]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/drivers/driver_test.c
Replace wpa_supplicant_sta_rx() call with driver event
[thirdparty/hostap.git] / src / drivers / driver_test.c
1 /*
2 * Testing driver interface for a simulated network driver
3 * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15 /* Make sure we get winsock2.h for Windows build to get sockaddr_storage */
16 #include "build_config.h"
17 #ifdef CONFIG_NATIVE_WINDOWS
18 #include <winsock2.h>
19 #endif /* CONFIG_NATIVE_WINDOWS */
20
21 #include "utils/includes.h"
22
23 #ifndef CONFIG_NATIVE_WINDOWS
24 #include <sys/un.h>
25 #include <dirent.h>
26 #include <sys/stat.h>
27 #define DRIVER_TEST_UNIX
28 #endif /* CONFIG_NATIVE_WINDOWS */
29
30 #include "utils/common.h"
31 #include "utils/eloop.h"
32 #include "utils/trace.h"
33 #include "common/ieee802_11_defs.h"
34 #include "crypto/sha1.h"
35 #include "l2_packet/l2_packet.h"
36 #include "driver.h"
37
38
39 struct test_client_socket {
40 struct test_client_socket *next;
41 u8 addr[ETH_ALEN];
42 struct sockaddr_un un;
43 socklen_t unlen;
44 struct test_driver_bss *bss;
45 };
46
47 struct test_driver_bss {
48 struct test_driver_bss *next;
49 void *bss_ctx;
50 char ifname[IFNAMSIZ + 1];
51 u8 bssid[ETH_ALEN];
52 u8 *ie;
53 size_t ielen;
54 u8 *wps_beacon_ie;
55 size_t wps_beacon_ie_len;
56 u8 *wps_probe_resp_ie;
57 size_t wps_probe_resp_ie_len;
58 u8 ssid[32];
59 size_t ssid_len;
60 int privacy;
61 };
62
63 struct wpa_driver_test_global {
64 int bss_add_used;
65 u8 req_addr[ETH_ALEN];
66 };
67
68 struct wpa_driver_test_data {
69 struct wpa_driver_test_global *global;
70 void *ctx;
71 WPA_TRACE_REF(ctx);
72 char ifname[IFNAMSIZ + 1];
73 u8 own_addr[ETH_ALEN];
74 int test_socket;
75 #ifdef DRIVER_TEST_UNIX
76 struct sockaddr_un hostapd_addr;
77 #endif /* DRIVER_TEST_UNIX */
78 int hostapd_addr_set;
79 struct sockaddr_in hostapd_addr_udp;
80 int hostapd_addr_udp_set;
81 char *own_socket_path;
82 char *test_dir;
83 u8 bssid[ETH_ALEN];
84 u8 ssid[32];
85 size_t ssid_len;
86 #define MAX_SCAN_RESULTS 30
87 struct wpa_scan_res *scanres[MAX_SCAN_RESULTS];
88 size_t num_scanres;
89 int use_associnfo;
90 u8 assoc_wpa_ie[80];
91 size_t assoc_wpa_ie_len;
92 int use_mlme;
93 int associated;
94 u8 *probe_req_ie;
95 size_t probe_req_ie_len;
96 int ibss;
97 int privacy;
98 int ap;
99
100 struct test_client_socket *cli;
101 struct test_driver_bss *bss;
102 int udp_port;
103 };
104
105
106 static void wpa_driver_test_deinit(void *priv);
107 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
108 const char *dir, int ap);
109 static void wpa_driver_test_close_test_socket(
110 struct wpa_driver_test_data *drv);
111
112 #ifdef CONFIG_AP
113 void ap_mgmt_rx(void *ctx, u8 *buf, size_t len, u16 stype,
114 struct hostapd_frame_info *fi);
115 void ap_mgmt_tx_cb(void *ctx, u8 *buf, size_t len, u16 stype, int ok);
116
117 #else /* CONFIG_AP */
118 #ifndef HOSTAPD
119 static inline void ap_mgmt_rx(void *ctx, u8 *buf, size_t len, u16 stype,
120 struct hostapd_frame_info *fi)
121 {
122 }
123
124 static inline void ap_mgmt_tx_cb(void *ctx, u8 *buf, size_t len, u16 stype,
125 int ok)
126 {
127 }
128 #endif /* HOSTAPD */
129 #endif /* CONFIG_AP */
130
131
132 static void test_driver_free_bss(struct test_driver_bss *bss)
133 {
134 os_free(bss->ie);
135 os_free(bss->wps_beacon_ie);
136 os_free(bss->wps_probe_resp_ie);
137 os_free(bss);
138 }
139
140
141 static void test_driver_free_bsses(struct wpa_driver_test_data *drv)
142 {
143 struct test_driver_bss *bss, *prev_bss;
144
145 bss = drv->bss;
146 while (bss) {
147 prev_bss = bss;
148 bss = bss->next;
149 test_driver_free_bss(prev_bss);
150 }
151
152 drv->bss = NULL;
153 }
154
155
156 static struct test_client_socket *
157 test_driver_get_cli(struct wpa_driver_test_data *drv, struct sockaddr_un *from,
158 socklen_t fromlen)
159 {
160 struct test_client_socket *cli = drv->cli;
161
162 while (cli) {
163 if (cli->unlen == fromlen &&
164 strncmp(cli->un.sun_path, from->sun_path,
165 fromlen - sizeof(cli->un.sun_family)) == 0)
166 return cli;
167 cli = cli->next;
168 }
169
170 return NULL;
171 }
172
173
174 static int test_driver_send_eapol(void *priv, const u8 *addr, const u8 *data,
175 size_t data_len, int encrypt,
176 const u8 *own_addr)
177 {
178 struct wpa_driver_test_data *drv = priv;
179 struct test_client_socket *cli;
180 struct msghdr msg;
181 struct iovec io[3];
182 struct l2_ethhdr eth;
183
184 if (drv->test_socket < 0)
185 return -1;
186
187 cli = drv->cli;
188 while (cli) {
189 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
190 break;
191 cli = cli->next;
192 }
193
194 if (!cli) {
195 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
196 __func__);
197 return -1;
198 }
199
200 memcpy(eth.h_dest, addr, ETH_ALEN);
201 memcpy(eth.h_source, own_addr, ETH_ALEN);
202 eth.h_proto = host_to_be16(ETH_P_EAPOL);
203
204 io[0].iov_base = "EAPOL ";
205 io[0].iov_len = 6;
206 io[1].iov_base = &eth;
207 io[1].iov_len = sizeof(eth);
208 io[2].iov_base = (u8 *) data;
209 io[2].iov_len = data_len;
210
211 memset(&msg, 0, sizeof(msg));
212 msg.msg_iov = io;
213 msg.msg_iovlen = 3;
214 msg.msg_name = &cli->un;
215 msg.msg_namelen = cli->unlen;
216 return sendmsg(drv->test_socket, &msg, 0);
217 }
218
219
220 static int test_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
221 u16 proto, const u8 *data, size_t data_len)
222 {
223 struct wpa_driver_test_data *drv = priv;
224 struct msghdr msg;
225 struct iovec io[3];
226 struct l2_ethhdr eth;
227 char desttxt[30];
228 struct sockaddr_un addr;
229 struct dirent *dent;
230 DIR *dir;
231 int ret = 0, broadcast = 0, count = 0;
232
233 if (drv->test_socket < 0 || drv->test_dir == NULL) {
234 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
235 "test_dir=%p)",
236 __func__, drv->test_socket, drv->test_dir);
237 return -1;
238 }
239
240 broadcast = memcmp(dst, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
241 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst));
242
243 memcpy(eth.h_dest, dst, ETH_ALEN);
244 memcpy(eth.h_source, src, ETH_ALEN);
245 eth.h_proto = host_to_be16(proto);
246
247 io[0].iov_base = "ETHER ";
248 io[0].iov_len = 6;
249 io[1].iov_base = &eth;
250 io[1].iov_len = sizeof(eth);
251 io[2].iov_base = (u8 *) data;
252 io[2].iov_len = data_len;
253
254 memset(&msg, 0, sizeof(msg));
255 msg.msg_iov = io;
256 msg.msg_iovlen = 3;
257
258 dir = opendir(drv->test_dir);
259 if (dir == NULL) {
260 perror("test_driver: opendir");
261 return -1;
262 }
263 while ((dent = readdir(dir))) {
264 #ifdef _DIRENT_HAVE_D_TYPE
265 /* Skip the file if it is not a socket. Also accept
266 * DT_UNKNOWN (0) in case the C library or underlying file
267 * system does not support d_type. */
268 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
269 continue;
270 #endif /* _DIRENT_HAVE_D_TYPE */
271 if (strcmp(dent->d_name, ".") == 0 ||
272 strcmp(dent->d_name, "..") == 0)
273 continue;
274
275 memset(&addr, 0, sizeof(addr));
276 addr.sun_family = AF_UNIX;
277 snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
278 drv->test_dir, dent->d_name);
279
280 if (strcmp(addr.sun_path, drv->own_socket_path) == 0)
281 continue;
282 if (!broadcast && strstr(dent->d_name, desttxt) == NULL)
283 continue;
284
285 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
286 __func__, dent->d_name);
287
288 msg.msg_name = &addr;
289 msg.msg_namelen = sizeof(addr);
290 ret = sendmsg(drv->test_socket, &msg, 0);
291 if (ret < 0)
292 perror("driver_test: sendmsg");
293 count++;
294 }
295 closedir(dir);
296
297 if (!broadcast && count == 0) {
298 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
299 __func__, MAC2STR(dst));
300 return -1;
301 }
302
303 return ret;
304 }
305
306
307 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
308 size_t data_len)
309 {
310 struct wpa_driver_test_data *drv = priv;
311 struct msghdr msg;
312 struct iovec io[2];
313 const u8 *dest;
314 struct sockaddr_un addr;
315 struct dirent *dent;
316 DIR *dir;
317 int broadcast;
318 int ret = 0;
319 struct ieee80211_hdr *hdr;
320 u16 fc;
321 #ifdef HOSTAPD
322 char desttxt[30];
323 #endif /* HOSTAPD */
324 union wpa_event_data event;
325
326 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
327 if (drv->test_socket < 0 || data_len < 10) {
328 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
329 " test_dir=%p)",
330 __func__, drv->test_socket,
331 (unsigned long) data_len,
332 drv->test_dir);
333 return -1;
334 }
335
336 dest = data + 4;
337 broadcast = os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
338
339 #ifdef HOSTAPD
340 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest));
341 #endif /* HOSTAPD */
342
343 io[0].iov_base = "MLME ";
344 io[0].iov_len = 5;
345 io[1].iov_base = (void *) data;
346 io[1].iov_len = data_len;
347
348 os_memset(&msg, 0, sizeof(msg));
349 msg.msg_iov = io;
350 msg.msg_iovlen = 2;
351
352 #ifdef HOSTAPD
353 if (drv->test_dir == NULL) {
354 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
355 return -1;
356 }
357
358 dir = opendir(drv->test_dir);
359 if (dir == NULL) {
360 perror("test_driver: opendir");
361 return -1;
362 }
363 while ((dent = readdir(dir))) {
364 #ifdef _DIRENT_HAVE_D_TYPE
365 /* Skip the file if it is not a socket. Also accept
366 * DT_UNKNOWN (0) in case the C library or underlying file
367 * system does not support d_type. */
368 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
369 continue;
370 #endif /* _DIRENT_HAVE_D_TYPE */
371 if (os_strcmp(dent->d_name, ".") == 0 ||
372 os_strcmp(dent->d_name, "..") == 0)
373 continue;
374
375 os_memset(&addr, 0, sizeof(addr));
376 addr.sun_family = AF_UNIX;
377 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
378 drv->test_dir, dent->d_name);
379
380 if (os_strcmp(addr.sun_path, drv->own_socket_path) == 0)
381 continue;
382 if (!broadcast && os_strstr(dent->d_name, desttxt) == NULL)
383 continue;
384
385 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
386 __func__, dent->d_name);
387
388 msg.msg_name = &addr;
389 msg.msg_namelen = sizeof(addr);
390 ret = sendmsg(drv->test_socket, &msg, 0);
391 if (ret < 0)
392 perror("driver_test: sendmsg(test_socket)");
393 }
394 closedir(dir);
395 #else /* HOSTAPD */
396
397 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
398 drv->test_dir == NULL) {
399 if (drv->hostapd_addr_udp_set) {
400 msg.msg_name = &drv->hostapd_addr_udp;
401 msg.msg_namelen = sizeof(drv->hostapd_addr_udp);
402 } else {
403 #ifdef DRIVER_TEST_UNIX
404 msg.msg_name = &drv->hostapd_addr;
405 msg.msg_namelen = sizeof(drv->hostapd_addr);
406 #endif /* DRIVER_TEST_UNIX */
407 }
408 } else if (broadcast) {
409 dir = opendir(drv->test_dir);
410 if (dir == NULL)
411 return -1;
412 while ((dent = readdir(dir))) {
413 #ifdef _DIRENT_HAVE_D_TYPE
414 /* Skip the file if it is not a socket.
