]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/drivers/driver_test.c
Add driver API functionality for off-channel Action frames
[thirdparty/hostap.git] / src / drivers / driver_test.c
1 /*
2 * Testing driver interface for a simulated network driver
3 * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15 /* Make sure we get winsock2.h for Windows build to get sockaddr_storage */
16 #include "build_config.h"
17 #ifdef CONFIG_NATIVE_WINDOWS
18 #include <winsock2.h>
19 #endif /* CONFIG_NATIVE_WINDOWS */
20
21 #include "utils/includes.h"
22
23 #ifndef CONFIG_NATIVE_WINDOWS
24 #include <sys/un.h>
25 #include <dirent.h>
26 #include <sys/stat.h>
27 #define DRIVER_TEST_UNIX
28 #endif /* CONFIG_NATIVE_WINDOWS */
29
30 #include "utils/common.h"
31 #include "utils/eloop.h"
32 #include "utils/trace.h"
33 #include "common/ieee802_11_defs.h"
34 #include "crypto/sha1.h"
35 #include "l2_packet/l2_packet.h"
36 #include "driver.h"
37
38
39 struct test_client_socket {
40 struct test_client_socket *next;
41 u8 addr[ETH_ALEN];
42 struct sockaddr_un un;
43 socklen_t unlen;
44 struct test_driver_bss *bss;
45 };
46
47 struct test_driver_bss {
48 struct test_driver_bss *next;
49 void *bss_ctx;
50 char ifname[IFNAMSIZ + 1];
51 u8 bssid[ETH_ALEN];
52 u8 *ie;
53 size_t ielen;
54 u8 *wps_beacon_ie;
55 size_t wps_beacon_ie_len;
56 u8 *wps_probe_resp_ie;
57 size_t wps_probe_resp_ie_len;
58 u8 ssid[32];
59 size_t ssid_len;
60 int privacy;
61 };
62
63 struct wpa_driver_test_global {
64 int bss_add_used;
65 u8 req_addr[ETH_ALEN];
66 };
67
68 struct wpa_driver_test_data {
69 struct wpa_driver_test_global *global;
70 void *ctx;
71 WPA_TRACE_REF(ctx);
72 char ifname[IFNAMSIZ + 1];
73 u8 own_addr[ETH_ALEN];
74 int test_socket;
75 #ifdef DRIVER_TEST_UNIX
76 struct sockaddr_un hostapd_addr;
77 #endif /* DRIVER_TEST_UNIX */
78 int hostapd_addr_set;
79 struct sockaddr_in hostapd_addr_udp;
80 int hostapd_addr_udp_set;
81 char *own_socket_path;
82 char *test_dir;
83 u8 bssid[ETH_ALEN];
84 u8 ssid[32];
85 size_t ssid_len;
86 #define MAX_SCAN_RESULTS 30
87 struct wpa_scan_res *scanres[MAX_SCAN_RESULTS];
88 size_t num_scanres;
89 int use_associnfo;
90 u8 assoc_wpa_ie[80];
91 size_t assoc_wpa_ie_len;
92 int use_mlme;
93 int associated;
94 u8 *probe_req_ie;
95 size_t probe_req_ie_len;
96 int ibss;
97 int privacy;
98 int ap;
99
100 struct test_client_socket *cli;
101 struct test_driver_bss *bss;
102 int udp_port;
103
104 int alloc_iface_idx;
105
106 int probe_req_report;
107 unsigned int remain_on_channel_freq;
108 unsigned int remain_on_channel_duration;
109
110 int current_freq;
111 };
112
113
114 static void wpa_driver_test_deinit(void *priv);
115 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
116 const char *dir, int ap);
117 static void wpa_driver_test_close_test_socket(
118 struct wpa_driver_test_data *drv);
119 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx);
120
121
122 static void test_driver_free_bss(struct test_driver_bss *bss)
123 {
124 os_free(bss->ie);
125 os_free(bss->wps_beacon_ie);
126 os_free(bss->wps_probe_resp_ie);
127 os_free(bss);
128 }
129
130
131 static void test_driver_free_bsses(struct wpa_driver_test_data *drv)
132 {
133 struct test_driver_bss *bss, *prev_bss;
134
135 bss = drv->bss;
136 while (bss) {
137 prev_bss = bss;
138 bss = bss->next;
139 test_driver_free_bss(prev_bss);
140 }
141
142 drv->bss = NULL;
143 }
144
145
146 static struct test_client_socket *
147 test_driver_get_cli(struct wpa_driver_test_data *drv, struct sockaddr_un *from,
148 socklen_t fromlen)
149 {
150 struct test_client_socket *cli = drv->cli;
151
152 while (cli) {
153 if (cli->unlen == fromlen &&
154 strncmp(cli->un.sun_path, from->sun_path,
155 fromlen - sizeof(cli->un.sun_family)) == 0)
156 return cli;
157 cli = cli->next;
158 }
159
160 return NULL;
161 }
162
163
164 static int test_driver_send_eapol(void *priv, const u8 *addr, const u8 *data,
165 size_t data_len, int encrypt,
166 const u8 *own_addr)
167 {
168 struct wpa_driver_test_data *drv = priv;
169 struct test_client_socket *cli;
170 struct msghdr msg;
171 struct iovec io[3];
172 struct l2_ethhdr eth;
173
174 if (drv->test_socket < 0)
175 return -1;
176
177 cli = drv->cli;
178 while (cli) {
179 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
180 break;
181 cli = cli->next;
182 }
183
184 if (!cli) {
185 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
186 __func__);
187 return -1;
188 }
189
190 memcpy(eth.h_dest, addr, ETH_ALEN);
191 memcpy(eth.h_source, own_addr, ETH_ALEN);
192 eth.h_proto = host_to_be16(ETH_P_EAPOL);
193
194 io[0].iov_base = "EAPOL ";
195 io[0].iov_len = 6;
196 io[1].iov_base = &eth;
197 io[1].iov_len = sizeof(eth);
198 io[2].iov_base = (u8 *) data;
199 io[2].iov_len = data_len;
200
201 memset(&msg, 0, sizeof(msg));
202 msg.msg_iov = io;
203 msg.msg_iovlen = 3;
204 msg.msg_name = &cli->un;
205 msg.msg_namelen = cli->unlen;
206 return sendmsg(drv->test_socket, &msg, 0);
207 }
208
209
210 static int test_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
211 u16 proto, const u8 *data, size_t data_len)
212 {
213 struct wpa_driver_test_data *drv = priv;
214 struct msghdr msg;
215 struct iovec io[3];
216 struct l2_ethhdr eth;
217 char desttxt[30];
218 struct sockaddr_un addr;
219 struct dirent *dent;
220 DIR *dir;
221 int ret = 0, broadcast = 0, count = 0;
222
223 if (drv->test_socket < 0 || drv->test_dir == NULL) {
224 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
225 "test_dir=%p)",
226 __func__, drv->test_socket, drv->test_dir);
227 return -1;
228 }
229
230 broadcast = memcmp(dst, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
231 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst));
232
233 memcpy(eth.h_dest, dst, ETH_ALEN);
234 memcpy(eth.h_source, src, ETH_ALEN);
235 eth.h_proto = host_to_be16(proto);
236
237 io[0].iov_base = "ETHER ";
238 io[0].iov_len = 6;
239 io[1].iov_base = &eth;
240 io[1].iov_len = sizeof(eth);
241 io[2].iov_base = (u8 *) data;
242 io[2].iov_len = data_len;
243
244 memset(&msg, 0, sizeof(msg));
245 msg.msg_iov = io;
246 msg.msg_iovlen = 3;
247
248 dir = opendir(drv->test_dir);
249 if (dir == NULL) {
250 perror("test_driver: opendir");
251 return -1;
252 }
253 while ((dent = readdir(dir))) {
254 #ifdef _DIRENT_HAVE_D_TYPE
255 /* Skip the file if it is not a socket. Also accept
256 * DT_UNKNOWN (0) in case the C library or underlying file
257 * system does not support d_type. */
258 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
259 continue;
260 #endif /* _DIRENT_HAVE_D_TYPE */
261 if (strcmp(dent->d_name, ".") == 0 ||
262 strcmp(dent->d_name, "..") == 0)
263 continue;
264
265 memset(&addr, 0, sizeof(addr));
266 addr.sun_family = AF_UNIX;
267 snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
268 drv->test_dir, dent->d_name);
269
270 if (strcmp(addr.sun_path, drv->own_socket_path) == 0)
271 continue;
272 if (!broadcast && strstr(dent->d_name, desttxt) == NULL)
273 continue;
274
275 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
276 __func__, dent->d_name);
277
278 msg.msg_name = &addr;
279 msg.msg_namelen = sizeof(addr);
280 ret = sendmsg(drv->test_socket, &msg, 0);
281 if (ret < 0)
282 perror("driver_test: sendmsg");
283 count++;
284 }
285 closedir(dir);
286
287 if (!broadcast && count == 0) {
288 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
289 __func__, MAC2STR(dst));
290 return -1;
291 }
292
293 return ret;
294 }
295
296
297 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
298 size_t data_len)
299 {
300 struct wpa_driver_test_data *drv = priv;
301 struct msghdr msg;
302 struct iovec io[2];
303 const u8 *dest;
304 struct sockaddr_un addr;
305 struct dirent *dent;
306 DIR *dir;
307 int broadcast;
308 int ret = 0;
309 struct ieee80211_hdr *hdr;
310 u16 fc;
311 #ifdef HOSTAPD
312 char desttxt[30];
313 #endif /* HOSTAPD */
314 union wpa_event_data event;
315
316 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
317 if (drv->test_socket < 0 || data_len < 10) {
318 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
319 " test_dir=%p)",
320 __func__, drv->test_socket,
321 (unsigned long) data_len,
322 drv->test_dir);
323 return -1;
324 }
325
326 dest = data + 4;
327 broadcast = os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0;
328
329 #ifdef HOSTAPD
330 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest));
331 #endif /* HOSTAPD */
332
333 io[0].iov_base = "MLME ";
334 io[0].iov_len = 5;
335 io[1].iov_base = (void *) data;
336 io[1].iov_len = data_len;
337
338 os_memset(&msg, 0, sizeof(msg));
339 msg.msg_iov = io;
340 msg.msg_iovlen = 2;
341
342 #ifdef HOSTAPD
343 if (drv->test_dir == NULL) {
344 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
345 return -1;
346 }
347
348 dir = opendir(drv->test_dir);
349 if (dir == NULL) {
350 perror("test_driver: opendir");
351 return -1;
352 }
353 while ((dent = readdir(dir))) {
354 #ifdef _DIRENT_HAVE_D_TYPE
355 /* Skip the file if it is not a socket. Also accept
356 * DT_UNKNOWN (0) in case the C library or underlying file
357 * system does not support d_type. */
358 if (dent->d_type != DT_SOCK && dent->d_type != DT_UNKNOWN)
359 continue;
360 #endif /* _DIRENT_HAVE_D_TYPE */
361 if (os_strcmp(dent->d_name, ".") == 0 ||
362 os_strcmp(dent->d_name, "..") == 0)
363 continue;
364
365 os_memset(&addr, 0, sizeof(addr));
366 addr.sun_family = AF_UNIX;
367 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
368 drv->test_dir, dent->d_name);
369
370 if (os_strcmp(addr.sun_path, drv->own_socket_path) == 0)
371 continue;
372 if (!broadcast && os_strstr(dent->d_name, desttxt) == NULL)
373 continue;
374
375 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
376 __func__, dent->d_name);
377
378 msg.msg_name = &addr;
379 msg.msg_namelen = sizeof(addr);
380 ret = sendmsg(drv->test_socket, &msg, 0);
381 if (ret < 0)
382 perror("driver_test: sendmsg(test_socket)");
383 }
384 closedir(dir);
385 #else /* HOSTAPD */
386
387 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
388 drv->test_dir == NULL) {
389 if (drv->hostapd_addr_udp_set) {
390 msg.msg_name = &drv->hostapd_addr_udp;
391 msg.msg_namelen = sizeof(drv->hostapd_addr_udp);
392 } else {
393 #ifdef DRIVER_TEST_UNIX
394 msg.msg_name = &drv->hostapd_addr;
395 msg.msg_namelen = sizeof(drv->hostapd_addr);
396 #endif /* DRIVER_TEST_UNIX */
397 }
398 } else if (broadcast) {
399 dir = opendir(drv->test_dir);
400 if (dir == NULL)
401 return -1;
402 while ((dent = readdir(dir))) {
403 #ifdef _DIRENT_HAVE_D_TYPE
404 /* Skip the file if it is not a socket.
