blob: 84351dca44c53710491e52f2cb1e05011a5de16a [file] [log] [blame]
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001/*
2 * Sigma Control API DUT (station/AP)
3 * Copyright (c) 2010-2011, Atheros Communications, Inc.
Jouni Malinen9d7e31d2017-12-22 18:55:04 +02004 * Copyright (c) 2011-2017, Qualcomm Atheros, Inc.
Jouni Malinenc12ea4a2018-01-05 21:07:10 +02005 * Copyright (c) 2018, The Linux Foundation
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006 * All Rights Reserved.
7 * Licensed under the Clear BSD license. See README for more details.
8 */
9
10#include "sigma_dut.h"
11#include <sys/ioctl.h>
12#include <sys/stat.h>
Jouni Malinen82905202018-04-29 17:20:10 +030013#include <sys/wait.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020014#ifdef __linux__
Lior Davidcc88b562017-01-03 18:52:09 +020015#include <regex.h>
16#include <dirent.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020017#include <sys/time.h>
18#include <netpacket/packet.h>
19#include <linux/if_ether.h>
20#ifdef ANDROID
21#include <cutils/properties.h>
22#include <android/log.h>
23#include "keystore_get.h"
24#else /* ANDROID */
25#include <ifaddrs.h>
26#endif /* ANDROID */
27#include <netdb.h>
28#endif /* __linux__ */
29#ifdef __QNXNTO__
30#include <net/if_dl.h>
31#endif /* __QNXNTO__ */
32#include "wpa_ctrl.h"
33#include "wpa_helpers.h"
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -070034#include "miracast.h"
Jouni Malinencd4e3c32015-10-29 12:39:56 +020035
36/* Temporary files for sta_send_addba */
37#define VI_QOS_TMP_FILE "/tmp/vi-qos.tmp"
38#define VI_QOS_FILE "/tmp/vi-qos.txt"
39#define VI_QOS_REFFILE "/etc/vi-qos.txt"
40
41/*
42 * MTU for Ethernet need to take into account 8-byte SNAP header
43 * to be added when encapsulating Ethernet frame into 802.11
44 */
45#ifndef IEEE80211_MAX_DATA_LEN_DMG
46#define IEEE80211_MAX_DATA_LEN_DMG 7920
47#endif
48#ifndef IEEE80211_SNAP_LEN_DMG
49#define IEEE80211_SNAP_LEN_DMG 8
50#endif
51
Ashwini Patil00402582017-04-13 12:29:39 +053052#define NON_PREF_CH_LIST_SIZE 100
Ashwini Patil5acd7382017-04-13 15:55:04 +053053#define NEIGHBOR_REPORT_SIZE 1000
54#define DEFAULT_NEIGHBOR_BSSID_INFO "17"
55#define DEFAULT_NEIGHBOR_PHY_TYPE "1"
Ashwini Patil00402582017-04-13 12:29:39 +053056
Jouni Malinencd4e3c32015-10-29 12:39:56 +020057extern char *sigma_wpas_ctrl;
58extern char *sigma_cert_path;
59extern enum driver_type wifi_chip_type;
60extern char *sigma_radio_ifname[];
61
Lior David0fe101e2017-03-09 16:09:50 +020062#ifdef __linux__
63#define WIL_WMI_MAX_PAYLOAD 248
64#define WIL_WMI_BF_TRIG_CMDID 0x83a
65
66struct wil_wmi_header {
67 uint8_t mid;
68 uint8_t reserved;
69 uint16_t cmd;
70 uint32_t ts;
71} __attribute__((packed));
72
73enum wil_wmi_bf_trig_type {
74 WIL_WMI_SLS,
75 WIL_WMI_BRP_RX,
76 WIL_WMI_BRP_TX,
77};
78
79struct wil_wmi_bf_trig_cmd {
80 /* enum wil_wmi_bf_trig_type */
81 uint32_t bf_type;
82 /* cid when type == WMI_BRP_RX */
83 uint32_t sta_id;
84 uint32_t reserved;
85 /* mac address when type = WIL_WMI_SLS */
86 uint8_t dest_mac[6];
87} __attribute__((packed));
88#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +020089
90#ifdef ANDROID
91
92static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname);
93
94#define ANDROID_KEYSTORE_GET 'g'
95#define ANDROID_KEYSTORE_GET_PUBKEY 'b'
96
97static int android_keystore_get(char cmd, const char *key, unsigned char *val)
98{
Jouni Malinencd4e3c32015-10-29 12:39:56 +020099 /* Android 4.3 changed keystore design, so need to use keystore_get() */
100#ifndef KEYSTORE_MESSAGE_SIZE
101#define KEYSTORE_MESSAGE_SIZE 65535
102#endif /* KEYSTORE_MESSAGE_SIZE */
103
104 ssize_t len;
105 uint8_t *value = NULL;
106
107 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
108 "keystore command '%c' key '%s' --> keystore_get",
109 cmd, key);
110
111 len = keystore_get(key, strlen(key), &value);
112 if (len < 0) {
113 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
114 "keystore_get() failed");
115 return -1;
116 }
117
118 if (len > KEYSTORE_MESSAGE_SIZE)
119 len = KEYSTORE_MESSAGE_SIZE;
120 memcpy(val, value, len);
121 free(value);
122 return len;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200123}
124#endif /* ANDROID */
125
126
127int set_ps(const char *intf, struct sigma_dut *dut, int enabled)
128{
129#ifdef __linux__
130 char buf[100];
131
132 if (wifi_chip_type == DRIVER_WCN) {
133 if (enabled) {
134 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 906");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530135 if (system(buf) != 0)
136 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200137 } else {
138 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 905");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530139 if (system(buf) != 0)
140 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200141 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 912");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530142 if (system(buf) != 0)
143 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200144 }
145
146 return 0;
147 }
148
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530149set_power_save:
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200150 snprintf(buf, sizeof(buf), "./iw dev %s set power_save %s",
151 intf, enabled ? "on" : "off");
152 if (system(buf) != 0) {
153 snprintf(buf, sizeof(buf), "iw dev %s set power_save %s",
154 intf, enabled ? "on" : "off");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530155 if (system(buf) != 0) {
156 sigma_dut_print(dut, DUT_MSG_ERROR,
157 "Failed to set power save %s",
158 enabled ? "on" : "off");
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200159 return -1;
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530160 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200161 }
162
163 return 0;
164#else /* __linux__ */
165 return -1;
166#endif /* __linux__ */
167}
168
169
Lior Davidcc88b562017-01-03 18:52:09 +0200170#ifdef __linux__
Lior David0fe101e2017-03-09 16:09:50 +0200171
Lior Davidcc88b562017-01-03 18:52:09 +0200172static int wil6210_get_debugfs_dir(struct sigma_dut *dut, char *path,
173 size_t len)
174{
175 DIR *dir, *wil_dir;
176 struct dirent *entry;
177 int ret = -1;
178 const char *root_path = "/sys/kernel/debug/ieee80211";
179
180 dir = opendir(root_path);
181 if (!dir)
182 return -2;
183
184 while ((entry = readdir(dir))) {
185 if (strcmp(entry->d_name, ".") == 0 ||
186 strcmp(entry->d_name, "..") == 0)
187 continue;
188
189 if (snprintf(path, len, "%s/%s/wil6210",
190 root_path, entry->d_name) >= (int) len) {
191 ret = -3;
192 break;
193 }
194
195 wil_dir = opendir(path);
196 if (wil_dir) {
197 closedir(wil_dir);
198 ret = 0;
199 break;
200 }
201 }
202
203 closedir(dir);
204 return ret;
205}
Lior David0fe101e2017-03-09 16:09:50 +0200206
207
208static int wil6210_wmi_send(struct sigma_dut *dut, uint16_t command,
209 void *payload, uint16_t length)
210{
211 struct {
212 struct wil_wmi_header hdr;
213 char payload[WIL_WMI_MAX_PAYLOAD];
214 } __attribute__((packed)) cmd;
215 char buf[128], fname[128];
216 size_t towrite, written;
217 FILE *f;
218
219 if (length > WIL_WMI_MAX_PAYLOAD) {
220 sigma_dut_print(dut, DUT_MSG_ERROR,
221 "payload too large(%u, max %u)",
222 length, WIL_WMI_MAX_PAYLOAD);
223 return -1;
224 }
225
226 memset(&cmd.hdr, 0, sizeof(cmd.hdr));
227 cmd.hdr.cmd = command;
228 memcpy(cmd.payload, payload, length);
229
230 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
231 sigma_dut_print(dut, DUT_MSG_ERROR,
232 "failed to get wil6210 debugfs dir");
233 return -1;
234 }
235
236 snprintf(fname, sizeof(fname), "%s/wmi_send", buf);
237 f = fopen(fname, "wb");
238 if (!f) {
239 sigma_dut_print(dut, DUT_MSG_ERROR,
240 "failed to open: %s", fname);
241 return -1;
242 }
243
244 towrite = sizeof(cmd.hdr) + length;
245 written = fwrite(&cmd, 1, towrite, f);
246 fclose(f);
247 if (written != towrite) {
248 sigma_dut_print(dut, DUT_MSG_ERROR,
249 "failed to send wmi %u", command);
250 return -1;
251 }
252
253 return 0;
254}
255
256
257static int wil6210_get_sta_info_field(struct sigma_dut *dut, const char *bssid,
258 const char *pattern, unsigned int *field)
259{
260 char buf[128], fname[128];
261 FILE *f;
262 regex_t re;
263 regmatch_t m[2];
264 int rc, ret = -1;
265
266 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
267 sigma_dut_print(dut, DUT_MSG_ERROR,
268 "failed to get wil6210 debugfs dir");
269 return -1;
270 }
271
272 snprintf(fname, sizeof(fname), "%s/stations", buf);
273 f = fopen(fname, "r");
274 if (!f) {
275 sigma_dut_print(dut, DUT_MSG_ERROR,
276 "failed to open: %s", fname);
277 return -1;
278 }
279
280 if (regcomp(&re, pattern, REG_EXTENDED)) {
281 sigma_dut_print(dut, DUT_MSG_ERROR,
282 "regcomp failed: %s", pattern);
283 goto out;
284 }
285
286 /*
287 * find the entry for the mac address
288 * line is of the form: [n] 11:22:33:44:55:66 state AID aid
289 */
290 while (fgets(buf, sizeof(buf), f)) {
291 if (strcasestr(buf, bssid)) {
292 /* extract the field (CID/AID/state) */
293 rc = regexec(&re, buf, 2, m, 0);
294 if (!rc && (m[1].rm_so >= 0)) {
295 buf[m[1].rm_eo] = 0;
296 *field = atoi(&buf[m[1].rm_so]);
297 ret = 0;
298 break;
299 }
300 }
301 }
302
303 regfree(&re);
304 if (ret)
305 sigma_dut_print(dut, DUT_MSG_ERROR,
306 "could not extract field");
307
308out:
309 fclose(f);
310
311 return ret;
312}
313
314
315static int wil6210_get_cid(struct sigma_dut *dut, const char *bssid,
316 unsigned int *cid)
317{
318 const char *pattern = "\\[([0-9]+)\\]";
319
320 return wil6210_get_sta_info_field(dut, bssid, pattern, cid);
321}
322
323
324static int wil6210_send_brp_rx(struct sigma_dut *dut, const char *mac,
325 int l_rx)
326{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700327 struct wil_wmi_bf_trig_cmd cmd;
Lior David0fe101e2017-03-09 16:09:50 +0200328 unsigned int cid;
329
Rakesh Sunki556237d2017-03-30 14:49:31 -0700330 memset(&cmd, 0, sizeof(cmd));
331
Lior David0fe101e2017-03-09 16:09:50 +0200332 if (wil6210_get_cid(dut, mac, &cid))
333 return -1;
334
335 cmd.bf_type = WIL_WMI_BRP_RX;
336 cmd.sta_id = cid;
337 /* training length (l_rx) is ignored, FW always uses length 16 */
338 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
339 &cmd, sizeof(cmd));
340}
341
342
343static int wil6210_send_sls(struct sigma_dut *dut, const char *mac)
344{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700345 struct wil_wmi_bf_trig_cmd cmd;
346
347 memset(&cmd, 0, sizeof(cmd));
Lior David0fe101e2017-03-09 16:09:50 +0200348
349 if (parse_mac_address(dut, mac, (unsigned char *)&cmd.dest_mac))
350 return -1;
351
352 cmd.bf_type = WIL_WMI_SLS;
353 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
354 &cmd, sizeof(cmd));
355}
356
Lior Davidcc88b562017-01-03 18:52:09 +0200357#endif /* __linux__ */
358
359
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200360static void static_ip_file(int proto, const char *addr, const char *mask,
361 const char *gw)
362{
363 if (proto) {
364 FILE *f = fopen("static-ip", "w");
365 if (f) {
366 fprintf(f, "%d %s %s %s\n", proto, addr,
367 mask ? mask : "N/A",
368 gw ? gw : "N/A");
369 fclose(f);
370 }
371 } else {
372 unlink("static-ip");
373 }
374}
375
376
377static int send_neighbor_request(struct sigma_dut *dut, const char *intf,
378 const char *ssid)
379{
380#ifdef __linux__
381 char buf[100];
382
383 snprintf(buf, sizeof(buf), "iwpriv %s neighbor %s",
384 intf, ssid);
385 sigma_dut_print(dut, DUT_MSG_INFO, "Request: %s", buf);
386
387 if (system(buf) != 0) {
388 sigma_dut_print(dut, DUT_MSG_ERROR,
389 "iwpriv neighbor request failed");
390 return -1;
391 }
392
393 sigma_dut_print(dut, DUT_MSG_INFO, "iwpriv neighbor request send");
394
395 return 0;
396#else /* __linux__ */
397 return -1;
398#endif /* __linux__ */
399}
400
401
402static int send_trans_mgmt_query(struct sigma_dut *dut, const char *intf,
Ashwini Patil5acd7382017-04-13 15:55:04 +0530403 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200404{
Ashwini Patil5acd7382017-04-13 15:55:04 +0530405 const char *val;
406 int reason_code = 0;
407 char buf[1024];
408
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200409 /*
410 * In the earlier builds we used WNM_QUERY and in later
411 * builds used WNM_BSS_QUERY.
412 */
413
Ashwini Patil5acd7382017-04-13 15:55:04 +0530414 val = get_param(cmd, "BTMQuery_Reason_Code");
415 if (val)
416 reason_code = atoi(val);
417
418 val = get_param(cmd, "Cand_List");
419 if (val && atoi(val) == 1 && dut->btm_query_cand_list) {
420 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d%s", reason_code,
421 dut->btm_query_cand_list);
422 free(dut->btm_query_cand_list);
423 dut->btm_query_cand_list = NULL;
424 } else {
425 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d", reason_code);
426 }
427
428 if (wpa_command(intf, buf) != 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200429 sigma_dut_print(dut, DUT_MSG_ERROR,
430 "transition management query failed");
431 return -1;
432 }
433
434 sigma_dut_print(dut, DUT_MSG_DEBUG,
435 "transition management query sent");
436
437 return 0;
438}
439
440
441int is_ip_addr(const char *str)
442{
443 const char *pos = str;
444 struct in_addr addr;
445
446 while (*pos) {
447 if (*pos != '.' && (*pos < '0' || *pos > '9'))
448 return 0;
449 pos++;
450 }
451
452 return inet_aton(str, &addr);
453}
454
455
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200456int get_ip_config(struct sigma_dut *dut, const char *ifname, char *buf,
457 size_t buf_len)
458{
vamsi krishnaa11d0732018-05-16 12:19:48 +0530459 char tmp[256];
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200460 char ip[16], mask[15], dns[16], sec_dns[16];
461 int is_dhcp = 0;
462 int s;
463#ifdef ANDROID
464 char prop[PROPERTY_VALUE_MAX];
vamsi krishnaa11d0732018-05-16 12:19:48 +0530465#else /* ANDROID */
466 FILE *f;
467#ifdef __linux__
468 const char *str_ps;
469#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200470#endif /* ANDROID */
471
472 ip[0] = '\0';
473 mask[0] = '\0';
474 dns[0] = '\0';
475 sec_dns[0] = '\0';
476
477 s = socket(PF_INET, SOCK_DGRAM, 0);
478 if (s >= 0) {
479 struct ifreq ifr;
480 struct sockaddr_in saddr;
481
482 memset(&ifr, 0, sizeof(ifr));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700483 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200484 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
485 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get "
486 "%s IP address: %s",
487 ifname, strerror(errno));
488 } else {
489 memcpy(&saddr, &ifr.ifr_addr,
490 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700491 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200492 }
493
494 if (ioctl(s, SIOCGIFNETMASK, &ifr) == 0) {
495 memcpy(&saddr, &ifr.ifr_addr,
496 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700497 strlcpy(mask, inet_ntoa(saddr.sin_addr), sizeof(mask));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200498 }
499 close(s);
500 }
501
502#ifdef ANDROID
503 snprintf(tmp, sizeof(tmp), "dhcp.%s.pid", ifname);
504 if (property_get(tmp, prop, NULL) != 0 && atoi(prop) > 0) {
505 snprintf(tmp, sizeof(tmp), "dhcp.%s.result", ifname);
506 if (property_get(tmp, prop, NULL) != 0 &&
507 strcmp(prop, "ok") == 0) {
508 snprintf(tmp, sizeof(tmp), "dhcp.%s.ipaddress",
509 ifname);
510 if (property_get(tmp, prop, NULL) != 0 &&
511 strcmp(ip, prop) == 0)
512 is_dhcp = 1;
513 }
514 }
515
516 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns1", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700517 if (property_get(tmp, prop, NULL) != 0)
518 strlcpy(dns, prop, sizeof(dns));
519 else if (property_get("net.dns1", prop, NULL) != 0)
520 strlcpy(dns, prop, sizeof(dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200521
522 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns2", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700523 if (property_get(tmp, prop, NULL) != 0)
524 strlcpy(sec_dns, prop, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200525#else /* ANDROID */
526#ifdef __linux__
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530527 if (get_driver_type() == DRIVER_OPENWRT)
528 str_ps = "ps -w";
529 else
530 str_ps = "ps ax";
531 snprintf(tmp, sizeof(tmp),
532 "%s | grep dhclient | grep -v grep | grep -q %s",
533 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200534 if (system(tmp) == 0)
535 is_dhcp = 1;
536 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530537 snprintf(tmp, sizeof(tmp),
538 "%s | grep udhcpc | grep -v grep | grep -q %s",
539 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200540 if (system(tmp) == 0)
541 is_dhcp = 1;
542 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530543 snprintf(tmp, sizeof(tmp),
544 "%s | grep dhcpcd | grep -v grep | grep -q %s",
545 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200546 if (system(tmp) == 0)
547 is_dhcp = 1;
548 }
549 }
550#endif /* __linux__ */
551
552 f = fopen("/etc/resolv.conf", "r");
553 if (f) {
vamsi krishnaa11d0732018-05-16 12:19:48 +0530554 char *pos, *pos2;
555
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200556 while (fgets(tmp, sizeof(tmp), f)) {
557 if (strncmp(tmp, "nameserver", 10) != 0)
558 continue;
559 pos = tmp + 10;
560 while (*pos == ' ' || *pos == '\t')
561 pos++;
562 pos2 = pos;
563 while (*pos2) {
564 if (*pos2 == '\n' || *pos2 == '\r') {
565 *pos2 = '\0';
566 break;
567 }
568 pos2++;
569 }
Peng Xub8fc5cc2017-05-10 17:27:28 -0700570 if (!dns[0])
571 strlcpy(dns, pos, sizeof(dns));
572 else if (!sec_dns[0])
573 strlcpy(sec_dns, pos, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200574 }
575 fclose(f);
576 }
577#endif /* ANDROID */
578
579 snprintf(buf, buf_len, "dhcp,%d,ip,%s,mask,%s,primary-dns,%s",
580 is_dhcp, ip, mask, dns);
581 buf[buf_len - 1] = '\0';
582
583 return 0;
584}
585
586
587
588
589int get_ipv6_config(struct sigma_dut *dut, const char *ifname, char *buf,
590 size_t buf_len)
591{
592#ifdef __linux__
593#ifdef ANDROID
594 char cmd[200], result[1000], *pos, *end;
595 FILE *f;
596 size_t len;
597
598 snprintf(cmd, sizeof(cmd), "ip addr show dev %s scope global", ifname);
599 f = popen(cmd, "r");
600 if (f == NULL)
601 return -1;
602 len = fread(result, 1, sizeof(result) - 1, f);
603 pclose(f);
604 if (len == 0)
605 return -1;
606 result[len] = '\0';
607 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s result: %s\n", cmd, result);
608
609 pos = strstr(result, "inet6 ");
610 if (pos == NULL)
611 return -1;
612 pos += 6;
613 end = strchr(pos, ' ');
614 if (end)
615 *end = '\0';
616 end = strchr(pos, '/');
617 if (end)
618 *end = '\0';
619 snprintf(buf, buf_len, "ip,%s", pos);
620 buf[buf_len - 1] = '\0';
621 return 0;
622#else /* ANDROID */
623 struct ifaddrs *ifaddr, *ifa;
624 int res, found = 0;
625 char host[NI_MAXHOST];
626
627 if (getifaddrs(&ifaddr) < 0) {
628 perror("getifaddrs");
629 return -1;
630 }
631
632 for (ifa = ifaddr; ifa; ifa = ifa->ifa_next) {
633 if (strcasecmp(ifname, ifa->ifa_name) != 0)
634 continue;
635 if (ifa->ifa_addr == NULL ||
636 ifa->ifa_addr->sa_family != AF_INET6)
637 continue;
638
639 res = getnameinfo(ifa->ifa_addr, sizeof(struct sockaddr_in6),
640 host, NI_MAXHOST, NULL, 0, NI_NUMERICHOST);
641 if (res != 0) {
642 sigma_dut_print(dut, DUT_MSG_DEBUG, "getnameinfo: %s",
643 gai_strerror(res));
644 continue;
645 }
646 if (strncmp(host, "fe80::", 6) == 0)
647 continue; /* skip link-local */
648
649 sigma_dut_print(dut, DUT_MSG_DEBUG, "ifaddr: %s", host);
650 found = 1;
651 break;
652 }
653
654 freeifaddrs(ifaddr);
655
656 if (found) {
657 char *pos;
658 pos = strchr(host, '%');
659 if (pos)
660 *pos = '\0';
661 snprintf(buf, buf_len, "ip,%s", host);
662 buf[buf_len - 1] = '\0';
663 return 0;
664 }
665
666#endif /* ANDROID */
667#endif /* __linux__ */
668 return -1;
669}
670
671
672static int cmd_sta_get_ip_config(struct sigma_dut *dut,
673 struct sigma_conn *conn,
674 struct sigma_cmd *cmd)
675{
676 const char *intf = get_param(cmd, "Interface");
677 const char *ifname;
678 char buf[200];
679 const char *val;
680 int type = 1;
681
682 if (intf == NULL)
683 return -1;
684
685 if (strcmp(intf, get_main_ifname()) == 0)
686 ifname = get_station_ifname();
687 else
688 ifname = intf;
689
690 /*
691 * UCC may assume the IP address to be available immediately after
692 * association without trying to run sta_get_ip_config multiple times.
693 * Sigma CAPI does not specify this command as a block command that
694 * would wait for the address to become available, but to pass tests
695 * more reliably, it looks like such a wait may be needed here.
696 */
697 if (wait_ip_addr(dut, ifname, 15) < 0) {
698 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get IP address "
699 "for sta_get_ip_config");
700 /*
701 * Try to continue anyway since many UCC tests do not really
702 * care about the return value from here..
703 */
704 }
705
706 val = get_param(cmd, "Type");
707 if (val)
708 type = atoi(val);
709 if (type == 2 || dut->last_set_ip_config_ipv6) {
710 int i;
711
712 /*
713 * Since we do not have proper wait for IPv6 addresses, use a
714 * fixed two second delay here as a workaround for UCC script
715 * assuming IPv6 address is available when this command returns.
716 * Some scripts did not use Type,2 properly for IPv6, so include
717 * also the cases where the previous sta_set_ip_config indicated
718 * use of IPv6.
719 */
720 sigma_dut_print(dut, DUT_MSG_INFO, "Wait up to extra ten seconds in sta_get_ip_config for IPv6 address");
721 for (i = 0; i < 10; i++) {
722 sleep(1);
723 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) == 0)
724 {
725 sigma_dut_print(dut, DUT_MSG_INFO, "Found IPv6 address");
726 send_resp(dut, conn, SIGMA_COMPLETE, buf);
727#ifdef ANDROID
728 sigma_dut_print(dut, DUT_MSG_INFO,
729 "Adding IPv6 rule on Android");
730 add_ipv6_rule(dut, intf);
731#endif /* ANDROID */
732
733 return 0;
734 }
735 }
736 }
737 if (type == 1) {
738 if (get_ip_config(dut, ifname, buf, sizeof(buf)) < 0)
739 return -2;
740 } else if (type == 2) {
741 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) < 0)
742 return -2;
743 } else {
744 send_resp(dut, conn, SIGMA_ERROR,
745 "errorCode,Unsupported address type");
746 return 0;
747 }
748
749 send_resp(dut, conn, SIGMA_COMPLETE, buf);
750 return 0;
751}
752
753
754static void kill_dhcp_client(struct sigma_dut *dut, const char *ifname)
755{
756#ifdef __linux__
757 char buf[200];
758 char path[128];
759 struct stat s;
760
761#ifdef ANDROID
762 snprintf(path, sizeof(path), "/data/misc/dhcp/dhcpcd-%s.pid", ifname);
763#else /* ANDROID */
764 snprintf(path, sizeof(path), "/var/run/dhclient-%s.pid", ifname);
765#endif /* ANDROID */
766 if (stat(path, &s) == 0) {
767 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
768 sigma_dut_print(dut, DUT_MSG_INFO,
769 "Kill previous DHCP client: %s", buf);
770 if (system(buf) != 0)
771 sigma_dut_print(dut, DUT_MSG_INFO,
772 "Failed to kill DHCP client");
773 unlink(path);
774 sleep(1);
775 } else {
776 snprintf(path, sizeof(path), "/var/run/dhcpcd-%s.pid", ifname);
777
778 if (stat(path, &s) == 0) {
779 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
780 sigma_dut_print(dut, DUT_MSG_INFO,
781 "Kill previous DHCP client: %s", buf);
782 if (system(buf) != 0)
783 sigma_dut_print(dut, DUT_MSG_INFO,
784 "Failed to kill DHCP client");
785 unlink(path);
786 sleep(1);
787 }
788 }
789#endif /* __linux__ */
790}
791
792
793static int start_dhcp_client(struct sigma_dut *dut, const char *ifname)
794{
795#ifdef __linux__
796 char buf[200];
797
798#ifdef ANDROID
Purushottam Kushwaha46d64262016-08-23 17:57:53 +0530799 if (access("/system/bin/dhcpcd", F_OK) != -1) {
800 snprintf(buf, sizeof(buf),
801 "/system/bin/dhcpcd -b %s", ifname);
802 } else if (access("/system/bin/dhcptool", F_OK) != -1) {
803 snprintf(buf, sizeof(buf), "/system/bin/dhcptool %s &", ifname);
804 } else {
805 sigma_dut_print(dut, DUT_MSG_ERROR,
806 "DHCP client program missing");
807 return 0;
808 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200809#else /* ANDROID */
810 snprintf(buf, sizeof(buf),
811 "dhclient -nw -pf /var/run/dhclient-%s.pid %s",
812 ifname, ifname);
813#endif /* ANDROID */
814 sigma_dut_print(dut, DUT_MSG_INFO, "Start DHCP client: %s", buf);
815 if (system(buf) != 0) {
816 snprintf(buf, sizeof(buf), "dhcpcd -t 0 %s &", ifname);
817 if (system(buf) != 0) {
818 sigma_dut_print(dut, DUT_MSG_INFO,
819 "Failed to start DHCP client");
820#ifndef ANDROID
821 return -1;
822#endif /* ANDROID */
823 }
824 }
825#endif /* __linux__ */
826
827 return 0;
828}
829
830
831static int clear_ip_addr(struct sigma_dut *dut, const char *ifname)
832{
833#ifdef __linux__
834 char buf[200];
835
836 snprintf(buf, sizeof(buf), "ip addr flush dev %s", ifname);
837 if (system(buf) != 0) {
838 sigma_dut_print(dut, DUT_MSG_INFO,
839 "Failed to clear IP addresses");
840 return -1;
841 }
842#endif /* __linux__ */
843
844 return 0;
845}
846
847
848#ifdef ANDROID
849static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname)
850{
851 char cmd[200], *result, *pos;
852 FILE *fp;
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530853 int tableid;
854 size_t len, result_len = 1000;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200855
856 snprintf(cmd, sizeof(cmd), "ip -6 route list table all | grep %s",
857 ifname);
858 fp = popen(cmd, "r");
859 if (fp == NULL)
860 return -1;
861
862 result = malloc(result_len);
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530863 if (result == NULL) {
864 fclose(fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200865 return -1;
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530866 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200867
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530868 len = fread(result, 1, result_len - 1, fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200869 fclose(fp);
870
871 if (len == 0) {
872 free(result);
873 return -1;
874 }
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530875 result[len] = '\0';
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200876
877 pos = strstr(result, "table ");
878 if (pos == NULL) {
879 free(result);
880 return -1;
881 }
882
883 pos += strlen("table ");
884 tableid = atoi(pos);
885 if (tableid != 0) {
886 if (system("ip -6 rule del prio 22000") != 0) {
887 /* ignore any error */
888 }
889 snprintf(cmd, sizeof(cmd),
890 "ip -6 rule add from all lookup %d prio 22000",
891 tableid);
892 if (system(cmd) != 0) {
893 sigma_dut_print(dut, DUT_MSG_INFO,
894 "Failed to run %s", cmd);
895 free(result);
896 return -1;
897 }
898 } else {
899 sigma_dut_print(dut, DUT_MSG_INFO,
900 "No Valid Table Id found %s", pos);
901 free(result);
902 return -1;
903 }
904 free(result);
905
906 return 0;
907}
908#endif /* ANDROID */
909
910
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530911int set_ipv4_addr(struct sigma_dut *dut, const char *ifname,
912 const char *ip, const char *mask)
913{
914 char buf[200];
915
916 snprintf(buf, sizeof(buf), "ifconfig %s %s netmask %s",
917 ifname, ip, mask);
918 return system(buf) == 0;
919}
920
921
922int set_ipv4_gw(struct sigma_dut *dut, const char *gw)
923{
924 char buf[200];
925
926 if (!is_ip_addr(gw)) {
927 sigma_dut_print(dut, DUT_MSG_DEBUG, "Invalid gw addr - %s", gw);
928 return -1;
929 }
930
931 snprintf(buf, sizeof(buf), "route add default gw %s", gw);
932 if (!dut->no_ip_addr_set && system(buf) != 0) {
933 snprintf(buf, sizeof(buf), "ip ro re default via %s",
934 gw);
935 if (system(buf) != 0)
936 return 0;
937 }
938
939 return 1;
940}
941
942
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200943static int cmd_sta_set_ip_config(struct sigma_dut *dut,
944 struct sigma_conn *conn,
945 struct sigma_cmd *cmd)
946{
947 const char *intf = get_param(cmd, "Interface");
948 const char *ifname;
949 char buf[200];
950 const char *val, *ip, *mask, *gw;
951 int type = 1;
952
953 if (intf == NULL)
954 return -1;
955
956 if (strcmp(intf, get_main_ifname()) == 0)
957 ifname = get_station_ifname();
958 else
959 ifname = intf;
960
961 if (if_nametoindex(ifname) == 0) {
962 send_resp(dut, conn, SIGMA_ERROR,
963 "ErrorCode,Unknown interface");
964 return 0;
965 }
966
967 val = get_param(cmd, "Type");
968 if (val) {
969 type = atoi(val);
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530970 if (type < 1 || type > 3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200971 send_resp(dut, conn, SIGMA_ERROR,
972 "ErrorCode,Unsupported address type");
973 return 0;
974 }
975 }
976
977 dut->last_set_ip_config_ipv6 = 0;
978
979 val = get_param(cmd, "dhcp");
980 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "true") == 0)) {
981 static_ip_file(0, NULL, NULL, NULL);
982#ifdef __linux__
983 if (type == 2) {
984 dut->last_set_ip_config_ipv6 = 1;
985 sigma_dut_print(dut, DUT_MSG_INFO, "Using IPv6 "
986 "stateless address autoconfiguration");
987#ifdef ANDROID
988 /*
989 * This sleep is required as the assignment in case of
990 * Android is taking time and is done by the kernel.
991 * The subsequent ping for IPv6 is impacting HS20 test
992 * case.
993 */
994 sleep(2);
995 add_ipv6_rule(dut, intf);
996#endif /* ANDROID */
997 /* Assume this happens by default */
998 return 1;
999 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301000 if (type != 3) {
1001 kill_dhcp_client(dut, ifname);
1002 if (start_dhcp_client(dut, ifname) < 0)
1003 return -2;
1004 } else {
1005 sigma_dut_print(dut, DUT_MSG_DEBUG,
1006 "Using FILS HLP DHCPv4 Rapid Commit");
1007 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001008
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001009 return 1;
1010#endif /* __linux__ */
1011 return -2;
1012 }
1013
1014 ip = get_param(cmd, "ip");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301015 if (!ip) {
1016 send_resp(dut, conn, SIGMA_INVALID,
1017 "ErrorCode,Missing IP address");
1018 return 0;
1019 }
1020
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001021 mask = get_param(cmd, "mask");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301022 if (!mask) {
1023 send_resp(dut, conn, SIGMA_INVALID,
1024 "ErrorCode,Missing subnet mask");
1025 return 0;
1026 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001027
1028 if (type == 2) {
1029 int net = atoi(mask);
1030
1031 if ((net < 0 && net > 64) || !is_ipv6_addr(ip))
1032 return -1;
1033
1034 if (dut->no_ip_addr_set) {
1035 snprintf(buf, sizeof(buf),
1036 "sysctl net.ipv6.conf.%s.disable_ipv6=1",
1037 ifname);
1038 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1039 if (system(buf) != 0) {
1040 sigma_dut_print(dut, DUT_MSG_DEBUG,
1041 "Failed to disable IPv6 address before association");
1042 }
1043 } else {
1044 snprintf(buf, sizeof(buf),
1045 "ip -6 addr del %s/%s dev %s",
1046 ip, mask, ifname);
1047 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1048 if (system(buf) != 0) {
1049 /*
1050 * This command may fail if the address being
1051 * deleted does not exist. Inaction here is
1052 * intentional.
