315
316 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
317 struct sockaddr_un *from,
318 socklen_t fromlen,
319 const char *data)
320 {
321 struct wpa_scan_res *res;
322 const char *pos, *pos2;
323 size_t len;
324 u8 *ie_pos, *ie_start, *ie_end;
325 #define MAX_IE_LEN 1000
326
327 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
328 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
329 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
330 "result");
331 return;
332 }
333
334 /* SCANRESP BSSID SSID IEs */
335
336 res = os_zalloc(sizeof(*res) + MAX_IE_LEN);
337 if (res == NULL)
338 return;
339 ie_start = ie_pos = (u8 *) (res + 1);
340 ie_end = ie_pos + MAX_IE_LEN;
341
342 if (hwaddr_aton(data, res->bssid)) {
343 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
344 os_free(res);
345 return;
346 }
347
348 pos = data + 17;
349 while (*pos == ' ')
350 pos++;
351 pos2 = os_strchr(pos, ' ');
352 if (pos2 == NULL) {
353 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
354 "in scanres");
355 os_free(res);
356 return;
357 }
358 len = (pos2 - pos) / 2;
359 if (len > 32)
360 len = 32;
361 /*
362 * Generate SSID IE from the SSID field since this IE is not included
363 * in the main IE field.
364 */
365 *ie_pos++ = WLAN_EID_SSID;
366 *ie_pos++ = len;
367 if (hexstr2bin(pos, ie_pos, len) < 0) {
368 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
369 os_free(res);
370 return;
371 }
372 ie_pos += len;
373
374 pos = pos2 + 1;
375 pos2 = os_strchr(pos, ' ');
376 if (pos2 == NULL)
377 len = os_strlen(pos) / 2;
378 else
379 len = (pos2 - pos) / 2;
380 if ((int) len > ie_end - ie_pos)
381 len = ie_end - ie_pos;
382 if (hexstr2bin(pos, ie_pos, len) < 0) {
383 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
384 os_free(res);
385 return;
386 }
387 ie_pos += len;
388 res->ie_len = ie_pos - ie_start;
389
390 if (pos2) {
391 pos = pos2 + 1;
392 while (*pos == ' ')
393 pos++;
394 if (os_strncmp(pos, "PRIVACY", 7) == 0)
395 res->caps |= IEEE80211_CAP_PRIVACY;
396 }
397
398 os_free(drv->scanres[drv->num_scanres]);
399 drv->scanres[drv->num_scanres++] = res;
400 }
401
402
403 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
404 struct sockaddr_un *from,
405 socklen_t fromlen,
406 const char *data)
407 {
408 /* ASSOCRESP BSSID <res> */
409 if (hwaddr_aton(data, drv->bssid)) {
410 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
411 "assocresp");
412 }
413 if (drv->use_associnfo) {
414 union wpa_event_data event;
415 os_memset(&event, 0, sizeof(event));
416 event.assoc_info.req_ies = drv->assoc_wpa_ie;
417 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
418 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
419 }
420 drv->associated = 1;
421 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
422 }
423
424
425 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
426 struct sockaddr_un *from,
427 socklen_t fromlen)
428 {
429 drv->associated = 0;
430 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
431 }
432
433
434 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
435 struct sockaddr_un *from,
436 socklen_t fromlen,
437 const u8 *data, size_t data_len)
438 {
439 const u8 *src = drv->bssid;
440
441 if (data_len > 14) {
442 /* Skip Ethernet header */
443 src = data + ETH_ALEN;
444 data += 14;
445 data_len -= 14;
446 }
447 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len);
448 }
449
450
451 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
452 struct sockaddr_un *from,
453 socklen_t fromlen,
454 const u8 *data, size_t data_len)
455 {
456 #ifdef CONFIG_CLIENT_MLME
457 struct ieee80211_rx_status rx_status;
458 os_memset(&rx_status, 0, sizeof(rx_status));
459 wpa_supplicant_sta_rx(drv->ctx, data, data_len, &rx_status);
460 #endif /* CONFIG_CLIENT_MLME */