405 * Also accept DT_UNKNOWN (0) in case
406 * the C library or underlying file
407 * system does not support d_type. */
408 if (dent->d_type != DT_SOCK &&
409 dent->d_type != DT_UNKNOWN)
410 continue;
411 #endif /* _DIRENT_HAVE_D_TYPE */
412 if (os_strcmp(dent->d_name, ".") == 0 ||
413 os_strcmp(dent->d_name, "..") == 0)
414 continue;
415 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
416 __func__, dent->d_name);
417 os_memset(&addr, 0, sizeof(addr));
418 addr.sun_family = AF_UNIX;
419 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
420 "%s/%s", drv->test_dir, dent->d_name);
421
422 msg.msg_name = &addr;
423 msg.msg_namelen = sizeof(addr);
424
425 ret = sendmsg(drv->test_socket, &msg, 0);
426 if (ret < 0)
427 perror("driver_test: sendmsg(test_socket)");
428 }
429 closedir(dir);
430 return ret;
431 } else {
432 struct stat st;
433 os_memset(&addr, 0, sizeof(addr));
434 addr.sun_family = AF_UNIX;
435 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
436 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
437 if (stat(addr.sun_path, &st) < 0) {
438 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
439 "%s/STA-" MACSTR,
440 drv->test_dir, MAC2STR(dest));
441 }
442 msg.msg_name = &addr;
443 msg.msg_namelen = sizeof(addr);
444 }
445
446 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
447 perror("sendmsg(test_socket)");
448 return -1;
449 }
450 #endif /* HOSTAPD */
451
452 hdr = (struct ieee80211_hdr *) data;
453 fc = le_to_host16(hdr->frame_control);
454
455 os_memset(&event, 0, sizeof(event));
456 event.tx_status.type = WLAN_FC_GET_TYPE(fc);
457 event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
458 event.tx_status.dst = hdr->addr1;
459 event.tx_status.data = data;
460 event.tx_status.data_len = data_len;
461 event.tx_status.ack = ret >= 0;
462 wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
463
464 return ret;
465 }
466
467
468 static void test_driver_scan(struct wpa_driver_test_data *drv,
469 struct sockaddr_un *from, socklen_t fromlen,
470 char *data)
471 {
472 char buf[512], *pos, *end;
473 int ret;
474 struct test_driver_bss *bss;
475 u8 sa[ETH_ALEN];
476 u8 ie[512];
477 size_t ielen;
478 union wpa_event_data event;
479
480 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */
481
482 wpa_printf(MSG_DEBUG, "test_driver: SCAN");
483
484 if (*data) {
485 if (*data != ' ' ||
486 hwaddr_aton(data + 1, sa)) {
487 wpa_printf(MSG_DEBUG, "test_driver: Unexpected SCAN "
488 "command format");
489 return;
490 }
491
492 data += 18;
493 while (*data == ' ')
494 data++;
495 ielen = os_strlen(data) / 2;
496 if (ielen > sizeof(ie))
497 ielen = sizeof(ie);
498 if (hexstr2bin(data, ie, ielen) < 0)
499 ielen = 0;
500
501 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR,
502 MAC2STR(sa));
503 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
504
505 os_memset(&event, 0, sizeof(event));
506 event.rx_probe_req.sa = sa;
507 event.rx_probe_req.ie = ie;
508 event.rx_probe_req.ie_len = ielen;
509 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ, &event);
510 }
511
512 for (bss = drv->bss; bss; bss = bss->next) {
513 pos = buf;
514 end = buf + sizeof(buf);
515
516 /* reply: SCANRESP BSSID SSID IEs */
517 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
518 MAC2STR(bss->bssid));
519 if (ret < 0 || ret >= end - pos)
520 return;
521 pos += ret;
522 pos += wpa_snprintf_hex(pos, end - pos,
523 bss->ssid, bss->ssid_len);
524 ret = snprintf(pos, end - pos, " ");
525 if (ret < 0 || ret >= end - pos)
526 return;
527 pos += ret;
528 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bss->ielen);
529 pos += wpa_snprintf_hex(pos, end - pos, bss->wps_probe_resp_ie,
530 bss->wps_probe_resp_ie_len);
531
532 if (bss->privacy) {
533 ret = snprintf(pos, end - pos, " PRIVACY");
534 if (ret < 0 || ret >= end - pos)
535 return;
536 pos += ret;
537 }
538
539 sendto(drv->test_socket, buf, pos - buf, 0,
540 (struct sockaddr *) from, fromlen);
541 }
542 }
543
544
545 static void test_driver_assoc(struct wpa_driver_test_data *drv,
546 struct sockaddr_un *from, socklen_t fromlen,
547 char *data)
548 {
549 struct test_client_socket *cli;
550 u8 ie[256], ssid[32];
551 size_t ielen, ssid_len = 0;
552 char *pos, *pos2, cmd[50];
553 struct test_driver_bss *bss;
554
555 /* data: STA-addr SSID(hex) IEs(hex) */
556
557 cli = os_zalloc(sizeof(*cli));
558 if (cli == NULL)
559 return;
560
561 if (hwaddr_aton(data, cli->addr)) {
562 printf("test_socket: Invalid MAC address '%s' in ASSOC\n",
563 data);
564 os_free(cli);
565 return;
566 }
567 pos = data + 17;
568 while (*pos == ' ')
569 pos++;
570 pos2 = strchr(pos, ' ');
571 ielen = 0;
572 if (pos2) {
573 ssid_len = (pos2 - pos) / 2;
574 if (hexstr2bin(pos, ssid, ssid_len) < 0) {
575 wpa_printf(MSG_DEBUG, "%s: Invalid SSID", __func__);
576 os_free(cli);
577 return;
578 }
579 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_assoc: SSID",
580 ssid, ssid_len);
581
582 pos = pos2 + 1;
583 ielen = strlen(pos) / 2;
584 if (ielen > sizeof(ie))
585 ielen = sizeof(ie);
586 if (hexstr2bin(pos, ie, ielen) < 0)
587 ielen = 0;
588 }
589
590 for (bss = drv->bss; bss; bss = bss->next) {
591 if (bss->ssid_len == ssid_len &&
592 memcmp(bss->ssid, ssid, ssid_len) == 0)
593 break;
594 }
595 if (bss == NULL) {
596 wpa_printf(MSG_DEBUG, "%s: No matching SSID found from "
597 "configured BSSes", __func__);
598 os_free(cli);
599 return;
600 }
601
602 cli->bss = bss;
603 memcpy(&cli->un, from, sizeof(cli->un));
604 cli->unlen = fromlen;
605 cli->next = drv->cli;
606 drv->cli = cli;
607 wpa_hexdump_ascii(MSG_DEBUG, "test_socket: ASSOC sun_path",
608 (const u8 *) cli->un.sun_path,
609 cli->unlen - sizeof(cli->un.sun_family));
610
611 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0",
612 MAC2STR(bss->bssid));
613 sendto(drv->test_socket, cmd, strlen(cmd), 0,
614 (struct sockaddr *) from, fromlen);
615
616 #ifdef HOSTAPD
617 if (hostapd_notif_assoc(bss->bss_ctx, cli->addr, ie, ielen) < 0)
618 wpa_printf(MSG_DEBUG, "test_driver: failed to add new STA");
619 #endif /* HOSTAPD */
620 }
621
622
623 static void test_driver_disassoc(struct wpa_driver_test_data *drv,
624 struct sockaddr_un *from, socklen_t fromlen)
625 {
626 struct test_client_socket *cli;
627
628 cli = test_driver_get_cli(drv, from, fromlen);
629 if (!cli)
630 return;
631
632 #ifdef HOSTAPD
633 hostapd_notif_disassoc(drv->ctx, cli->addr);
634 #endif /* HOSTAPD */
635 }
636
637
638 static void test_driver_eapol(struct wpa_driver_test_data *drv,
639 struct sockaddr_un *from, socklen_t fromlen,
640 u8 *data, size_t datalen)
641 {
642 #ifdef HOSTAPD
643 struct test_client_socket *cli;
644 #endif /* HOSTAPD */
645 const u8 *src = NULL;
646
647 if (datalen > 14) {
648 /* Skip Ethernet header */
649 src = data + ETH_ALEN;
650 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src="
651 MACSTR " proto=%04x",
652 MAC2STR(data), MAC2STR(src),
653 WPA_GET_BE16(data + 2 * ETH_ALEN));
654 data += 14;
655 datalen -= 14;
656 }
657 #ifdef HOSTAPD
658 cli = test_driver_get_cli(drv, from, fromlen);
659 if (cli) {
660 hostapd_eapol_receive(cli->bss->bss_ctx, cli->addr, data,
661 datalen);
662 } else {
663 wpa_printf(MSG_DEBUG, "test_socket: EAPOL from unknown "
664 "client");
665 }
666 #else /* HOSTAPD */
667 if (src)
668 wpa_supplicant_rx_eapol(drv->ctx, src, data, datalen);
669 #endif /* HOSTAPD */
670 }
671
672
673 static void test_driver_ether(struct wpa_driver_test_data *drv,
674 struct sockaddr_un *from, socklen_t fromlen,
675 u8 *data, size_t datalen)
676 {
677 struct l2_ethhdr *eth;
678
679 if (datalen < sizeof(*eth))
680 return;
681
682 eth = (struct l2_ethhdr *) data;
683 wpa_printf(MSG_DEBUG, "test_driver: RX ETHER dst=" MACSTR " src="
684 MACSTR " proto=%04x",
685 MAC2STR(eth->h_dest), MAC2STR(eth->h_source),
686 be_to_host16(eth->h_proto));
687
688 #ifdef CONFIG_IEEE80211R
689 if (be_to_host16(eth->h_proto) == ETH_P_RRB) {
690 union wpa_event_data ev;
691 os_memset(&ev, 0, sizeof(ev));
692 ev.ft_rrb_rx.src = eth->h_source;
693 ev.ft_rrb_rx.data = data + sizeof(*eth);
694 ev.ft_rrb_rx.data_len = datalen - sizeof(*eth);
695 }
696 #endif /* CONFIG_IEEE80211R */
697 }
698
699
700 static void test_driver_mlme(struct wpa_driver_test_data *drv,
701 struct sockaddr_un *from, socklen_t fromlen,
702 u8 *data, size_t datalen)
703 {
704 struct ieee80211_hdr *hdr;
705 u16 fc;
706 union wpa_event_data event;
707
708 hdr = (struct ieee80211_hdr *) data;
709
710 if (test_driver_get_cli(drv, from, fromlen) == NULL && datalen >= 16) {
711 struct test_client_socket *cli;
712 cli = os_zalloc(sizeof(*cli));
713 if (cli == NULL)
714 return;
715 wpa_printf(MSG_DEBUG, "Adding client entry for " MACSTR,
716 MAC2STR(hdr->addr2));
717 memcpy(cli->addr, hdr->addr2, ETH_ALEN);
718 memcpy(&cli->un, from, sizeof(cli->un));
719 cli->unlen = fromlen;
720 cli->next = drv->cli;
721 drv->cli = cli;
722 }
723
724 wpa_hexdump(MSG_MSGDUMP, "test_driver_mlme: received frame",
725 data, datalen);
726 fc = le_to_host16(hdr->frame_control);
727 if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) {
728 wpa_printf(MSG_ERROR, "%s: received non-mgmt frame",