1053 */
1054 }
1055
1056 snprintf(buf, sizeof(buf),
1057 "ip -6 addr add %s/%s dev %s",
1058 ip, mask, ifname);
1059 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1060 if (system(buf) != 0) {
1061 send_resp(dut, conn, SIGMA_ERROR,
1062 "ErrorCode,Failed to set IPv6 address");
1063 return 0;
1064 }
1065 }
1066
1067 dut->last_set_ip_config_ipv6 = 1;
1068 static_ip_file(6, ip, mask, NULL);
1069 return 1;
1070 } else if (type == 1) {
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301071 if (!is_ip_addr(ip) || !is_ip_addr(mask))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001072 return -1;
1073 }
1074
1075 kill_dhcp_client(dut, ifname);
1076
1077 if (!dut->no_ip_addr_set) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301078 if (!set_ipv4_addr(dut, ifname, ip, mask)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001079 send_resp(dut, conn, SIGMA_ERROR,
1080 "ErrorCode,Failed to set IP address");
1081 return 0;
1082 }
1083 }
1084
1085 gw = get_param(cmd, "defaultGateway");
1086 if (gw) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301087 if (set_ipv4_gw(dut, gw) < 1) {
1088 send_resp(dut, conn, SIGMA_ERROR,
1089 "ErrorCode,Failed to set default gateway");
1090 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001091 }
1092 }
1093
1094 val = get_param(cmd, "primary-dns");
1095 if (val) {
1096 /* TODO */
1097 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored primary-dns %s "
1098 "setting", val);
1099 }
1100
1101 val = get_param(cmd, "secondary-dns");
1102 if (val) {
1103 /* TODO */
1104 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored secondary-dns %s "
1105 "setting", val);
1106 }
1107
1108 static_ip_file(4, ip, mask, gw);
1109
1110 return 1;
1111}
1112
1113
1114static int cmd_sta_get_info(struct sigma_dut *dut, struct sigma_conn *conn,
1115 struct sigma_cmd *cmd)
1116{
1117 /* const char *intf = get_param(cmd, "Interface"); */
1118 /* TODO: could report more details here */
1119 send_resp(dut, conn, SIGMA_COMPLETE, "vendor,Atheros");
1120 return 0;
1121}
1122
1123
1124static int cmd_sta_get_mac_address(struct sigma_dut *dut,
1125 struct sigma_conn *conn,
1126 struct sigma_cmd *cmd)
1127{
1128 /* const char *intf = get_param(cmd, "Interface"); */
1129 char addr[20], resp[50];
1130
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05301131 if (dut->dev_role == DEVROLE_STA_CFON)
1132 return sta_cfon_get_mac_address(dut, conn, cmd);
1133
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001134 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
1135 < 0)
1136 return -2;
1137
1138 snprintf(resp, sizeof(resp), "mac,%s", addr);
1139 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1140 return 0;
1141}
1142
1143
1144static int cmd_sta_is_connected(struct sigma_dut *dut, struct sigma_conn *conn,
1145 struct sigma_cmd *cmd)
1146{
1147 /* const char *intf = get_param(cmd, "Interface"); */
1148 int connected = 0;
1149 char result[32];
1150 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
1151 sizeof(result)) < 0) {
1152 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get interface "
1153 "%s status", get_station_ifname());
1154 return -2;
1155 }
1156
1157 sigma_dut_print(dut, DUT_MSG_DEBUG, "wpa_state=%s", result);
1158 if (strncmp(result, "COMPLETED", 9) == 0)
1159 connected = 1;
1160
1161 if (connected)
1162 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1163 else
1164 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1165
1166 return 0;
1167}
1168
1169
1170static int cmd_sta_verify_ip_connection(struct sigma_dut *dut,
1171 struct sigma_conn *conn,
1172 struct sigma_cmd *cmd)
1173{
1174 /* const char *intf = get_param(cmd, "Interface"); */
1175 const char *dst, *timeout;
1176 int wait_time = 90;
1177 char buf[100];
1178 int res;
1179
1180 dst = get_param(cmd, "destination");
1181 if (dst == NULL || !is_ip_addr(dst))
1182 return -1;
1183
1184 timeout = get_param(cmd, "timeout");
1185 if (timeout) {
1186 wait_time = atoi(timeout);
1187 if (wait_time < 1)
1188 wait_time = 1;
1189 }
1190
1191 /* TODO: force renewal of IP lease if DHCP is enabled */
1192
1193 snprintf(buf, sizeof(buf), "ping %s -c 3 -W %d", dst, wait_time);
1194 res = system(buf);
1195 sigma_dut_print(dut, DUT_MSG_DEBUG, "ping returned: %d", res);
1196 if (res == 0)
1197 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1198 else if (res == 256)
1199 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1200 else
1201 return -2;
1202
1203 return 0;
1204}
1205
1206
1207static int cmd_sta_get_bssid(struct sigma_dut *dut, struct sigma_conn *conn,
1208 struct sigma_cmd *cmd)
1209{
1210 /* const char *intf = get_param(cmd, "Interface"); */
1211 char bssid[20], resp[50];
1212
1213 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
1214 < 0)
Peng Xub8fc5cc2017-05-10 17:27:28 -07001215 strlcpy(bssid, "00:00:00:00:00:00", sizeof(bssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001216
1217 snprintf(resp, sizeof(resp), "bssid,%s", bssid);
1218 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1219 return 0;
1220}
1221
1222
1223#ifdef __SAMSUNG__
1224static int add_use_network(const char *ifname)
1225{
1226 char buf[100];
1227
1228 snprintf(buf, sizeof(buf), "USE_NETWORK ON");
1229 wpa_command(ifname, buf);
1230 return 0;
1231}
1232#endif /* __SAMSUNG__ */
1233
1234
1235static int add_network_common(struct sigma_dut *dut, struct sigma_conn *conn,
1236 const char *ifname, struct sigma_cmd *cmd)
1237{
1238 const char *ssid = get_param(cmd, "ssid");
1239 int id;
1240 const char *val;
1241
1242 if (ssid == NULL)
1243 return -1;
1244
1245 start_sta_mode(dut);
1246
1247#ifdef __SAMSUNG__
1248 add_use_network(ifname);
1249#endif /* __SAMSUNG__ */
1250
1251 id = add_network(ifname);
1252 if (id < 0)
1253 return -2;
1254 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding network %d", id);
1255
1256 if (set_network_quoted(ifname, id, "ssid", ssid) < 0)
1257 return -2;
1258
1259 dut->infra_network_id = id;
1260 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
1261
1262 val = get_param(cmd, "program");
1263 if (!val)
1264 val = get_param(cmd, "prog");
1265 if (val && strcasecmp(val, "hs2") == 0) {
1266 char buf[100];
1267 snprintf(buf, sizeof(buf), "ENABLE_NETWORK %d no-connect", id);
1268 wpa_command(ifname, buf);
1269
1270 val = get_param(cmd, "prefer");
1271 if (val && atoi(val) > 0)
1272 set_network(ifname, id, "priority", "1");
1273 }
1274
1275 return id;
1276}
1277
1278
1279static int cmd_sta_set_encryption(struct sigma_dut *dut,
1280 struct sigma_conn *conn,
1281 struct sigma_cmd *cmd)
1282{
1283 const char *intf = get_param(cmd, "Interface");
1284 const char *ssid = get_param(cmd, "ssid");
1285 const char *type = get_param(cmd, "encpType");
1286 const char *ifname;
1287 char buf[200];
1288 int id;
1289
1290 if (intf == NULL || ssid == NULL)
1291 return -1;
1292
1293 if (strcmp(intf, get_main_ifname()) == 0)
1294 ifname = get_station_ifname();
1295 else
1296 ifname = intf;
1297
1298 id = add_network_common(dut, conn, ifname, cmd);
1299 if (id < 0)
1300 return id;
1301
1302 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
1303 return -2;
1304
1305 if (type && strcasecmp(type, "wep") == 0) {
1306 const char *val;
1307 int i;
1308
1309 val = get_param(cmd, "activeKey");
1310 if (val) {
1311 int keyid;
1312 keyid = atoi(val);
1313 if (keyid < 1 || keyid > 4)
1314 return -1;
1315 snprintf(buf, sizeof(buf), "%d", keyid - 1);
1316 if (set_network(ifname, id, "wep_tx_keyidx", buf) < 0)
1317 return -2;
1318 }
1319
1320 for (i = 0; i < 4; i++) {
1321 snprintf(buf, sizeof(buf), "key%d", i + 1);
1322 val = get_param(cmd, buf);
1323 if (val == NULL)
1324 continue;
1325 snprintf(buf, sizeof(buf), "wep_key%d", i);
1326 if (set_network(ifname, id, buf, val) < 0)
1327 return -2;
1328 }
1329 }
1330
1331 return 1;
1332}
1333
1334
1335static int set_wpa_common(struct sigma_dut *dut, struct sigma_conn *conn,
1336 const char *ifname, struct sigma_cmd *cmd)
1337{
1338 const char *val;
1339 int id;
Jouni Malinenad395a22017-09-01 21:13:46 +03001340 int cipher_set = 0;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001341 int owe;
Sunil Duttc75a1e62018-01-11 20:47:50 +05301342 int suite_b = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001343
1344 id = add_network_common(dut, conn, ifname, cmd);
1345 if (id < 0)
1346 return id;
1347
Jouni Malinen47dcc952017-10-09 16:43:24 +03001348 val = get_param(cmd, "Type");
1349 owe = val && strcasecmp(val, "OWE") == 0;
1350
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001351 val = get_param(cmd, "keyMgmtType");
Jouni Malinen47dcc952017-10-09 16:43:24 +03001352 if (!val && owe)
1353 val = "OWE";
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001354 if (val == NULL) {
1355 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Missing keyMgmtType");
1356 return 0;
1357 }
1358 if (strcasecmp(val, "wpa") == 0 ||
1359 strcasecmp(val, "wpa-psk") == 0) {
1360 if (set_network(ifname, id, "proto", "WPA") < 0)
1361 return -2;
1362 } else if (strcasecmp(val, "wpa2") == 0 ||
1363 strcasecmp(val, "wpa2-psk") == 0 ||
1364 strcasecmp(val, "wpa2-ft") == 0 ||
1365 strcasecmp(val, "wpa2-sha256") == 0) {
1366 if (set_network(ifname, id, "proto", "WPA2") < 0)
1367 return -2;
Pradeep Reddy POTTETI6d04b3b2016-11-15 14:51:26 +05301368 } else if (strcasecmp(val, "wpa2-wpa-psk") == 0 ||
1369 strcasecmp(val, "wpa2-wpa-ent") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001370 if (set_network(ifname, id, "proto", "WPA WPA2") < 0)
1371 return -2;
Jouni Malinenad395a22017-09-01 21:13:46 +03001372 } else if (strcasecmp(val, "SuiteB") == 0) {
Sunil Duttc75a1e62018-01-11 20:47:50 +05301373 suite_b = 1;
Jouni Malinenad395a22017-09-01 21:13:46 +03001374 if (set_network(ifname, id, "proto", "WPA2") < 0)
1375 return -2;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001376 } else if (strcasecmp(val, "OWE") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001377 } else {
1378 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized keyMgmtType value");
1379 return 0;
1380 }
1381
1382 val = get_param(cmd, "encpType");
Jouni Malinenad395a22017-09-01 21:13:46 +03001383 if (val) {
1384 cipher_set = 1;
1385 if (strcasecmp(val, "tkip") == 0) {
1386 if (set_network(ifname, id, "pairwise", "TKIP") < 0)
1387 return -2;
1388 } else if (strcasecmp(val, "aes-ccmp") == 0) {
1389 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1390 return -2;
1391 } else if (strcasecmp(val, "aes-ccmp-tkip") == 0) {
1392 if (set_network(ifname, id, "pairwise",
1393 "CCMP TKIP") < 0)
1394 return -2;
1395 } else if (strcasecmp(val, "aes-gcmp") == 0) {
1396 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1397 return -2;
1398 if (set_network(ifname, id, "group", "GCMP") < 0)
1399 return -2;
1400 } else {
1401 send_resp(dut, conn, SIGMA_ERROR,
1402 "errorCode,Unrecognized encpType value");
1403 return 0;
1404 }
1405 }
1406
1407 val = get_param(cmd, "PairwiseCipher");
1408 if (val) {
1409 cipher_set = 1;
1410 /* TODO: Support space separated list */
1411 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1412 if (set_network(ifname, id, "pairwise", "GCMP-256") < 0)
1413 return -2;
1414 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1415 if (set_network(ifname, id, "pairwise",
1416 "CCMP-256") < 0)
1417 return -2;
1418 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1419 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1420 return -2;
1421 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1422 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1423 return -2;
1424 } else {
1425 send_resp(dut, conn, SIGMA_ERROR,
1426 "errorCode,Unrecognized PairwiseCipher value");
1427 return 0;
1428 }
1429 }
1430
Jouni Malinen47dcc952017-10-09 16:43:24 +03001431 if (!cipher_set && !owe) {
Jouni Malinenad395a22017-09-01 21:13:46 +03001432 send_resp(dut, conn, SIGMA_ERROR,
1433 "errorCode,Missing encpType and PairwiseCipher");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001434 return 0;
1435 }
Jouni Malinenad395a22017-09-01 21:13:46 +03001436
1437 val = get_param(cmd, "GroupCipher");
1438 if (val) {
1439 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1440 if (set_network(ifname, id, "group", "GCMP-256") < 0)
1441 return -2;
1442 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1443 if (set_network(ifname, id, "group", "CCMP-256") < 0)
1444 return -2;
1445 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1446 if (set_network(ifname, id, "group", "GCMP") < 0)
1447 return -2;
1448 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1449 if (set_network(ifname, id, "group", "CCMP") < 0)
1450 return -2;
1451 } else {
1452 send_resp(dut, conn, SIGMA_ERROR,
1453 "errorCode,Unrecognized GroupCipher value");
1454 return 0;
1455 }
1456 }
1457
Jouni Malinen7b239522017-09-14 21:37:18 +03001458 val = get_param(cmd, "GroupMgntCipher");
Jouni Malinenad395a22017-09-01 21:13:46 +03001459 if (val) {
Jouni Malinene8898cb2017-09-26 17:55:26 +03001460 const char *cipher;
1461
1462 if (strcasecmp(val, "BIP-GMAC-256") == 0) {
1463 cipher = "BIP-GMAC-256";
1464 } else if (strcasecmp(val, "BIP-CMAC-256") == 0) {
1465 cipher = "BIP-CMAC-256";
1466 } else if (strcasecmp(val, "BIP-GMAC-128") == 0) {
1467 cipher = "BIP-GMAC-128";
1468 } else if (strcasecmp(val, "BIP-CMAC-128") == 0) {
1469 cipher = "AES-128-CMAC";
1470 } else {
1471 send_resp(dut, conn, SIGMA_INVALID,
1472 "errorCode,Unsupported GroupMgntCipher");
1473 return 0;
1474 }
1475 if (set_network(ifname, id, "group_mgmt", cipher) < 0) {
1476 send_resp(dut, conn, SIGMA_INVALID,
1477 "errorCode,Failed to set GroupMgntCipher");
1478 return 0;
1479 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001480 }
1481
1482 dut->sta_pmf = STA_PMF_DISABLED;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301483
1484 if (dut->program == PROGRAM_OCE) {
1485 dut->sta_pmf = STA_PMF_OPTIONAL;
1486 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1487 return -2;
1488 }
1489
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001490 val = get_param(cmd, "PMF");
1491 if (val) {
1492 if (strcasecmp(val, "Required") == 0 ||
1493 strcasecmp(val, "Forced_Required") == 0) {
1494 dut->sta_pmf = STA_PMF_REQUIRED;
1495 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1496 return -2;
1497 } else if (strcasecmp(val, "Optional") == 0) {
1498 dut->sta_pmf = STA_PMF_OPTIONAL;
1499 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1500 return -2;
1501 } else if (strcasecmp(val, "Disabled") == 0 ||
1502 strcasecmp(val, "Forced_Disabled") == 0) {
1503 dut->sta_pmf = STA_PMF_DISABLED;
1504 } else {
1505 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized PMF value");
1506 return 0;
1507 }
Sunil Duttc75a1e62018-01-11 20:47:50 +05301508 } else if (owe || suite_b) {
Jouni Malinen1287cd72018-01-04 17:08:01 +02001509 dut->sta_pmf = STA_PMF_REQUIRED;
1510 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1511 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001512 }
1513
1514 return id;
1515}
1516
1517
1518static int cmd_sta_set_psk(struct sigma_dut *dut, struct sigma_conn *conn,
1519 struct sigma_cmd *cmd)
1520{
1521 const char *intf = get_param(cmd, "Interface");
Jouni Malinen992a81e2017-08-22 13:57:47 +03001522 const char *type = get_param(cmd, "Type");
Jouni Malinen1287cd72018-01-04 17:08:01 +02001523 const char *pmf = get_param(cmd, "PMF");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001524 const char *ifname, *val, *alg;
1525 int id;
1526
1527 if (intf == NULL)
1528 return -1;
1529
1530 if (strcmp(intf, get_main_ifname()) == 0)
1531 ifname = get_station_ifname();
1532 else
1533 ifname = intf;
1534
1535 id = set_wpa_common(dut, conn, ifname, cmd);
1536 if (id < 0)
1537 return id;
1538
1539 val = get_param(cmd, "keyMgmtType");
1540 alg = get_param(cmd, "micAlg");
1541
Jouni Malinen992a81e2017-08-22 13:57:47 +03001542 if (type && strcasecmp(type, "SAE") == 0) {
1543 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1544 if (set_network(ifname, id, "key_mgmt", "FT-SAE") < 0)
1545 return -2;
1546 } else {
1547 if (set_network(ifname, id, "key_mgmt", "SAE") < 0)
1548 return -2;
1549 }
1550 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1551 sigma_dut_print(dut, DUT_MSG_ERROR,
1552 "Failed to clear sae_groups to default");
1553 return -2;
1554 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001555 if (!pmf) {
1556 dut->sta_pmf = STA_PMF_REQUIRED;
1557 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1558 return -2;
1559 }
Jouni Malinen0ab50f42017-08-31 01:34:59 +03001560 } else if (type && strcasecmp(type, "PSK-SAE") == 0) {
1561 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1562 if (set_network(ifname, id, "key_mgmt",
1563 "FT-SAE FT-PSK") < 0)
1564 return -2;
1565 } else {
1566 if (set_network(ifname, id, "key_mgmt",
1567 "SAE WPA-PSK") < 0)
1568 return -2;
1569 }
1570 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1571 sigma_dut_print(dut, DUT_MSG_ERROR,
1572 "Failed to clear sae_groups to default");
1573 return -2;
1574 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001575 if (!pmf) {
1576 dut->sta_pmf = STA_PMF_OPTIONAL;
1577 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1578 return -2;
1579 }
Jouni Malinen992a81e2017-08-22 13:57:47 +03001580 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001581 if (set_network(ifname, id, "key_mgmt", "WPA-PSK-SHA256") < 0)
1582 return -2;
1583 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1584 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1585 return -2;
Ashwini Patil6dbf7b02017-03-20 13:42:11 +05301586 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1587 if (set_network(ifname, id, "key_mgmt", "FT-PSK") < 0)
1588 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001589 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1590 dut->sta_pmf == STA_PMF_REQUIRED) {
1591 if (set_network(ifname, id, "key_mgmt",
1592 "WPA-PSK WPA-PSK-SHA256") < 0)
1593 return -2;
1594 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1595 if (set_network(ifname, id, "key_mgmt",
1596 "WPA-PSK WPA-PSK-SHA256") < 0)
1597 return -2;
1598 } else {
1599 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1600 return -2;
1601 }
1602
1603 val = get_param(cmd, "passPhrase");
1604 if (val == NULL)
1605 return -1;
Jouni Malinen2126f422017-10-11 23:24:33 +03001606 if (type && strcasecmp(type, "SAE") == 0) {
1607 if (set_network_quoted(ifname, id, "sae_password", val) < 0)
1608 return -2;
1609 } else {
1610 if (set_network_quoted(ifname, id, "psk", val) < 0)
1611 return -2;
1612 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001613
Jouni Malinen992a81e2017-08-22 13:57:47 +03001614 val = get_param(cmd, "ECGroupID");
1615 if (val) {
1616 char buf[50];
1617
1618 snprintf(buf, sizeof(buf), "SET sae_groups %u", atoi(val));
1619 if (wpa_command(ifname, buf) != 0) {
1620 sigma_dut_print(dut, DUT_MSG_ERROR,
1621 "Failed to clear sae_groups");
1622 return -2;
1623 }
1624 }
1625
Jouni Malinen68143132017-09-02 02:34:08 +03001626 val = get_param(cmd, "InvalidSAEElement");
1627 if (val) {
1628 free(dut->sae_commit_override);
1629 dut->sae_commit_override = strdup(val);
1630 }
1631
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001632 return 1;
1633}
1634
1635
1636static int set_eap_common(struct sigma_dut *dut, struct sigma_conn *conn,
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301637 const char *ifname, int username_identity,
1638 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001639{
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301640 const char *val, *alg, *akm;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001641 int id;
1642 char buf[200];
1643#ifdef ANDROID
1644 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1645 int length;
1646#endif /* ANDROID */
1647
1648 id = set_wpa_common(dut, conn, ifname, cmd);
1649 if (id < 0)
1650 return id;
1651
1652 val = get_param(cmd, "keyMgmtType");
1653 alg = get_param(cmd, "micAlg");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301654 akm = get_param(cmd, "AKMSuiteType");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001655
Jouni Malinenad395a22017-09-01 21:13:46 +03001656 if (val && strcasecmp(val, "SuiteB") == 0) {
1657 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SUITE-B-192") <
1658 0)
1659 return -2;
1660 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001661 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SHA256") < 0)
1662 return -2;
1663 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1664 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1665 return -2;
1666 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1667 if (set_network(ifname, id, "key_mgmt", "FT-EAP") < 0)
1668 return -2;
1669 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1670 dut->sta_pmf == STA_PMF_REQUIRED) {
1671 if (set_network(ifname, id, "key_mgmt",
1672 "WPA-EAP WPA-EAP-SHA256") < 0)
1673 return -2;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301674 } else if (akm && atoi(akm) == 14) {
1675 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1676 dut->sta_pmf == STA_PMF_REQUIRED) {
1677 if (set_network(ifname, id, "key_mgmt",
1678 "WPA-EAP-SHA256 FILS-SHA256") < 0)
1679 return -2;
1680 } else {
1681 if (set_network(ifname, id, "key_mgmt",
1682 "WPA-EAP FILS-SHA256") < 0)
1683 return -2;
1684 }
1685
1686 if (set_network(ifname, id, "erp", "1") < 0)
1687 return -2;
1688 } else if (akm && atoi(akm) == 15) {
1689 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1690 dut->sta_pmf == STA_PMF_REQUIRED) {
1691 if (set_network(ifname, id, "key_mgmt",
1692 "WPA-EAP-SHA256 FILS-SHA384") < 0)
1693 return -2;
1694 } else {
1695 if (set_network(ifname, id, "key_mgmt",
1696 "WPA-EAP FILS-SHA384") < 0)
1697 return -2;
1698 }
1699
1700 if (set_network(ifname, id, "erp", "1") < 0)
1701 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001702 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1703 if (set_network(ifname, id, "key_mgmt",
1704 "WPA-EAP WPA-EAP-SHA256") < 0)
1705 return -2;
1706 } else {
1707 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1708 return -2;
1709 }
1710
1711 val = get_param(cmd, "trustedRootCA");
1712 if (val) {
1713#ifdef ANDROID
1714 snprintf(buf, sizeof(buf), "CACERT_%s", val);
1715 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf,
1716 kvalue);
1717 if (length > 0) {
1718 sigma_dut_print(dut, DUT_MSG_INFO,
1719 "Use Android keystore [%s]", buf);
1720 snprintf(buf, sizeof(buf), "keystore://CACERT_%s",
1721 val);
1722 goto ca_cert_selected;
1723 }
1724#endif /* ANDROID */
1725
1726 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1727#ifdef __linux__
1728 if (!file_exists(buf)) {
1729 char msg[300];
1730 snprintf(msg, sizeof(msg), "ErrorCode,trustedRootCA "
1731 "file (%s) not found", buf);
1732 send_resp(dut, conn, SIGMA_ERROR, msg);
1733 return -3;
1734 }
1735#endif /* __linux__ */
1736#ifdef ANDROID
1737ca_cert_selected:
1738#endif /* ANDROID */
1739 if (set_network_quoted(ifname, id, "ca_cert", buf) < 0)
1740 return -2;
1741 }
1742
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301743 if (username_identity) {
1744 val = get_param(cmd, "username");
1745 if (val) {
1746 if (set_network_quoted(ifname, id, "identity", val) < 0)
1747 return -2;
1748 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001749
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301750 val = get_param(cmd, "password");
1751 if (val) {
1752 if (set_network_quoted(ifname, id, "password", val) < 0)
1753 return -2;
1754 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001755 }
1756
1757 return id;
1758}
1759
1760
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001761static int set_tls_cipher(const char *ifname, int id, const char *cipher)
1762{
1763 const char *val;
1764
1765 if (!cipher)
1766 return 0;
1767
1768 if (strcasecmp(cipher, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384") == 0)
1769 val = "ECDHE-ECDSA-AES256-GCM-SHA384";
1770 else if (strcasecmp(cipher,
1771 "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1772 val = "ECDHE-RSA-AES256-GCM-SHA384";
1773 else if (strcasecmp(cipher, "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1774 val = "DHE-RSA-AES256-GCM-SHA384";
1775 else if (strcasecmp(cipher,
1776 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256") == 0)
1777 val = "ECDHE-ECDSA-AES128-GCM-SHA256";
1778 else
1779 return -1;
1780
1781 /* Need to clear phase1="tls_suiteb=1" to allow cipher enforcement */
1782 set_network_quoted(ifname, id, "phase1", "");
1783
1784 return set_network_quoted(ifname, id, "openssl_ciphers", val);
1785}
1786
1787
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001788static int cmd_sta_set_eaptls(struct sigma_dut *dut, struct sigma_conn *conn,
1789 struct sigma_cmd *cmd)
1790{
1791 const char *intf = get_param(cmd, "Interface");
1792 const char *ifname, *val;
1793 int id;
1794 char buf[200];
1795#ifdef ANDROID
1796 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1797 int length;
1798 int jb_or_newer = 0;
1799 char prop[PROPERTY_VALUE_MAX];
1800#endif /* ANDROID */
1801
1802 if (intf == NULL)
1803 return -1;
1804
1805 if (strcmp(intf, get_main_ifname()) == 0)
1806 ifname = get_station_ifname();
1807 else
1808 ifname = intf;
1809
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301810 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001811 if (id < 0)
1812 return id;
1813
1814 if (set_network(ifname, id, "eap", "TLS") < 0)
1815 return -2;
1816
Pradeep Reddy POTTETI9f6c2132016-05-05 16:28:19 +05301817 if (!get_param(cmd, "username") &&
1818 set_network_quoted(ifname, id, "identity",
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001819 "wifi-user@wifilabs.local") < 0)
1820 return -2;
1821
1822 val = get_param(cmd, "clientCertificate");
1823 if (val == NULL)
1824 return -1;
1825#ifdef ANDROID
1826 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1827 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf, kvalue);
1828 if (length < 0) {
1829 /*
1830 * JB started reporting keystore type mismatches, so retry with
1831 * the GET_PUBKEY command if the generic GET fails.
1832 */
1833 length = android_keystore_get(ANDROID_KEYSTORE_GET_PUBKEY,
1834 buf, kvalue);
1835 }
1836
1837 if (property_get("ro.build.version.release", prop, NULL) != 0) {
1838 sigma_dut_print(dut, DUT_MSG_DEBUG, "Android release %s", prop);
1839 if (strncmp(prop, "4.0", 3) != 0)
1840 jb_or_newer = 1;
1841 } else
1842 jb_or_newer = 1; /* assume newer */
1843
1844 if (jb_or_newer && length > 0) {
1845 sigma_dut_print(dut, DUT_MSG_INFO,
1846 "Use Android keystore [%s]", buf);
1847 if (set_network(ifname, id, "engine", "1") < 0)
1848 return -2;
1849 if (set_network_quoted(ifname, id, "engine_id", "keystore") < 0)
1850 return -2;
1851 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1852 if (set_network_quoted(ifname, id, "key_id", buf) < 0)
1853 return -2;
1854 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1855 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1856 return -2;
1857 return 1;
1858 } else if (length > 0) {
1859 sigma_dut_print(dut, DUT_MSG_INFO,
1860 "Use Android keystore [%s]", buf);
1861 snprintf(buf, sizeof(buf), "keystore://USRPKEY_%s", val);
1862 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1863 return -2;
1864 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1865 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1866 return -2;
1867 return 1;
1868 }
1869#endif /* ANDROID */
1870
1871 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1872#ifdef __linux__
1873 if (!file_exists(buf)) {
1874 char msg[300];
1875 snprintf(msg, sizeof(msg), "ErrorCode,clientCertificate file "
1876 "(%s) not found", buf);
1877 send_resp(dut, conn, SIGMA_ERROR, msg);
1878 return -3;
1879 }
1880#endif /* __linux__ */
1881 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1882 return -2;
1883 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1884 return -2;
1885
1886 if (set_network_quoted(ifname, id, "private_key_passwd", "wifi") < 0)
1887 return -2;
1888
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001889 val = get_param(cmd, "keyMgmtType");
1890 if (val && strcasecmp(val, "SuiteB") == 0) {
1891 val = get_param(cmd, "CertType");
1892 if (val && strcasecmp(val, "RSA") == 0) {
1893 if (set_network_quoted(ifname, id, "phase1",
1894 "tls_suiteb=1") < 0)
1895 return -2;
1896 } else {
1897 if (set_network_quoted(ifname, id, "openssl_ciphers",
1898 "SUITEB192") < 0)
1899 return -2;
1900 }
1901
1902 val = get_param(cmd, "TLSCipher");
1903 if (set_tls_cipher(ifname, id, val) < 0) {
1904 send_resp(dut, conn, SIGMA_ERROR,
1905 "ErrorCode,Unsupported TLSCipher value");
1906 return -3;
1907 }
1908 }
1909
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001910 return 1;
1911}
1912
1913
1914static int cmd_sta_set_eapttls(struct sigma_dut *dut, struct sigma_conn *conn,
1915 struct sigma_cmd *cmd)
1916{
1917 const char *intf = get_param(cmd, "Interface");
1918 const char *ifname;
1919 int id;
1920
1921 if (intf == NULL)
1922 return -1;
1923
1924 if (strcmp(intf, get_main_ifname()) == 0)
1925 ifname = get_station_ifname();
1926 else
1927 ifname = intf;
1928
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301929 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001930 if (id < 0)
1931 return id;
1932
1933 if (set_network(ifname, id, "eap", "TTLS") < 0) {
1934 send_resp(dut, conn, SIGMA_ERROR,
1935 "errorCode,Failed to set TTLS method");
1936 return 0;
1937 }
1938
1939 if (set_network_quoted(ifname, id, "phase2", "auth=MSCHAPV2") < 0) {
1940 send_resp(dut, conn, SIGMA_ERROR,
1941 "errorCode,Failed to set MSCHAPv2 for TTLS Phase 2");
1942 return 0;
1943 }
1944
1945 return 1;
1946}
1947
1948
1949static int cmd_sta_set_eapsim(struct sigma_dut *dut, struct sigma_conn *conn,
1950 struct sigma_cmd *cmd)
1951{
1952 const char *intf = get_param(cmd, "Interface");
1953 const char *ifname;
1954 int id;
1955
1956 if (intf == NULL)
1957 return -1;
1958
1959 if (strcmp(intf, get_main_ifname()) == 0)
1960 ifname = get_station_ifname();
1961 else
1962 ifname = intf;
1963
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301964 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001965 if (id < 0)
1966 return id;
1967
1968 if (set_network(ifname, id, "eap", "SIM") < 0)
1969 return -2;
1970
1971 return 1;
1972}
1973
1974
1975static int cmd_sta_set_peap(struct sigma_dut *dut, struct sigma_conn *conn,
1976 struct sigma_cmd *cmd)
1977{
1978 const char *intf = get_param(cmd, "Interface");
1979 const char *ifname, *val;
1980 int id;
1981 char buf[100];
1982
1983 if (intf == NULL)
1984 return -1;
1985
1986 if (strcmp(intf, get_main_ifname()) == 0)
1987 ifname = get_station_ifname();
1988 else
1989 ifname = intf;
1990
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301991 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001992 if (id < 0)
1993 return id;
1994
1995 if (set_network(ifname, id, "eap", "PEAP") < 0)
1996 return -2;
1997
1998 val = get_param(cmd, "innerEAP");
1999 if (val) {
2000 if (strcasecmp(val, "MSCHAPv2") == 0) {
2001 if (set_network_quoted(ifname, id, "phase2",
2002 "auth=MSCHAPV2") < 0)
2003 return -2;
2004 } else if (strcasecmp(val, "GTC") == 0) {
2005 if (set_network_quoted(ifname, id, "phase2",
2006 "auth=GTC") < 0)
2007 return -2;
2008 } else
2009 return -1;
2010 }
2011
2012 val = get_param(cmd, "peapVersion");
2013 if (val) {
2014 int ver = atoi(val);
2015 if (ver < 0 || ver > 1)
2016 return -1;
2017 snprintf(buf, sizeof(buf), "peapver=%d", ver);
2018 if (set_network_quoted(ifname, id, "phase1", buf) < 0)
2019 return -2;
2020 }
2021
2022 return 1;
2023}
2024
2025
2026static int cmd_sta_set_eapfast(struct sigma_dut *dut, struct sigma_conn *conn,
2027 struct sigma_cmd *cmd)
2028{
2029 const char *intf = get_param(cmd, "Interface");
2030 const char *ifname, *val;
2031 int id;
2032 char buf[100];
2033
2034 if (intf == NULL)
2035 return -1;
2036
2037 if (strcmp(intf, get_main_ifname()) == 0)
2038 ifname = get_station_ifname();
2039 else
2040 ifname = intf;
2041
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302042 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002043 if (id < 0)
2044 return id;
2045
2046 if (set_network(ifname, id, "eap", "FAST") < 0)
2047 return -2;
2048
2049 val = get_param(cmd, "innerEAP");
2050 if (val) {
2051 if (strcasecmp(val, "MSCHAPV2") == 0) {
2052 if (set_network_quoted(ifname, id, "phase2",
2053 "auth=MSCHAPV2") < 0)
2054 return -2;
2055 } else if (strcasecmp(val, "GTC") == 0) {
2056 if (set_network_quoted(ifname, id, "phase2",
2057 "auth=GTC") < 0)
2058 return -2;
2059 } else
2060 return -1;
2061 }
2062
2063 val = get_param(cmd, "validateServer");
2064 if (val) {
2065 /* TODO */
2066 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored EAP-FAST "
2067 "validateServer=%s", val);
2068 }
2069
2070 val = get_param(cmd, "pacFile");
2071 if (val) {
2072 snprintf(buf, sizeof(buf), "blob://%s", val);
2073 if (set_network_quoted(ifname, id, "pac_file", buf) < 0)
2074 return -2;
2075 }
2076
2077 if (set_network_quoted(ifname, id, "phase1", "fast_provisioning=2") <
2078 0)
2079 return -2;
2080
2081 return 1;
2082}
2083
2084
2085static int cmd_sta_set_eapaka(struct sigma_dut *dut, struct sigma_conn *conn,
2086 struct sigma_cmd *cmd)
2087{
2088 const char *intf = get_param(cmd, "Interface");
2089 const char *ifname;
2090 int id;
2091
2092 if (intf == NULL)
2093 return -1;
2094
2095 if (strcmp(intf, get_main_ifname()) == 0)
2096 ifname = get_station_ifname();
2097 else
2098 ifname = intf;
2099
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302100 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002101 if (id < 0)
2102 return id;
2103
2104 if (set_network(ifname, id, "eap", "AKA") < 0)
2105 return -2;
2106
2107 return 1;
2108}
2109
2110
2111static int cmd_sta_set_eapakaprime(struct sigma_dut *dut,
2112 struct sigma_conn *conn,
2113 struct sigma_cmd *cmd)
2114{
2115 const char *intf = get_param(cmd, "Interface");
2116 const char *ifname;
2117 int id;
2118
2119 if (intf == NULL)
2120 return -1;
2121
2122 if (strcmp(intf, get_main_ifname()) == 0)
2123 ifname = get_station_ifname();
2124 else
2125 ifname = intf;
2126
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302127 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002128 if (id < 0)
2129 return id;
2130
2131 if (set_network(ifname, id, "eap", "AKA'") < 0)
2132 return -2;
2133
2134 return 1;
2135}
2136
2137
2138static int sta_set_open(struct sigma_dut *dut, struct sigma_conn *conn,
2139 struct sigma_cmd *cmd)
2140{
2141 const char *intf = get_param(cmd, "Interface");
2142 const char *ifname;
2143 int id;
2144
2145 if (strcmp(intf, get_main_ifname()) == 0)
2146 ifname = get_station_ifname();
2147 else
2148 ifname = intf;
2149
2150 id = add_network_common(dut, conn, ifname, cmd);
2151 if (id < 0)
2152 return id;
2153
2154 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
2155 return -2;
2156
2157 return 1;
2158}
2159
2160
Jouni Malinen47dcc952017-10-09 16:43:24 +03002161static int sta_set_owe(struct sigma_dut *dut, struct sigma_conn *conn,
2162 struct sigma_cmd *cmd)
2163{
2164 const char *intf = get_param(cmd, "Interface");
2165 const char *ifname, *val;
2166 int id;
2167
2168 if (intf == NULL)
2169 return -1;
2170
2171 if (strcmp(intf, get_main_ifname()) == 0)
2172 ifname = get_station_ifname();
2173 else
2174 ifname = intf;
2175
2176 id = set_wpa_common(dut, conn, ifname, cmd);
2177 if (id < 0)
2178 return id;
2179
2180 if (set_network(ifname, id, "key_mgmt", "OWE") < 0)
2181 return -2;
2182
2183 val = get_param(cmd, "ECGroupID");
Jouni Malinenfac9cad2017-10-10 18:35:55 +03002184 if (val && strcmp(val, "0") == 0) {
2185 if (wpa_command(ifname,
2186 "VENDOR_ELEM_ADD 13 ff23200000783590fb7440e03d5b3b33911f86affdcc6b4411b707846ac4ff08ddc8831ccd") != 0) {
2187 sigma_dut_print(dut, DUT_MSG_ERROR,
2188 "Failed to set OWE DH Param element override");
2189 return -2;
2190 }
2191 } else if (val && set_network(ifname, id, "owe_group", val) < 0) {
Jouni Malinen47dcc952017-10-09 16:43:24 +03002192 sigma_dut_print(dut, DUT_MSG_ERROR,
2193 "Failed to clear owe_group");
2194 return -2;
2195 }
2196
2197 return 1;
2198}
2199
2200
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002201static int cmd_sta_set_security(struct sigma_dut *dut, struct sigma_conn *conn,
2202 struct sigma_cmd *cmd)
2203{
2204 const char *type = get_param(cmd, "Type");
2205
2206 if (type == NULL) {
2207 send_resp(dut, conn, SIGMA_ERROR,
2208 "ErrorCode,Missing Type argument");
2209 return 0;
2210 }
2211
2212 if (strcasecmp(type, "OPEN") == 0)
2213 return sta_set_open(dut, conn, cmd);
Jouni Malinen47dcc952017-10-09 16:43:24 +03002214 if (strcasecmp(type, "OWE") == 0)
2215 return sta_set_owe(dut, conn, cmd);
Jouni Malinen992a81e2017-08-22 13:57:47 +03002216 if (strcasecmp(type, "PSK") == 0 ||
Jouni Malinen0ab50f42017-08-31 01:34:59 +03002217 strcasecmp(type, "PSK-SAE") == 0 ||
Jouni Malinen992a81e2017-08-22 13:57:47 +03002218 strcasecmp(type, "SAE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002219 return cmd_sta_set_psk(dut, conn, cmd);
2220 if (strcasecmp(type, "EAPTLS") == 0)
2221 return cmd_sta_set_eaptls(dut, conn, cmd);
2222 if (strcasecmp(type, "EAPTTLS") == 0)
2223 return cmd_sta_set_eapttls(dut, conn, cmd);
2224 if (strcasecmp(type, "EAPPEAP") == 0)
2225 return cmd_sta_set_peap(dut, conn, cmd);
2226 if (strcasecmp(type, "EAPSIM") == 0)
2227 return cmd_sta_set_eapsim(dut, conn, cmd);
2228 if (strcasecmp(type, "EAPFAST") == 0)
2229 return cmd_sta_set_eapfast(dut, conn, cmd);
2230 if (strcasecmp(type, "EAPAKA") == 0)
2231 return cmd_sta_set_eapaka(dut, conn, cmd);
2232 if (strcasecmp(type, "EAPAKAPRIME") == 0)
2233 return cmd_sta_set_eapakaprime(dut, conn, cmd);
Amarnath Hullur Subramanyam81b11cd2018-01-30 19:07:17 -08002234 if (strcasecmp(type, "wep") == 0)
2235 return cmd_sta_set_encryption(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002236
2237 send_resp(dut, conn, SIGMA_ERROR,
2238 "ErrorCode,Unsupported Type value");
2239 return 0;
2240}
2241
2242
2243int ath6kl_client_uapsd(struct sigma_dut *dut, const char *intf, int uapsd)
2244{
2245#ifdef __linux__
2246 /* special handling for ath6kl */
2247 char path[128], fname[128], *pos;
2248 ssize_t res;
2249 FILE *f;
2250
2251 snprintf(path, sizeof(path), "/sys/class/net/%s/phy80211", intf);
2252 res = readlink(path, path, sizeof(path));
2253 if (res < 0)
2254 return 0; /* not ath6kl */
2255
2256 if (res >= (int) sizeof(path))
2257 res = sizeof(path) - 1;
2258 path[res] = '\0';
2259 pos = strrchr(path, '/');
2260 if (pos == NULL)
2261 pos = path;
2262 else
2263 pos++;
2264 snprintf(fname, sizeof(fname),
2265 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2266 "create_qos", pos);
2267 if (!file_exists(fname))
2268 return 0; /* not ath6kl */
2269
2270 if (uapsd) {
2271 f = fopen(fname, "w");
2272 if (f == NULL)
2273 return -1;
2274
2275 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl create_qos");
2276 fprintf(f, "4 2 2 1 2 9999999 9999999 9999999 7777777 0 4 "
2277 "45000 200 56789000 56789000 5678900 0 0 9999999 "
2278 "20000 0\n");
2279 fclose(f);
2280 } else {
2281 snprintf(fname, sizeof(fname),
2282 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2283 "delete_qos", pos);
2284
2285 f = fopen(fname, "w");
2286 if (f == NULL)
2287 return -1;
2288
2289 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl delete_qos");
2290 fprintf(f, "2 4\n");
2291 fclose(f);
2292 }
2293#endif /* __linux__ */
2294
2295 return 0;
2296}
2297
2298
2299static int cmd_sta_set_uapsd(struct sigma_dut *dut, struct sigma_conn *conn,
2300 struct sigma_cmd *cmd)
2301{
2302 const char *intf = get_param(cmd, "Interface");
2303 /* const char *ssid = get_param(cmd, "ssid"); */
2304 const char *val;
2305 int max_sp_len = 4;
2306 int ac_be = 1, ac_bk = 1, ac_vi = 1, ac_vo = 1;
2307 char buf[100];
2308 int ret1, ret2;
2309
2310 val = get_param(cmd, "maxSPLength");
2311 if (val) {
2312 max_sp_len = atoi(val);
2313 if (max_sp_len != 0 && max_sp_len != 1 && max_sp_len != 2 &&
2314 max_sp_len != 4)
2315 return -1;
2316 }
2317
2318 val = get_param(cmd, "acBE");
2319 if (val)
2320 ac_be = atoi(val);
2321
2322 val = get_param(cmd, "acBK");
2323 if (val)
2324 ac_bk = atoi(val);
2325
2326 val = get_param(cmd, "acVI");
2327 if (val)
2328 ac_vi = atoi(val);
2329
2330 val = get_param(cmd, "acVO");
2331 if (val)
2332 ac_vo = atoi(val);
2333
2334 dut->client_uapsd = ac_be || ac_bk || ac_vi || ac_vo;
2335
2336 snprintf(buf, sizeof(buf), "P2P_SET client_apsd %d,%d,%d,%d;%d",
2337 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2338 ret1 = wpa_command(intf, buf);
2339
2340 snprintf(buf, sizeof(buf), "SET uapsd %d,%d,%d,%d;%d",
2341 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2342 ret2 = wpa_command(intf, buf);
2343
2344 if (ret1 && ret2) {
2345 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to set client mode "
2346 "UAPSD parameters.");
2347 return -2;
2348 }
2349
2350 if (ath6kl_client_uapsd(dut, intf, dut->client_uapsd) < 0) {
2351 send_resp(dut, conn, SIGMA_ERROR,
2352 "ErrorCode,Failed to set ath6kl QoS parameters");
2353 return 0;
2354 }
2355
2356 return 1;
2357}
2358
2359
2360static int cmd_sta_set_wmm(struct sigma_dut *dut, struct sigma_conn *conn,
2361 struct sigma_cmd *cmd)
2362{
2363 char buf[1000];
2364 const char *intf = get_param(cmd, "Interface");
2365 const char *grp = get_param(cmd, "Group");
2366 const char *act = get_param(cmd, "Action");
2367 const char *tid = get_param(cmd, "Tid");
2368 const char *dir = get_param(cmd, "Direction");
2369 const char *psb = get_param(cmd, "Psb");
2370 const char *up = get_param(cmd, "Up");
2371 const char *fixed = get_param(cmd, "Fixed");
2372 const char *size = get_param(cmd, "Size");
2373 const char *msize = get_param(cmd, "Maxsize");
2374 const char *minsi = get_param(cmd, "Min_srvc_intrvl");
2375 const char *maxsi = get_param(cmd, "Max_srvc_intrvl");
2376 const char *inact = get_param(cmd, "Inactivity");
2377 const char *sus = get_param(cmd, "Suspension");
2378 const char *mindr = get_param(cmd, "Mindatarate");
2379 const char *meandr = get_param(cmd, "Meandatarate");
2380 const char *peakdr = get_param(cmd, "Peakdatarate");
2381 const char *phyrate = get_param(cmd, "Phyrate");
2382 const char *burstsize = get_param(cmd, "Burstsize");
2383 const char *sba = get_param(cmd, "Sba");
2384 int direction;
2385 int handle;
Peng Xu93319622017-10-04 17:58:16 -07002386 float sba_fv = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002387 int fixed_int;
2388 int psb_ts;
2389
2390 if (intf == NULL || grp == NULL || act == NULL )
2391 return -1;
2392
2393 if (strcasecmp(act, "addts") == 0) {
2394 if (tid == NULL || dir == NULL || psb == NULL ||
2395 up == NULL || fixed == NULL || size == NULL)
2396 return -1;
2397
2398 /*
2399 * Note: Sigma CAPI spec lists uplink, downlink, and bidi as the
2400 * possible values, but WMM-AC and V-E test scripts use "UP,
2401 * "DOWN", and "BIDI".
2402 */
2403 if (strcasecmp(dir, "uplink") == 0 ||
2404 strcasecmp(dir, "up") == 0) {
2405 direction = 0;
2406 } else if (strcasecmp(dir, "downlink") == 0 ||
2407 strcasecmp(dir, "down") == 0) {
2408 direction = 1;
2409 } else if (strcasecmp(dir, "bidi") == 0) {
2410 direction = 2;
2411 } else {
2412 sigma_dut_print(dut, DUT_MSG_ERROR,
2413 "Direction %s not supported", dir);
2414 return -1;
2415 }
2416
2417 if (strcasecmp(psb, "legacy") == 0) {
2418 psb_ts = 0;
2419 } else if (strcasecmp(psb, "uapsd") == 0) {
2420 psb_ts = 1;
2421 } else {
2422 sigma_dut_print(dut, DUT_MSG_ERROR,
2423 "PSB %s not supported", psb);
2424 return -1;
2425 }
2426
2427 if (atoi(tid) < 0 || atoi(tid) > 7) {
2428 sigma_dut_print(dut, DUT_MSG_ERROR,
2429 "TID %s not supported", tid);
2430 return -1;
2431 }
2432
2433 if (strcasecmp(fixed, "true") == 0) {
2434 fixed_int = 1;
2435 } else {
2436 fixed_int = 0;
2437 }
2438
Peng Xu93319622017-10-04 17:58:16 -07002439 if (sba)
2440 sba_fv = atof(sba);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002441
2442 dut->dialog_token++;
2443 handle = 7000 + dut->dialog_token;
2444
2445 /*
2446 * size: convert to hex
2447 * maxsi: convert to hex
2448 * mindr: convert to hex
2449 * meandr: convert to hex
2450 * peakdr: convert to hex
2451 * burstsize: convert to hex
2452 * phyrate: convert to hex
2453 * sba: convert to hex with modification
2454 * minsi: convert to integer
2455 * sus: convert to integer
2456 * inact: convert to integer
2457 * maxsi: convert to integer
2458 */
2459
2460 /*
2461 * The Nominal MSDU Size field is 2 octets long and contains an
2462 * unsigned integer that specifies the nominal size, in octets,
2463 * of MSDUs belonging to the traffic under this traffic
2464 * specification and is defined in Figure 16. If the Fixed
2465 * subfield is set to 1, then the size of the MSDU is fixed and
2466 * is indicated by the Size Subfield. If the Fixed subfield is
2467 * set to 0, then the size of the MSDU might not be fixed and
2468 * the Size indicates the nominal MSDU size.
2469 *
2470 * The Surplus Bandwidth Allowance Factor field is 2 octets long
2471 * and specifies the excess allocation of time (and bandwidth)
2472 * over and above the stated rates required to transport an MSDU
2473 * belonging to the traffic in this TSPEC. This field is
2474 * represented as an unsigned binary number with an implicit
2475 * binary point after the leftmost 3 bits. For example, an SBA
2476 * of 1.75 is represented as 0x3800. This field is included to
2477 * account for retransmissions. As such, the value of this field
2478 * must be greater than unity.
2479 */
2480
2481 snprintf(buf, sizeof(buf),
2482 "iwpriv %s addTspec %d %s %d %d %s 0x%X"
2483 " 0x%X 0x%X 0x%X"
2484 " 0x%X 0x%X 0x%X"
2485 " 0x%X %d %d %d %d"
2486 " %d %d",
2487 intf, handle, tid, direction, psb_ts, up,
2488 (unsigned int) ((fixed_int << 15) | atoi(size)),
2489 msize ? atoi(msize) : 0,
2490 mindr ? atoi(mindr) : 0,
2491 meandr ? atoi(meandr) : 0,
2492 peakdr ? atoi(peakdr) : 0,
2493 burstsize ? atoi(burstsize) : 0,
2494 phyrate ? atoi(phyrate) : 0,
2495 sba ? ((unsigned int) (((int) sba_fv << 13) |
2496 (int)((sba_fv - (int) sba_fv) *
2497 8192))) : 0,
2498 minsi ? atoi(minsi) : 0,
2499 sus ? atoi(sus) : 0,
2500 0, 0,
2501 inact ? atoi(inact) : 0,
2502 maxsi ? atoi(maxsi) : 0);
2503
2504 if (system(buf) != 0) {
2505 sigma_dut_print(dut, DUT_MSG_ERROR,
2506 "iwpriv addtspec request failed");
2507 send_resp(dut, conn, SIGMA_ERROR,
2508 "errorCode,Failed to execute addTspec command");
2509 return 0;
2510 }
2511
2512 sigma_dut_print(dut, DUT_MSG_INFO,
2513 "iwpriv addtspec request send");
2514
2515 /* Mapping handle to a TID */
2516 dut->tid_to_handle[atoi(tid)] = handle;
2517 } else if (strcasecmp(act, "delts") == 0) {
2518 if (tid == NULL)
2519 return -1;
2520
2521 if (atoi(tid) < 0 || atoi(tid) > 7) {
2522 sigma_dut_print(dut, DUT_MSG_ERROR,
2523 "TID %s not supported", tid);
2524 send_resp(dut, conn, SIGMA_ERROR,
2525 "errorCode,Unsupported TID");
2526 return 0;
2527 }
2528
2529 handle = dut->tid_to_handle[atoi(tid)];
2530
2531 if (handle < 7000 || handle > 7255) {
2532 /* Invalid handle ie no mapping for that TID */
2533 sigma_dut_print(dut, DUT_MSG_ERROR,
2534 "handle-> %d not found", handle);
2535 }
2536
2537 snprintf(buf, sizeof(buf), "iwpriv %s delTspec %d",
2538 intf, handle);
2539
2540 if (system(buf) != 0) {
2541 sigma_dut_print(dut, DUT_MSG_ERROR,
2542 "iwpriv deltspec request failed");
2543 send_resp(dut, conn, SIGMA_ERROR,
2544 "errorCode,Failed to execute delTspec command");
2545 return 0;
2546 }
2547
2548 sigma_dut_print(dut, DUT_MSG_INFO,
2549 "iwpriv deltspec request send");
2550
2551 dut->tid_to_handle[atoi(tid)] = 0;
2552 } else {
2553 sigma_dut_print(dut, DUT_MSG_ERROR,
2554 "Action type %s not supported", act);
2555 send_resp(dut, conn, SIGMA_ERROR,
2556 "errorCode,Unsupported Action");
2557 return 0;
2558 }
2559
2560 return 1;
2561}
2562
2563
vamsi krishna52e16f92017-08-29 12:37:34 +05302564static int find_network(struct sigma_dut *dut, const char *ssid)
2565{
2566 char list[4096];
2567 char *pos;
2568
2569 sigma_dut_print(dut, DUT_MSG_DEBUG,
2570 "Search for profile based on SSID: '%s'", ssid);
2571 if (wpa_command_resp(get_station_ifname(), "LIST_NETWORKS",
2572 list, sizeof(list)) < 0)
2573 return -1;
2574 pos = strstr(list, ssid);
2575 if (!pos || pos == list || pos[-1] != '\t' || pos[strlen(ssid)] != '\t')
2576 return -1;
2577
2578 while (pos > list && pos[-1] != '\n')
2579 pos--;
2580 dut->infra_network_id = atoi(pos);
2581 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
2582 return 0;
2583}
2584
2585
Sunil Dutt44595082018-02-12 19:41:45 +05302586#ifdef NL80211_SUPPORT
2587static int sta_config_rsnie(struct sigma_dut *dut, int val)
2588{
2589 struct nl_msg *msg;
2590 int ret;
2591 struct nlattr *params;
2592 int ifindex;
2593
2594 ifindex = if_nametoindex("wlan0");
2595 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
2596 NL80211_CMD_VENDOR)) ||
2597 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
2598 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2599 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2600 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
2601 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2602 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_RSN_IE, val)) {
2603 sigma_dut_print(dut, DUT_MSG_ERROR,
2604 "%s: err in adding vendor_cmd and vendor_data",
2605 __func__);
2606 nlmsg_free(msg);
2607 return -1;
2608 }
2609 nla_nest_end(msg, params);
2610
2611 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
2612 if (ret) {
2613 sigma_dut_print(dut, DUT_MSG_ERROR,
2614 "%s: err in send_and_recv_msgs, ret=%d",
2615 __func__, ret);
2616 return ret;
2617 }
2618
2619 return 0;
2620}
2621#endif /* NL80211_SUPPORT */
2622
2623
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002624static int cmd_sta_associate(struct sigma_dut *dut, struct sigma_conn *conn,
2625 struct sigma_cmd *cmd)
2626{
2627 /* const char *intf = get_param(cmd, "Interface"); */
2628 const char *ssid = get_param(cmd, "ssid");
2629 const char *wps_param = get_param(cmd, "WPS");
2630 const char *bssid = get_param(cmd, "bssid");
Jouni Malinen46a19b62017-06-23 14:31:27 +03002631 const char *chan = get_param(cmd, "channel");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002632 int wps = 0;
Jouni Malinen3c367e82017-06-23 17:01:47 +03002633 char buf[1000], extra[50];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002634
2635 if (ssid == NULL)
2636 return -1;
2637
Jouni Malinen3c367e82017-06-23 17:01:47 +03002638 if (dut->rsne_override) {
Sunil Dutt44595082018-02-12 19:41:45 +05302639#ifdef NL80211_SUPPORT
2640 if (get_driver_type() == DRIVER_WCN) {
2641 sta_config_rsnie(dut, 1);
2642 dut->config_rsnie = 1;
2643 }
2644#endif /* NL80211_SUPPORT */
Jouni Malinen3c367e82017-06-23 17:01:47 +03002645 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
2646 dut->rsne_override);
2647 if (wpa_command(get_station_ifname(), buf) < 0) {
2648 send_resp(dut, conn, SIGMA_ERROR,
2649 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
2650 return 0;
2651 }
2652 }
2653
Jouni Malinen68143132017-09-02 02:34:08 +03002654 if (dut->sae_commit_override) {
2655 snprintf(buf, sizeof(buf), "SET sae_commit_override %s",
2656 dut->sae_commit_override);
2657 if (wpa_command(get_station_ifname(), buf) < 0) {
2658 send_resp(dut, conn, SIGMA_ERROR,
2659 "ErrorCode,Failed to set SAE commit override");
2660 return 0;
2661 }
2662 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05302663#ifdef ANDROID
2664 if (dut->fils_hlp)
2665 process_fils_hlp(dut);
2666#endif /* ANDROID */
Jouni Malinen68143132017-09-02 02:34:08 +03002667
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002668 if (wps_param &&
2669 (strcmp(wps_param, "1") == 0 || strcasecmp(wps_param, "On") == 0))
2670 wps = 1;
2671
2672 if (wps) {
2673 if (dut->wps_method == WFA_CS_WPS_NOT_READY) {
2674 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,WPS "
2675 "parameters not yet set");
2676 return 0;
2677 }
2678 if (dut->wps_method == WFA_CS_WPS_PBC) {
2679 if (wpa_command(get_station_ifname(), "WPS_PBC") < 0)
2680 return -2;
2681 } else {
2682 snprintf(buf, sizeof(buf), "WPS_PIN any %s",
2683 dut->wps_pin);
2684 if (wpa_command(get_station_ifname(), buf) < 0)
2685 return -2;
2686 }
2687 } else {
vamsi krishna52e16f92017-08-29 12:37:34 +05302688 if (strcmp(ssid, dut->infra_ssid) == 0) {
2689 sigma_dut_print(dut, DUT_MSG_DEBUG,
2690 "sta_associate for the most recently added network");
2691 } else if (find_network(dut, ssid) < 0) {
2692 sigma_dut_print(dut, DUT_MSG_DEBUG,
2693 "sta_associate for a previously stored network profile");
2694 send_resp(dut, conn, SIGMA_ERROR,
2695 "ErrorCode,Profile not found");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002696 return 0;
2697 }
2698
2699 if (bssid &&
2700 set_network(get_station_ifname(), dut->infra_network_id,
2701 "bssid", bssid) < 0) {
2702 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2703 "Invalid bssid argument");
2704 return 0;
2705 }
2706
Jouni Malinen46a19b62017-06-23 14:31:27 +03002707 extra[0] = '\0';
2708 if (chan)
2709 snprintf(extra, sizeof(extra), " freq=%u",
2710 channel_to_freq(atoi(chan)));
2711 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d%s",
2712 dut->infra_network_id, extra);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002713 if (wpa_command(get_station_ifname(), buf) < 0) {
2714 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to select "
2715 "network id %d on %s",
2716 dut->infra_network_id,
2717 get_station_ifname());
2718 return -2;
2719 }
2720 }
2721
2722 return 1;
2723}
2724
2725
2726static int run_hs20_osu(struct sigma_dut *dut, const char *params)
2727{
2728 char buf[500], cmd[200];
2729 int res;
2730
2731 /* Use hs20-osu-client file at the current dir, if found; otherwise use
2732 * default path */
2733 res = snprintf(cmd, sizeof(cmd),
2734 "%s -w \"%s\" -r hs20-osu-client.res %s%s -dddKt -f Logs/hs20-osu-client.txt",
2735 file_exists("./hs20-osu-client") ?