415 * Also accept DT_UNKNOWN (0) in case
416 * the C library or underlying file
417 * system does not support d_type. */
418 if (dent->d_type != DT_SOCK &&
419 dent->d_type != DT_UNKNOWN)
420 continue;
421 #endif /* _DIRENT_HAVE_D_TYPE */
422 if (os_strcmp(dent->d_name, ".") == 0 ||
423 os_strcmp(dent->d_name, "..") == 0)
424 continue;
425 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
426 __func__, dent->d_name);
427 os_memset(&addr, 0, sizeof(addr));
428 addr.sun_family = AF_UNIX;
429 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
430 "%s/%s", drv->test_dir, dent->d_name);
431
432 msg.msg_name = &addr;
433 msg.msg_namelen = sizeof(addr);
434
435 ret = sendmsg(drv->test_socket, &msg, 0);
436 if (ret < 0)
437 perror("driver_test: sendmsg(test_socket)");
438 }
439 closedir(dir);
440 return ret;
441 } else {
442 struct stat st;
443 os_memset(&addr, 0, sizeof(addr));
444 addr.sun_family = AF_UNIX;
445 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
446 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
447 if (stat(addr.sun_path, &st) < 0) {
448 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
449 "%s/STA-" MACSTR,
450 drv->test_dir, MAC2STR(dest));
451 }
452 msg.msg_name = &addr;
453 msg.msg_namelen = sizeof(addr);
454 }
455
456 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
457 perror("sendmsg(test_socket)");
458 return -1;
459 }
460 #endif /* HOSTAPD */
461
462 hdr = (struct ieee80211_hdr *) data;
463 fc = le_to_host16(hdr->frame_control);
464
465 os_memset(&event, 0, sizeof(event));
466 event.tx_status.type = WLAN_FC_GET_TYPE(fc);
467 event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
468 event.tx_status.dst = hdr->addr1;
469 event.tx_status.data = data;
470 event.tx_status.data_len = data_len;
471 event.tx_status.ack = ret >= 0;
472 wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
473
474 return ret;
475 }
476
477
478 static void test_driver_scan(struct wpa_driver_test_data *drv,
479 struct sockaddr_un *from, socklen_t fromlen,
480 char *data)
481 {
482 char buf[512], *pos, *end;
483 int ret;
484 struct test_driver_bss *bss;
485 u8 sa[ETH_ALEN];
486 u8 ie[512];
487 size_t ielen;
488
489 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */
490
491 wpa_printf(MSG_DEBUG, "test_driver: SCAN");
492
493 if (*data) {
494 if (*data != ' ' ||
495 hwaddr_aton(data + 1, sa)) {
496 wpa_printf(MSG_DEBUG, "test_driver: Unexpected SCAN "
497 "command format");
498 return;
499 }
500
501 data += 18;
502 while (*data == ' ')
503 data++;
504 ielen = os_strlen(data) / 2;
505 if (ielen > sizeof(ie))
506 ielen = sizeof(ie);
507 if (hexstr2bin(data, ie, ielen) < 0)
508 ielen = 0;
509
510 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR,
511 MAC2STR(sa));
512 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
513
514 #ifdef HOSTAPD
515 hostapd_probe_req_rx(drv->ctx, sa, ie, ielen);
516 #endif /* HOSTAPD */
517 }
518
519 for (bss = drv->bss; bss; bss = bss->next) {
520 pos = buf;
521 end = buf + sizeof(buf);
522
523 /* reply: SCANRESP BSSID SSID IEs */
524 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
525 MAC2STR(bss->bssid));
526 if (ret < 0 || ret >= end - pos)
527 return;
528 pos += ret;
529 pos += wpa_snprintf_hex(pos, end - pos,
530 bss->ssid, bss->ssid_len);
531 ret = snprintf(pos, end - pos, " ");
532 if (ret < 0 || ret >= end - pos)
533 return;
534 pos += ret;
535 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bss->ielen);
536 pos += wpa_snprintf_hex(pos, end - pos, bss->wps_probe_resp_ie,
537 bss->wps_probe_resp_ie_len);
538
539 if (bss->privacy) {
540 ret = snprintf(pos, end - pos, " PRIVACY");
541 if (ret < 0 || ret >= end - pos)
542 return;
543 pos += ret;
544 }
545
546 sendto(drv->test_socket, buf, pos - buf, 0,
547 (struct sockaddr *) from, fromlen);
548 }
549 }
550
551
552 static void test_driver_assoc(struct wpa_driver_test_data *drv,
553 struct sockaddr_un *from, socklen_t fromlen,
554 char *data)
555 {
556 struct test_client_socket *cli;
557 u8 ie[256], ssid[32];
558 size_t ielen, ssid_len = 0;
559 char *pos, *pos2, cmd[50];
560 struct test_driver_bss *bss;
561
562 /* data: STA-addr SSID(hex) IEs(hex) */
563
564 cli = os_zalloc(sizeof(*cli));
565 if (cli == NULL)
566 return;
567
568 if (hwaddr_aton(data, cli->addr)) {
569 printf("test_socket: Invalid MAC address '%s' in ASSOC\n",
570 data);
571 os_free(cli);
572 return;
573 }
574 pos = data + 17;
575 while (*pos == ' ')
576 pos++;
577 pos2 = strchr(pos, ' ');
578 ielen = 0;
579 if (pos2) {
580 ssid_len = (pos2 - pos) / 2;
581 if (hexstr2bin(pos, ssid, ssid_len) < 0) {
582 wpa_printf(MSG_DEBUG, "%s: Invalid SSID", __func__);
583 os_free(cli);
584 return;
585 }
586 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_assoc: SSID",
587 ssid, ssid_len);
588
589 pos = pos2 + 1;
590 ielen = strlen(pos) / 2;
591 if (ielen > sizeof(ie))
592 ielen = sizeof(ie);
593 if (hexstr2bin(pos, ie, ielen) < 0)
594 ielen = 0;
595 }
596
597 for (bss = drv->bss; bss; bss = bss->next) {
598 if (bss->ssid_len == ssid_len &&
599 memcmp(bss->ssid, ssid, ssid_len) == 0)
600 break;
601 }
602 if (bss == NULL) {
603 wpa_printf(MSG_DEBUG, "%s: No matching SSID found from "
604 "configured BSSes", __func__);
605 os_free(cli);
606 return;
607 }
608
609 cli->bss = bss;
610 memcpy(&cli->un, from, sizeof(cli->un));
611 cli->unlen = fromlen;
612 cli->next = drv->cli;
613 drv->cli = cli;
614 wpa_hexdump_ascii(MSG_DEBUG, "test_socket: ASSOC sun_path",
615 (const u8 *) cli->un.sun_path,
616 cli->unlen - sizeof(cli->un.sun_family));
617
618 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0",
619 MAC2STR(bss->bssid));
620 sendto(drv->test_socket, cmd, strlen(cmd), 0,
621 (struct sockaddr *) from, fromlen);
622
623 #ifdef HOSTAPD
624 if (hostapd_notif_assoc(bss->bss_ctx, cli->addr, ie, ielen) < 0)
625 wpa_printf(MSG_DEBUG, "test_driver: failed to add new STA");
626 #endif /* HOSTAPD */
627 }
628
629
630 static void test_driver_disassoc(struct wpa_driver_test_data *drv,
631 struct sockaddr_un *from, socklen_t fromlen)
632 {
633 struct test_client_socket *cli;
634
635 cli = test_driver_get_cli(drv, from, fromlen);
636 if (!cli)
637 return;
638
639 #ifdef HOSTAPD
640 hostapd_notif_disassoc(drv->ctx, cli->addr);
641 #endif /* HOSTAPD */
642 }
643
644
645 static void test_driver_eapol(struct wpa_driver_test_data *drv,
646 struct sockaddr_un *from, socklen_t fromlen,
647 u8 *data, size_t datalen)
648 {
649 #ifdef HOSTAPD
650 struct test_client_socket *cli;
651 #endif /* HOSTAPD */
652 const u8 *src = NULL;
653
654 if (datalen > 14) {
655 /* Skip Ethernet header */
656 src = data + ETH_ALEN;
657 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src="
658 MACSTR " proto=%04x",
659 MAC2STR(data), MAC2STR(src),
660 WPA_GET_BE16(data + 2 * ETH_ALEN));
661 data += 14;
662 datalen -= 14;
663 }
664 #ifdef HOSTAPD
665 cli = test_driver_get_cli(drv, from, fromlen);
666 if (cli) {
667 hostapd_eapol_receive(cli->bss->bss_ctx, cli->addr, data,
668 datalen);
669 } else {
670 wpa_printf(MSG_DEBUG, "test_socket: EAPOL from unknown "
671 "client");
672 }
673 #else /* HOSTAPD */
674 if (src)
675 wpa_supplicant_rx_eapol(drv->ctx, src, data, datalen);
676 #endif /* HOSTAPD */
677 }
678
679
680 static void test_driver_ether(struct wpa_driver_test_data *drv,
681 struct sockaddr_un *from, socklen_t fromlen,
682 u8 *data, size_t datalen)
683 {
684 struct l2_ethhdr *eth;
685
686 if (datalen < sizeof(*eth))
687 return;
688
689 eth = (struct l2_ethhdr *) data;
690 wpa_printf(MSG_DEBUG, "test_driver: RX ETHER dst=" MACSTR " src="
691 MACSTR " proto=%04x",
692 MAC2STR(eth->h_dest), MAC2STR(eth->h_source),
693 be_to_host16(eth->h_proto));
694
695 #ifdef CONFIG_IEEE80211R
696 if (be_to_host16(eth->h_proto) == ETH_P_RRB) {
697 union wpa_event_data ev;
698 os_memset(&ev, 0, sizeof(ev));
699 ev.ft_rrb_rx.src = eth->h_source;
700 ev.ft_rrb_rx.data = data + sizeof(*eth);
701 ev.ft_rrb_rx.data_len = datalen - sizeof(*eth);
702 }
703 #endif /* CONFIG_IEEE80211R */
704 }
705
706
707 static void test_driver_mlme(struct wpa_driver_test_data *drv,
708 struct sockaddr_un *from, socklen_t fromlen,
709 u8 *data, size_t datalen)
710 {
711 struct ieee80211_hdr *hdr;
712 u16 fc;
713 union wpa_event_data event;
714
715 hdr = (struct ieee80211_hdr *) data;
716
717 if (test_driver_get_cli(drv, from, fromlen) == NULL && datalen >= 16) {
718 struct test_client_socket *cli;
719 cli = os_zalloc(sizeof(*cli));
720 if (cli == NULL)
721 return;
722 wpa_printf(MSG_DEBUG, "Adding client entry for " MACSTR,