729 __func__);
730 return;
731 }
732
733 os_memset(&event, 0, sizeof(event));
734 event.rx_mgmt.frame = data;
735 event.rx_mgmt.frame_len = datalen;
736 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
737 }
738
739
740 static void test_driver_receive_unix(int sock, void *eloop_ctx, void *sock_ctx)
741 {
742 struct wpa_driver_test_data *drv = eloop_ctx;
743 char buf[2000];
744 int res;
745 struct sockaddr_un from;
746 socklen_t fromlen = sizeof(from);
747
748 res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
749 (struct sockaddr *) &from, &fromlen);
750 if (res < 0) {
751 perror("recvfrom(test_socket)");
752 return;
753 }
754 buf[res] = '\0';
755
756 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
757
758 if (strncmp(buf, "SCAN", 4) == 0) {
759 test_driver_scan(drv, &from, fromlen, buf + 4);
760 } else if (strncmp(buf, "ASSOC ", 6) == 0) {
761 test_driver_assoc(drv, &from, fromlen, buf + 6);
762 } else if (strcmp(buf, "DISASSOC") == 0) {
763 test_driver_disassoc(drv, &from, fromlen);
764 } else if (strncmp(buf, "EAPOL ", 6) == 0) {
765 test_driver_eapol(drv, &from, fromlen, (u8 *) buf + 6,
766 res - 6);
767 } else if (strncmp(buf, "ETHER ", 6) == 0) {
768 test_driver_ether(drv, &from, fromlen, (u8 *) buf + 6,
769 res - 6);
770 } else if (strncmp(buf, "MLME ", 5) == 0) {
771 test_driver_mlme(drv, &from, fromlen, (u8 *) buf + 5, res - 5);
772 } else {
773 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
774 (u8 *) buf, res);
775 }
776 }
777
778
779 static struct test_driver_bss *
780 test_driver_get_bss(struct wpa_driver_test_data *drv, const char *ifname)
781 {
782 struct test_driver_bss *bss;
783
784 for (bss = drv->bss; bss; bss = bss->next) {
785 if (os_strcmp(bss->ifname, ifname) == 0)
786 return bss;
787 }
788 return NULL;
789 }
790
791
792 static int test_driver_set_generic_elem(const char *ifname, void *priv,
793 const u8 *elem, size_t elem_len)
794 {
795 struct wpa_driver_test_data *drv = priv;
796 struct test_driver_bss *bss;
797
798 bss = test_driver_get_bss(drv, ifname);
799 if (bss == NULL)
800 return -1;
801
802 os_free(bss->ie);
803
804 if (elem == NULL) {
805 bss->ie = NULL;
806 bss->ielen = 0;
807 return 0;
808 }
809
810 bss->ie = os_malloc(elem_len);
811 if (bss->ie == NULL) {
812 bss->ielen = 0;
813 return -1;
814 }
815
816 memcpy(bss->ie, elem, elem_len);
817 bss->ielen = elem_len;
818 return 0;
819 }
820
821
822 static int test_driver_set_ap_wps_ie(const char *ifname, void *priv,
823 const struct wpabuf *beacon,
824 const struct wpabuf *proberesp)
825 {
826 struct wpa_driver_test_data *drv = priv;
827 struct test_driver_bss *bss;
828
829 bss = test_driver_get_bss(drv, ifname);
830 if (bss == NULL)
831 return -1;
832
833 if (beacon == NULL)
834 wpa_printf(MSG_DEBUG, "test_driver: Clear Beacon WPS IE");
835 else
836 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Beacon WPS IE",
837 beacon);
838
839 os_free(bss->wps_beacon_ie);
840
841 if (beacon == NULL) {
842 bss->wps_beacon_ie = NULL;
843 bss->wps_beacon_ie_len = 0;
844 } else {
845 bss->wps_beacon_ie = os_malloc(wpabuf_len(beacon));
846 if (bss->wps_beacon_ie == NULL) {
847 bss->wps_beacon_ie_len = 0;
848 return -1;
849 }
850
851 os_memcpy(bss->wps_beacon_ie, wpabuf_head(beacon),
852 wpabuf_len(beacon));
853 bss->wps_beacon_ie_len = wpabuf_len(beacon);
854 }
855
856 if (proberesp == NULL)
857 wpa_printf(MSG_DEBUG, "test_driver: Clear Probe Response WPS "
858 "IE");
859 else
860 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Probe Response WPS "
861 "IE", proberesp);
862
863 os_free(bss->wps_probe_resp_ie);
864
865 if (proberesp == NULL) {
866 bss->wps_probe_resp_ie = NULL;
867 bss->wps_probe_resp_ie_len = 0;
868 } else {
869 bss->wps_probe_resp_ie = os_malloc(wpabuf_len(proberesp));
870 if (bss->wps_probe_resp_ie == NULL) {
871 bss->wps_probe_resp_ie_len = 0;
872 return -1;
873 }
874
875 os_memcpy(bss->wps_probe_resp_ie, wpabuf_head(proberesp),
876 wpabuf_len(proberesp));
877 bss->wps_probe_resp_ie_len = wpabuf_len(proberesp);
878 }
879
880 return 0;
881 }
882
883
884 static int test_driver_sta_deauth(void *priv, const u8 *own_addr,
885 const u8 *addr, int reason)
886 {
887 struct wpa_driver_test_data *drv = priv;
888 struct test_client_socket *cli;
889
890 if (drv->test_socket < 0)
891 return -1;
892
893 cli = drv->cli;
894 while (cli) {
895 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
896 break;
897 cli = cli->next;
898 }
899
900 if (!cli)
901 return -1;
902
903 return sendto(drv->test_socket, "DEAUTH", 6, 0,
904 (struct sockaddr *) &cli->un, cli->unlen);
905 }
906
907
908 static int test_driver_sta_disassoc(void *priv, const u8 *own_addr,
909 const u8 *addr, int reason)
910 {
911 struct wpa_driver_test_data *drv = priv;
912 struct test_client_socket *cli;
913
914 if (drv->test_socket < 0)
915 return -1;
916
917 cli = drv->cli;
918 while (cli) {
919 if (memcmp(cli->addr, addr, ETH_ALEN) == 0)
920 break;
921 cli = cli->next;
922 }
923
924 if (!cli)
925 return -1;
926
927 return sendto(drv->test_socket, "DISASSOC", 8, 0,
928 (struct sockaddr *) &cli->un, cli->unlen);
929 }
930
931
932 static int test_driver_bss_add(void *priv, const char *ifname, const u8 *bssid,
933 void *bss_ctx)
934 {
935 struct wpa_driver_test_data *drv = priv;
936 struct test_driver_bss *bss;
937
938 wpa_printf(MSG_DEBUG, "%s(ifname=%s bssid=" MACSTR ")",
939 __func__, ifname, MAC2STR(bssid));
940
941 bss = os_zalloc(sizeof(*bss));
942 if (bss == NULL)
943 return -1;
944
945 bss->bss_ctx = bss_ctx;
946 os_strlcpy(bss->ifname, ifname, IFNAMSIZ);
947 memcpy(bss->bssid, bssid, ETH_ALEN);
948
949 bss->next = drv->bss;
950 drv->bss = bss;
951 drv->global->bss_add_used = 1;
952 os_memcpy(drv->global->req_addr, bssid, ETH_ALEN);
953
954 return 0;
955 }
956
957
958 static int test_driver_bss_remove(void *priv, const char *ifname)
959 {
960 struct wpa_driver_test_data *drv = priv;
961 struct test_driver_bss *bss, *prev;
962 struct test_client_socket *cli, *prev_c;
963
964 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
965
966 for (prev = NULL, bss = drv->bss; bss; prev = bss, bss = bss->next) {
967 if (strcmp(bss->ifname, ifname) != 0)
968 continue;
969
970 if (prev)
971 prev->next = bss->next;
972 else
973 drv->bss = bss->next;
974
975 for (prev_c = NULL, cli = drv->cli; cli;
976 prev_c = cli, cli = cli->next) {
977 if (cli->bss != bss)
978 continue;
979 if (prev_c)
980 prev_c->next = cli->next;
981 else
982 drv->cli = cli->next;
983 os_free(cli);
984 break;
985 }
986
987 test_driver_free_bss(bss);
988 return 0;
989 }
990
991 return -1;
992 }
993
994
995 static int test_driver_if_add(const char *iface, void *priv,
996 enum wpa_driver_if_type type, const char *ifname,
997 const u8 *addr, void *bss_ctx)
998 {
999 wpa_printf(MSG_DEBUG, "%s(iface=%s type=%d ifname=%s bss_ctx=%p)",
1000 __func__, iface, type, ifname, bss_ctx);
1001 if (type == WPA_IF_AP_BSS)
1002 return test_driver_bss_add(priv, ifname, addr, bss_ctx);
1003 return 0;
1004 }
1005
1006
1007 static int test_driver_if_remove(void *priv, enum wpa_driver_if_type type,
1008 const char *ifname)
1009 {
1010 wpa_printf(MSG_DEBUG, "%s(type=%d ifname=%s)", __func__, type, ifname);
1011 if (type == WPA_IF_AP_BSS)
1012 return test_driver_bss_remove(priv, ifname);
1013 return 0;
1014 }
1015
1016
1017 static int test_driver_valid_bss_mask(void *priv, const u8 *addr,
1018 const u8 *mask)
1019 {
1020 return 0;
1021 }
1022
1023
1024 static int test_driver_set_ssid(const char *ifname, void *priv, const u8 *buf,
1025 int len)
1026 {
1027 struct wpa_driver_test_data *drv = priv;
1028 struct test_driver_bss *bss;
1029
1030 wpa_printf(MSG_DEBUG, "%s(ifname=%s)", __func__, ifname);
1031 wpa_hexdump_ascii(MSG_DEBUG, "test_driver_set_ssid: SSID", buf, len);
1032
1033 bss = test_driver_get_bss(drv, ifname);
1034 if (bss == NULL) {
1035 wpa_printf(MSG_DEBUG, "%s(ifname=%s): failed to find BSS data",
1036 __func__, ifname);
1037 return -1;
1038 }
1039
1040 if (len < 0 || (size_t) len > sizeof(bss->ssid))
1041 return -1;
1042
1043 os_memcpy(bss->ssid, buf, len);
1044 bss->ssid_len = len;
1045
1046 return 0;
1047 }
1048
1049
1050 static int test_driver_set_privacy(const char *ifname, void *priv, int enabled)
1051 {
1052 struct wpa_driver_test_data *drv = priv;
1053 struct test_driver_bss *bss;
1054
1055 wpa_printf(MSG_DEBUG, "%s(ifname=%s enabled=%d)",
1056 __func__, ifname, enabled);
1057
1058 bss = test_driver_get_bss(drv, ifname);
1059 if (bss == NULL)
1060 return -1;
1061
1062 bss->privacy = enabled;
1063
1064 return 0;
1065 }
1066
1067
1068 static int test_driver_set_sta_vlan(void *priv, const u8 *addr,
1069 const char *ifname, int vlan_id)
1070 {
1071 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " ifname=%s vlan_id=%d)",
1072 __func__, MAC2STR(addr), ifname, vlan_id);
1073 return 0;
1074 }
1075
1076
1077 static int test_driver_sta_add(const char *ifname, void *priv,
1078 struct hostapd_sta_add_params *params)
1079 {
1080 struct wpa_driver_test_data *drv = priv;
1081 struct test_client_socket *cli;
1082 struct test_driver_bss *bss;
1083
