blob: 41d502232a1e13b9099fbf216a79c0d38f22d062 [file] [log] [blame]
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001/*
2 * Sigma Control API DUT (station/AP)
3 * Copyright (c) 2010-2011, Atheros Communications, Inc.
Jouni Malinen9d7e31d2017-12-22 18:55:04 +02004 * Copyright (c) 2011-2017, Qualcomm Atheros, Inc.
Jouni Malinenc12ea4a2018-01-05 21:07:10 +02005 * Copyright (c) 2018, The Linux Foundation
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006 * All Rights Reserved.
7 * Licensed under the Clear BSD license. See README for more details.
8 */
9
10#include "sigma_dut.h"
11#include <sys/ioctl.h>
12#include <sys/stat.h>
Jouni Malinen82905202018-04-29 17:20:10 +030013#include <sys/wait.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020014#ifdef __linux__
Lior Davidcc88b562017-01-03 18:52:09 +020015#include <regex.h>
16#include <dirent.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020017#include <sys/time.h>
18#include <netpacket/packet.h>
19#include <linux/if_ether.h>
20#ifdef ANDROID
21#include <cutils/properties.h>
22#include <android/log.h>
23#include "keystore_get.h"
24#else /* ANDROID */
25#include <ifaddrs.h>
26#endif /* ANDROID */
27#include <netdb.h>
28#endif /* __linux__ */
29#ifdef __QNXNTO__
30#include <net/if_dl.h>
31#endif /* __QNXNTO__ */
32#include "wpa_ctrl.h"
33#include "wpa_helpers.h"
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -070034#include "miracast.h"
Jouni Malinencd4e3c32015-10-29 12:39:56 +020035
36/* Temporary files for sta_send_addba */
37#define VI_QOS_TMP_FILE "/tmp/vi-qos.tmp"
38#define VI_QOS_FILE "/tmp/vi-qos.txt"
39#define VI_QOS_REFFILE "/etc/vi-qos.txt"
40
41/*
42 * MTU for Ethernet need to take into account 8-byte SNAP header
43 * to be added when encapsulating Ethernet frame into 802.11
44 */
45#ifndef IEEE80211_MAX_DATA_LEN_DMG
46#define IEEE80211_MAX_DATA_LEN_DMG 7920
47#endif
48#ifndef IEEE80211_SNAP_LEN_DMG
49#define IEEE80211_SNAP_LEN_DMG 8
50#endif
51
Ashwini Patil00402582017-04-13 12:29:39 +053052#define NON_PREF_CH_LIST_SIZE 100
Ashwini Patil5acd7382017-04-13 15:55:04 +053053#define NEIGHBOR_REPORT_SIZE 1000
54#define DEFAULT_NEIGHBOR_BSSID_INFO "17"
55#define DEFAULT_NEIGHBOR_PHY_TYPE "1"
Ashwini Patil00402582017-04-13 12:29:39 +053056
Jouni Malinencd4e3c32015-10-29 12:39:56 +020057extern char *sigma_wpas_ctrl;
58extern char *sigma_cert_path;
59extern enum driver_type wifi_chip_type;
60extern char *sigma_radio_ifname[];
61
Lior David0fe101e2017-03-09 16:09:50 +020062#ifdef __linux__
63#define WIL_WMI_MAX_PAYLOAD 248
64#define WIL_WMI_BF_TRIG_CMDID 0x83a
65
66struct wil_wmi_header {
67 uint8_t mid;
68 uint8_t reserved;
69 uint16_t cmd;
70 uint32_t ts;
71} __attribute__((packed));
72
73enum wil_wmi_bf_trig_type {
74 WIL_WMI_SLS,
75 WIL_WMI_BRP_RX,
76 WIL_WMI_BRP_TX,
77};
78
79struct wil_wmi_bf_trig_cmd {
80 /* enum wil_wmi_bf_trig_type */
81 uint32_t bf_type;
82 /* cid when type == WMI_BRP_RX */
83 uint32_t sta_id;
84 uint32_t reserved;
85 /* mac address when type = WIL_WMI_SLS */
86 uint8_t dest_mac[6];
87} __attribute__((packed));
88#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +020089
90#ifdef ANDROID
91
92static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname);
93
94#define ANDROID_KEYSTORE_GET 'g'
95#define ANDROID_KEYSTORE_GET_PUBKEY 'b'
96
97static int android_keystore_get(char cmd, const char *key, unsigned char *val)
98{
Jouni Malinencd4e3c32015-10-29 12:39:56 +020099 /* Android 4.3 changed keystore design, so need to use keystore_get() */
100#ifndef KEYSTORE_MESSAGE_SIZE
101#define KEYSTORE_MESSAGE_SIZE 65535
102#endif /* KEYSTORE_MESSAGE_SIZE */
103
104 ssize_t len;
105 uint8_t *value = NULL;
106
107 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
108 "keystore command '%c' key '%s' --> keystore_get",
109 cmd, key);
110
111 len = keystore_get(key, strlen(key), &value);
112 if (len < 0) {
113 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
114 "keystore_get() failed");
115 return -1;
116 }
117
118 if (len > KEYSTORE_MESSAGE_SIZE)
119 len = KEYSTORE_MESSAGE_SIZE;
120 memcpy(val, value, len);
121 free(value);
122 return len;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200123}
124#endif /* ANDROID */
125
126
127int set_ps(const char *intf, struct sigma_dut *dut, int enabled)
128{
129#ifdef __linux__
130 char buf[100];
131
132 if (wifi_chip_type == DRIVER_WCN) {
133 if (enabled) {
134 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 906");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530135 if (system(buf) != 0)
136 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200137 } else {
138 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 905");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530139 if (system(buf) != 0)
140 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200141 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 912");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530142 if (system(buf) != 0)
143 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200144 }
145
146 return 0;
147 }
148
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530149set_power_save:
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200150 snprintf(buf, sizeof(buf), "./iw dev %s set power_save %s",
151 intf, enabled ? "on" : "off");
152 if (system(buf) != 0) {
153 snprintf(buf, sizeof(buf), "iw dev %s set power_save %s",
154 intf, enabled ? "on" : "off");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530155 if (system(buf) != 0) {
156 sigma_dut_print(dut, DUT_MSG_ERROR,
157 "Failed to set power save %s",
158 enabled ? "on" : "off");
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200159 return -1;
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530160 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200161 }
162
163 return 0;
164#else /* __linux__ */
165 return -1;
166#endif /* __linux__ */
167}
168
169
Lior Davidcc88b562017-01-03 18:52:09 +0200170#ifdef __linux__
Lior David0fe101e2017-03-09 16:09:50 +0200171
Lior Davidcc88b562017-01-03 18:52:09 +0200172static int wil6210_get_debugfs_dir(struct sigma_dut *dut, char *path,