461 }
462
463
464 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
465 void *sock_ctx)
466 {
467 struct wpa_driver_test_data *drv = eloop_ctx;
468 char *buf;
469 int res;
470 struct sockaddr_un from;
471 socklen_t fromlen = sizeof(from);
472 const size_t buflen = 2000;
473
474 buf = os_malloc(buflen);
475 if (buf == NULL)
476 return;
477 res = recvfrom(sock, buf, buflen - 1, 0,
478 (struct sockaddr *) &from, &fromlen);
479 if (res < 0) {
480 perror("recvfrom(test_socket)");
481 os_free(buf);
482 return;
483 }
484 buf[res] = '\0';
485
486 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
487
488 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
489 wpa_driver_test_scanresp(drv, &from, fromlen, buf + 9);
490 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
491 wpa_driver_test_assocresp(drv, &from, fromlen, buf + 10);
492 } else if (os_strcmp(buf, "DISASSOC") == 0) {
493 wpa_driver_test_disassoc(drv, &from, fromlen);
494 } else if (os_strcmp(buf, "DEAUTH") == 0) {
495 wpa_driver_test_disassoc(drv, &from, fromlen);
496 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
497 wpa_driver_test_eapol(drv, &from, fromlen,
498 (const u8 *) buf + 6, res - 6);
499 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
500 wpa_driver_test_mlme(drv, &from, fromlen,
501 (const u8 *) buf + 5, res - 5);
502 } else {
503 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
504 (u8 *) buf, res);
505 }
506 os_free(buf);
507 }
508
509
510 static void * wpa_driver_test_init(void *ctx, const char *ifname)
511 {
512 struct wpa_driver_test_data *drv;
513
514 drv = os_zalloc(sizeof(*drv));
515 if (drv == NULL)
516 return NULL;
517 drv->ctx = ctx;
518 drv->test_socket = -1;
519
520 /* Set dummy BSSID and SSID for testing. */
521 drv->bssid[0] = 0x02;
522 drv->bssid[1] = 0x00;
523 drv->bssid[2] = 0x00;
524 drv->bssid[3] = 0x00;
525 drv->bssid[4] = 0x00;
526 drv->bssid[5] = 0x01;
527 os_memcpy(drv->ssid, "test", 5);
528 drv->ssid_len = 4;
529
530 /* Generate a MAC address to help testing with multiple STAs */
531 drv->own_addr[0] = 0x02; /* locally administered */
532 sha1_prf((const u8 *) ifname, os_strlen(ifname),
533 "wpa_supplicant test mac addr generation",
534 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
535 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
536
537 return drv;
538 }
539
540
541 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
542 {
543 if (drv->test_socket >= 0) {
544 eloop_unregister_read_sock(drv->test_socket);
545 close(drv->test_socket);
546 drv->test_socket = -1;
547 }
548
549 if (drv->own_socket_path) {
550 unlink(drv->own_socket_path);
551 os_free(drv->own_socket_path);
552 drv->own_socket_path = NULL;
553 }
554 }
555
556
557 static void wpa_driver_test_deinit(void *priv)
558 {
559 struct wpa_driver_test_data *drv = priv;
560 int i;
561 wpa_driver_test_close_test_socket(drv);
562 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
563 eloop_cancel_timeout(wpa_driver_test_poll, drv, NULL);
564 os_free(drv->test_dir);
565 for (i = 0; i < MAX_SCAN_RESULTS; i++)
566 os_free(drv->scanres[i]);
567 os_free(drv);
568 }
569
570
571 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
572 const char *dir)
573 {
574 static unsigned int counter = 0;
575 struct sockaddr_un addr;
576 size_t len;
577
578 os_free(drv->own_socket_path);
579 if (dir) {
580 len = os_strlen(dir) + 30;
581 drv->own_socket_path = os_malloc(len);
582 if (drv->own_socket_path == NULL)
583 return -1;
584 os_snprintf(drv->own_socket_path, len, "%s/STA-" MACSTR,
585 dir, MAC2STR(drv->own_addr));
586 } else {
587 drv->own_socket_path = os_malloc(100);
588 if (drv->own_socket_path == NULL)
589 return -1;
590 os_snprintf(drv->own_socket_path, 100,
591 "/tmp/wpa_supplicant_test-%d-%d",