1084 wpa_printf(MSG_DEBUG, "%s(ifname=%s addr=" MACSTR " aid=%d "
1085 "capability=0x%x listen_interval=%d)",
1086 __func__, ifname, MAC2STR(params->addr), params->aid,
1087 params->capability, params->listen_interval);
1088 wpa_hexdump(MSG_DEBUG, "test_driver_sta_add - supp_rates",
1089 params->supp_rates, params->supp_rates_len);
1090
1091 cli = drv->cli;
1092 while (cli) {
1093 if (os_memcmp(cli->addr, params->addr, ETH_ALEN) == 0)
1094 break;
1095 cli = cli->next;
1096 }
1097 if (!cli) {
1098 wpa_printf(MSG_DEBUG, "%s: no matching client entry",
1099 __func__);
1100 return -1;
1101 }
1102
1103 bss = test_driver_get_bss(drv, ifname);
1104 if (bss == NULL) {
1105 wpa_printf(MSG_DEBUG, "%s: No matching interface found from "
1106 "configured BSSes", __func__);
1107 return -1;
1108 }
1109
1110 cli->bss = bss;
1111
1112 return 0;
1113 }
1114
1115
1116 static struct wpa_driver_test_data * test_alloc_data(void *ctx,
1117 const char *ifname)
1118 {
1119 struct wpa_driver_test_data *drv;
1120
1121 drv = os_zalloc(sizeof(struct wpa_driver_test_data));
1122 if (drv == NULL) {
1123 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1124 "driver data");
1125 return NULL;
1126 }
1127
1128 drv->ctx = ctx;
1129 wpa_trace_add_ref(drv, ctx, ctx);
1130 os_strlcpy(drv->ifname, ifname, IFNAMSIZ);
1131
1132 /* Generate a MAC address to help testing with multiple STAs */
1133 drv->own_addr[0] = 0x02; /* locally administered */
1134 sha1_prf((const u8 *) ifname, os_strlen(ifname),
1135 "test mac addr generation",
1136 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
1137
1138 return drv;
1139 }
1140
1141
1142 static void * test_driver_init(struct hostapd_data *hapd,
1143 struct wpa_init_params *params)
1144 {
1145 struct wpa_driver_test_data *drv;
1146 struct sockaddr_un addr_un;
1147 struct sockaddr_in addr_in;
1148 struct sockaddr *addr;
1149 socklen_t alen;
1150
1151 drv = test_alloc_data(hapd, params->ifname);
1152 if (drv == NULL)
1153 return NULL;
1154 drv->ap = 1;
1155 drv->bss = os_zalloc(sizeof(*drv->bss));
1156 if (drv->bss == NULL) {
1157 wpa_printf(MSG_ERROR, "Could not allocate memory for test "
1158 "driver BSS data");
1159 os_free(drv);
1160 return NULL;
1161 }
1162
1163 drv->bss->bss_ctx = hapd;
1164 os_strlcpy(drv->bss->ifname, params->ifname, IFNAMSIZ);
1165 os_memcpy(drv->bss->bssid, drv->own_addr, ETH_ALEN);
1166 os_memcpy(params->own_addr, drv->own_addr, ETH_ALEN);
1167
1168 if (params->test_socket) {
1169 if (os_strlen(params->test_socket) >=
1170 sizeof(addr_un.sun_path)) {
1171 printf("Too long test_socket path\n");
1172 wpa_driver_test_deinit(drv);
1173 return NULL;
1174 }
1175 if (strncmp(params->test_socket, "DIR:", 4) == 0) {
1176 size_t len = strlen(params->test_socket) + 30;
1177 drv->test_dir = os_strdup(params->test_socket + 4);
1178 drv->own_socket_path = os_malloc(len);
1179 if (drv->own_socket_path) {
1180 snprintf(drv->own_socket_path, len,
1181 "%s/AP-" MACSTR,
1182 params->test_socket + 4,
1183 MAC2STR(params->own_addr));
1184 }
1185 } else if (strncmp(params->test_socket, "UDP:", 4) == 0) {
1186 drv->udp_port = atoi(params->test_socket + 4);
1187 } else {
1188 drv->own_socket_path = os_strdup(params->test_socket);
1189 }
1190 if (drv->own_socket_path == NULL && drv->udp_port == 0) {
1191 wpa_driver_test_deinit(drv);
1192 return NULL;
1193 }
1194
1195 drv->test_socket = socket(drv->udp_port ? PF_INET : PF_UNIX,
1196 SOCK_DGRAM, 0);
1197 if (drv->test_socket < 0) {
1198 perror("socket");
1199 wpa_driver_test_deinit(drv);
1200 return NULL;
1201 }
1202
1203 if (drv->udp_port) {
1204 os_memset(&addr_in, 0, sizeof(addr_in));
1205 addr_in.sin_family = AF_INET;
1206 addr_in.sin_port = htons(drv->udp_port);
1207 addr = (struct sockaddr *) &addr_in;
1208 alen = sizeof(addr_in);
1209 } else {
1210 os_memset(&addr_un, 0, sizeof(addr_un));
1211 addr_un.sun_family = AF_UNIX;
1212 os_strlcpy(addr_un.sun_path, drv->own_socket_path,
1213 sizeof(addr_un.sun_path));
1214 addr = (struct sockaddr *) &addr_un;
1215 alen = sizeof(addr_un);
1216 }
1217 if (bind(drv->test_socket, addr, alen) < 0) {
1218 perror("bind(PF_UNIX)");
1219 close(drv->test_socket);
1220 if (drv->own_socket_path)
1221 unlink(drv->own_socket_path);
1222 wpa_driver_test_deinit(drv);
1223 return NULL;
1224 }
1225 eloop_register_read_sock(drv->test_socket,
1226 test_driver_receive_unix, drv, NULL);
1227 } else
1228 drv->test_socket = -1;
1229
1230 return drv;
1231 }
1232
1233
1234 static void wpa_driver_test_poll(void *eloop_ctx, void *timeout_ctx)
1235 {
1236 struct wpa_driver_test_data *drv = eloop_ctx;
1237
1238 #ifdef DRIVER_TEST_UNIX
1239 if (drv->associated && drv->hostapd_addr_set) {
1240 struct stat st;
1241 if (stat(drv->hostapd_addr.sun_path, &st) < 0) {
1242 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
1243 __func__, strerror(errno));
1244 drv->associated = 0;
1245 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1246 }
1247 }
1248 #endif /* DRIVER_TEST_UNIX */
1249
1250 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1251 }
1252
1253
1254 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1255 {
1256 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1257 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1258 }
1259
1260
1261 #ifdef DRIVER_TEST_UNIX
1262 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
1263 const char *path)
1264 {
1265 struct dirent *dent;
1266 DIR *dir;
1267 struct sockaddr_un addr;
1268 char cmd[512], *pos, *end;
1269 int ret;
1270
1271 dir = opendir(path);
1272 if (dir == NULL)
1273 return;
1274
1275 end = cmd + sizeof(cmd);
1276 pos = cmd;
1277 ret = os_snprintf(pos, end - pos, "SCAN " MACSTR,
1278 MAC2STR(drv->own_addr));
1279 if (ret >= 0 && ret < end - pos)
1280 pos += ret;
1281 if (drv->probe_req_ie) {
1282 ret = os_snprintf(pos, end - pos, " ");
1283 if (ret >= 0 && ret < end - pos)
1284 pos += ret;
1285 pos += wpa_snprintf_hex(pos, end - pos, drv->probe_req_ie,
1286 drv->probe_req_ie_len);
1287 }
1288 end[-1] = '\0';
1289
1290 while ((dent = readdir(dir))) {
1291 if (os_strncmp(dent->d_name, "AP-", 3) != 0 &&
1292 os_strncmp(dent->d_name, "STA-", 4) != 0)
1293 continue;
1294 if (drv->own_socket_path) {
1295 size_t olen, dlen;
1296 olen = os_strlen(drv->own_socket_path);
1297 dlen = os_strlen(dent->d_name);
1298 if (olen >= dlen &&
1299 os_strcmp(dent->d_name,
1300 drv->own_socket_path + olen - dlen) == 0)
1301 continue;
1302 }
1303 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
1304
1305 os_memset(&addr, 0, sizeof(addr));
1306 addr.sun_family = AF_UNIX;
1307 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
1308 path, dent->d_name);
1309
1310 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1311 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1312 perror("sendto(test_socket)");
1313 }
1314 }
1315 closedir(dir);
1316 }
1317 #endif /* DRIVER_TEST_UNIX */
1318
1319
1320 static int wpa_driver_test_scan(void *priv,
1321 struct wpa_driver_scan_params *params)
1322 {
1323 struct wpa_driver_test_data *drv = priv;
1324 size_t i;
1325
1326 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
1327
1328 os_free(drv->probe_req_ie);
1329 if (params->extra_ies) {
1330 drv->probe_req_ie = os_malloc(params->extra_ies_len);
1331 if (drv->probe_req_ie == NULL) {
1332 drv->probe_req_ie_len = 0;
1333 return -1;
1334 }
1335 os_memcpy(drv->probe_req_ie, params->extra_ies,
1336 params->extra_ies_len);
1337 drv->probe_req_ie_len = params->extra_ies_len;
1338 } else {
1339 drv->probe_req_ie = NULL;
1340 drv->probe_req_ie_len = 0;
1341 }
1342
1343 for (i = 0; i < params->num_ssids; i++)
1344 wpa_hexdump(MSG_DEBUG, "Scan SSID",
1345 params->ssids[i].ssid, params->ssids[i].ssid_len);
1346 wpa_hexdump(MSG_DEBUG, "Scan extra IE(s)",
1347 params->extra_ies, params->extra_ies_len);
1348
1349 drv->num_scanres = 0;
1350
1351 #ifdef DRIVER_TEST_UNIX
1352 if (drv->test_socket >= 0 && drv->test_dir)
1353 wpa_driver_scan_dir(drv, drv->test_dir);
1354
1355 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
1356 sendto(drv->test_socket, "SCAN", 4, 0,
1357 (struct sockaddr *) &drv->hostapd_addr,
1358 sizeof(drv->hostapd_addr)) < 0) {
1359 perror("sendto(test_socket)");
1360 }
1361 #endif /* DRIVER_TEST_UNIX */
1362
1363 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1364 sendto(drv->test_socket, "SCAN", 4, 0,
1365 (struct sockaddr *) &drv->hostapd_addr_udp,
1366 sizeof(drv->hostapd_addr_udp)) < 0) {
1367 perror("sendto(test_socket)");
1368 }
1369
1370 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1371 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
1372 drv->ctx);
1373 return 0;
1374 }
1375
1376
1377 static struct wpa_scan_results * wpa_driver_test_get_scan_results2(void *priv)
1378 {
1379 struct wpa_driver_test_data *drv = priv;
1380 struct wpa_scan_results *res;
1381 size_t i;
1382
1383 res = os_zalloc(sizeof(*res));
1384 if (res == NULL)
1385 return NULL;
1386
1387 res->res = os_zalloc(drv->num_scanres * sizeof(struct wpa_scan_res *));
1388 if (res->res == NULL) {
1389 os_free(res);
1390 return NULL;
1391 }
1392
1393 for (i = 0; i < drv->num_scanres; i++) {