2736 "./hs20-osu-client" : "hs20-osu-client",
2737 sigma_wpas_ctrl,
2738 dut->summary_log ? "-s " : "",
2739 dut->summary_log ? dut->summary_log : "");
2740 if (res < 0 || res >= (int) sizeof(cmd))
2741 return -1;
2742
2743 res = snprintf(buf, sizeof(buf), "%s %s", cmd, params);
2744 if (res < 0 || res >= (int) sizeof(buf))
2745 return -1;
2746 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
2747
2748 if (system(buf) != 0) {
2749 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to run: %s", buf);
2750 return -1;
2751 }
2752 sigma_dut_print(dut, DUT_MSG_DEBUG,
2753 "Completed hs20-osu-client operation");
2754
2755 return 0;
2756}
2757
2758
2759static int download_ppsmo(struct sigma_dut *dut,
2760 struct sigma_conn *conn,
2761 const char *intf,
2762 struct sigma_cmd *cmd)
2763{
2764 const char *name, *path, *val;
2765 char url[500], buf[600], fbuf[100];
2766 char *fqdn = NULL;
2767
2768 name = get_param(cmd, "FileName");
2769 path = get_param(cmd, "FilePath");
2770 if (name == NULL || path == NULL)
2771 return -1;
2772
2773 if (strcasecmp(path, "VendorSpecific") == 0) {
2774 snprintf(url, sizeof(url), "PPS/%s", name);
2775 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured PPS MO "
2776 "from the device (%s)", url);
2777 if (!file_exists(url)) {
2778 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2779 "PPS MO file does not exist");
2780 return 0;
2781 }
2782 snprintf(buf, sizeof(buf), "cp %s pps-tnds.xml", url);
2783 if (system(buf) != 0) {
2784 send_resp(dut, conn, SIGMA_ERROR,
2785 "errorCode,Failed to copy PPS MO");
2786 return 0;
2787 }
2788 } else if (strncasecmp(path, "http:", 5) != 0 &&
2789 strncasecmp(path, "https:", 6) != 0) {
2790 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2791 "Unsupported FilePath value");
2792 return 0;
2793 } else {
2794 snprintf(url, sizeof(url), "%s/%s", path, name);
2795 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading PPS MO from %s",
2796 url);
2797 snprintf(buf, sizeof(buf), "wget -T 10 -t 3 -O pps-tnds.xml '%s'", url);
2798 remove("pps-tnds.xml");
2799 if (system(buf) != 0) {
2800 send_resp(dut, conn, SIGMA_ERROR,
2801 "errorCode,Failed to download PPS MO");
2802 return 0;
2803 }
2804 }
2805
2806 if (run_hs20_osu(dut, "from_tnds pps-tnds.xml pps.xml") < 0) {
2807 send_resp(dut, conn, SIGMA_ERROR,
2808 "errorCode,Failed to parse downloaded PPSMO");
2809 return 0;
2810 }
2811 unlink("pps-tnds.xml");
2812
2813 val = get_param(cmd, "managementTreeURI");
2814 if (val) {
2815 const char *pos, *end;
2816 sigma_dut_print(dut, DUT_MSG_DEBUG, "managementTreeURI: %s",
2817 val);
2818 if (strncmp(val, "./Wi-Fi/", 8) != 0) {
2819 send_resp(dut, conn, SIGMA_ERROR,
2820 "errorCode,Invalid managementTreeURI prefix");
2821 return 0;
2822 }
2823 pos = val + 8;
2824 end = strchr(pos, '/');
2825 if (end == NULL ||
2826 strcmp(end, "/PerProviderSubscription") != 0) {
2827 send_resp(dut, conn, SIGMA_ERROR,
2828 "errorCode,Invalid managementTreeURI postfix");
2829 return 0;
2830 }
2831 if (end - pos >= (int) sizeof(fbuf)) {
2832 send_resp(dut, conn, SIGMA_ERROR,
2833 "errorCode,Too long FQDN in managementTreeURI");
2834 return 0;
2835 }
2836 memcpy(fbuf, pos, end - pos);
2837 fbuf[end - pos] = '\0';
2838 fqdn = fbuf;
2839 sigma_dut_print(dut, DUT_MSG_INFO,
2840 "FQDN from managementTreeURI: %s", fqdn);
2841 } else if (run_hs20_osu(dut, "get_fqdn pps.xml") == 0) {
2842 FILE *f = fopen("pps-fqdn", "r");
2843 if (f) {
2844 if (fgets(fbuf, sizeof(fbuf), f)) {
2845 fbuf[sizeof(fbuf) - 1] = '\0';
2846 fqdn = fbuf;
2847 sigma_dut_print(dut, DUT_MSG_DEBUG,
2848 "Use FQDN %s", fqdn);
2849 }
2850 fclose(f);
2851 }
2852 }
2853
2854 if (fqdn == NULL) {
2855 send_resp(dut, conn, SIGMA_ERROR,
2856 "errorCode,No FQDN specified");
2857 return 0;
2858 }
2859
2860 mkdir("SP", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2861 snprintf(buf, sizeof(buf), "SP/%s", fqdn);
2862 mkdir(buf, S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2863
2864 snprintf(buf, sizeof(buf), "SP/%s/pps.xml", fqdn);
2865 if (rename("pps.xml", buf) < 0) {
2866 send_resp(dut, conn, SIGMA_ERROR,
2867 "errorCode,Could not move PPS MO");
2868 return 0;
2869 }
2870
2871 if (strcasecmp(path, "VendorSpecific") == 0) {
2872 snprintf(buf, sizeof(buf), "cp Certs/ca.pem SP/%s/ca.pem",
2873 fqdn);
2874 if (system(buf)) {
2875 send_resp(dut, conn, SIGMA_ERROR,
2876 "errorCode,Failed to copy OSU CA cert");
2877 return 0;
2878 }
2879
2880 snprintf(buf, sizeof(buf),
2881 "cp Certs/aaa-ca.pem SP/%s/aaa-ca.pem",
2882 fqdn);
2883 if (system(buf)) {
2884 send_resp(dut, conn, SIGMA_ERROR,
2885 "errorCode,Failed to copy AAA CA cert");
2886 return 0;
2887 }
2888 } else {
2889 snprintf(buf, sizeof(buf),
2890 "dl_osu_ca SP/%s/pps.xml SP/%s/ca.pem",
2891 fqdn, fqdn);
2892 if (run_hs20_osu(dut, buf) < 0) {
2893 send_resp(dut, conn, SIGMA_ERROR,
2894 "errorCode,Failed to download OSU CA cert");
2895 return 0;
2896 }
2897
2898 snprintf(buf, sizeof(buf),
2899 "dl_aaa_ca SP/%s/pps.xml SP/%s/aaa-ca.pem",
2900 fqdn, fqdn);
2901 if (run_hs20_osu(dut, buf) < 0) {
2902 sigma_dut_print(dut, DUT_MSG_INFO,
2903 "Failed to download AAA CA cert");
2904 }
2905 }
2906
2907 if (file_exists("next-client-cert.pem")) {
2908 snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn);
2909 if (rename("next-client-cert.pem", buf) < 0) {
2910 send_resp(dut, conn, SIGMA_ERROR,
2911 "errorCode,Could not move client certificate");
2912 return 0;
2913 }
2914 }
2915
2916 if (file_exists("next-client-key.pem")) {
2917 snprintf(buf, sizeof(buf), "SP/%s/client-key.pem", fqdn);
2918 if (rename("next-client-key.pem", buf) < 0) {
2919 send_resp(dut, conn, SIGMA_ERROR,
2920 "errorCode,Could not move client key");
2921 return 0;
2922 }
2923 }
2924
2925 snprintf(buf, sizeof(buf), "set_pps SP/%s/pps.xml", fqdn);
2926 if (run_hs20_osu(dut, buf) < 0) {
2927 send_resp(dut, conn, SIGMA_ERROR,
2928 "errorCode,Failed to configure credential from "
2929 "PPSMO");
2930 return 0;
2931 }
2932
2933 return 1;
2934}
2935
2936
2937static int download_cert(struct sigma_dut *dut,
2938 struct sigma_conn *conn,
2939 const char *intf,
2940 struct sigma_cmd *cmd)
2941{
2942 const char *name, *path;
2943 char url[500], buf[600];
2944
2945 name = get_param(cmd, "FileName");
2946 path = get_param(cmd, "FilePath");
2947 if (name == NULL || path == NULL)
2948 return -1;
2949
2950 if (strcasecmp(path, "VendorSpecific") == 0) {
2951 snprintf(url, sizeof(url), "Certs/%s-cert.pem", name);
2952 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2953 "certificate from the device (%s)", url);
2954 if (!file_exists(url)) {
2955 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2956 "certificate file does not exist");
2957 return 0;
2958 }
2959 snprintf(buf, sizeof(buf), "cp %s next-client-cert.pem", url);
2960 if (system(buf) != 0) {
2961 send_resp(dut, conn, SIGMA_ERROR,
2962 "errorCode,Failed to copy client "
2963 "certificate");
2964 return 0;
2965 }
2966
2967 snprintf(url, sizeof(url), "Certs/%s-key.pem", name);
2968 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2969 "private key from the device (%s)", url);
2970 if (!file_exists(url)) {
2971 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2972 "private key file does not exist");
2973 return 0;
2974 }
2975 snprintf(buf, sizeof(buf), "cp %s next-client-key.pem", url);
2976 if (system(buf) != 0) {
2977 send_resp(dut, conn, SIGMA_ERROR,
2978 "errorCode,Failed to copy client key");
2979 return 0;
2980 }
2981 } else if (strncasecmp(path, "http:", 5) != 0 &&
2982 strncasecmp(path, "https:", 6) != 0) {
2983 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2984 "Unsupported FilePath value");
2985 return 0;
2986 } else {
2987 snprintf(url, sizeof(url), "%s/%s.pem", path, name);
2988 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading client "
2989 "certificate/key from %s", url);
2990 snprintf(buf, sizeof(buf),
2991 "wget -T 10 -t 3 -O next-client-cert.pem '%s'", url);
2992 if (system(buf) != 0) {
2993 send_resp(dut, conn, SIGMA_ERROR,
2994 "errorCode,Failed to download client "
2995 "certificate");
2996 return 0;
2997 }
2998
2999 if (system("cp next-client-cert.pem next-client-key.pem") != 0)
3000 {
3001 send_resp(dut, conn, SIGMA_ERROR,
3002 "errorCode,Failed to copy client key");
3003 return 0;
3004 }
3005 }
3006
3007 return 1;
3008}
3009
3010
3011static int cmd_sta_preset_testparameters_hs2_r2(struct sigma_dut *dut,
3012 struct sigma_conn *conn,
3013 const char *intf,
3014 struct sigma_cmd *cmd)
3015{
3016 const char *val;
3017
3018 val = get_param(cmd, "FileType");
3019 if (val && strcasecmp(val, "PPSMO") == 0)
3020 return download_ppsmo(dut, conn, intf, cmd);
3021 if (val && strcasecmp(val, "CERT") == 0)
3022 return download_cert(dut, conn, intf, cmd);
3023 if (val) {
3024 send_resp(dut, conn, SIGMA_ERROR,
3025 "ErrorCode,Unsupported FileType");
3026 return 0;
3027 }
3028
3029 return 1;
3030}
3031
3032
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303033static int cmd_sta_preset_testparameters_oce(struct sigma_dut *dut,
3034 struct sigma_conn *conn,
3035 const char *intf,
3036 struct sigma_cmd *cmd)
3037{
3038 const char *val;
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303039 char buf[1000];
3040 char text[20];
3041 unsigned char addr[ETH_ALEN];
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303042
3043 val = get_param(cmd, "OCESupport");
3044 if (val && strcasecmp(val, "Disable") == 0) {
3045 if (wpa_command(intf, "SET oce 0") < 0) {
3046 send_resp(dut, conn, SIGMA_ERROR,
3047 "ErrorCode,Failed to disable OCE");
3048 return 0;
3049 }
3050 } else if (val && strcasecmp(val, "Enable") == 0) {
3051 if (wpa_command(intf, "SET oce 1") < 0) {
3052 send_resp(dut, conn, SIGMA_ERROR,
3053 "ErrorCode,Failed to enable OCE");
3054 return 0;
3055 }
3056 }
3057
vamsi krishnaa2799492017-12-05 14:28:01 +05303058 val = get_param(cmd, "FILScap");
3059 if (val && (atoi(val) == 1)) {
3060 if (wpa_command(intf, "SET disable_fils 0") < 0) {
3061 send_resp(dut, conn, SIGMA_ERROR,
3062 "ErrorCode,Failed to enable FILS");
3063 return 0;
3064 }
3065 } else if (val && (atoi(val) == 0)) {
3066 if (wpa_command(intf, "SET disable_fils 1") < 0) {
3067 send_resp(dut, conn, SIGMA_ERROR,
3068 "ErrorCode,Failed to disable FILS");
3069 return 0;
3070 }
3071 }
3072
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303073 val = get_param(cmd, "FILSHLP");
3074 if (val && strcasecmp(val, "Enable") == 0) {
3075 if (get_wpa_status(get_station_ifname(), "address", text,
3076 sizeof(text)) < 0)
3077 return -2;
3078 hwaddr_aton(text, addr);
3079 snprintf(buf, sizeof(buf),
3080 "FILS_HLP_REQ_ADD ff:ff:ff:ff:ff:ff "
3081 "080045100140000040004011399e00000000ffffffff00440043"
3082 "012cb30001010600fd4f46410000000000000000000000000000"
3083 "000000000000"
3084 "%02x%02x%02x%02x%02x%02x"
3085 "0000000000000000000000000000000000000000000000000000"
3086 "0000000000000000000000000000000000000000000000000000"
3087 "0000000000000000000000000000000000000000000000000000"
3088 "0000000000000000000000000000000000000000000000000000"
3089 "0000000000000000000000000000000000000000000000000000"
3090 "0000000000000000000000000000000000000000000000000000"
3091 "0000000000000000000000000000000000000000000000000000"
3092 "0000000000000000000000000000000000000000638253633501"
3093 "013d0701000af549d29b390205dc3c12616e64726f69642d6468"
3094 "63702d382e302e30370a0103060f1a1c333a3b2b5000ff00",
3095 addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]);
3096 if (wpa_command(intf, buf)) {
3097 send_resp(dut, conn, SIGMA_ERROR,
3098 "ErrorCode,Failed to add HLP");
3099 return 0;
3100 }
3101 dut->fils_hlp = 1;
3102 }
3103
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303104 return 1;
3105}
3106
3107
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003108static void ath_sta_set_noack(struct sigma_dut *dut, const char *intf,
3109 const char *val)
3110{
3111 int counter = 0;
3112 char token[50];
3113 char *result;
3114 char buf[100];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303115 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003116
Peng Xub8fc5cc2017-05-10 17:27:28 -07003117 strlcpy(token, val, sizeof(token));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003118 token[sizeof(token) - 1] = '\0';
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303119 result = strtok_r(token, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003120 while (result) {
3121 if (strcmp(result, "disable") == 0) {
3122 snprintf(buf, sizeof(buf),
3123 "iwpriv %s noackpolicy %d 1 0",
3124 intf, counter);
3125 } else {
3126 snprintf(buf, sizeof(buf),
3127 "iwpriv %s noackpolicy %d 1 1",
3128 intf, counter);
3129 }
3130 if (system(buf) != 0) {
3131 sigma_dut_print(dut, DUT_MSG_ERROR,
3132 "iwpriv noackpolicy failed");
3133 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303134 result = strtok_r(NULL, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003135 counter++;
3136 }
3137}
3138
3139
3140static void ath_sta_set_rts(struct sigma_dut *dut, const char *intf,
3141 const char *val)
3142{
3143 char buf[100];
3144
3145 snprintf(buf, sizeof(buf), "iwconfig %s rts %s", intf, val);
3146 if (system(buf) != 0) {
3147 sigma_dut_print(dut, DUT_MSG_ERROR, "iwconfig RTS failed");
3148 }
3149}
3150
3151
3152static void ath_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3153 const char *val)
3154{
3155 char buf[100];
3156
3157 if (strcasecmp(val, "off") == 0) {
3158 snprintf(buf, sizeof(buf), "iwpriv %s wmm 0", intf);
3159 if (system(buf) != 0) {
3160 sigma_dut_print(dut, DUT_MSG_ERROR,
3161 "Failed to turn off WMM");
3162 }
3163 }
3164}
3165
3166
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003167static int wcn_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3168 const char *val)
3169{
3170#ifdef NL80211_SUPPORT
3171 struct nl_msg *msg;
3172 int ret = 0;
3173 struct nlattr *params;
3174 int ifindex;
3175 int wmmenable = 1;
3176
3177 if (val &&
3178 (strcasecmp(val, "off") == 0 || strcmp(val, "0") == 0))
3179 wmmenable = 0;
3180
3181 ifindex = if_nametoindex(intf);
3182 if (ifindex == 0) {
3183 sigma_dut_print(dut, DUT_MSG_ERROR,
3184 "%s: Index for interface %s failed",
3185 __func__, intf);
3186 return -1;
3187 }
3188
3189 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3190 NL80211_CMD_VENDOR)) ||
3191 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3192 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3193 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3194 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3195 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3196 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WMM_ENABLE,
3197 wmmenable)) {
3198 sigma_dut_print(dut, DUT_MSG_ERROR,
3199 "%s: err in adding vendor_cmd and vendor_data",
3200 __func__);
3201 nlmsg_free(msg);
3202 return -1;
3203 }
3204 nla_nest_end(msg, params);
3205
3206 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3207 if (ret) {
3208 sigma_dut_print(dut, DUT_MSG_ERROR,
3209 "%s: err in send_and_recv_msgs, ret=%d",
3210 __func__, ret);
3211 }
3212 return ret;
3213#else /* NL80211_SUPPORT */
3214 sigma_dut_print(dut, DUT_MSG_ERROR,
3215 "WMM cannot be changed without NL80211_SUPPORT defined");
3216 return -1;
3217#endif /* NL80211_SUPPORT */
3218}
3219
3220
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003221static void ath_sta_set_sgi(struct sigma_dut *dut, const char *intf,
3222 const char *val)
3223{
3224 char buf[100];
3225 int sgi20;
3226
3227 sgi20 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
3228
3229 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi20);
3230 if (system(buf) != 0)
3231 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv shortgi failed");
3232}
3233
3234
3235static void ath_sta_set_11nrates(struct sigma_dut *dut, const char *intf,
3236 const char *val)
3237{
3238 char buf[100];
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303239 int rate_code, v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003240
3241 /* Disable Tx Beam forming when using a fixed rate */
3242 ath_disable_txbf(dut, intf);
3243
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303244 v = atoi(val);
3245 if (v < 0 || v > 32) {
3246 sigma_dut_print(dut, DUT_MSG_ERROR,
3247 "Invalid Fixed MCS rate: %d", v);
3248 return;
3249 }
3250 rate_code = 0x80 + v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003251
3252 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0x%x",
3253 intf, rate_code);
3254 if (system(buf) != 0) {
3255 sigma_dut_print(dut, DUT_MSG_ERROR,
3256 "iwpriv set11NRates failed");
3257 }
3258
3259 /* Channel width gets messed up, fix this */
3260 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d", intf, dut->chwidth);
3261 if (system(buf) != 0)
3262 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
3263}
3264
3265
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08003266static void iwpriv_sta_set_amsdu(struct sigma_dut *dut, const char *intf,
3267 const char *val)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003268{
3269 char buf[60];
3270
3271 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)
3272 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 2", intf);
3273 else
3274 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
3275
3276 if (system(buf) != 0)
3277 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv amsdu failed");
3278}
3279
3280
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003281static int iwpriv_sta_set_ampdu(struct sigma_dut *dut, const char *intf,
3282 int ampdu)
3283{
3284 char buf[60];
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003285 int maxaggregation = 63;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003286
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003287 if (ampdu)
3288 ampdu = maxaggregation;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003289 snprintf(buf, sizeof(buf), "iwpriv %s ampdu %d", intf, ampdu);
3290 if (system(buf) != 0) {
3291 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv ampdu failed");
3292 return -1;
3293 }
3294
3295 return 0;
3296}
3297
3298
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003299static void ath_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3300 const char *val)
3301{
3302 char buf[60];
3303
3304 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3305 if (system(buf) != 0) {
3306 sigma_dut_print(dut, DUT_MSG_ERROR,
3307 "iwpriv tx_stbc failed");
3308 }
3309
3310 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3311 if (system(buf) != 0) {
3312 sigma_dut_print(dut, DUT_MSG_ERROR,
3313 "iwpriv rx_stbc failed");
3314 }
3315}
3316
3317
3318static int wcn_sta_set_cts_width(struct sigma_dut *dut, const char *intf,
3319 const char *val)
3320{
3321 char buf[60];
3322
Peng Xucc317ed2017-05-18 16:44:37 -07003323 if (strcmp(val, "160") == 0) {
3324 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 5", intf);
3325 } else if (strcmp(val, "80") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003326 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
3327 } else if (strcmp(val, "40") == 0) {
3328 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 2", intf);
3329 } else if (strcmp(val, "20") == 0) {
3330 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 1", intf);
3331 } else if (strcasecmp(val, "Auto") == 0) {
3332 buf[0] = '\0';
3333 } else {
3334 sigma_dut_print(dut, DUT_MSG_ERROR,
3335 "WIDTH/CTS_WIDTH value not supported");
3336 return -1;
3337 }
3338
3339 if (buf[0] != '\0' && system(buf) != 0) {
3340 sigma_dut_print(dut, DUT_MSG_ERROR,
3341 "Failed to set WIDTH/CTS_WIDTH");
3342 return -1;
3343 }
3344
3345 return 0;
3346}
3347
3348
3349int ath_set_width(struct sigma_dut *dut, struct sigma_conn *conn,
3350 const char *intf, const char *val)
3351{
3352 char buf[60];
3353
3354 if (strcasecmp(val, "Auto") == 0) {
3355 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3356 dut->chwidth = 0;
3357 } else if (strcasecmp(val, "20") == 0) {
3358 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3359 dut->chwidth = 0;
3360 } else if (strcasecmp(val, "40") == 0) {
3361 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
3362 dut->chwidth = 1;
3363 } else if (strcasecmp(val, "80") == 0) {
3364 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
3365 dut->chwidth = 2;
3366 } else if (strcasecmp(val, "160") == 0) {
3367 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 3", intf);
3368 dut->chwidth = 3;
3369 } else {
3370 send_resp(dut, conn, SIGMA_ERROR,
3371 "ErrorCode,WIDTH not supported");
3372 return -1;
3373 }
3374
3375 if (system(buf) != 0) {
3376 sigma_dut_print(dut, DUT_MSG_ERROR,
3377 "iwpriv chwidth failed");
3378 }
3379
3380 return 0;
3381}
3382
3383
3384static int wcn_sta_set_sp_stream(struct sigma_dut *dut, const char *intf,
3385 const char *val)
3386{
3387 char buf[60];
Arif Hussainac6c5112018-05-25 17:34:00 -07003388 int sta_nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003389
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003390 if (strcmp(val, "1SS") == 0 || strcmp(val, "1") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003391 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003392 sta_nss = 1;
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003393 } else if (strcmp(val, "2SS") == 0 || strcmp(val, "2") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003394 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003395 sta_nss = 2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003396 } else {
3397 sigma_dut_print(dut, DUT_MSG_ERROR,
3398 "SP_STREAM value not supported");
3399 return -1;
3400 }
3401
3402 if (system(buf) != 0) {
3403 sigma_dut_print(dut, DUT_MSG_ERROR,
3404 "Failed to set SP_STREAM");
3405 return -1;
3406 }
3407
Arif Hussainac6c5112018-05-25 17:34:00 -07003408 dut->sta_nss = sta_nss;
3409
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003410 return 0;
3411}
3412
3413
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05303414static void wcn_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3415 const char *val)
3416{
3417 char buf[60];
3418
3419 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3420 if (system(buf) != 0)
3421 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv tx_stbc failed");
3422
3423 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3424 if (system(buf) != 0)
3425 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv rx_stbc failed");
3426}
3427
3428
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303429static int mbo_set_cellular_data_capa(struct sigma_dut *dut,
3430 struct sigma_conn *conn,
3431 const char *intf, int capa)
3432{
3433 char buf[32];
3434
3435 if (capa > 0 && capa < 4) {
3436 snprintf(buf, sizeof(buf), "SET mbo_cell_capa %d", capa);
3437 if (wpa_command(intf, buf) < 0) {
3438 send_resp(dut, conn, SIGMA_ERROR,
3439 "ErrorCode, Failed to set cellular data capability");
3440 return 0;
3441 }
3442 return 1;
3443 }
3444
3445 sigma_dut_print(dut, DUT_MSG_ERROR,
3446 "Invalid Cellular data capability: %d", capa);
3447 send_resp(dut, conn, SIGMA_INVALID,
3448 "ErrorCode,Invalid cellular data capability");
3449 return 0;
3450}
3451
3452
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303453static int mbo_set_roaming(struct sigma_dut *dut, struct sigma_conn *conn,
3454 const char *intf, const char *val)
3455{
3456 if (strcasecmp(val, "Disable") == 0) {
3457 if (wpa_command(intf, "SET roaming 0") < 0) {
3458 send_resp(dut, conn, SIGMA_ERROR,
3459 "ErrorCode,Failed to disable roaming");
3460 return 0;
3461 }
3462 return 1;
3463 }
3464
3465 if (strcasecmp(val, "Enable") == 0) {
3466 if (wpa_command(intf, "SET roaming 1") < 0) {
3467 send_resp(dut, conn, SIGMA_ERROR,
3468 "ErrorCode,Failed to enable roaming");
3469 return 0;
3470 }
3471 return 1;
3472 }
3473
3474 sigma_dut_print(dut, DUT_MSG_ERROR,
3475 "Invalid value provided for roaming: %s", val);
3476 send_resp(dut, conn, SIGMA_INVALID,
3477 "ErrorCode,Unknown value provided for Roaming");
3478 return 0;
3479}
3480
3481
Ashwini Patila75de5a2017-04-13 16:35:05 +05303482static int mbo_set_assoc_disallow(struct sigma_dut *dut,
3483 struct sigma_conn *conn,
3484 const char *intf, const char *val)
3485{
3486 if (strcasecmp(val, "Disable") == 0) {
3487 if (wpa_command(intf, "SET ignore_assoc_disallow 1") < 0) {
3488 send_resp(dut, conn, SIGMA_ERROR,
3489 "ErrorCode,Failed to disable Assoc_disallow");
3490 return 0;
3491 }
3492 return 1;
3493 }
3494
3495 if (strcasecmp(val, "Enable") == 0) {
3496 if (wpa_command(intf, "SET ignore_assoc_disallow 0") < 0) {
3497 send_resp(dut, conn, SIGMA_ERROR,
3498 "ErrorCode,Failed to enable Assoc_disallow");
3499 return 0;
3500 }
3501 return 1;
3502 }
3503
3504 sigma_dut_print(dut, DUT_MSG_ERROR,
3505 "Invalid value provided for Assoc_disallow: %s", val);
3506 send_resp(dut, conn, SIGMA_INVALID,
3507 "ErrorCode,Unknown value provided for Assoc_disallow");
3508 return 0;
3509}
3510
3511
Ashwini Patilc63161e2017-04-13 16:30:23 +05303512static int mbo_set_bss_trans_req(struct sigma_dut *dut, struct sigma_conn *conn,
3513 const char *intf, const char *val)
3514{
3515 if (strcasecmp(val, "Reject") == 0) {
3516 if (wpa_command(intf, "SET reject_btm_req_reason 1") < 0) {
3517 send_resp(dut, conn, SIGMA_ERROR,
3518 "ErrorCode,Failed to Reject BTM Request");
3519 return 0;
3520 }
3521 return 1;
3522 }
3523
3524 if (strcasecmp(val, "Accept") == 0) {
3525 if (wpa_command(intf, "SET reject_btm_req_reason 0") < 0) {
3526 send_resp(dut, conn, SIGMA_ERROR,
3527 "ErrorCode,Failed to Accept BTM Request");
3528 return 0;
3529 }
3530 return 1;
3531 }
3532
3533 sigma_dut_print(dut, DUT_MSG_ERROR,
3534 "Invalid value provided for BSS_Transition: %s", val);
3535 send_resp(dut, conn, SIGMA_INVALID,
3536 "ErrorCode,Unknown value provided for BSS_Transition");
3537 return 0;
3538}
3539
3540
Ashwini Patil00402582017-04-13 12:29:39 +05303541static int mbo_set_non_pref_ch_list(struct sigma_dut *dut,
3542 struct sigma_conn *conn,
3543 const char *intf,
3544 struct sigma_cmd *cmd)
3545{
3546 const char *ch, *pref, *op_class, *reason;
3547 char buf[120];
3548 int len, ret;
3549
3550 pref = get_param(cmd, "Ch_Pref");
3551 if (!pref)
3552 return 1;
3553
3554 if (strcasecmp(pref, "clear") == 0) {
3555 free(dut->non_pref_ch_list);
3556 dut->non_pref_ch_list = NULL;
3557 } else {
3558 op_class = get_param(cmd, "Ch_Op_Class");
3559 if (!op_class) {
3560 send_resp(dut, conn, SIGMA_INVALID,
3561 "ErrorCode,Ch_Op_Class not provided");
3562 return 0;
3563 }
3564
3565 ch = get_param(cmd, "Ch_Pref_Num");
3566 if (!ch) {
3567 send_resp(dut, conn, SIGMA_INVALID,
3568 "ErrorCode,Ch_Pref_Num not provided");
3569 return 0;
3570 }
3571
3572 reason = get_param(cmd, "Ch_Reason_Code");
3573 if (!reason) {
3574 send_resp(dut, conn, SIGMA_INVALID,
3575 "ErrorCode,Ch_Reason_Code not provided");
3576 return 0;
3577 }
3578
3579 if (!dut->non_pref_ch_list) {
3580 dut->non_pref_ch_list =
3581 calloc(1, NON_PREF_CH_LIST_SIZE);
3582 if (!dut->non_pref_ch_list) {
3583 send_resp(dut, conn, SIGMA_ERROR,
3584 "ErrorCode,Failed to allocate memory for non_pref_ch_list");
3585 return 0;
3586 }
3587 }
3588 len = strlen(dut->non_pref_ch_list);
3589 ret = snprintf(dut->non_pref_ch_list + len,
3590 NON_PREF_CH_LIST_SIZE - len,
3591 " %s:%s:%s:%s", op_class, ch, pref, reason);
3592 if (ret > 0 && ret < NON_PREF_CH_LIST_SIZE - len) {
3593 sigma_dut_print(dut, DUT_MSG_DEBUG, "non_pref_list: %s",
3594 dut->non_pref_ch_list);
3595 } else {
3596 sigma_dut_print(dut, DUT_MSG_ERROR,
3597 "snprintf failed for non_pref_list, ret = %d",
3598 ret);
3599 send_resp(dut, conn, SIGMA_ERROR,
3600 "ErrorCode,snprintf failed");
3601 free(dut->non_pref_ch_list);
3602 dut->non_pref_ch_list = NULL;
3603 return 0;
3604 }
3605 }
3606
3607 ret = snprintf(buf, sizeof(buf), "SET non_pref_chan%s",
3608 dut->non_pref_ch_list ? dut->non_pref_ch_list : " ");
3609 if (ret < 0 || ret >= (int) sizeof(buf)) {
3610 sigma_dut_print(dut, DUT_MSG_DEBUG,
3611 "snprintf failed for set non_pref_chan, ret: %d",
3612 ret);
3613 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,snprint failed");
3614 return 0;
3615 }
3616
3617 if (wpa_command(intf, buf) < 0) {
3618 send_resp(dut, conn, SIGMA_ERROR,
3619 "ErrorCode,Failed to set non-preferred channel list");
3620 return 0;
3621 }
3622
3623 return 1;
3624}
3625
3626
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003627#ifdef NL80211_SUPPORT
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003628
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003629static int sta_set_he_fragmentation(struct sigma_dut *dut, const char *intf,
3630 enum he_fragmentation_val frag)
3631{
3632 struct nl_msg *msg;
3633 int ret = 0;
3634 struct nlattr *params;
3635 int ifindex;
3636
3637 ifindex = if_nametoindex(intf);
3638 if (ifindex == 0) {
3639 sigma_dut_print(dut, DUT_MSG_ERROR,
3640 "%s: Index for interface %s failed",
3641 __func__, intf);
3642 return -1;
3643 }
3644
3645 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3646 NL80211_CMD_VENDOR)) ||
3647 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3648 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3649 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3650 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3651 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3652 nla_put_u8(msg,
3653 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_FRAGMENTATION,
3654 frag)) {
3655 sigma_dut_print(dut, DUT_MSG_ERROR,
3656 "%s: err in adding vendor_cmd and vendor_data",
3657 __func__);
3658 nlmsg_free(msg);
3659 return -1;
3660 }
3661 nla_nest_end(msg, params);
3662
3663 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3664 if (ret) {
3665 sigma_dut_print(dut, DUT_MSG_ERROR,
3666 "%s: err in send_and_recv_msgs, ret=%d",
3667 __func__, ret);
3668 }
3669 return ret;
3670}
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003671
3672
Subhani Shaik8e7a3052018-04-24 14:03:00 -07003673static int sta_set_he_ltf(struct sigma_dut *dut, const char *intf,
3674 enum qca_wlan_he_ltf_cfg ltf)
3675{
3676 struct nl_msg *msg;
3677 int ret = 0;
3678 struct nlattr *params;
3679 int ifindex;
3680
3681 ifindex = if_nametoindex(intf);
3682 if (ifindex == 0) {
3683 sigma_dut_print(dut, DUT_MSG_ERROR,
3684 "%s: Index for interface %s failed",
3685 __func__, intf);
3686 return -1;
3687 }
3688
3689 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3690 NL80211_CMD_VENDOR)) ||
3691 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3692 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3693 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3694 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3695 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3696 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_LTF,
3697 ltf)) {
3698 sigma_dut_print(dut, DUT_MSG_ERROR,
3699 "%s: err in adding vendor_cmd and vendor_data",
3700 __func__);
3701 nlmsg_free(msg);
3702 return -1;
3703 }
3704 nla_nest_end(msg, params);
3705
3706 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3707 if (ret) {
3708 sigma_dut_print(dut, DUT_MSG_ERROR,
3709 "%s: err in send_and_recv_msgs, ret=%d",
3710 __func__, ret);
3711 }
3712 return ret;
3713}
3714
3715
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003716static int nlvendor_sta_set_noack(struct sigma_dut *dut, const char *intf,
3717 int noack, enum qca_wlan_ac_type ac)
3718{
3719 struct nl_msg *msg;
3720 int ret = 0;
3721 struct nlattr *params;
3722 int ifindex;
3723
3724 ifindex = if_nametoindex(intf);
3725 if (ifindex == 0) {
3726 sigma_dut_print(dut, DUT_MSG_ERROR,
3727 "%s: Index for interface %s failed",
3728 __func__, intf);
3729 return -1;
3730 }
3731
3732 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3733 NL80211_CMD_VENDOR)) ||
3734 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3735 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3736 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3737 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3738 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3739 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_NO_ACK,
3740 noack) ||
3741 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_NO_ACK_AC,
3742 ac)) {
3743 sigma_dut_print(dut, DUT_MSG_ERROR,
3744 "%s: err in adding vendor_cmd and vendor_data",
3745 __func__);
3746 nlmsg_free(msg);
3747 return -1;
3748 }
3749 nla_nest_end(msg, params);
3750
3751 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3752 if (ret) {
3753 sigma_dut_print(dut, DUT_MSG_ERROR,
3754 "%s: err in send_and_recv_msgs, ret=%d",
3755 __func__, ret);
3756 }
3757 return ret;
3758}
3759
3760
3761static void wcn_sta_set_noack(struct sigma_dut *dut, const char *intf,
3762 const char *val)
3763{
3764 int noack, ret;
3765 char token[100];
3766 char *result;
3767 char *saveptr;
3768 enum qca_wlan_ac_type ac = QCA_WLAN_AC_BE;
3769
3770 strlcpy(token, val, sizeof(token));
3771 token[sizeof(token) - 1] = '\0';
3772 result = strtok_r(token, ":", &saveptr);
3773 while (result) {
3774 noack = strcasecmp(result, "Disable") != 0;
3775 ret = nlvendor_sta_set_noack(dut, intf, noack, ac);
3776 if (ret) {
3777 sigma_dut_print(dut, DUT_MSG_ERROR,
3778 "nlvendor_sta_set_noack failed for ac:%d, ret:%d",
3779 ac, ret);
3780 }
3781 result = strtok_r(NULL, ":", &saveptr);
3782 ac++;
3783 }
3784}
3785
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003786#endif /* NL80211_SUPPORT */
3787
3788
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003789static int cmd_sta_preset_testparameters(struct sigma_dut *dut,
3790 struct sigma_conn *conn,
3791 struct sigma_cmd *cmd)
3792{
3793 const char *intf = get_param(cmd, "Interface");
3794 const char *val;
3795
3796 val = get_param(cmd, "Program");
Jouni Malinen1f6ae642018-06-07 23:56:13 +03003797 if (val && (strcasecmp(val, "HS2-R2") == 0 ||
3798 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003799 return cmd_sta_preset_testparameters_hs2_r2(dut, conn, intf,
3800 cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003801
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07003802 if (val && strcasecmp(val, "LOC") == 0)
3803 return loc_cmd_sta_preset_testparameters(dut, conn, cmd);
3804
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003805#ifdef ANDROID_NAN
3806 if (val && strcasecmp(val, "NAN") == 0)
3807 return nan_cmd_sta_preset_testparameters(dut, conn, cmd);
3808#endif /* ANDROID_NAN */
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07003809#ifdef MIRACAST
3810 if (val && (strcasecmp(val, "WFD") == 0 ||
3811 strcasecmp(val, "DisplayR2") == 0))
3812 return miracast_preset_testparameters(dut, conn, cmd);
3813#endif /* MIRACAST */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003814
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303815 if (val && strcasecmp(val, "MBO") == 0) {
3816 val = get_param(cmd, "Cellular_Data_Cap");
3817 if (val &&
3818 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
3819 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05303820
3821 val = get_param(cmd, "Ch_Pref");
3822 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
3823 return 0;
3824
Ashwini Patilc63161e2017-04-13 16:30:23 +05303825 val = get_param(cmd, "BSS_Transition");
3826 if (val && mbo_set_bss_trans_req(dut, conn, intf, val) == 0)
3827 return 0;
3828
Ashwini Patila75de5a2017-04-13 16:35:05 +05303829 val = get_param(cmd, "Assoc_Disallow");
3830 if (val && mbo_set_assoc_disallow(dut, conn, intf, val) == 0)
3831 return 0;
3832
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303833 val = get_param(cmd, "Roaming");
3834 if (val && mbo_set_roaming(dut, conn, intf, val) == 0)
3835 return 0;
3836
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303837 return 1;
3838 }
3839
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303840 if (val && strcasecmp(val, "OCE") == 0)
3841 return cmd_sta_preset_testparameters_oce(dut, conn, intf, cmd);
3842
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003843#if 0
3844 val = get_param(cmd, "Supplicant");
3845 if (val && strcasecmp(val, "Default") != 0) {
3846 send_resp(dut, conn, SIGMA_ERROR,
3847 "ErrorCode,Only default(Vendor) supplicant "
3848 "supported");
3849 return 0;
3850 }
3851#endif
3852
3853 val = get_param(cmd, "RTS");
3854 if (val) {
3855 switch (get_driver_type()) {
3856 case DRIVER_ATHEROS:
3857 ath_sta_set_rts(dut, intf, val);
3858 break;
3859 default:
3860#if 0
3861 send_resp(dut, conn, SIGMA_ERROR,
3862 "ErrorCode,Setting RTS not supported");
3863 return 0;
3864#else
3865 sigma_dut_print(dut, DUT_MSG_DEBUG,
3866 "Setting RTS not supported");
3867 break;
3868#endif
3869 }
3870 }
3871
3872#if 0
3873 val = get_param(cmd, "FRGMNT");
3874 if (val) {
3875 /* TODO */
3876 send_resp(dut, conn, SIGMA_ERROR,
3877 "ErrorCode,Setting FRGMNT not supported");
3878 return 0;
3879 }
3880#endif
3881
3882#if 0
3883 val = get_param(cmd, "Preamble");
3884 if (val) {
3885 /* TODO: Long/Short */
3886 send_resp(dut, conn, SIGMA_ERROR,
3887 "ErrorCode,Setting Preamble not supported");
3888 return 0;
3889 }
3890#endif
3891
3892 val = get_param(cmd, "Mode");
3893 if (val) {
3894 if (strcmp(val, "11b") == 0 ||
3895 strcmp(val, "11g") == 0 ||
3896 strcmp(val, "11a") == 0 ||
3897 strcmp(val, "11n") == 0 ||
3898 strcmp(val, "11ng") == 0 ||
3899 strcmp(val, "11nl") == 0 ||
3900 strcmp(val, "11nl(nabg)") == 0 ||
3901 strcmp(val, "AC") == 0 ||
3902 strcmp(val, "11AC") == 0 ||
3903 strcmp(val, "11ac") == 0 ||
3904 strcmp(val, "11na") == 0 ||
Amarnath Hullur Subramanyamb0db2712018-01-30 19:40:35 -08003905 strcmp(val, "11an") == 0 ||
3906 strcmp(val, "11ax") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003907 /* STA supports all modes by default */
3908 } else {
3909 send_resp(dut, conn, SIGMA_ERROR,
3910 "ErrorCode,Setting Mode not supported");
3911 return 0;
3912 }
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003913
3914 /* Change the mode only in case of testbed for HE program
3915 * and for 11a and 11g modes only. */
3916 if (dut->program == PROGRAM_HE &&
3917 dut->device_type == STA_testbed) {
3918 int phymode;
3919 char buf[60];
3920
3921 if (strcmp(val, "11a") == 0) {
Amarnath Hullur Subramanyam94dfaf02018-03-02 19:26:57 -08003922 phymode = 1; /* IEEE80211_MODE_11A */
3923 } else if (strcmp(val, "11g") == 0) {
3924 phymode = 3; /* IEEE80211_MODE_11G */
3925 } else if (strcmp(val, "11b") == 0) {
3926 phymode = 2; /* IEEE80211_MODE_11B */
3927 } else if (strcmp(val, "11n") == 0 ||
3928 strcmp(val, "11nl") == 0 ||
3929 strcmp(val, "11nl(nabg)") == 0) {
3930 phymode = 22; /* IEEE80211_MODE_11AGN */
3931 } else if (strcmp(val, "11ng") == 0) {
3932 phymode = 13; /* IEEE80211_MODE_11NG_HT40 */
3933 } else if (strcmp(val, "AC") == 0 ||
3934 strcasecmp(val, "11AC") == 0) {
3935 phymode = 19; /* IEEE80211_MODE_11AC_VHT80 */
3936 } else if (strcmp(val, "11na") == 0 ||
3937 strcasecmp(val, "11an") == 0) {
3938 phymode = 14; /* IEEE80211_MODE_11NA_HT40 */
3939 } else if (strcmp(val, "11ax") == 0) {
3940 phymode = 0; /* IEEE80211_MODE_AUTO */
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003941 } else {
3942 sigma_dut_print(dut, DUT_MSG_DEBUG,
3943 "Ignoring mode change for mode: %s",
3944 val);
3945 phymode = -1;
3946 }
3947 if (phymode != -1) {
3948 snprintf(buf, sizeof(buf),
3949 "iwpriv %s setphymode %d",
3950 intf, phymode);
3951 if (system(buf) != 0) {
3952 sigma_dut_print(dut, DUT_MSG_ERROR,
3953 "iwpriv setting of phymode failed");
3954 }
3955 }
3956 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003957 }
3958
3959 val = get_param(cmd, "wmm");
3960 if (val) {
3961 switch (get_driver_type()) {
3962 case DRIVER_ATHEROS:
3963 ath_sta_set_wmm(dut, intf, val);
3964 break;
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003965 case DRIVER_WCN:
3966 wcn_sta_set_wmm(dut, intf, val);
3967 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003968 default:
3969 sigma_dut_print(dut, DUT_MSG_DEBUG,
3970 "Setting wmm not supported");
3971 break;
3972 }
3973 }
3974
3975 val = get_param(cmd, "Powersave");
3976 if (val) {
3977 if (strcmp(val, "0") == 0 || strcasecmp(val, "off") == 0) {
3978 if (wpa_command(get_station_ifname(),
3979 "P2P_SET ps 0") < 0)
3980 return -2;
3981 /* Make sure test modes are disabled */
3982 wpa_command(get_station_ifname(), "P2P_SET ps 98");
3983 wpa_command(get_station_ifname(), "P2P_SET ps 96");
3984 } else if (strcmp(val, "1") == 0 ||
3985 strcasecmp(val, "PSPoll") == 0 ||
3986 strcasecmp(val, "on") == 0) {
3987 /* Disable default power save mode */
3988 wpa_command(get_station_ifname(), "P2P_SET ps 0");
3989 /* Enable PS-Poll test mode */
3990 if (wpa_command(get_station_ifname(),
3991 "P2P_SET ps 97") < 0 ||
3992 wpa_command(get_station_ifname(),
3993 "P2P_SET ps 99") < 0)
3994 return -2;
3995 } else if (strcmp(val, "2") == 0 ||
3996 strcasecmp(val, "Fast") == 0) {
3997 /* TODO */
3998 send_resp(dut, conn, SIGMA_ERROR,
3999 "ErrorCode,Powersave=Fast not supported");
4000 return 0;
4001 } else if (strcmp(val, "3") == 0 ||
4002 strcasecmp(val, "PSNonPoll") == 0) {
4003 /* Make sure test modes are disabled */
4004 wpa_command(get_station_ifname(), "P2P_SET ps 98");
4005 wpa_command(get_station_ifname(), "P2P_SET ps 96");
4006
4007 /* Enable default power save mode */
4008 if (wpa_command(get_station_ifname(),
4009 "P2P_SET ps 1") < 0)
4010 return -2;
4011 } else
4012 return -1;
4013 }
4014
4015 val = get_param(cmd, "NoAck");
4016 if (val) {
4017 switch (get_driver_type()) {
4018 case DRIVER_ATHEROS:
4019 ath_sta_set_noack(dut, intf, val);
4020 break;
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08004021#ifdef NL80211_SUPPORT
4022 case DRIVER_WCN:
4023 wcn_sta_set_noack(dut, intf, val);
4024 break;
4025#endif /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004026 default:
4027 send_resp(dut, conn, SIGMA_ERROR,
4028 "ErrorCode,Setting NoAck not supported");
4029 return 0;
4030 }
4031 }
4032
4033 val = get_param(cmd, "IgnoreChswitchProhibit");
4034 if (val) {
4035 /* TODO: Enabled/disabled */
4036 if (strcasecmp(val, "Enabled") == 0) {
4037 send_resp(dut, conn, SIGMA_ERROR,
4038 "ErrorCode,Enabling IgnoreChswitchProhibit "
4039 "not supported");
4040 return 0;
4041 }
4042 }
4043
4044 val = get_param(cmd, "TDLS");
4045 if (val) {
4046 if (strcasecmp(val, "Disabled") == 0) {
4047 if (wpa_command(intf, "SET tdls_disabled 1")) {
4048 send_resp(dut, conn, SIGMA_ERROR,
4049 "ErrorCode,Failed to disable TDLS");
4050 return 0;
4051 }
4052 } else if (strcasecmp(val, "Enabled") == 0) {
4053 if (wpa_command(intf, "SET tdls_disabled 0")) {
4054 send_resp(dut, conn, SIGMA_ERROR,
4055 "ErrorCode,Failed to enable TDLS");
4056 return 0;
4057 }
4058 } else {
4059 send_resp(dut, conn, SIGMA_ERROR,
4060 "ErrorCode,Unsupported TDLS value");
4061 return 0;
4062 }
4063 }
4064
4065 val = get_param(cmd, "TDLSmode");
4066 if (val) {
4067 if (strcasecmp(val, "Default") == 0) {
4068 wpa_command(intf, "SET tdls_testing 0");
4069 } else if (strcasecmp(val, "APProhibit") == 0) {
4070 if (wpa_command(intf, "SET tdls_testing 0x400")) {
4071 send_resp(dut, conn, SIGMA_ERROR,
4072 "ErrorCode,Failed to enable ignore "
4073 "APProhibit TDLS mode");
4074 return 0;
4075 }
4076 } else if (strcasecmp(val, "HiLoMac") == 0) {
4077 /* STA should respond with TDLS setup req for a TDLS
4078 * setup req */
4079 if (wpa_command(intf, "SET tdls_testing 0x80")) {
4080 send_resp(dut, conn, SIGMA_ERROR,
4081 "ErrorCode,Failed to enable HiLoMac "
4082 "TDLS mode");
4083 return 0;
4084 }
4085 } else if (strcasecmp(val, "WeakSecurity") == 0) {
4086 /*
4087 * Since all security modes are enabled by default when
4088 * Sigma control is used, there is no need to do
4089 * anything here.