723 MAC2STR(hdr->addr2));
724 memcpy(cli->addr, hdr->addr2, ETH_ALEN);
725 memcpy(&cli->un, from, sizeof(cli->un));
726 cli->unlen = fromlen;
727 cli->next = drv->cli;
728 drv->cli = cli;
729 }
730
731 wpa_hexdump(MSG_MSGDUMP, "test_driver_mlme: received frame",
732 data, datalen);
733 fc = le_to_host16(hdr->frame_control);
734 if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) {
735 wpa_printf(MSG_ERROR, "%s: received non-mgmt frame",
736 __func__);
737 return;
738 }
739
740 os_memset(&event, 0, sizeof(event));
741 event.rx_mgmt.frame = data;
742 event.rx_mgmt.frame_len = datalen;
743 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
744 }
745
746
747 static void test_driver_receive_unix(int sock, void *eloop_ctx, void *sock_ctx)
748 {
749 struct wpa_driver_test_data *drv = eloop_ctx;
750 char buf[2000];
751 int res;
752 struct sockaddr_un from;
753 socklen_t fromlen = sizeof(from);
754
755 res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
756 (struct sockaddr *) &from, &fromlen);
757 if (res < 0) {
758 perror("recvfrom(test_socket)");
759 return;
760 }
761 buf[res] = '\0';
762
763 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
764
765 if (strncmp(buf, "SCAN", 4) == 0) {
766 test_driver_scan(drv, &from, fromlen, buf + 4);
767 } else if (strncmp(buf, "ASSOC ", 6) == 0) {
768 test_driver_assoc(drv, &from, fromlen, buf + 6);
769 } else if (strcmp(buf, "DISASSOC") == 0) {
770 test_driver_disassoc(drv, &from, fromlen);
771 } else if (strncmp(buf, "EAPOL ", 6) == 0) {
772 test_driver_eapol(drv, &from, fromlen, (u8 *) buf + 6,
773 res - 6);
774 } else if (strncmp(buf, "ETHER ", 6) == 0) {
775 test_driver_ether(drv, &from, fromlen, (u8 *) buf + 6,
776 res - 6);
777 } else if (strncmp(buf, "MLME ", 5) == 0) {
778 test_driver_mlme(drv, &from, fromlen, (u8 *) buf + 5, res - 5);
779 } else {
780 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
781 (u8 *) buf, res);
782 }
783 }
784
785
786 static struct test_driver_bss *
787 test_driver_get_bss(struct wpa_driver_test_data *drv, const char *ifname)
788 {
789 struct test_driver_bss *bss;
790
791 for (bss = drv->bss; bss; bss = bss->next) {
792 if (os_strcmp(bss->ifname, ifname) == 0)
793 return bss;
794 }
795 return NULL;
796 }
797
798
799 static int test_driver_set_generic_elem(const char *ifname, void *priv,
800 const u8 *elem, size_t elem_len)
801 {
802 struct wpa_driver_test_data *drv = priv;
803 struct test_driver_bss *bss;
804
805 bss = test_driver_get_bss(drv, ifname);
806 if (bss == NULL)
807 return -1;
808
809 os_free(bss->ie);
810
811 if (elem == NULL) {
812 bss->ie = NULL;
813 bss->ielen = 0;
814 return 0;
815 }
816
817 bss->ie = os_malloc(elem_len);
818 if (bss->ie == NULL) {
819 bss->ielen = 0;
820 return -1;
821 }
822
823 memcpy(bss->ie, elem, elem_len);
824 bss->ielen = elem_len;
825 return 0;
826 }
827
828
829 static int test_driver_set_ap_wps_ie(const char *ifname, void *priv,
830 const struct wpabuf *beacon,
831 const struct wpabuf *proberesp)
832 {
833 struct wpa_driver_test_data *drv = priv;
834 struct test_driver_bss *bss;
835
836 bss = test_driver_get_bss(drv, ifname);
837 if (bss == NULL)
838 return -1;
839
840 if (beacon == NULL)
841 wpa_printf(MSG_DEBUG, "test_driver: Clear Beacon WPS IE");
842 else
843 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Beacon WPS IE",
844 beacon);
845
846 os_free(bss->wps_beacon_ie);
847
848 if (beacon == NULL) {
849 bss->wps_beacon_ie = NULL;
850 bss->wps_beacon_ie_len = 0;
851 } else {
852 bss->wps_beacon_ie = os_malloc(wpabuf_len(beacon));
853 if (bss->wps_beacon_ie == NULL) {
854 bss->wps_beacon_ie_len = 0;
855 return -1;
856 }
857
858 os_memcpy(bss->wps_beacon_ie, wpabuf_head(beacon),
859 wpabuf_len(beacon));
860 bss->wps_beacon_ie_len = wpabuf_len(beacon);
861 }
862
863 if (proberesp == NULL)
864 wpa_printf(MSG_DEBUG, "test_driver: Clear Probe Response WPS "
865 "IE");
866 else
867 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Probe Response WPS "
868 "IE", proberesp);
869
870 os_free(bss->wps_probe_resp_ie);
871
872 if (proberesp == NULL) {
873 bss->wps_probe_resp_ie = NULL;
874 bss->wps_probe_resp_ie_len = 0;
875 } else {
876 bss->wps_probe_resp_ie = os_malloc(wpabuf_len(proberesp));
877 if (bss->wps_probe_resp_ie == NULL) {
878 bss->wps_probe_resp_ie_len = 0;
879 return -1;
880 }
881
882 os_memcpy(bss->wps_probe_resp_ie, wpabuf_head(proberesp),
883 wpabuf_len(proberesp));
884 bss->wps_probe_resp_ie_len = wpabuf_len(proberesp);
885 }
886
887 return 0;
888 }
889
890
891 static int test_driver_sta_deauth(void *priv, const u8 *own_addr,
892 const u8 *addr, int reason)
893 {
894 struct wpa_driver_test_data *drv = priv;
895 struct test_client_socket *cli;
896
897 if (drv->test_socket < 0)
898 return -1;
899
900 cli = drv->cli;
901 while (cli) {
902 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
903 break;
904 cli = cli->next;
905 }
906
907 if (!cli)
908 return -1;
909
910 return sendto(drv->test_socket, "DEAUTH", 6, 0,
911 (struct sockaddr *) &cli->un, cli->unlen);
912 }
913
914
915 static int test_driver_sta_disassoc(void *priv, const u8 *own_addr,
916 const u8 *addr, int reason)
917 {
918 struct wpa_driver_test_data *drv = priv;
919 struct test_client_socket *cli;
920
921 if (drv->test_socket < 0)
922 return -1;
923
924 cli = drv->cli;
925 while (cli) {
926 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
927 break;
928 cli = cli->next;
929 }
930
931 if (!cli)
932 return -1;
933
934 return sendto(drv->test_socket, "DISASSOC", 8, 0,
935 (struct sockaddr *) &cli->un, cli->unlen);
936 }
937
938
939 static int test_driver_bss_add(void *priv, const char *ifname, const u8 *bssid,
940 void *bss_ctx)
941 {
942 struct wpa_driver_test_data *drv = priv;
943 struct test_driver_bss *bss;
944
945 wpa_printf(MSG_DEBUG, "%s(ifname=%s bssid=" MACSTR ")",
946 __func__, ifname, MAC2STR(bssid));
947
948 bss = os_zalloc(sizeof(*bss));
949 if (bss == NULL)
950 return -1;
951
952 bss->bss_ctx = bss_ctx;
953 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
954 memcpy(bss->bssid, bssid, ETH_ALEN);
955
956 bss->next = drv->bss;
957 drv->bss = bss;
958 drv->global->bss_add_used = 1;
959 os_memcpy(drv->global->req_addr, bssid, ETH_ALEN);
960
961 return 0;
962 }
963
964
965 static int test_driver_bss_remove(void *priv, const char *ifname)
966 {
967 struct wpa_driver_test_data *drv = priv;
968 struct test_driver_bss *bss, *prev;
969 struct test_client_socket *cli, *prev_c;
970
971 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
972
973 for (prev = NULL, bss = drv->bss; bss; prev = bss, bss = bss->next) {
974 if (strcmp(bss->ifname, ifname) != 0)
975 continue;
976
977 if (prev)
978 prev->next = bss->next;
979 else
980 drv->bss = bss->next;
981
982 for (prev_c = NULL, cli = drv->cli; cli;
983 prev_c = cli, cli = cli->next) {
984 if (cli->bss != bss)
985 continue;
986 if (prev_c)
987 prev_c->next = cli->next;
988 else
989 drv->cli = cli->next;
990 os_free(cli);
991 break;
992 }
993
994 test_driver_free_bss(bss);
995 return 0;
996 }
997
998 return -1;
999 }
1000
1001
1002 static int test_driver_if_add(const char *iface, void *priv,
1003 enum wpa_driver_if_type type, const char *ifname,
1004 const u8 *addr, void *bss_ctx)
1005 {
1006 wpa_printf(MSG_DEBUG, "%s(iface=%s type=%d ifname=%s bss_ctx=%p)",
1007 __func__, iface, type, ifname, bss_ctx);
1008 if (type == WPA_IF_AP_BSS)
1009 return test_driver_bss_add(priv, ifname, addr, bss_ctx);
1010 return 0;
1011 }
1012
1013
1014 static int test_driver_if_remove(void *priv, enum wpa_driver_if_type type,
1015 const char *ifname)
1016 {
1017 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s)", __func__, type, ifname);
1018 if (type == WPA_IF_AP_BSS)
1019 return test_driver_bss_remove(priv, ifname);
1020 return 0;
1021 }
1022
1023
1024 static int test_driver_valid_bss_mask(void *priv, const u8 *addr,
1025 const u8 *mask)
1026 {
1027 return 0;
1028 }
1029
1030
1031 static int test_driver_set_ssid(const char *ifname, void *priv, const u8 *buf,
1032 int len)
1033 {
1034 struct wpa_driver_test_data *drv = priv;
1035 struct test_driver_bss *bss;
1036
1037 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
1038 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_set_ssid: SSID", buf, len);
1039
1040 bss = test_driver_get_bss(drv, ifname);
1041 if (bss == NULL) {
1042 wpa_printf(MSG_DEBUG, "%s(ifname=%s): failed to find BSS data",
1043 __func__, ifname);
1044 return -1;
1045 }
1046
1047 if (len < 0 || (size_t) len > sizeof(bss->ssid))
1048 return -1;
1049
1050 os_memcpy(bss->ssid, buf, len);