1394 struct wpa_scan_res *r;
1395 if (drv->scanres[i] == NULL)
1396 continue;
1397 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len);
1398 if (r == NULL)
1399 break;
1400 os_memcpy(r, drv->scanres[i],
1401 sizeof(*r) + drv->scanres[i]->ie_len);
1402 res->res[res->num++] = r;
1403 }
1404
1405 return res;
1406 }
1407
1408
1409 static int wpa_driver_test_set_key(const char *ifname, void *priv,
1410 enum wpa_alg alg, const u8 *addr,
1411 int key_idx, int set_tx,
1412 const u8 *seq, size_t seq_len,
1413 const u8 *key, size_t key_len)
1414 {
1415 wpa_printf(MSG_DEBUG, "%s: ifname=%s priv=%p alg=%d key_idx=%d "
1416 "set_tx=%d",
1417 __func__, ifname, priv, alg, key_idx, set_tx);
1418 if (addr)
1419 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
1420 if (seq)
1421 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
1422 if (key)
1423 wpa_hexdump_key(MSG_DEBUG, " key", key, key_len);
1424 return 0;
1425 }
1426
1427
1428 static int wpa_driver_update_mode(struct wpa_driver_test_data *drv, int ap)
1429 {
1430 if (ap && !drv->ap) {
1431 wpa_driver_test_close_test_socket(drv);
1432 wpa_driver_test_attach(drv, drv->test_dir, 1);
1433 drv->ap = 1;
1434 } else if (!ap && drv->ap) {
1435 wpa_driver_test_close_test_socket(drv);
1436 wpa_driver_test_attach(drv, drv->test_dir, 0);
1437 drv->ap = 0;
1438 }
1439
1440 return 0;
1441 }
1442
1443
1444 static int wpa_driver_test_associate(
1445 void *priv, struct wpa_driver_associate_params *params)
1446 {
1447 struct wpa_driver_test_data *drv = priv;
1448 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
1449 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
1450 __func__, priv, params->freq, params->pairwise_suite,
1451 params->group_suite, params->key_mgmt_suite,
1452 params->auth_alg, params->mode);
1453 if (params->bssid) {
1454 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
1455 MAC2STR(params->bssid));
1456 }
1457 if (params->ssid) {
1458 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
1459 params->ssid, params->ssid_len);
1460 }
1461 if (params->wpa_ie) {
1462 wpa_hexdump(MSG_DEBUG, " wpa_ie",
1463 params->wpa_ie, params->wpa_ie_len);
1464 drv->assoc_wpa_ie_len = params->wpa_ie_len;
1465 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
1466 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
1467 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
1468 drv->assoc_wpa_ie_len);
1469 } else
1470 drv->assoc_wpa_ie_len = 0;
1471
1472 wpa_driver_update_mode(drv, params->mode == IEEE80211_MODE_AP);
1473
1474 drv->ibss = params->mode == IEEE80211_MODE_IBSS;
1475 drv->privacy = params->key_mgmt_suite &
1476 (WPA_KEY_MGMT_IEEE8021X |
1477 WPA_KEY_MGMT_PSK |
1478 WPA_KEY_MGMT_WPA_NONE |
1479 WPA_KEY_MGMT_FT_IEEE8021X |
1480 WPA_KEY_MGMT_FT_PSK |
1481 WPA_KEY_MGMT_IEEE8021X_SHA256 |
1482 WPA_KEY_MGMT_PSK_SHA256);
1483 if (params->wep_key_len[params->wep_tx_keyidx])
1484 drv->privacy = 1;
1485
1486 #ifdef DRIVER_TEST_UNIX
1487 if (drv->test_dir && params->bssid &&
1488 params->mode != IEEE80211_MODE_IBSS) {
1489 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
1490 drv->hostapd_addr.sun_family = AF_UNIX;
1491 os_snprintf(drv->hostapd_addr.sun_path,
1492 sizeof(drv->hostapd_addr.sun_path),
1493 "%s/AP-" MACSTR,
1494 drv->test_dir, MAC2STR(params->bssid));
1495 drv->hostapd_addr_set = 1;
1496 }
1497 #endif /* DRIVER_TEST_UNIX */
1498
1499 if (params->mode == IEEE80211_MODE_AP) {
1500 struct test_driver_bss *bss;
1501 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1502 drv->ssid_len = params->ssid_len;
1503
1504 test_driver_free_bsses(drv);
1505 bss = drv->bss = os_zalloc(sizeof(*drv->bss));
1506 if (bss == NULL)
1507 return -1;
1508 os_strlcpy(bss->ifname, drv->ifname, IFNAMSIZ);
1509 os_memcpy(bss->bssid, drv->own_addr, ETH_ALEN);
1510 os_memcpy(bss->ssid, params->ssid, params->ssid_len);
1511 bss->ssid_len = params->ssid_len;
1512 bss->privacy = drv->privacy;
1513 if (params->wpa_ie && params->wpa_ie_len) {
1514 bss->ie = os_malloc(params->wpa_ie_len);
1515 if (bss->ie) {
1516 os_memcpy(bss->ie, params->wpa_ie,
1517 params->wpa_ie_len);
1518 bss->ielen = params->wpa_ie_len;
1519 }
1520 }
1521 } else if (drv->test_socket >= 0 &&
1522 (drv->hostapd_addr_set || drv->hostapd_addr_udp_set)) {
1523 char cmd[200], *pos, *end;
1524 int ret;
1525 end = cmd + sizeof(cmd);
1526 pos = cmd;
1527 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
1528 MAC2STR(drv->own_addr));
1529 if (ret >= 0 && ret < end - pos)
1530 pos += ret;
1531 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
1532 params->ssid_len);
1533 ret = os_snprintf(pos, end - pos, " ");
1534 if (ret >= 0 && ret < end - pos)
1535 pos += ret;
1536 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
1537 params->wpa_ie_len);
1538 end[-1] = '\0';
1539 #ifdef DRIVER_TEST_UNIX
1540 if (drv->hostapd_addr_set &&
1541 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1542 (struct sockaddr *) &drv->hostapd_addr,
1543 sizeof(drv->hostapd_addr)) < 0) {
1544 perror("sendto(test_socket)");
1545 return -1;
1546 }
1547 #endif /* DRIVER_TEST_UNIX */
1548 if (drv->hostapd_addr_udp_set &&
1549 sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
1550 (struct sockaddr *) &drv->hostapd_addr_udp,
1551 sizeof(drv->hostapd_addr_udp)) < 0) {
1552 perror("sendto(test_socket)");
1553 return -1;
1554 }
1555
1556 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1557 drv->ssid_len = params->ssid_len;
1558 } else {
1559 drv->associated = 1;
1560 if (params->mode == IEEE80211_MODE_IBSS) {
1561 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1562 drv->ssid_len = params->ssid_len;
1563 if (params->bssid)
1564 os_memcpy(drv->bssid, params->bssid, ETH_ALEN);
1565 else {
1566 os_get_random(drv->bssid, ETH_ALEN);
1567 drv->bssid[0] &= ~0x01;
1568 drv->bssid[0] |= 0x02;
1569 }
1570 }
1571 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1572 }
1573
1574 return 0;
1575 }
1576
1577
1578 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
1579 {
1580 struct wpa_driver_test_data *drv = priv;
1581 os_memcpy(bssid, drv->bssid, ETH_ALEN);
1582 return 0;
1583 }
1584
1585
1586 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
1587 {
1588 struct wpa_driver_test_data *drv = priv;
1589 os_memcpy(ssid, drv->ssid, 32);
1590 return drv->ssid_len;
1591 }
1592
1593
1594 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
1595 {
1596 #ifdef DRIVER_TEST_UNIX
1597 if (drv->test_socket >= 0 &&
1598 sendto(drv->test_socket, "DISASSOC", 8, 0,
1599 (struct sockaddr *) &drv->hostapd_addr,
1600 sizeof(drv->hostapd_addr)) < 0) {
1601 perror("sendto(test_socket)");
1602 return -1;
1603 }
1604 #endif /* DRIVER_TEST_UNIX */
1605 if (drv->test_socket >= 0 && drv->hostapd_addr_udp_set &&
1606 sendto(drv->test_socket, "DISASSOC", 8, 0,
1607 (struct sockaddr *) &drv->hostapd_addr_udp,
1608 sizeof(drv->hostapd_addr_udp)) < 0) {
1609 perror("sendto(test_socket)");
1610 return -1;
1611 }
1612 return 0;
1613 }
1614
1615
1616 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
1617 int reason_code)
1618 {
1619 struct wpa_driver_test_data *drv = priv;
1620 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1621 __func__, MAC2STR(addr), reason_code);
1622 os_memset(drv->bssid, 0, ETH_ALEN);
1623 drv->associated = 0;
1624 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1625 return wpa_driver_test_send_disassoc(drv);
1626 }
1627
1628
1629 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
1630 int reason_code)
1631 {
1632 struct wpa_driver_test_data *drv = priv;
1633 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
1634 __func__, MAC2STR(addr), reason_code);
1635 os_memset(drv->bssid, 0, ETH_ALEN);
1636 drv->associated = 0;
1637 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1638 return wpa_driver_test_send_disassoc(drv);
1639 }
1640
1641
1642 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
1643 struct sockaddr *from,
1644 socklen_t fromlen,
1645 const char *data)
1646 {
1647 struct wpa_scan_res *res;
1648 const char *pos, *pos2;
1649 size_t len;
1650 u8 *ie_pos, *ie_start, *ie_end;
1651 #define MAX_IE_LEN 1000
1652
1653 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
1654 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
1655 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
1656 "result");
1657 return;
1658 }
1659
1660 /* SCANRESP BSSID SSID IEs */
1661
1662 res = os_zalloc(sizeof(*res) + MAX_IE_LEN);
1663 if (res == NULL)
1664 return;
1665 ie_start = ie_pos = (u8 *) (res + 1);
1666 ie_end = ie_pos + MAX_IE_LEN;
1667
1668 if (hwaddr_aton(data, res->bssid)) {
1669 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
1670 os_free(res);
1671 return;
1672 }
1673
1674 pos = data + 17;
1675 while (*pos == ' ')
1676 pos++;
1677 pos2 = os_strchr(pos, ' ');
1678 if (pos2 == NULL) {
1679 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
1680 "in scanres");
1681 os_free(res);
1682 return;
1683 }
1684 len = (pos2 - pos) / 2;
1685 if (len > 32)
1686 len = 32;
1687 /*
1688 * Generate SSID IE from the SSID field since this IE is not included
1689 * in the main IE field.
