| // Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "shill/wifi.h" |
| |
| #include <netinet/ether.h> |
| #include <linux/if.h> |
| #include <sys/socket.h> |
| #include <linux/netlink.h> // Needs typedefs from sys/socket.h. |
| |
| #include <map> |
| #include <set> |
| #include <string> |
| #include <vector> |
| |
| #include <base/memory/ref_counted.h> |
| #include <base/memory/scoped_ptr.h> |
| #include <base/stringprintf.h> |
| #include <base/string_number_conversions.h> |
| #include <base/string_util.h> |
| #include <chromeos/dbus/service_constants.h> |
| #include <dbus-c++/dbus.h> |
| #include <gmock/gmock.h> |
| #include <gtest/gtest.h> |
| |
| #include "shill/dbus_adaptor.h" |
| #include "shill/event_dispatcher.h" |
| #include "shill/ieee80211.h" |
| #include "shill/key_value_store.h" |
| #include "shill/manager.h" |
| #include "shill/mock_device.h" |
| #include "shill/mock_dhcp_config.h" |
| #include "shill/mock_dhcp_provider.h" |
| #include "shill/mock_manager.h" |
| #include "shill/mock_rtnl_handler.h" |
| #include "shill/mock_store.h" |
| #include "shill/mock_supplicant_interface_proxy.h" |
| #include "shill/mock_supplicant_process_proxy.h" |
| #include "shill/mock_wifi_service.h" |
| #include "shill/nice_mock_control.h" |
| #include "shill/property_store_unittest.h" |
| #include "shill/proxy_factory.h" |
| #include "shill/wifi_endpoint.h" |
| #include "shill/wifi.h" |
| #include "shill/wifi_service.h" |
| #include "shill/wpa_supplicant.h" |
| |
| using std::map; |
| using std::set; |
| using std::string; |
| using std::vector; |
| using ::testing::_; |
| using ::testing::AnyNumber; |
| using ::testing::DefaultValue; |
| using ::testing::DoAll; |
| using ::testing::InSequence; |
| using ::testing::Mock; |
| using ::testing::NiceMock; |
| using ::testing::Return; |
| using ::testing::SetArgumentPointee; |
| using ::testing::StrEq; |
| using ::testing::StrictMock; |
| using ::testing::Test; |
| using ::testing::Throw; |
| using ::testing::Values; |
| |
| namespace shill { |
| |
| class WiFiPropertyTest : public PropertyStoreTest { |
| public: |
| WiFiPropertyTest() |
| : device_(new WiFi(control_interface(), NULL, NULL, "wifi", "", 0)) { |
| } |
| virtual ~WiFiPropertyTest() {} |
| |
| protected: |
| DeviceRefPtr device_; |
| }; |
| |
| TEST_F(WiFiPropertyTest, Contains) { |
| EXPECT_TRUE(device_->store().Contains(flimflam::kNameProperty)); |
| EXPECT_FALSE(device_->store().Contains("")); |
| } |
| |
| TEST_F(WiFiPropertyTest, Dispatch) { |
| { |
| ::DBus::Error error; |
| EXPECT_TRUE(DBusAdaptor::DispatchOnType(device_->mutable_store(), |
| flimflam::kBgscanMethodProperty, |
| PropertyStoreTest::kStringV, |
| &error)); |
| } |
| { |
| ::DBus::Error error; |
| EXPECT_TRUE(DBusAdaptor::DispatchOnType( |
| device_->mutable_store(), |
| flimflam::kBgscanSignalThresholdProperty, |
| PropertyStoreTest::kInt32V, |
| &error)); |
| } |
| { |
| ::DBus::Error error; |
| EXPECT_TRUE(DBusAdaptor::DispatchOnType(device_->mutable_store(), |
| flimflam::kScanIntervalProperty, |
| PropertyStoreTest::kUint16V, |
| &error)); |
| } |
| // Ensure that an attempt to write a R/O property returns InvalidArgs error. |
| { |
| ::DBus::Error error; |
| EXPECT_FALSE(DBusAdaptor::DispatchOnType(device_->mutable_store(), |
| flimflam::kScanningProperty, |
| PropertyStoreTest::kBoolV, |
| &error)); |
| EXPECT_EQ(invalid_args(), error.name()); |
| } |
| } |
| |
| class WiFiMainTest : public ::testing::TestWithParam<string> { |
| public: |
| WiFiMainTest() |
| : manager_(&control_interface_, NULL, &glib_), |
| wifi_(new WiFi(&control_interface_, |
| &dispatcher_, |
| &manager_, |
| kDeviceName, |
| kDeviceAddress, |
| 0)), |
| supplicant_process_proxy_(new NiceMock<MockSupplicantProcessProxy>()), |
| supplicant_interface_proxy_( |
| new NiceMock<MockSupplicantInterfaceProxy>(wifi_)), |
| dhcp_config_(new MockDHCPConfig(&control_interface_, |
| &dispatcher_, |
| &dhcp_provider_, |
| kDeviceName, |
| &glib_)), |
| proxy_factory_(this) { |
| ::testing::DefaultValue< ::DBus::Path>::Set("/default/path"); |
| // Except for WiFiServices created via WiFi::GetService, we expect |
| // that any WiFiService has been registered with the Manager. So |
| // default Manager.HasService to true, to make the common case |
| // easy. |
| ON_CALL(manager_, HasService(_)). |
| WillByDefault(Return(true)); |
| } |
| |
| virtual void SetUp() { |
| wifi_->proxy_factory_ = &proxy_factory_; |
| static_cast<Device *>(wifi_)->rtnl_handler_ = &rtnl_handler_; |
| wifi_->set_dhcp_provider(&dhcp_provider_); |
| EXPECT_CALL(manager_, DeregisterService(_)).Times(AnyNumber()); |
| } |
| |
| virtual void TearDown() { |
| wifi_->proxy_factory_ = NULL; |
| // must Stop WiFi instance, to clear its list of services. |
| // otherwise, the WiFi instance will not be deleted. (because |
| // services reference a WiFi instance, creating a cycle.) |
| wifi_->Stop(); |
| wifi_->set_dhcp_provider(NULL); |
| } |
| |
| protected: |
| typedef scoped_refptr<MockWiFiService> MockWiFiServiceRefPtr; |
| |