173 size_t len)
174{
175 DIR *dir, *wil_dir;
176 struct dirent *entry;
177 int ret = -1;
178 const char *root_path = "/sys/kernel/debug/ieee80211";
179
180 dir = opendir(root_path);
181 if (!dir)
182 return -2;
183
184 while ((entry = readdir(dir))) {
185 if (strcmp(entry->d_name, ".") == 0 ||
186 strcmp(entry->d_name, "..") == 0)
187 continue;
188
189 if (snprintf(path, len, "%s/%s/wil6210",
190 root_path, entry->d_name) >= (int) len) {
191 ret = -3;
192 break;
193 }
194
195 wil_dir = opendir(path);
196 if (wil_dir) {
197 closedir(wil_dir);
198 ret = 0;
199 break;
200 }
201 }
202
203 closedir(dir);
204 return ret;
205}
Lior David0fe101e2017-03-09 16:09:50 +0200206
207
208static int wil6210_wmi_send(struct sigma_dut *dut, uint16_t command,
209 void *payload, uint16_t length)
210{
211 struct {
212 struct wil_wmi_header hdr;
213 char payload[WIL_WMI_MAX_PAYLOAD];
214 } __attribute__((packed)) cmd;
215 char buf[128], fname[128];
216 size_t towrite, written;
217 FILE *f;
218
219 if (length > WIL_WMI_MAX_PAYLOAD) {
220 sigma_dut_print(dut, DUT_MSG_ERROR,
221 "payload too large(%u, max %u)",
222 length, WIL_WMI_MAX_PAYLOAD);
223 return -1;
224 }
225
226 memset(&cmd.hdr, 0, sizeof(cmd.hdr));
227 cmd.hdr.cmd = command;
228 memcpy(cmd.payload, payload, length);
229
230 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
231 sigma_dut_print(dut, DUT_MSG_ERROR,
232 "failed to get wil6210 debugfs dir");
233 return -1;
234 }
235
236 snprintf(fname, sizeof(fname), "%s/wmi_send", buf);
237 f = fopen(fname, "wb");
238 if (!f) {
239 sigma_dut_print(dut, DUT_MSG_ERROR,
240 "failed to open: %s", fname);
241 return -1;
242 }
243
244 towrite = sizeof(cmd.hdr) + length;
245 written = fwrite(&cmd, 1, towrite, f);
246 fclose(f);
247 if (written != towrite) {
248 sigma_dut_print(dut, DUT_MSG_ERROR,
249 "failed to send wmi %u", command);
250 return -1;
251 }
252
253 return 0;
254}
255
256
257static int wil6210_get_sta_info_field(struct sigma_dut *dut, const char *bssid,
258 const char *pattern, unsigned int *field)
259{
260 char buf[128], fname[128];
261 FILE *f;
262 regex_t re;
263 regmatch_t m[2];
264 int rc, ret = -1;
265
266 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
267 sigma_dut_print(dut, DUT_MSG_ERROR,
268 "failed to get wil6210 debugfs dir");
269 return -1;
270 }
271
272 snprintf(fname, sizeof(fname), "%s/stations", buf);
273 f = fopen(fname, "r");
274 if (!f) {
275 sigma_dut_print(dut, DUT_MSG_ERROR,
276 "failed to open: %s", fname);
277 return -1;
278 }
279
280 if (regcomp(&re, pattern, REG_EXTENDED)) {
281 sigma_dut_print(dut, DUT_MSG_ERROR,
282 "regcomp failed: %s", pattern);
283 goto out;
284 }
285
286 /*
287 * find the entry for the mac address
288 * line is of the form: [n] 11:22:33:44:55:66 state AID aid
289 */
290 while (fgets(buf, sizeof(buf), f)) {
291 if (strcasestr(buf, bssid)) {
292 /* extract the field (CID/AID/state) */
293 rc = regexec(&re, buf, 2, m, 0);
294 if (!rc && (m[1].rm_so >= 0)) {
295 buf[m[1].rm_eo] = 0;
296 *field = atoi(&buf[m[1].rm_so]);
297 ret = 0;
298 break;
299 }
300 }
301 }
302
303 regfree(&re);
304 if (ret)
305 sigma_dut_print(dut, DUT_MSG_ERROR,
306 "could not extract field");
307
308out:
309 fclose(f);
310
311 return ret;
312}
313
314
315static int wil6210_get_cid(struct sigma_dut *dut, const char *bssid,
316 unsigned int *cid)
317{
318 const char *pattern = "\\[([0-9]+)\\]";
319
320 return wil6210_get_sta_info_field(dut, bssid, pattern, cid);
321}
322
323
324static int wil6210_send_brp_rx(struct sigma_dut *dut, const char *mac,
325 int l_rx)
326{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700327 struct wil_wmi_bf_trig_cmd cmd;
Lior David0fe101e2017-03-09 16:09:50 +0200328 unsigned int cid;
329
Rakesh Sunki556237d2017-03-30 14:49:31 -0700330 memset(&cmd, 0, sizeof(cmd));
331
Lior David0fe101e2017-03-09 16:09:50 +0200332 if (wil6210_get_cid(dut, mac, &cid))
333 return -1;
334
335 cmd.bf_type = WIL_WMI_BRP_RX;
336 cmd.sta_id = cid;
337 /* training length (l_rx) is ignored, FW always uses length 16 */
338 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
339 &cmd, sizeof(cmd));
340}
341
342
343static int wil6210_send_sls(struct sigma_dut *dut, const char *mac)
344{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700345 struct wil_wmi_bf_trig_cmd cmd;
346
347 memset(&cmd, 0, sizeof(cmd));
Lior David0fe101e2017-03-09 16:09:50 +0200348
349 if (parse_mac_address(dut, mac, (unsigned char *)&cmd.dest_mac))
350 return -1;
351
352 cmd.bf_type = WIL_WMI_SLS;
353 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
354 &cmd, sizeof(cmd));
355}
356
Lior Davidcc88b562017-01-03 18:52:09 +0200357#endif /* __linux__ */
358
359
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200360static void static_ip_file(int proto, const char *addr, const char *mask,
361 const char *gw)
362{
363 if (proto) {
364 FILE *f = fopen("static-ip", "w");
365 if (f) {
366 fprintf(f, "%d %s %s %s\n", proto, addr,
367 mask ? mask : "N/A",
368 gw ? gw : "N/A");
369 fclose(f);
370 }
371 } else {
372 unlink("static-ip");
373 }
374}
375
376
377static int send_neighbor_request(struct sigma_dut *dut, const char *intf,
378 const char *ssid)
379{
380#ifdef __linux__
381 char buf[100];
382
383 snprintf(buf, sizeof(buf), "iwpriv %s neighbor %s",
384 intf, ssid);
385 sigma_dut_print(dut, DUT_MSG_INFO, "Request: %s", buf);
386
387 if (system(buf) != 0) {
388 sigma_dut_print(dut, DUT_MSG_ERROR,
389 "iwpriv neighbor request failed");
390 return -1;
391 }
392
393 sigma_dut_print(dut, DUT_MSG_INFO, "iwpriv neighbor request send");
394
395 return 0;
396#else /* __linux__ */
397 return -1;
398#endif /* __linux__ */
399}
400
401
402static int send_trans_mgmt_query(struct sigma_dut *dut, const char *intf,
Ashwini Patil5acd7382017-04-13 15:55:04 +0530403 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200404{
Ashwini Patil5acd7382017-04-13 15:55:04 +0530405 const char *val;
406 int reason_code = 0;
407 char buf[1024];
408
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200409 /*
410 * In the earlier builds we used WNM_QUERY and in later
411 * builds used WNM_BSS_QUERY.