592 getpid(), counter++);
593 }
594
595 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
596 if (drv->test_socket < 0) {
597 perror("socket(PF_UNIX)");
598 os_free(drv->own_socket_path);
599 drv->own_socket_path = NULL;
600 return -1;
601 }
602
603 os_memset(&addr, 0, sizeof(addr));
604 addr.sun_family = AF_UNIX;
605 os_strlcpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
606 if (bind(drv->test_socket, (struct sockaddr *) &addr,
607 sizeof(addr)) < 0) {
608 perror("bind(PF_UNIX)");
609 close(drv->test_socket);
610 unlink(drv->own_socket_path);
611 os_free(drv->own_socket_path);
612 drv->own_socket_path = NULL;
613 return -1;
614 }
615
616 eloop_register_read_sock(drv->test_socket,
617 wpa_driver_test_receive_unix, drv, NULL);
618
619 return 0;
620 }
621
622
623 static int wpa_driver_test_set_param(void *priv, const char *param)
624 {
625 struct wpa_driver_test_data *drv = priv;
626 const char *pos, *pos2;
627 size_t len;
628
629 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
630 if (param == NULL)
631 return 0;
632
633 wpa_driver_test_close_test_socket(drv);
634 pos = os_strstr(param, "test_socket=");
635 if (pos) {
636 pos += 12;
637 pos2 = os_strchr(pos, ' ');
638 if (pos2)
639 len = pos2 - pos;
640 else
641 len = os_strlen(pos);
642 if (len > sizeof(drv->hostapd_addr.sun_path))
643 return -1;
644 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
645 drv->hostapd_addr.sun_family = AF_UNIX;
646 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
647 drv->hostapd_addr_set = 1;
648 }
649
650 pos = os_strstr(param, "test_dir=");
651 if (pos) {
652 char *end;
653 os_free(drv->test_dir);
654 drv->test_dir = os_strdup(pos + 9);
655 if (drv->test_dir == NULL)
656 return -1;
657 end = os_strchr(drv->test_dir, ' ');
658 if (end)
659 *end = '\0';
660 wpa_driver_test_attach(drv, drv->test_dir);
661 } else
662 wpa_driver_test_attach(drv, NULL);
663
664 if (os_strstr(param, "use_associnfo=1")) {
665 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
666 drv->use_associnfo = 1;
667 }
668
669 #ifdef CONFIG_CLIENT_MLME
670 if (os_strstr(param, "use_mlme=1")) {
671 wpa_printf(MSG_DEBUG, "test_driver: Use internal MLME");
672 drv->use_mlme = 1;
673 }
674 #endif /* CONFIG_CLIENT_MLME */
675
676 return 0;
677 }
678
679
680 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
681 {
682 struct wpa_driver_test_data *drv = priv;
683 wpa_printf(MSG_DEBUG, "%s", __func__);
684 return drv->own_addr;
685 }
686
687
688 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
689 const u8 *data, size_t data_len)
690 {
691 struct wpa_driver_test_data *drv = priv;
692 struct msghdr msg;
693 struct iovec io[3];
694 struct l2_ethhdr eth;
695 struct sockaddr_un addr;
696
697 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
698
699 os_memset(&eth, 0, sizeof(eth));
700 os_memcpy(eth.h_dest, dest, ETH_ALEN);
701 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
702 eth.h_proto = host_to_be16(proto);
703
704 io[0].iov_base = "EAPOL ";
705 io[0].iov_len = 6;
706 io[1].iov_base = (u8 *) &eth;
707 io[1].iov_len = sizeof(eth);
708 io[2].iov_base = (u8 *) data;
709 io[2].iov_len = data_len;
710
711 os_memset(&msg, 0, sizeof(msg));
712 msg.msg_iov = io;
713 msg.msg_iovlen = 3;
714 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
715 drv->test_dir == NULL) {
716 msg.msg_name = &drv->hostapd_addr;
717 msg.msg_namelen = sizeof(drv->hostapd_addr);
718 } else {
719 struct stat st;
720 os_memset(&addr, 0, sizeof(addr));
721 addr.sun_family = AF_UNIX;
722 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
723 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
724 if (stat(addr.sun_path, &st) < 0) {
725 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
726 "%s/AP-" MACSTR,