1690 */
1691 *ie_pos++ = WLAN_EID_SSID;
1692 *ie_pos++ = len;
1693 if (hexstr2bin(pos, ie_pos, len) < 0) {
1694 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
1695 os_free(res);
1696 return;
1697 }
1698 ie_pos += len;
1699
1700 pos = pos2 + 1;
1701 pos2 = os_strchr(pos, ' ');
1702 if (pos2 == NULL)
1703 len = os_strlen(pos) / 2;
1704 else
1705 len = (pos2 - pos) / 2;
1706 if ((int) len > ie_end - ie_pos)
1707 len = ie_end - ie_pos;
1708 if (hexstr2bin(pos, ie_pos, len) < 0) {
1709 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
1710 os_free(res);
1711 return;
1712 }
1713 ie_pos += len;
1714 res->ie_len = ie_pos - ie_start;
1715
1716 if (pos2) {
1717 pos = pos2 + 1;
1718 while (*pos == ' ')
1719 pos++;
1720 if (os_strstr(pos, "PRIVACY"))
1721 res->caps |= IEEE80211_CAP_PRIVACY;
1722 if (os_strstr(pos, "IBSS"))
1723 res->caps |= IEEE80211_CAP_IBSS;
1724 }
1725
1726 os_free(drv->scanres[drv->num_scanres]);
1727 drv->scanres[drv->num_scanres++] = res;
1728 }
1729
1730
1731 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
1732 struct sockaddr *from,
1733 socklen_t fromlen,
1734 const char *data)
1735 {
1736 /* ASSOCRESP BSSID <res> */
1737 if (hwaddr_aton(data, drv->bssid)) {
1738 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
1739 "assocresp");
1740 }
1741 if (drv->use_associnfo) {
1742 union wpa_event_data event;
1743 os_memset(&event, 0, sizeof(event));
1744 event.assoc_info.req_ies = drv->assoc_wpa_ie;
1745 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
1746 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
1747 }
1748 drv->associated = 1;
1749 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1750 }
1751
1752
1753 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
1754 struct sockaddr *from,
1755 socklen_t fromlen)
1756 {
1757 drv->associated = 0;
1758 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1759 }
1760
1761
1762 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
1763 struct sockaddr *from,
1764 socklen_t fromlen,
1765 const u8 *data, size_t data_len)
1766 {
1767 const u8 *src = drv->bssid;
1768
1769 if (data_len > 14) {
1770 /* Skip Ethernet header */
1771 src = data + ETH_ALEN;
1772 data += 14;
1773 data_len -= 14;
1774 }
1775 #ifndef HOSTAPD
1776 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len);
1777 #endif /* HOSTAPD */
1778 }
1779
1780
1781 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
1782 struct sockaddr *from,
1783 socklen_t fromlen,
1784 const u8 *data, size_t data_len)
1785 {
1786 union wpa_event_data event;
1787 os_memset(&event, 0, sizeof(event));
1788 event.mlme_rx.buf = data;
1789 event.mlme_rx.len = data_len;
1790 wpa_supplicant_event(drv->ctx, EVENT_MLME_RX, &event);
1791
1792 if (drv->probe_req_report && data_len >= 24) {
1793 const struct ieee80211_mgmt *mgmt;
1794 u16 fc;
1795
1796 mgmt = (const struct ieee80211_mgmt *) data;
1797 fc = le_to_host16(mgmt->frame_control);
1798 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
1799 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_REQ) {
1800 os_memset(&event, 0, sizeof(event));
1801 event.rx_probe_req.sa = mgmt->sa;
1802 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
1803 event.rx_probe_req.ie_len =
1804 data_len - (mgmt->u.probe_req.variable - data);
1805 wpa_supplicant_event(drv->ctx, EVENT_RX_PROBE_REQ,
1806 &event);
1807 }
1808 }
1809 }
1810
1811
1812 static void wpa_driver_test_scan_cmd(struct wpa_driver_test_data *drv,
1813 struct sockaddr *from,
1814 socklen_t fromlen,
1815 const u8 *data, size_t data_len)
1816 {
1817 char buf[512], *pos, *end;
1818 int ret;
1819
1820 /* data: optional [ STA-addr | ' ' | IEs(hex) ] */
1821
1822 if (!drv->ibss)
1823 return;
1824
1825 pos = buf;
1826 end = buf + sizeof(buf);
1827
1828 /* reply: SCANRESP BSSID SSID IEs */
1829 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
1830 MAC2STR(drv->bssid));
1831 if (ret < 0 || ret >= end - pos)
1832 return;
1833 pos += ret;
1834 pos += wpa_snprintf_hex(pos, end - pos,
1835 drv->ssid, drv->ssid_len);
1836 ret = snprintf(pos, end - pos, " ");
1837 if (ret < 0 || ret >= end - pos)
1838 return;
1839 pos += ret;
1840 pos += wpa_snprintf_hex(pos, end - pos, drv->assoc_wpa_ie,
1841 drv->assoc_wpa_ie_len);
1842
1843 if (drv->privacy) {
1844 ret = snprintf(pos, end - pos, " PRIVACY");
1845 if (ret < 0 || ret >= end - pos)
1846 return;
1847 pos += ret;
1848 }
1849
1850 ret = snprintf(pos, end - pos, " IBSS");
1851 if (ret < 0 || ret >= end - pos)
1852 return;
1853 pos += ret;
1854
1855 sendto(drv->test_socket, buf, pos - buf, 0,
1856 (struct sockaddr *) from, fromlen);
1857 }
1858
1859
1860 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
1861 void *sock_ctx)
1862 {
1863 struct wpa_driver_test_data *drv = eloop_ctx;
1864 char *buf;
1865 int res;
1866 struct sockaddr_storage from;
1867 socklen_t fromlen = sizeof(from);
1868 const size_t buflen = 2000;
1869
1870 if (drv->ap) {
1871 test_driver_receive_unix(sock, eloop_ctx, sock_ctx);
1872 return;
1873 }
1874
1875 buf = os_malloc(buflen);
1876 if (buf == NULL)
1877 return;
1878 res = recvfrom(sock, buf, buflen - 1, 0,
1879 (struct sockaddr *) &from, &fromlen);
1880 if (res < 0) {
1881 perror("recvfrom(test_socket)");
1882 os_free(buf);
1883 return;
1884 }
1885 buf[res] = '\0';
1886
1887 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
1888
1889 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
1890 wpa_driver_test_scanresp(drv, (struct sockaddr *) &from,
1891 fromlen, buf + 9);
1892 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
1893 wpa_driver_test_assocresp(drv, (struct sockaddr *) &from,
1894 fromlen, buf + 10);
1895 } else if (os_strcmp(buf, "DISASSOC") == 0) {
1896 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
1897 fromlen);
1898 } else if (os_strcmp(buf, "DEAUTH") == 0) {
1899 wpa_driver_test_disassoc(drv, (struct sockaddr *) &from,
1900 fromlen);
1901 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
1902 wpa_driver_test_eapol(drv, (struct sockaddr *) &from, fromlen,
1903 (const u8 *) buf + 6, res - 6);
1904 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
1905 wpa_driver_test_mlme(drv, (struct sockaddr *) &from, fromlen,
1906 (const u8 *) buf + 5, res - 5);
1907 } else if (os_strncmp(buf, "SCAN ", 5) == 0) {
1908 wpa_driver_test_scan_cmd(drv, (struct sockaddr *) &from,
1909 fromlen,
1910 (const u8 *) buf + 5, res - 5);
1911 } else {
1912 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
1913 (u8 *) buf, res);
1914 }
1915 os_free(buf);
1916 }
1917
1918
1919 static void * wpa_driver_test_init2(void *ctx, const char *ifname,
1920 void *global_priv)
1921 {
1922 struct wpa_driver_test_data *drv;
1923 struct wpa_driver_test_global *global = global_priv;
1924
1925 drv = test_alloc_data(ctx, ifname);
1926 if (drv == NULL)
1927 return NULL;
1928 drv->global = global_priv;
1929 drv->test_socket = -1;
1930
1931 /* Set dummy BSSID and SSID for testing. */
1932 drv->bssid[0] = 0x02;
1933 drv->bssid[1] = 0x00;
1934 drv->bssid[2] = 0x00;
1935 drv->bssid[3] = 0x00;
1936 drv->bssid[4] = 0x00;
1937 drv->bssid[5] = 0x01;
1938 os_memcpy(drv->ssid, "test", 5);
1939 drv->ssid_len = 4;
1940
1941 if (global->bss_add_used) {
1942 os_memcpy(drv->own_addr, global->req_addr, ETH_ALEN);
1943 global->bss_add_used = 0;
1944 }
1945
1946 eloop_register_timeout(1, 0, wpa_driver_test_poll, drv, NULL);
1947
1948 return drv;
1949 }
1950
1951
1952 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
1953 {
1954 if (drv->test_socket >= 0) {
1955 eloop_unregister_read_sock(drv->test_socket);
1956 close(drv->test_socket);
1957 drv->test_socket = -1;
1958 }
1959
1960 if (drv->own_socket_path) {
1961 unlink(drv->own_socket_path);
1962 os_free(drv->own_socket_path);
1963 drv->own_socket_path = NULL;
1964 }
1965 }
1966
1967
1968 static void wpa_driver_test_deinit(void *priv)
1969 {
1970 struct wpa_driver_test_data *drv = priv;
1971 struct test_client_socket *cli, *prev;
1972 int i;
1973
1974 cli = drv->cli;
1975 while (cli) {
1976 prev = cli;
1977 cli = cli->next;
1978 os_free(prev);
1979 }
1980
1981 #ifdef HOSTAPD
1982 /* There should be only one BSS remaining at this point. */
1983 if (drv->bss == NULL)
1984 wpa_printf(MSG_ERROR, "%s: drv->bss == NULL", __func__);
1985 else if (drv->bss->next)
1986 wpa_printf(MSG_ERROR, "%s: drv->bss->next != NULL", __func__);
1987 #endif /* HOSTAPD */
1988
1989 test_driver_free_bsses(drv);
1990
1991 wpa_driver_test_close_test_socket(drv);
1992 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
1993 eloop_cancel_timeout(wpa_driver_test_poll, drv, NULL);
1994 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
1995 os_free(drv->test_dir);
1996 for (i = 0; i < MAX_SCAN_RESULTS; i++)
1997 os_free(drv->scanres[i]);
1998 os_free(drv->probe_req_ie);
1999 wpa_trace_remove_ref(drv, ctx, drv->ctx);
2000 os_free(drv);
2001 }
2002
2003
2004 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
2005 const char *dir, int ap)
2006 {
2007 #ifdef DRIVER_TEST_UNIX
2008 static unsigned int counter = 0;
2009 struct sockaddr_un addr;
2010 size_t len;
2011
2012 os_free(drv->own_socket_path);
2013 if (dir) {
2014 len = os_strlen(dir) + 30;
2015 drv->own_socket_path = os_malloc(len);
2016 if (drv->own_socket_path == NULL)
2017 return -1;
2018 os_snprintf(drv->own_socket_path, len, "%s/%s-" MACSTR,
2019 dir, ap ? "AP" : "STA", MAC2STR(drv->own_addr));
2020 } else {
2021 drv->own_socket_path = os_malloc(100);
2022 if (drv->own_socket_path == NULL)
2023 return -1;
2024 os_snprintf(drv->own_socket_path, 100,
2025 "/tmp/wpa_supplicant_test-%d-%d",
2026 getpid(), counter++);
2027 }
2028
2029 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