412 */
413
Ashwini Patil5acd7382017-04-13 15:55:04 +0530414 val = get_param(cmd, "BTMQuery_Reason_Code");
415 if (val)
416 reason_code = atoi(val);
417
418 val = get_param(cmd, "Cand_List");
419 if (val && atoi(val) == 1 && dut->btm_query_cand_list) {
420 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d%s", reason_code,
421 dut->btm_query_cand_list);
422 free(dut->btm_query_cand_list);
423 dut->btm_query_cand_list = NULL;
424 } else {
425 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d", reason_code);
426 }
427
428 if (wpa_command(intf, buf) != 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200429 sigma_dut_print(dut, DUT_MSG_ERROR,
430 "transition management query failed");
431 return -1;
432 }
433
434 sigma_dut_print(dut, DUT_MSG_DEBUG,
435 "transition management query sent");
436
437 return 0;
438}
439
440
441int is_ip_addr(const char *str)
442{
443 const char *pos = str;
444 struct in_addr addr;
445
446 while (*pos) {
447 if (*pos != '.' && (*pos < '0' || *pos > '9'))
448 return 0;
449 pos++;
450 }
451
452 return inet_aton(str, &addr);
453}
454
455
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200456int get_ip_config(struct sigma_dut *dut, const char *ifname, char *buf,
457 size_t buf_len)
458{
vamsi krishnaa11d0732018-05-16 12:19:48 +0530459 char tmp[256];
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200460 char ip[16], mask[15], dns[16], sec_dns[16];
461 int is_dhcp = 0;
462 int s;
463#ifdef ANDROID
464 char prop[PROPERTY_VALUE_MAX];
vamsi krishnaa11d0732018-05-16 12:19:48 +0530465#else /* ANDROID */
466 FILE *f;
467#ifdef __linux__
468 const char *str_ps;
469#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200470#endif /* ANDROID */
471
472 ip[0] = '\0';
473 mask[0] = '\0';
474 dns[0] = '\0';
475 sec_dns[0] = '\0';
476
477 s = socket(PF_INET, SOCK_DGRAM, 0);
478 if (s >= 0) {
479 struct ifreq ifr;
480 struct sockaddr_in saddr;
481
482 memset(&ifr, 0, sizeof(ifr));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700483 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200484 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
485 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get "
486 "%s IP address: %s",
487 ifname, strerror(errno));
488 } else {
489 memcpy(&saddr, &ifr.ifr_addr,
490 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700491 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200492 }
493
494 if (ioctl(s, SIOCGIFNETMASK, &ifr) == 0) {
495 memcpy(&saddr, &ifr.ifr_addr,
496 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700497 strlcpy(mask, inet_ntoa(saddr.sin_addr), sizeof(mask));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200498 }
499 close(s);
500 }
501
502#ifdef ANDROID
503 snprintf(tmp, sizeof(tmp), "dhcp.%s.pid", ifname);
504 if (property_get(tmp, prop, NULL) != 0 && atoi(prop) > 0) {
505 snprintf(tmp, sizeof(tmp), "dhcp.%s.result", ifname);
506 if (property_get(tmp, prop, NULL) != 0 &&
507 strcmp(prop, "ok") == 0) {
508 snprintf(tmp, sizeof(tmp), "dhcp.%s.ipaddress",
509 ifname);
510 if (property_get(tmp, prop, NULL) != 0 &&
511 strcmp(ip, prop) == 0)
512 is_dhcp = 1;
513 }
514 }
515
516 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns1", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700517 if (property_get(tmp, prop, NULL) != 0)
518 strlcpy(dns, prop, sizeof(dns));
519 else if (property_get("net.dns1", prop, NULL) != 0)
520 strlcpy(dns, prop, sizeof(dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200521
522 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns2", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700523 if (property_get(tmp, prop, NULL) != 0)
524 strlcpy(sec_dns, prop, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200525#else /* ANDROID */
526#ifdef __linux__
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530527 if (get_driver_type() == DRIVER_OPENWRT)
528 str_ps = "ps -w";
529 else
530 str_ps = "ps ax";
531 snprintf(tmp, sizeof(tmp),
532 "%s | grep dhclient | grep -v grep | grep -q %s",
533 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200534 if (system(tmp) == 0)
535 is_dhcp = 1;
536 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530537 snprintf(tmp, sizeof(tmp),
538 "%s | grep udhcpc | grep -v grep | grep -q %s",
539 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200540 if (system(tmp) == 0)
541 is_dhcp = 1;
542 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530543 snprintf(tmp, sizeof(tmp),
544 "%s | grep dhcpcd | grep -v grep | grep -q %s",