| class TestProxyFactory : public ProxyFactory { |
| public: |
| explicit TestProxyFactory(WiFiMainTest *test) : test_(test) {} |
| |
| virtual SupplicantProcessProxyInterface *CreateSupplicantProcessProxy( |
| const char */*dbus_path*/, const char */*dbus_addr*/) { |
| return test_->supplicant_process_proxy_.release(); |
| } |
| |
| virtual SupplicantInterfaceProxyInterface *CreateSupplicantInterfaceProxy( |
| const WiFiRefPtr &/*wifi*/, |
| const DBus::Path &/*object_path*/, |
| const char */*dbus_addr*/) { |
| return test_->supplicant_interface_proxy_.release(); |
| } |
| |
| private: |
| WiFiMainTest *test_; |
| }; |
| |
| WiFiServiceRefPtr CreateServiceForEndpoint(const WiFiEndpoint &endpoint) { |
| bool hidden_ssid = false; |
| return wifi_->CreateServiceForEndpoint(endpoint, hidden_ssid); |
| } |
| const WiFiServiceRefPtr &GetCurrentService() { |
| return wifi_->current_service_; |
| } |
| const WiFi::EndpointMap &GetEndpointMap() { |
| return wifi_->endpoint_by_rpcid_; |
| } |
| const WiFiServiceRefPtr &GetPendingService() { |
| return wifi_->pending_service_; |
| } |
| const vector<WiFiServiceRefPtr> &GetServices() { |
| return wifi_->services_; |
| } |
| // note: the tests need the proxies referenced by WiFi (not the |
| // proxies instantiated by WiFiMainTest), to ensure that WiFi |
| // sets up its proxies correctly. |
| SupplicantProcessProxyInterface *GetSupplicantProcessProxy() { |
| return wifi_->supplicant_process_proxy_.get(); |
| } |
| SupplicantInterfaceProxyInterface *GetSupplicantInterfaceProxy() { |
| return wifi_->supplicant_interface_proxy_.get(); |
| } |
| const string &GetSupplicantState() { |
| return wifi_->supplicant_state_; |
| } |
| void InitiateConnect(WiFiServiceRefPtr service) { |
| map<string, ::DBus::Variant> params; |
| wifi_->ConnectTo(service, params); |
| } |
| void InitiateDisconnect(WiFiServiceRefPtr service) { |
| wifi_->DisconnectFrom(service); |
| } |
| bool IsLinkUp() { |
| return wifi_->link_up_; |
| } |
| WiFiEndpointRefPtr MakeEndpoint(const string &ssid, const string &bssid) { |
| map <string, ::DBus::Variant> args; |
| ::DBus::MessageIter writer; |
| |
| writer = args[wpa_supplicant::kBSSPropertySSID].writer(); |
| writer << vector<uint8_t>(ssid.begin(), ssid.end()); |
| |
| string bssid_nosep; |
| RemoveChars(bssid, ":", &bssid_nosep); |
| vector<uint8_t> bssid_bytes; |
| base::HexStringToBytes(bssid_nosep, &bssid_bytes); |
| writer = args[wpa_supplicant::kBSSPropertyBSSID].writer(); |
| writer << bssid_bytes; |
| |
| args[wpa_supplicant::kBSSPropertySignal].writer().append_int16(0); |
| args[wpa_supplicant::kBSSPropertyMode].writer().append_string( |
| wpa_supplicant::kNetworkModeInfrastructure); |
| // We indicate this is an open BSS by leaving out all security properties. |
| |
| return new WiFiEndpoint(args); |
| } |
| MockWiFiServiceRefPtr MakeMockService() { |
| vector<uint8_t> ssid(1, 'a'); |
| return new MockWiFiService( |
| &control_interface_, |
| &dispatcher_, |
| &manager_, |
| wifi_, |
| ssid, |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false); |
| } |
| void RemoveBSS(const ::DBus::Path &bss_path); |
| void ReportBSS(const ::DBus::Path &bss_path, |
| const string &ssid, |
| const string &bssid, |
| int16_t signal_strength, |
| const char *mode); |
| void ReportLinkUp() { |
| wifi_->LinkEvent(IFF_LOWER_UP, IFF_LOWER_UP); |
| } |
| void ReportScanDone() { |
| wifi_->ScanDoneTask(); |
| } |
| void ReportCurrentBSSChanged(const string &new_bss) { |
| wifi_->CurrentBSSChanged(new_bss); |
| } |
| void ReportStateChanged(const string &new_state) { |
| wifi_->StateChanged(new_state); |
| } |
| void StartWiFi() { |
| wifi_->Start(); |
| } |
| void StopWiFi() { |
| wifi_->Stop(); |
| } |
| void GetOpenService(const char *service_type, |
| const char *ssid, |
| const char *mode, |
| Error *result) { |
| GetServiceInner(service_type, ssid, mode, NULL, NULL, false, result); |
| } |
| void GetService(const char *service_type, |
| const char *ssid, |
| const char *mode, |
| const char *security, |
| const char *passphrase, |
| Error *result) { |
| GetServiceInner(service_type, ssid, mode, security, passphrase, false, |
| result); |
| } |
| WiFiServiceRefPtr GetServiceInner(const char *service_type, |
| const char *ssid, |
| const char *mode, |
| const char *security, |
| const char *passphrase, |
| bool allow_hidden, |
| Error *result) { |
| map<string, ::DBus::Variant> args; |
| // in general, we want to avoid D-Bus specific code for any RPCs |
| // that come in via adaptors. we make an exception here, because |
| // calls to GetWifiService are rerouted from the Manager object to |
| // the Wifi class. |
| if (service_type != NULL) |
| args[flimflam::kTypeProperty].writer().append_string(service_type); |
| if (ssid != NULL) |
| args[flimflam::kSSIDProperty].writer().append_string(ssid); |
| if (mode != NULL) |
| args[flimflam::kModeProperty].writer().append_string(mode); |
| if (security != NULL) |
| args[flimflam::kSecurityProperty].writer().append_string(security); |
| if (passphrase != NULL) |