1051 bss->ssid_len = len;
1052
1053 return 0;
1054 }
1055
1056
1057 static int test_driver_set_privacy(const char *ifname, void *priv, int enabled)
1058 {
1059 struct wpa_driver_test_data *drv = priv;
1060 struct test_driver_bss *bss;
1061
1062 wpa_printf(MSG_DEBUG, "%s(ifname=%s enabled=%d)",
1063 __func__, ifname, enabled);
1064
1065 bss = test_driver_get_bss(drv, ifname);
1066 if (bss == NULL)
1067 return -1;
1068
1069 bss->privacy = enabled;
1070
1071 return 0;
1072 }
1073
1074
1075 static int test_driver_set_sta_vlan(void *priv, const u8 *addr,
1076 const char *ifname, int vlan_id)
1077 {
1078 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " ifname=%s vlan_id=%d)",
1079 __func__, MAC2STR(addr), ifname, vlan_id);
1080 return 0;
1081 }
1082
1083
1084 static int test_driver_sta_add(const char *ifname, void *priv,
1085 struct hostapd_sta_add_params *params)
1086 {
1087 struct wpa_driver_test_data *drv = priv;
1088 struct test_client_socket *cli;
1089 struct test_driver_bss *bss;
1090
1091 wpa_printf(MSG_DEBUG, "%s(ifname=%s addr=" MACSTR " aid=%d "
1092 "capability=0x%x listen_interval=%d)",
1093 __func__, ifname, MAC2STR(params->addr), params->aid,
1094 params->capability, params->listen_interval);
1095 wpa_hexdump(MSG_DEBUG, "test_driver_sta_add - supp_rates",
1096 params->supp_rates, params->supp_rates_len);
1097
1098 cli = drv->cli;
1099 while (cli) {
1100 if (os_memcmp(cli->addr, params->addr, ETH_ALEN) == 0)
1101 break;
1102 cli = cli->next;
1103 }
1104 if (!cli) {
1105 wpa_printf(MSG_DEBUG, "%s: no matching client entry",
1106 __func__);
1107 return -1;
1108 }
1109
1110 bss = test_driver_get_bss(drv, ifname);
1111 if (bss == NULL) {
1112 wpa_printf(MSG_DEBUG, "%s: No matching interface found from "
1113 "configured BSSes", __func__);
1114 return -1;
1115 }
1116
1117 cli->bss = bss;
1118
1119 return 0;
1120 }
1121
1122
1123 static struct wpa_driver_test_data * test_alloc_data(void *ctx,
1124 const char *ifname)
1125 {
1126 struct wpa_driver_test_data *drv;
1127
1128 drv = os_zalloc(sizeof(struct wpa_driver_test_data));
1129 if (drv == NULL) {
1130 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1131 "driver data");
1132 return NULL;
1133 }
1134
1135 drv->ctx = ctx;
1136 wpa_trace_add_ref(drv, ctx, ctx);
1137 os_strlcpy(drv->ifname, ifname, IFNAMSIZ);
1138
1139 /* Generate a MAC address to help testing with multiple STAs */
1140 drv->own_addr[0] = 0x02; /* locally administered */
1141 sha1_prf((const u8 *) ifname, os_strlen(ifname),
1142 "test mac addr generation",
1143 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
1144
1145 return drv;
1146 }
1147
1148
1149 static void * test_driver_init(struct hostapd_data *hapd,
1150 struct wpa_init_params *params)
1151 {
1152 struct wpa_driver_test_data *drv;
1153 struct sockaddr_un addr_un;
1154 struct sockaddr_in addr_in;
1155 struct sockaddr *addr;
1156 socklen_t alen;
1157
1158 drv = test_alloc_data(hapd, params->ifname);
1159 if (drv == NULL)
1160 return NULL;
1161 drv->ap = 1;
1162 drv->bss = os_zalloc(sizeof(*drv->bss));
1163 if (drv->bss == NULL) {
1164 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1165 "driver BSS data");
1166 os_free(drv);
1167 return NULL;
1168 }
1169
1170 drv->bss->bss_ctx = hapd;
1171 os_strlcpy(drv->bss->ifname, params->ifname, IFNAMSIZ);
1172 os_memcpy(drv->bss->bssid, drv->own_addr, ETH_ALEN);
1173 os_memcpy(params->own_addr, drv->own_addr, ETH_ALEN);
1174
1175 if (params->test_socket) {
1176 if (os_strlen(params->test_socket) >=
1177 sizeof(addr_un.sun_path)) {
1178 printf("Too long test_socket path\n");
1179 wpa_driver_test_deinit(drv);
1180 return NULL;
1181 }
1182 if (strncmp(params->test_socket, "DIR:", 4) == 0) {
1183 size_t len = strlen(params->test_socket) + 30;
1184 drv->test_dir = os_strdup(params->test_socket + 4);
1185 drv->own_socket_path = os_malloc(len);
1186 if (drv->own_socket_path) {
1187 snprintf(drv->own_socket_path, len,
1188 "%s/AP-" MACSTR,
1189 params->test_socket + 4,
1190 MAC2STR(params->own_addr));
1191 }
1192 } else if (strncmp(params->test_socket, "UDP:", 4) == 0) {
1193 drv->udp_port = atoi(params->test_socket + 4);
1194 } else {
1195 drv->own_socket_path = os_strdup(params->test_socket);
1196 }
1197 if (drv->own_socket_path == NULL && drv->udp_port == 0) {
1198 wpa_driver_test_deinit(drv);
1199 return NULL;
1200 }
1201
1202 drv->test_socket = socket(drv->udp_port ? PF_INET : PF_UNIX,
1203 SOCK_DGRAM, 0);
1204 if (drv->test_socket < 0) {
1205 perror("socket");
1206 wpa_driver_test_deinit(drv);
1207 return NULL;
1208 }
1209
1210 if (drv->udp_port) {
1211 os_memset(&addr_in, 0, sizeof(addr_in));
1212 addr_in.sin_family = AF_INET;
1213 addr_in.sin_port = htons(drv->udp_port);
1214 addr = (struct sockaddr *) &addr_in;
1215 alen = sizeof(addr_in);
1216 } else {
1217 os_memset(&addr_un, 0, sizeof(addr_un));
1218 addr_un.sun_family = AF_UNIX;
1219 os_strlcpy(addr_un.sun_path, drv->own_socket_path,
1220 sizeof(addr_un.sun_path));
1221 addr = (struct sockaddr *) &addr_un;
1222 alen = sizeof(addr_un);
1223 }
1224 if (bind(drv->test_socket, addr, alen) < 0) {
1225 perror("bind(PF_UNIX)");
1226 close(drv->test_socket);
1227 if (drv->own_socket_path)
1228 unlink(drv->own_socket_path);
1229 wpa_driver_test_deinit(drv);
1230 return NULL;
1231 }
1232 eloop_register_read_sock(drv->test_socket,
1233 test_driver_receive_unix, drv, NULL);
1234 } else
1235 drv->test_socket = -1;
1236
1237 return drv;
1238 }
1239
1240
1241 static void wpa_driver_test_poll(void *eloop_ctx, void *timeout_ctx)
1242 {
1243 struct wpa_driver_test_data *drv = eloop_ctx;
1244
1245 #ifdef DRIVER_TEST_UNIX
1246 if (drv->associated && drv->hostapd_addr_set) {
1247 struct stat st;
1248 if (stat(drv->hostapd_addr.sun_path, &st) < 0) {
1249 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
1250 __func__, strerror(errno));
1251 drv->associated = 0;
1252 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1253 }
1254 }
1255 #endif /* DRIVER_TEST_UNIX */
1256
1257 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1258 }
1259
1260
1261 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1262 {
1263 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1264 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1265 }
1266
1267
1268 #ifdef DRIVER_TEST_UNIX
1269 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
1270 const char *path)
1271 {
1272 struct dirent *dent;
1273 DIR *dir;
1274 struct sockaddr_un addr;
1275 char cmd[512], *pos, *end;
1276 int ret;
1277
1278 dir = opendir(path);
1279 if (dir == NULL)
1280 return;
1281
1282 end = cmd + sizeof(cmd);
1283 pos = cmd;
1284 ret = os_snprintf(pos, end - pos, "SCAN " MACSTR,
1285 MAC2STR(drv->own_addr));
1286 if (ret >= 0 && ret < end - pos)
1287 pos += ret;
1288 if (drv->probe_req_ie) {
1289 ret = os_snprintf(pos, end - pos, " ");
1290 if (ret >= 0 && ret < end - pos)
1291 pos += ret;
1292 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ie,
1293 drv->probe_req_ie_len);
1294 }
1295 end[-1] = '\0';
1296
1297 while ((dent = readdir(dir))) {
1298 if (os_strncmp(dent->d_name, "AP-", 3) != 0 &&
1299 os_strncmp(dent->d_name, "STA-", 4) != 0)
1300 continue;
1301 if (drv->own_socket_path) {
1302 size_t olen, dlen;
1303 olen = os_strlen(drv->own_socket_path);
1304 dlen = os_strlen(dent->d_name);
1305 if (olen >= dlen &&
1306 os_strcmp(dent->d_name,
1307 drv->own_socket_path + olen - dlen) == 0)
1308 continue;
1309 }
1310 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
1311
1312 os_memset(&addr, 0, sizeof(addr));
1313 addr.sun_family = AF_UNIX;
1314 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
1315 path, dent->d_name);
1316
1317 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1318 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1319 perror("sendto(test_socket)");
1320 }
1321 }
1322 closedir(dir);
1323 }
1324 #endif /* DRIVER_TEST_UNIX */
1325
1326
1327 static int wpa_driver_test_scan(void *priv,
1328 struct wpa_driver_scan_params *params)
1329 {
1330 struct wpa_driver_test_data *drv = priv;
1331 size_t i;
1332
1333 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
1334
1335 os_free(drv->probe_req_ie);
1336 if (params->extra_ies) {
1337 drv->probe_req_ie = os_malloc(params->extra_ies_len);
1338 if (drv->probe_req_ie == NULL) {
1339 drv->probe_req_ie_len = 0;
1340 return -1;
1341 }
1342 os_memcpy(drv->probe_req_ie, params->extra_ies,
1343 params->extra_ies_len);
1344 drv->probe_req_ie_len = params->extra_ies_len;
1345 } else {
1346 drv->probe_req_ie = NULL;
1347 drv->probe_req_ie_len = 0;