4090 */
4091 } else if (strcasecmp(val, "ExistLink") == 0) {
4092 /*
4093 * Since we allow new TDLS Setup Request even if there
4094 * is an existing link, nothing needs to be done for
4095 * this.
4096 */
4097 } else {
4098 /* TODO:
4099 * ExistLink: STA should send TDLS setup req even if
4100 * direct link already exists
4101 */
4102 send_resp(dut, conn, SIGMA_ERROR,
4103 "ErrorCode,Unsupported TDLSmode value");
4104 return 0;
4105 }
4106 }
4107
4108 val = get_param(cmd, "FakePubKey");
4109 if (val && atoi(val) && wpa_command(intf, "SET wps_corrupt_pkhash 1")) {
4110 send_resp(dut, conn, SIGMA_ERROR,
4111 "ErrorCode,Failed to enable FakePubKey");
4112 return 0;
4113 }
4114
Amarnath Hullur Subramanyamae1042b2018-02-22 21:52:52 -08004115#ifdef NL80211_SUPPORT
4116 val = get_param(cmd, "FrgmntSupport");
4117 if (val) {
4118 if (strcasecmp(val, "Enable") == 0) {
4119 if (sta_set_he_fragmentation(dut, intf,
4120 HE_FRAG_LEVEL1)) {
4121 send_resp(dut, conn, SIGMA_ERROR,
4122 "ErrorCode,Failed to enable HE Fragmentation");
4123 return 0;
4124 }
4125 } else if (strcasecmp(val, "Disable") == 0) {
4126 if (sta_set_he_fragmentation(dut, intf,
4127 HE_FRAG_DISABLE)) {
4128 send_resp(dut, conn, SIGMA_ERROR,
4129 "ErrorCode,Failed to disable HE Fragmentation");
4130 return 0;
4131 }
4132 }
4133 }
4134#endif /* NL80211_SUPPORT */
4135
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004136 return 1;
4137}
4138
4139
4140static const char * ath_get_radio_name(const char *radio_name)
4141{
4142 if (radio_name == NULL)
4143 return "wifi0";
4144 if (strcmp(radio_name, "wifi1") == 0)
4145 return "wifi1";
4146 if (strcmp(radio_name, "wifi2") == 0)
4147 return "wifi2";
4148 return "wifi0";
4149}
4150
4151
4152static void ath_sta_set_txsp_stream(struct sigma_dut *dut, const char *intf,
4153 const char *val)
4154{
4155 char buf[60];
4156 unsigned int vht_mcsmap = 0;
4157 int txchainmask = 0;
4158 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4159
4160 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4161 if (dut->testbed_flag_txsp == 1) {
4162 vht_mcsmap = 0xfffc;
4163 dut->testbed_flag_txsp = 0;
4164 } else {
4165 vht_mcsmap = 0xfffe;
4166 }
4167 txchainmask = 1;
4168 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4169 if (dut->testbed_flag_txsp == 1) {
4170 vht_mcsmap = 0xfff0;
4171 dut->testbed_flag_txsp = 0;
4172 } else {
4173 vht_mcsmap = 0xfffa;
4174 }
4175 txchainmask = 3;
4176 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4177 if (dut->testbed_flag_txsp == 1) {
4178 vht_mcsmap = 0xffc0;
4179 dut->testbed_flag_txsp = 0;
4180 } else {
4181 vht_mcsmap = 0xffea;
4182 }
4183 txchainmask = 7;
4184 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4185 if (dut->testbed_flag_txsp == 1) {
4186 vht_mcsmap = 0xff00;
4187 dut->testbed_flag_txsp = 0;
4188 } else {
4189 vht_mcsmap = 0xffaa;
4190 }
4191 txchainmask = 15;
4192 } else {
4193 if (dut->testbed_flag_txsp == 1) {
4194 vht_mcsmap = 0xffc0;
4195 dut->testbed_flag_txsp = 0;
4196 } else {
4197 vht_mcsmap = 0xffea;
4198 }
4199 }
4200
4201 if (txchainmask) {
4202 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
4203 basedev, txchainmask);
4204 if (system(buf) != 0) {
4205 sigma_dut_print(dut, DUT_MSG_ERROR,
4206 "iwpriv txchainmask failed");
4207 }
4208 }
4209
4210 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4211 intf, vht_mcsmap);
4212 if (system(buf) != 0) {
4213 sigma_dut_print(dut, DUT_MSG_ERROR,
4214 "iwpriv %s vht_mcsmap 0x%04x failed",
4215 intf, vht_mcsmap);
4216 }
4217}
4218
4219
4220static void ath_sta_set_rxsp_stream(struct sigma_dut *dut, const char *intf,
4221 const char *val)
4222{
4223 char buf[60];
4224 unsigned int vht_mcsmap = 0;
4225 int rxchainmask = 0;
4226 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4227
4228 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4229 if (dut->testbed_flag_rxsp == 1) {
4230 vht_mcsmap = 0xfffc;
4231 dut->testbed_flag_rxsp = 0;
4232 } else {
4233 vht_mcsmap = 0xfffe;
4234 }
4235 rxchainmask = 1;
4236 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4237 if (dut->testbed_flag_rxsp == 1) {
4238 vht_mcsmap = 0xfff0;
4239 dut->testbed_flag_rxsp = 0;
4240 } else {
4241 vht_mcsmap = 0xfffa;
4242 }
4243 rxchainmask = 3;
4244 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4245 if (dut->testbed_flag_rxsp == 1) {
4246 vht_mcsmap = 0xffc0;
4247 dut->testbed_flag_rxsp = 0;
4248 } else {
4249 vht_mcsmap = 0xffea;
4250 }
4251 rxchainmask = 7;
4252 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4253 if (dut->testbed_flag_rxsp == 1) {
4254 vht_mcsmap = 0xff00;
4255 dut->testbed_flag_rxsp = 0;
4256 } else {
4257 vht_mcsmap = 0xffaa;
4258 }
4259 rxchainmask = 15;
4260 } else {
4261 if (dut->testbed_flag_rxsp == 1) {
4262 vht_mcsmap = 0xffc0;
4263 dut->testbed_flag_rxsp = 0;
4264 } else {
4265 vht_mcsmap = 0xffea;
4266 }
4267 }
4268
4269 if (rxchainmask) {
4270 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
4271 basedev, rxchainmask);
4272 if (system(buf) != 0) {
4273 sigma_dut_print(dut, DUT_MSG_ERROR,
4274 "iwpriv rxchainmask failed");
4275 }
4276 }
4277
4278 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4279 intf, vht_mcsmap);
4280 if (system(buf) != 0) {
4281 sigma_dut_print(dut, DUT_MSG_ERROR,
4282 "iwpriv %s vht_mcsmap 0x%04x",
4283 intf, vht_mcsmap);
4284 }
4285}
4286
4287
4288void ath_set_zero_crc(struct sigma_dut *dut, const char *val)
4289{
4290 if (strcasecmp(val, "enable") == 0) {
4291 if (system("athdiag --set --address=0x2a204 --and=0xbfffffff")
4292 != 0) {
4293 sigma_dut_print(dut, DUT_MSG_ERROR,
4294 "Disable BB_VHTSIGB_CRC_CALC failed");
4295 }
4296
4297 if (system("athdiag --set --address=0x2a204 --or=0x80000000")
4298 != 0) {
4299 sigma_dut_print(dut, DUT_MSG_ERROR,
4300 "Enable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4301 }
4302 } else {
4303 if (system("athdiag --set --address=0x2a204 --and=0x7fffffff")
4304 != 0) {
4305 sigma_dut_print(dut, DUT_MSG_ERROR,
4306 "Disable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4307 }
4308
4309 if (system("athdiag --set --address=0x2a204 --or=0x40000000")
4310 != 0) {
4311 sigma_dut_print(dut, DUT_MSG_ERROR,
4312 "Enable BB_VHTSIGB_CRC_CALC failed");
4313 }
4314 }
4315}
4316
4317
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004318static int wcn_sta_set_width(struct sigma_dut *dut, const char *intf,
4319 const char *val)
4320{
4321 char buf[60];
4322
4323 if (strcmp(val, "20") == 0) {
4324 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
4325 dut->chwidth = 0;
4326 } else if (strcmp(val, "40") == 0) {
4327 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
4328 dut->chwidth = 1;
4329 } else if (strcmp(val, "80") == 0) {
4330 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
4331 dut->chwidth = 2;
Sunil Duttb1cccac2018-05-22 21:03:12 +05304332 } else if (strcasecmp(val, "Auto") == 0) {
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004333 buf[0] = '\0';
4334 } else {
4335 sigma_dut_print(dut, DUT_MSG_ERROR, "WIDTH %s not supported",
4336 val);
4337 return -1;
4338 }
4339
4340 if (buf[0] != '\0' && system(buf) != 0) {
4341 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
4342 return -1;
4343 }
4344
4345 return 0;
4346}
4347
4348
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004349static int nlvendor_sta_set_addba_reject(struct sigma_dut *dut,
4350 const char *intf, int addbareject)
4351{
4352#ifdef NL80211_SUPPORT
4353 struct nl_msg *msg;
4354 int ret = 0;
4355 struct nlattr *params;
4356 int ifindex;
4357
4358 ifindex = if_nametoindex(intf);
4359 if (ifindex == 0) {
4360 sigma_dut_print(dut, DUT_MSG_ERROR,
4361 "%s: Index for interface %s failed",
4362 __func__, intf);
4363 return -1;
4364 }
4365
4366 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4367 NL80211_CMD_VENDOR)) ||
4368 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4369 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4370 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4371 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4372 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4373 nla_put_u8(msg,
4374 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ACCEPT_ADDBA_REQ,
4375 !addbareject)) {
4376 sigma_dut_print(dut, DUT_MSG_ERROR,
4377 "%s: err in adding vendor_cmd and vendor_data",
4378 __func__);
4379 nlmsg_free(msg);
4380 return -1;
4381 }
4382 nla_nest_end(msg, params);
4383
4384 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4385 if (ret) {
4386 sigma_dut_print(dut, DUT_MSG_ERROR,
4387 "%s: err in send_and_recv_msgs, ret=%d",
4388 __func__, ret);
4389 }
4390 return ret;
4391#else /* NL80211_SUPPORT */
4392 sigma_dut_print(dut, DUT_MSG_ERROR,
4393 "ADDBA_REJECT cannot be set without NL80211_SUPPORT defined");
4394 return -1;
4395#endif /* NL80211_SUPPORT */
4396}
4397
4398
4399static int sta_set_addba_reject(struct sigma_dut *dut, const char *intf,
4400 int addbareject)
4401{
4402 int ret;
4403
4404 switch (get_driver_type()) {
4405 case DRIVER_WCN:
4406 ret = nlvendor_sta_set_addba_reject(dut, intf, addbareject);
4407 if (ret) {
4408 sigma_dut_print(dut, DUT_MSG_ERROR,
4409 "nlvendor_sta_set_addba_reject failed, ret:%d",
4410 ret);
4411 return ret;
4412 }
4413 break;
4414 default:
4415 sigma_dut_print(dut, DUT_MSG_ERROR,
4416 "errorCode,Unsupported ADDBA_REJECT with the current driver");
4417 ret = -1;
4418 break;
4419 }
4420
4421 return ret;
4422}
4423
4424
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004425static int nlvendor_config_send_addba(struct sigma_dut *dut, const char *intf,
4426 int enable)
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004427{
4428#ifdef NL80211_SUPPORT
4429 struct nl_msg *msg;
4430 int ret = 0;
4431 struct nlattr *params;
4432 int ifindex;
4433
4434 ifindex = if_nametoindex(intf);
4435 if (ifindex == 0) {
4436 sigma_dut_print(dut, DUT_MSG_ERROR,
4437 "%s: Index for interface %s failed",
4438 __func__, intf);
4439 return -1;
4440 }
4441
4442 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4443 NL80211_CMD_VENDOR)) ||
4444 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4445 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4446 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4447 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4448 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4449 nla_put_u8(msg,
4450 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_SEND_ADDBA_REQ,
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004451 enable)) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004452 sigma_dut_print(dut, DUT_MSG_ERROR,
4453 "%s: err in adding vendor_cmd and vendor_data",
4454 __func__);
4455 nlmsg_free(msg);
4456 return -1;
4457 }
4458 nla_nest_end(msg, params);
4459
4460 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4461 if (ret) {
4462 sigma_dut_print(dut, DUT_MSG_ERROR,
4463 "%s: err in send_and_recv_msgs, ret=%d",
4464 __func__, ret);
4465 }
4466 return ret;
4467#else /* NL80211_SUPPORT */
4468 sigma_dut_print(dut, DUT_MSG_ERROR,
4469 "Disable addba not possible without NL80211_SUPPORT defined");
4470 return -1;
4471#endif /* NL80211_SUPPORT */
4472}
4473
4474
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004475static int cmd_sta_set_wireless_common(const char *intf, struct sigma_dut *dut,
4476 struct sigma_conn *conn,
4477 struct sigma_cmd *cmd)
4478{
4479 const char *val;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004480 int ampdu = -1, addbareject = -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004481 char buf[30];
4482
4483 val = get_param(cmd, "40_INTOLERANT");
4484 if (val) {
4485 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4486 /* TODO: iwpriv ht40intol through wpa_supplicant */
4487 send_resp(dut, conn, SIGMA_ERROR,
4488 "ErrorCode,40_INTOLERANT not supported");
4489 return 0;
4490 }
4491 }
4492
4493 val = get_param(cmd, "ADDBA_REJECT");
4494 if (val) {
4495 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4496 /* reject any ADDBA with status "decline" */
4497 ampdu = 0;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004498 addbareject = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004499 } else {
4500 /* accept ADDBA */
4501 ampdu = 1;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004502 addbareject = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004503 }
4504 }
4505
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004506 if (addbareject >= 0 &&
4507 sta_set_addba_reject(dut, intf, addbareject) < 0) {
4508 send_resp(dut, conn, SIGMA_ERROR,
4509 "ErrorCode,set addba_reject failed");
4510 return 0;
4511 }
4512
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004513 val = get_param(cmd, "AMPDU");
4514 if (val) {
4515 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4516 /* enable AMPDU Aggregation */
4517 if (ampdu == 0) {
4518 send_resp(dut, conn, SIGMA_ERROR,
4519 "ErrorCode,Mismatch in "
4520 "addba_reject/ampdu - "
4521 "not supported");
4522 return 0;
4523 }
4524 ampdu = 1;
4525 } else {
4526 /* disable AMPDU Aggregation */
4527 if (ampdu == 1) {
4528 send_resp(dut, conn, SIGMA_ERROR,
4529 "ErrorCode,Mismatch in "
4530 "addba_reject/ampdu - "
4531 "not supported");
4532 return 0;
4533 }
4534 ampdu = 0;
4535 }
4536 }
4537
4538 if (ampdu >= 0) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004539 int ret;
4540
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004541 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s A-MPDU aggregation",
4542 ampdu ? "Enabling" : "Disabling");
4543 snprintf(buf, sizeof(buf), "SET ampdu %d", ampdu);
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07004544 if (wpa_command(intf, buf) < 0 &&
4545 iwpriv_sta_set_ampdu(dut, intf, ampdu) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004546 send_resp(dut, conn, SIGMA_ERROR,
4547 "ErrorCode,set aggr failed");
4548 return 0;
4549 }
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004550
4551 if (ampdu == 0) {
4552 /* Disable sending of addba using nl vendor command */
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004553 ret = nlvendor_config_send_addba(dut, intf, 0);
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004554 if (ret) {
4555 sigma_dut_print(dut, DUT_MSG_ERROR,
4556 "Failed to disable addba, ret:%d",
4557 ret);
4558 }
4559 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004560 }
4561
4562 val = get_param(cmd, "AMSDU");
4563 if (val) {
4564 switch (get_driver_type()) {
4565 case DRIVER_ATHEROS:
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08004566 case DRIVER_WCN:
4567 iwpriv_sta_set_amsdu(dut, intf, val);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004568 break;
4569 default:
4570 if (strcmp(val, "1") == 0 ||
4571 strcasecmp(val, "Enable") == 0) {
4572 /* Enable AMSDU Aggregation */
4573 send_resp(dut, conn, SIGMA_ERROR,
4574 "ErrorCode,AMSDU aggregation not supported");
4575 return 0;
4576 }
4577 break;
4578 }
4579 }
4580
4581 val = get_param(cmd, "STBC_RX");
4582 if (val) {
4583 switch (get_driver_type()) {
4584 case DRIVER_ATHEROS:
4585 ath_sta_set_stbc(dut, intf, val);
4586 break;
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05304587 case DRIVER_WCN:
4588 wcn_sta_set_stbc(dut, intf, val);
4589 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004590 default:
4591 send_resp(dut, conn, SIGMA_ERROR,
4592 "ErrorCode,STBC_RX not supported");
4593 return 0;
4594 }
4595 }
4596
4597 val = get_param(cmd, "WIDTH");
4598 if (val) {
4599 switch (get_driver_type()) {
4600 case DRIVER_WCN:
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004601 if (wcn_sta_set_width(dut, intf, val) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004602 send_resp(dut, conn, SIGMA_ERROR,
4603 "ErrorCode,Failed to set WIDTH");
4604 return 0;
4605 }
4606 break;
4607 case DRIVER_ATHEROS:
4608 if (ath_set_width(dut, conn, intf, val) < 0)
4609 return 0;
4610 break;
4611 default:
4612 sigma_dut_print(dut, DUT_MSG_ERROR,
4613 "Setting WIDTH not supported");
4614 break;
4615 }
4616 }
4617
4618 val = get_param(cmd, "SMPS");
4619 if (val) {
4620 /* TODO: Dynamic/0, Static/1, No Limit/2 */
4621 send_resp(dut, conn, SIGMA_ERROR,
4622 "ErrorCode,SMPS not supported");
4623 return 0;
4624 }
4625
4626 val = get_param(cmd, "TXSP_STREAM");
4627 if (val) {
4628 switch (get_driver_type()) {
4629 case DRIVER_WCN:
4630 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4631 send_resp(dut, conn, SIGMA_ERROR,
4632 "ErrorCode,Failed to set TXSP_STREAM");
4633 return 0;
4634 }
4635 break;
4636 case DRIVER_ATHEROS:
4637 ath_sta_set_txsp_stream(dut, intf, val);
4638 break;
4639 default:
4640 sigma_dut_print(dut, DUT_MSG_ERROR,
4641 "Setting TXSP_STREAM not supported");
4642 break;
4643 }
4644 }
4645
4646 val = get_param(cmd, "RXSP_STREAM");
4647 if (val) {
4648 switch (get_driver_type()) {
4649 case DRIVER_WCN:
4650 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4651 send_resp(dut, conn, SIGMA_ERROR,
4652 "ErrorCode,Failed to set RXSP_STREAM");
4653 return 0;
4654 }
4655 break;
4656 case DRIVER_ATHEROS:
4657 ath_sta_set_rxsp_stream(dut, intf, val);
4658 break;
4659 default:
4660 sigma_dut_print(dut, DUT_MSG_ERROR,
4661 "Setting RXSP_STREAM not supported");
4662 break;
4663 }
4664 }
4665
4666 val = get_param(cmd, "DYN_BW_SGNL");
4667 if (val) {
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004668 switch (get_driver_type()) {
4669 case DRIVER_WCN:
Peng Xuc59afd32016-11-21 15:01:11 -08004670 if (strcasecmp(val, "enable") == 0) {
4671 snprintf(buf, sizeof(buf),
4672 "iwpriv %s cwmenable 1", intf);
4673 if (system(buf) != 0) {
4674 sigma_dut_print(dut, DUT_MSG_ERROR,
4675 "iwpriv cwmenable 1 failed");
4676 return 0;
4677 }
4678 } else if (strcasecmp(val, "disable") == 0) {
4679 snprintf(buf, sizeof(buf),
4680 "iwpriv %s cwmenable 0", intf);
4681 if (system(buf) != 0) {
4682 sigma_dut_print(dut, DUT_MSG_ERROR,
4683 "iwpriv cwmenable 0 failed");
4684 return 0;
4685 }
4686 } else {
4687 sigma_dut_print(dut, DUT_MSG_ERROR,
4688 "Unsupported DYN_BW_SGL");
4689 }
4690
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004691 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
4692 if (system(buf) != 0) {
4693 sigma_dut_print(dut, DUT_MSG_ERROR,
4694 "Failed to set cts_cbw in DYN_BW_SGNL");
4695 return 0;
4696 }
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004697 break;
4698 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004699 novap_reset(dut, intf);
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004700 ath_config_dyn_bw_sig(dut, intf, val);
4701 break;
4702 default:
4703 sigma_dut_print(dut, DUT_MSG_ERROR,
4704 "Failed to set DYN_BW_SGNL");
4705 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004706 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004707 }
4708
4709 val = get_param(cmd, "RTS_FORCE");
4710 if (val) {
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004711 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004712 if (strcasecmp(val, "Enable") == 0) {
4713 snprintf(buf, sizeof(buf), "iwconfig %s rts 64", intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004714 if (system(buf) != 0) {
4715 sigma_dut_print(dut, DUT_MSG_ERROR,
4716 "Failed to set RTS_FORCE 64");
4717 }
priyadharshini gowthaman270870e2015-12-09 10:10:23 -08004718 snprintf(buf, sizeof(buf),
4719 "wifitool %s beeliner_fw_test 100 1", intf);
4720 if (system(buf) != 0) {
4721 sigma_dut_print(dut, DUT_MSG_ERROR,
4722 "wifitool beeliner_fw_test 100 1 failed");
4723 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004724 } else if (strcasecmp(val, "Disable") == 0) {
4725 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347",
4726 intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004727 if (system(buf) != 0) {
4728 sigma_dut_print(dut, DUT_MSG_ERROR,
4729 "Failed to set RTS_FORCE 2347");
4730 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004731 } else {
4732 send_resp(dut, conn, SIGMA_ERROR,
4733 "ErrorCode,RTS_FORCE value not supported");
4734 return 0;
4735 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004736 }
4737
4738 val = get_param(cmd, "CTS_WIDTH");
4739 if (val) {
4740 switch (get_driver_type()) {
4741 case DRIVER_WCN:
4742 if (wcn_sta_set_cts_width(dut, intf, val) < 0) {
4743 send_resp(dut, conn, SIGMA_ERROR,
4744 "ErrorCode,Failed to set CTS_WIDTH");
4745 return 0;
4746 }
4747 break;
4748 case DRIVER_ATHEROS:
4749 ath_set_cts_width(dut, intf, val);
4750 break;
4751 default:
4752 sigma_dut_print(dut, DUT_MSG_ERROR,
4753 "Setting CTS_WIDTH not supported");
4754 break;
4755 }
4756 }
4757
4758 val = get_param(cmd, "BW_SGNL");
4759 if (val) {
4760 if (strcasecmp(val, "Enable") == 0) {
4761 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1",
4762 intf);
4763 } else if (strcasecmp(val, "Disable") == 0) {
4764 /* TODO: Disable */
4765 buf[0] = '\0';
4766 } else {
4767 send_resp(dut, conn, SIGMA_ERROR,
4768 "ErrorCode,BW_SGNL value not supported");
4769 return 0;
4770 }
4771
4772 if (buf[0] != '\0' && system(buf) != 0) {
4773 sigma_dut_print(dut, DUT_MSG_ERROR,
4774 "Failed to set BW_SGNL");
4775 }
4776 }
4777
4778 val = get_param(cmd, "Band");
4779 if (val) {
4780 if (strcmp(val, "2.4") == 0 || strcmp(val, "5") == 0) {
4781 /* STA supports all bands by default */
4782 } else {
4783 send_resp(dut, conn, SIGMA_ERROR,
4784 "ErrorCode,Unsupported Band");
4785 return 0;
4786 }
4787 }
4788
4789 val = get_param(cmd, "zero_crc");
4790 if (val) {
4791 switch (get_driver_type()) {
4792 case DRIVER_ATHEROS:
4793 ath_set_zero_crc(dut, val);
4794 break;
4795 default:
4796 break;
4797 }
4798 }
4799
4800 return 1;
4801}
4802
4803
4804static int sta_set_60g_common(struct sigma_dut *dut, struct sigma_conn *conn,
4805 struct sigma_cmd *cmd)
4806{
4807 const char *val;
4808 char buf[100];
4809
4810 val = get_param(cmd, "MSDUSize");
4811 if (val) {
4812 int mtu;
4813
4814 dut->amsdu_size = atoi(val);
4815 if (dut->amsdu_size > IEEE80211_MAX_DATA_LEN_DMG ||
4816 dut->amsdu_size < IEEE80211_SNAP_LEN_DMG) {
4817 sigma_dut_print(dut, DUT_MSG_ERROR,
4818 "MSDUSize %d is above max %d or below min %d",
4819 dut->amsdu_size,
4820 IEEE80211_MAX_DATA_LEN_DMG,
4821 IEEE80211_SNAP_LEN_DMG);
4822 dut->amsdu_size = 0;
4823 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4824 }
4825
4826 mtu = dut->amsdu_size - IEEE80211_SNAP_LEN_DMG;
4827 sigma_dut_print(dut, DUT_MSG_DEBUG,
4828 "Setting amsdu_size to %d", mtu);
4829 snprintf(buf, sizeof(buf), "ifconfig %s mtu %d",
4830 get_station_ifname(), mtu);
4831
4832 if (system(buf) != 0) {
4833 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set %s",
4834 buf);
4835 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4836 }
4837 }
4838
4839 val = get_param(cmd, "BAckRcvBuf");
4840 if (val) {
4841 dut->back_rcv_buf = atoi(val);
4842 if (dut->back_rcv_buf == 0) {
4843 sigma_dut_print(dut, DUT_MSG_ERROR,
4844 "Failed to convert %s or value is 0",
4845 val);
4846 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4847 }
4848
4849 sigma_dut_print(dut, DUT_MSG_DEBUG,
4850 "Setting BAckRcvBuf to %s", val);
4851 }
4852
4853 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4854}
4855
4856
4857static int sta_pcp_start(struct sigma_dut *dut, struct sigma_conn *conn,
4858 struct sigma_cmd *cmd)
4859{
4860 int net_id;
4861 char *ifname;
4862 const char *val;
4863 char buf[100];
4864
4865 dut->mode = SIGMA_MODE_STATION;
4866 ifname = get_main_ifname();
4867 if (wpa_command(ifname, "PING") != 0) {
4868 sigma_dut_print(dut, DUT_MSG_ERROR, "Supplicant not running");
4869 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4870 }
4871
4872 wpa_command(ifname, "FLUSH");
4873 net_id = add_network_common(dut, conn, ifname, cmd);
4874 if (net_id < 0) {
4875 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add network");
4876 return net_id;
4877 }
4878
4879 /* TODO: mode=2 for the AP; in the future, replace for mode PCP */
4880 if (set_network(ifname, net_id, "mode", "2") < 0) {
4881 sigma_dut_print(dut, DUT_MSG_ERROR,
4882 "Failed to set supplicant network mode");
4883 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4884 }
4885
4886 sigma_dut_print(dut, DUT_MSG_DEBUG,
4887 "Supplicant set network with mode 2");
4888
4889 val = get_param(cmd, "Security");
4890 if (val && strcasecmp(val, "OPEN") == 0) {
4891 dut->ap_key_mgmt = AP_OPEN;
4892 if (set_network(ifname, net_id, "key_mgmt", "NONE") < 0) {
4893 sigma_dut_print(dut, DUT_MSG_ERROR,
4894 "Failed to set supplicant to %s security",
4895 val);
4896 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4897 }
4898 } else if (val && strcasecmp(val, "WPA2-PSK") == 0) {
4899 dut->ap_key_mgmt = AP_WPA2_PSK;
4900 if (set_network(ifname, net_id, "key_mgmt", "WPA-PSK") < 0) {
4901 sigma_dut_print(dut, DUT_MSG_ERROR,
4902 "Failed to set supplicant to %s security",
4903 val);
4904 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4905 }
4906
4907 if (set_network(ifname, net_id, "proto", "RSN") < 0) {
4908 sigma_dut_print(dut, DUT_MSG_ERROR,
4909 "Failed to set supplicant to proto RSN");
4910 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4911 }
4912 } else if (val) {
4913 sigma_dut_print(dut, DUT_MSG_ERROR,
4914 "Requested Security %s is not supported on 60GHz",
4915 val);
4916 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4917 }
4918
4919 val = get_param(cmd, "Encrypt");
4920 if (val && strcasecmp(val, "AES-GCMP") == 0) {
4921 if (set_network(ifname, net_id, "pairwise", "GCMP") < 0) {
4922 sigma_dut_print(dut, DUT_MSG_ERROR,
4923 "Failed to set supplicant to pairwise GCMP");
4924 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4925 }
4926 if (set_network(ifname, net_id, "group", "GCMP") < 0) {
4927 sigma_dut_print(dut, DUT_MSG_ERROR,
4928 "Failed to set supplicant to group GCMP");
4929 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4930 }
4931 } else if (val) {
4932 sigma_dut_print(dut, DUT_MSG_ERROR,
4933 "Requested Encrypt %s is not supported on 60 GHz",
4934 val);
4935 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4936 }
4937
4938 val = get_param(cmd, "PSK");
4939 if (val && set_network_quoted(ifname, net_id, "psk", val) < 0) {
4940 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set psk %s",
4941 val);
4942 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4943 }
4944
4945 /* Convert 60G channel to freq */
4946 switch (dut->ap_channel) {
4947 case 1:
4948 val = "58320";
4949 break;
4950 case 2:
4951 val = "60480";
4952 break;
4953 case 3:
4954 val = "62640";
4955 break;
4956 default:
4957 sigma_dut_print(dut, DUT_MSG_ERROR,
4958 "Failed to configure channel %d. Not supported",
4959 dut->ap_channel);
4960 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4961 }
4962
4963 if (set_network(ifname, net_id, "frequency", val) < 0) {
4964 sigma_dut_print(dut, DUT_MSG_ERROR,
4965 "Failed to set supplicant network frequency");
4966 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4967 }
4968
4969 sigma_dut_print(dut, DUT_MSG_DEBUG,
4970 "Supplicant set network with frequency");
4971
4972 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d", net_id);
4973 if (wpa_command(ifname, buf) < 0) {
4974 sigma_dut_print(dut, DUT_MSG_INFO,
4975 "Failed to select network id %d on %s",
4976 net_id, ifname);
4977 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4978 }
4979
4980 sigma_dut_print(dut, DUT_MSG_DEBUG, "Selected network");
4981
4982 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4983}
4984
4985
Lior David67543f52017-01-03 19:04:22 +02004986static int wil6210_set_abft_len(struct sigma_dut *dut, int abft_len)
4987{
4988 char buf[128], fname[128];
4989 FILE *f;
4990
4991 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
4992 sigma_dut_print(dut, DUT_MSG_ERROR,
4993 "failed to get wil6210 debugfs dir");
4994 return -1;
4995 }
4996
4997 snprintf(fname, sizeof(fname), "%s/abft_len", buf);
4998 f = fopen(fname, "w");
4999 if (!f) {
5000 sigma_dut_print(dut, DUT_MSG_ERROR,
5001 "failed to open: %s", fname);
5002 return -1;
5003 }
5004
5005 fprintf(f, "%d\n", abft_len);
5006 fclose(f);
5007
5008 return 0;
5009}
5010
5011
5012static int sta_set_60g_abft_len(struct sigma_dut *dut, struct sigma_conn *conn,
5013 int abft_len)
5014{
5015 switch (get_driver_type()) {
5016 case DRIVER_WIL6210:
5017 return wil6210_set_abft_len(dut, abft_len);
5018 default:
5019 sigma_dut_print(dut, DUT_MSG_ERROR,
5020 "set abft_len not supported");
5021 return -1;
5022 }
5023}
5024
5025
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005026static int sta_set_60g_pcp(struct sigma_dut *dut, struct sigma_conn *conn,
5027 struct sigma_cmd *cmd)
5028{
5029 const char *val;
Lior David67543f52017-01-03 19:04:22 +02005030 unsigned int abft_len = 1; /* default is one slot */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005031
5032 if (dut->dev_role != DEVROLE_PCP) {
5033 send_resp(dut, conn, SIGMA_INVALID,
5034 "ErrorCode,Invalid DevRole");
5035 return 0;
5036 }
5037
5038 val = get_param(cmd, "SSID");
5039 if (val) {
5040 if (strlen(val) > sizeof(dut->ap_ssid) - 1) {
5041 send_resp(dut, conn, SIGMA_INVALID,
5042 "ErrorCode,Invalid SSID");
5043 return -1;
5044 }
5045
Peng Xub8fc5cc2017-05-10 17:27:28 -07005046 strlcpy(dut->ap_ssid, val, sizeof(dut->ap_ssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005047 }
5048
5049 val = get_param(cmd, "CHANNEL");
5050 if (val) {
5051 const char *pos;
5052
5053 dut->ap_channel = atoi(val);
5054 pos = strchr(val, ';');
5055 if (pos) {
5056 pos++;
5057 dut->ap_channel_1 = atoi(pos);
5058 }
5059 }
5060
5061 switch (dut->ap_channel) {
5062 case 1:
5063 case 2:
5064 case 3:
5065 break;
5066 default:
5067 sigma_dut_print(dut, DUT_MSG_ERROR,
5068 "Channel %d is not supported", dut->ap_channel);
5069 send_resp(dut, conn, SIGMA_ERROR,
5070 "Requested channel is not supported");
5071 return -1;
5072 }
5073
5074 val = get_param(cmd, "BCNINT");
5075 if (val)
5076 dut->ap_bcnint = atoi(val);
5077
5078
5079 val = get_param(cmd, "ExtSchIE");
5080 if (val) {
5081 send_resp(dut, conn, SIGMA_ERROR,
5082 "ErrorCode,ExtSchIE is not supported yet");
5083 return -1;
5084 }
5085
5086 val = get_param(cmd, "AllocType");
5087 if (val) {
5088 send_resp(dut, conn, SIGMA_ERROR,
5089 "ErrorCode,AllocType is not supported yet");
5090 return -1;
5091 }
5092
5093 val = get_param(cmd, "PercentBI");
5094 if (val) {
5095 send_resp(dut, conn, SIGMA_ERROR,
5096 "ErrorCode,PercentBI is not supported yet");
5097 return -1;
5098 }
5099
5100 val = get_param(cmd, "CBAPOnly");
5101 if (val) {
5102 send_resp(dut, conn, SIGMA_ERROR,
5103 "ErrorCode,CBAPOnly is not supported yet");
5104 return -1;
5105 }
5106
5107 val = get_param(cmd, "AMPDU");
5108 if (val) {
5109 if (strcasecmp(val, "Enable") == 0)
5110 dut->ap_ampdu = 1;
5111 else if (strcasecmp(val, "Disable") == 0)
5112 dut->ap_ampdu = 2;
5113 else {
5114 send_resp(dut, conn, SIGMA_ERROR,
5115 "ErrorCode,AMPDU value is not Enable nor Disabled");
5116 return -1;
5117 }
5118 }
5119
5120 val = get_param(cmd, "AMSDU");
5121 if (val) {
5122 if (strcasecmp(val, "Enable") == 0)
5123 dut->ap_amsdu = 1;
5124 else if (strcasecmp(val, "Disable") == 0)
5125 dut->ap_amsdu = 2;
5126 }
5127
5128 val = get_param(cmd, "NumMSDU");
5129 if (val) {
5130 send_resp(dut, conn, SIGMA_ERROR,
5131 "ErrorCode, NumMSDU is not supported yet");
5132 return -1;
5133 }
5134
5135 val = get_param(cmd, "ABFTLRang");
5136 if (val) {
5137 sigma_dut_print(dut, DUT_MSG_DEBUG,
Lior David67543f52017-01-03 19:04:22 +02005138 "ABFTLRang parameter %s", val);
5139 if (strcmp(val, "Gt1") == 0)
5140 abft_len = 2; /* 2 slots in this case */
5141 }
5142
5143 if (sta_set_60g_abft_len(dut, conn, abft_len)) {
5144 send_resp(dut, conn, SIGMA_ERROR,
5145 "ErrorCode, Can't set ABFT length");
5146 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005147 }
5148
5149 if (sta_pcp_start(dut, conn, cmd) < 0) {
5150 send_resp(dut, conn, SIGMA_ERROR,
5151 "ErrorCode, Can't start PCP role");
5152 return -1;
5153 }
5154
5155 return sta_set_60g_common(dut, conn, cmd);
5156}
5157
5158
5159static int sta_set_60g_sta(struct sigma_dut *dut, struct sigma_conn *conn,
5160 struct sigma_cmd *cmd)
5161{
5162 const char *val = get_param(cmd, "DiscoveryMode");
5163
5164 if (dut->dev_role != DEVROLE_STA) {
5165 send_resp(dut, conn, SIGMA_INVALID,
5166 "ErrorCode,Invalid DevRole");
5167 return 0;
5168 }
5169
5170 if (val) {
5171 sigma_dut_print(dut, DUT_MSG_DEBUG, "Discovery: %s", val);
5172 /* Ignore Discovery mode till Driver expose API. */
5173#if 0
5174 if (strcasecmp(val, "1") == 0) {
5175 send_resp(dut, conn, SIGMA_INVALID,
5176 "ErrorCode,DiscoveryMode 1 not supported");
5177 return 0;
5178 }
5179
5180 if (strcasecmp(val, "0") == 0) {
5181 /* OK */
5182 } else {
5183 send_resp(dut, conn, SIGMA_INVALID,
5184 "ErrorCode,DiscoveryMode not supported");
5185 return 0;
5186 }
5187#endif
5188 }
5189
5190 if (start_sta_mode(dut) != 0)
5191 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
5192 return sta_set_60g_common(dut, conn, cmd);
5193}
5194
5195
5196static int cmd_sta_disconnect(struct sigma_dut *dut, struct sigma_conn *conn,
5197 struct sigma_cmd *cmd)
5198{
5199 const char *intf = get_param(cmd, "Interface");
Jouni Malinened77e672018-01-10 16:45:13 +02005200 const char *val = get_param(cmd, "maintain_profile");
vamsi krishnad605c422017-09-20 14:56:31 +05305201
Jouni Malinened77e672018-01-10 16:45:13 +02005202 if (dut->program == PROGRAM_OCE ||
Amarnath Hullur Subramanyamebeda9e2018-01-31 03:21:48 -08005203 dut->program == PROGRAM_HE ||
Jouni Malinened77e672018-01-10 16:45:13 +02005204 (val && atoi(val) == 1)) {
vamsi krishnad605c422017-09-20 14:56:31 +05305205 wpa_command(intf, "DISCONNECT");
5206 return 1;
5207 }
5208
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005209 disconnect_station(dut);
5210 /* Try to ignore old scan results to avoid HS 2.0R2 test case failures
5211 * due to cached results. */
5212 wpa_command(intf, "SET ignore_old_scan_res 1");
5213 wpa_command(intf, "BSS_FLUSH");
5214 return 1;
5215}
5216
5217
5218static int cmd_sta_reassoc(struct sigma_dut *dut, struct sigma_conn *conn,
5219 struct sigma_cmd *cmd)
5220{
5221 const char *intf = get_param(cmd, "Interface");
5222 const char *bssid = get_param(cmd, "bssid");
5223 const char *val = get_param(cmd, "CHANNEL");
5224 struct wpa_ctrl *ctrl;
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305225 char buf[1000];
Sunil Duttd30ce092018-01-11 23:56:29 +05305226 char result[32];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005227 int res;
5228 int chan = 0;
Ashwini Patil467efef2017-05-25 12:18:27 +05305229 int status = 0;
Sunil Duttd30ce092018-01-11 23:56:29 +05305230 int fastreassoc = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005231
5232 if (bssid == NULL) {
5233 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing bssid "
5234 "argument");
5235 return 0;
5236 }
5237
5238 if (val)
5239 chan = atoi(val);
5240
5241 if (wifi_chip_type != DRIVER_WCN && wifi_chip_type != DRIVER_AR6003) {
5242 /* The current network may be from sta_associate or
5243 * sta_hs2_associate
5244 */
5245 if (set_network(intf, dut->infra_network_id, "bssid", bssid) <
5246 0 ||
5247 set_network(intf, 0, "bssid", bssid) < 0)
5248 return -2;
5249 }
5250
5251 ctrl = open_wpa_mon(intf);
5252 if (ctrl == NULL) {
5253 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
5254 "wpa_supplicant monitor connection");
5255 return -1;
5256 }
5257
Sunil Duttd30ce092018-01-11 23:56:29 +05305258 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
5259 sizeof(result)) < 0 ||
5260 strncmp(result, "COMPLETED", 9) != 0) {
5261 sigma_dut_print(dut, DUT_MSG_DEBUG,
5262 "sta_reassoc: Not connected");
5263 fastreassoc = 0;
5264 }
5265
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305266 if (dut->rsne_override) {
5267#ifdef NL80211_SUPPORT
5268 if (get_driver_type() == DRIVER_WCN && dut->config_rsnie == 0) {
5269 sta_config_rsnie(dut, 1);
5270 dut->config_rsnie = 1;
5271 }
5272#endif /* NL80211_SUPPORT */
5273 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
5274 dut->rsne_override);
5275 if (wpa_command(intf, buf) < 0) {
5276 send_resp(dut, conn, SIGMA_ERROR,
5277 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
5278 return 0;
5279 }
5280 }
5281
Sunil Duttd30ce092018-01-11 23:56:29 +05305282 if (wifi_chip_type == DRIVER_WCN && fastreassoc) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005283#ifdef ANDROID
Ashwini Patil4c8158f2017-05-25 12:49:21 +05305284 if (chan) {
5285 unsigned int freq;
5286
5287 freq = channel_to_freq(chan);
5288 if (!freq) {
5289 sigma_dut_print(dut, DUT_MSG_ERROR,
5290 "Invalid channel number provided: %d",
5291 chan);
5292 send_resp(dut, conn, SIGMA_INVALID,
5293 "ErrorCode,Invalid channel number");
5294 goto close_mon_conn;
5295 }
5296 res = snprintf(buf, sizeof(buf),
5297 "SCAN TYPE=ONLY freq=%d", freq);
5298 } else {
5299 res = snprintf(buf, sizeof(buf), "SCAN TYPE=ONLY");
5300 }
5301 if (res < 0 || res >= (int) sizeof(buf)) {
5302 send_resp(dut, conn, SIGMA_ERROR,
5303 "ErrorCode,snprintf failed");
5304 goto close_mon_conn;
5305 }
5306 if (wpa_command(intf, buf) < 0) {
5307 sigma_dut_print(dut, DUT_MSG_INFO,
5308 "Failed to start scan");
5309 send_resp(dut, conn, SIGMA_ERROR,
5310 "ErrorCode,scan failed");
5311 goto close_mon_conn;
5312 }
5313
5314 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
5315 buf, sizeof(buf));
5316 if (res < 0) {
5317 sigma_dut_print(dut, DUT_MSG_INFO,
5318 "Scan did not complete");
5319 send_resp(dut, conn, SIGMA_ERROR,
5320 "ErrorCode,scan did not complete");
5321 goto close_mon_conn;
5322 }
5323
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005324 if (set_network(intf, dut->infra_network_id, "bssid", "any")
5325 < 0) {
5326 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
5327 "bssid to any during FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305328 status = -2;
5329 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005330 }
5331 res = snprintf(buf, sizeof(buf), "DRIVER FASTREASSOC %s %d",
5332 bssid, chan);
5333 if (res > 0 && res < (int) sizeof(buf))
5334 res = wpa_command(intf, buf);
5335
5336 if (res < 0 || res >= (int) sizeof(buf)) {
5337 send_resp(dut, conn, SIGMA_ERROR,
5338 "errorCode,Failed to run DRIVER FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305339 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005340 }
5341#else /* ANDROID */
5342 sigma_dut_print(dut, DUT_MSG_DEBUG,
5343 "Reassoc using iwpriv - skip chan=%d info",
5344 chan);
5345 snprintf(buf, sizeof(buf), "iwpriv %s reassoc", intf);
5346 if (system(buf) != 0) {
5347 sigma_dut_print(dut, DUT_MSG_ERROR, "%s failed", buf);
Ashwini Patil467efef2017-05-25 12:18:27 +05305348 status = -2;
5349 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005350 }
5351#endif /* ANDROID */
5352 sigma_dut_print(dut, DUT_MSG_INFO,
5353 "sta_reassoc: Run %s successful", buf);
5354 } else if (wpa_command(intf, "REASSOCIATE")) {
5355 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
5356 "request reassociation");
Ashwini Patil467efef2017-05-25 12:18:27 +05305357 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005358 }
5359
5360 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
5361 buf, sizeof(buf));
Ashwini Patil467efef2017-05-25 12:18:27 +05305362 if (res < 0) {
5363 sigma_dut_print(dut, DUT_MSG_INFO, "Connection did not complete");
5364 status = -1;
5365 goto close_mon_conn;
5366 }
5367 status = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005368
Ashwini Patil467efef2017-05-25 12:18:27 +05305369close_mon_conn:
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005370 wpa_ctrl_detach(ctrl);
5371 wpa_ctrl_close(ctrl);
Ashwini Patil467efef2017-05-25 12:18:27 +05305372 return status;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005373}
5374
5375
5376static void hs2_clear_credentials(const char *intf)
5377{
5378 wpa_command(intf, "REMOVE_CRED all");
5379}
5380
5381
Lior Davidcc88b562017-01-03 18:52:09 +02005382#ifdef __linux__
5383static int wil6210_get_aid(struct sigma_dut *dut, const char *bssid,
5384 unsigned int *aid)
5385{
Lior David0fe101e2017-03-09 16:09:50 +02005386 const char *pattern = "AID[ \t]+([0-9]+)";
Lior Davidcc88b562017-01-03 18:52:09 +02005387
Lior David0fe101e2017-03-09 16:09:50 +02005388 return wil6210_get_sta_info_field(dut, bssid, pattern, aid);
Lior Davidcc88b562017-01-03 18:52:09 +02005389}
5390#endif /* __linux__ */
5391
5392
5393static int sta_get_aid_60g(struct sigma_dut *dut, const char *bssid,
5394 unsigned int *aid)
5395{
5396 switch (get_driver_type()) {
5397#ifdef __linux__
5398 case DRIVER_WIL6210:
5399 return wil6210_get_aid(dut, bssid, aid);
5400#endif /* __linux__ */
5401 default:
5402 sigma_dut_print(dut, DUT_MSG_ERROR, "get AID not supported");
5403 return -1;
5404 }