545 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200546 if (system(tmp) == 0)
547 is_dhcp = 1;
548 }
549 }
550#endif /* __linux__ */
551
552 f = fopen("/etc/resolv.conf", "r");
553 if (f) {
vamsi krishnaa11d0732018-05-16 12:19:48 +0530554 char *pos, *pos2;
555
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200556 while (fgets(tmp, sizeof(tmp), f)) {
557 if (strncmp(tmp, "nameserver", 10) != 0)
558 continue;
559 pos = tmp + 10;
560 while (*pos == ' ' || *pos == '\t')
561 pos++;
562 pos2 = pos;
563 while (*pos2) {
564 if (*pos2 == '\n' || *pos2 == '\r') {
565 *pos2 = '\0';
566 break;
567 }
568 pos2++;
569 }
Peng Xub8fc5cc2017-05-10 17:27:28 -0700570 if (!dns[0])
571 strlcpy(dns, pos, sizeof(dns));
572 else if (!sec_dns[0])
573 strlcpy(sec_dns, pos, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200574 }
575 fclose(f);
576 }
577#endif /* ANDROID */
578
579 snprintf(buf, buf_len, "dhcp,%d,ip,%s,mask,%s,primary-dns,%s",
580 is_dhcp, ip, mask, dns);
581 buf[buf_len - 1] = '\0';
582
583 return 0;
584}
585
586
587
588
589int get_ipv6_config(struct sigma_dut *dut, const char *ifname, char *buf,
590 size_t buf_len)
591{
592#ifdef __linux__
593#ifdef ANDROID
594 char cmd[200], result[1000], *pos, *end;
595 FILE *f;
596 size_t len;
597
598 snprintf(cmd, sizeof(cmd), "ip addr show dev %s scope global", ifname);
599 f = popen(cmd, "r");
600 if (f == NULL)
601 return -1;
602 len = fread(result, 1, sizeof(result) - 1, f);
603 pclose(f);
604 if (len == 0)
605 return -1;
606 result[len] = '\0';
607 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s result: %s\n", cmd, result);
608
609 pos = strstr(result, "inet6 ");
610 if (pos == NULL)
611 return -1;
612 pos += 6;
613 end = strchr(pos, ' ');
614 if (end)
615 *end = '\0';
616 end = strchr(pos, '/');
617 if (end)
618 *end = '\0';
619 snprintf(buf, buf_len, "ip,%s", pos);
620 buf[buf_len - 1] = '\0';
621 return 0;
622#else /* ANDROID */
623 struct ifaddrs *ifaddr, *ifa;
624 int res, found = 0;
625 char host[NI_MAXHOST];
626
627 if (getifaddrs(&ifaddr) < 0) {
628 perror("getifaddrs");
629 return -1;
630 }
631
632 for (ifa = ifaddr; ifa; ifa = ifa->ifa_next) {
633 if (strcasecmp(ifname, ifa->ifa_name) != 0)
634 continue;
635 if (ifa->ifa_addr == NULL ||
636 ifa->ifa_addr->sa_family != AF_INET6)
637 continue;
638
639 res = getnameinfo(ifa->ifa_addr, sizeof(struct sockaddr_in6),
640 host, NI_MAXHOST, NULL, 0, NI_NUMERICHOST);
641 if (res != 0) {
642 sigma_dut_print(dut, DUT_MSG_DEBUG, "getnameinfo: %s",
643 gai_strerror(res));
644 continue;
645 }
646 if (strncmp(host, "fe80::", 6) == 0)
647 continue; /* skip link-local */
648
649 sigma_dut_print(dut, DUT_MSG_DEBUG, "ifaddr: %s", host);
650 found = 1;
651 break;
652 }
653
654 freeifaddrs(ifaddr);
655
656 if (found) {
657 char *pos;
658 pos = strchr(host, '%');
659 if (pos)
660 *pos = '\0';
661 snprintf(buf, buf_len, "ip,%s", host);
662 buf[buf_len - 1] = '\0';
663 return 0;
664 }
665
666#endif /* ANDROID */
667#endif /* __linux__ */
668 return -1;
669}
670
671
672static int cmd_sta_get_ip_config(struct sigma_dut *dut,
673 struct sigma_conn *conn,
674 struct sigma_cmd *cmd)
675{
676 const char *intf = get_param(cmd, "Interface");
677 const char *ifname;
678 char buf[200];
679 const char *val;
680 int type = 1;
681
682 if (intf == NULL)
683 return -1;
684
685 if (strcmp(intf, get_main_ifname()) == 0)
686 ifname = get_station_ifname();
687 else
688 ifname = intf;
689
690 /*
691 * UCC may assume the IP address to be available immediately after
692 * association without trying to run sta_get_ip_config multiple times.
693 * Sigma CAPI does not specify this command as a block command that
694 * would wait for the address to become available, but to pass tests
695 * more reliably, it looks like such a wait may be needed here.
696 */
697 if (wait_ip_addr(dut, ifname, 15) < 0) {
698 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get IP address "
699 "for sta_get_ip_config");
700 /*
701 * Try to continue anyway since many UCC tests do not really
702 * care about the return value from here..
703 */
704 }
705
706 val = get_param(cmd, "Type");
707 if (val)
708 type = atoi(val);
709 if (type == 2 || dut->last_set_ip_config_ipv6) {
710 int i;
711
712 /*
713 * Since we do not have proper wait for IPv6 addresses, use a
714 * fixed two second delay here as a workaround for UCC script
715 * assuming IPv6 address is available when this command returns.
716 * Some scripts did not use Type,2 properly for IPv6, so include
717 * also the cases where the previous sta_set_ip_config indicated
718 * use of IPv6.