1348 }
1349
1350 for (i = 0; i < params->num_ssids; i++)
1351 wpa_hexdump(MSG_DEBUG, "Scan SSID",
1352 params->ssids[i].ssid, params->ssids[i].ssid_len);
1353 wpa_hexdump(MSG_DEBUG, "Scan extra IE(s)",
1354 params->extra_ies, params->extra_ies_len);
1355
1356 drv->num_scanres = 0;
1357
1358 #ifdef DRIVER_TEST_UNIX
1359 if (drv->test_socket >= 0 && drv->test_dir)
1360 wpa_driver_scan_dir(drv, drv->test_dir);
1361
1362 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
1363 sendto(drv->test_socket, "SCAN", 4, 0,
1364 (struct sockaddr *) &drv->hostapd_addr,
1365 sizeof(drv->hostapd_addr)) < 0) {
1366 perror("sendto(test_socket)");
1367 }
1368 #endif /* DRIVER_TEST_UNIX */
1369
1370 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1371 sendto(drv->test_socket, "SCAN", 4, 0,
1372 (struct sockaddr *) &drv->hostapd_addr_udp,
1373 sizeof(drv->hostapd_addr_udp)) < 0) {
1374 perror("sendto(test_socket)");
1375 }
1376
1377 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1378 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
1379 drv->ctx);
1380 return 0;
1381 }
1382
1383
1384 static struct wpa_scan_results * wpa_driver_test_get_scan_results2(void *priv)
1385 {
1386 struct wpa_driver_test_data *drv = priv;
1387 struct wpa_scan_results *res;
1388 size_t i;
1389
1390 res = os_zalloc(sizeof(*res));
1391 if (res == NULL)
1392 return NULL;
1393
1394 res->res = os_zalloc(drv->num_scanres * sizeof(struct wpa_scan_res *));
1395 if (res->res == NULL) {
1396 os_free(res);
1397 return NULL;
1398 }
1399
1400 for (i = 0; i < drv->num_scanres; i++) {
1401 struct wpa_scan_res *r;
1402 if (drv->scanres[i] == NULL)
1403 continue;
1404 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len);
1405 if (r == NULL)
1406 break;
1407 os_memcpy(r, drv->scanres[i],
1408 sizeof(*r) + drv->scanres[i]->ie_len);
1409 res->res[res->num++] = r;
1410 }
1411
1412 return res;
1413 }
1414
1415
1416 static int wpa_driver_test_set_key(const char *ifname, void *priv,
1417 enum wpa_alg alg, const u8 *addr,
1418 int key_idx, int set_tx,
1419 const u8 *seq, size_t seq_len,
1420 const u8 *key, size_t key_len)
1421 {
1422 wpa_printf(MSG_DEBUG, "%s: ifname=%s priv=%p alg=%d key_idx=%d "
1423 "set_tx=%d",
1424 __func__, ifname, priv, alg, key_idx, set_tx);
1425 if (addr)
1426 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
1427 if (seq)
1428 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
1429 if (key)
1430 wpa_hexdump_key(MSG_DEBUG, " key", key, key_len);
1431 return 0;
1432 }
1433
1434
1435 static int wpa_driver_update_mode(struct wpa_driver_test_data *drv, int ap)
1436 {
1437 if (ap && !drv->ap) {
1438 wpa_driver_test_close_test_socket(drv);
1439 wpa_driver_test_attach(drv, drv->test_dir, 1);
1440 drv->ap = 1;
1441 } else if (!ap && drv->ap) {
1442 wpa_driver_test_close_test_socket(drv);
1443 wpa_driver_test_attach(drv, drv->test_dir, 0);
1444 drv->ap = 0;
1445 }
1446
1447 return 0;
1448 }
1449
1450
1451 static int wpa_driver_test_associate(
1452 void *priv, struct wpa_driver_associate_params *params)
1453 {
1454 struct wpa_driver_test_data *drv = priv;
1455 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
1456 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
1457 __func__, priv, params->freq, params->pairwise_suite,
1458 params->group_suite, params->key_mgmt_suite,
1459 params->auth_alg, params->mode);
1460 if (params->bssid) {
1461 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
1462 MAC2STR(params->bssid));
1463 }
1464 if (params->ssid) {
1465 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
1466 params->ssid, params->ssid_len);
1467 }
1468 if (params->wpa_ie) {
1469 wpa_hexdump(MSG_DEBUG, " wpa_ie",
1470 params->wpa_ie, params->wpa_ie_len);
1471 drv->assoc_wpa_ie_len = params->wpa_ie_len;
1472 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
1473 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
1474 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
1475 drv->assoc_wpa_ie_len);
1476 } else
1477 drv->assoc_wpa_ie_len = 0;
1478
1479 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1480
1481 drv->ibss = params->mode == IEEE80211_MODE_IBSS;
1482 drv->privacy = params->key_mgmt_suite &
1483 (WPA_KEY_MGMT_IEEE8021X |
1484 WPA_KEY_MGMT_PSK |
1485 WPA_KEY_MGMT_WPA_NONE |
1486 WPA_KEY_MGMT_FT_IEEE8021X |
1487 WPA_KEY_MGMT_FT_PSK |
1488 WPA_KEY_MGMT_IEEE8021X_SHA256 |
1489 WPA_KEY_MGMT_PSK_SHA256);
1490 if (params->wep_key_len[params->wep_tx_keyidx])
1491 drv->privacy = 1;
1492
1493 #ifdef DRIVER_TEST_UNIX
1494 if (drv->test_dir && params->bssid &&
1495 params->mode != IEEE80211_MODE_IBSS) {
1496 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
1497 drv->hostapd_addr.sun_family = AF_UNIX;
1498 os_snprintf(drv->hostapd_addr.sun_path,
1499 sizeof(drv->hostapd_addr.sun_path),
1500 "%s/AP-" MACSTR,
1501 drv->test_dir, MAC2STR(params->bssid));
1502 drv->hostapd_addr_set = 1;
1503 }
1504 #endif /* DRIVER_TEST_UNIX */
1505
1506 if (params->mode == IEEE80211_MODE_AP) {
1507 struct test_driver_bss *bss;
1508 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1509 drv->ssid_len = params->ssid_len;
1510
1511 test_driver_free_bsses(drv);
1512 bss = drv->bss = os_zalloc(sizeof(*drv->bss));
1513 if (bss == NULL)
1514 return -1;
1515 os_strlcpy(bss->ifname, drv->ifname, IFNAMSIZ);
1516 os_memcpy(bss->bssid, drv->own_addr, ETH_ALEN);
1517 os_memcpy(bss->ssid, params->ssid, params->ssid_len);
1518 bss->ssid_len = params->ssid_len;
1519 bss->privacy = drv->privacy;
1520 if (params->wpa_ie && params->wpa_ie_len) {
1521 bss->ie = os_malloc(params->wpa_ie_len);
1522 if (bss->ie) {
1523 os_memcpy(bss->ie, params->wpa_ie,
1524 params->wpa_ie_len);
1525 bss->ielen = params->wpa_ie_len;
1526 }
1527 }
1528 } else if (drv->test_socket >= 0 &&
1529 (drv->hostapd_addr_set || drv->hostapd_addr_udp_set)) {
1530 char cmd[200], *pos, *end;
1531 int ret;
1532 end = cmd + sizeof(cmd);
1533 pos = cmd;
1534 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
1535 MAC2STR(drv->own_addr));
1536 if (ret >= 0 && ret < end - pos)
1537 pos += ret;
1538 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
1539 params->ssid_len);
1540 ret = os_snprintf(pos, end - pos, " ");
1541 if (ret >= 0 && ret < end - pos)
1542 pos += ret;
1543 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
1544 params->wpa_ie_len);
1545 end[-1] = '\0';
1546 #ifdef DRIVER_TEST_UNIX
1547 if (drv->hostapd_addr_set &&
1548 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1549 (struct sockaddr *) &drv->hostapd_addr,
1550 sizeof(drv->hostapd_addr)) < 0) {
1551 perror("sendto(test_socket)");
1552 return -1;
1553 }
1554 #endif /* DRIVER_TEST_UNIX */
1555 if (drv->hostapd_addr_udp_set &&
1556 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1557 (struct sockaddr *) &drv->hostapd_addr_udp,
1558 sizeof(drv->hostapd_addr_udp)) < 0) {
1559 perror("sendto(test_socket)");
1560 return -1;
1561 }
1562
1563 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1564 drv->ssid_len = params->ssid_len;
1565 } else {
1566 drv->associated = 1;
1567 if (params->mode == IEEE80211_MODE_IBSS) {
1568 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1569 drv->ssid_len = params->ssid_len;
1570 if (params->bssid)
1571 os_memcpy(drv->bssid, params->bssid, ETH_ALEN);
1572 else {
1573 os_get_random(drv->bssid, ETH_ALEN);
1574 drv->bssid[0] &= ~0x01;
1575 drv->bssid[0] |= 0x02;
1576 }
1577 }
1578 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1579 }
1580
1581 return 0;
1582 }
1583
1584
1585 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
1586 {
1587 struct wpa_driver_test_data *drv = priv;
1588 os_memcpy(bssid, drv->bssid, ETH_ALEN);
1589 return 0;
1590 }
1591
1592
1593 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
1594 {
1595 struct wpa_driver_test_data *drv = priv;
1596 os_memcpy(ssid, drv->ssid, 32);
1597 return drv->ssid_len;
1598 }
1599
1600
1601 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
1602 {
1603 #ifdef DRIVER_TEST_UNIX
1604 if (drv->test_socket >= 0 &&
1605 sendto(drv->test_socket, "DISASSOC", 8, 0,
1606 (struct sockaddr *) &drv->hostapd_addr,
1607 sizeof(drv->hostapd_addr)) < 0) {
1608 perror("sendto(test_socket)");
1609 return -1;
1610 }
1611 #endif /* DRIVER_TEST_UNIX */
1612 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1613 sendto(drv->test_socket, "DISASSOC", 8, 0,
1614 (struct sockaddr *) &drv->hostapd_addr_udp,
1615 sizeof(drv->hostapd_addr_udp)) < 0) {
1616 perror("sendto(test_socket)");
1617 return -1;
1618 }
1619 return 0;
1620 }
1621
1622