| args[flimflam::kPassphraseProperty].writer().append_string(passphrase); |
| if (!allow_hidden) |
| args[flimflam::kWifiHiddenSsid].writer().append_bool(false); |
| |
| Error e; |
| KeyValueStore args_kv; |
| DBusAdaptor::ArgsToKeyValueStore(args, &args_kv, &e); |
| return wifi_->GetService(args_kv, result); |
| } |
| WiFiServiceRefPtr FindService(const vector<uint8_t> &ssid, |
| const string &mode, |
| const string &security) { |
| return wifi_->FindService(ssid, mode, security); |
| } |
| bool LoadHiddenServices(StoreInterface *storage) { |
| return wifi_->LoadHiddenServices(storage); |
| } |
| void SetupHiddenStorage(MockStore *storage, const string &ssid, string *id) { |
| const string hex_ssid = base::HexEncode(ssid.data(), ssid.size()); |
| *id = StringToLowerASCII(base::StringPrintf("%s_%s_%s_%s_%s", |
| flimflam::kTypeWifi, |
| kDeviceAddress, |
| hex_ssid.c_str(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone)); |
| const char *groups[] = { id->c_str() }; |
| EXPECT_CALL(*storage, GetGroupsWithKey(flimflam::kWifiHiddenSsid)) |
| .WillRepeatedly(Return(set<string>(groups, groups + 1))); |
| EXPECT_CALL(*storage, GetBool(StrEq(*id), flimflam::kWifiHiddenSsid, _)) |
| .WillRepeatedly(DoAll(SetArgumentPointee<2>(true), Return(true))); |
| EXPECT_CALL(*storage, GetString(StrEq(*id), flimflam::kSSIDProperty, _)) |
| .WillRepeatedly(DoAll(SetArgumentPointee<2>(hex_ssid), Return(true))); |
| } |
| MockManager *manager() { |
| return &manager_; |
| } |
| const WiFiConstRefPtr wifi() const { |
| return wifi_; |
| } |
| |
| EventDispatcher dispatcher_; |
| NiceMock<MockRTNLHandler> rtnl_handler_; |
| |
| private: |
| NiceMockControl control_interface_; |
| MockGLib glib_; |
| MockManager manager_; |
| WiFiRefPtr wifi_; |
| |
| // protected fields interspersed between private fields, due to |
| // initialization order |
| protected: |
| static const char kDeviceName[]; |
| static const char kDeviceAddress[]; |
| static const char kNetworkModeAdHoc[]; |
| static const char kNetworkModeInfrastructure[]; |
| |
| scoped_ptr<MockSupplicantProcessProxy> supplicant_process_proxy_; |
| scoped_ptr<MockSupplicantInterfaceProxy> supplicant_interface_proxy_; |
| MockDHCPProvider dhcp_provider_; |
| scoped_refptr<MockDHCPConfig> dhcp_config_; |
| |
| private: |
| TestProxyFactory proxy_factory_; |
| }; |
| |
| const char WiFiMainTest::kDeviceName[] = "wlan0"; |
| const char WiFiMainTest::kDeviceAddress[] = "000102030405"; |
| const char WiFiMainTest::kNetworkModeAdHoc[] = "ad-hoc"; |
| const char WiFiMainTest::kNetworkModeInfrastructure[] = "infrastructure"; |
| |
| void WiFiMainTest::RemoveBSS(const ::DBus::Path &bss_path) { |
| wifi_->BSSRemovedTask(bss_path); |
| } |
| |
| void WiFiMainTest::ReportBSS(const ::DBus::Path &bss_path, |
| const string &ssid, |
| const string &bssid, |
| int16_t signal_strength, |
| const char *mode) { |
| map<string, ::DBus::Variant> bss_properties; |
| |
| { |
| DBus::MessageIter writer(bss_properties["SSID"].writer()); |
| writer << vector<uint8_t>(ssid.begin(), ssid.end()); |
| } |
| { |
| string bssid_nosep; |
| vector<uint8_t> bssid_bytes; |
| RemoveChars(bssid, ":", &bssid_nosep); |
| base::HexStringToBytes(bssid_nosep, &bssid_bytes); |
| |
| DBus::MessageIter writer(bss_properties["BSSID"].writer()); |
| writer << bssid_bytes; |
| } |
| bss_properties["Signal"].writer().append_int16(signal_strength); |
| bss_properties["Mode"].writer().append_string(mode); |
| wifi_->BSSAddedTask(bss_path, bss_properties); |
| } |
| |
| TEST_F(WiFiMainTest, ProxiesSetUpDuringStart) { |
| EXPECT_TRUE(GetSupplicantProcessProxy() == NULL); |
| EXPECT_TRUE(GetSupplicantInterfaceProxy() == NULL); |
| |
| StartWiFi(); |
| EXPECT_FALSE(GetSupplicantProcessProxy() == NULL); |
| EXPECT_FALSE(GetSupplicantInterfaceProxy() == NULL); |
| } |
| |
| TEST_F(WiFiMainTest, CleanStart) { |
| EXPECT_CALL(*supplicant_process_proxy_, CreateInterface(_)); |
| EXPECT_CALL(*supplicant_process_proxy_, GetInterface(_)) |
| .Times(AnyNumber()) |
| .WillRepeatedly(Throw( |
| DBus::Error( |
| "fi.w1.wpa_supplicant1.InterfaceUnknown", |
| "test threw fi.w1.wpa_supplicant1.InterfaceUnknown"))); |
| EXPECT_CALL(*supplicant_interface_proxy_, Scan(_)); |
| StartWiFi(); |
| dispatcher_.DispatchPendingEvents(); |
| } |
| |
| TEST_F(WiFiMainTest, Restart) { |
| EXPECT_CALL(*supplicant_process_proxy_, CreateInterface(_)) |
| .Times(AnyNumber()) |
| .WillRepeatedly(Throw( |
| DBus::Error( |
| "fi.w1.wpa_supplicant1.InterfaceExists", |
| "test thew fi.w1.wpa_supplicant1.InterfaceExists"))); |
| EXPECT_CALL(*supplicant_process_proxy_, GetInterface(_)); |
| EXPECT_CALL(*supplicant_interface_proxy_, Scan(_)); |
| StartWiFi(); |
| dispatcher_.DispatchPendingEvents(); |
| } |
| |
| TEST_F(WiFiMainTest, StartClearsState) { |
| EXPECT_CALL(*supplicant_interface_proxy_, RemoveAllNetworks()); |
| EXPECT_CALL(*supplicant_interface_proxy_, FlushBSS(_)); |
| StartWiFi(); |
| } |
| |
| TEST_F(WiFiMainTest, ScanResults) { |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS( |