719 */
720 sigma_dut_print(dut, DUT_MSG_INFO, "Wait up to extra ten seconds in sta_get_ip_config for IPv6 address");
721 for (i = 0; i < 10; i++) {
722 sleep(1);
723 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) == 0)
724 {
725 sigma_dut_print(dut, DUT_MSG_INFO, "Found IPv6 address");
726 send_resp(dut, conn, SIGMA_COMPLETE, buf);
727#ifdef ANDROID
728 sigma_dut_print(dut, DUT_MSG_INFO,
729 "Adding IPv6 rule on Android");
730 add_ipv6_rule(dut, intf);
731#endif /* ANDROID */
732
733 return 0;
734 }
735 }
736 }
737 if (type == 1) {
738 if (get_ip_config(dut, ifname, buf, sizeof(buf)) < 0)
739 return -2;
740 } else if (type == 2) {
741 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) < 0)
742 return -2;
743 } else {
744 send_resp(dut, conn, SIGMA_ERROR,
745 "errorCode,Unsupported address type");
746 return 0;
747 }
748
749 send_resp(dut, conn, SIGMA_COMPLETE, buf);
750 return 0;
751}
752
753
754static void kill_dhcp_client(struct sigma_dut *dut, const char *ifname)
755{
756#ifdef __linux__
757 char buf[200];
758 char path[128];
759 struct stat s;
760
761#ifdef ANDROID
762 snprintf(path, sizeof(path), "/data/misc/dhcp/dhcpcd-%s.pid", ifname);
763#else /* ANDROID */
764 snprintf(path, sizeof(path), "/var/run/dhclient-%s.pid", ifname);
765#endif /* ANDROID */
766 if (stat(path, &s) == 0) {
767 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
768 sigma_dut_print(dut, DUT_MSG_INFO,
769 "Kill previous DHCP client: %s", buf);
770 if (system(buf) != 0)
771 sigma_dut_print(dut, DUT_MSG_INFO,
772 "Failed to kill DHCP client");
773 unlink(path);
774 sleep(1);
775 } else {
776 snprintf(path, sizeof(path), "/var/run/dhcpcd-%s.pid", ifname);
777
778 if (stat(path, &s) == 0) {
779 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
780 sigma_dut_print(dut, DUT_MSG_INFO,
781 "Kill previous DHCP client: %s", buf);
782 if (system(buf) != 0)
783 sigma_dut_print(dut, DUT_MSG_INFO,
784 "Failed to kill DHCP client");
785 unlink(path);
786 sleep(1);
787 }
788 }
789#endif /* __linux__ */
790}
791
792
793static int start_dhcp_client(struct sigma_dut *dut, const char *ifname)
794{
795#ifdef __linux__
796 char buf[200];
797
798#ifdef ANDROID
Purushottam Kushwaha46d64262016-08-23 17:57:53 +0530799 if (access("/system/bin/dhcpcd", F_OK) != -1) {
800 snprintf(buf, sizeof(buf),
801 "/system/bin/dhcpcd -b %s", ifname);
802 } else if (access("/system/bin/dhcptool", F_OK) != -1) {
803 snprintf(buf, sizeof(buf), "/system/bin/dhcptool %s &", ifname);
804 } else {
805 sigma_dut_print(dut, DUT_MSG_ERROR,
806 "DHCP client program missing");
807 return 0;
808 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200809#else /* ANDROID */
810 snprintf(buf, sizeof(buf),
811 "dhclient -nw -pf /var/run/dhclient-%s.pid %s",
812 ifname, ifname);
813#endif /* ANDROID */
814 sigma_dut_print(dut, DUT_MSG_INFO, "Start DHCP client: %s", buf);
815 if (system(buf) != 0) {
816 snprintf(buf, sizeof(buf), "dhcpcd -t 0 %s &", ifname);
817 if (system(buf) != 0) {
818 sigma_dut_print(dut, DUT_MSG_INFO,
819 "Failed to start DHCP client");
820#ifndef ANDROID
821 return -1;
822#endif /* ANDROID */
823 }
824 }
825#endif /* __linux__ */
826
827 return 0;
828}
829
830
831static int clear_ip_addr(struct sigma_dut *dut, const char *ifname)
832{
833#ifdef __linux__
834 char buf[200];
835
836 snprintf(buf, sizeof(buf), "ip addr flush dev %s", ifname);
837 if (system(buf) != 0) {
838 sigma_dut_print(dut, DUT_MSG_INFO,
839 "Failed to clear IP addresses");
840 return -1;
841 }
842#endif /* __linux__ */
843
844 return 0;
845}
846
847
848#ifdef ANDROID
849static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname)
850{
851 char cmd[200], *result, *pos;
852 FILE *fp;
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530853 int tableid;
854 size_t len, result_len = 1000;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200855
856 snprintf(cmd, sizeof(cmd), "ip -6 route list table all | grep %s",
857 ifname);
858 fp = popen(cmd, "r");
859 if (fp == NULL)
860 return -1;
861
862 result = malloc(result_len);
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530863 if (result == NULL) {
864 fclose(fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200865 return -1;
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530866 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200867
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530868 len = fread(result, 1, result_len - 1, fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200869 fclose(fp);
870
871 if (len == 0) {
872 free(result);
873 return -1;
874 }
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530875 result[len] = '\0';
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200876
877 pos = strstr(result, "table ");
878 if (pos == NULL) {
879 free(result);
880 return -1;
881 }
882
883 pos += strlen("table ");
884 tableid = atoi(pos);
885 if (tableid != 0) {
886 if (system("ip -6 rule del prio 22000") != 0) {
887 /* ignore any error */
888 }
889 snprintf(cmd, sizeof(cmd),
890 "ip -6 rule add from all lookup %d prio 22000",
891 tableid);
892 if (system(cmd) != 0) {
893 sigma_dut_print(dut, DUT_MSG_INFO,
894 "Failed to run %s", cmd);
895 free(result);
896 return -1;
897 }
898 } else {
899 sigma_dut_print(dut, DUT_MSG_INFO,
900 "No Valid Table Id found %s", pos);
901 free(result);
902 return -1;
903 }
904 free(result);
905
906 return 0;
907}
908#endif /* ANDROID */
909
910
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530911int set_ipv4_addr(struct sigma_dut *dut, const char *ifname,
912 const char *ip, const char *mask)
913{
914 char buf[200];
915
916 snprintf(buf, sizeof(buf), "ifconfig %s %s netmask %s",
917 ifname, ip, mask);
918 return system(buf) == 0;
919}
920
921
922int set_ipv4_gw(struct sigma_dut *dut, const char *gw)
923{
924 char buf[200];
925
926 if (!is_ip_addr(gw)) {
927 sigma_dut_print(dut, DUT_MSG_DEBUG, "Invalid gw addr - %s", gw);
928 return -1;
929 }
930
931 snprintf(buf, sizeof(buf), "route add default gw %s", gw);
932 if (!dut->no_ip_addr_set && system(buf) != 0) {
933 snprintf(buf, sizeof(buf), "ip ro re default via %s",
934 gw);
935 if (system(buf) != 0)
936 return 0;
937 }
938
939 return 1;
940}
941
942
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200943static int cmd_sta_set_ip_config(struct sigma_dut *dut,
944 struct sigma_conn *conn,
945 struct sigma_cmd *cmd)
946{
947 const char *intf = get_param(cmd, "Interface");
948 const char *ifname;
949 char buf[200];
950 const char *val, *ip, *mask, *gw;
951 int type = 1;
952
953 if (intf == NULL)
954 return -1;
955
956 if (strcmp(intf, get_main_ifname()) == 0)
957 ifname = get_station_ifname();
958 else
959 ifname = intf;
960
961 if (if_nametoindex(ifname) == 0) {
962 send_resp(dut, conn, SIGMA_ERROR,
963 "ErrorCode,Unknown interface");
964 return 0;
965 }
966
967 val = get_param(cmd, "Type");
968 if (val) {
969 type = atoi(val);
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530970 if (type < 1 || type > 3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200971 send_resp(dut, conn, SIGMA_ERROR,
972 "ErrorCode,Unsupported address type");
973 return 0;
974 }
975 }
976
977 dut->last_set_ip_config_ipv6 = 0;
978
979 val = get_param(cmd, "dhcp");
980 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "true") == 0)) {
981 static_ip_file(0, NULL, NULL, NULL);
982#ifdef __linux__
983 if (type == 2) {
984 dut->last_set_ip_config_ipv6 = 1;
985 sigma_dut_print(dut, DUT_MSG_INFO, "Using IPv6 "
986 "stateless address autoconfiguration");
987#ifdef ANDROID
988 /*
989 * This sleep is required as the assignment in case of
990 * Android is taking time and is done by the kernel.