1623 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
1624 int reason_code)
1625 {
1626 struct wpa_driver_test_data *drv = priv;
1627 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1628 __func__, MAC2STR(addr), reason_code);
1629 os_memset(drv->bssid, 0, ETH_ALEN);
1630 drv->associated = 0;
1631 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1632 return wpa_driver_test_send_disassoc(drv);
1633 }
1634
1635
1636 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
1637 int reason_code)
1638 {
1639 struct wpa_driver_test_data *drv = priv;
1640 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1641 __func__, MAC2STR(addr), reason_code);
1642 os_memset(drv->bssid, 0, ETH_ALEN);
1643 drv->associated = 0;
1644 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1645 return wpa_driver_test_send_disassoc(drv);
1646 }
1647
1648
1649 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
1650 struct sockaddr *from,
1651 socklen_t fromlen,
1652 const char *data)
1653 {
1654 struct wpa_scan_res *res;
1655 const char *pos, *pos2;
1656 size_t len;
1657 u8 *ie_pos, *ie_start, *ie_end;
1658 #define MAX_IE_LEN 1000
1659
1660 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
1661 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
1662 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
1663 "result");
1664 return;
1665 }
1666
1667 /* SCANRESP BSSID SSID IEs */
1668
1669 res = os_zalloc(sizeof(*res) + MAX_IE_LEN);
1670 if (res == NULL)
1671 return;
1672 ie_start = ie_pos = (u8 *) (res + 1);
1673 ie_end = ie_pos + MAX_IE_LEN;
1674
1675 if (hwaddr_aton(data, res->bssid)) {
1676 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
1677 os_free(res);
1678 return;
1679 }
1680
1681 pos = data + 17;
1682 while (*pos == ' ')
1683 pos++;
1684 pos2 = os_strchr(pos, ' ');
1685 if (pos2 == NULL) {
1686 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
1687 "in scanres");
1688 os_free(res);
1689 return;
1690 }
1691 len = (pos2 - pos) / 2;
1692 if (len > 32)
1693 len = 32;
1694 /*
1695 * Generate SSID IE from the SSID field since this IE is not included
1696 * in the main IE field.
1697 */
1698 *ie_pos++ = WLAN_EID_SSID;
1699 *ie_pos++ = len;
1700 if (hexstr2bin(pos, ie_pos, len) < 0) {
1701 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
1702 os_free(res);
1703 return;
1704 }
1705 ie_pos += len;
1706
1707 pos = pos2 + 1;
1708 pos2 = os_strchr(pos, ' ');
1709 if (pos2 == NULL)
1710 len = os_strlen(pos) / 2;
1711 else
1712 len = (pos2 - pos) / 2;
1713 if ((int) len > ie_end - ie_pos)
1714 len = ie_end - ie_pos;
1715 if (hexstr2bin(pos, ie_pos, len) < 0) {
1716 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
1717 os_free(res);
1718 return;
1719 }
1720 ie_pos += len;
1721 res->ie_len = ie_pos - ie_start;
1722
1723 if (pos2) {
1724 pos = pos2 + 1;
1725 while (*pos == ' ')
1726 pos++;
1727 if (os_strstr(pos, "PRIVACY"))
1728 res->caps |= IEEE80211_CAP_PRIVACY;
1729 if (os_strstr(pos, "IBSS"))
1730 res->caps |= IEEE80211_CAP_IBSS;
1731 }
1732
1733 os_free(drv->scanres[drv->num_scanres]);
1734 drv->scanres[drv->num_scanres++] = res;
1735 }
1736
1737
1738 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
1739 struct sockaddr *from,
1740 socklen_t fromlen,
1741 const char *data)
1742 {
1743 /* ASSOCRESP BSSID <res> */
1744 if (hwaddr_aton(data, drv->bssid)) {
1745 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
1746 "assocresp");
1747 }
1748 if (drv->use_associnfo) {
1749 union wpa_event_data event;
1750 os_memset(&event, 0, sizeof(event));
1751 event.assoc_info.req_ies = drv->assoc_wpa_ie;
1752 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
1753 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
1754 }
1755 drv->associated = 1;
1756 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1757 }
1758
1759
1760 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
1761 struct sockaddr *from,
1762 socklen_t fromlen)
1763 {
1764 drv->associated = 0;
1765 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1766 }
1767
1768
1769 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
1770 struct sockaddr *from,
1771 socklen_t fromlen,
1772 const u8 *data, size_t data_len)
1773 {
1774 const u8 *src = drv->bssid;
1775
1776 if (data_len > 14) {
1777 /* Skip Ethernet header */
1778 src = data + ETH_ALEN;
1779 data += 14;
1780 data_len -= 14;
1781 }
1782 #ifndef HOSTAPD
1783 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len);
1784 #endif /* HOSTAPD */
1785 }
1786
1787
1788 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
1789 struct sockaddr *from,
1790 socklen_t fromlen,
1791 const u8 *data, size_t data_len)
1792 {
1793 union wpa_event_data event;
1794 os_memset(&event, 0, sizeof(event));
1795 event.mlme_rx.buf = data;
1796 event.mlme_rx.len = data_len;
1797 wpa_supplicant_event(drv->ctx, EVENT_MLME_RX, &event);
1798 }
1799
1800
1801 static void wpa_driver_test_scan_cmd(struct wpa_driver_test_data *drv,
1802 struct sockaddr *from,
1803 socklen_t fromlen,
1804 const u8 *data, size_t data_len)
1805 {
1806 char buf[512], *pos, *end;
1807 int ret;
1808
1809 /* data: optional [ STA-addr | ' ' | IEs(hex) ] */
1810
1811 if (!drv->ibss)
1812 return;
1813
1814 pos = buf;
1815 end = buf + sizeof(buf);
1816
1817 /* reply: SCANRESP BSSID SSID IEs */
1818 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
1819 MAC2STR(drv->bssid));
1820 if (ret < 0 || ret >= end - pos)
1821 return;
1822 pos += ret;
1823 pos += wpa_snprintf_hex(pos, end - pos,
1824 drv->ssid, drv->ssid_len);
1825 ret = snprintf(pos, end - pos, " ");
1826 if (ret < 0 || ret >= end - pos)
1827 return;
1828 pos += ret;
1829 pos += wpa_snprintf_hex(pos, end - pos, drv->assoc_wpa_ie,
1830 drv->assoc_wpa_ie_len);
1831
1832 if (drv->privacy) {
1833 ret = snprintf(pos, end - pos, " PRIVACY");
1834 if (ret < 0 || ret >= end - pos)
1835 return;
1836 pos += ret;
1837 }
1838
1839 ret = snprintf(pos, end - pos, " IBSS");
1840 if (ret < 0 || ret >= end - pos)
1841 return;
1842 pos += ret;
1843
1844 sendto(drv->test_socket, buf, pos - buf, 0,
1845 (struct sockaddr *) from, fromlen);
1846 }
1847
1848
1849 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
1850 void *sock_ctx)
1851 {
1852 struct wpa_driver_test_data *drv = eloop_ctx;
1853 char *buf;
1854 int res;
1855 struct sockaddr_storage from;
1856 socklen_t fromlen = sizeof(from);
1857 const size_t buflen = 2000;
1858
1859 if (drv->ap) {
1860 test_driver_receive_unix(sock, eloop_ctx, sock_ctx);
1861 return;
1862 }
1863
1864 buf = os_malloc(buflen);
1865 if (buf == NULL)
1866 return;
1867 res = recvfrom(sock, buf, buflen - 1, 0,
1868 (struct sockaddr *) &from, &fromlen);
1869 if (res < 0) {
1870 perror("recvfrom(test_socket)");
1871 os_free(buf);
1872 return;
1873 }
1874 buf[res] = '\0';
1875
1876 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
1877
1878 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
1879 wpa_driver_test_scanresp(drv, (struct sockaddr *) &from,
1880 fromlen, buf + 9);
1881 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
1882 wpa_driver_test_assocresp(drv, (struct sockaddr *) &from,
1883 fromlen, buf + 10);
1884 } else if (os_strcmp(buf, "DISASSOC") == 0) {
1885 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
1886 fromlen);
1887 } else if (os_strcmp(buf, "DEAUTH") == 0) {
1888 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
1889 fromlen);
1890 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
1891 wpa_driver_test_eapol(drv, (struct sockaddr *) &from, fromlen,
1892 (const u8 *) buf + 6, res - 6);
1893 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
1894 wpa_driver_test_mlme(drv, (struct sockaddr *) &from, fromlen,
1895 (const u8 *) buf + 5, res - 5);
1896 } else if (os_strncmp(buf, "SCAN ", 5) == 0) {
1897 wpa_driver_test_scan_cmd(drv, (struct sockaddr *) &from,
1898 fromlen,
1899 (const u8 *) buf + 5, res - 5);
1900 } else {
1901 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
1902 (u8 *) buf, res);
1903 }
1904 os_free(buf);
1905 }
1906
1907
1908 static void * wpa_driver_test_init2(void *ctx, const char *ifname,
1909 void *global_priv)
1910 {
1911 struct wpa_driver_test_data *drv;
1912 struct wpa_driver_test_global *global = global_priv;
1913
1914 drv = test_alloc_data(ctx, ifname);
1915 if (drv == NULL)
1916 return NULL;
1917 drv->global = global_priv;
1918 drv->test_socket = -1;
1919
1920 /* Set dummy BSSID and SSID for testing. */
1921 drv->bssid[0] = 0x02;
1922 drv->bssid[1] = 0x00;
1923 drv->bssid[2] = 0x00;
1924 drv->bssid[3] = 0x00;
1925 drv->bssid[4] = 0x00;