| "bss1", "ssid1", "00:00:00:00:00:01", 1, kNetworkModeInfrastructure); |
| ReportBSS( |
| "bss2", "ssid2", "00:00:00:00:00:02", 2, kNetworkModeInfrastructure); |
| ReportBSS( |
| "bss3", "ssid3", "00:00:00:00:00:03", 3, kNetworkModeInfrastructure); |
| ReportBSS("bss4", "ssid4", "00:00:00:00:00:04", 4, kNetworkModeAdHoc); |
| EXPECT_EQ(5, GetEndpointMap().size()); |
| } |
| |
| TEST_F(WiFiMainTest, ScanResultsWithUpdates) { |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS( |
| "bss1", "ssid1", "00:00:00:00:00:01", 1, kNetworkModeInfrastructure); |
| ReportBSS( |
| "bss2", "ssid2", "00:00:00:00:00:02", 2, kNetworkModeInfrastructure); |
| ReportBSS( |
| "bss1", "ssid1", "00:00:00:00:00:01", 3, kNetworkModeInfrastructure); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 4, kNetworkModeAdHoc); |
| |
| const WiFi::EndpointMap &endpoints_by_rpcid = GetEndpointMap(); |
| EXPECT_EQ(3, endpoints_by_rpcid.size()); |
| |
| WiFi::EndpointMap::const_iterator i; |
| WiFiEndpointRefPtr endpoint; |
| for (i = endpoints_by_rpcid.begin(); |
| i != endpoints_by_rpcid.end(); |
| ++i) { |
| if (i->second->bssid_string() == "00:00:00:00:00:00") |
| break; |
| } |
| ASSERT_TRUE(i != endpoints_by_rpcid.end()); |
| EXPECT_EQ(4, i->second->signal_strength()); |
| } |
| |
| TEST_F(WiFiMainTest, ScanCompleted) { |
| StartWiFi(); |
| EXPECT_CALL(*manager(), RegisterService(_)) |
| .Times(3); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS( |
| "bss1", "ssid1", "00:00:00:00:00:01", 1, kNetworkModeInfrastructure); |
| ReportBSS( |
| "bss2", "ssid2", "00:00:00:00:00:02", 2, kNetworkModeInfrastructure); |
| ReportScanDone(); |
| EXPECT_EQ(3, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, EndpointGroupingTogether) { |
| StartWiFi(); |
| |
| InSequence s; |
| EXPECT_CALL(*manager(), RegisterService(_)); |
| EXPECT_CALL(*manager(), UpdateService(_)); |
| ReportBSS("bss0", "ssid", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid", "00:00:00:00:00:01", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| EXPECT_EQ(1, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, EndpointGroupingDifferentSSID) { |
| StartWiFi(); |
| EXPECT_CALL(*manager(), RegisterService(_)) |
| .Times(2); |
| ReportBSS("bss0", "ssid1", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid2", "00:00:00:00:00:01", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| EXPECT_EQ(2, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, EndpointGroupingDifferentMode) { |
| StartWiFi(); |
| EXPECT_CALL(*manager(), RegisterService(_)) |
| .Times(2); |
| ReportBSS("bss0", "ssid", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid", "00:00:00:00:00:01", 0, kNetworkModeInfrastructure); |
| ReportScanDone(); |
| EXPECT_EQ(2, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, NonExistentBSSRemoved) { |
| // Removal of non-existent BSS should not cause a crash. |
| StartWiFi(); |
| RemoveBSS("bss0"); |
| EXPECT_EQ(0, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, LoneBSSRemoved) { |
| StartWiFi(); |
| ReportBSS("bss0", "ssid", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| EXPECT_EQ(1, GetServices().size()); |
| EXPECT_TRUE(GetServices().front()->IsVisible()); |
| |
| EXPECT_CALL(*manager(), UpdateService(_)); |
| RemoveBSS("bss0"); |
| EXPECT_FALSE(GetServices().front()->IsVisible()); |
| EXPECT_EQ(1, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, NonSolitaryBSSRemoved) { |
| StartWiFi(); |
| ReportBSS("bss0", "ssid", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| EXPECT_EQ(1, GetServices().size()); |
| EXPECT_TRUE(GetServices().front()->IsVisible()); |
| |
| EXPECT_CALL(*manager(), UpdateService(_)); |
| RemoveBSS("bss0"); |
| EXPECT_TRUE(GetServices().front()->IsVisible()); |
| EXPECT_EQ(1, GetServices().size()); |
| } |
| |
| TEST_F(WiFiMainTest, Connect) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| |
| { |
| InSequence s; |
| DBus::Path fake_path("/fake/path"); |
| WiFiService *service(GetServices().begin()->get()); |
| |
| EXPECT_CALL(supplicant_interface_proxy, AddNetwork(_)) |
| .WillOnce(Return(fake_path)); |
| EXPECT_CALL(supplicant_interface_proxy, SelectNetwork(fake_path)); |
| InitiateConnect(service); |
| EXPECT_EQ(static_cast<Service *>(service), |
| wifi()->selected_service_.get()); |
| } |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectPendingService) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| WiFiService *service(GetServices().begin()->get()); |
| InitiateConnect(service); |
| |
| EXPECT_FALSE(GetPendingService() == NULL); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()); |
| InitiateDisconnect(service); |
| |
| EXPECT_TRUE(GetPendingService() == NULL); |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectPendingServiceWithCurrent) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid1", "00:00:00:00:00:01", 0, kNetworkModeAdHoc); |
| WiFiService *service0(GetServices()[0].get()); |
| WiFiService *service1(GetServices()[1].get()); |
| |
| InitiateConnect(service0); |
| ReportCurrentBSSChanged("bss0"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| InitiateConnect(service1); |