2030 if (drv->test_socket < 0) {
2031 perror("socket(PF_UNIX)");
2032 os_free(drv->own_socket_path);
2033 drv->own_socket_path = NULL;
2034 return -1;
2035 }
2036
2037 os_memset(&addr, 0, sizeof(addr));
2038 addr.sun_family = AF_UNIX;
2039 os_strlcpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
2040 if (bind(drv->test_socket, (struct sockaddr *) &addr,
2041 sizeof(addr)) < 0) {
2042 perror("bind(PF_UNIX)");
2043 close(drv->test_socket);
2044 unlink(drv->own_socket_path);
2045 os_free(drv->own_socket_path);
2046 drv->own_socket_path = NULL;
2047 return -1;
2048 }
2049
2050 eloop_register_read_sock(drv->test_socket,
2051 wpa_driver_test_receive_unix, drv, NULL);
2052
2053 return 0;
2054 #else /* DRIVER_TEST_UNIX */
2055 return -1;
2056 #endif /* DRIVER_TEST_UNIX */
2057 }
2058
2059
2060 static int wpa_driver_test_attach_udp(struct wpa_driver_test_data *drv,
2061 char *dst)
2062 {
2063 char *pos;
2064
2065 pos = os_strchr(dst, ':');
2066 if (pos == NULL)
2067 return -1;
2068 *pos++ = '\0';
2069 wpa_printf(MSG_DEBUG, "%s: addr=%s port=%s", __func__, dst, pos);
2070
2071 drv->test_socket = socket(PF_INET, SOCK_DGRAM, 0);
2072 if (drv->test_socket < 0) {
2073 perror("socket(PF_INET)");
2074 return -1;
2075 }
2076
2077 os_memset(&drv->hostapd_addr_udp, 0, sizeof(drv->hostapd_addr_udp));
2078 drv->hostapd_addr_udp.sin_family = AF_INET;
2079 #if defined(CONFIG_NATIVE_WINDOWS) || defined(CONFIG_ANSI_C_EXTRA)
2080 {
2081 int a[4];
2082 u8 *pos;
2083 sscanf(dst, "%d.%d.%d.%d", &a[0], &a[1], &a[2], &a[3]);
2084 pos = (u8 *) &drv->hostapd_addr_udp.sin_addr;
2085 *pos++ = a[0];
2086 *pos++ = a[1];
2087 *pos++ = a[2];
2088 *pos++ = a[3];
2089 }
2090 #else /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2091 inet_aton(dst, &drv->hostapd_addr_udp.sin_addr);
2092 #endif /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */
2093 drv->hostapd_addr_udp.sin_port = htons(atoi(pos));
2094
2095 drv->hostapd_addr_udp_set = 1;
2096
2097 eloop_register_read_sock(drv->test_socket,
2098 wpa_driver_test_receive_unix, drv, NULL);
2099
2100 return 0;
2101 }
2102
2103
2104 static int wpa_driver_test_set_param(void *priv, const char *param)
2105 {
2106 struct wpa_driver_test_data *drv = priv;
2107 const char *pos;
2108
2109 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
2110 if (param == NULL)
2111 return 0;
2112
2113 wpa_driver_test_close_test_socket(drv);
2114
2115 #ifdef DRIVER_TEST_UNIX
2116 pos = os_strstr(param, "test_socket=");
2117 if (pos) {
2118 const char *pos2;
2119 size_t len;
2120
2121 pos += 12;
2122 pos2 = os_strchr(pos, ' ');
2123 if (pos2)
2124 len = pos2 - pos;
2125 else
2126 len = os_strlen(pos);
2127 if (len > sizeof(drv->hostapd_addr.sun_path))
2128 return -1;
2129 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
2130 drv->hostapd_addr.sun_family = AF_UNIX;
2131 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
2132 drv->hostapd_addr_set = 1;
2133 }
2134 #endif /* DRIVER_TEST_UNIX */
2135
2136 pos = os_strstr(param, "test_dir=");
2137 if (pos) {
2138 char *end;
2139 os_free(drv->test_dir);
2140 drv->test_dir = os_strdup(pos + 9);
2141 if (drv->test_dir == NULL)
2142 return -1;
2143 end = os_strchr(drv->test_dir, ' ');
2144 if (end)
2145 *end = '\0';
2146 if (wpa_driver_test_attach(drv, drv->test_dir, 0))
2147 return -1;
2148 } else {
2149 pos = os_strstr(param, "test_udp=");
2150 if (pos) {
2151 char *dst, *epos;
2152 dst = os_strdup(pos + 9);
2153 if (dst == NULL)
2154 return -1;
2155 epos = os_strchr(dst, ' ');
2156 if (epos)
2157 *epos = '\0';
2158 if (wpa_driver_test_attach_udp(drv, dst))
2159 return -1;
2160 os_free(dst);
2161 } else if (wpa_driver_test_attach(drv, NULL, 0))
2162 return -1;
2163 }
2164
2165 if (os_strstr(param, "use_associnfo=1")) {
2166 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
2167 drv->use_associnfo = 1;
2168 }
2169
2170 #ifdef CONFIG_CLIENT_MLME
2171 if (os_strstr(param, "use_mlme=1")) {
2172 wpa_printf(MSG_DEBUG, "test_driver: Use internal MLME");
2173 drv->use_mlme = 1;
2174 }
2175 #endif /* CONFIG_CLIENT_MLME */
2176
2177 return 0;
2178 }
2179
2180
2181 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
2182 {
2183 struct wpa_driver_test_data *drv = priv;
2184 wpa_printf(MSG_DEBUG, "%s", __func__);
2185 return drv->own_addr;
2186 }
2187
2188
2189 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
2190 const u8 *data, size_t data_len)
2191 {
2192 struct wpa_driver_test_data *drv = priv;
2193 char *msg;
2194 size_t msg_len;
2195 struct l2_ethhdr eth;
2196 struct sockaddr *addr;
2197 socklen_t alen;
2198 #ifdef DRIVER_TEST_UNIX
2199 struct sockaddr_un addr_un;
2200 #endif /* DRIVER_TEST_UNIX */
2201
2202 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
2203
2204 os_memset(&eth, 0, sizeof(eth));
2205 os_memcpy(eth.h_dest, dest, ETH_ALEN);
2206 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
2207 eth.h_proto = host_to_be16(proto);
2208
2209 msg_len = 6 + sizeof(eth) + data_len;
2210 msg = os_malloc(msg_len);
2211 if (msg == NULL)
2212 return -1;
2213 os_memcpy(msg, "EAPOL ", 6);
2214 os_memcpy(msg + 6, &eth, sizeof(eth));
2215 os_memcpy(msg + 6 + sizeof(eth), data, data_len);
2216
2217 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
2218 drv->test_dir == NULL) {
2219 if (drv->hostapd_addr_udp_set) {
2220 addr = (struct sockaddr *) &drv->hostapd_addr_udp;
2221 alen = sizeof(drv->hostapd_addr_udp);
2222 } else {
2223 #ifdef DRIVER_TEST_UNIX
2224 addr = (struct sockaddr *) &drv->hostapd_addr;
2225 alen = sizeof(drv->hostapd_addr);
2226 #else /* DRIVER_TEST_UNIX */
2227 os_free(msg);
2228 return -1;
2229 #endif /* DRIVER_TEST_UNIX */
2230 }
2231 } else {
2232 #ifdef DRIVER_TEST_UNIX
2233 struct stat st;
2234 os_memset(&addr_un, 0, sizeof(addr_un));
2235 addr_un.sun_family = AF_UNIX;
2236 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2237 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
2238 if (stat(addr_un.sun_path, &st) < 0) {
2239 os_snprintf(addr_un.sun_path, sizeof(addr_un.sun_path),
2240 "%s/AP-" MACSTR,
2241 drv->test_dir, MAC2STR(dest));
2242 }
2243 addr = (struct sockaddr *) &addr_un;
2244 alen = sizeof(addr_un);
2245 #else /* DRIVER_TEST_UNIX */
2246 os_free(msg);
2247 return -1;
2248 #endif /* DRIVER_TEST_UNIX */
2249 }
2250
2251 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
2252 perror("sendmsg(test_socket)");
2253 os_free(msg);
2254 return -1;
2255 }
2256
2257 os_free(msg);
2258 return 0;
2259 }
2260
2261
2262 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
2263 {
2264 struct wpa_driver_test_data *drv = priv;
2265 os_memset(capa, 0, sizeof(*capa));
2266 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
2267 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
2268 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
2269 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
2270 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE |
2271 WPA_DRIVER_CAPA_KEY_MGMT_FT |
2272 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2273 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
2274 WPA_DRIVER_CAPA_ENC_WEP104 |
2275 WPA_DRIVER_CAPA_ENC_TKIP |
2276 WPA_DRIVER_CAPA_ENC_CCMP;
2277 capa->auth = WPA_DRIVER_AUTH_OPEN |
2278 WPA_DRIVER_AUTH_SHARED |
2279 WPA_DRIVER_AUTH_LEAP;
2280 if (drv->use_mlme)
2281 capa->flags |= WPA_DRIVER_FLAGS_USER_SPACE_MLME;
2282 capa->flags |= WPA_DRIVER_FLAGS_AP;
2283 capa->max_scan_ssids = 2;
2284
2285 return 0;
2286 }
2287
2288
2289 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
2290 int protect_type,
2291 int key_type)
2292 {
2293 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
2294 __func__, protect_type, key_type);
2295
2296 if (addr) {
2297 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
2298 __func__, MAC2STR(addr));
2299 }
2300
2301 return 0;
2302 }
2303
2304
2305 static int wpa_driver_test_set_channel(void *priv,
2306 enum hostapd_hw_mode phymode,
2307 int chan, int freq)
2308 {
2309 struct wpa_driver_test_data *drv = priv;
2310 wpa_printf(MSG_DEBUG, "%s: phymode=%d chan=%d freq=%d",
2311 __func__, phymode, chan, freq);
2312 drv->current_freq = freq;
2313 return 0;
2314 }
2315
2316
2317 static int wpa_driver_test_mlme_add_sta(void *priv, const u8 *addr,
2318 const u8 *supp_rates,
2319 size_t supp_rates_len)
2320 {
2321 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2322 return 0;
2323 }
2324
2325
2326 static int wpa_driver_test_mlme_remove_sta(void *priv, const u8 *addr)
2327 {
2328 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
2329 return 0;
2330 }
2331
2332
2333 static int wpa_driver_test_set_ssid(void *priv, const u8 *ssid,
2334 size_t ssid_len)
2335 {
2336 wpa_printf(MSG_DEBUG, "%s", __func__);
2337 return 0;
2338 }
2339
2340
2341 static int wpa_driver_test_set_bssid(void *priv, const u8 *bssid)
2342 {
2343 wpa_printf(MSG_DEBUG, "%s: bssid=" MACSTR, __func__, MAC2STR(bssid));
2344 return 0;
2345 }
2346
2347
2348 static void * wpa_driver_test_global_init(void)
2349 {
2350 struct wpa_driver_test_global *global;
2351
2352 global = os_zalloc(sizeof(*global));
2353 return global;
2354 }
2355
2356
2357 static void wpa_driver_test_global_deinit(void *priv)
2358 {
2359 struct wpa_driver_test_global *global = priv;
2360 os_free(global);
2361 }
2362
2363
2364 static struct wpa_interface_info *
2365 wpa_driver_test_get_interfaces(void *global_priv)
2366 {
2367 /* struct wpa_driver_test_global *global = priv; */
2368 struct wpa_interface_info *iface;
2369
2370 iface = os_zalloc(sizeof(*iface));
2371 if (iface == NULL)
2372 return iface;
2373 iface->ifname = os_strdup("sta0");
2374 iface->desc = os_strdup("test interface 0");
2375 iface->drv_name = "test";