1926 drv->bssid[5] = 0x01;
1927 os_memcpy(drv->ssid, "test", 5);
1928 drv->ssid_len = 4;
1929
1930 if (global->bss_add_used) {
1931 os_memcpy(drv->own_addr, global->req_addr, ETH_ALEN);
1932 global->bss_add_used = 0;
1933 }
1934
1935 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1936
1937 return drv;
1938 }
1939
1940
1941 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
1942 {
1943 if (drv->test_socket >= 0) {
1944 eloop_unregister_read_sock(drv->test_socket);
1945 close(drv->test_socket);
1946 drv->test_socket = -1;
1947 }
1948
1949 if (drv->own_socket_path) {
1950 unlink(drv->own_socket_path);
1951 os_free(drv->own_socket_path);
1952 drv->own_socket_path = NULL;
1953 }
1954 }
1955
1956
1957 static void wpa_driver_test_deinit(void *priv)
1958 {
1959 struct wpa_driver_test_data *drv = priv;
1960 struct test_client_socket *cli, *prev;
1961 int i;
1962
1963 cli = drv->cli;
1964 while (cli) {
1965 prev = cli;
1966 cli = cli->next;
1967 os_free(prev);
1968 }
1969
1970 #ifdef HOSTAPD
1971 /* There should be only one BSS remaining at this point. */
1972 if (drv->bss == NULL)
1973 wpa_printf(MSG_ERROR, "%s: drv->bss == NULL", __func__);
1974 else if (drv->bss->next)
1975 wpa_printf(MSG_ERROR, "%s: drv->bss->next != NULL", __func__);
1976 #endif /* HOSTAPD */
1977
1978 test_driver_free_bsses(drv);
1979
1980 wpa_driver_test_close_test_socket(drv);
1981 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1982 eloop_cancel_timeout(wpa_driver_test_poll, drv, NULL);
1983 os_free(drv->test_dir);
1984 for (i = 0; i < MAX_SCAN_RESULTS; i++)
1985 os_free(drv->scanres[i]);
1986 os_free(drv->probe_req_ie);
1987 wpa_trace_remove_ref(drv, ctx, drv->ctx);
1988 os_free(drv);
1989 }
1990
1991
1992 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
1993 const char *dir, int ap)
1994 {
1995 #ifdef DRIVER_TEST_UNIX
1996 static unsigned int counter = 0;
1997 struct sockaddr_un addr;
1998 size_t len;
1999
2000 os_free(drv->own_socket_path);
2001 if (dir) {
2002 len = os_strlen(dir) + 30;
2003 drv->own_socket_path = os_malloc(len);
2004 if (drv->own_socket_path == NULL)
2005 return -1;
2006 os_snprintf(drv->own_socket_path, len, "%s/%s-" MACSTR,
2007 dir, ap ? "AP" : "STA", MAC2STR(drv->own_addr));
2008 } else {
2009 drv->own_socket_path = os_malloc(100);
2010 if (drv->own_socket_path == NULL)
2011 return -1;
2012 os_snprintf(drv->own_socket_path, 100,
2013 "/tmp/wpa_supplicant_test-%d-%d",
2014 getpid(), counter++);
2015 }
2016
2017 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
2018 if (drv->test_socket < 0) {
2019 perror("socket(PF_UNIX)");
2020 os_free(drv->own_socket_path);
2021 drv->own_socket_path = NULL;
2022 return -1;
2023 }
2024
2025 os_memset(&addr, 0, sizeof(addr));
2026 addr.sun_family = AF_UNIX;
2027 os_strlcpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
2028 if (bind(drv->test_socket, (struct sockaddr *) &addr,
2029 sizeof(addr)) < 0) {
2030 perror("bind(PF_UNIX)");
2031 close(drv->test_socket);
2032 unlink(drv->own_socket_path);
2033 os_free(drv->own_socket_path);
2034 drv->own_socket_path = NULL;
2035 return -1;
2036 }
2037
2038 eloop_register_read_sock(drv->test_socket,
2039 wpa_driver_test_receive_unix, drv, NULL);
2040
2041 return 0;
2042 #else /* DRIVER_TEST_UNIX */
2043 return -1;
2044 #endif /* DRIVER_TEST_UNIX */
2045 }
2046
2047
2048 static int wpa_driver_test_attach_udp(struct wpa_driver_test_data *drv,
2049 char *dst)
2050 {
2051 char *pos;
2052
2053 pos = os_strchr(dst, ':');
2054 if (pos == NULL)
2055 return -1;
2056 *pos++ = '\0';
2057 wpa_printf(MSG_DEBUG, "%s: addr=%s port=%s", __func__, dst, pos);
2058
2059 drv->test_socket = socket(PF_INET, SOCK_DGRAM, 0);
2060 if (drv->test_socket < 0) {
2061 perror("socket(PF_INET)");
2062 return -1;
2063 }
2064
2065 os_memset(&drv->hostapd_addr_udp, 0, sizeof(drv->hostapd_addr_udp));
2066 drv->hostapd_addr_udp.sin_family = AF_INET;
2067 #if defined(CONFIG_NATIVE_WINDOWS) || defined(CONFIG_ANSI_C_EXTRA)
2068 {
2069 int a[4];
2070 u8 *pos;
2071 sscanf(dst, "%d.%d.%d.%d", &a[0], &a[1], &a[2], &a[3]);
2072 pos = (u8 *) &drv->hostapd_addr_udp.sin_addr;
2073 *pos++ = a[0];
2074 *pos++ = a[1];
2075 *pos++ = a[2];
2076 *pos++ = a[3];
2077 }
2078 #else /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2079 inet_aton(dst, &drv->hostapd_addr_udp.sin_addr);
2080 #endif /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2081 drv->hostapd_addr_udp.sin_port = htons(atoi(pos));
2082
2083 drv->hostapd_addr_udp_set = 1;
2084
2085 eloop_register_read_sock(drv->test_socket,
2086 wpa_driver_test_receive_unix, drv, NULL);
2087
2088 return 0;
2089 }
2090
2091
2092 static int wpa_driver_test_set_param(void *priv, const char *param)
2093 {
2094 struct wpa_driver_test_data *drv = priv;
2095 const char *pos;
2096
2097 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
2098 if (param == NULL)
2099 return 0;
2100
2101 wpa_driver_test_close_test_socket(drv);
2102
2103 #ifdef DRIVER_TEST_UNIX
2104 pos = os_strstr(param, "test_socket=");
2105 if (pos) {
2106 const char *pos2;
2107 size_t len;
2108
2109 pos += 12;
2110 pos2 = os_strchr(pos, ' ');
2111 if (pos2)
2112 len = pos2 - pos;
2113 else
2114 len = os_strlen(pos);
2115 if (len > sizeof(drv->hostapd_addr.sun_path))
2116 return -1;
2117 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
2118 drv->hostapd_addr.sun_family = AF_UNIX;
2119 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
2120 drv->hostapd_addr_set = 1;
2121 }
2122 #endif /* DRIVER_TEST_UNIX */
2123
2124 pos = os_strstr(param, "test_dir=");
2125 if (pos) {
2126 char *end;
2127 os_free(drv->test_dir);
2128 drv->test_dir = os_strdup(pos + 9);
2129 if (drv->test_dir == NULL)
2130 return -1;
2131 end = os_strchr(drv->test_dir, ' ');
2132 if (end)
2133 *end = '\0';
2134 if (wpa_driver_test_attach(drv, drv->test_dir, 0))
2135 return -1;
2136 } else {
2137 pos = os_strstr(param, "test_udp=");
2138 if (pos) {
2139 char *dst, *epos;
2140 dst = os_strdup(pos + 9);
2141 if (dst == NULL)
2142 return -1;
2143 epos = os_strchr(dst, ' ');
2144 if (epos)
2145 *epos = '\0';
2146 if (wpa_driver_test_attach_udp(drv, dst))
2147 return -1;
2148 os_free(dst);
2149 } else if (wpa_driver_test_attach(drv, NULL, 0))
2150 return -1;
2151 }
2152
2153 if (os_strstr(param, "use_associnfo=1")) {
2154 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
2155 drv->use_associnfo = 1;
2156 }
2157
2158 #ifdef CONFIG_CLIENT_MLME
2159 if (os_strstr(param, "use_mlme=1")) {
2160 wpa_printf(MSG_DEBUG, "test_driver: Use internal MLME");
2161 drv->use_mlme = 1;
2162 }
2163 #endif /* CONFIG_CLIENT_MLME */
2164
2165 return 0;
2166 }
2167
2168
2169 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
2170 {
2171 struct wpa_driver_test_data *drv = priv;
2172 wpa_printf(MSG_DEBUG, "%s", __func__);
2173 return drv->own_addr;
2174 }
2175
2176
2177 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
2178 const u8 *data, size_t data_len)
2179 {
2180 struct wpa_driver_test_data *drv = priv;
2181 char *msg;
2182 size_t msg_len;
2183 struct l2_ethhdr eth;
2184 struct sockaddr *addr;
2185 socklen_t alen;
2186 #ifdef DRIVER_TEST_UNIX
2187 struct sockaddr_un addr_un;
2188 #endif /* DRIVER_TEST_UNIX */
2189
2190 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
2191
2192 os_memset(&eth, 0, sizeof(eth));
2193 os_memcpy(eth.h_dest, dest, ETH_ALEN);
2194 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
2195 eth.h_proto = host_to_be16(proto);
2196
2197 msg_len = 6 + sizeof(eth) + data_len;
2198 msg = os_malloc(msg_len);
2199 if (msg == NULL)
2200 return -1;
2201 os_memcpy(msg, "EAPOL ", 6);
2202 os_memcpy(msg + 6, &eth, sizeof(eth));
2203 os_memcpy(msg + 6 + sizeof(eth), data, data_len);
2204
2205 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
2206 drv->test_dir == NULL) {
2207 if (drv->hostapd_addr_udp_set) {
2208 addr = (struct sockaddr *) &drv->hostapd_addr_udp;
2209 alen = sizeof(drv->hostapd_addr_udp);
2210 } else {
2211 #ifdef DRIVER_TEST_UNIX
2212 addr = (struct sockaddr *) &drv->hostapd_addr;
2213 alen = sizeof(drv->hostapd_addr);
2214 #else /* DRIVER_TEST_UNIX */
2215 os_free(msg);
2216 return -1;
2217 #endif /* DRIVER_TEST_UNIX */
2218 }
2219 } else {
2220 #ifdef DRIVER_TEST_UNIX
2221 struct stat st;
2222 os_memset(&addr_un, 0, sizeof(addr_un));
2223 addr_un.sun_family = AF_UNIX;
2224 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2225 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
2226 if (stat(addr_un.sun_path, &st) < 0) {
2227 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2228 "%s/AP-" MACSTR,