727 drv->test_dir, MAC2STR(dest));
728 }
729 msg.msg_name = &addr;
730 msg.msg_namelen = sizeof(addr);
731 }
732
733 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
734 perror("sendmsg(test_socket)");
735 return -1;
736 }
737
738 return 0;
739 }
740
741
742 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
743 {
744 struct wpa_driver_test_data *drv = priv;
745 os_memset(capa, 0, sizeof(*capa));
746 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
747 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
748 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
749 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
750 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE |
751 WPA_DRIVER_CAPA_KEY_MGMT_FT |
752 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
753 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
754 WPA_DRIVER_CAPA_ENC_WEP104 |
755 WPA_DRIVER_CAPA_ENC_TKIP |
756 WPA_DRIVER_CAPA_ENC_CCMP;
757 capa->auth = WPA_DRIVER_AUTH_OPEN |
758 WPA_DRIVER_AUTH_SHARED |
759 WPA_DRIVER_AUTH_LEAP;
760 if (drv->use_mlme)
761 capa->flags |= WPA_DRIVER_FLAGS_USER_SPACE_MLME;
762
763 return 0;
764 }
765
766
767 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
768 int protect_type,
769 int key_type)
770 {
771 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
772 __func__, protect_type, key_type);
773
774 if (addr) {
775 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
776 __func__, MAC2STR(addr));
777 }
778
779 return 0;
780 }
781
782
783 #ifdef CONFIG_CLIENT_MLME
784 static struct wpa_hw_modes *
785 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
786 {
787 struct wpa_hw_modes *modes;
788
789 *num_modes = 1;
790 *flags = 0;
791 modes = os_zalloc(*num_modes * sizeof(struct wpa_hw_modes));
792 if (modes == NULL)
793 return NULL;
794 modes[0].mode = WPA_MODE_IEEE80211G;
795 modes[0].num_channels = 1;
796 modes[0].num_rates = 1;
797 modes[0].channels = os_zalloc(sizeof(struct wpa_channel_data));
798 modes[0].rates = os_zalloc(sizeof(struct wpa_rate_data));
799 if (modes[0].channels == NULL || modes[0].rates == NULL) {
800 wpa_supplicant_sta_free_hw_features(modes, *num_modes);
801 return NULL;
802 }
803 modes[0].channels[0].chan = 1;
804 modes[0].channels[0].freq = 2412;
805 modes[0].channels[0].flag = WPA_CHAN_W_SCAN | WPA_CHAN_W_ACTIVE_SCAN;
806 modes[0].rates[0].rate = 10;
807 modes[0].rates[0].flags = WPA_RATE_BASIC | WPA_RATE_SUPPORTED |
808 WPA_RATE_CCK | WPA_RATE_MANDATORY;
809
810 return modes;
811 }
812
813
814 int wpa_driver_test_set_channel(void *priv, wpa_hw_mode phymode, int chan,
815 int freq)
816 {
817 wpa_printf(MSG_DEBUG, "%s: phymode=%d chan=%d freq=%d",
818 __func__, phymode, chan, freq);
819 return 0;
820 }
821
822
823 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
824 size_t data_len)
825 {
826 struct wpa_driver_test_data *drv = priv;
827 struct msghdr msg;
828 struct iovec io[2];
829 struct sockaddr_un addr;
830 const u8 *dest;
831 struct dirent *dent;
832 DIR *dir;
833
834 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
835 if (data_len < 10)
836 return -1;
837 dest = data + 4;
838
839 io[0].iov_base = "MLME ";
840 io[0].iov_len = 5;
841 io[1].iov_base = (u8 *) data;
842 io[1].iov_len = data_len;
843
844 os_memset(&msg, 0, sizeof(msg));
845 msg.msg_iov = io;
846 msg.msg_iovlen = 2;
847 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
848 drv->test_dir == NULL) {
849 msg.msg_name = &drv->hostapd_addr;
850 msg.msg_namelen = sizeof(drv->hostapd_addr);
851 } else if (os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0)
852 {
853 dir = opendir(drv->test_dir);
854 if (dir == NULL)
855 return -1;
856 while ((dent = readdir(dir))) {
857 #ifdef _DIRENT_HAVE_D_TYPE
858 /* Skip the file if it is not a socket.