991 * The subsequent ping for IPv6 is impacting HS20 test
992 * case.
993 */
994 sleep(2);
995 add_ipv6_rule(dut, intf);
996#endif /* ANDROID */
997 /* Assume this happens by default */
998 return 1;
999 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301000 if (type != 3) {
1001 kill_dhcp_client(dut, ifname);
1002 if (start_dhcp_client(dut, ifname) < 0)
1003 return -2;
1004 } else {
1005 sigma_dut_print(dut, DUT_MSG_DEBUG,
1006 "Using FILS HLP DHCPv4 Rapid Commit");
1007 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001008
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001009 return 1;
1010#endif /* __linux__ */
1011 return -2;
1012 }
1013
1014 ip = get_param(cmd, "ip");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301015 if (!ip) {
1016 send_resp(dut, conn, SIGMA_INVALID,
1017 "ErrorCode,Missing IP address");
1018 return 0;
1019 }
1020
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001021 mask = get_param(cmd, "mask");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301022 if (!mask) {
1023 send_resp(dut, conn, SIGMA_INVALID,
1024 "ErrorCode,Missing subnet mask");
1025 return 0;
1026 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001027
1028 if (type == 2) {
1029 int net = atoi(mask);
1030
1031 if ((net < 0 && net > 64) || !is_ipv6_addr(ip))
1032 return -1;
1033
1034 if (dut->no_ip_addr_set) {
1035 snprintf(buf, sizeof(buf),
1036 "sysctl net.ipv6.conf.%s.disable_ipv6=1",
1037 ifname);
1038 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1039 if (system(buf) != 0) {
1040 sigma_dut_print(dut, DUT_MSG_DEBUG,
1041 "Failed to disable IPv6 address before association");
1042 }
1043 } else {
1044 snprintf(buf, sizeof(buf),
1045 "ip -6 addr del %s/%s dev %s",
1046 ip, mask, ifname);
1047 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1048 if (system(buf) != 0) {
1049 /*
1050 * This command may fail if the address being
1051 * deleted does not exist. Inaction here is
1052 * intentional.
1053 */
1054 }
1055
1056 snprintf(buf, sizeof(buf),
1057 "ip -6 addr add %s/%s dev %s",
1058 ip, mask, ifname);
1059 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1060 if (system(buf) != 0) {
1061 send_resp(dut, conn, SIGMA_ERROR,
1062 "ErrorCode,Failed to set IPv6 address");
1063 return 0;
1064 }
1065 }
1066
1067 dut->last_set_ip_config_ipv6 = 1;
1068 static_ip_file(6, ip, mask, NULL);
1069 return 1;
1070 } else if (type == 1) {
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301071 if (!is_ip_addr(ip) || !is_ip_addr(mask))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001072 return -1;
1073 }
1074
1075 kill_dhcp_client(dut, ifname);
1076
1077 if (!dut->no_ip_addr_set) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301078 if (!set_ipv4_addr(dut, ifname, ip, mask)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001079 send_resp(dut, conn, SIGMA_ERROR,
1080 "ErrorCode,Failed to set IP address");
1081 return 0;
1082 }
1083 }
1084
1085 gw = get_param(cmd, "defaultGateway");
1086 if (gw) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301087 if (set_ipv4_gw(dut, gw) < 1) {
1088 send_resp(dut, conn, SIGMA_ERROR,
1089 "ErrorCode,Failed to set default gateway");
1090 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001091 }
1092 }
1093
1094 val = get_param(cmd, "primary-dns");
1095 if (val) {
1096 /* TODO */
1097 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored primary-dns %s "
1098 "setting", val);
1099 }
1100
1101 val = get_param(cmd, "secondary-dns");
1102 if (val) {
1103 /* TODO */
1104 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored secondary-dns %s "
1105 "setting", val);
1106 }
1107
1108 static_ip_file(4, ip, mask, gw);
1109
1110 return 1;
1111}
1112
1113
1114static int cmd_sta_get_info(struct sigma_dut *dut, struct sigma_conn *conn,
1115 struct sigma_cmd *cmd)
1116{
1117 /* const char *intf = get_param(cmd, "Interface"); */
1118 /* TODO: could report more details here */
1119 send_resp(dut, conn, SIGMA_COMPLETE, "vendor,Atheros");
1120 return 0;
1121}
1122
1123
1124static int cmd_sta_get_mac_address(struct sigma_dut *dut,
1125 struct sigma_conn *conn,
1126 struct sigma_cmd *cmd)
1127{
1128 /* const char *intf = get_param(cmd, "Interface"); */
1129 char addr[20], resp[50];
1130
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05301131 if (dut->dev_role == DEVROLE_STA_CFON)
1132 return sta_cfon_get_mac_address(dut, conn, cmd);
1133
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001134 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
1135 < 0)
1136 return -2;
1137
1138 snprintf(resp, sizeof(resp), "mac,%s", addr);
1139 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1140 return 0;
1141}
1142
1143
1144static int cmd_sta_is_connected(struct sigma_dut *dut, struct sigma_conn *conn,
1145 struct sigma_cmd *cmd)
1146{
1147 /* const char *intf = get_param(cmd, "Interface"); */
1148 int connected = 0;
1149 char result[32];
1150 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
1151 sizeof(result)) < 0) {
1152 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get interface "
1153 "%s status", get_station_ifname());
1154 return -2;
1155 }
1156
1157 sigma_dut_print(dut, DUT_MSG_DEBUG, "wpa_state=%s", result);
1158 if (strncmp(result, "COMPLETED", 9) == 0)
1159 connected = 1;
1160
1161 if (connected)
1162 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1163 else
1164 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1165
1166 return 0;
1167}
1168
1169