2229 drv->test_dir, MAC2STR(dest));
2230 }
2231 addr = (struct sockaddr *) &addr_un;
2232 alen = sizeof(addr_un);
2233 #else /* DRIVER_TEST_UNIX */
2234 os_free(msg);
2235 return -1;
2236 #endif /* DRIVER_TEST_UNIX */
2237 }
2238
2239 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
2240 perror("sendmsg(test_socket)");
2241 os_free(msg);
2242 return -1;
2243 }
2244
2245 os_free(msg);
2246 return 0;
2247 }
2248
2249
2250 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
2251 {
2252 struct wpa_driver_test_data *drv = priv;
2253 os_memset(capa, 0, sizeof(*capa));
2254 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
2255 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
2256 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
2257 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
2258 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE |
2259 WPA_DRIVER_CAPA_KEY_MGMT_FT |
2260 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2261 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
2262 WPA_DRIVER_CAPA_ENC_WEP104 |
2263 WPA_DRIVER_CAPA_ENC_TKIP |
2264 WPA_DRIVER_CAPA_ENC_CCMP;
2265 capa->auth = WPA_DRIVER_AUTH_OPEN |
2266 WPA_DRIVER_AUTH_SHARED |
2267 WPA_DRIVER_AUTH_LEAP;
2268 if (drv->use_mlme)
2269 capa->flags |= WPA_DRIVER_FLAGS_USER_SPACE_MLME;
2270 capa->flags |= WPA_DRIVER_FLAGS_AP;
2271 capa->max_scan_ssids = 2;
2272
2273 return 0;
2274 }
2275
2276
2277 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
2278 int protect_type,
2279 int key_type)
2280 {
2281 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
2282 __func__, protect_type, key_type);
2283
2284 if (addr) {
2285 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
2286 __func__, MAC2STR(addr));
2287 }
2288
2289 return 0;
2290 }
2291
2292
2293 static int wpa_driver_test_set_channel(void *priv,
2294 enum hostapd_hw_mode phymode,
2295 int chan, int freq)
2296 {
2297 wpa_printf(MSG_DEBUG, "%s: phymode=%d chan=%d freq=%d",
2298 __func__, phymode, chan, freq);
2299 return 0;
2300 }
2301
2302
2303 static int wpa_driver_test_mlme_add_sta(void *priv, const u8 *addr,
2304 const u8 *supp_rates,
2305 size_t supp_rates_len)
2306 {
2307 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2308 return 0;
2309 }
2310
2311
2312 static int wpa_driver_test_mlme_remove_sta(void *priv, const u8 *addr)
2313 {
2314 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2315 return 0;
2316 }
2317
2318
2319 static int wpa_driver_test_set_ssid(void *priv, const u8 *ssid,
2320 size_t ssid_len)
2321 {
2322 wpa_printf(MSG_DEBUG, "%s", __func__);
2323 return 0;
2324 }
2325
2326
2327 static int wpa_driver_test_set_bssid(void *priv, const u8 *bssid)
2328 {
2329 wpa_printf(MSG_DEBUG, "%s: bssid=" MACSTR, __func__, MAC2STR(bssid));
2330 return 0;
2331 }
2332
2333
2334 static void * wpa_driver_test_global_init(void)
2335 {
2336 struct wpa_driver_test_global *global;
2337
2338 global = os_zalloc(sizeof(*global));
2339 return global;
2340 }
2341
2342
2343 static void wpa_driver_test_global_deinit(void *priv)
2344 {
2345 struct wpa_driver_test_global *global = priv;
2346 os_free(global);
2347 }
2348
2349
2350 static struct wpa_interface_info *
2351 wpa_driver_test_get_interfaces(void *global_priv)
2352 {
2353 /* struct wpa_driver_test_global *global = priv; */
2354 struct wpa_interface_info *iface;
2355
2356 iface = os_zalloc(sizeof(*iface));
2357 if (iface == NULL)
2358 return iface;
2359 iface->ifname = os_strdup("sta0");
2360 iface->desc = os_strdup("test interface 0");
2361 iface->drv_name = "test";
2362 iface->next = os_zalloc(sizeof(*iface));
2363 if (iface->next) {
2364 iface->next->ifname = os_strdup("sta1");
2365 iface->next->desc = os_strdup("test interface 1");
2366 iface->next->drv_name = "test";
2367 }
2368
2369 return iface;
2370 }
2371
2372
2373 static struct hostapd_hw_modes *
2374 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
2375 {
2376 struct hostapd_hw_modes *modes;
2377 size_t i;
2378
2379 *num_modes = 3;
2380 *flags = 0;
2381 modes = os_zalloc(*num_modes * sizeof(struct hostapd_hw_modes));
2382 if (modes == NULL)
2383 return NULL;
2384 modes[0].mode = HOSTAPD_MODE_IEEE80211G;
2385 modes[0].num_channels = 11;
2386 modes[0].num_rates = 12;
2387 modes[0].channels =
2388 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2389 modes[0].rates = os_zalloc(modes[0].num_rates * sizeof(int));
2390 if (modes[0].channels == NULL || modes[0].rates == NULL)
2391 goto fail;
2392 for (i = 0; i < 11; i++) {
2393 modes[0].channels[i].chan = i + 1;
2394 modes[0].channels[i].freq = 2412 + 5 * i;
2395 modes[0].channels[i].flag = 0;
2396 }
2397 modes[0].rates[0] = 10;
2398 modes[0].rates[1] = 20;
2399 modes[0].rates[2] = 55;
2400 modes[0].rates[3] = 110;
2401 modes[0].rates[4] = 60;
2402 modes[0].rates[5] = 90;
2403 modes[0].rates[6] = 120;
2404 modes[0].rates[7] = 180;
2405 modes[0].rates[8] = 240;
2406 modes[0].rates[9] = 360;
2407 modes[0].rates[10] = 480;
2408 modes[0].rates[11] = 540;
2409
2410 modes[1].mode = HOSTAPD_MODE_IEEE80211B;
2411 modes[1].num_channels = 11;
2412 modes[1].num_rates = 4;
2413 modes[1].channels =
2414 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2415 modes[1].rates = os_zalloc(modes[1].num_rates * sizeof(int));
2416 if (modes[1].channels == NULL || modes[1].rates == NULL)
2417 goto fail;
2418 for (i = 0; i < 11; i++) {
2419 modes[1].channels[i].chan = i + 1;
2420 modes[1].channels[i].freq = 2412 + 5 * i;
2421 modes[1].channels[i].flag = 0;
2422 }
2423 modes[1].rates[0] = 10;
2424 modes[1].rates[1] = 20;
2425 modes[1].rates[2] = 55;
2426 modes[1].rates[3] = 110;
2427
2428 modes[2].mode = HOSTAPD_MODE_IEEE80211A;
2429 modes[2].num_channels = 1;
2430 modes[2].num_rates = 8;
2431 modes[2].channels = os_zalloc(sizeof(struct hostapd_channel_data));
2432 modes[2].rates = os_zalloc(modes[2].num_rates * sizeof(int));
2433 if (modes[2].channels == NULL || modes[2].rates == NULL)
2434 goto fail;
2435 modes[2].channels[0].chan = 60;
2436 modes[2].channels[0].freq = 5300;
2437 modes[2].channels[0].flag = 0;
2438 modes[2].rates[0] = 60;
2439 modes[2].rates[1] = 90;
2440 modes[2].rates[2] = 120;
2441 modes[2].rates[3] = 180;
2442 modes[2].rates[4] = 240;
2443 modes[2].rates[5] = 360;
2444 modes[2].rates[6] = 480;
2445 modes[2].rates[7] = 540;
2446
2447 return modes;
2448
2449 fail:
2450 if (modes) {
2451 for (i = 0; i < *num_modes; i++) {
2452 os_free(modes[i].channels);
2453 os_free(modes[i].rates);
2454 }
2455 os_free(modes);
2456 }
2457 return NULL;
2458 }
2459
2460
2461 const struct wpa_driver_ops wpa_driver_test_ops = {
2462 "test",
2463 "wpa_supplicant test driver",
2464 .hapd_init = test_driver_init,
2465 .hapd_deinit = wpa_driver_test_deinit,
2466 .hapd_send_eapol = test_driver_send_eapol,
2467 .send_mlme = wpa_driver_test_send_mlme,
2468 .set_generic_elem = test_driver_set_generic_elem,
2469 .sta_deauth = test_driver_sta_deauth,
2470 .sta_disassoc = test_driver_sta_disassoc,
2471 .get_hw_feature_data = wpa_driver_test_get_hw_feature_data,
2472 .if_add = test_driver_if_add,
2473 .if_remove = test_driver_if_remove,
2474 .valid_bss_mask = test_driver_valid_bss_mask,
2475 .hapd_set_ssid = test_driver_set_ssid,
2476 .set_privacy = test_driver_set_privacy,
2477 .set_sta_vlan = test_driver_set_sta_vlan,
2478 .sta_add = test_driver_sta_add,
2479 .send_ether = test_driver_send_ether,
2480 .set_ap_wps_ie = test_driver_set_ap_wps_ie,
2481 .get_bssid = wpa_driver_test_get_bssid,
2482 .get_ssid = wpa_driver_test_get_ssid,
2483 .set_key = wpa_driver_test_set_key,
2484 .deinit = wpa_driver_test_deinit,
2485 .set_param = wpa_driver_test_set_param,
2486 .deauthenticate = wpa_driver_test_deauthenticate,
2487 .disassociate = wpa_driver_test_disassociate,
2488 .associate = wpa_driver_test_associate,
2489 .get_capa = wpa_driver_test_get_capa,
2490 .get_mac_addr = wpa_driver_test_get_mac_addr,
2491 .send_eapol = wpa_driver_test_send_eapol,
2492 .mlme_setprotection = wpa_driver_test_mlme_setprotection,
2493 .set_channel = wpa_driver_test_set_channel,
2494 .set_ssid = wpa_driver_test_set_ssid,
2495 .set_bssid = wpa_driver_test_set_bssid,
2496 .mlme_add_sta = wpa_driver_test_mlme_add_sta,
2497 .mlme_remove_sta = wpa_driver_test_mlme_remove_sta,
2498 .get_scan_results2 = wpa_driver_test_get_scan_results2,
2499 .global_init = wpa_driver_test_global_init,
2500 .global_deinit = wpa_driver_test_global_deinit,
2501 .init2 = wpa_driver_test_init2,
2502 .get_interfaces = wpa_driver_test_get_interfaces,
2503 .scan2 = wpa_driver_test_scan,
2504 };