| |
| EXPECT_EQ(service0, GetCurrentService()); |
| EXPECT_EQ(service1, GetPendingService()); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()); |
| InitiateDisconnect(service1); |
| |
| // |current_service_| will be unchanged until supplicant signals |
| // that CurrentBSS has changed. |
| EXPECT_EQ(service0, GetCurrentService()); |
| // |pending_service_| is updated immediately. |
| EXPECT_TRUE(GetPendingService() == NULL); |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectCurrentService) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| WiFiService *service(GetServices().begin()->get()); |
| InitiateConnect(service); |
| ReportCurrentBSSChanged("bss0"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| |
| EXPECT_EQ(service, GetCurrentService()); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()); |
| InitiateDisconnect(service); |
| |
| // |current_service_| should not change until supplicant reports |
| // a BSS change. |
| EXPECT_EQ(service, GetCurrentService()); |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectCurrentServiceWithPending) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportBSS("bss1", "ssid1", "00:00:00:00:00:01", 0, kNetworkModeAdHoc); |
| WiFiService *service0(GetServices()[0].get()); |
| WiFiService *service1(GetServices()[1].get()); |
| |
| InitiateConnect(service0); |
| ReportCurrentBSSChanged("bss0"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| InitiateConnect(service1); |
| |
| EXPECT_EQ(service0, GetCurrentService()); |
| EXPECT_EQ(service1, GetPendingService()); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()) |
| .Times(0); |
| InitiateDisconnect(service0); |
| |
| EXPECT_EQ(service0, GetCurrentService()); |
| EXPECT_EQ(service1, GetPendingService()); |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectInvalidService) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| WiFiService *service(GetServices().begin()->get()); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()) |
| .Times(0); |
| InitiateDisconnect(service); |
| } |
| |
| TEST_F(WiFiMainTest, DisconnectCurrentServiceFailure) { |
| MockSupplicantInterfaceProxy &supplicant_interface_proxy = |
| *supplicant_interface_proxy_; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| |
| WiFiService *service(GetServices().begin()->get()); |
| DBus::Path fake_path("/fake/path"); |
| EXPECT_CALL(supplicant_interface_proxy, AddNetwork(_)) |
| .WillOnce(Return(fake_path)); |
| InitiateConnect(service); |
| ReportCurrentBSSChanged("bss0"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| |
| EXPECT_EQ(service, GetCurrentService()); |
| EXPECT_CALL(supplicant_interface_proxy, Disconnect()) |
| .WillRepeatedly(Throw( |
| DBus::Error( |
| "fi.w1.wpa_supplicant1.NotConnected", |
| "test threw fi.w1.wpa_supplicant1.NotConnected"))); |
| EXPECT_CALL(supplicant_interface_proxy, RemoveNetwork(fake_path)); |
| InitiateDisconnect(service); |
| |
| EXPECT_TRUE(GetCurrentService() == NULL); |
| } |
| |
| TEST_F(WiFiMainTest, LinkEvent) { |
| EXPECT_FALSE(IsLinkUp()); |
| EXPECT_CALL(dhcp_provider_, CreateConfig(_)). |
| WillOnce(Return(dhcp_config_)); |
| ReportLinkUp(); |
| } |
| |
| TEST_F(WiFiMainTest, Stop) { |
| { |
| InSequence s; |
| |
| StartWiFi(); |
| ReportBSS("bss0", "ssid0", "00:00:00:00:00:00", 0, kNetworkModeAdHoc); |
| ReportScanDone(); |
| EXPECT_CALL(dhcp_provider_, CreateConfig(_)). |
| WillOnce(Return(dhcp_config_)); |
| ReportLinkUp(); |
| } |
| |
| { |
| EXPECT_CALL(*manager(), DeregisterService(_)); |
| StopWiFi(); |
| } |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpen) { |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenNoType) { |
| Error e; |
| GetOpenService(NULL, "an_ssid", flimflam::kModeManaged, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("must specify service type", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenNoSSID) { |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, NULL, flimflam::kModeManaged, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("must specify SSID", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenLongSSID) { |
| Error e; |
| GetOpenService( |
| flimflam::kTypeWifi, "123456789012345678901234567890123", |
| flimflam::kModeManaged, &e); |
| EXPECT_EQ(Error::kInvalidNetworkName, e.type()); |
| EXPECT_EQ("SSID is too long", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenShortSSID) { |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, "", flimflam::kModeManaged, &e); |
| EXPECT_EQ(Error::kInvalidNetworkName, e.type()); |
| EXPECT_EQ("SSID is too short", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenBadMode) { |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, "an_ssid", "ad-hoc", &e); |
| EXPECT_EQ(Error::kNotSupported, e.type()); |