5405}
5406
5407
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005408static int sta_get_parameter_60g(struct sigma_dut *dut, struct sigma_conn *conn,
5409 struct sigma_cmd *cmd)
5410{
5411 char buf[MAX_CMD_LEN];
5412 char bss_list[MAX_CMD_LEN];
5413 const char *parameter = get_param(cmd, "Parameter");
5414
5415 if (parameter == NULL)
5416 return -1;
5417
Lior Davidcc88b562017-01-03 18:52:09 +02005418 if (strcasecmp(parameter, "AID") == 0) {
5419 unsigned int aid = 0;
5420 char bssid[20];
5421
5422 if (get_wpa_status(get_station_ifname(), "bssid",
5423 bssid, sizeof(bssid)) < 0) {
5424 sigma_dut_print(dut, DUT_MSG_ERROR,
5425 "could not get bssid");
5426 return -2;
5427 }
5428
5429 if (sta_get_aid_60g(dut, bssid, &aid))
5430 return -2;
5431
5432 snprintf(buf, sizeof(buf), "aid,%d", aid);
5433 sigma_dut_print(dut, DUT_MSG_INFO, "%s", buf);
5434 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5435 return 0;
5436 }
5437
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005438 if (strcasecmp(parameter, "DiscoveredDevList") == 0) {
5439 char *bss_line;
5440 char *bss_id = NULL;
5441 const char *ifname = get_param(cmd, "Interface");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305442 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005443
5444 if (ifname == NULL) {
5445 sigma_dut_print(dut, DUT_MSG_INFO,
5446 "For get DiscoveredDevList need Interface name.");
5447 return -1;
5448 }
5449
5450 /*
5451 * Use "BSS RANGE=ALL MASK=0x2" which provides a list
5452 * of BSSIDs in "bssid=<BSSID>\n"
5453 */
5454 if (wpa_command_resp(ifname, "BSS RANGE=ALL MASK=0x2",
5455 bss_list,
5456 sizeof(bss_list)) < 0) {
5457 sigma_dut_print(dut, DUT_MSG_ERROR,
5458 "Failed to get bss list");
5459 return -1;
5460 }
5461
5462 sigma_dut_print(dut, DUT_MSG_DEBUG,
5463 "bss list for ifname:%s is:%s",
5464 ifname, bss_list);
5465
5466 snprintf(buf, sizeof(buf), "DeviceList");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305467 bss_line = strtok_r(bss_list, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005468 while (bss_line) {
5469 if (sscanf(bss_line, "bssid=%ms", &bss_id) > 0 &&
5470 bss_id) {
5471 int len;
5472
5473 len = snprintf(buf + strlen(buf),
5474 sizeof(buf) - strlen(buf),
5475 ",%s", bss_id);
5476 free(bss_id);
5477 bss_id = NULL;
5478 if (len < 0) {
5479 sigma_dut_print(dut,
5480 DUT_MSG_ERROR,
5481 "Failed to read BSSID");
5482 send_resp(dut, conn, SIGMA_ERROR,
5483 "ErrorCode,Failed to read BSS ID");
5484 return 0;
5485 }
5486
5487 if ((size_t) len >= sizeof(buf) - strlen(buf)) {
5488 sigma_dut_print(dut,
5489 DUT_MSG_ERROR,
5490 "Response buf too small for list");
5491 send_resp(dut, conn,
5492 SIGMA_ERROR,
5493 "ErrorCode,Response buf too small for list");
5494 return 0;
5495 }
5496 }
5497
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305498 bss_line = strtok_r(NULL, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005499 }
5500
5501 sigma_dut_print(dut, DUT_MSG_INFO, "DiscoveredDevList is %s",
5502 buf);
5503 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5504 return 0;
5505 }
5506
5507 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5508 return 0;
5509}
5510
5511
5512static int cmd_sta_get_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
5513 struct sigma_cmd *cmd)
5514{
5515 const char *program = get_param(cmd, "Program");
5516
5517 if (program == NULL)
5518 return -1;
5519
5520 if (strcasecmp(program, "P2PNFC") == 0)
5521 return p2p_cmd_sta_get_parameter(dut, conn, cmd);
5522
5523 if (strcasecmp(program, "60ghz") == 0)
5524 return sta_get_parameter_60g(dut, conn, cmd);
5525
5526#ifdef ANDROID_NAN
5527 if (strcasecmp(program, "NAN") == 0)
Amarnath Hullur Subramanyam1854ec62016-08-11 19:29:35 -07005528 return nan_cmd_sta_get_parameter(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005529#endif /* ANDROID_NAN */
5530
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07005531#ifdef MIRACAST
5532 if (strcasecmp(program, "WFD") == 0 ||
5533 strcasecmp(program, "DisplayR2") == 0)
5534 return miracast_cmd_sta_get_parameter(dut, conn, cmd);
5535#endif /* MIRACAST */
5536
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005537 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5538 return 0;
5539}
5540
5541
5542static void sta_reset_default_ath(struct sigma_dut *dut, const char *intf,
5543 const char *type)
5544{
5545 char buf[100];
5546
5547 if (dut->program == PROGRAM_VHT) {
5548 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
5549 if (system(buf) != 0) {
5550 sigma_dut_print(dut, DUT_MSG_ERROR,
5551 "iwpriv %s chwidth failed", intf);
5552 }
5553
5554 snprintf(buf, sizeof(buf), "iwpriv %s mode 11ACVHT80", intf);
5555 if (system(buf) != 0) {
5556 sigma_dut_print(dut, DUT_MSG_ERROR,
5557 "iwpriv %s mode 11ACVHT80 failed",
5558 intf);
5559 }
5560
5561 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs -1", intf);
5562 if (system(buf) != 0) {
5563 sigma_dut_print(dut, DUT_MSG_ERROR,
5564 "iwpriv %s vhtmcs -1 failed", intf);
5565 }
5566 }
5567
5568 if (dut->program == PROGRAM_HT) {
5569 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
5570 if (system(buf) != 0) {
5571 sigma_dut_print(dut, DUT_MSG_ERROR,
5572 "iwpriv %s chwidth failed", intf);
5573 }
5574
5575 snprintf(buf, sizeof(buf), "iwpriv %s mode 11naht40", intf);
5576 if (system(buf) != 0) {
5577 sigma_dut_print(dut, DUT_MSG_ERROR,
5578 "iwpriv %s mode 11naht40 failed",
5579 intf);
5580 }
5581
5582 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0", intf);
5583 if (system(buf) != 0) {
5584 sigma_dut_print(dut, DUT_MSG_ERROR,
5585 "iwpriv set11NRates failed");
5586 }
5587 }
5588
5589 if (dut->program == PROGRAM_VHT || dut->program == PROGRAM_HT) {
5590 snprintf(buf, sizeof(buf), "iwpriv %s powersave 0", intf);
5591 if (system(buf) != 0) {
5592 sigma_dut_print(dut, DUT_MSG_ERROR,
5593 "disabling powersave failed");
5594 }
5595
5596 /* Reset CTS width */
5597 snprintf(buf, sizeof(buf), "wifitool %s beeliner_fw_test 54 0",
5598 intf);
5599 if (system(buf) != 0) {
5600 sigma_dut_print(dut, DUT_MSG_ERROR,
5601 "wifitool %s beeliner_fw_test 54 0 failed",
5602 intf);
5603 }
5604
5605 /* Enable Dynamic Bandwidth signalling by default */
5606 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1", intf);
5607 if (system(buf) != 0) {
5608 sigma_dut_print(dut, DUT_MSG_ERROR,
5609 "iwpriv %s cwmenable 1 failed", intf);
5610 }
5611
5612 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347", intf);
5613 if (system(buf) != 0) {
5614 sigma_dut_print(dut, DUT_MSG_ERROR,
5615 "iwpriv rts failed");
5616 }
5617 }
5618
5619 if (type && strcasecmp(type, "Testbed") == 0) {
5620 dut->testbed_flag_txsp = 1;
5621 dut->testbed_flag_rxsp = 1;
5622 /* STA has to set spatial stream to 2 per Appendix H */
5623 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0xfff0", intf);
5624 if (system(buf) != 0) {
5625 sigma_dut_print(dut, DUT_MSG_ERROR,
5626 "iwpriv vht_mcsmap failed");
5627 }
5628
5629 /* Disable LDPC per Appendix H */
5630 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 0", intf);
5631 if (system(buf) != 0) {
5632 sigma_dut_print(dut, DUT_MSG_ERROR,
5633 "iwpriv %s ldpc 0 failed", intf);
5634 }
5635
5636 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
5637 if (system(buf) != 0) {
5638 sigma_dut_print(dut, DUT_MSG_ERROR,
5639 "iwpriv amsdu failed");
5640 }
5641
5642 /* TODO: Disable STBC 2x1 transmit and receive */
5643 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc 0", intf);
5644 if (system(buf) != 0) {
5645 sigma_dut_print(dut, DUT_MSG_ERROR,
5646 "Disable tx_stbc 0 failed");
5647 }
5648
5649 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc 0", intf);
5650 if (system(buf) != 0) {
5651 sigma_dut_print(dut, DUT_MSG_ERROR,
5652 "Disable rx_stbc 0 failed");
5653 }
5654
5655 /* STA has to disable Short GI per Appendix H */
5656 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 0", intf);
5657 if (system(buf) != 0) {
5658 sigma_dut_print(dut, DUT_MSG_ERROR,
5659 "iwpriv %s shortgi 0 failed", intf);
5660 }
5661 }
5662
5663 if (type && strcasecmp(type, "DUT") == 0) {
5664 snprintf(buf, sizeof(buf), "iwpriv %s nss 3", intf);
5665 if (system(buf) != 0) {
5666 sigma_dut_print(dut, DUT_MSG_ERROR,
5667 "iwpriv %s nss 3 failed", intf);
5668 }
Arif Hussainac6c5112018-05-25 17:34:00 -07005669 dut->sta_nss = 3;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005670
5671 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 1", intf);
5672 if (system(buf) != 0) {
5673 sigma_dut_print(dut, DUT_MSG_ERROR,
5674 "iwpriv %s shortgi 1 failed", intf);
5675 }
5676 }
5677}
5678
5679
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005680#ifdef NL80211_SUPPORT
5681static int sta_set_he_mcs(struct sigma_dut *dut, const char *intf,
5682 enum he_mcs_config mcs)
5683{
5684 struct nl_msg *msg;
5685 int ret = 0;
5686 struct nlattr *params;
5687 int ifindex;
5688
5689 ifindex = if_nametoindex(intf);
5690 if (ifindex == 0) {
5691 sigma_dut_print(dut, DUT_MSG_ERROR,
5692 "%s: Index for interface %s failed",
5693 __func__, intf);
5694 return -1;
5695 }
5696
5697 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5698 NL80211_CMD_VENDOR)) ||
5699 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5700 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5701 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5702 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5703 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5704 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_MCS,
5705 mcs)) {
5706 sigma_dut_print(dut, DUT_MSG_ERROR,
5707 "%s: err in adding vendor_cmd and vendor_data",
5708 __func__);
5709 nlmsg_free(msg);
5710 return -1;
5711 }
5712 nla_nest_end(msg, params);
5713
5714 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5715 if (ret) {
5716 sigma_dut_print(dut, DUT_MSG_ERROR,
5717 "%s: err in send_and_recv_msgs, ret=%d",
5718 __func__, ret);
5719 }
5720 return ret;
5721}
5722#endif /* NL80211_SUPPORT */
5723
5724
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08005725static int sta_set_heconfig_and_wep_tkip(struct sigma_dut *dut,
5726 const char *intf, int enable)
5727{
5728#ifdef NL80211_SUPPORT
5729 struct nl_msg *msg;
5730 int ret = 0;
5731 struct nlattr *params;
5732 int ifindex;
5733
5734 ifindex = if_nametoindex(intf);
5735 if (ifindex == 0) {
5736 sigma_dut_print(dut, DUT_MSG_ERROR,
5737 "%s: Index for interface %s failed",
5738 __func__, intf);
5739 return -1;
5740 }
5741
5742 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5743 NL80211_CMD_VENDOR)) ||
5744 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5745 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5746 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5747 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5748 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5749 nla_put_u8(msg,
5750 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WEP_TKIP_IN_HE,
5751 enable)) {
5752 sigma_dut_print(dut, DUT_MSG_ERROR,
5753 "%s: err in adding vendor_cmd and vendor_data",
5754 __func__);
5755 nlmsg_free(msg);
5756 return -1;
5757 }
5758 nla_nest_end(msg, params);
5759
5760 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5761 if (ret) {
5762 sigma_dut_print(dut, DUT_MSG_ERROR,
5763 "%s: err in send_and_recv_msgs, ret=%d",
5764 __func__, ret);
5765 }
5766 return ret;
5767#else /* NL80211_SUPPORT */
5768 sigma_dut_print(dut, DUT_MSG_ERROR,
5769 "HE config enablement cannot be changed without NL80211_SUPPORT defined");
5770 return -1;
5771#endif /* NL80211_SUPPORT */
5772}
5773
5774
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005775static int sta_set_addba_buf_size(struct sigma_dut *dut,
5776 const char *intf, int bufsize)
5777{
5778#ifdef NL80211_SUPPORT
5779 struct nl_msg *msg;
5780 int ret = 0;
5781 struct nlattr *params;
5782 int ifindex;
5783
5784 ifindex = if_nametoindex(intf);
5785 if (ifindex == 0) {
5786 sigma_dut_print(dut, DUT_MSG_ERROR,
5787 "%s: Index for interface %s failed",
5788 __func__, intf);
5789 return -1;
5790 }
5791
5792 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5793 NL80211_CMD_VENDOR)) ||
5794 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5795 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5796 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5797 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5798 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5799 nla_put_u8(msg,
5800 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
5801 bufsize)) {
5802 sigma_dut_print(dut, DUT_MSG_ERROR,
5803 "%s: err in adding vendor_cmd and vendor_data",
5804 __func__);
5805 nlmsg_free(msg);
5806 return -1;
5807 }
5808 nla_nest_end(msg, params);
5809
5810 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5811 if (ret) {
5812 sigma_dut_print(dut, DUT_MSG_ERROR,
5813 "%s: err in send_and_recv_msgs, ret=%d",
5814 __func__, ret);
5815 }
5816 return ret;
5817#else /* NL80211_SUPPORT */
5818 sigma_dut_print(dut, DUT_MSG_ERROR,
5819 "AddBA bufsize cannot be changed without NL80211_SUPPORT defined");
5820 return -1;
5821#endif /* NL80211_SUPPORT */
5822}
5823
5824
Arif Hussain8d5b27b2018-05-14 14:31:03 -07005825static int sta_set_tx_beamformee(struct sigma_dut *dut, const char *intf,
5826 int enable)
5827{
5828#ifdef NL80211_SUPPORT
5829 struct nl_msg *msg;
5830 int ret = 0;
5831 struct nlattr *params;
5832 int ifindex;
5833
5834 ifindex = if_nametoindex(intf);
5835 if (ifindex == 0) {
5836 sigma_dut_print(dut, DUT_MSG_ERROR,
5837 "%s: Index for interface %s failed",
5838 __func__, intf);
5839 return -1;
5840 }
5841
5842 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5843 NL80211_CMD_VENDOR)) ||
5844 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5845 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5846 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5847 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5848 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5849 nla_put_u8(msg,
5850 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_TX_BEAMFORMEE,
5851 enable)) {
5852 sigma_dut_print(dut, DUT_MSG_ERROR,
5853 "%s: err in adding vendor_cmd and vendor_data",
5854 __func__);
5855 nlmsg_free(msg);
5856 return -1;
5857 }
5858 nla_nest_end(msg, params);
5859
5860 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5861 if (ret) {
5862 sigma_dut_print(dut, DUT_MSG_ERROR,
5863 "%s: err in send_and_recv_msgs, ret=%d",
5864 __func__, ret);
5865 }
5866 return ret;
5867#else /* NL80211_SUPPORT */
5868 sigma_dut_print(dut, DUT_MSG_ERROR,
5869 "tx beamformee cannot be changed without NL80211_SUPPORT defined");
5870 return -1;
5871#endif /* NL80211_SUPPORT */
5872}
5873
5874
Arif Hussain9765f7d2018-07-03 08:28:26 -07005875static int sta_set_beamformee_sts(struct sigma_dut *dut, const char *intf,
5876 int val)
5877{
5878#ifdef NL80211_SUPPORT
5879 struct nl_msg *msg;
5880 int ret = 0;
5881 struct nlattr *params;
5882 int ifindex;
5883
5884 ifindex = if_nametoindex(intf);
5885 if (ifindex == 0) {
5886 sigma_dut_print(dut, DUT_MSG_ERROR,
5887 "%s: Index for interface %s failed, val:%d",
5888 __func__, intf, val);
5889 return -1;
5890 }
5891
5892 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5893 NL80211_CMD_VENDOR)) ||
5894 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5895 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5896 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5897 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5898 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5899 nla_put_u8(msg,
5900 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_TX_BEAMFORMEE_NSTS,
5901 val)) {
5902 sigma_dut_print(dut, DUT_MSG_ERROR,
5903 "%s: err in adding vendor_cmd and vendor_data, val: %d",
5904 __func__, val);
5905 nlmsg_free(msg);
5906 return -1;
5907 }
5908 nla_nest_end(msg, params);
5909
5910 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5911 if (ret) {
5912 sigma_dut_print(dut, DUT_MSG_ERROR,
5913 "%s: err in send_and_recv_msgs, ret=%d, val=%d",
5914 __func__, ret, val);
5915 }
5916 return ret;
5917#else /* NL80211_SUPPORT */
5918 sigma_dut_print(dut, DUT_MSG_ERROR,
5919 "beamformee sts cannot be changed without NL80211_SUPPORT defined");
5920 return -1;
5921#endif /* NL80211_SUPPORT */
5922}
5923
5924
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005925static void sta_reset_default_wcn(struct sigma_dut *dut, const char *intf,
5926 const char *type)
5927{
5928 char buf[60];
5929
5930 if (dut->program == PROGRAM_HE) {
5931 /* resetting phymode to auto in case of HE program */
5932 snprintf(buf, sizeof(buf), "iwpriv %s setphymode 0", intf);
5933 if (system(buf) != 0) {
5934 sigma_dut_print(dut, DUT_MSG_ERROR,
5935 "iwpriv %s setphymode failed", intf);
5936 }
5937
Amarnath Hullur Subramanyam9cecb502018-04-25 13:26:30 -07005938 /* reset the rate to Auto rate */
5939 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0xff",
5940 intf);
5941 if (system(buf) != 0) {
5942 sigma_dut_print(dut, DUT_MSG_ERROR,
5943 "iwpriv %s set_11ax_rate 0xff failed",
5944 intf);
5945 }
5946
Kiran Kumar Lokere86cfe3a2018-06-01 11:55:15 -07005947 /* reset the LDPC setting */
5948 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 1", intf);
5949 if (system(buf) != 0) {
5950 sigma_dut_print(dut, DUT_MSG_ERROR,
5951 "iwpriv %s ldpc 1 failed", intf);
5952 }
5953
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005954 /* remove all network profiles */
5955 remove_wpa_networks(intf);
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005956
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005957 /* Configure ADDBA Req/Rsp buffer size to be 64 */
5958 sta_set_addba_buf_size(dut, intf, 64);
5959
Amarnath Hullur Subramanyam5f32d572018-03-02 00:02:33 -08005960#ifdef NL80211_SUPPORT
5961 /* Disable noackpolicy for all AC */
5962 if (nlvendor_sta_set_noack(dut, intf, 0, QCA_WLAN_AC_ALL)) {
5963 sigma_dut_print(dut, DUT_MSG_ERROR,
5964 "Disable of noackpolicy for all AC failed");
5965 }
5966#endif /* NL80211_SUPPORT */
5967
Amarnath Hullur Subramanyamb1724a52018-03-07 14:31:46 -08005968 /* Enable WMM by default */
5969 if (wcn_sta_set_wmm(dut, intf, "on")) {
5970 sigma_dut_print(dut, DUT_MSG_ERROR,
5971 "Enable of WMM in sta_reset_default_wcn failed");
5972 }
5973
5974 /* Disable ADDBA_REJECT by default */
5975 if (nlvendor_sta_set_addba_reject(dut, intf, 0)) {
5976 sigma_dut_print(dut, DUT_MSG_ERROR,
5977 "Disable of addba_reject in sta_reset_default_wcn failed");
5978 }
5979
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08005980 /* Enable sending of ADDBA by default */
5981 if (nlvendor_config_send_addba(dut, intf, 1)) {
5982 sigma_dut_print(dut, DUT_MSG_ERROR,
5983 "Enable sending of ADDBA in sta_reset_default_wcn failed");
5984 }
5985
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08005986 /* Enable AMPDU by default */
5987 iwpriv_sta_set_ampdu(dut, intf, 1);
5988
Subhani Shaik8e7a3052018-04-24 14:03:00 -07005989#ifdef NL80211_SUPPORT
5990 if (sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_AUTO)) {
5991 sigma_dut_print(dut, DUT_MSG_ERROR,
5992 "Set LTF config to default in sta_reset_default_wcn failed");
5993 }
Arif Hussain9765f7d2018-07-03 08:28:26 -07005994
5995 if (sta_set_beamformee_sts(dut, intf, 0)) {
5996 sigma_dut_print(dut, DUT_MSG_ERROR,
5997 "Failed to set BeamformeeSTS");
5998 }
Subhani Shaik8e7a3052018-04-24 14:03:00 -07005999#endif /* NL80211_SUPPORT */
6000
Arif Hussain8d5b27b2018-05-14 14:31:03 -07006001 if (sta_set_tx_beamformee(dut, intf, 1)) {
6002 sigma_dut_print(dut, DUT_MSG_ERROR,
6003 "Set tx beamformee enable by default in sta_reset_default_wcn failed");
6004 }
6005
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08006006 /* Set nss to 1 and MCS 0-7 in case of testbed */
6007 if (type && strcasecmp(type, "Testbed") == 0) {
6008#ifdef NL80211_SUPPORT
6009 int ret;
6010#endif /* NL80211_SUPPORT */
6011
6012 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
6013 if (system(buf) != 0) {
6014 sigma_dut_print(dut, DUT_MSG_ERROR,
6015 "iwpriv %s nss failed", intf);
6016 }
6017
6018#ifdef NL80211_SUPPORT
6019 ret = sta_set_he_mcs(dut, intf, HE_80_MCS0_7);
6020 if (ret) {
6021 sigma_dut_print(dut, DUT_MSG_ERROR,
6022 "Setting of MCS failed, ret:%d",
6023 ret);
6024 }
6025#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyamc67621d2018-02-04 23:18:01 -08006026
6027 /* Disable STBC as default */
6028 wcn_sta_set_stbc(dut, intf, "0");
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08006029
6030 /* Disable AMSDU as default */
6031 iwpriv_sta_set_amsdu(dut, intf, "0");
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08006032
6033#ifdef NL80211_SUPPORT
6034 /* HE fragmentation default off */
6035 if (sta_set_he_fragmentation(dut, intf,
6036 HE_FRAG_DISABLE)) {
6037 sigma_dut_print(dut, DUT_MSG_ERROR,
6038 "Setting of HE fragmentation failed");
6039 }
6040#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08006041
6042 /* Enable WEP/TKIP with HE capability in testbed */
6043 if (sta_set_heconfig_and_wep_tkip(dut, intf, 1)) {
6044 sigma_dut_print(dut, DUT_MSG_ERROR,
6045 "Enabling HE config with WEP/TKIP failed");
6046 }
Arif Hussain8d5b27b2018-05-14 14:31:03 -07006047
6048 if (sta_set_tx_beamformee(dut, intf, 0)) {
6049 sigma_dut_print(dut, DUT_MSG_ERROR,
6050 "Set tx beamformee disable by default for testbed in sta_reset_default_wcn failed");
6051 }
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08006052 }
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006053
6054 /* Defaults in case of DUT */
6055 if (type && strcasecmp(type, "DUT") == 0) {
Arif Hussaind48fcc72018-05-01 18:34:18 -07006056 /* Enable STBC by default */
6057 wcn_sta_set_stbc(dut, intf, "1");
6058
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006059 /* set nss to 2 */
6060 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
6061 if (system(buf) != 0) {
6062 sigma_dut_print(dut, DUT_MSG_ERROR,
6063 "iwpriv %s nss 2 failed", intf);
6064 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006065 dut->sta_nss = 2;
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006066
6067#ifdef NL80211_SUPPORT
Arif Hussainae239842018-05-01 18:20:05 -07006068 /* Set HE_MCS to 0-11 */
6069 if (sta_set_he_mcs(dut, intf, HE_80_MCS0_11)) {
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006070 sigma_dut_print(dut, DUT_MSG_ERROR,
6071 "Setting of MCS failed");
6072 }
6073#endif /* NL80211_SUPPORT */
6074
6075 /* Disable WEP/TKIP with HE capability in DUT */
6076 if (sta_set_heconfig_and_wep_tkip(dut, intf, 0)) {
6077 sigma_dut_print(dut, DUT_MSG_ERROR,
6078 "Enabling HE config with WEP/TKIP failed");
6079 }
6080 }
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006081 }
6082}
6083
6084
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006085static int cmd_sta_reset_default(struct sigma_dut *dut,
6086 struct sigma_conn *conn,
6087 struct sigma_cmd *cmd)
6088{
6089 int cmd_sta_p2p_reset(struct sigma_dut *dut, struct sigma_conn *conn,
6090 struct sigma_cmd *cmd);
6091 const char *intf = get_param(cmd, "Interface");
6092 const char *type;
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006093 const char *program = get_param(cmd, "program");
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306094 const char *dev_role = get_param(cmd, "DevRole");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006095
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006096 if (!program)
6097 program = get_param(cmd, "prog");
6098 dut->program = sigma_program_to_enum(program);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006099 dut->device_type = STA_unknown;
6100 type = get_param(cmd, "type");
6101 if (type && strcasecmp(type, "Testbed") == 0)
6102 dut->device_type = STA_testbed;
6103 if (type && strcasecmp(type, "DUT") == 0)
6104 dut->device_type = STA_dut;
6105
6106 if (dut->program == PROGRAM_TDLS) {
6107 /* Clear TDLS testing mode */
6108 wpa_command(intf, "SET tdls_disabled 0");
6109 wpa_command(intf, "SET tdls_testing 0");
6110 dut->no_tpk_expiration = 0;
Pradeep Reddy POTTETI8ce2a232016-10-28 12:17:32 +05306111 if (get_driver_type() == DRIVER_WCN) {
6112 /* Enable the WCN driver in TDLS Explicit trigger mode
6113 */
6114 wpa_command(intf, "SET tdls_external_control 0");
6115 wpa_command(intf, "SET tdls_trigger_control 0");
6116 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006117 }
6118
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006119#ifdef MIRACAST
6120 if (dut->program == PROGRAM_WFD ||
6121 dut->program == PROGRAM_DISPLAYR2)
6122 miracast_sta_reset_default(dut, conn, cmd);
6123#endif /* MIRACAST */
6124
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006125 switch (get_driver_type()) {
6126 case DRIVER_ATHEROS:
6127 sta_reset_default_ath(dut, intf, type);
6128 break;
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006129 case DRIVER_WCN:
6130 sta_reset_default_wcn(dut, intf, type);
6131 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006132 default:
6133 break;
6134 }
6135
6136#ifdef ANDROID_NAN
6137 if (dut->program == PROGRAM_NAN)
6138 nan_cmd_sta_reset_default(dut, conn, cmd);
6139#endif /* ANDROID_NAN */
6140
Jouni Malinenba630452018-06-22 11:49:59 +03006141 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006142 unlink("SP/wi-fi.org/pps.xml");
6143 if (system("rm -r SP/*") != 0) {
6144 }
6145 unlink("next-client-cert.pem");
6146 unlink("next-client-key.pem");
6147 }
6148
6149 if (dut->program == PROGRAM_60GHZ) {
6150 const char *dev_role = get_param(cmd, "DevRole");
6151
6152 if (!dev_role) {
6153 send_resp(dut, conn, SIGMA_ERROR,
6154 "errorCode,Missing DevRole argument");
6155 return 0;
6156 }
6157
6158 if (strcasecmp(dev_role, "STA") == 0)
6159 dut->dev_role = DEVROLE_STA;
6160 else if (strcasecmp(dev_role, "PCP") == 0)
6161 dut->dev_role = DEVROLE_PCP;
6162 else {
6163 send_resp(dut, conn, SIGMA_ERROR,
6164 "errorCode,Unknown DevRole");
6165 return 0;
6166 }
6167
6168 if (dut->device_type == STA_unknown) {
6169 sigma_dut_print(dut, DUT_MSG_ERROR,
6170 "Device type is not STA testbed or DUT");
6171 send_resp(dut, conn, SIGMA_ERROR,
6172 "errorCode,Unknown device type");
6173 return 0;
6174 }
6175 }
6176
6177 wpa_command(intf, "WPS_ER_STOP");
6178 wpa_command(intf, "FLUSH");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05306179 wpa_command(intf, "ERP_FLUSH");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006180 wpa_command(intf, "SET radio_disabled 0");
6181
6182 if (dut->tmp_mac_addr && dut->set_macaddr) {
6183 dut->tmp_mac_addr = 0;
6184 if (system(dut->set_macaddr) != 0) {
6185 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to clear "
6186 "temporary MAC address");
6187 }
6188 }
6189
6190 set_ps(intf, dut, 0);
6191
Jouni Malinenba630452018-06-22 11:49:59 +03006192 if (dut->program == PROGRAM_HS2 || dut->program == PROGRAM_HS2_R2 ||
6193 dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006194 wpa_command(intf, "SET interworking 1");
6195 wpa_command(intf, "SET hs20 1");
6196 }
6197
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006198 if (dut->program == PROGRAM_HS2_R2 ||
Jouni Malinenba630452018-06-22 11:49:59 +03006199 dut->program == PROGRAM_HS2_R3 ||
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006200 dut->program == PROGRAM_OCE) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006201 wpa_command(intf, "SET pmf 1");
6202 } else {
6203 wpa_command(intf, "SET pmf 0");
6204 }
6205
6206 hs2_clear_credentials(intf);
6207 wpa_command(intf, "SET hessid 00:00:00:00:00:00");
6208 wpa_command(intf, "SET access_network_type 15");
6209
6210 static_ip_file(0, NULL, NULL, NULL);
6211 kill_dhcp_client(dut, intf);
6212 clear_ip_addr(dut, intf);
6213
6214 dut->er_oper_performed = 0;
6215 dut->er_oper_bssid[0] = '\0';
6216
priyadharshini gowthamanad6cbba2016-10-04 10:39:58 -07006217 if (dut->program == PROGRAM_LOC) {
6218 /* Disable Interworking by default */
6219 wpa_command(get_station_ifname(), "SET interworking 0");
6220 }
6221
Ashwini Patil00402582017-04-13 12:29:39 +05306222 if (dut->program == PROGRAM_MBO) {
6223 free(dut->non_pref_ch_list);
6224 dut->non_pref_ch_list = NULL;
Ashwini Patil5acd7382017-04-13 15:55:04 +05306225 free(dut->btm_query_cand_list);
6226 dut->btm_query_cand_list = NULL;
Ashwini Patilc63161e2017-04-13 16:30:23 +05306227 wpa_command(intf, "SET reject_btm_req_reason 0");
Ashwini Patila75de5a2017-04-13 16:35:05 +05306228 wpa_command(intf, "SET ignore_assoc_disallow 0");
Ashwini Patild174f2c2017-04-13 16:49:46 +05306229 wpa_command(intf, "SET gas_address3 0");
Ashwini Patil9183fdb2017-04-13 16:58:25 +05306230 wpa_command(intf, "SET roaming 1");
Ashwini Patil00402582017-04-13 12:29:39 +05306231 }
6232
Jouni Malinen3c367e82017-06-23 17:01:47 +03006233 free(dut->rsne_override);
6234 dut->rsne_override = NULL;
6235
Jouni Malinen68143132017-09-02 02:34:08 +03006236 free(dut->sae_commit_override);
6237 dut->sae_commit_override = NULL;
6238
Jouni Malinend86e5822017-08-29 03:55:32 +03006239 dut->dpp_conf_id = -1;
Jouni Malinenb1dd21f2017-11-13 19:14:29 +02006240 free(dut->dpp_peer_uri);
6241 dut->dpp_peer_uri = NULL;
Jouni Malinen63d50412017-11-24 11:55:38 +02006242 dut->dpp_local_bootstrap = -1;
Jouni Malinen5011fb52017-12-05 21:00:15 +02006243 wpa_command(intf, "SET dpp_config_processing 2");
Jouni Malinend86e5822017-08-29 03:55:32 +03006244
Jouni Malinenfac9cad2017-10-10 18:35:55 +03006245 wpa_command(intf, "VENDOR_ELEM_REMOVE 13 *");
6246
vamsi krishnaa2799492017-12-05 14:28:01 +05306247 if (dut->program == PROGRAM_OCE) {
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306248 wpa_command(intf, "SET oce 1");
vamsi krishnaa2799492017-12-05 14:28:01 +05306249 wpa_command(intf, "SET disable_fils 0");
Ankita Bajaj1bde7942018-01-09 19:15:01 +05306250 wpa_command(intf, "FILS_HLP_REQ_FLUSH");
6251 dut->fils_hlp = 0;
6252#ifdef ANDROID
6253 hlp_thread_cleanup(dut);
6254#endif /* ANDROID */
vamsi krishnaa2799492017-12-05 14:28:01 +05306255 }
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306256
Sunil Dutt076081f2018-02-05 19:45:50 +05306257#ifdef NL80211_SUPPORT
Sunil Dutt44595082018-02-12 19:41:45 +05306258 if (get_driver_type() == DRIVER_WCN &&
6259 dut->config_rsnie == 1) {
6260 dut->config_rsnie = 0;
6261 sta_config_rsnie(dut, 0);
Sunil Dutt076081f2018-02-05 19:45:50 +05306262 }
6263#endif /* NL80211_SUPPORT */
6264
Sunil Duttfebf8a82018-02-09 18:50:13 +05306265 if (dev_role && strcasecmp(dev_role, "STA-CFON") == 0) {
6266 dut->dev_role = DEVROLE_STA_CFON;
6267 return sta_cfon_reset_default(dut, conn, cmd);
6268 }
6269
6270 if (dut->program != PROGRAM_VHT)
6271 return cmd_sta_p2p_reset(dut, conn, cmd);
6272
Priyadharshini Gowthamana7dfd492015-11-09 14:34:08 -08006273 return 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006274}
6275
6276
6277static int cmd_sta_get_events(struct sigma_dut *dut, struct sigma_conn *conn,
6278 struct sigma_cmd *cmd)
6279{
6280 const char *program = get_param(cmd, "Program");
6281
6282 if (program == NULL)
6283 return -1;
6284#ifdef ANDROID_NAN
6285 if (strcasecmp(program, "NAN") == 0)
6286 return nan_cmd_sta_get_events(dut, conn, cmd);
6287#endif /* ANDROID_NAN */
6288 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6289 return 0;
6290}
6291
6292
Jouni Malinen82905202018-04-29 17:20:10 +03006293static int sta_exec_action_url(struct sigma_dut *dut, struct sigma_conn *conn,
6294 struct sigma_cmd *cmd)
6295{
6296 const char *url = get_param(cmd, "url");
6297 const char *method = get_param(cmd, "method");
6298 pid_t pid;
6299 int status;
6300
6301 if (!url || !method)
6302 return -1;
6303
6304 /* TODO: Add support for method,post */
6305 if (strcasecmp(method, "get") != 0) {
6306 send_resp(dut, conn, SIGMA_ERROR,
6307 "ErrorCode,Unsupported method");
6308 return 0;
6309 }
6310
6311 pid = fork();
6312 if (pid < 0) {
6313 perror("fork");
6314 return -1;
6315 }
6316
6317 if (pid == 0) {
6318 char * argv[5] = { "wget", "-O", "/dev/null",
6319 (char *) url, NULL };
6320
6321 execv("/usr/bin/wget", argv);
6322 perror("execv");
6323 exit(0);
6324 return -1;
6325 }
6326
6327 if (waitpid(pid, &status, 0) < 0) {
6328 perror("waitpid");
6329 return -1;
6330 }
6331
6332 if (WIFEXITED(status)) {
6333 const char *errmsg;
6334
6335 if (WEXITSTATUS(status) == 0)
6336 return 1;
6337 sigma_dut_print(dut, DUT_MSG_INFO, "wget exit status %d",
6338 WEXITSTATUS(status));
6339 switch (WEXITSTATUS(status)) {
6340 case 4:
6341 errmsg = "errmsg,Network failure";
6342 break;
6343 case 8:
6344 errmsg = "errmsg,Server issued an error response";
6345 break;
6346 default:
6347 errmsg = "errmsg,Unknown failure from wget";
6348 break;
6349 }
6350 send_resp(dut, conn, SIGMA_ERROR, errmsg);
6351 return 0;
6352 }
6353
6354 send_resp(dut, conn, SIGMA_ERROR, "errmsg,Unknown failure");
6355 return 0;
6356}
6357
6358
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006359static int cmd_sta_exec_action(struct sigma_dut *dut, struct sigma_conn *conn,
6360 struct sigma_cmd *cmd)
6361{
6362 const char *program = get_param(cmd, "Prog");
6363
Jouni Malinen82905202018-04-29 17:20:10 +03006364 if (program && !get_param(cmd, "interface"))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006365 return -1;
6366#ifdef ANDROID_NAN
Jouni Malinen82905202018-04-29 17:20:10 +03006367 if (program && strcasecmp(program, "NAN") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006368 return nan_cmd_sta_exec_action(dut, conn, cmd);
6369#endif /* ANDROID_NAN */
Jouni Malinen82905202018-04-29 17:20:10 +03006370
6371 if (program && strcasecmp(program, "Loc") == 0)
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07006372 return loc_cmd_sta_exec_action(dut, conn, cmd);
Jouni Malinen82905202018-04-29 17:20:10 +03006373
6374 if (get_param(cmd, "url"))
6375 return sta_exec_action_url(dut, conn, cmd);
6376
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006377 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6378 return 0;
6379}
6380
6381
6382static int cmd_sta_set_11n(struct sigma_dut *dut, struct sigma_conn *conn,
6383 struct sigma_cmd *cmd)
6384{
6385 const char *intf = get_param(cmd, "Interface");
6386 const char *val, *mcs32, *rate;
6387
6388 val = get_param(cmd, "GREENFIELD");
6389 if (val) {
6390 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
6391 /* Enable GD */
6392 send_resp(dut, conn, SIGMA_ERROR,
6393 "ErrorCode,GF not supported");
6394 return 0;
6395 }
6396 }
6397
6398 val = get_param(cmd, "SGI20");
6399 if (val) {
6400 switch (get_driver_type()) {
6401 case DRIVER_ATHEROS:
6402 ath_sta_set_sgi(dut, intf, val);
6403 break;
6404 default:
6405 send_resp(dut, conn, SIGMA_ERROR,
6406 "ErrorCode,SGI20 not supported");
6407 return 0;
6408 }
6409 }
6410
6411 mcs32 = get_param(cmd, "MCS32"); /* HT Duplicate Mode Enable/Disable */
6412 rate = get_param(cmd, "MCS_FIXEDRATE"); /* Fixed MCS rate (0..31) */
6413 if (mcs32 && rate) {
6414 /* TODO */
6415 send_resp(dut, conn, SIGMA_ERROR,
6416 "ErrorCode,MCS32,MCS_FIXEDRATE not supported");
6417 return 0;
6418 } else if (mcs32 && !rate) {
6419 /* TODO */
6420 send_resp(dut, conn, SIGMA_ERROR,
6421 "ErrorCode,MCS32 not supported");
6422 return 0;
6423 } else if (!mcs32 && rate) {
6424 switch (get_driver_type()) {
6425 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08006426 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006427 ath_sta_set_11nrates(dut, intf, rate);
6428 break;
6429 default:
6430 send_resp(dut, conn, SIGMA_ERROR,
6431 "ErrorCode,MCS32_FIXEDRATE not supported");
6432 return 0;
6433 }
6434 }
6435
6436 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6437}
6438
6439
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006440static void cmd_set_max_he_mcs(struct sigma_dut *dut, const char *intf,
6441 int mcs_config)
6442{
6443#ifdef NL80211_SUPPORT
6444 int ret;
6445
6446 switch (mcs_config) {
6447 case HE_80_MCS0_7:
6448 case HE_80_MCS0_9:
6449 case HE_80_MCS0_11:
6450 ret = sta_set_he_mcs(dut, intf, mcs_config);
6451 if (ret) {
6452 sigma_dut_print(dut, DUT_MSG_ERROR,
6453 "cmd_set_max_he_mcs: Setting of MCS:%d failed, ret:%d",
6454 mcs_config, ret);
6455 }
6456 break;
6457 default:
6458 sigma_dut_print(dut, DUT_MSG_ERROR,
6459 "cmd_set_max_he_mcs: Invalid mcs %d",
6460 mcs_config);
6461 break;
6462 }
6463#else /* NL80211_SUPPORT */
6464 sigma_dut_print(dut, DUT_MSG_ERROR,
6465 "max HE MCS cannot be changed without NL80211_SUPPORT defined");
6466#endif /* NL80211_SUPPORT */
6467}
6468
6469
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006470static int cmd_sta_set_wireless_vht(struct sigma_dut *dut,
6471 struct sigma_conn *conn,
6472 struct sigma_cmd *cmd)
6473{
6474 const char *intf = get_param(cmd, "Interface");
6475 const char *val;
Arif Hussaina37e9552018-06-20 17:05:59 -07006476 const char *program;
Arif Hussaind13d6952018-07-02 16:23:47 -07006477 char buf[60];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006478 int tkip = -1;
6479 int wep = -1;
6480
Arif Hussaina37e9552018-06-20 17:05:59 -07006481 program = get_param(cmd, "Program");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006482 val = get_param(cmd, "SGI80");
6483 if (val) {
6484 int sgi80;
6485
6486 sgi80 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6487 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi80);
6488 if (system(buf) != 0) {
6489 sigma_dut_print(dut, DUT_MSG_ERROR,
6490 "iwpriv shortgi failed");
6491 }
6492 }
6493
6494 val = get_param(cmd, "TxBF");
6495 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
Kiran Kumar Lokerecb57d822018-07-06 16:37:42 -07006496 switch (get_driver_type()) {
6497 case DRIVER_WCN:
6498 if (sta_set_tx_beamformee(dut, intf, 1)) {
6499 send_resp(dut, conn, SIGMA_ERROR,
6500 "ErrorCode,Failed to set TX beamformee enable");
6501 return 0;
6502 }
6503 break;
6504 case DRIVER_ATHEROS:
6505 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfee 1",
6506 intf);
6507 if (system(buf) != 0) {
6508 send_resp(dut, conn, SIGMA_ERROR,
6509 "ErrorCode,Setting vhtsubfee failed");
6510 return 0;
6511 }
6512
6513 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfer 1",
6514 intf);
6515 if (system(buf) != 0) {
6516 send_resp(dut, conn, SIGMA_ERROR,
6517 "ErrorCode,Setting vhtsubfer failed");
6518 return 0;
6519 }
6520 break;
6521 default:
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006522 sigma_dut_print(dut, DUT_MSG_ERROR,
Kiran Kumar Lokerecb57d822018-07-06 16:37:42 -07006523 "Unsupported driver type");
6524 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006525 }
6526 }
6527
6528 val = get_param(cmd, "MU_TxBF");
6529 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
6530 switch (get_driver_type()) {
6531 case DRIVER_ATHEROS:
6532 ath_sta_set_txsp_stream(dut, intf, "1SS");
6533 ath_sta_set_rxsp_stream(dut, intf, "1SS");
Sunil Duttae9e5d12018-06-29 11:50:47 +05306534 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfee 1",
6535 intf);
6536 if (system(buf) != 0) {
6537 sigma_dut_print(dut, DUT_MSG_ERROR,
6538 "iwpriv vhtmubfee failed");
6539 }
6540 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfer 1",
6541 intf);
6542 if (system(buf) != 0) {
6543 sigma_dut_print(dut, DUT_MSG_ERROR,
6544 "iwpriv vhtmubfer failed");
6545 }
6546 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006547 case DRIVER_WCN:
6548 if (wcn_sta_set_sp_stream(dut, intf, "1SS") < 0) {
6549 send_resp(dut, conn, SIGMA_ERROR,
6550 "ErrorCode,Failed to set RX/TXSP_STREAM");
6551 return 0;
6552 }
Sunil Duttae9e5d12018-06-29 11:50:47 +05306553 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006554 default:
6555 sigma_dut_print(dut, DUT_MSG_ERROR,
6556 "Setting SP_STREAM not supported");
6557 break;
6558 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006559 }
6560
6561 val = get_param(cmd, "LDPC");
6562 if (val) {
6563 int ldpc;
6564
6565 ldpc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6566 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, ldpc);
6567 if (system(buf) != 0) {
6568 sigma_dut_print(dut, DUT_MSG_ERROR,
6569 "iwpriv ldpc failed");
6570 }
6571 }
6572
Amarnath Hullur Subramanyam7bae60e2018-01-31 03:46:50 -08006573 val = get_param(cmd, "BCC");
6574 if (val) {
6575 int bcc;
6576
6577 bcc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6578 /* use LDPC iwpriv itself to set bcc coding, bcc coding
6579 * is mutually exclusive to bcc */
6580 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, !bcc);
6581 if (system(buf) != 0) {
6582 sigma_dut_print(dut, DUT_MSG_ERROR,
6583 "Enabling/Disabling of BCC failed");
6584 }
6585 }
6586
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006587 val = get_param(cmd, "MaxHE-MCS_1SS_RxMapLTE80");
6588 if (val && dut->sta_nss == 1)
6589 cmd_set_max_he_mcs(dut, intf, atoi(val));
6590