2376 iface->next = os_zalloc(sizeof(*iface));
2377 if (iface->next) {
2378 iface->next->ifname = os_strdup("sta1");
2379 iface->next->desc = os_strdup("test interface 1");
2380 iface->next->drv_name = "test";
2381 }
2382
2383 return iface;
2384 }
2385
2386
2387 static struct hostapd_hw_modes *
2388 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
2389 {
2390 struct hostapd_hw_modes *modes;
2391 size_t i;
2392
2393 *num_modes = 3;
2394 *flags = 0;
2395 modes = os_zalloc(*num_modes * sizeof(struct hostapd_hw_modes));
2396 if (modes == NULL)
2397 return NULL;
2398 modes[0].mode = HOSTAPD_MODE_IEEE80211G;
2399 modes[0].num_channels = 11;
2400 modes[0].num_rates = 12;
2401 modes[0].channels =
2402 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2403 modes[0].rates = os_zalloc(modes[0].num_rates * sizeof(int));
2404 if (modes[0].channels == NULL || modes[0].rates == NULL)
2405 goto fail;
2406 for (i = 0; i < 11; i++) {
2407 modes[0].channels[i].chan = i + 1;
2408 modes[0].channels[i].freq = 2412 + 5 * i;
2409 modes[0].channels[i].flag = 0;
2410 }
2411 modes[0].rates[0] = 10;
2412 modes[0].rates[1] = 20;
2413 modes[0].rates[2] = 55;
2414 modes[0].rates[3] = 110;
2415 modes[0].rates[4] = 60;
2416 modes[0].rates[5] = 90;
2417 modes[0].rates[6] = 120;
2418 modes[0].rates[7] = 180;
2419 modes[0].rates[8] = 240;
2420 modes[0].rates[9] = 360;
2421 modes[0].rates[10] = 480;
2422 modes[0].rates[11] = 540;
2423
2424 modes[1].mode = HOSTAPD_MODE_IEEE80211B;
2425 modes[1].num_channels = 11;
2426 modes[1].num_rates = 4;
2427 modes[1].channels =
2428 os_zalloc(11 * sizeof(struct hostapd_channel_data));
2429 modes[1].rates = os_zalloc(modes[1].num_rates * sizeof(int));
2430 if (modes[1].channels == NULL || modes[1].rates == NULL)
2431 goto fail;
2432 for (i = 0; i < 11; i++) {
2433 modes[1].channels[i].chan = i + 1;
2434 modes[1].channels[i].freq = 2412 + 5 * i;
2435 modes[1].channels[i].flag = 0;
2436 }
2437 modes[1].rates[0] = 10;
2438 modes[1].rates[1] = 20;
2439 modes[1].rates[2] = 55;
2440 modes[1].rates[3] = 110;
2441
2442 modes[2].mode = HOSTAPD_MODE_IEEE80211A;
2443 modes[2].num_channels = 1;
2444 modes[2].num_rates = 8;
2445 modes[2].channels = os_zalloc(sizeof(struct hostapd_channel_data));
2446 modes[2].rates = os_zalloc(modes[2].num_rates * sizeof(int));
2447 if (modes[2].channels == NULL || modes[2].rates == NULL)
2448 goto fail;
2449 modes[2].channels[0].chan = 60;
2450 modes[2].channels[0].freq = 5300;
2451 modes[2].channels[0].flag = 0;
2452 modes[2].rates[0] = 60;
2453 modes[2].rates[1] = 90;
2454 modes[2].rates[2] = 120;
2455 modes[2].rates[3] = 180;
2456 modes[2].rates[4] = 240;
2457 modes[2].rates[5] = 360;
2458 modes[2].rates[6] = 480;
2459 modes[2].rates[7] = 540;
2460
2461 return modes;
2462
2463 fail:
2464 if (modes) {
2465 for (i = 0; i < *num_modes; i++) {
2466 os_free(modes[i].channels);
2467 os_free(modes[i].rates);
2468 }
2469 os_free(modes);
2470 }
2471 return NULL;
2472 }
2473
2474
2475 static int wpa_driver_test_set_freq(void *priv,
2476 struct hostapd_freq_params *freq)
2477 {
2478 struct wpa_driver_test_data *drv = priv;
2479 wpa_printf(MSG_DEBUG, "test: set_freq %u MHz", freq->freq);
2480 drv->current_freq = freq->freq;
2481 return 0;
2482 }
2483
2484
2485 static int wpa_driver_test_send_action(void *priv, unsigned int freq,
2486 const u8 *dst, const u8 *src,
2487 const u8 *data, size_t data_len)
2488 {
2489 struct wpa_driver_test_data *drv = priv;
2490 int ret = -1;
2491 u8 *buf;
2492 struct ieee80211_hdr *hdr;
2493
2494 wpa_printf(MSG_DEBUG, "test: Send Action frame");
2495
2496 if ((drv->remain_on_channel_freq &&
2497 freq != drv->remain_on_channel_freq) ||
2498 (drv->remain_on_channel_freq == 0 &&
2499 freq != (unsigned int) drv->current_freq)) {
2500 wpa_printf(MSG_DEBUG, "test: Reject Action frame TX on "
2501 "unexpected channel: freq=%u MHz (current_freq=%u "
2502 "MHz, remain-on-channel freq=%u MHz)",
2503 freq, drv->current_freq,
2504 drv->remain_on_channel_freq);
2505 return -1;
2506 }
2507
2508 buf = os_zalloc(24 + data_len);
2509 if (buf == NULL)
2510 return ret;
2511 os_memcpy(buf + 24, data, data_len);
2512 hdr = (struct ieee80211_hdr *) buf;
2513 hdr->frame_control =
2514 IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
2515 os_memcpy(hdr->addr1, dst, ETH_ALEN);
2516 os_memcpy(hdr->addr2, src, ETH_ALEN);
2517 os_memcpy(hdr->addr3, "\xff\xff\xff\xff\xff\xff", ETH_ALEN);
2518
2519 ret = wpa_driver_test_send_mlme(priv, buf, 24 + data_len);
2520 os_free(buf);
2521 return ret;
2522 }
2523
2524
2525 static int wpa_driver_test_alloc_interface_addr(void *priv, u8 *addr)
2526 {
2527 struct wpa_driver_test_data *drv = priv;
2528 drv->alloc_iface_idx++;
2529 addr[0] = 0x02; /* locally administered */
2530 sha1_prf(drv->own_addr, ETH_ALEN, "hostapd test addr generation",
2531 (const u8 *) &drv->alloc_iface_idx,
2532 sizeof(drv->alloc_iface_idx),
2533 addr + 1, ETH_ALEN - 1);
2534 return 0;
2535 }
2536
2537
2538 static void wpa_driver_test_release_interface_addr(void *priv, const u8 *addr)
2539 {
2540 }
2541
2542
2543 static void test_remain_on_channel_timeout(void *eloop_ctx, void *timeout_ctx)
2544 {
2545 struct wpa_driver_test_data *drv = eloop_ctx;
2546 union wpa_event_data data;
2547
2548 wpa_printf(MSG_DEBUG, "test: Remain-on-channel timeout");
2549
2550 os_memset(&data, 0, sizeof(data));
2551 data.remain_on_channel.freq = drv->remain_on_channel_freq;
2552 data.remain_on_channel.duration = drv->remain_on_channel_duration;
2553 wpa_supplicant_event(drv->ctx, EVENT_CANCEL_REMAIN_ON_CHANNEL, &data);
2554
2555 drv->remain_on_channel_freq = 0;
2556 }
2557
2558
2559 static int wpa_driver_test_remain_on_channel(void *priv, unsigned int freq,
2560 unsigned int duration)
2561 {
2562 struct wpa_driver_test_data *drv = priv;
2563 union wpa_event_data data;
2564
2565 wpa_printf(MSG_DEBUG, "%s(freq=%u, duration=%u)",
2566 __func__, freq, duration);
2567 if (drv->remain_on_channel_freq &&
2568 drv->remain_on_channel_freq != freq) {
2569 wpa_printf(MSG_DEBUG, "test: Refuse concurrent "
2570 "remain_on_channel request");
2571 return -1;
2572 }
2573
2574 drv->remain_on_channel_freq = freq;
2575 drv->remain_on_channel_duration = duration;
2576 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2577 eloop_register_timeout(duration / 1000, (duration % 1000) * 1000,
2578 test_remain_on_channel_timeout, drv, NULL);
2579
2580 os_memset(&data, 0, sizeof(data));
2581 data.remain_on_channel.freq = freq;
2582 data.remain_on_channel.duration = duration;
2583 wpa_supplicant_event(drv->ctx, EVENT_REMAIN_ON_CHANNEL, &data);
2584
2585 return 0;
2586 }
2587
2588
2589 static int wpa_driver_test_cancel_remain_on_channel(void *priv)
2590 {
2591 struct wpa_driver_test_data *drv = priv;
2592 wpa_printf(MSG_DEBUG, "%s", __func__);
2593 if (!drv->remain_on_channel_freq)
2594 return -1;
2595 drv->remain_on_channel_freq = 0;
2596 eloop_cancel_timeout(test_remain_on_channel_timeout, drv, NULL);
2597 return 0;
2598 }
2599
2600
2601 static int wpa_driver_test_probe_req_report(void *priv, int report)
2602 {
2603 struct wpa_driver_test_data *drv = priv;
2604 wpa_printf(MSG_DEBUG, "%s(report=%d)", __func__, report);
2605 drv->probe_req_report = report;
2606 return 0;
2607 }
2608
2609
2610 const struct wpa_driver_ops wpa_driver_test_ops = {
2611 "test",
2612 "wpa_supplicant test driver",
2613 .hapd_init = test_driver_init,
2614 .hapd_deinit = wpa_driver_test_deinit,
2615 .hapd_send_eapol = test_driver_send_eapol,
2616 .send_mlme = wpa_driver_test_send_mlme,
2617 .set_generic_elem = test_driver_set_generic_elem,
2618 .sta_deauth = test_driver_sta_deauth,
2619 .sta_disassoc = test_driver_sta_disassoc,
2620 .get_hw_feature_data = wpa_driver_test_get_hw_feature_data,
2621 .if_add = test_driver_if_add,
2622 .if_remove = test_driver_if_remove,
2623 .valid_bss_mask = test_driver_valid_bss_mask,
2624 .hapd_set_ssid = test_driver_set_ssid,
2625 .set_privacy = test_driver_set_privacy,
2626 .set_sta_vlan = test_driver_set_sta_vlan,
2627 .sta_add = test_driver_sta_add,
2628 .send_ether = test_driver_send_ether,
2629 .set_ap_wps_ie = test_driver_set_ap_wps_ie,
2630 .get_bssid = wpa_driver_test_get_bssid,
2631 .get_ssid = wpa_driver_test_get_ssid,
2632 .set_key = wpa_driver_test_set_key,
2633 .deinit = wpa_driver_test_deinit,
2634 .set_param = wpa_driver_test_set_param,
2635 .deauthenticate = wpa_driver_test_deauthenticate,
2636 .disassociate = wpa_driver_test_disassociate,
2637 .associate = wpa_driver_test_associate,
2638 .get_capa = wpa_driver_test_get_capa,
2639 .get_mac_addr = wpa_driver_test_get_mac_addr,
2640 .send_eapol = wpa_driver_test_send_eapol,
2641 .mlme_setprotection = wpa_driver_test_mlme_setprotection,
2642 .set_channel = wpa_driver_test_set_channel,
2643 .set_ssid = wpa_driver_test_set_ssid,
2644 .set_bssid = wpa_driver_test_set_bssid,
2645 .mlme_add_sta = wpa_driver_test_mlme_add_sta,
2646 .mlme_remove_sta = wpa_driver_test_mlme_remove_sta,
2647 .get_scan_results2 = wpa_driver_test_get_scan_results2,
2648 .global_init = wpa_driver_test_global_init,
2649 .global_deinit = wpa_driver_test_global_deinit,
2650 .init2 = wpa_driver_test_init2,
2651 .get_interfaces = wpa_driver_test_get_interfaces,
2652 .scan2 = wpa_driver_test_scan,
2653 .set_freq = wpa_driver_test_set_freq,
2654 .send_action = wpa_driver_test_send_action,
2655 .alloc_interface_addr = wpa_driver_test_alloc_interface_addr,
2656 .release_interface_addr = wpa_driver_test_release_interface_addr,
2657 .remain_on_channel = wpa_driver_test_remain_on_channel,
2658 .cancel_remain_on_channel = wpa_driver_test_cancel_remain_on_channel,
2659 .probe_req_report = wpa_driver_test_probe_req_report,
2660 };