| EXPECT_EQ("service mode is unsupported", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceOpenNoMode) { |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, "an_ssid", NULL, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceRSN) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityRsn, "secure password", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceRSNNoPassword) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityRsn, NULL, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("must specify passphrase", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceBadSecurity) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, "rot-13", |
| NULL, &e); |
| EXPECT_EQ(Error::kNotSupported, e.type()); |
| EXPECT_EQ("security mode is unsupported", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEPNoPassword) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, NULL, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("must specify passphrase", e.message()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEPEmptyPassword) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "", &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40ASCII) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "abcde", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP104ASCII) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "abcdefghijklm", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40ASCIIWithKeyIndex) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0:abcdefghijklm", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40Hex) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0102030405", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40HexBadPassphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "O102030405", &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40HexWithKeyIndexBadPassphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "1:O102030405", &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40HexWithKeyIndexAndBaseBadPassphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "1:0xO102030405", &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP40HexWithBaseBadPassphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0xO102030405", &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP104Hex) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0102030405060708090a0b0c0d", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP104HexUppercase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0102030405060708090A0B0C0D", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP104HexWithKeyIndex) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0:0102030405060708090a0b0c0d", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(WiFiMainTest, GetWifiServiceWEP104HexWithKeyIndexAndBase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWep, "0:0x0102030405060708090a0b0c0d", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| class WiFiGetServiceSuccessTest : public WiFiMainTest {}; |
| class WiFiGetServiceFailureTest : public WiFiMainTest {}; |
| |
| TEST_P(WiFiGetServiceSuccessTest, Passphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWpa, GetParam().c_str(), &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_P(WiFiGetServiceFailureTest, Passphrase) { |
| Error e; |
| GetService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, |
| flimflam::kSecurityWpa, GetParam().c_str(), &e); |
| EXPECT_EQ(Error::kInvalidPassphrase, e.type()); |
| } |
| |
| INSTANTIATE_TEST_CASE_P( |
| WiFiGetServiceSuccessTestInstance, |
| WiFiGetServiceSuccessTest, |
| Values( |
| string(IEEE_80211::kWPAAsciiMinLen, 'Z'), |
| string(IEEE_80211::kWPAAsciiMaxLen, 'Z'), |
| // subtle: invalid length for hex key, but valid as ascii passphrase |
| string(IEEE_80211::kWPAHexLen-1, '1'), |
| string(IEEE_80211::kWPAHexLen, '1'))); |
| |
| INSTANTIATE_TEST_CASE_P( |
| WiFiGetServiceFailureTestInstance, |
| WiFiGetServiceFailureTest, |
| Values( |
| string(IEEE_80211::kWPAAsciiMinLen-1, 'Z'), |
| string(IEEE_80211::kWPAAsciiMaxLen+1, 'Z'), |
| string(IEEE_80211::kWPAHexLen+1, '1'))); |
| |
| TEST_F(WiFiMainTest, FindServiceWEP) { |
| const string ssid("an_ssid"); |
| { |
| Error e; |
| GetService(flimflam::kTypeWifi, ssid.c_str(), flimflam::kModeManaged, |
| flimflam::kSecurityWep, "abcde", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| vector<uint8_t> ssid_bytes(ssid.begin(), ssid.end()); |
| |
| EXPECT_TRUE(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityWep).get()); |
| EXPECT_FALSE(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityWpa).get()); |
| } |
| |
| TEST_F(WiFiMainTest, FindServiceWPA) { |
| const string ssid("an_ssid"); |
| { |
| Error e; |
| GetService(flimflam::kTypeWifi, ssid.c_str(), flimflam::kModeManaged, |
| flimflam::kSecurityRsn, "abcdefgh", &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| vector<uint8_t> ssid_bytes(ssid.begin(), ssid.end()); |
| WiFiServiceRefPtr wpa_service(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityWpa)); |
| EXPECT_TRUE(wpa_service.get()); |
| WiFiServiceRefPtr rsn_service(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityRsn)); |
| EXPECT_TRUE(rsn_service.get()); |
| EXPECT_EQ(wpa_service.get(), rsn_service.get()); |