1170static int cmd_sta_verify_ip_connection(struct sigma_dut *dut,
1171 struct sigma_conn *conn,
1172 struct sigma_cmd *cmd)
1173{
1174 /* const char *intf = get_param(cmd, "Interface"); */
1175 const char *dst, *timeout;
1176 int wait_time = 90;
1177 char buf[100];
1178 int res;
1179
1180 dst = get_param(cmd, "destination");
1181 if (dst == NULL || !is_ip_addr(dst))
1182 return -1;
1183
1184 timeout = get_param(cmd, "timeout");
1185 if (timeout) {
1186 wait_time = atoi(timeout);
1187 if (wait_time < 1)
1188 wait_time = 1;
1189 }
1190
1191 /* TODO: force renewal of IP lease if DHCP is enabled */
1192
1193 snprintf(buf, sizeof(buf), "ping %s -c 3 -W %d", dst, wait_time);
1194 res = system(buf);
1195 sigma_dut_print(dut, DUT_MSG_DEBUG, "ping returned: %d", res);
1196 if (res == 0)
1197 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1198 else if (res == 256)
1199 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1200 else
1201 return -2;
1202
1203 return 0;
1204}
1205
1206
1207static int cmd_sta_get_bssid(struct sigma_dut *dut, struct sigma_conn *conn,
1208 struct sigma_cmd *cmd)
1209{
1210 /* const char *intf = get_param(cmd, "Interface"); */
1211 char bssid[20], resp[50];
1212
1213 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
1214 < 0)
Peng Xub8fc5cc2017-05-10 17:27:28 -07001215 strlcpy(bssid, "00:00:00:00:00:00", sizeof(bssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001216
1217 snprintf(resp, sizeof(resp), "bssid,%s", bssid);
1218 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1219 return 0;
1220}
1221
1222
1223#ifdef __SAMSUNG__
1224static int add_use_network(const char *ifname)
1225{
1226 char buf[100];
1227
1228 snprintf(buf, sizeof(buf), "USE_NETWORK ON");
1229 wpa_command(ifname, buf);
1230 return 0;
1231}
1232#endif /* __SAMSUNG__ */
1233
1234
1235static int add_network_common(struct sigma_dut *dut, struct sigma_conn *conn,
1236 const char *ifname, struct sigma_cmd *cmd)
1237{
1238 const char *ssid = get_param(cmd, "ssid");
1239 int id;
1240 const char *val;
1241
1242 if (ssid == NULL)
1243 return -1;
1244
1245 start_sta_mode(dut);
1246
1247#ifdef __SAMSUNG__
1248 add_use_network(ifname);
1249#endif /* __SAMSUNG__ */
1250
1251 id = add_network(ifname);
1252 if (id < 0)
1253 return -2;
1254 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding network %d", id);
1255
1256 if (set_network_quoted(ifname, id, "ssid", ssid) < 0)
1257 return -2;
1258
1259 dut->infra_network_id = id;
1260 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
1261
1262 val = get_param(cmd, "program");
1263 if (!val)
1264 val = get_param(cmd, "prog");
1265 if (val && strcasecmp(val, "hs2") == 0) {
1266 char buf[100];
1267 snprintf(buf, sizeof(buf), "ENABLE_NETWORK %d no-connect", id);
1268 wpa_command(ifname, buf);
1269
1270 val = get_param(cmd, "prefer");
1271 if (val && atoi(val) > 0)
1272 set_network(ifname, id, "priority", "1");
1273 }
1274
1275 return id;
1276}
1277
1278
1279static int cmd_sta_set_encryption(struct sigma_dut *dut,
1280 struct sigma_conn *conn,
1281 struct sigma_cmd *cmd)
1282{
1283 const char *intf = get_param(cmd, "Interface");
1284 const char *ssid = get_param(cmd, "ssid");
1285 const char *type = get_param(cmd, "encpType");
1286 const char *ifname;
1287 char buf[200];
1288 int id;
1289
1290 if (intf == NULL || ssid == NULL)
1291 return -1;
1292
1293 if (strcmp(intf, get_main_ifname()) == 0)
1294 ifname = get_station_ifname();
1295 else
1296 ifname = intf;
1297
1298 id = add_network_common(dut, conn, ifname, cmd);
1299 if (id < 0)
1300 return id;
1301
1302 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
1303 return -2;
1304
1305 if (type && strcasecmp(type, "wep") == 0) {
1306 const char *val;
1307 int i;
1308
1309 val = get_param(cmd, "activeKey");
1310 if (val) {
1311 int keyid;
1312 keyid = atoi(val);
1313 if (keyid < 1 || keyid > 4)
1314 return -1;
1315 snprintf(buf, sizeof(buf), "%d", keyid - 1);
1316 if (set_network(ifname, id, "wep_tx_keyidx", buf) < 0)
1317 return -2;
1318 }
1319
1320 for (i = 0; i < 4; i++) {
1321 snprintf(buf, sizeof(buf), "key%d", i + 1);
1322 val = get_param(cmd, buf);
1323 if (val == NULL)
1324 continue;
1325 snprintf(buf, sizeof(buf), "wep_key%d", i);
1326 if (set_network(ifname, id, buf, val) < 0)
1327 return -2;
1328 }
1329 }
1330
1331 return 1;
1332}
1333
1334
1335static int set_wpa_common(struct sigma_dut *dut, struct sigma_conn *conn,
1336 const char *ifname, struct sigma_cmd *cmd)
1337{
1338 const char *val;
1339 int id;
Jouni Malinenad395a22017-09-01 21:13:46 +03001340 int cipher_set = 0;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001341 int owe;
Sunil Duttc75a1e62018-01-11 20:47:50 +05301342 int suite_b = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001343
1344 id = add_network_common(dut, conn, ifname, cmd);
1345 if (id < 0)
1346 return id;
1347
Jouni Malinen47dcc952017-10-09 16:43:24 +03001348 val = get_param(cmd, "Type");
1349 owe = val && strcasecmp(val, "OWE") == 0;
1350
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001351 val = get_param(cmd, "keyMgmtType");
Jouni Malinen47dcc952017-10-09 16:43:24 +03001352 if (!val && owe)
1353 val = "OWE";
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001354 if (val == NULL) {
1355 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Missing keyMgmtType");
1356 return 0;
1357 }
1358 if (strcasecmp(val, "wpa") == 0 ||
1359 strcasecmp(val, "wpa-psk") == 0) {
1360 if (set_network(ifname, id, "proto", "WPA") < 0)
1361 return -2;
1362 } else if (strcasecmp(val, "wpa2") == 0 ||