859 * Also accept DT_UNKNOWN (0) in case
860 * the C library or underlying file
861 * system does not support d_type. */
862 if (dent->d_type != DT_SOCK &&
863 dent->d_type != DT_UNKNOWN)
864 continue;
865 #endif /* _DIRENT_HAVE_D_TYPE */
866 if (os_strcmp(dent->d_name, ".") == 0 ||
867 os_strcmp(dent->d_name, "..") == 0)
868 continue;
869 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
870 __func__, dent->d_name);
871 os_memset(&addr, 0, sizeof(addr));
872 addr.sun_family = AF_UNIX;
873 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
874 "%s/%s", drv->test_dir, dent->d_name);
875
876 msg.msg_name = &addr;
877 msg.msg_namelen = sizeof(addr);
878
879 if (sendmsg(drv->test_socket, &msg, 0) < 0)
880 perror("sendmsg(test_socket)");
881 }
882 closedir(dir);
883 return 0;
884 } else {
885 struct stat st;
886 os_memset(&addr, 0, sizeof(addr));
887 addr.sun_family = AF_UNIX;
888 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
889 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
890 if (stat(addr.sun_path, &st) < 0) {
891 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
892 "%s/STA-" MACSTR,
893 drv->test_dir, MAC2STR(dest));
894 }
895 msg.msg_name = &addr;
896 msg.msg_namelen = sizeof(addr);
897 }
898
899 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
900 perror("sendmsg(test_socket)");
901 return -1;
902 }
903
904 return 0;
905 }
906
907
908 static int wpa_driver_test_mlme_add_sta(void *priv, const u8 *addr,
909 const u8 *supp_rates,
910 size_t supp_rates_len)
911 {
912 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
913 return 0;
914 }
915
916
917 static int wpa_driver_test_mlme_remove_sta(void *priv, const u8 *addr)
918 {
919 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
920 return 0;
921 }
922
923
924 int wpa_driver_test_set_ssid(void *priv, const u8 *ssid, size_t ssid_len)
925 {
926 wpa_printf(MSG_DEBUG, "%s", __func__);
927 return 0;
928 }
929
930
931 int wpa_driver_test_set_bssid(void *priv, const u8 *bssid)
932 {
933 wpa_printf(MSG_DEBUG, "%s: bssid=" MACSTR, __func__, MAC2STR(bssid));
934 return 0;
935 }
936 #endif /* CONFIG_CLIENT_MLME */
937
938
939 const struct wpa_driver_ops wpa_driver_test_ops = {
940 "test",
941 "wpa_supplicant test driver",
942 wpa_driver_test_get_bssid,
943 wpa_driver_test_get_ssid,
944 wpa_driver_test_set_wpa,
945 wpa_driver_test_set_key,
946 wpa_driver_test_init,
947 wpa_driver_test_deinit,
948 wpa_driver_test_set_param,
949 NULL /* set_countermeasures */,
950 NULL /* set_drop_unencrypted */,
951 wpa_driver_test_scan,
952 NULL /* get_scan_results */,
953 wpa_driver_test_deauthenticate,
954 wpa_driver_test_disassociate,
955 wpa_driver_test_associate,
956 NULL /* set_auth_alg */,
957 NULL /* add_pmkid */,
958 NULL /* remove_pmkid */,
959 NULL /* flush_pmkid */,
960 wpa_driver_test_get_capa,
961 NULL /* poll */,
962 NULL /* get_ifname */,
963 wpa_driver_test_get_mac_addr,
964 wpa_driver_test_send_eapol,
965 NULL /* set_operstate */,
966 wpa_driver_test_mlme_setprotection,
967 #ifdef CONFIG_CLIENT_MLME
968 wpa_driver_test_get_hw_feature_data,
969 wpa_driver_test_set_channel,
970 wpa_driver_test_set_ssid,
971 wpa_driver_test_set_bssid,
972 wpa_driver_test_send_mlme,
973 wpa_driver_test_mlme_add_sta,
974 wpa_driver_test_mlme_remove_sta,
975 #else /* CONFIG_CLIENT_MLME */
976 NULL /* get_hw_feature_data */,
977 NULL /* set_channel */,
978 NULL /* set_ssid */,
979 NULL /* set_bssid */,
980 NULL /* send_mlme */,
981 NULL /* mlme_add_sta */,
982 NULL /* mlme_remove_sta */,
983 #endif /* CONFIG_CLIENT_MLME */
984 NULL /* update_ft_ies */,
985 NULL /* send_ft_action */,
986 wpa_driver_test_get_scan_results2,
987 NULL /* set_probe_req_ie */,
988 NULL /* set_mode */
989 };