6591 val = get_param(cmd, "MaxHE-MCS_2SS_RxMapLTE80");
6592 if (val && dut->sta_nss == 2)
6593 cmd_set_max_he_mcs(dut, intf, atoi(val));
6594
Arif Hussainac6c5112018-05-25 17:34:00 -07006595 val = get_param(cmd, "MCS_FixedRate");
6596 if (val) {
6597#ifdef NL80211_SUPPORT
6598 int mcs, ratecode = 0;
6599 enum he_mcs_config mcs_config;
6600 int ret;
6601
6602 ratecode = (0x07 & dut->sta_nss) << 5;
6603 mcs = atoi(val);
6604 /* Add the MCS to the ratecode */
6605 if (mcs >= 0 && mcs <= 11) {
6606 ratecode += mcs;
6607 if (dut->device_type == STA_testbed &&
6608 mcs > 7 && mcs <= 11) {
6609 if (mcs <= 9)
6610 mcs_config = HE_80_MCS0_9;
6611 else
6612 mcs_config = HE_80_MCS0_11;
6613 ret = sta_set_he_mcs(dut, intf, mcs_config);
6614 if (ret) {
6615 sigma_dut_print(dut, DUT_MSG_ERROR,
6616 "MCS_FixedRate: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
6617 mcs, mcs_config, ret);
6618 }
6619 }
6620 snprintf(buf, sizeof(buf),
6621 "iwpriv %s set_11ax_rate 0x%03x",
6622 intf, ratecode);
6623 if (system(buf) != 0) {
6624 sigma_dut_print(dut, DUT_MSG_ERROR,
6625 "MCS_FixedRate: iwpriv setting of 11ax rates 0x%03x failed",
6626 ratecode);
6627 }
6628 } else {
6629 sigma_dut_print(dut, DUT_MSG_ERROR,
6630 "MCS_FixedRate: HE MCS %d not supported",
6631 mcs);
6632 }
6633#else /* NL80211_SUPPORT */
6634 sigma_dut_print(dut, DUT_MSG_ERROR,
6635 "MCS_FixedRate cannot be changed without NL80211_SUPPORT defined");
6636#endif /* NL80211_SUPPORT */
6637 }
6638
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006639 val = get_param(cmd, "opt_md_notif_ie");
6640 if (val) {
6641 char *result = NULL;
6642 char delim[] = ";";
6643 char token[30];
6644 int value, config_val = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306645 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006646
Peng Xub8fc5cc2017-05-10 17:27:28 -07006647 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306648 result = strtok_r(token, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006649
6650 /* Extract the NSS information */
6651 if (result) {
6652 value = atoi(result);
6653 switch (value) {
6654 case 1:
6655 config_val = 1;
6656 break;
6657 case 2:
6658 config_val = 3;
6659 break;
6660 case 3:
6661 config_val = 7;
6662 break;
6663 case 4:
6664 config_val = 15;
6665 break;
6666 default:
6667 config_val = 3;
6668 break;
6669 }
6670
6671 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
6672 intf, config_val);
6673 if (system(buf) != 0) {
6674 sigma_dut_print(dut, DUT_MSG_ERROR,
6675 "iwpriv rxchainmask failed");
6676 }
6677
6678 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
6679 intf, config_val);
6680 if (system(buf) != 0) {
6681 sigma_dut_print(dut, DUT_MSG_ERROR,
6682 "iwpriv txchainmask failed");
6683 }
6684 }
6685
6686 /* Extract the channel width information */
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306687 result = strtok_r(NULL, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006688 if (result) {
6689 value = atoi(result);
6690 switch (value) {
6691 case 20:
6692 config_val = 0;
6693 break;
6694 case 40:
6695 config_val = 1;
6696 break;
6697 case 80:
6698 config_val = 2;
6699 break;
6700 case 160:
6701 config_val = 3;
6702 break;
6703 default:
6704 config_val = 2;
6705 break;
6706 }
6707
6708 dut->chwidth = config_val;
6709
6710 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
6711 intf, config_val);
6712 if (system(buf) != 0) {
6713 sigma_dut_print(dut, DUT_MSG_ERROR,
6714 "iwpriv chwidth failed");
6715 }
6716 }
6717
6718 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", intf);
6719 if (system(buf) != 0) {
6720 sigma_dut_print(dut, DUT_MSG_ERROR,
6721 "iwpriv opmode_notify failed");
6722 }
6723 }
6724
6725 val = get_param(cmd, "nss_mcs_cap");
6726 if (val) {
6727 int nss, mcs;
6728 char token[20];
6729 char *result = NULL;
6730 unsigned int vht_mcsmap = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306731 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006732
Peng Xub8fc5cc2017-05-10 17:27:28 -07006733 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306734 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306735 if (!result) {
6736 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006737 "NSS not specified");
6738 send_resp(dut, conn, SIGMA_ERROR,
6739 "errorCode,NSS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306740 return 0;
6741 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006742 nss = atoi(result);
6743
6744 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
6745 if (system(buf) != 0) {
6746 sigma_dut_print(dut, DUT_MSG_ERROR,
6747 "iwpriv nss failed");
6748 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006749 dut->sta_nss = nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006750
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306751 result = strtok_r(NULL, ";", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006752 if (result == NULL) {
6753 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006754 "MCS not specified");
6755 send_resp(dut, conn, SIGMA_ERROR,
6756 "errorCode,MCS not specified");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006757 return 0;
6758 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306759 result = strtok_r(result, "-", &saveptr);
6760 result = strtok_r(NULL, "-", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306761 if (!result) {
6762 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006763 "MCS not specified");
6764 send_resp(dut, conn, SIGMA_ERROR,
6765 "errorCode,MCS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306766 return 0;
6767 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006768 mcs = atoi(result);
6769
Arif Hussaina37e9552018-06-20 17:05:59 -07006770 if (program && strcasecmp(program, "HE") == 0) {
6771#ifdef NL80211_SUPPORT
6772 enum he_mcs_config mcs_config;
6773 int ret;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006774
Arif Hussaina37e9552018-06-20 17:05:59 -07006775 if (mcs >= 0 && mcs <= 7) {
6776 mcs_config = HE_80_MCS0_7;
6777 } else if (mcs > 7 && mcs <= 9) {
6778 mcs_config = HE_80_MCS0_9;
6779 } else if (mcs > 9 && mcs <= 11) {
6780 mcs_config = HE_80_MCS0_11;
6781 } else {
6782 sigma_dut_print(dut, DUT_MSG_ERROR,
6783 "nss_mcs_cap: HE: Invalid mcs: %d",
6784 mcs);
6785 send_resp(dut, conn, SIGMA_ERROR,
6786 "errorCode,Invalid MCS");
6787 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006788 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006789
6790 ret = sta_set_he_mcs(dut, intf, mcs_config);
6791 if (ret) {
6792 sigma_dut_print(dut, DUT_MSG_ERROR,
6793 "nss_mcs_cap: HE: Setting of MCS failed, mcs_config: %d, ret: %d",
6794 mcs_config, ret);
6795 send_resp(dut, conn, SIGMA_ERROR,
6796 "errorCode,Failed to set MCS");
6797 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006798 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006799#else /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006800 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006801 "nss_mcs_cap: HE: MCS cannot be changed without NL80211_SUPPORT defined");
6802#endif /* NL80211_SUPPORT */
6803 } else {
6804 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
6805 intf, mcs);
6806 if (system(buf) != 0) {
6807 sigma_dut_print(dut, DUT_MSG_ERROR,
6808 "iwpriv mcs failed");
6809 }
6810
6811 switch (nss) {
6812 case 1:
6813 switch (mcs) {
6814 case 7:
6815 vht_mcsmap = 0xfffc;
6816 break;
6817 case 8:
6818 vht_mcsmap = 0xfffd;
6819 break;
6820 case 9:
6821 vht_mcsmap = 0xfffe;
6822 break;
6823 default:
6824 vht_mcsmap = 0xfffe;
6825 break;
6826 }
6827 break;
6828 case 2:
6829 switch (mcs) {
6830 case 7:
6831 vht_mcsmap = 0xfff0;
6832 break;
6833 case 8:
6834 vht_mcsmap = 0xfff5;
6835 break;
6836 case 9:
6837 vht_mcsmap = 0xfffa;
6838 break;
6839 default:
6840 vht_mcsmap = 0xfffa;
6841 break;
6842 }
6843 break;
6844 case 3:
6845 switch (mcs) {
6846 case 7:
6847 vht_mcsmap = 0xffc0;
6848 break;
6849 case 8:
6850 vht_mcsmap = 0xffd5;
6851 break;
6852 case 9:
6853 vht_mcsmap = 0xffea;
6854 break;
6855 default:
6856 vht_mcsmap = 0xffea;
6857 break;
6858 }
6859 break;
6860 default:
6861 vht_mcsmap = 0xffea;
6862 break;
6863 }
6864 snprintf(buf, sizeof(buf),
6865 "iwpriv %s vht_mcsmap 0x%04x",
6866 intf, vht_mcsmap);
6867 if (system(buf) != 0) {
6868 sigma_dut_print(dut, DUT_MSG_ERROR,
6869 "iwpriv vht_mcsmap failed");
6870 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006871 }
6872 }
6873
6874 /* UNSUPPORTED: val = get_param(cmd, "Tx_lgi_rate"); */
6875
6876 val = get_param(cmd, "Vht_tkip");
6877 if (val)
6878 tkip = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6879
6880 val = get_param(cmd, "Vht_wep");
6881 if (val)
6882 wep = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6883
6884 if (tkip != -1 || wep != -1) {
6885 if ((tkip == 1 && wep != 0) || (wep == 1 && tkip != 0)) {
6886 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 1",
6887 intf);
6888 } else if ((tkip == 0 && wep != 1) || (wep == 0 && tkip != 1)) {
6889 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 0",
6890 intf);
6891 } else {
6892 sigma_dut_print(dut, DUT_MSG_ERROR,
6893 "ErrorCode,mixed mode of VHT TKIP/WEP not supported");
6894 return 0;
6895 }
6896
6897 if (system(buf) != 0) {
6898 sigma_dut_print(dut, DUT_MSG_ERROR,
6899 "iwpriv htweptkip failed");
6900 }
6901 }
6902
Arif Hussain55f00da2018-07-03 08:28:26 -07006903 val = get_param(cmd, "txBandwidth");
6904 if (val) {
6905 switch (get_driver_type()) {
6906 case DRIVER_WCN:
6907 if (wcn_sta_set_width(dut, intf, val) < 0) {
6908 send_resp(dut, conn, SIGMA_ERROR,
6909 "ErrorCode,Failed to set txBandwidth");
6910 return 0;
6911 }
6912 break;
6913 case DRIVER_ATHEROS:
6914 if (ath_set_width(dut, conn, intf, val) < 0) {
6915 send_resp(dut, conn, SIGMA_ERROR,
6916 "ErrorCode,Failed to set txBandwidth");
6917 return 0;
6918 }
6919 break;
6920 default:
6921 sigma_dut_print(dut, DUT_MSG_ERROR,
6922 "Setting txBandwidth not supported");
6923 break;
6924 }
6925 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006926
Arif Hussain9765f7d2018-07-03 08:28:26 -07006927 val = get_param(cmd, "BeamformeeSTS");
6928 if (val) {
Kiran Kumar Lokerebc89d432018-07-10 12:20:13 -07006929 if (sta_set_tx_beamformee(dut, intf, 1)) {
6930 send_resp(dut, conn, SIGMA_ERROR,
6931 "ErrorCode,Failed to set TX beamformee enable");
6932 return 0;
6933 }
6934
Arif Hussain9765f7d2018-07-03 08:28:26 -07006935 if (sta_set_beamformee_sts(dut, intf, atoi(val))) {
6936 send_resp(dut, conn, SIGMA_ERROR,
6937 "ErrorCode,Failed to set BeamformeeSTS");
6938 return 0;
6939 }
6940 }
6941
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006942 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6943}
6944
6945
6946static int sta_set_wireless_60g(struct sigma_dut *dut,
6947 struct sigma_conn *conn,
6948 struct sigma_cmd *cmd)
6949{
6950 const char *dev_role = get_param(cmd, "DevRole");
6951
6952 if (!dev_role) {
6953 send_resp(dut, conn, SIGMA_INVALID,
6954 "ErrorCode,DevRole not specified");
6955 return 0;
6956 }
6957
6958 if (strcasecmp(dev_role, "PCP") == 0)
6959 return sta_set_60g_pcp(dut, conn, cmd);
6960 if (strcasecmp(dev_role, "STA") == 0)
6961 return sta_set_60g_sta(dut, conn, cmd);
6962 send_resp(dut, conn, SIGMA_INVALID,
6963 "ErrorCode,DevRole not supported");
6964 return 0;
6965}
6966
6967
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306968static int sta_set_wireless_oce(struct sigma_dut *dut, struct sigma_conn *conn,
6969 struct sigma_cmd *cmd)
6970{
6971 int status;
6972 const char *intf = get_param(cmd, "Interface");
6973 const char *val = get_param(cmd, "DevRole");
6974
6975 if (val && strcasecmp(val, "STA-CFON") == 0) {
6976 status = sta_cfon_set_wireless(dut, conn, cmd);
6977 if (status)
6978 return status;
6979 }
6980 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6981}
6982
6983
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006984static int cmd_sta_set_wireless(struct sigma_dut *dut, struct sigma_conn *conn,
6985 struct sigma_cmd *cmd)
6986{
6987 const char *val;
6988
6989 val = get_param(cmd, "Program");
6990 if (val) {
6991 if (strcasecmp(val, "11n") == 0)
6992 return cmd_sta_set_11n(dut, conn, cmd);
Amarnath Hullur Subramanyam4f860292018-01-31 03:49:35 -08006993 if (strcasecmp(val, "VHT") == 0 || strcasecmp(val, "HE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006994 return cmd_sta_set_wireless_vht(dut, conn, cmd);
6995 if (strcasecmp(val, "60ghz") == 0)
6996 return sta_set_wireless_60g(dut, conn, cmd);
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306997 if (strcasecmp(val, "OCE") == 0)
6998 return sta_set_wireless_oce(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006999 send_resp(dut, conn, SIGMA_ERROR,
7000 "ErrorCode,Program value not supported");
7001 } else {
7002 send_resp(dut, conn, SIGMA_ERROR,
7003 "ErrorCode,Program argument not available");
7004 }
7005
7006 return 0;
7007}
7008
7009
7010static void ath_sta_inject_frame(struct sigma_dut *dut, const char *intf,
7011 int tid)
7012{
7013 char buf[100];
7014 int tid_to_dscp [] = { 0x00, 0x20, 0x40, 0x60, 0x80, 0xa0, 0xc0, 0xe0 };
7015
Pradeep Reddy POTTETId31d1322016-10-13 17:22:03 +05307016 if (tid < 0 ||
7017 tid >= (int) (sizeof(tid_to_dscp) / sizeof(tid_to_dscp[0]))) {
7018 sigma_dut_print(dut, DUT_MSG_ERROR, "Unsupported TID: %d", tid);
7019 return;
7020 }
7021
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007022 /*
7023 * Two ways to ensure that addba request with a
7024 * non zero TID could be sent out. EV 117296
7025 */
7026 snprintf(buf, sizeof(buf),
7027 "ping -c 8 -Q %d `arp -a | grep wlan0 | awk '{print $2}' | tr -d '()'`",
7028 tid);
7029 if (system(buf) != 0) {
7030 sigma_dut_print(dut, DUT_MSG_ERROR,
7031 "Ping did not send out");
7032 }
7033
7034 snprintf(buf, sizeof(buf),
7035 "iwconfig %s | grep Access | awk '{print $6}' > %s",
7036 intf, VI_QOS_TMP_FILE);
7037 if (system(buf) != 0)
7038 return;
7039
7040 snprintf(buf, sizeof(buf),
7041 "ifconfig %s | grep HWaddr | cut -b 39-56 >> %s",
7042 intf, VI_QOS_TMP_FILE);
7043 if (system(buf) != 0)
7044 sigma_dut_print(dut, DUT_MSG_ERROR, "HWaddr matching failed");
7045
7046 snprintf(buf,sizeof(buf), "sed -n '3,$p' %s >> %s",
7047 VI_QOS_REFFILE, VI_QOS_TMP_FILE);
7048 if (system(buf) != 0) {
7049 sigma_dut_print(dut, DUT_MSG_ERROR,
7050 "VI_QOS_TEMP_FILE generation error failed");
7051 }
7052 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
7053 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
7054 if (system(buf) != 0) {
7055 sigma_dut_print(dut, DUT_MSG_ERROR,
7056 "VI_QOS_FILE generation failed");
7057 }
7058
7059 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
7060 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
7061 if (system(buf) != 0) {
7062 sigma_dut_print(dut, DUT_MSG_ERROR,
7063 "VI_QOS_FILE generation failed");
7064 }
7065
7066 snprintf(buf, sizeof(buf), "ethinject %s %s", intf, VI_QOS_FILE);
7067 if (system(buf) != 0) {
7068 }
7069}
7070
7071
7072static int ath_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7073 struct sigma_cmd *cmd)
7074{
7075 const char *intf = get_param(cmd, "Interface");
7076 const char *val;
7077 int tid = 0;
7078 char buf[100];
7079
7080 val = get_param(cmd, "TID");
7081 if (val) {
7082 tid = atoi(val);
7083 if (tid)
7084 ath_sta_inject_frame(dut, intf, tid);
7085 }
7086
7087 /* Command sequence for ADDBA request on Peregrine based devices */
7088 snprintf(buf, sizeof(buf), "iwpriv %s setaddbaoper 1", intf);
7089 if (system(buf) != 0) {
7090 sigma_dut_print(dut, DUT_MSG_ERROR,
7091 "iwpriv setaddbaoper failed");
7092 }
7093
7094 snprintf(buf, sizeof(buf), "wifitool %s senddelba 1 %d 1 4", intf, tid);
7095 if (system(buf) != 0) {
7096 sigma_dut_print(dut, DUT_MSG_ERROR,
7097 "wifitool senddelba failed");
7098 }
7099
7100 snprintf(buf, sizeof(buf), "wifitool %s sendaddba 1 %d 64", intf, tid);
7101 if (system(buf) != 0) {
7102 sigma_dut_print(dut, DUT_MSG_ERROR,
7103 "wifitool sendaddba failed");
7104 }
7105
7106 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7107
7108 return 1;
7109}
7110
7111
Lior David9981b512017-01-20 13:16:40 +02007112#ifdef __linux__
7113
7114static int wil6210_send_addba(struct sigma_dut *dut, const char *dest_mac,
7115 int agg_size)
7116{
7117 char dir[128], buf[128];
7118 FILE *f;
7119 regex_t re;
7120 regmatch_t m[2];
7121 int rc, ret = -1, vring_id, found;
7122
7123 if (wil6210_get_debugfs_dir(dut, dir, sizeof(dir))) {
7124 sigma_dut_print(dut, DUT_MSG_ERROR,
7125 "failed to get wil6210 debugfs dir");
7126 return -1;
7127 }
7128
7129 snprintf(buf, sizeof(buf), "%s/vrings", dir);
7130 f = fopen(buf, "r");
7131 if (!f) {
7132 sigma_dut_print(dut, DUT_MSG_ERROR, "failed to open: %s", buf);
7133 return -1;
7134 }
7135
7136 if (regcomp(&re, "VRING tx_[ \t]*([0-9]+)", REG_EXTENDED)) {
7137 sigma_dut_print(dut, DUT_MSG_ERROR, "regcomp failed");
7138 goto out;
7139 }
7140
7141 /* find TX VRING for the mac address */
7142 found = 0;
7143 while (fgets(buf, sizeof(buf), f)) {
7144 if (strcasestr(buf, dest_mac)) {
7145 found = 1;
7146 break;
7147 }
7148 }
7149
7150 if (!found) {
7151 sigma_dut_print(dut, DUT_MSG_ERROR,
7152 "no TX VRING for %s", dest_mac);
7153 goto out;
7154 }
7155
7156 /* extract VRING ID, "VRING tx_<id> = {" */
7157 if (!fgets(buf, sizeof(buf), f)) {
7158 sigma_dut_print(dut, DUT_MSG_ERROR,
7159 "no VRING start line for %s", dest_mac);
7160 goto out;
7161 }
7162
7163 rc = regexec(&re, buf, 2, m, 0);
7164 regfree(&re);
7165 if (rc || m[1].rm_so < 0) {
7166 sigma_dut_print(dut, DUT_MSG_ERROR,
7167 "no VRING TX ID for %s", dest_mac);
7168 goto out;
7169 }
7170 buf[m[1].rm_eo] = 0;
7171 vring_id = atoi(&buf[m[1].rm_so]);
7172
7173 /* send the addba command */
7174 fclose(f);
7175 snprintf(buf, sizeof(buf), "%s/back", dir);
7176 f = fopen(buf, "w");
7177 if (!f) {
7178 sigma_dut_print(dut, DUT_MSG_ERROR,
7179 "failed to open: %s", buf);
7180 return -1;
7181 }
7182
7183 fprintf(f, "add %d %d\n", vring_id, agg_size);
7184
7185 ret = 0;
7186
7187out:
7188 fclose(f);
7189
7190 return ret;
7191}
7192
7193
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007194static int send_addba_60g(struct sigma_dut *dut, struct sigma_conn *conn,
7195 struct sigma_cmd *cmd)
7196{
7197 const char *val;
7198 int tid = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007199
7200 val = get_param(cmd, "TID");
7201 if (val) {
7202 tid = atoi(val);
7203 if (tid != 0) {
7204 sigma_dut_print(dut, DUT_MSG_ERROR,
7205 "Ignore TID %d for send_addba use TID 0 for 60g since only 0 required on TX",
7206 tid);
7207 }
7208 }
7209
7210 val = get_param(cmd, "Dest_mac");
7211 if (!val) {
7212 sigma_dut_print(dut, DUT_MSG_ERROR,
7213 "Currently not supporting addba for 60G without Dest_mac");
7214 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
7215 }
7216
Lior David9981b512017-01-20 13:16:40 +02007217 if (wil6210_send_addba(dut, val, dut->back_rcv_buf))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007218 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007219
7220 return 1;
7221}
7222
Lior David9981b512017-01-20 13:16:40 +02007223#endif /* __linux__ */
7224
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007225
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007226static int wcn_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7227 struct sigma_cmd *cmd)
7228{
7229#ifdef NL80211_SUPPORT
7230 const char *intf = get_param(cmd, "Interface");
7231 const char *val;
7232 int tid = -1;
7233 int bufsize = 64;
7234 struct nl_msg *msg;
7235 int ret = 0;
7236 struct nlattr *params;
7237 int ifindex;
7238
7239 val = get_param(cmd, "TID");
7240 if (val)
7241 tid = atoi(val);
7242
7243 if (tid == -1) {
7244 send_resp(dut, conn, SIGMA_ERROR,
7245 "ErrorCode,sta_send_addba tid invalid");
7246 return 0;
7247 }
7248
7249 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7250
7251 ifindex = if_nametoindex(intf);
7252 if (ifindex == 0) {
7253 sigma_dut_print(dut, DUT_MSG_ERROR,
7254 "%s: Index for interface %s failed",
7255 __func__, intf);
7256 send_resp(dut, conn, SIGMA_ERROR,
7257 "ErrorCode,sta_send_addba interface invalid");
7258 return 0;
7259 }
7260
7261 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
7262 NL80211_CMD_VENDOR)) ||
7263 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
7264 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
7265 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
7266 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
7267 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
7268 nla_put_u8(msg,
7269 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADD_DEL_BA_SESSION,
7270 QCA_WLAN_ADD_BA) ||
7271 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_BA_TID,
7272 tid) ||
7273 nla_put_u8(msg,
7274 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
7275 bufsize)) {
7276 sigma_dut_print(dut, DUT_MSG_ERROR,
7277 "%s: err in adding vendor_cmd and vendor_data",
7278 __func__);
7279 nlmsg_free(msg);
7280 send_resp(dut, conn, SIGMA_ERROR,
7281 "ErrorCode,sta_send_addba err in adding vendor_cmd and vendor_data");
7282 return 0;
7283 }
7284 nla_nest_end(msg, params);
7285
7286 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
7287 if (ret) {
7288 sigma_dut_print(dut, DUT_MSG_ERROR,
7289 "%s: err in send_and_recv_msgs, ret=%d",
7290 __func__, ret);
Sunil Dutt30605592018-05-04 20:35:50 +05307291 if (ret == -EOPNOTSUPP)
7292 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007293 send_resp(dut, conn, SIGMA_ERROR,
7294 "ErrorCode,sta_send_addba err in send_and_recv_msgs");
7295 return 0;
7296 }
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007297#else /* NL80211_SUPPORT */
7298 sigma_dut_print(dut, DUT_MSG_ERROR,
7299 "sta_send_addba not supported without NL80211_SUPPORT defined");
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007300#endif /* NL80211_SUPPORT */
Sunil Dutt30605592018-05-04 20:35:50 +05307301
7302 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007303}
7304
7305
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007306static int cmd_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7307 struct sigma_cmd *cmd)
7308{
7309 switch (get_driver_type()) {
7310 case DRIVER_ATHEROS:
7311 return ath_sta_send_addba(dut, conn, cmd);
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007312 case DRIVER_WCN:
7313 return wcn_sta_send_addba(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007314#ifdef __linux__
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007315 case DRIVER_WIL6210:
7316 return send_addba_60g(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007317#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007318 default:
7319 /*
7320 * There is no driver specific implementation for other drivers.
7321 * Ignore the command and report COMPLETE since the following
7322 * throughput test operation will end up sending ADDBA anyway.
7323 */
7324 return 1;
7325 }
7326}
7327
7328
7329int inject_eth_frame(int s, const void *data, size_t len,
7330 unsigned short ethtype, char *dst, char *src)
7331{
7332 struct iovec iov[4] = {
7333 {
7334 .iov_base = dst,
7335 .iov_len = ETH_ALEN,
7336 },
7337 {
7338 .iov_base = src,
7339 .iov_len = ETH_ALEN,
7340 },
7341 {
7342 .iov_base = &ethtype,
7343 .iov_len = sizeof(unsigned short),
7344 },
7345 {
7346 .iov_base = (void *) data,
7347 .iov_len = len,
7348 }
7349 };
7350 struct msghdr msg = {
7351 .msg_name = NULL,
7352 .msg_namelen = 0,
7353 .msg_iov = iov,
7354 .msg_iovlen = 4,
7355 .msg_control = NULL,
7356 .msg_controllen = 0,
7357 .msg_flags = 0,
7358 };
7359
7360 return sendmsg(s, &msg, 0);
7361}
7362
7363#if defined(__linux__) || defined(__QNXNTO__)
7364
7365int inject_frame(int s, const void *data, size_t len, int encrypt)
7366{
7367#define IEEE80211_RADIOTAP_F_WEP 0x04
7368#define IEEE80211_RADIOTAP_F_FRAG 0x08
7369 unsigned char rtap_hdr[] = {
7370 0x00, 0x00, /* radiotap version */
7371 0x0e, 0x00, /* radiotap length */
7372 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
7373 IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
7374 0x00, /* padding */
7375 0x00, 0x00, /* RX and TX flags to indicate that */
7376 0x00, 0x00, /* this is the injected frame directly */
7377 };
7378 struct iovec iov[2] = {
7379 {
7380 .iov_base = &rtap_hdr,
7381 .iov_len = sizeof(rtap_hdr),
7382 },
7383 {
7384 .iov_base = (void *) data,
7385 .iov_len = len,
7386 }
7387 };
7388 struct msghdr msg = {
7389 .msg_name = NULL,
7390 .msg_namelen = 0,
7391 .msg_iov = iov,
7392 .msg_iovlen = 2,
7393 .msg_control = NULL,
7394 .msg_controllen = 0,
7395 .msg_flags = 0,
7396 };
7397
7398 if (encrypt)
7399 rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
7400
7401 return sendmsg(s, &msg, 0);
7402}
7403
7404
7405int open_monitor(const char *ifname)
7406{
7407#ifdef __QNXNTO__
7408 struct sockaddr_dl ll;
7409 int s;
7410
7411 memset(&ll, 0, sizeof(ll));
7412 ll.sdl_family = AF_LINK;
7413 ll.sdl_index = if_nametoindex(ifname);
7414 if (ll.sdl_index == 0) {
7415 perror("if_nametoindex");
7416 return -1;
7417 }
7418 s = socket(PF_INET, SOCK_RAW, 0);
7419#else /* __QNXNTO__ */
7420 struct sockaddr_ll ll;
7421 int s;
7422
7423 memset(&ll, 0, sizeof(ll));
7424 ll.sll_family = AF_PACKET;
7425 ll.sll_ifindex = if_nametoindex(ifname);
7426 if (ll.sll_ifindex == 0) {
7427 perror("if_nametoindex");
7428 return -1;
7429 }
7430 s = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
7431#endif /* __QNXNTO__ */
7432 if (s < 0) {
7433 perror("socket[PF_PACKET,SOCK_RAW]");
7434 return -1;
7435 }
7436
7437 if (bind(s, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
7438 perror("monitor socket bind");
7439 close(s);
7440 return -1;
7441 }
7442
7443 return s;
7444}
7445
7446
7447static int hex2num(char c)
7448{
7449 if (c >= '0' && c <= '9')
7450 return c - '0';
7451 if (c >= 'a' && c <= 'f')
7452 return c - 'a' + 10;
7453 if (c >= 'A' && c <= 'F')
7454 return c - 'A' + 10;
7455 return -1;
7456}
7457
7458
7459int hwaddr_aton(const char *txt, unsigned char *addr)
7460{
7461 int i;
7462
7463 for (i = 0; i < 6; i++) {
7464 int a, b;
7465
7466 a = hex2num(*txt++);
7467 if (a < 0)
7468 return -1;
7469 b = hex2num(*txt++);
7470 if (b < 0)
7471 return -1;
7472 *addr++ = (a << 4) | b;
7473 if (i < 5 && *txt++ != ':')
7474 return -1;
7475 }
7476
7477 return 0;
7478}
7479
7480#endif /* defined(__linux__) || defined(__QNXNTO__) */
7481
7482enum send_frame_type {
7483 DISASSOC, DEAUTH, SAQUERY, AUTH, ASSOCREQ, REASSOCREQ, DLS_REQ
7484};
7485enum send_frame_protection {
7486 CORRECT_KEY, INCORRECT_KEY, UNPROTECTED
7487};
7488
7489
7490static int sta_inject_frame(struct sigma_dut *dut, struct sigma_conn *conn,
7491 enum send_frame_type frame,
7492 enum send_frame_protection protected,
7493 const char *dest)
7494{
7495#ifdef __linux__
7496 unsigned char buf[1000], *pos;
7497 int s, res;
7498 char bssid[20], addr[20];
7499 char result[32], ssid[100];
7500 size_t ssid_len;
7501
7502 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
7503 sizeof(result)) < 0 ||
7504 strncmp(result, "COMPLETED", 9) != 0) {
7505 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Not connected");
7506 return 0;
7507 }
7508
7509 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
7510 < 0) {
7511 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7512 "current BSSID");
7513 return 0;
7514 }
7515
7516 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
7517 < 0) {
7518 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7519 "own MAC address");
7520 return 0;
7521 }
7522
7523 if (get_wpa_status(get_station_ifname(), "ssid", ssid, sizeof(ssid))
7524 < 0) {
7525 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7526 "current SSID");
7527 return 0;
7528 }
7529 ssid_len = strlen(ssid);
7530
7531 pos = buf;
7532
7533 /* Frame Control */
7534 switch (frame) {
7535 case DISASSOC:
7536 *pos++ = 0xa0;
7537 break;
7538 case DEAUTH:
7539 *pos++ = 0xc0;
7540 break;
7541 case SAQUERY:
7542 *pos++ = 0xd0;
7543 break;
7544 case AUTH:
7545 *pos++ = 0xb0;
7546 break;
7547 case ASSOCREQ:
7548 *pos++ = 0x00;
7549 break;
7550 case REASSOCREQ:
7551 *pos++ = 0x20;
7552 break;
7553 case DLS_REQ:
7554 *pos++ = 0xd0;
7555 break;
7556 }
7557
7558 if (protected == INCORRECT_KEY)
7559 *pos++ = 0x40; /* Set Protected field to 1 */
7560 else
7561 *pos++ = 0x00;
7562
7563 /* Duration */
7564 *pos++ = 0x00;
7565 *pos++ = 0x00;
7566
7567 /* addr1 = DA (current AP) */
7568 hwaddr_aton(bssid, pos);
7569 pos += 6;
7570 /* addr2 = SA (own address) */
7571 hwaddr_aton(addr, pos);
7572 pos += 6;
7573 /* addr3 = BSSID (current AP) */
7574 hwaddr_aton(bssid, pos);
7575 pos += 6;
7576
7577 /* Seq# (to be filled by driver/mac80211) */
7578 *pos++ = 0x00;
7579 *pos++ = 0x00;
7580
7581 if (protected == INCORRECT_KEY) {
7582 /* CCMP parameters */
7583 memcpy(pos, "\x61\x01\x00\x20\x00\x10\x00\x00", 8);
7584 pos += 8;
7585 }
7586
7587 if (protected == INCORRECT_KEY) {
7588 switch (frame) {
7589 case DEAUTH:
7590 /* Reason code (encrypted) */
7591 memcpy(pos, "\xa7\x39", 2);
7592 pos += 2;
7593 break;
7594 case DISASSOC:
7595 /* Reason code (encrypted) */
7596 memcpy(pos, "\xa7\x39", 2);
7597 pos += 2;
7598 break;
7599 case SAQUERY:
7600 /* Category|Action|TransID (encrypted) */
7601 memcpy(pos, "\x6f\xbd\xe9\x4d", 4);
7602 pos += 4;
7603 break;
7604 default:
7605 return -1;
7606 }
7607
7608 /* CCMP MIC */
7609 memcpy(pos, "\xc8\xd8\x3b\x06\x5d\xb7\x25\x68", 8);
7610 pos += 8;
7611 } else {
7612 switch (frame) {
7613 case DEAUTH:
7614 /* reason code = 8 */
7615 *pos++ = 0x08;
7616 *pos++ = 0x00;
7617 break;
7618 case DISASSOC:
7619 /* reason code = 8 */
7620 *pos++ = 0x08;
7621 *pos++ = 0x00;
7622 break;
7623 case SAQUERY:
7624 /* Category - SA Query */
7625 *pos++ = 0x08;
7626 /* SA query Action - Request */
7627 *pos++ = 0x00;
7628 /* Transaction ID */
7629 *pos++ = 0x12;
7630 *pos++ = 0x34;
7631 break;
7632 case AUTH:
7633 /* Auth Alg (Open) */
7634 *pos++ = 0x00;
7635 *pos++ = 0x00;
7636 /* Seq# */
7637 *pos++ = 0x01;
7638 *pos++ = 0x00;
7639 /* Status code */
7640 *pos++ = 0x00;
7641 *pos++ = 0x00;
7642 break;
7643 case ASSOCREQ:
7644 /* Capability Information */
7645 *pos++ = 0x31;
7646 *pos++ = 0x04;
7647 /* Listen Interval */
7648 *pos++ = 0x0a;
7649 *pos++ = 0x00;
7650 /* SSID */
7651 *pos++ = 0x00;
7652 *pos++ = ssid_len;
7653 memcpy(pos, ssid, ssid_len);
7654 pos += ssid_len;
7655 /* Supported Rates */
7656 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7657 10);
7658 pos += 10;
7659 /* Extended Supported Rates */
7660 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7661 pos += 6;
7662 /* RSN */
7663 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7664 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7665 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7666 pos += 28;
7667 break;
7668 case REASSOCREQ:
7669 /* Capability Information */
7670 *pos++ = 0x31;
7671 *pos++ = 0x04;
7672 /* Listen Interval */
7673 *pos++ = 0x0a;
7674 *pos++ = 0x00;
7675 /* Current AP */
7676 hwaddr_aton(bssid, pos);
7677 pos += 6;
7678 /* SSID */
7679 *pos++ = 0x00;
7680 *pos++ = ssid_len;
7681 memcpy(pos, ssid, ssid_len);
7682 pos += ssid_len;
7683 /* Supported Rates */
7684 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7685 10);
7686 pos += 10;
7687 /* Extended Supported Rates */
7688 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7689 pos += 6;
7690 /* RSN */
7691 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7692 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7693 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7694 pos += 28;
7695 break;
7696 case DLS_REQ:
7697 /* Category - DLS */
7698 *pos++ = 0x02;
7699 /* DLS Action - Request */
7700 *pos++ = 0x00;
7701 /* Destination MACAddress */
7702 if (dest)
7703 hwaddr_aton(dest, pos);
7704 else
7705 memset(pos, 0, 6);
7706 pos += 6;
7707 /* Source MACAddress */
7708 hwaddr_aton(addr, pos);
7709 pos += 6;
7710 /* Capability Information */
7711 *pos++ = 0x10; /* Privacy */
7712 *pos++ = 0x06; /* QoS */
7713 /* DLS Timeout Value */
7714 *pos++ = 0x00;
7715 *pos++ = 0x01;
7716 /* Supported rates */
7717 *pos++ = 0x01;
7718 *pos++ = 0x08;
7719 *pos++ = 0x0c; /* 6 Mbps */
7720 *pos++ = 0x12; /* 9 Mbps */
7721 *pos++ = 0x18; /* 12 Mbps */
7722 *pos++ = 0x24; /* 18 Mbps */
7723 *pos++ = 0x30; /* 24 Mbps */
7724 *pos++ = 0x48; /* 36 Mbps */
7725 *pos++ = 0x60; /* 48 Mbps */
7726 *pos++ = 0x6c; /* 54 Mbps */
7727 /* TODO: Extended Supported Rates */
7728 /* TODO: HT Capabilities */
7729 break;
7730 }
7731 }
7732
7733 s = open_monitor("sigmadut");
7734 if (s < 0) {
7735 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
7736 "monitor socket");
7737 return 0;
7738 }
7739
7740 res = inject_frame(s, buf, pos - buf, protected == CORRECT_KEY);
7741 if (res < 0) {
7742 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
7743 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307744 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007745 return 0;
7746 }
7747 if (res < pos - buf) {
7748 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Only partial "
7749 "frame sent");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307750 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007751 return 0;
7752 }
7753
7754 close(s);
7755
7756 return 1;
7757#else /* __linux__ */
7758 send_resp(dut, conn, SIGMA_ERROR, "errorCode,sta_send_frame not "
7759 "yet supported");
7760 return 0;
7761#endif /* __linux__ */
7762}
7763
7764
7765static int cmd_sta_send_frame_tdls(struct sigma_dut *dut,
7766 struct sigma_conn *conn,
7767 struct sigma_cmd *cmd)
7768{
7769 const char *intf = get_param(cmd, "Interface");
7770 const char *sta, *val;
7771 unsigned char addr[ETH_ALEN];
7772 char buf[100];
7773
7774 sta = get_param(cmd, "peer");
7775 if (sta == NULL)
7776 sta = get_param(cmd, "station");
7777 if (sta == NULL) {
7778 send_resp(dut, conn, SIGMA_ERROR,
7779 "ErrorCode,Missing peer address");
7780 return 0;
7781 }
7782 if (hwaddr_aton(sta, addr) < 0) {
7783 send_resp(dut, conn, SIGMA_ERROR,
7784 "ErrorCode,Invalid peer address");
7785 return 0;
7786 }
7787
7788 val = get_param(cmd, "type");
7789 if (val == NULL)
7790 return -1;
7791
7792 if (strcasecmp(val, "DISCOVERY") == 0) {
7793 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", sta);
7794 if (wpa_command(intf, buf) < 0) {
7795 send_resp(dut, conn, SIGMA_ERROR,
7796 "ErrorCode,Failed to send TDLS discovery");
7797 return 0;
7798 }
7799 return 1;
7800 }
7801
7802 if (strcasecmp(val, "SETUP") == 0) {
7803 int status = 0, timeout = 0;
7804
7805 val = get_param(cmd, "Status");
7806 if (val)
7807 status = atoi(val);
7808
7809 val = get_param(cmd, "Timeout");
7810 if (val)
7811 timeout = atoi(val);
7812
7813 if (status != 0 && status != 37) {
7814 send_resp(dut, conn, SIGMA_ERROR,
7815 "ErrorCode,Unsupported status value");
7816 return 0;
7817 }
7818
7819 if (timeout != 0 && timeout != 301) {
7820 send_resp(dut, conn, SIGMA_ERROR,
7821 "ErrorCode,Unsupported timeout value");
7822 return 0;
7823 }
7824
7825 if (status && timeout) {
7826 send_resp(dut, conn, SIGMA_ERROR,
7827 "ErrorCode,Unsupported timeout+status "
7828 "combination");
7829 return 0;
7830 }
7831
7832 if (status == 37 &&
7833 wpa_command(intf, "SET tdls_testing 0x200")) {
7834 send_resp(dut, conn, SIGMA_ERROR,
7835 "ErrorCode,Failed to enable "
7836 "decline setup response test mode");
7837 return 0;
7838 }
7839
7840 if (timeout == 301) {
7841 int res;
7842 if (dut->no_tpk_expiration)
7843 res = wpa_command(intf,
7844 "SET tdls_testing 0x108");
7845 else
7846 res = wpa_command(intf,
7847 "SET tdls_testing 0x8");
7848 if (res) {
7849 send_resp(dut, conn, SIGMA_ERROR,
7850 "ErrorCode,Failed to set short TPK "
7851 "lifetime");
7852 return 0;
7853 }
7854 }
7855
7856 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", sta);
7857 if (wpa_command(intf, buf) < 0) {
7858 send_resp(dut, conn, SIGMA_ERROR,
7859 "ErrorCode,Failed to send TDLS setup");
7860 return 0;
7861 }
7862 return 1;
7863 }
7864
7865 if (strcasecmp(val, "TEARDOWN") == 0) {
7866 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", sta);
7867 if (wpa_command(intf, buf) < 0) {
7868 send_resp(dut, conn, SIGMA_ERROR,
7869 "ErrorCode,Failed to send TDLS teardown");
7870 return 0;
7871 }
7872 return 1;
7873 }
7874
7875 send_resp(dut, conn, SIGMA_ERROR,
7876 "ErrorCode,Unsupported TDLS frame");
7877 return 0;
7878}
7879
7880
7881static int sta_ap_known(const char *ifname, const char *bssid)
7882{
7883 char buf[4096];
7884
7885 snprintf(buf, sizeof(buf), "BSS %s", bssid);
7886 if (wpa_command_resp(ifname, buf, buf, sizeof(buf)) < 0)
7887 return 0;
7888 if (strncmp(buf, "id=", 3) != 0)
7889 return 0;
7890 return 1;
7891}
7892
7893
7894static int sta_scan_ap(struct sigma_dut *dut, const char *ifname,
7895 const char *bssid)
7896{
7897 int res;
7898 struct wpa_ctrl *ctrl;
7899 char buf[256];
7900
7901 if (sta_ap_known(ifname, bssid))
7902 return 0;
7903 sigma_dut_print(dut, DUT_MSG_DEBUG,
7904 "AP not in BSS table - start scan");
7905
7906 ctrl = open_wpa_mon(ifname);
7907 if (ctrl == NULL) {
7908 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
7909 "wpa_supplicant monitor connection");
7910 return -1;
7911 }
7912
7913 if (wpa_command(ifname, "SCAN") < 0) {
7914 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to start scan");
7915 wpa_ctrl_detach(ctrl);
7916 wpa_ctrl_close(ctrl);
7917 return -1;
7918 }
7919
7920 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
7921 buf, sizeof(buf));
7922
7923 wpa_ctrl_detach(ctrl);
7924 wpa_ctrl_close(ctrl);
7925
7926 if (res < 0) {
7927 sigma_dut_print(dut, DUT_MSG_INFO, "Scan did not complete");
7928 return -1;
7929 }
7930
7931 if (sta_ap_known(ifname, bssid))
7932 return 0;
7933 sigma_dut_print(dut, DUT_MSG_INFO, "AP not in BSS table");
7934 return -1;
7935}
7936
7937
7938static int cmd_sta_send_frame_hs2_neighadv(struct sigma_dut *dut,
7939 struct sigma_conn *conn,
7940 struct sigma_cmd *cmd,
7941 const char *intf)
7942{
7943 char buf[200];
7944
7945 snprintf(buf, sizeof(buf), "ndsend 2001:DB8::1 %s", intf);
7946 if (system(buf) != 0) {
7947 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Failed to run "
7948 "ndsend");
7949 return 0;
7950 }
7951
7952 return 1;
7953}
7954
7955
7956static int cmd_sta_send_frame_hs2_neighsolreq(struct sigma_dut *dut,
7957 struct sigma_conn *conn,
7958 struct sigma_cmd *cmd,
7959 const char *intf)
7960{
7961 char buf[200];
7962 const char *ip = get_param(cmd, "SenderIP");
7963
Peng Xu26b356d2017-10-04 17:58:16 -07007964 if (!ip)
7965 return 0;
7966
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007967 snprintf(buf, sizeof(buf), "ndisc6 -nm %s %s -r 4", ip, intf);
7968 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7969 if (system(buf) == 0) {
7970 sigma_dut_print(dut, DUT_MSG_INFO,
7971 "Neighbor Solicitation got a response "
7972 "for %s@%s", ip, intf);
7973 }
7974
7975 return 1;
7976}
7977
7978
7979static int cmd_sta_send_frame_hs2_arpprobe(struct sigma_dut *dut,
7980 struct sigma_conn *conn,
7981 struct sigma_cmd *cmd,
7982 const char *ifname)
7983{
7984 char buf[200];
7985 const char *ip = get_param(cmd, "SenderIP");
7986
7987 if (ip == NULL) {
7988 send_resp(dut, conn, SIGMA_ERROR,
7989 "ErrorCode,Missing SenderIP parameter");
7990 return 0;
7991 }
7992 snprintf(buf, sizeof(buf), "arping -I %s -D %s -c 4", ifname, ip);
7993 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7994 if (system(buf) != 0) {
7995 sigma_dut_print(dut, DUT_MSG_INFO, "arping DAD got a response "
7996 "for %s@%s", ip, ifname);
7997 }
7998
7999 return 1;
8000}
8001
8002
8003static int cmd_sta_send_frame_hs2_arpannounce(struct sigma_dut *dut,
8004 struct sigma_conn *conn,
8005 struct sigma_cmd *cmd,
8006 const char *ifname)
8007{
8008 char buf[200];
8009 char ip[16];
8010 int s;
Peng Xub3756882017-10-04 14:39:09 -07008011 struct ifreq ifr;
8012 struct sockaddr_in saddr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008013
8014 s = socket(PF_INET, SOCK_DGRAM, 0);
Peng Xub3756882017-10-04 14:39:09 -07008015 if (s < 0) {
8016 perror("socket");
8017 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008018 }
8019
Peng Xub3756882017-10-04 14:39:09 -07008020 memset(&ifr, 0, sizeof(ifr));
8021 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
8022 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
8023 sigma_dut_print(dut, DUT_MSG_INFO,
8024 "Failed to get %s IP address: %s",
8025 ifname, strerror(errno));
8026 close(s);
8027 return -1;
8028 }
8029 close(s);
8030
8031 memcpy(&saddr, &ifr.ifr_addr, sizeof(struct sockaddr_in));
8032 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
8033
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008034 snprintf(buf, sizeof(buf), "arping -I %s -s %s %s -c 4", ifname, ip,