| WiFiServiceRefPtr psk_service(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityPsk)); |
| EXPECT_EQ(wpa_service.get(), psk_service.get()); |
| // Indirectly test FindService by doing a GetService on something that |
| // already exists. |
| { |
| Error e; |
| WiFiServiceRefPtr wpa_service2( |
| GetServiceInner(flimflam::kTypeWifi, ssid.c_str(), |
| flimflam::kModeManaged, flimflam::kSecurityWpa, |
| "abcdefgh", false, &e)); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_EQ(wpa_service.get(), wpa_service2.get()); |
| } |
| } |
| |
| MATCHER_P(HasHiddenSSID, ssid, "") { |
| map<string, DBus::Variant>::const_iterator it = |
| arg.find(wpa_supplicant::kPropertyScanSSIDs); |
| if (it == arg.end()) { |
| return false; |
| } |
| |
| const DBus::Variant &ssids_variant = it->second; |
| EXPECT_TRUE(DBusAdaptor::IsByteArrays(ssids_variant.signature())); |
| const ByteArrays &ssids = it->second.operator ByteArrays(); |
| // A valid Scan containing a single hidden SSID should contain |
| // two SSID entries: one containing the SSID we are looking for, |
| // and an empty entry, signifying that we also want to do a |
| // broadcast probe request for all non-hidden APs as well. |
| return ssids.size() == 2 && |
| string(ssids[0].begin(), ssids[0].end()) == ssid && |
| ssids[1].empty(); |
| } |
| |
| TEST_F(WiFiMainTest, ScanHidden) { |
| EXPECT_CALL(*supplicant_process_proxy_, CreateInterface(_)); |
| EXPECT_CALL(*supplicant_process_proxy_, GetInterface(_)) |
| .Times(AnyNumber()) |
| .WillRepeatedly(Throw( |
| DBus::Error( |
| "fi.w1.wpa_supplicant1.InterfaceUnknown", |
| "test threw fi.w1.wpa_supplicant1.InterfaceUnknown"))); |
| { |
| // Create a hidden, favorite service. |
| Error e; |
| WiFiServiceRefPtr service = |
| GetServiceInner(flimflam::kTypeWifi, "ssid0", flimflam::kModeManaged, |
| NULL, NULL, true, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_TRUE(service->hidden_ssid()); |
| service->MakeFavorite(); |
| } |
| { |
| // Create a hidden, non-favorite service. |
| Error e; |
| WiFiServiceRefPtr service = |
| GetServiceInner(flimflam::kTypeWifi, "ssid1", flimflam::kModeManaged, |
| NULL, NULL, true, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_TRUE(service->hidden_ssid()); |
| } |
| { |
| // Create a non-hidden, favorite service. |
| Error e; |
| WiFiServiceRefPtr service = |
| GetServiceInner(flimflam::kTypeWifi, "ssid2", flimflam::kModeManaged, |
| NULL, NULL, false, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_FALSE(service->hidden_ssid()); |
| service->MakeFavorite(); |
| } |
| EXPECT_CALL(*supplicant_interface_proxy_, Scan(HasHiddenSSID("ssid0"))); |
| StartWiFi(); |
| dispatcher_.DispatchPendingEvents(); |
| } |
| |
| TEST_F(WiFiMainTest, InitialSupplicantState) { |
| EXPECT_EQ(WiFi::kInterfaceStateUnknown, GetSupplicantState()); |
| } |
| |
| TEST_F(WiFiMainTest, StateChangeNoService) { |
| // State change should succeed even if there is no pending Service. |
| ReportStateChanged(wpa_supplicant::kInterfaceStateScanning); |
| EXPECT_EQ(wpa_supplicant::kInterfaceStateScanning, GetSupplicantState()); |
| } |
| |
| TEST_F(WiFiMainTest, StateChangeWithService) { |
| // Forward transition should trigger a Service state change. |
| StartWiFi(); |
| dispatcher_.DispatchPendingEvents(); |
| MockWiFiServiceRefPtr service = MakeMockService(); |
| InitiateConnect(service); |
| EXPECT_CALL(*service.get(), SetState(Service::kStateAssociating)); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateAssociated); |
| // Verify expectations now, because WiFi may report other state changes |
| // when WiFi is Stop()-ed (during TearDown()). |
| Mock::VerifyAndClearExpectations(service.get()); |
| } |
| |
| TEST_F(WiFiMainTest, StateChangeBackwardsWithService) { |
| // Some backwards transitions should not trigger a Service state change. |
| // Supplicant state should still be updated, however. |
| StartWiFi(); |
| dispatcher_.DispatchPendingEvents(); |
| MockWiFiServiceRefPtr service = MakeMockService(); |
| InitiateConnect(service); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| EXPECT_CALL(*service.get(), SetState(_)).Times(0); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateAuthenticating); |
| EXPECT_EQ(wpa_supplicant::kInterfaceStateAuthenticating, |
| GetSupplicantState()); |
| // Verify expectations now, because WiFi may report other state changes |
| // when WiFi is Stop()-ed (during TearDown()). |
| Mock::VerifyAndClearExpectations(service.get()); |
| } |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesFailWithNoGroups) { |
| StrictMock<MockStore> storage; |
| EXPECT_CALL(storage, GetGroupsWithKey(flimflam::kWifiHiddenSsid)) |
| .WillOnce(Return(set<string>())); |
| EXPECT_FALSE(LoadHiddenServices(&storage)); |
| } |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesFailWithMissingHidden) { |
| string id; |
| StrictMock<MockStore> storage; |
| SetupHiddenStorage(&storage, "an_ssid", &id); |
| // Missing "Hidden" property. |
| EXPECT_CALL(storage, GetBool(StrEq(id), flimflam::kWifiHiddenSsid, _)) |
| .WillOnce(Return(false)); |