8035 ip);
8036 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8037 if (system(buf) != 0) {
8038 }
8039
8040 return 1;
8041}
8042
8043
8044static int cmd_sta_send_frame_hs2_arpreply(struct sigma_dut *dut,
8045 struct sigma_conn *conn,
8046 struct sigma_cmd *cmd,
8047 const char *ifname)
8048{
8049 char buf[200], addr[20];
8050 char dst[ETH_ALEN], src[ETH_ALEN];
8051 short ethtype = htons(ETH_P_ARP);
8052 char *pos;
8053 int s, res;
8054 const char *val;
8055 struct sockaddr_in taddr;
8056
8057 val = get_param(cmd, "dest");
8058 if (val)
8059 hwaddr_aton(val, (unsigned char *) dst);
8060
8061 val = get_param(cmd, "DestIP");
8062 if (val)
8063 inet_aton(val, &taddr.sin_addr);
Peng Xu151c9e12017-10-04 14:39:09 -07008064 else
8065 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008066
8067 if (get_wpa_status(get_station_ifname(), "address", addr,
8068 sizeof(addr)) < 0)
8069 return -2;
8070 hwaddr_aton(addr, (unsigned char *) src);
8071
8072 pos = buf;
8073 *pos++ = 0x00;
8074 *pos++ = 0x01;
8075 *pos++ = 0x08;
8076 *pos++ = 0x00;
8077 *pos++ = 0x06;
8078 *pos++ = 0x04;
8079 *pos++ = 0x00;
8080 *pos++ = 0x02;
8081 memcpy(pos, src, ETH_ALEN);
8082 pos += ETH_ALEN;
8083 memcpy(pos, &taddr.sin_addr, 4);
8084 pos += 4;
8085 memcpy(pos, dst, ETH_ALEN);
8086 pos += ETH_ALEN;
8087 memcpy(pos, &taddr.sin_addr, 4);
8088 pos += 4;
8089
8090 s = open_monitor(get_station_ifname());
8091 if (s < 0) {
8092 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
8093 "monitor socket");
8094 return 0;
8095 }
8096
8097 res = inject_eth_frame(s, buf, pos - buf, ethtype, dst, src);
8098 if (res < 0) {
8099 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
8100 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05308101 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008102 return 0;
8103 }
8104
8105 close(s);
8106
8107 return 1;
8108}
8109
8110
8111static int cmd_sta_send_frame_hs2_dls_req(struct sigma_dut *dut,
8112 struct sigma_conn *conn,
8113 struct sigma_cmd *cmd,
8114 const char *intf, const char *dest)
8115{
8116 char buf[100];
8117
8118 if (if_nametoindex("sigmadut") == 0) {
8119 snprintf(buf, sizeof(buf),
8120 "iw dev %s interface add sigmadut type monitor",
8121 get_station_ifname());
8122 if (system(buf) != 0 ||
8123 if_nametoindex("sigmadut") == 0) {
8124 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8125 "monitor interface with '%s'", buf);
8126 return -2;
8127 }
8128 }
8129
8130 if (system("ifconfig sigmadut up") != 0) {
8131 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8132 "monitor interface up");
8133 return -2;
8134 }
8135
8136 return sta_inject_frame(dut, conn, DLS_REQ, UNPROTECTED, dest);
8137}
8138
8139
8140static int cmd_sta_send_frame_hs2(struct sigma_dut *dut,
8141 struct sigma_conn *conn,
8142 struct sigma_cmd *cmd)
8143{
8144 const char *intf = get_param(cmd, "Interface");
8145 const char *dest = get_param(cmd, "Dest");
8146 const char *type = get_param(cmd, "FrameName");
8147 const char *val;
8148 char buf[200], *pos, *end;
8149 int count, count2;
8150
8151 if (type == NULL)
8152 type = get_param(cmd, "Type");
8153
8154 if (intf == NULL || dest == NULL || type == NULL)
8155 return -1;
8156
8157 if (strcasecmp(type, "NeighAdv") == 0)
8158 return cmd_sta_send_frame_hs2_neighadv(dut, conn, cmd, intf);
8159
8160 if (strcasecmp(type, "NeighSolicitReq") == 0)
8161 return cmd_sta_send_frame_hs2_neighsolreq(dut, conn, cmd, intf);
8162
8163 if (strcasecmp(type, "ARPProbe") == 0)
8164 return cmd_sta_send_frame_hs2_arpprobe(dut, conn, cmd, intf);
8165
8166 if (strcasecmp(type, "ARPAnnounce") == 0)
8167 return cmd_sta_send_frame_hs2_arpannounce(dut, conn, cmd, intf);
8168
8169 if (strcasecmp(type, "ARPReply") == 0)
8170 return cmd_sta_send_frame_hs2_arpreply(dut, conn, cmd, intf);
8171
8172 if (strcasecmp(type, "DLS-request") == 0 ||
8173 strcasecmp(type, "DLSrequest") == 0)
8174 return cmd_sta_send_frame_hs2_dls_req(dut, conn, cmd, intf,
8175 dest);
8176
8177 if (strcasecmp(type, "ANQPQuery") != 0 &&
8178 strcasecmp(type, "Query") != 0) {
8179 send_resp(dut, conn, SIGMA_ERROR,
8180 "ErrorCode,Unsupported HS 2.0 send frame type");
8181 return 0;
8182 }
8183
8184 if (sta_scan_ap(dut, intf, dest) < 0) {
8185 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not find "
8186 "the requested AP");
8187 return 0;
8188 }
8189
8190 pos = buf;
8191 end = buf + sizeof(buf);
8192 count = 0;
8193 pos += snprintf(pos, end - pos, "ANQP_GET %s ", dest);
8194
8195 val = get_param(cmd, "ANQP_CAP_LIST");
8196 if (val && atoi(val)) {
8197 pos += snprintf(pos, end - pos, "%s257", count > 0 ? "," : "");
8198 count++;
8199 }
8200
8201 val = get_param(cmd, "VENUE_NAME");
8202 if (val && atoi(val)) {
8203 pos += snprintf(pos, end - pos, "%s258", count > 0 ? "," : "");
8204 count++;
8205 }
8206
8207 val = get_param(cmd, "NETWORK_AUTH_TYPE");
8208 if (val && atoi(val)) {
8209 pos += snprintf(pos, end - pos, "%s260", count > 0 ? "," : "");
8210 count++;
8211 }
8212
8213 val = get_param(cmd, "ROAMING_CONS");
8214 if (val && atoi(val)) {
8215 pos += snprintf(pos, end - pos, "%s261", count > 0 ? "," : "");
8216 count++;
8217 }
8218
8219 val = get_param(cmd, "IP_ADDR_TYPE_AVAILABILITY");
8220 if (val && atoi(val)) {
8221 pos += snprintf(pos, end - pos, "%s262", count > 0 ? "," : "");
8222 count++;
8223 }
8224
8225 val = get_param(cmd, "NAI_REALM_LIST");
8226 if (val && atoi(val)) {
8227 pos += snprintf(pos, end - pos, "%s263", count > 0 ? "," : "");
8228 count++;
8229 }
8230
8231 val = get_param(cmd, "3GPP_INFO");
8232 if (val && atoi(val)) {
8233 pos += snprintf(pos, end - pos, "%s264", count > 0 ? "," : "");
8234 count++;
8235 }
8236
8237 val = get_param(cmd, "DOMAIN_LIST");
8238 if (val && atoi(val)) {
8239 pos += snprintf(pos, end - pos, "%s268", count > 0 ? "," : "");
8240 count++;
8241 }
8242
Jouni Malinen34cf9532018-04-29 19:26:33 +03008243 val = get_param(cmd, "Venue_URL");
8244 if (val && atoi(val)) {
8245 pos += snprintf(pos, end - pos, "%s277", count > 0 ? "," : "");
8246 count++;
8247 }
8248
Jouni Malinend3bca5d2018-04-29 17:25:23 +03008249 val = get_param(cmd, "Advice_Of_Charge");
8250 if (val && atoi(val)) {
8251 pos += snprintf(pos, end - pos, "%s278", count > 0 ? "," : "");
8252 count++;
8253 }
8254
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008255 if (count && wpa_command(intf, buf)) {
8256 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,ANQP_GET failed");
8257 return 0;
8258 }
8259
8260 pos = buf;
8261 end = buf + sizeof(buf);
8262 count2 = 0;
8263 pos += snprintf(pos, end - pos, "HS20_ANQP_GET %s ", dest);
8264
8265 val = get_param(cmd, "HS_CAP_LIST");
8266 if (val && atoi(val)) {
8267 pos += snprintf(pos, end - pos, "%s2", count2 > 0 ? "," : "");
8268 count2++;
8269 }
8270
8271 val = get_param(cmd, "OPER_NAME");
8272 if (val && atoi(val)) {
8273 pos += snprintf(pos, end - pos, "%s3", count2 > 0 ? "," : "");
8274 count2++;
8275 }
8276
8277 val = get_param(cmd, "WAN_METRICS");
8278 if (!val)
8279 val = get_param(cmd, "WAN_MAT");
8280 if (!val)
8281 val = get_param(cmd, "WAN_MET");
8282 if (val && atoi(val)) {
8283 pos += snprintf(pos, end - pos, "%s4", count2 > 0 ? "," : "");
8284 count2++;
8285 }
8286
8287 val = get_param(cmd, "CONNECTION_CAPABILITY");
8288 if (val && atoi(val)) {
8289 pos += snprintf(pos, end - pos, "%s5", count2 > 0 ? "," : "");
8290 count2++;
8291 }
8292
8293 val = get_param(cmd, "OP_CLASS");
8294 if (val && atoi(val)) {
8295 pos += snprintf(pos, end - pos, "%s7", count2 > 0 ? "," : "");
8296 count2++;
8297 }
8298
8299 val = get_param(cmd, "OSU_PROVIDER_LIST");
8300 if (val && atoi(val)) {
8301 pos += snprintf(pos, end - pos, "%s8", count2 > 0 ? "," : "");
8302 count2++;
8303 }
8304
Jouni Malinenf67afec2018-04-29 19:24:58 +03008305 val = get_param(cmd, "OPER_ICON_METADATA");
8306 if (!val)
8307 val = get_param(cmd, "OPERATOR_ICON_METADATA");
8308 if (val && atoi(val)) {
8309 pos += snprintf(pos, end - pos, "%s12", count2 > 0 ? "," : "");
8310 count2++;
8311 }
8312
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008313 if (count && count2) {
8314 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before sending out "
8315 "second query");
8316 sleep(1);
8317 }
8318
8319 if (count2 && wpa_command(intf, buf)) {
8320 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,HS20_ANQP_GET "
8321 "failed");
8322 return 0;
8323 }
8324
8325 val = get_param(cmd, "NAI_HOME_REALM_LIST");
8326 if (val) {
8327 if (count || count2) {
8328 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8329 "sending out second query");
8330 sleep(1);
8331 }
8332
8333 if (strcmp(val, "1") == 0)
8334 val = "mail.example.com";
8335 snprintf(buf, end - pos,
8336 "HS20_GET_NAI_HOME_REALM_LIST %s realm=%s",
8337 dest, val);
8338 if (wpa_command(intf, buf)) {
8339 send_resp(dut, conn, SIGMA_ERROR,
8340 "ErrorCode,HS20_GET_NAI_HOME_REALM_LIST "
8341 "failed");
8342 return 0;
8343 }
8344 }
8345
8346 val = get_param(cmd, "ICON_REQUEST");
8347 if (val) {
8348 if (count || count2) {
8349 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8350 "sending out second query");
8351 sleep(1);
8352 }
8353
8354 snprintf(buf, end - pos,
8355 "HS20_ICON_REQUEST %s %s", dest, val);
8356 if (wpa_command(intf, buf)) {
8357 send_resp(dut, conn, SIGMA_ERROR,
8358 "ErrorCode,HS20_ICON_REQUEST failed");
8359 return 0;
8360 }
8361 }
8362
8363 return 1;
8364}
8365
8366
8367static int ath_sta_send_frame_vht(struct sigma_dut *dut,
8368 struct sigma_conn *conn,
8369 struct sigma_cmd *cmd)
8370{
8371 const char *val;
8372 char *ifname;
8373 char buf[100];
8374 int chwidth, nss;
8375
8376 val = get_param(cmd, "framename");
8377 if (!val)
8378 return -1;
8379 sigma_dut_print(dut, DUT_MSG_DEBUG, "framename is %s", val);
8380
8381 /* Command sequence to generate Op mode notification */
8382 if (val && strcasecmp(val, "Op_md_notif_frm") == 0) {
8383 ifname = get_station_ifname();
8384
8385 /* Disable STBC */
8386 snprintf(buf, sizeof(buf),
8387 "iwpriv %s tx_stbc 0", ifname);
8388 if (system(buf) != 0) {
8389 sigma_dut_print(dut, DUT_MSG_ERROR,
8390 "iwpriv tx_stbc 0 failed!");
8391 }
8392
8393 /* Extract Channel width */
8394 val = get_param(cmd, "Channel_width");
8395 if (val) {
8396 switch (atoi(val)) {
8397 case 20:
8398 chwidth = 0;
8399 break;
8400 case 40:
8401 chwidth = 1;
8402 break;
8403 case 80:
8404 chwidth = 2;
8405 break;
8406 case 160:
8407 chwidth = 3;
8408 break;
8409 default:
8410 chwidth = 2;
8411 break;
8412 }
8413
8414 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
8415 ifname, chwidth);
8416 if (system(buf) != 0) {
8417 sigma_dut_print(dut, DUT_MSG_ERROR,
8418 "iwpriv chwidth failed!");
8419 }
8420 }
8421
8422 /* Extract NSS */
8423 val = get_param(cmd, "NSS");
8424 if (val) {
8425 switch (atoi(val)) {
8426 case 1:
8427 nss = 1;
8428 break;
8429 case 2:
8430 nss = 3;
8431 break;
8432 case 3:
8433 nss = 7;
8434 break;
8435 default:
8436 /* We do not support NSS > 3 */
8437 nss = 3;
8438 break;
8439 }
8440 snprintf(buf, sizeof(buf),
8441 "iwpriv %s rxchainmask %d", ifname, nss);
8442 if (system(buf) != 0) {
8443 sigma_dut_print(dut, DUT_MSG_ERROR,
8444 "iwpriv rxchainmask failed!");
8445 }
8446 }
8447
8448 /* Opmode notify */
8449 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", ifname);
8450 if (system(buf) != 0) {
8451 sigma_dut_print(dut, DUT_MSG_ERROR,
8452 "iwpriv opmode_notify failed!");
8453 } else {
8454 sigma_dut_print(dut, DUT_MSG_INFO,
8455 "Sent out the notify frame!");
8456 }
8457 }
8458
8459 return 1;
8460}
8461
8462
8463static int cmd_sta_send_frame_vht(struct sigma_dut *dut,
8464 struct sigma_conn *conn,
8465 struct sigma_cmd *cmd)
8466{
8467 switch (get_driver_type()) {
8468 case DRIVER_ATHEROS:
8469 return ath_sta_send_frame_vht(dut, conn, cmd);
8470 default:
8471 send_resp(dut, conn, SIGMA_ERROR,
8472 "errorCode,Unsupported sta_set_frame(VHT) with the current driver");
8473 return 0;
8474 }
8475}
8476
8477
Lior David0fe101e2017-03-09 16:09:50 +02008478#ifdef __linux__
8479int wil6210_send_frame_60g(struct sigma_dut *dut, struct sigma_conn *conn,
8480 struct sigma_cmd *cmd)
8481{
8482 const char *frame_name = get_param(cmd, "framename");
8483 const char *mac = get_param(cmd, "dest_mac");
8484
8485 if (!frame_name || !mac) {
8486 sigma_dut_print(dut, DUT_MSG_ERROR,
8487 "framename and dest_mac must be provided");
8488 return -1;
8489 }
8490
8491 if (strcasecmp(frame_name, "brp") == 0) {
8492 const char *l_rx = get_param(cmd, "L-RX");
8493 int l_rx_i;
8494
8495 if (!l_rx) {
8496 sigma_dut_print(dut, DUT_MSG_ERROR,
8497 "L-RX must be provided");
8498 return -1;
8499 }
8500 l_rx_i = atoi(l_rx);
8501
8502 sigma_dut_print(dut, DUT_MSG_INFO,
8503 "dev_send_frame: BRP-RX, dest_mac %s, L-RX %s",
8504 mac, l_rx);
8505 if (l_rx_i != 16) {
8506 sigma_dut_print(dut, DUT_MSG_ERROR,
8507 "unsupported L-RX: %s", l_rx);
8508 return -1;
8509 }
8510
8511 if (wil6210_send_brp_rx(dut, mac, l_rx_i))
8512 return -1;
8513 } else if (strcasecmp(frame_name, "ssw") == 0) {
8514 sigma_dut_print(dut, DUT_MSG_INFO,
8515 "dev_send_frame: SLS, dest_mac %s", mac);
8516 if (wil6210_send_sls(dut, mac))
8517 return -1;
8518 } else {
8519 sigma_dut_print(dut, DUT_MSG_ERROR,
8520 "unsupported frame type: %s", frame_name);
8521 return -1;
8522 }
8523
8524 return 1;
8525}
8526#endif /* __linux__ */
8527
8528
8529static int cmd_sta_send_frame_60g(struct sigma_dut *dut,
8530 struct sigma_conn *conn,
8531 struct sigma_cmd *cmd)
8532{
8533 switch (get_driver_type()) {
8534#ifdef __linux__
8535 case DRIVER_WIL6210:
8536 return wil6210_send_frame_60g(dut, conn, cmd);
8537#endif /* __linux__ */
8538 default:
8539 send_resp(dut, conn, SIGMA_ERROR,
8540 "errorCode,Unsupported sta_set_frame(60G) with the current driver");
8541 return 0;
8542 }
8543}
8544
8545
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308546static int mbo_send_anqp_query(struct sigma_dut *dut, struct sigma_conn *conn,
8547 const char *intf, struct sigma_cmd *cmd)
8548{
8549 const char *val, *addr;
8550 char buf[100];
8551
8552 addr = get_param(cmd, "DestMac");
8553 if (!addr) {
8554 send_resp(dut, conn, SIGMA_INVALID,
8555 "ErrorCode,AP MAC address is missing");
8556 return 0;
8557 }
8558
8559 val = get_param(cmd, "ANQPQuery_ID");
8560 if (!val) {
8561 send_resp(dut, conn, SIGMA_INVALID,
8562 "ErrorCode,Missing ANQPQuery_ID");
8563 return 0;
8564 }
8565
8566 if (strcasecmp(val, "NeighborReportReq") == 0) {
8567 snprintf(buf, sizeof(buf), "ANQP_GET %s 272", addr);
8568 } else if (strcasecmp(val, "QueryListWithCellPref") == 0) {
8569 snprintf(buf, sizeof(buf), "ANQP_GET %s 272,mbo:2", addr);
8570 } else {
8571 sigma_dut_print(dut, DUT_MSG_ERROR, "Invalid ANQPQuery_ID: %s",
8572 val);
8573 send_resp(dut, conn, SIGMA_INVALID,
8574 "ErrorCode,Invalid ANQPQuery_ID");
8575 return 0;
8576 }
8577
Ashwini Patild174f2c2017-04-13 16:49:46 +05308578 /* Set gas_address3 field to IEEE 802.11-2012 standard compliant form
8579 * (Address3 = Wildcard BSSID when sent to not-associated AP;
8580 * if associated, AP BSSID).
8581 */
8582 if (wpa_command(intf, "SET gas_address3 1") < 0) {
8583 send_resp(dut, conn, SIGMA_ERROR,
8584 "ErrorCode,Failed to set gas_address3");
8585 return 0;
8586 }
8587
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308588 if (wpa_command(intf, buf) < 0) {
8589 send_resp(dut, conn, SIGMA_ERROR,
8590 "ErrorCode,Failed to send ANQP query");
8591 return 0;
8592 }
8593
8594 return 1;
8595}
8596
8597
8598static int mbo_cmd_sta_send_frame(struct sigma_dut *dut,
8599 struct sigma_conn *conn,
8600 const char *intf,
8601 struct sigma_cmd *cmd)
8602{
8603 const char *val = get_param(cmd, "FrameName");
8604
8605 if (val && strcasecmp(val, "ANQPQuery") == 0)
8606 return mbo_send_anqp_query(dut, conn, intf, cmd);
8607
8608 return 2;
8609}
8610
8611
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008612int cmd_sta_send_frame(struct sigma_dut *dut, struct sigma_conn *conn,
8613 struct sigma_cmd *cmd)
8614{
8615 const char *intf = get_param(cmd, "Interface");
8616 const char *val;
8617 enum send_frame_type frame;
8618 enum send_frame_protection protected;
8619 char buf[100];
8620 unsigned char addr[ETH_ALEN];
8621 int res;
8622
8623 val = get_param(cmd, "program");
8624 if (val == NULL)
8625 val = get_param(cmd, "frame");
8626 if (val && strcasecmp(val, "TDLS") == 0)
8627 return cmd_sta_send_frame_tdls(dut, conn, cmd);
8628 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008629 strcasecmp(val, "HS2-R2") == 0 ||
8630 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008631 return cmd_sta_send_frame_hs2(dut, conn, cmd);
8632 if (val && strcasecmp(val, "VHT") == 0)
8633 return cmd_sta_send_frame_vht(dut, conn, cmd);
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07008634 if (val && strcasecmp(val, "LOC") == 0)
8635 return loc_cmd_sta_send_frame(dut, conn, cmd);
Lior David0fe101e2017-03-09 16:09:50 +02008636 if (val && strcasecmp(val, "60GHz") == 0)
8637 return cmd_sta_send_frame_60g(dut, conn, cmd);
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308638 if (val && strcasecmp(val, "MBO") == 0) {
8639 res = mbo_cmd_sta_send_frame(dut, conn, intf, cmd);
8640 if (res != 2)
8641 return res;
8642 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008643
8644 val = get_param(cmd, "TD_DISC");
8645 if (val) {
8646 if (hwaddr_aton(val, addr) < 0)
8647 return -1;
8648 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", val);
8649 if (wpa_command(intf, buf) < 0) {
8650 send_resp(dut, conn, SIGMA_ERROR,
8651 "ErrorCode,Failed to send TDLS discovery");
8652 return 0;
8653 }
8654 return 1;
8655 }
8656
8657 val = get_param(cmd, "TD_Setup");
8658 if (val) {
8659 if (hwaddr_aton(val, addr) < 0)
8660 return -1;
8661 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", val);
8662 if (wpa_command(intf, buf) < 0) {
8663 send_resp(dut, conn, SIGMA_ERROR,
8664 "ErrorCode,Failed to start TDLS setup");
8665 return 0;
8666 }
8667 return 1;
8668 }
8669
8670 val = get_param(cmd, "TD_TearDown");
8671 if (val) {
8672 if (hwaddr_aton(val, addr) < 0)
8673 return -1;
8674 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", val);
8675 if (wpa_command(intf, buf) < 0) {
8676 send_resp(dut, conn, SIGMA_ERROR,
8677 "ErrorCode,Failed to tear down TDLS link");
8678 return 0;
8679 }
8680 return 1;
8681 }
8682
8683 val = get_param(cmd, "TD_ChannelSwitch");
8684 if (val) {
8685 /* TODO */
8686 send_resp(dut, conn, SIGMA_ERROR,
8687 "ErrorCode,TD_ChannelSwitch not yet supported");
8688 return 0;
8689 }
8690
8691 val = get_param(cmd, "TD_NF");
8692 if (val) {
8693 /* TODO */
8694 send_resp(dut, conn, SIGMA_ERROR,
8695 "ErrorCode,TD_NF not yet supported");
8696 return 0;
8697 }
8698
8699 val = get_param(cmd, "PMFFrameType");
8700 if (val == NULL)
8701 val = get_param(cmd, "FrameName");
8702 if (val == NULL)
8703 val = get_param(cmd, "Type");
8704 if (val == NULL)
8705 return -1;
8706 if (strcasecmp(val, "disassoc") == 0)
8707 frame = DISASSOC;
8708 else if (strcasecmp(val, "deauth") == 0)
8709 frame = DEAUTH;
8710 else if (strcasecmp(val, "saquery") == 0)
8711 frame = SAQUERY;
8712 else if (strcasecmp(val, "auth") == 0)
8713 frame = AUTH;
8714 else if (strcasecmp(val, "assocreq") == 0)
8715 frame = ASSOCREQ;
8716 else if (strcasecmp(val, "reassocreq") == 0)
8717 frame = REASSOCREQ;
8718 else if (strcasecmp(val, "neigreq") == 0) {
8719 sigma_dut_print(dut, DUT_MSG_INFO, "Got neighbor request");
8720
8721 val = get_param(cmd, "ssid");
8722 if (val == NULL)
8723 return -1;
8724
8725 res = send_neighbor_request(dut, intf, val);
8726 if (res) {
8727 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8728 "Failed to send neighbor report request");
8729 return 0;
8730 }
8731
8732 return 1;
Ashwini Patil5acd7382017-04-13 15:55:04 +05308733 } else if (strcasecmp(val, "transmgmtquery") == 0 ||
8734 strcasecmp(val, "BTMQuery") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008735 sigma_dut_print(dut, DUT_MSG_DEBUG,
8736 "Got Transition Management Query");
8737
Ashwini Patil5acd7382017-04-13 15:55:04 +05308738 res = send_trans_mgmt_query(dut, intf, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008739 if (res) {
8740 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8741 "Failed to send Transition Management Query");
8742 return 0;
8743 }
8744
8745 return 1;
8746 } else {
8747 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8748 "PMFFrameType");
8749 return 0;
8750 }
8751
8752 val = get_param(cmd, "PMFProtected");
8753 if (val == NULL)
8754 val = get_param(cmd, "Protected");
8755 if (val == NULL)
8756 return -1;
8757 if (strcasecmp(val, "Correct-key") == 0 ||
8758 strcasecmp(val, "CorrectKey") == 0)
8759 protected = CORRECT_KEY;
8760 else if (strcasecmp(val, "IncorrectKey") == 0)
8761 protected = INCORRECT_KEY;
8762 else if (strcasecmp(val, "Unprotected") == 0)
8763 protected = UNPROTECTED;
8764 else {
8765 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8766 "PMFProtected");
8767 return 0;
8768 }
8769
8770 if (protected != UNPROTECTED &&
8771 (frame == AUTH || frame == ASSOCREQ || frame == REASSOCREQ)) {
8772 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Impossible "
8773 "PMFProtected for auth/assocreq/reassocreq");
8774 return 0;
8775 }
8776
8777 if (if_nametoindex("sigmadut") == 0) {
8778 snprintf(buf, sizeof(buf),
8779 "iw dev %s interface add sigmadut type monitor",
8780 get_station_ifname());
8781 if (system(buf) != 0 ||
8782 if_nametoindex("sigmadut") == 0) {
8783 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8784 "monitor interface with '%s'", buf);
8785 return -2;
8786 }
8787 }
8788
8789 if (system("ifconfig sigmadut up") != 0) {
8790 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8791 "monitor interface up");
8792 return -2;
8793 }
8794
8795 return sta_inject_frame(dut, conn, frame, protected, NULL);
8796}
8797
8798
8799static int cmd_sta_set_parameter_hs2(struct sigma_dut *dut,
8800 struct sigma_conn *conn,
8801 struct sigma_cmd *cmd,
8802 const char *ifname)
8803{
8804 char buf[200];
8805 const char *val;
8806
8807 val = get_param(cmd, "ClearARP");
8808 if (val && atoi(val) == 1) {
8809 snprintf(buf, sizeof(buf), "ip neigh flush dev %s", ifname);
8810 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8811 if (system(buf) != 0) {
8812 send_resp(dut, conn, SIGMA_ERROR,
8813 "errorCode,Failed to clear ARP cache");
8814 return 0;
8815 }
8816 }
8817
8818 return 1;
8819}
8820
8821
8822int cmd_sta_set_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
8823 struct sigma_cmd *cmd)
8824{
8825 const char *intf = get_param(cmd, "Interface");
8826 const char *val;
8827
8828 if (intf == NULL)
8829 return -1;
8830
8831 val = get_param(cmd, "program");
8832 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008833 strcasecmp(val, "HS2-R2") == 0 ||
8834 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008835 return cmd_sta_set_parameter_hs2(dut, conn, cmd, intf);
8836
8837 return -1;
8838}
8839
8840
8841static int cmd_sta_set_macaddr(struct sigma_dut *dut, struct sigma_conn *conn,
8842 struct sigma_cmd *cmd)
8843{
8844 const char *intf = get_param(cmd, "Interface");
8845 const char *mac = get_param(cmd, "MAC");
8846
8847 if (intf == NULL || mac == NULL)
8848 return -1;
8849
8850 sigma_dut_print(dut, DUT_MSG_INFO, "Change local MAC address for "
8851 "interface %s to %s", intf, mac);
8852
8853 if (dut->set_macaddr) {
8854 char buf[128];
8855 int res;
8856 if (strcasecmp(mac, "default") == 0) {
8857 res = snprintf(buf, sizeof(buf), "%s",
8858 dut->set_macaddr);
8859 dut->tmp_mac_addr = 0;
8860 } else {
8861 res = snprintf(buf, sizeof(buf), "%s %s",
8862 dut->set_macaddr, mac);
8863 dut->tmp_mac_addr = 1;
8864 }
8865 if (res < 0 || res >= (int) sizeof(buf))
8866 return -1;
8867 if (system(buf) != 0) {
8868 send_resp(dut, conn, SIGMA_ERROR,
8869 "errorCode,Failed to set MAC "
8870 "address");
8871 return 0;
8872 }
8873 return 1;
8874 }
8875
8876 if (strcasecmp(mac, "default") == 0)
8877 return 1;
8878
8879 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8880 "command");
8881 return 0;
8882}
8883
8884
8885static int iwpriv_tdlsoffchnmode(struct sigma_dut *dut,
8886 struct sigma_conn *conn, const char *intf,
8887 int val)
8888{
8889 char buf[200];
8890 int res;
8891
8892 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchnmode %d",
8893 intf, val);
8894 if (res < 0 || res >= (int) sizeof(buf))
8895 return -1;
8896 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8897 if (system(buf) != 0) {
8898 send_resp(dut, conn, SIGMA_ERROR,
8899 "errorCode,Failed to configure offchannel mode");
8900 return 0;
8901 }
8902
8903 return 1;
8904}
8905
8906
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008907static int off_chan_val(enum sec_ch_offset off)
8908{
8909 switch (off) {
8910 case SEC_CH_NO:
8911 return 0;
8912 case SEC_CH_40ABOVE:
8913 return 40;
8914 case SEC_CH_40BELOW:
8915 return -40;
8916 }
8917
8918 return 0;
8919}
8920
8921
8922static int iwpriv_set_offchan(struct sigma_dut *dut, struct sigma_conn *conn,
8923 const char *intf, int off_ch_num,
8924 enum sec_ch_offset sec)
8925{
8926 char buf[200];
8927 int res;
8928
8929 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchan %d",
8930 intf, off_ch_num);
8931 if (res < 0 || res >= (int) sizeof(buf))
8932 return -1;
8933 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8934 if (system(buf) != 0) {
8935 send_resp(dut, conn, SIGMA_ERROR,
8936 "errorCode,Failed to set offchan");
8937 return 0;
8938 }
8939
8940 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsecchnoffst %d",
8941 intf, off_chan_val(sec));
8942 if (res < 0 || res >= (int) sizeof(buf))
8943 return -1;
8944 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8945 if (system(buf) != 0) {
8946 send_resp(dut, conn, SIGMA_ERROR,
8947 "errorCode,Failed to set sec chan offset");
8948 return 0;
8949 }
8950
8951 return 1;
8952}
8953
8954
8955static int tdls_set_offchannel_offset(struct sigma_dut *dut,
8956 struct sigma_conn *conn,
8957 const char *intf, int off_ch_num,
8958 enum sec_ch_offset sec)
8959{
8960 char buf[200];
8961 int res;
8962
8963 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNEL %d",
8964 off_ch_num);
8965 if (res < 0 || res >= (int) sizeof(buf))
8966 return -1;
8967 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8968
8969 if (wpa_command(intf, buf) < 0) {
8970 send_resp(dut, conn, SIGMA_ERROR,
8971 "ErrorCode,Failed to set offchan");
8972 return 0;
8973 }
8974 res = snprintf(buf, sizeof(buf), "DRIVER TDLSSECONDARYCHANNELOFFSET %d",
8975 off_chan_val(sec));
8976 if (res < 0 || res >= (int) sizeof(buf))
8977 return -1;
8978
8979 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8980
8981 if (wpa_command(intf, buf) < 0) {
8982 send_resp(dut, conn, SIGMA_ERROR,
8983 "ErrorCode,Failed to set sec chan offset");
8984 return 0;
8985 }
8986
8987 return 1;
8988}
8989
8990
8991static int tdls_set_offchannel_mode(struct sigma_dut *dut,
8992 struct sigma_conn *conn,
8993 const char *intf, int val)
8994{
8995 char buf[200];
8996 int res;
8997
8998 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNELMODE %d",
8999 val);
9000 if (res < 0 || res >= (int) sizeof(buf))
9001 return -1;
9002 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
9003
9004 if (wpa_command(intf, buf) < 0) {
9005 send_resp(dut, conn, SIGMA_ERROR,
9006 "ErrorCode,Failed to configure offchannel mode");
9007 return 0;
9008 }
9009
9010 return 1;
9011}
9012
9013
9014static int cmd_sta_set_rfeature_tdls(const char *intf, struct sigma_dut *dut,
9015 struct sigma_conn *conn,
9016 struct sigma_cmd *cmd)
9017{
9018 const char *val;
9019 enum {
9020 CHSM_NOT_SET,
9021 CHSM_ENABLE,
9022 CHSM_DISABLE,
9023 CHSM_REJREQ,
9024 CHSM_UNSOLRESP
9025 } chsm = CHSM_NOT_SET;
9026 int off_ch_num = -1;
9027 enum sec_ch_offset sec_ch = SEC_CH_NO;
9028 int res;
9029
9030 val = get_param(cmd, "Uapsd");
9031 if (val) {
9032 char buf[100];
9033 if (strcasecmp(val, "Enable") == 0)
9034 snprintf(buf, sizeof(buf), "SET ps 99");
9035 else if (strcasecmp(val, "Disable") == 0)
9036 snprintf(buf, sizeof(buf), "SET ps 98");
9037 else {
9038 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
9039 "Unsupported uapsd parameter value");
9040 return 0;
9041 }
9042 if (wpa_command(intf, buf)) {
9043 send_resp(dut, conn, SIGMA_ERROR,
9044 "ErrorCode,Failed to change U-APSD "
9045 "powersave mode");
9046 return 0;
9047 }
9048 }
9049
9050 val = get_param(cmd, "TPKTIMER");
9051 if (val && strcasecmp(val, "DISABLE") == 0) {
9052 if (wpa_command(intf, "SET tdls_testing 0x100")) {
9053 send_resp(dut, conn, SIGMA_ERROR,
9054 "ErrorCode,Failed to enable no TPK "
9055 "expiration test mode");
9056 return 0;
9057 }
9058 dut->no_tpk_expiration = 1;
9059 }
9060
9061 val = get_param(cmd, "ChSwitchMode");
9062 if (val) {
9063 if (strcasecmp(val, "Enable") == 0 ||
9064 strcasecmp(val, "Initiate") == 0)
9065 chsm = CHSM_ENABLE;
9066 else if (strcasecmp(val, "Disable") == 0 ||
9067 strcasecmp(val, "passive") == 0)
9068 chsm = CHSM_DISABLE;
9069 else if (strcasecmp(val, "RejReq") == 0)
9070 chsm = CHSM_REJREQ;
9071 else if (strcasecmp(val, "UnSolResp") == 0)
9072 chsm = CHSM_UNSOLRESP;
9073 else {
9074 send_resp(dut, conn, SIGMA_ERROR,
9075 "ErrorCode,Unknown ChSwitchMode value");
9076 return 0;
9077 }
9078 }
9079
9080 val = get_param(cmd, "OffChNum");
9081 if (val) {
9082 off_ch_num = atoi(val);
9083 if (off_ch_num == 0) {
9084 send_resp(dut, conn, SIGMA_ERROR,
9085 "ErrorCode,Invalid OffChNum");
9086 return 0;
9087 }
9088 }
9089
9090 val = get_param(cmd, "SecChOffset");
9091 if (val) {
9092 if (strcmp(val, "20") == 0)
9093 sec_ch = SEC_CH_NO;
9094 else if (strcasecmp(val, "40above") == 0)
9095 sec_ch = SEC_CH_40ABOVE;
9096 else if (strcasecmp(val, "40below") == 0)
9097 sec_ch = SEC_CH_40BELOW;
9098 else {
9099 send_resp(dut, conn, SIGMA_ERROR,
9100 "ErrorCode,Unknown SecChOffset value");
9101 return 0;
9102 }
9103 }
9104
9105 if (chsm == CHSM_NOT_SET) {
9106 /* no offchannel changes requested */
9107 return 1;
9108 }
9109
9110 if (strcmp(intf, get_main_ifname()) != 0 &&
9111 strcmp(intf, get_station_ifname()) != 0) {
9112 send_resp(dut, conn, SIGMA_ERROR,
9113 "ErrorCode,Unknown interface");
9114 return 0;
9115 }
9116
9117 switch (chsm) {
9118 case CHSM_NOT_SET:
Jouni Malinen280f5ba2016-08-29 21:33:10 +03009119 res = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009120 break;
9121 case CHSM_ENABLE:
9122 if (off_ch_num < 0) {
9123 send_resp(dut, conn, SIGMA_ERROR,
9124 "ErrorCode,Missing OffChNum argument");
9125 return 0;
9126 }
9127 if (wifi_chip_type == DRIVER_WCN) {
9128 res = tdls_set_offchannel_offset(dut, conn, intf,
9129 off_ch_num, sec_ch);
9130 } else {
9131 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9132 sec_ch);
9133 }
9134 if (res != 1)
9135 return res;
9136 if (wifi_chip_type == DRIVER_WCN)
9137 res = tdls_set_offchannel_mode(dut, conn, intf, 1);
9138 else
9139 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 1);
9140 break;
9141 case CHSM_DISABLE:
9142 if (wifi_chip_type == DRIVER_WCN)
9143 res = tdls_set_offchannel_mode(dut, conn, intf, 2);
9144 else
9145 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 2);
9146 break;
9147 case CHSM_REJREQ:
9148 if (wifi_chip_type == DRIVER_WCN)
9149 res = tdls_set_offchannel_mode(dut, conn, intf, 3);
9150 else
9151 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 3);
9152 break;
9153 case CHSM_UNSOLRESP:
9154 if (off_ch_num < 0) {
9155 send_resp(dut, conn, SIGMA_ERROR,
9156 "ErrorCode,Missing OffChNum argument");
9157 return 0;
9158 }
9159 if (wifi_chip_type == DRIVER_WCN) {
9160 res = tdls_set_offchannel_offset(dut, conn, intf,
9161 off_ch_num, sec_ch);
9162 } else {
9163 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9164 sec_ch);
9165 }
9166 if (res != 1)
9167 return res;
9168 if (wifi_chip_type == DRIVER_WCN)
9169 res = tdls_set_offchannel_mode(dut, conn, intf, 4);
9170 else
9171 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 4);
9172 break;
9173 }
9174
9175 return res;
9176}
9177
9178
9179static int ath_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9180 struct sigma_conn *conn,
9181 struct sigma_cmd *cmd)
9182{
9183 const char *val;
9184 char *token, *result;
9185
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08009186 novap_reset(dut, intf);
9187
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009188 val = get_param(cmd, "nss_mcs_opt");
9189 if (val) {
9190 /* String (nss_operating_mode; mcs_operating_mode) */
9191 int nss, mcs;
9192 char buf[50];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309193 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009194
9195 token = strdup(val);
9196 if (!token)
9197 return 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309198 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309199 if (!result) {
9200 sigma_dut_print(dut, DUT_MSG_ERROR,
9201 "VHT NSS not specified");
9202 goto failed;
9203 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009204 if (strcasecmp(result, "def") != 0) {
9205 nss = atoi(result);
9206 if (nss == 4)
9207 ath_disable_txbf(dut, intf);
9208 snprintf(buf, sizeof(buf), "iwpriv %s nss %d",
9209 intf, nss);
9210 if (system(buf) != 0) {
9211 sigma_dut_print(dut, DUT_MSG_ERROR,
9212 "iwpriv nss failed");
9213 goto failed;
9214 }
9215 }
9216
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309217 result = strtok_r(NULL, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309218 if (!result) {
9219 sigma_dut_print(dut, DUT_MSG_ERROR,
9220 "VHT MCS not specified");
9221 goto failed;
9222 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009223 if (strcasecmp(result, "def") == 0) {
9224 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0",
9225 intf);
9226 if (system(buf) != 0) {
9227 sigma_dut_print(dut, DUT_MSG_ERROR,
9228 "iwpriv set11NRates failed");
9229 goto failed;
9230 }
9231
9232 } else {
9233 mcs = atoi(result);
9234 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
9235 intf, mcs);
9236 if (system(buf) != 0) {
9237 sigma_dut_print(dut, DUT_MSG_ERROR,
9238 "iwpriv vhtmcs failed");
9239 goto failed;
9240 }
9241 }
9242 /* Channel width gets messed up, fix this */
9243 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
9244 intf, dut->chwidth);
9245 if (system(buf) != 0) {
9246 sigma_dut_print(dut, DUT_MSG_ERROR,
9247 "iwpriv chwidth failed");
9248 }
9249 }
9250
9251 return 1;
9252failed:
9253 free(token);
9254 return 0;
9255}
9256
9257
9258static int cmd_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9259 struct sigma_conn *conn,
9260 struct sigma_cmd *cmd)
9261{
9262 switch (get_driver_type()) {
9263 case DRIVER_ATHEROS:
9264 return ath_sta_set_rfeature_vht(intf, dut, conn, cmd);
9265 default:
9266 send_resp(dut, conn, SIGMA_ERROR,
9267 "errorCode,Unsupported sta_set_rfeature(VHT) with the current driver");
9268 return 0;
9269 }
9270}
9271
9272
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009273static int wcn_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9274 struct sigma_conn *conn,
9275 struct sigma_cmd *cmd)
9276{
9277 const char *val;
9278 char *token = NULL, *result;
9279 char buf[60];
9280
9281 val = get_param(cmd, "nss_mcs_opt");
9282 if (val) {
9283 /* String (nss_operating_mode; mcs_operating_mode) */
9284 int nss, mcs, ratecode;
9285 char *saveptr;
9286
9287 token = strdup(val);
9288 if (!token)
9289 return -2;
9290
9291 result = strtok_r(token, ";", &saveptr);
9292 if (!result) {
9293 sigma_dut_print(dut, DUT_MSG_ERROR,
9294 "HE NSS not specified");
9295 goto failed;
9296 }
9297 nss = 1;
9298 if (strcasecmp(result, "def") != 0)
9299 nss = atoi(result);
9300
9301 result = strtok_r(NULL, ";", &saveptr);
9302 if (!result) {
9303 sigma_dut_print(dut, DUT_MSG_ERROR,
9304 "HE MCS not specified");
9305 goto failed;
9306 }
9307 mcs = 7;
9308 if (strcasecmp(result, "def") != 0)
9309 mcs = atoi(result);
9310
Arif Hussain557bf412018-05-25 17:29:36 -07009311 ratecode = 0x20; /* for nss:1 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009312 if (nss == 2) {
Arif Hussain557bf412018-05-25 17:29:36 -07009313 ratecode = 0x40; /* for nss:2 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009314 } else if (nss > 2) {
9315 sigma_dut_print(dut, DUT_MSG_ERROR,
9316 "HE NSS %d not supported", nss);
9317 goto failed;
9318 }
9319
Arif Hussain557bf412018-05-25 17:29:36 -07009320 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
9321 if (system(buf) != 0) {
9322 sigma_dut_print(dut, DUT_MSG_ERROR,
9323 "nss_mcs_opt: iwpriv %s nss %d failed",
9324 intf, nss);
9325 goto failed;
9326 }
Arif Hussainac6c5112018-05-25 17:34:00 -07009327 dut->sta_nss = nss;
Arif Hussain557bf412018-05-25 17:29:36 -07009328
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009329 /* Add the MCS to the ratecode */
9330 if (mcs >= 0 && mcs <= 11) {
9331 ratecode += mcs;
Arif Hussain557bf412018-05-25 17:29:36 -07009332#ifdef NL80211_SUPPORT
9333 if (dut->device_type == STA_testbed) {
9334 enum he_mcs_config mcs_config;
9335 int ret;
9336
9337 if (mcs <= 7)
9338 mcs_config = HE_80_MCS0_7;
9339 else if (mcs <= 9)
9340 mcs_config = HE_80_MCS0_9;
9341 else
9342 mcs_config = HE_80_MCS0_11;
9343 ret = sta_set_he_mcs(dut, intf, mcs_config);
9344 if (ret) {
9345 sigma_dut_print(dut, DUT_MSG_ERROR,
9346 "nss_mcs_opt: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
9347 mcs, mcs_config, ret);
9348 goto failed;
9349 }
9350 }
9351#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009352 } else {
9353 sigma_dut_print(dut, DUT_MSG_ERROR,
9354 "HE MCS %d not supported", mcs);
9355 goto failed;
9356 }
9357 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0x%03x",
9358 intf, ratecode);
9359 if (system(buf) != 0) {
9360 sigma_dut_print(dut, DUT_MSG_ERROR,
9361 "iwpriv setting of 11ax rates failed");
9362 goto failed;
9363 }
9364 free(token);
9365 }
9366
9367 val = get_param(cmd, "GI");
9368 if (val) {
9369 if (strcmp(val, "0.8") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009370 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 9", intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009371 } else if (strcmp(val, "1.6") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009372 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 10",
9373 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009374 } else if (strcmp(val, "3.2") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009375 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 11",
9376 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009377 } else {
9378 send_resp(dut, conn, SIGMA_ERROR,
9379 "errorCode,GI value not supported");
9380 return 0;
9381 }
9382 if (system(buf) != 0) {
9383 send_resp(dut, conn, SIGMA_ERROR,
9384 "errorCode,Failed to set shortgi");
9385 return 0;
9386 }
9387 }
9388
Subhani Shaik8e7a3052018-04-24 14:03:00 -07009389 val = get_param(cmd, "LTF");
9390 if (val) {
9391#ifdef NL80211_SUPPORT
9392 if (strcmp(val, "3.2") == 0) {
9393 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_1X);
9394 } if (strcmp(val, "6.4") == 0) {
9395 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_2X);
9396 } else if (strcmp(val, "12.8") == 0) {
9397 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_4X);
9398 } else {
9399 send_resp(dut, conn, SIGMA_ERROR,
9400 "errorCode, LTF value not supported");
9401 return 0;
9402 }
9403#else /* NL80211_SUPPORT */
9404 sigma_dut_print(dut, DUT_MSG_ERROR,
9405 "LTF cannot be set without NL80211_SUPPORT defined");
9406 return -2;
9407#endif /* NL80211_SUPPORT */
9408 }
9409
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009410 return 1;
9411
9412failed:
9413 free(token);
9414 return -2;
9415}
9416
9417
9418static int cmd_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9419 struct sigma_conn *conn,
9420 struct sigma_cmd *cmd)
9421{
9422 switch (get_driver_type()) {
9423 case DRIVER_WCN:
9424 return wcn_sta_set_rfeature_he(intf, dut, conn, cmd);
9425 default:
9426 send_resp(dut, conn, SIGMA_ERROR,
9427 "errorCode,Unsupported sta_set_rfeature(HE) with the current driver");
9428 return 0;
9429 }
9430}
9431
9432
Ashwini Patil5acd7382017-04-13 15:55:04 +05309433static int btm_query_candidate_list(struct sigma_dut *dut,
9434 struct sigma_conn *conn,
9435 struct sigma_cmd *cmd)
9436{
9437 const char *bssid, *info, *op_class, *ch, *phy_type, *pref;
9438 int len, ret;
9439 char buf[10];
9440
9441 /*
9442 * Neighbor Report elements format:
9443 * neighbor=<BSSID>,<BSSID Information>,<Operating Class>,
9444 * <Channel Number>,<PHY Type>[,<hexdump of Optional Subelements>]
9445 * eg: neighbor=aa:bb:cc:dd:ee:ff,17,81,6,1,030101
9446 */
9447
9448 bssid = get_param(cmd, "Nebor_BSSID");
9449 if (!bssid) {
9450 send_resp(dut, conn, SIGMA_INVALID,
9451 "errorCode,Nebor_BSSID is missing");
9452 return 0;
9453 }
9454
9455 info = get_param(cmd, "Nebor_Bssid_Info");
9456 if (!info) {
9457 sigma_dut_print(dut, DUT_MSG_INFO,
9458 "Using default value for Nebor_Bssid_Info: %s",
9459 DEFAULT_NEIGHBOR_BSSID_INFO);
9460 info = DEFAULT_NEIGHBOR_BSSID_INFO;
9461 }
9462
9463 op_class = get_param(cmd, "Nebor_Op_Class");
9464 if (!op_class) {
9465 send_resp(dut, conn, SIGMA_INVALID,
9466 "errorCode,Nebor_Op_Class is missing");
9467 return 0;
9468 }
9469
9470 ch = get_param(cmd, "Nebor_Op_Ch");
9471 if (!ch) {
9472 send_resp(dut, conn, SIGMA_INVALID,
9473 "errorCode,Nebor_Op_Ch is missing");
9474 return 0;
9475 }
9476
9477 phy_type = get_param(cmd, "Nebor_Phy_Type");
9478 if (!phy_type) {
9479 sigma_dut_print(dut, DUT_MSG_INFO,
9480 "Using default value for Nebor_Phy_Type: %s",
9481 DEFAULT_NEIGHBOR_PHY_TYPE);
9482 phy_type = DEFAULT_NEIGHBOR_PHY_TYPE;
9483 }
9484
9485 /* Parse optional subelements */
9486 buf[0] = '\0';
9487 pref = get_param(cmd, "Nebor_Pref");
9488 if (pref) {
9489 /* hexdump for preferrence subelement */
9490 ret = snprintf(buf, sizeof(buf), ",0301%02x", atoi(pref));
9491 if (ret < 0 || ret >= (int) sizeof(buf)) {
9492 sigma_dut_print(dut, DUT_MSG_ERROR,
9493 "snprintf failed for optional subelement ret: %d",
9494 ret);
9495 send_resp(dut, conn, SIGMA_ERROR,
9496 "errorCode,snprintf failed for subelement");
9497 return 0;
9498 }
9499 }
9500
9501 if (!dut->btm_query_cand_list) {
9502 dut->btm_query_cand_list = calloc(1, NEIGHBOR_REPORT_SIZE);
9503 if (!dut->btm_query_cand_list) {
9504 send_resp(dut, conn, SIGMA_ERROR,
9505 "errorCode,Failed to allocate memory for btm_query_cand_list");
9506 return 0;
9507 }
9508 }
9509
9510 len = strlen(dut->btm_query_cand_list);
9511 ret = snprintf(dut->btm_query_cand_list + len,
9512 NEIGHBOR_REPORT_SIZE - len, " neighbor=%s,%s,%s,%s,%s%s",
9513 bssid, info, op_class, ch, phy_type, buf);
9514 if (ret < 0 || ret >= NEIGHBOR_REPORT_SIZE - len) {
9515 sigma_dut_print(dut, DUT_MSG_ERROR,
9516 "snprintf failed for neighbor report list ret: %d",
9517 ret);
9518 send_resp(dut, conn, SIGMA_ERROR,
9519 "errorCode,snprintf failed for neighbor report");
9520 free(dut->btm_query_cand_list);
9521 dut->btm_query_cand_list = NULL;
9522 return 0;
9523 }
9524
9525 return 1;
9526}
9527
9528
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009529static int cmd_sta_set_rfeature(struct sigma_dut *dut, struct sigma_conn *conn,
9530 struct sigma_cmd *cmd)
9531{
9532 const char *intf = get_param(cmd, "Interface");
9533 const char *prog = get_param(cmd, "Prog");
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309534 const char *val;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009535
9536 if (intf == NULL || prog == NULL)
9537 return -1;
9538
Ashwini Patil5acd7382017-04-13 15:55:04 +05309539 /* BSS Transition candidate list for BTM query */
9540 val = get_param(cmd, "Nebor_BSSID");
9541 if (val && btm_query_candidate_list(dut, conn, cmd) == 0)
9542 return 0;
9543
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009544 if (strcasecmp(prog, "TDLS") == 0)
9545 return cmd_sta_set_rfeature_tdls(intf, dut, conn, cmd);
9546
9547 if (strcasecmp(prog, "VHT") == 0)
9548 return cmd_sta_set_rfeature_vht(intf, dut, conn, cmd);
9549
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009550 if (strcasecmp(prog, "HE") == 0)
9551 return cmd_sta_set_rfeature_he(intf, dut, conn, cmd);
9552
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309553 if (strcasecmp(prog, "MBO") == 0) {
9554 val = get_param(cmd, "Cellular_Data_Cap");
9555 if (val &&
9556 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
9557 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05309558
9559 val = get_param(cmd, "Ch_Pref");
9560 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
9561 return 0;
9562
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309563 return 1;
9564 }
9565
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009566 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported Prog");
9567 return 0;
9568}
9569
9570
9571static int cmd_sta_set_radio(struct sigma_dut *dut, struct sigma_conn *conn,
9572 struct sigma_cmd *cmd)
9573{
9574 const char *intf = get_param(cmd, "Interface");
9575 const char *mode = get_param(cmd, "Mode");
9576 int res;
9577
9578 if (intf == NULL || mode == NULL)
9579 return -1;
9580
9581 if (strcasecmp(mode, "On") == 0)
9582 res = wpa_command(intf, "SET radio_disabled 0");
9583 else if (strcasecmp(mode, "Off") == 0)
9584 res = wpa_command(intf, "SET radio_disabled 1");
9585 else
9586 return -1;
9587
9588 if (res) {
9589 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9590 "radio mode");
9591 return 0;
9592 }
9593
9594 return 1;
9595}
9596
9597
9598static int cmd_sta_set_pwrsave(struct sigma_dut *dut, struct sigma_conn *conn,
9599 struct sigma_cmd *cmd)
9600{
9601 const char *intf = get_param(cmd, "Interface");
9602 const char *mode = get_param(cmd, "Mode");
9603 int res;
9604
9605 if (intf == NULL || mode == NULL)
9606 return -1;
9607
9608 if (strcasecmp(mode, "On") == 0)
9609 res = set_ps(intf, dut, 1);
9610 else if (strcasecmp(mode, "Off") == 0)
9611 res = set_ps(intf, dut, 0);
9612 else
9613 return -1;
9614
9615 if (res) {
9616 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9617 "power save mode");
9618 return 0;
9619 }
9620
9621 return 1;
9622}
9623
9624
9625static int cmd_sta_bssid_pool(struct sigma_dut *dut, struct sigma_conn *conn,
9626 struct sigma_cmd *cmd)
9627{
9628 const char *intf = get_param(cmd, "Interface");
9629 const char *val, *bssid;
9630 int res;
9631 char *buf;
9632 size_t buf_len;
9633
9634 val = get_param(cmd, "BSSID_FILTER");
9635 if (val == NULL)
9636 return -1;
9637
9638 bssid = get_param(cmd, "BSSID_List");
9639 if (atoi(val) == 0 || bssid == NULL) {
9640 /* Disable BSSID filter */
9641 if (wpa_command(intf, "SET bssid_filter ")) {
9642 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed "
9643 "to disable BSSID filter");
9644 return 0;
9645 }
9646
9647 return 1;
9648 }
9649
9650 buf_len = 100 + strlen(bssid);
9651 buf = malloc(buf_len);
9652 if (buf == NULL)
9653 return -1;
9654
9655 snprintf(buf, buf_len, "SET bssid_filter %s", bssid);
9656 res = wpa_command(intf, buf);
9657 free(buf);
9658 if (res) {
9659 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to enable "
9660 "BSSID filter");
9661 return 0;
9662 }
9663
9664 return 1;
9665}
9666
9667
9668static int cmd_sta_reset_parm(struct sigma_dut *dut, struct sigma_conn *conn,
9669 struct sigma_cmd *cmd)
9670{
9671 const char *intf = get_param(cmd, "Interface");
9672 const char *val;
9673
9674 /* TODO: ARP */
9675
9676 val = get_param(cmd, "HS2_CACHE_PROFILE");
9677 if (val && strcasecmp(val, "All") == 0)
9678 hs2_clear_credentials(intf);
9679
9680 return 1;
9681}
9682
9683
9684static int cmd_sta_get_key(struct sigma_dut *dut, struct sigma_conn *conn,
9685 struct sigma_cmd *cmd)
9686{
9687 const char *intf = get_param(cmd, "Interface");
9688 const char *key_type = get_param(cmd, "KeyType");
9689 char buf[100], resp[200];
9690
9691 if (key_type == NULL)
9692 return -1;
9693
9694 if (strcasecmp(key_type, "GTK") == 0) {
9695 if (wpa_command_resp(intf, "GET gtk", buf, sizeof(buf)) < 0 ||
9696 strncmp(buf, "FAIL", 4) == 0) {
9697 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9698 "not fetch current GTK");
9699 return 0;
9700 }
9701 snprintf(resp, sizeof(resp), "KeyValue,%s", buf);
9702 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9703 return 0;
9704 } else {
9705 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
9706 "KeyType");
9707 return 0;
9708 }
9709
9710 return 1;
9711}
9712
9713
9714static int hs2_set_policy(struct sigma_dut *dut)
9715{
9716#ifdef ANDROID
9717 system("ip rule del prio 23000");
9718 if (system("ip rule add from all lookup main prio 23000") != 0) {
9719 sigma_dut_print(dut, DUT_MSG_ERROR,
9720 "Failed to run:ip rule add from all lookup main prio");
9721 return -1;
9722 }
9723 if (system("ip route flush cache") != 0) {
9724 sigma_dut_print(dut, DUT_MSG_ERROR,
9725 "Failed to run ip route flush cache");
9726 return -1;
9727 }
9728 return 1;
9729#else /* ANDROID */
9730 return 0;
9731#endif /* ANDROID */
9732}
9733
9734
9735static int cmd_sta_hs2_associate(struct sigma_dut *dut,
9736 struct sigma_conn *conn,
9737 struct sigma_cmd *cmd)
9738{
9739 const char *intf = get_param(cmd, "Interface");
9740 const char *val = get_param(cmd, "Ignore_blacklist");
9741 struct wpa_ctrl *ctrl;
9742 int res;
9743 char bssid[20], ssid[40], resp[100], buf[100], blacklisted[100];
9744 int tries = 0;
9745 int ignore_blacklist = 0;
9746 const char *events[] = {
9747 "CTRL-EVENT-CONNECTED",
9748 "INTERWORKING-BLACKLISTED",
9749 "INTERWORKING-NO-MATCH",
9750 NULL
9751 };
9752
9753 start_sta_mode(dut);
9754
9755 blacklisted[0] = '\0';
9756 if (val && atoi(val))
9757 ignore_blacklist = 1;
9758
9759try_again:
9760 ctrl = open_wpa_mon(intf);
9761 if (ctrl == NULL) {
9762 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
9763 "wpa_supplicant monitor connection");
9764 return -2;
9765 }
9766
9767 tries++;
9768 if (wpa_command(intf, "INTERWORKING_SELECT auto")) {
9769 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start "
9770 "Interworking connection");
9771 wpa_ctrl_detach(ctrl);
9772 wpa_ctrl_close(ctrl);
9773 return 0;
9774 }
9775
9776 buf[0] = '\0';
9777 while (1) {
9778 char *pos;
9779 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
9780 pos = strstr(buf, "INTERWORKING-BLACKLISTED");
9781 if (!pos)
9782 break;
9783 pos += 25;
9784 sigma_dut_print(dut, DUT_MSG_DEBUG, "Found blacklisted AP: %s",
9785 pos);
9786 if (!blacklisted[0])
9787 memcpy(blacklisted, pos, strlen(pos) + 1);
9788 }
9789
9790 if (ignore_blacklist && blacklisted[0]) {
9791 char *end;
9792 end = strchr(blacklisted, ' ');
9793 if (end)
9794 *end = '\0';
9795 sigma_dut_print(dut, DUT_MSG_DEBUG, "Try to connect to a blacklisted network: %s",
9796 blacklisted);
9797 snprintf(buf, sizeof(buf), "INTERWORKING_CONNECT %s",
9798 blacklisted);
9799 if (wpa_command(intf, buf)) {
9800 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start Interworking connection to blacklisted network");
9801 wpa_ctrl_detach(ctrl);
9802 wpa_ctrl_close(ctrl);
9803 return 0;
9804 }
9805 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
9806 buf, sizeof(buf));
9807 }
9808
9809 wpa_ctrl_detach(ctrl);
9810 wpa_ctrl_close(ctrl);
9811
9812 if (res < 0) {
9813 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9814 "connect");
9815 return 0;
9816 }
9817
9818 if (strstr(buf, "INTERWORKING-NO-MATCH") ||
9819 strstr(buf, "INTERWORKING-BLACKLISTED")) {
9820 if (tries < 2) {
9821 sigma_dut_print(dut, DUT_MSG_INFO, "No match found - try again to verify no APs were missed in the scan");
9822 goto try_again;
9823 }
9824 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,No network with "
9825 "matching credentials found");
9826 return 0;
9827 }
9828
9829 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
9830 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
9831 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9832 "get current BSSID/SSID");
9833 return 0;
9834 }
9835
9836 snprintf(resp, sizeof(resp), "SSID,%s,BSSID,%s", ssid, bssid);
9837 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9838 hs2_set_policy(dut);
9839 return 0;
9840}
9841
9842
9843static int sta_add_credential_uname_pwd(struct sigma_dut *dut,
9844 struct sigma_conn *conn,
9845 const char *ifname,
9846 struct sigma_cmd *cmd)
9847{
9848 const char *val;
9849 int id;
9850
9851 id = add_cred(ifname);
9852 if (id < 0)
9853 return -2;
9854 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9855
9856 val = get_param(cmd, "prefer");
9857 if (val && atoi(val) > 0)
9858 set_cred(ifname, id, "priority", "1");
9859
9860 val = get_param(cmd, "REALM");
9861 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
9862 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9863 "realm");
9864 return 0;
9865 }
9866
9867 val = get_param(cmd, "HOME_FQDN");
9868 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
9869 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9870 "home_fqdn");
9871 return 0;
9872 }
9873
9874 val = get_param(cmd, "Username");
9875 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
9876 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9877 "username");
9878 return 0;
9879 }
9880
9881 val = get_param(cmd, "Password");
9882 if (val && set_cred_quoted(ifname, id, "password", val) < 0) {
9883 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9884 "password");
9885 return 0;
9886 }
9887
9888 val = get_param(cmd, "ROOT_CA");
9889 if (val) {
9890 char fname[200];
9891 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
9892#ifdef __linux__
9893 if (!file_exists(fname)) {
9894 char msg[300];
9895 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
9896 "file (%s) not found", fname);
9897 send_resp(dut, conn, SIGMA_ERROR, msg);
9898 return 0;
9899 }
9900#endif /* __linux__ */
9901 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
9902 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9903 "not set root CA");
9904 return 0;
9905 }
9906 }
9907
9908 return 1;
9909}
9910
9911
9912static int update_devdetail_imsi(struct sigma_dut *dut, const char *imsi)
9913{
9914 FILE *in, *out;
9915 char buf[500];
9916 int found = 0;
9917
9918 in = fopen("devdetail.xml", "r");
9919 if (in == NULL)
9920 return -1;
9921 out = fopen("devdetail.xml.tmp", "w");
9922 if (out == NULL) {
9923 fclose(in);
9924 return -1;
9925 }
9926
9927 while (fgets(buf, sizeof(buf), in)) {
9928 char *pos = strstr(buf, "<IMSI>");
9929 if (pos) {
9930 sigma_dut_print(dut, DUT_MSG_INFO, "Updated DevDetail IMSI to %s",
9931 imsi);
9932 pos += 6;
9933 *pos = '\0';
9934 fprintf(out, "%s%s</IMSI>\n", buf, imsi);
9935 found++;
9936 } else {
9937 fprintf(out, "%s", buf);
9938 }
9939 }
9940
9941 fclose(out);
9942 fclose(in);
9943 if (found)
9944 rename("devdetail.xml.tmp", "devdetail.xml");
9945 else
9946 unlink("devdetail.xml.tmp");
9947
9948 return 0;
9949}
9950
9951
9952static int sta_add_credential_sim(struct sigma_dut *dut,
9953 struct sigma_conn *conn,
9954 const char *ifname, struct sigma_cmd *cmd)
9955{
9956 const char *val, *imsi = NULL;
9957 int id;
9958 char buf[200];
9959 int res;
9960 const char *pos;
9961 size_t mnc_len;
9962 char plmn_mcc[4];
9963 char plmn_mnc[4];
9964
9965 id = add_cred(ifname);
9966 if (id < 0)
9967 return -2;
9968 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9969
9970 val = get_param(cmd, "prefer");
9971 if (val && atoi(val) > 0)
9972 set_cred(ifname, id, "priority", "1");
9973
9974 val = get_param(cmd, "PLMN_MCC");
9975 if (val == NULL) {
9976 send_resp(dut, conn, SIGMA_ERROR,
9977 "errorCode,Missing PLMN_MCC");
9978 return 0;
9979 }
9980 if (strlen(val) != 3) {
9981 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MCC");
9982 return 0;
9983 }
9984 snprintf(plmn_mcc, sizeof(plmn_mcc), "%s", val);
9985
9986 val = get_param(cmd, "PLMN_MNC");
9987 if (val == NULL) {
9988 send_resp(dut, conn, SIGMA_ERROR,
9989 "errorCode,Missing PLMN_MNC");
9990 return 0;
9991 }
9992 if (strlen(val) != 2 && strlen(val) != 3) {
9993 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MNC");
9994 return 0;
9995 }
9996 snprintf(plmn_mnc, sizeof(plmn_mnc), "%s", val);
9997
9998 val = get_param(cmd, "IMSI");
9999 if (val == NULL) {
10000 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing SIM "
10001 "IMSI");
10002 return 0;
10003 }
10004
10005 imsi = pos = val;
10006
10007 if (strncmp(plmn_mcc, pos, 3) != 0) {
10008 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MCC mismatch");
10009 return 0;
10010 }
10011 pos += 3;
10012
10013 mnc_len = strlen(plmn_mnc);
10014 if (mnc_len < 2) {
10015 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC not set");
10016 return 0;
10017 }
10018
10019 if (strncmp(plmn_mnc, pos, mnc_len) != 0) {
10020 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC mismatch");
10021 return 0;
10022 }
10023 pos += mnc_len;
10024
10025 res = snprintf(buf, sizeof(buf), "%s%s-%s",plmn_mcc, plmn_mnc, pos);
10026 if (res < 0 || res >= (int) sizeof(buf))
10027 return -1;
10028 if (set_cred_quoted(ifname, id, "imsi", buf) < 0) {
10029 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10030 "not set IMSI");
10031 return 0;
10032 }
10033
10034 val = get_param(cmd, "Password");
10035 if (val && set_cred_quoted(ifname, id, "milenage", val) < 0) {
10036 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10037 "not set password");
10038 return 0;
10039 }
10040
Jouni Malinenba630452018-06-22 11:49:59 +030010041 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010042 /*
10043 * Set provisioning_sp for the test cases where SIM/USIM
10044 * provisioning is used.
10045 */
10046 if (val && set_cred_quoted(ifname, id, "provisioning_sp",
10047 "wi-fi.org") < 0) {
10048 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10049 "not set provisioning_sp");
10050 return 0;
10051 }
10052
10053 update_devdetail_imsi(dut, imsi);
10054 }
10055
10056 return 1;
10057}
10058
10059
10060static int sta_add_credential_cert(struct sigma_dut *dut,
10061 struct sigma_conn *conn,
10062 const char *ifname,
10063 struct sigma_cmd *cmd)
10064{
10065 const char *val;
10066 int id;
10067
10068 id = add_cred(ifname);
10069 if (id < 0)
10070 return -2;
10071 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
10072
10073 val = get_param(cmd, "prefer");
10074 if (val && atoi(val) > 0)
10075 set_cred(ifname, id, "priority", "1");
10076
10077 val = get_param(cmd, "REALM");
10078 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
10079 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10080 "realm");
10081 return 0;
10082 }
10083
10084 val = get_param(cmd, "HOME_FQDN");
10085 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
10086 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10087 "home_fqdn");
10088 return 0;
10089 }
10090
10091 val = get_param(cmd, "Username");
10092 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
10093 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10094 "username");
10095 return 0;
10096 }
10097
10098 val = get_param(cmd, "clientCertificate");
10099 if (val) {
10100 char fname[200];
10101 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10102#ifdef __linux__
10103 if (!file_exists(fname)) {
10104 char msg[300];
10105 snprintf(msg, sizeof(msg),
10106 "ErrorCode,clientCertificate "
10107 "file (%s) not found", fname);
10108 send_resp(dut, conn, SIGMA_ERROR, msg);
10109 return 0;
10110 }
10111#endif /* __linux__ */
10112 if (set_cred_quoted(ifname, id, "client_cert", fname) < 0) {
10113 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10114 "not set client_cert");
10115 return 0;
10116 }
10117 if (set_cred_quoted(ifname, id, "private_key", fname) < 0) {
10118 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10119 "not set private_key");
10120 return 0;
10121 }
10122 }
10123
10124 val = get_param(cmd, "ROOT_CA");
10125 if (val) {
10126 char fname[200];
10127 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10128#ifdef __linux__
10129 if (!file_exists(fname)) {
10130 char msg[300];
10131 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
10132 "file (%s) not found", fname);
10133 send_resp(dut, conn, SIGMA_ERROR, msg);
10134 return 0;
10135 }
10136#endif /* __linux__ */
10137 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
10138 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10139 "not set root CA");
10140 return 0;
10141 }
10142 }
10143
10144 return 1;
10145}
10146
10147
10148static int cmd_sta_add_credential(struct sigma_dut *dut,
10149 struct sigma_conn *conn,
10150 struct sigma_cmd *cmd)
10151{
10152 const char *intf = get_param(cmd, "Interface");
10153 const char *type;
10154
10155 start_sta_mode(dut);
10156
10157 type = get_param(cmd, "Type");
10158 if (!type)
10159 return -1;
10160
10161 if (strcasecmp(type, "uname_pwd") == 0)
10162 return sta_add_credential_uname_pwd(dut, conn, intf, cmd);
10163
10164 if (strcasecmp(type, "sim") == 0)
10165 return sta_add_credential_sim(dut, conn, intf, cmd);
10166
10167 if (strcasecmp(type, "cert") == 0)
10168 return sta_add_credential_cert(dut, conn, intf, cmd);
10169
10170 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported credential "
10171 "type");
10172 return 0;
10173}
10174
10175
10176static int cmd_sta_scan(struct sigma_dut *dut, struct sigma_conn *conn,
10177 struct sigma_cmd *cmd)
10178{
10179 const char *intf = get_param(cmd, "Interface");
vamsi krishna89ad8c62017-09-19 12:51:18 +053010180 const char *val, *bssid, *ssid;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010181 char buf[100];
vamsi krishna89ad8c62017-09-19 12:51:18 +053010182 char ssid_hex[65];
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010183 int res;
10184
10185 val = get_param(cmd, "HESSID");
10186 if (val) {
10187 res = snprintf(buf, sizeof(buf), "SET hessid %s", val);
10188 if (res < 0 || res >= (int) sizeof(buf))
10189 return -1;
10190 wpa_command(intf, buf);
10191 }
10192
10193 val = get_param(cmd, "ACCS_NET_TYPE");
10194 if (val) {
10195 res = snprintf(buf, sizeof(buf), "SET access_network_type %s",
10196 val);
10197 if (res < 0 || res >= (int) sizeof(buf))
10198 return -1;
10199 wpa_command(intf, buf);
10200 }
10201
vamsi krishna89ad8c62017-09-19 12:51:18 +053010202 bssid = get_param(cmd, "Bssid");
10203 ssid = get_param(cmd, "Ssid");
10204
10205 if (ssid) {
10206 if (2 * strlen(ssid) >= sizeof(ssid_hex)) {
10207 send_resp(dut, conn, SIGMA_ERROR,
10208 "ErrorCode,Too long SSID");
10209 return 0;
10210 }
10211 ascii2hexstr(ssid, ssid_hex);
10212 }
10213
10214 res = snprintf(buf, sizeof(buf), "SCAN%s%s%s%s",
10215 bssid ? " bssid=": "",
10216 bssid ? bssid : "",
10217 ssid ? " ssid " : "",
10218 ssid ? ssid_hex : "");
10219 if (res < 0 || res >= (int) sizeof(buf))
10220 return -1;
10221
10222 if (wpa_command(intf, buf)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010223 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not start "
10224 "scan");
10225 return 0;
10226 }
10227
10228 return 1;
10229}
10230
10231
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010232static int cmd_sta_scan_bss(struct sigma_dut *dut, struct sigma_conn *conn,
10233 struct sigma_cmd *cmd)
10234{
10235 const char *intf = get_param(cmd, "Interface");
10236 const char *bssid;
10237 char buf[4096], *pos;
10238 int freq, chan;
10239 char *ssid;
10240 char resp[100];
10241 int res;
10242 struct wpa_ctrl *ctrl;
10243
10244 bssid = get_param(cmd, "BSSID");
10245 if (!bssid) {
10246 send_resp(dut, conn, SIGMA_INVALID,
10247 "errorCode,BSSID argument is missing");
10248 return 0;
10249 }
10250
10251 ctrl = open_wpa_mon(intf);
10252 if (!ctrl) {
10253 sigma_dut_print(dut, DUT_MSG_ERROR,
10254 "Failed to open wpa_supplicant monitor connection");
10255 return -1;
10256 }
10257
10258 if (wpa_command(intf, "SCAN TYPE=ONLY")) {
10259 send_resp(dut, conn, SIGMA_ERROR,
10260 "errorCode,Could not start scan");
10261 wpa_ctrl_detach(ctrl);
10262 wpa_ctrl_close(ctrl);
10263 return 0;
10264 }
10265
10266 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
10267 buf, sizeof(buf));
10268
10269 wpa_ctrl_detach(ctrl);
10270 wpa_ctrl_close(ctrl);
10271
10272 if (res < 0) {
10273 send_resp(dut, conn, SIGMA_ERROR,
10274 "errorCode,Scan did not complete");
10275 return 0;
10276 }
10277
10278 snprintf(buf, sizeof(buf), "BSS %s", bssid);
10279 if (wpa_command_resp(intf, buf, buf, sizeof(buf)) < 0 ||
10280 strncmp(buf, "id=", 3) != 0) {
10281 send_resp(dut, conn, SIGMA_ERROR,
10282 "errorCode,Specified BSSID not found");
10283 return 0;
10284 }
10285
10286 pos = strstr(buf, "\nfreq=");
10287 if (!pos) {
10288 send_resp(dut, conn, SIGMA_ERROR,
10289 "errorCode,Channel not found");
10290 return 0;
10291 }
10292 freq = atoi(pos + 6);
10293 chan = freq_to_channel(freq);
10294
10295 pos = strstr(buf, "\nssid=");
10296 if (!pos) {
10297 send_resp(dut, conn, SIGMA_ERROR,
10298 "errorCode,SSID not found");
10299 return 0;
10300 }
10301 ssid = pos + 6;
10302 pos = strchr(ssid, '\n');
10303 if (pos)
10304 *pos = '\0';
10305 snprintf(resp, sizeof(resp), "ssid,%s,bsschannel,%d", ssid, chan);
10306 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10307 return 0;
10308}
10309
10310
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010311static int cmd_sta_set_systime(struct sigma_dut *dut, struct sigma_conn *conn,
10312 struct sigma_cmd *cmd)
10313{
10314#ifdef __linux__
10315 struct timeval tv;
10316 struct tm tm;
10317 time_t t;
10318 const char *val;
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010319 int v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010320
10321 wpa_command(get_station_ifname(), "PMKSA_FLUSH");
10322
10323 memset(&tm, 0, sizeof(tm));
10324 val = get_param(cmd, "seconds");
10325 if (val)
10326 tm.tm_sec = atoi(val);
10327 val = get_param(cmd, "minutes");
10328 if (val)
10329 tm.tm_min = atoi(val);
10330 val = get_param(cmd, "hours");
10331 if (val)
10332 tm.tm_hour = atoi(val);
10333 val = get_param(cmd, "date");
10334 if (val)
10335 tm.tm_mday = atoi(val);
10336 val = get_param(cmd, "month");
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010337 if (val) {
10338 v = atoi(val);
10339 if (v < 1 || v > 12) {
10340 send_resp(dut, conn, SIGMA_INVALID,
10341 "errorCode,Invalid month");
10342 return 0;
10343 }
10344 tm.tm_mon = v - 1;
10345 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010346 val = get_param(cmd, "year");
10347 if (val) {
10348 int year = atoi(val);
10349#ifdef ANDROID
10350 if (year > 2035)
10351 year = 2035; /* years beyond 2035 not supported */
10352#endif /* ANDROID */
10353 tm.tm_year = year - 1900;
10354 }
10355 t = mktime(&tm);
10356 if (t == (time_t) -1) {
10357 send_resp(dut, conn, SIGMA_ERROR,
10358 "errorCode,Invalid date or time");
10359 return 0;
10360 }
10361
10362 memset(&tv, 0, sizeof(tv));
10363 tv.tv_sec = t;
10364
10365 if (settimeofday(&tv, NULL) < 0) {
10366 sigma_dut_print(dut, DUT_MSG_INFO, "settimeofday failed: %s",
10367 strerror(errno));
10368 send_resp(dut, conn, SIGMA_ERROR,
10369 "errorCode,Failed to set time");
10370 return 0;
10371 }
10372
10373 return 1;
10374#endif /* __linux__ */
10375
10376 return -1;
10377}
10378
10379
10380static int cmd_sta_osu(struct sigma_dut *dut, struct sigma_conn *conn,
10381 struct sigma_cmd *cmd)
10382{
10383 const char *intf = get_param(cmd, "Interface");
10384 const char *name, *val;
10385 int prod_ess_assoc = 1;
10386 char buf[200], bssid[100], ssid[100];
10387 int res;
10388 struct wpa_ctrl *ctrl;
10389
10390 name = get_param(cmd, "osuFriendlyName");
10391
10392 val = get_param(cmd, "ProdESSAssoc");
10393 if (val)
10394 prod_ess_assoc = atoi(val);
10395
10396 kill_dhcp_client(dut, intf);
10397 if (start_dhcp_client(dut, intf) < 0)
10398 return -2;
10399
10400 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger OSU");
10401 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10402 res = snprintf(buf, sizeof(buf),
10403 "%s %s%s%s signup osu-ca.pem",
10404 prod_ess_assoc ? "" : "-N",
10405 name ? "-O'" : "", name ? name : "",
10406 name ? "'" : "");
10407
Kanchanapally, Vidyullatha12b66762015-12-31 16:46:42 +053010408 hs2_set_policy(dut);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010409 if (run_hs20_osu(dut, buf) < 0) {
10410 FILE *f;
10411
10412 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to complete OSU");
10413
10414 f = fopen("hs20-osu-client.res", "r");
10415 if (f) {
10416 char resp[400], res[300], *pos;
10417 if (!fgets(res, sizeof(res), f))
10418 res[0] = '\0';
10419 pos = strchr(res, '\n');
10420 if (pos)
10421 *pos = '\0';
10422 fclose(f);
10423 sigma_dut_summary(dut, "hs20-osu-client provisioning failed: %s",
10424 res);
10425 snprintf(resp, sizeof(resp), "notify-send '%s'", res);
10426 if (system(resp) != 0) {
10427 }
10428 snprintf(resp, sizeof(resp),
10429 "SSID,,BSSID,,failureReason,%s", res);
10430 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10431 return 0;
10432 }
10433
10434 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10435 return 0;
10436 }
10437
10438 if (!prod_ess_assoc)
10439 goto report;
10440
10441 ctrl = open_wpa_mon(intf);
10442 if (ctrl == NULL) {
10443 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10444 "wpa_supplicant monitor connection");
10445 return -1;
10446 }
10447
10448 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
10449 buf, sizeof(buf));
10450
10451 wpa_ctrl_detach(ctrl);
10452 wpa_ctrl_close(ctrl);
10453
10454 if (res < 0) {
10455 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to connect to "
10456 "network after OSU");
10457 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10458 return 0;
10459 }
10460
10461report:
10462 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
10463 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
10464 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get BSSID/SSID");
10465 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10466 return 0;
10467 }
10468
10469 snprintf(buf, sizeof(buf), "SSID,%s,BSSID,%s", ssid, bssid);
10470 send_resp(dut, conn, SIGMA_COMPLETE, buf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010471 return 0;
10472}
10473
10474
10475static int cmd_sta_policy_update(struct sigma_dut *dut, struct sigma_conn *conn,
10476 struct sigma_cmd *cmd)
10477{
10478 const char *val;
10479 int timeout = 120;
10480
10481 val = get_param(cmd, "PolicyUpdate");
10482 if (val == NULL || atoi(val) == 0)
10483 return 1; /* No operation requested */
10484
10485 val = get_param(cmd, "Timeout");
10486 if (val)
10487 timeout = atoi(val);
10488
10489 if (timeout) {
10490 /* TODO: time out the command and return
10491 * PolicyUpdateStatus,TIMEOUT if needed. */
10492 }
10493
10494 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger policy update");
10495 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10496 if (run_hs20_osu(dut, "pol_upd fqdn=wi-fi.org") < 0) {
10497 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,FAIL");
10498 return 0;
10499 }
10500
10501 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,SUCCESS");
10502 return 0;
10503}
10504
10505
10506static int cmd_sta_er_config(struct sigma_dut *dut, struct sigma_conn *conn,
10507 struct sigma_cmd *cmd)
10508{
10509 struct wpa_ctrl *ctrl;
10510 const char *intf = get_param(cmd, "Interface");
10511 const char *bssid = get_param(cmd, "Bssid");
10512 const char *ssid = get_param(cmd, "SSID");
10513 const char *security = get_param(cmd, "Security");
10514 const char *passphrase = get_param(cmd, "Passphrase");
10515 const char *pin = get_param(cmd, "PIN");
10516 char buf[1000];
10517 char ssid_hex[200], passphrase_hex[200];
10518 const char *keymgmt, *cipher;
10519
10520 if (intf == NULL)
10521 intf = get_main_ifname();
10522
10523 if (!bssid) {
10524 send_resp(dut, conn, SIGMA_ERROR,
10525 "ErrorCode,Missing Bssid argument");
10526 return 0;
10527 }
10528
10529 if (!ssid) {
10530 send_resp(dut, conn, SIGMA_ERROR,
10531 "ErrorCode,Missing SSID argument");
10532 return 0;
10533 }
10534
10535 if (!security) {
10536 send_resp(dut, conn, SIGMA_ERROR,
10537 "ErrorCode,Missing Security argument");
10538 return 0;
10539 }
10540
10541 if (!passphrase) {
10542 send_resp(dut, conn, SIGMA_ERROR,
10543 "ErrorCode,Missing Passphrase argument");
10544 return 0;
10545 }
10546
10547 if (!pin) {
10548 send_resp(dut, conn, SIGMA_ERROR,
10549 "ErrorCode,Missing PIN argument");
10550 return 0;
10551 }
10552
vamsi krishna8c9c1562017-05-12 15:51:46 +053010553 if (2 * strlen(ssid) >= sizeof(ssid_hex) ||
10554 2 * strlen(passphrase) >= sizeof(passphrase_hex)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010555 send_resp(dut, conn, SIGMA_ERROR,
10556 "ErrorCode,Too long SSID/passphrase");
10557 return 0;
10558 }
10559
10560 ctrl = open_wpa_mon(intf);
10561 if (ctrl == NULL) {
10562 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10563 "wpa_supplicant monitor connection");
10564 return -2;
10565 }
10566
10567 if (strcasecmp(security, "wpa2-psk") == 0) {
10568 keymgmt = "WPA2PSK";
10569 cipher = "CCMP";
10570 } else {
10571 wpa_ctrl_detach(ctrl);
10572 wpa_ctrl_close(ctrl);
10573 send_resp(dut, conn, SIGMA_ERROR,
10574 "ErrorCode,Unsupported Security value");
10575 return 0;
10576 }
10577
10578 ascii2hexstr(ssid, ssid_hex);
10579 ascii2hexstr(passphrase, passphrase_hex);
10580 snprintf(buf, sizeof(buf), "WPS_REG %s %s %s %s %s %s",
10581 bssid, pin, ssid_hex, keymgmt, cipher, passphrase_hex);
10582
10583 if (wpa_command(intf, buf) < 0) {
10584 wpa_ctrl_detach(ctrl);
10585 wpa_ctrl_close(ctrl);
10586 send_resp(dut, conn, SIGMA_ERROR,
10587 "ErrorCode,Failed to start registrar");
10588 return 0;
10589 }
10590
10591 snprintf(dut->er_oper_bssid, sizeof(dut->er_oper_bssid), "%s", bssid);
10592 dut->er_oper_performed = 1;
10593
10594 return wps_connection_event(dut, conn, ctrl, intf, 0);
10595}
10596
10597
10598static int cmd_sta_wps_connect_pw_token(struct sigma_dut *dut,
10599 struct sigma_conn *conn,
10600 struct sigma_cmd *cmd)
10601{
10602 struct wpa_ctrl *ctrl;
10603 const char *intf = get_param(cmd, "Interface");
10604 const char *bssid = get_param(cmd, "Bssid");
10605 char buf[100];
10606
10607 if (!bssid) {
10608 send_resp(dut, conn, SIGMA_ERROR,
10609 "ErrorCode,Missing Bssid argument");
10610 return 0;
10611 }
10612
10613 ctrl = open_wpa_mon(intf);
10614 if (ctrl == NULL) {
10615 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10616 "wpa_supplicant monitor connection");
10617 return -2;
10618 }
10619
10620 snprintf(buf, sizeof(buf), "WPS_NFC %s", bssid);
10621
10622 if (wpa_command(intf, buf) < 0) {
10623 wpa_ctrl_detach(ctrl);
10624 wpa_ctrl_close(ctrl);
10625 send_resp(dut, conn, SIGMA_ERROR,
10626 "ErrorCode,Failed to start registrar");
10627 return 0;
10628 }
10629
10630 return wps_connection_event(dut, conn, ctrl, intf, 0);
10631}
10632
10633
vamsi krishna9b144002017-09-20 13:28:13 +053010634static int cmd_start_wps_registration(struct sigma_dut *dut,
10635 struct sigma_conn *conn,
10636 struct sigma_cmd *cmd)
10637{
10638 struct wpa_ctrl *ctrl;
10639 const char *intf = get_param(cmd, "Interface");
10640 const char *role, *method;
10641 int res;
10642 char buf[256];
10643 const char *events[] = {
10644 "CTRL-EVENT-CONNECTED",
10645 "WPS-OVERLAP-DETECTED",
10646 "WPS-TIMEOUT",
10647 "WPS-FAIL",
10648 NULL
10649 };
10650
10651 ctrl = open_wpa_mon(intf);
10652 if (!ctrl) {
10653 sigma_dut_print(dut, DUT_MSG_ERROR,
10654 "Failed to open wpa_supplicant monitor connection");
10655 return -2;
10656 }
10657
10658 role = get_param(cmd, "WpsRole");
10659 if (!role) {
10660 send_resp(dut, conn, SIGMA_INVALID,
10661 "ErrorCode,WpsRole not provided");
10662 goto fail;
10663 }
10664
10665 if (strcasecmp(role, "Enrollee") == 0) {
10666 method = get_param(cmd, "WpsConfigMethod");
10667 if (!method) {
10668 send_resp(dut, conn, SIGMA_INVALID,
10669 "ErrorCode,WpsConfigMethod not provided");
10670 goto fail;
10671 }
10672 if (strcasecmp(method, "PBC") == 0) {
10673 if (wpa_command(intf, "WPS_PBC") < 0) {
10674 send_resp(dut, conn, SIGMA_ERROR,
10675 "ErrorCode,Failed to enable PBC");
10676 goto fail;
10677 }
10678 } else {
10679 /* TODO: PIN method */
10680 send_resp(dut, conn, SIGMA_ERROR,
10681 "ErrorCode,Unsupported WpsConfigMethod value");
10682 goto fail;
10683 }
10684 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
10685 if (res < 0) {
10686 send_resp(dut, conn, SIGMA_ERROR,
10687 "ErrorCode,WPS connection did not complete");
10688 goto fail;
10689 }
10690 if (strstr(buf, "WPS-TIMEOUT")) {
10691 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,NoPeer");
10692 } else if (strstr(buf, "WPS-OVERLAP-DETECTED")) {
10693 send_resp(dut, conn, SIGMA_ERROR,
10694 "ErrorCode,OverlapSession");
10695 } else if (strstr(buf, "CTRL-EVENT-CONNECTED")) {
10696 send_resp(dut, conn, SIGMA_COMPLETE, "Successful");
10697 } else {
10698 send_resp(dut, conn, SIGMA_ERROR,
10699 "ErrorCode,WPS operation failed");
10700 }
10701 } else {
10702 /* TODO: Registrar role */
10703 send_resp(dut, conn, SIGMA_ERROR,
10704 "ErrorCode,Unsupported WpsRole value");
10705 }
10706
10707fail:
10708 wpa_ctrl_detach(ctrl);
10709 wpa_ctrl_close(ctrl);
10710 return 0;
10711}
10712
10713
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010714static int req_intf(struct sigma_cmd *cmd)
10715{
10716 return get_param(cmd, "interface") == NULL ? -1 : 0;
10717}
10718
10719
10720void sta_register_cmds(void)
10721{
10722 sigma_dut_reg_cmd("sta_get_ip_config", req_intf,
10723 cmd_sta_get_ip_config);
10724 sigma_dut_reg_cmd("sta_set_ip_config", req_intf,
10725 cmd_sta_set_ip_config);
10726 sigma_dut_reg_cmd("sta_get_info", req_intf, cmd_sta_get_info);
10727 sigma_dut_reg_cmd("sta_get_mac_address", req_intf,
10728 cmd_sta_get_mac_address);
10729 sigma_dut_reg_cmd("sta_is_connected", req_intf, cmd_sta_is_connected);
10730 sigma_dut_reg_cmd("sta_verify_ip_connection", req_intf,
10731 cmd_sta_verify_ip_connection);
10732 sigma_dut_reg_cmd("sta_get_bssid", req_intf, cmd_sta_get_bssid);
10733 sigma_dut_reg_cmd("sta_set_encryption", req_intf,
10734 cmd_sta_set_encryption);
10735 sigma_dut_reg_cmd("sta_set_psk", req_intf, cmd_sta_set_psk);
10736 sigma_dut_reg_cmd("sta_set_eaptls", req_intf, cmd_sta_set_eaptls);
10737 sigma_dut_reg_cmd("sta_set_eapttls", req_intf, cmd_sta_set_eapttls);
10738 sigma_dut_reg_cmd("sta_set_eapsim", req_intf, cmd_sta_set_eapsim);
10739 sigma_dut_reg_cmd("sta_set_peap", req_intf, cmd_sta_set_peap);
10740 sigma_dut_reg_cmd("sta_set_eapfast", req_intf, cmd_sta_set_eapfast);
10741 sigma_dut_reg_cmd("sta_set_eapaka", req_intf, cmd_sta_set_eapaka);
10742 sigma_dut_reg_cmd("sta_set_eapakaprime", req_intf,
10743 cmd_sta_set_eapakaprime);
10744 sigma_dut_reg_cmd("sta_set_security", req_intf, cmd_sta_set_security);
10745 sigma_dut_reg_cmd("sta_set_uapsd", req_intf, cmd_sta_set_uapsd);
10746 /* TODO: sta_set_ibss */
10747 /* TODO: sta_set_mode */
10748 sigma_dut_reg_cmd("sta_set_wmm", req_intf, cmd_sta_set_wmm);
10749 sigma_dut_reg_cmd("sta_associate", req_intf, cmd_sta_associate);
10750 /* TODO: sta_up_load */
10751 sigma_dut_reg_cmd("sta_preset_testparameters", req_intf,
10752 cmd_sta_preset_testparameters);
10753 /* TODO: sta_set_system */
10754 sigma_dut_reg_cmd("sta_set_11n", req_intf, cmd_sta_set_11n);
10755 /* TODO: sta_set_rifs_test */
10756 sigma_dut_reg_cmd("sta_set_wireless", req_intf, cmd_sta_set_wireless);
10757 sigma_dut_reg_cmd("sta_send_addba", req_intf, cmd_sta_send_addba);
10758 /* TODO: sta_send_coexist_mgmt */
10759 sigma_dut_reg_cmd("sta_disconnect", req_intf, cmd_sta_disconnect);
10760 sigma_dut_reg_cmd("sta_reassoc", req_intf, cmd_sta_reassoc);
10761 sigma_dut_reg_cmd("sta_reassociate", req_intf, cmd_sta_reassoc);
10762 sigma_dut_reg_cmd("sta_reset_default", req_intf,
10763 cmd_sta_reset_default);
10764 sigma_dut_reg_cmd("sta_send_frame", req_intf, cmd_sta_send_frame);
10765 sigma_dut_reg_cmd("sta_set_macaddr", req_intf, cmd_sta_set_macaddr);
10766 sigma_dut_reg_cmd("sta_set_rfeature", req_intf, cmd_sta_set_rfeature);
10767 sigma_dut_reg_cmd("sta_set_radio", req_intf, cmd_sta_set_radio);
10768 sigma_dut_reg_cmd("sta_set_pwrsave", req_intf, cmd_sta_set_pwrsave);
10769 sigma_dut_reg_cmd("sta_bssid_pool", req_intf, cmd_sta_bssid_pool);
10770 sigma_dut_reg_cmd("sta_reset_parm", req_intf, cmd_sta_reset_parm);
10771 sigma_dut_reg_cmd("sta_get_key", req_intf, cmd_sta_get_key);
10772 sigma_dut_reg_cmd("sta_hs2_associate", req_intf,
10773 cmd_sta_hs2_associate);
10774 sigma_dut_reg_cmd("sta_add_credential", req_intf,
10775 cmd_sta_add_credential);
10776 sigma_dut_reg_cmd("sta_scan", req_intf, cmd_sta_scan);
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010777 sigma_dut_reg_cmd("sta_scan_bss", req_intf, cmd_sta_scan_bss);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010778 sigma_dut_reg_cmd("sta_set_systime", NULL, cmd_sta_set_systime);
10779 sigma_dut_reg_cmd("sta_osu", req_intf, cmd_sta_osu);
10780 sigma_dut_reg_cmd("sta_policy_update", req_intf, cmd_sta_policy_update);
10781 sigma_dut_reg_cmd("sta_er_config", NULL, cmd_sta_er_config);
10782 sigma_dut_reg_cmd("sta_wps_connect_pw_token", req_intf,
10783 cmd_sta_wps_connect_pw_token);
Jouni Malinen82905202018-04-29 17:20:10 +030010784 sigma_dut_reg_cmd("sta_exec_action", NULL, cmd_sta_exec_action);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010785 sigma_dut_reg_cmd("sta_get_events", req_intf, cmd_sta_get_events);
10786 sigma_dut_reg_cmd("sta_get_parameter", req_intf, cmd_sta_get_parameter);
vamsi krishna9b144002017-09-20 13:28:13 +053010787 sigma_dut_reg_cmd("start_wps_registration", req_intf,
10788 cmd_start_wps_registration);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010789}