| EXPECT_FALSE(LoadHiddenServices(&storage)); |
| } |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesFailWithFalseHidden) { |
| string id; |
| StrictMock<MockStore> storage; |
| SetupHiddenStorage(&storage, "an_ssid", &id); |
| // "Hidden" property set to "false". |
| EXPECT_CALL(storage, GetBool(StrEq(id), flimflam::kWifiHiddenSsid, _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(true), Return(false))); |
| EXPECT_FALSE(LoadHiddenServices(&storage)); |
| } |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesFailWithMissingSSID) { |
| string id; |
| StrictMock<MockStore> storage; |
| SetupHiddenStorage(&storage, "an_ssid", &id); |
| // Missing "SSID" property. |
| EXPECT_CALL(storage, GetString(StrEq(id), flimflam::kSSIDProperty, _)) |
| .WillOnce(Return(false)); |
| EXPECT_FALSE(LoadHiddenServices(&storage)); |
| } |
| |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesFailWithFoundService) { |
| StrictMock<MockStore> storage; |
| string id; |
| SetupHiddenStorage(&storage, "an_ssid", &id); |
| Error e; |
| GetOpenService(flimflam::kTypeWifi, "an_ssid", NULL, &e); |
| ASSERT_TRUE(e.IsSuccess()); |
| EXPECT_FALSE(LoadHiddenServices(&storage)); |
| } |
| |
| TEST_F(WiFiMainTest, LoadHiddenServicesSuccess) { |
| StrictMock<MockStore> storage; |
| string ssid("an_ssid"); |
| string id; |
| SetupHiddenStorage(&storage, ssid, &id); |
| EXPECT_TRUE(LoadHiddenServices(&storage)); |
| vector<uint8_t> ssid_bytes(ssid.begin(), ssid.end()); |
| EXPECT_TRUE(FindService(ssid_bytes, flimflam::kModeManaged, |
| flimflam::kSecurityNone).get()); |
| } |
| |
| TEST_F(WiFiMainTest, CurrentBSSChangeConnectedToDisconnected) { |
| WiFiEndpointRefPtr ap = MakeEndpoint("an_ssid", "00:01:02:03:04:05"); |
| WiFiServiceRefPtr service = CreateServiceForEndpoint(*ap); |
| |
| // Note that the BSS handle used in this test ("an_ap") is not |
| // intended to reflect the format used by supplicant. It's just |
| // convenient for testing. |
| |
| StartWiFi(); |
| ReportBSS("an_ap", ap->ssid_string(), ap->bssid_string(), 0, |
| kNetworkModeInfrastructure); |
| InitiateConnect(service); |
| EXPECT_EQ(service, GetPendingService().get()); |
| |
| ReportCurrentBSSChanged("an_ap"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| EXPECT_EQ(Service::kStateConfiguring, service->state()); |
| EXPECT_EQ(service, GetCurrentService().get()); |
| EXPECT_EQ(NULL, GetPendingService().get()); |
| |
| ReportCurrentBSSChanged(wpa_supplicant::kCurrentBSSNull); |
| EXPECT_EQ(Service::kStateIdle, service->state()); |
| EXPECT_EQ(NULL, GetCurrentService().get()); |
| EXPECT_EQ(NULL, GetPendingService().get()); |
| } |
| |
| TEST_F(WiFiMainTest, CurrentBSSChangeConnectedToConnectedNewService) { |
| WiFiEndpointRefPtr ap1 = MakeEndpoint("an_ssid", "00:01:02:03:04:05"); |
| WiFiEndpointRefPtr ap2 = MakeEndpoint("another_ssid", "01:02:03:04:05:06"); |
| WiFiServiceRefPtr service1 = CreateServiceForEndpoint(*ap1); |
| WiFiServiceRefPtr service2 = CreateServiceForEndpoint(*ap2); |
| |
| // Note that the BSS handles used in this test ("ap1", "ap2") are |
| // not intended to reflect the format used by supplicant. They're |
| // just convenient for testing. |
| |
| StartWiFi(); |
| ReportBSS("ap1", ap1->ssid_string(), ap1->bssid_string(), 0, |
| kNetworkModeInfrastructure); |
| ReportBSS("ap2", ap2->ssid_string(), ap2->bssid_string(), 0, |
| kNetworkModeInfrastructure); |
| InitiateConnect(service1); |
| ReportCurrentBSSChanged("ap1"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| EXPECT_EQ(service1.get(), GetCurrentService().get()); |
| |
| ReportCurrentBSSChanged("ap2"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| EXPECT_EQ(service2.get(), GetCurrentService().get()); |
| EXPECT_EQ(Service::kStateIdle, service1->state()); |
| EXPECT_EQ(Service::kStateConfiguring, service2->state()); |
| } |
| |
| TEST_F(WiFiMainTest, CurrentBSSChangeDisconnectedToConnected) { |
| WiFiEndpointRefPtr ap = MakeEndpoint("an_ssid", "00:01:02:03:04:05"); |
| WiFiServiceRefPtr service = CreateServiceForEndpoint(*ap); |
| |
| // Note that the BSS handle used in this test ("an_ap") is not |
| // intended to reflect the format used by supplicant. It's just |
| // convenient for testing. |
| |
| StartWiFi(); |
| ReportBSS("an_ap", ap->ssid_string(), ap->bssid_string(), 0, |
| kNetworkModeInfrastructure); |
| InitiateConnect(service); |
| ReportCurrentBSSChanged("an_ap"); |
| ReportStateChanged(wpa_supplicant::kInterfaceStateCompleted); |
| EXPECT_EQ(service.get(), GetCurrentService().get()); |
| EXPECT_EQ(Service::kStateConfiguring, service->state()); |
| } |
| |
| TEST_F(WiFiMainTest, ConfiguredServiceRegistration) { |
| Error e; |
| EXPECT_CALL(*manager(), RegisterService(_)) |
| .Times(0); |
| EXPECT_CALL(*manager(), HasService(_)) |
| .WillOnce(Return(false)); |
| GetOpenService(flimflam::kTypeWifi, "an_ssid", flimflam::kModeManaged, &e); |
| EXPECT_CALL(*manager(), RegisterService(_)); |
| ReportBSS("ap0", "an_ssid", "00:00:00:00:00:00", 0, |
| kNetworkModeInfrastructure); |
| } |
| |
| } // namespace shill |