1363 strcasecmp(val, "wpa2-psk") == 0 ||
1364 strcasecmp(val, "wpa2-ft") == 0 ||
1365 strcasecmp(val, "wpa2-sha256") == 0) {
1366 if (set_network(ifname, id, "proto", "WPA2") < 0)
1367 return -2;
Pradeep Reddy POTTETI6d04b3b2016-11-15 14:51:26 +05301368 } else if (strcasecmp(val, "wpa2-wpa-psk") == 0 ||
1369 strcasecmp(val, "wpa2-wpa-ent") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001370 if (set_network(ifname, id, "proto", "WPA WPA2") < 0)
1371 return -2;
Jouni Malinenad395a22017-09-01 21:13:46 +03001372 } else if (strcasecmp(val, "SuiteB") == 0) {
Sunil Duttc75a1e62018-01-11 20:47:50 +05301373 suite_b = 1;
Jouni Malinenad395a22017-09-01 21:13:46 +03001374 if (set_network(ifname, id, "proto", "WPA2") < 0)
1375 return -2;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001376 } else if (strcasecmp(val, "OWE") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001377 } else {
1378 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized keyMgmtType value");
1379 return 0;
1380 }
1381
1382 val = get_param(cmd, "encpType");
Jouni Malinenad395a22017-09-01 21:13:46 +03001383 if (val) {
1384 cipher_set = 1;
1385 if (strcasecmp(val, "tkip") == 0) {
1386 if (set_network(ifname, id, "pairwise", "TKIP") < 0)
1387 return -2;
1388 } else if (strcasecmp(val, "aes-ccmp") == 0) {
1389 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1390 return -2;
1391 } else if (strcasecmp(val, "aes-ccmp-tkip") == 0) {
1392 if (set_network(ifname, id, "pairwise",
1393 "CCMP TKIP") < 0)
1394 return -2;
1395 } else if (strcasecmp(val, "aes-gcmp") == 0) {
1396 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1397 return -2;
1398 if (set_network(ifname, id, "group", "GCMP") < 0)
1399 return -2;
1400 } else {
1401 send_resp(dut, conn, SIGMA_ERROR,
1402 "errorCode,Unrecognized encpType value");
1403 return 0;
1404 }
1405 }
1406
1407 val = get_param(cmd, "PairwiseCipher");
1408 if (val) {
1409 cipher_set = 1;
1410 /* TODO: Support space separated list */
1411 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1412 if (set_network(ifname, id, "pairwise", "GCMP-256") < 0)
1413 return -2;
1414 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1415 if (set_network(ifname, id, "pairwise",
1416 "CCMP-256") < 0)
1417 return -2;
1418 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1419 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1420 return -2;
1421 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1422 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1423 return -2;
1424 } else {
1425 send_resp(dut, conn, SIGMA_ERROR,
1426 "errorCode,Unrecognized PairwiseCipher value");
1427 return 0;
1428 }
1429 }
1430
Jouni Malinen47dcc952017-10-09 16:43:24 +03001431 if (!cipher_set && !owe) {
Jouni Malinenad395a22017-09-01 21:13:46 +03001432 send_resp(dut, conn, SIGMA_ERROR,
1433 "errorCode,Missing encpType and PairwiseCipher");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001434 return 0;
1435 }
Jouni Malinenad395a22017-09-01 21:13:46 +03001436
1437 val = get_param(cmd, "GroupCipher");
1438 if (val) {
1439 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1440 if (set_network(ifname, id, "group", "GCMP-256") < 0)
1441 return -2;
1442 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1443 if (set_network(ifname, id, "group", "CCMP-256") < 0)
1444 return -2;
1445 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1446 if (set_network(ifname, id, "group", "GCMP") < 0)
1447 return -2;
1448 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1449 if (set_network(ifname, id, "group", "CCMP") < 0)
1450 return -2;
1451 } else {
1452 send_resp(dut, conn, SIGMA_ERROR,
1453 "errorCode,Unrecognized GroupCipher value");
1454 return 0;
1455 }
1456 }
1457
Jouni Malinen7b239522017-09-14 21:37:18 +03001458 val = get_param(cmd, "GroupMgntCipher");
Jouni Malinenad395a22017-09-01 21:13:46 +03001459 if (val) {
Jouni Malinene8898cb2017-09-26 17:55:26 +03001460 const char *cipher;
1461
1462 if (strcasecmp(val, "BIP-GMAC-256") == 0) {
1463 cipher = "BIP-GMAC-256";
1464 } else if (strcasecmp(val, "BIP-CMAC-256") == 0) {
1465 cipher = "BIP-CMAC-256";
1466 } else if (strcasecmp(val, "BIP-GMAC-128") == 0) {
1467 cipher = "BIP-GMAC-128";
1468 } else if (strcasecmp(val, "BIP-CMAC-128") == 0) {
1469 cipher = "AES-128-CMAC";
1470 } else {
1471 send_resp(dut, conn, SIGMA_INVALID,
1472 "errorCode,Unsupported GroupMgntCipher");
1473 return 0;
1474 }
1475 if (set_network(ifname, id, "group_mgmt", cipher) < 0) {
1476 send_resp(dut, conn, SIGMA_INVALID,
1477 "errorCode,Failed to set GroupMgntCipher");
1478 return 0;
1479 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001480 }
1481
1482 dut->sta_pmf = STA_PMF_DISABLED;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301483
1484 if (dut->program == PROGRAM_OCE) {
1485 dut->sta_pmf = STA_PMF_OPTIONAL;
1486 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1487 return -2;
1488 }
1489
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001490 val = get_param(cmd, "PMF");
1491 if (val) {
1492 if (strcasecmp(val, "Required") == 0 ||
1493 strcasecmp(val, "Forced_Required") == 0) {
1494 dut->sta_pmf = STA_PMF_REQUIRED;
1495 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1496 return -2;
1497 } else if (strcasecmp(val, "Optional") == 0) {
1498 dut->sta_pmf = STA_PMF_OPTIONAL;
1499 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1500 return -2;
1501 } else if (strcasecmp(val, "Disabled") == 0 ||
1502 strcasecmp(val, "Forced_Disabled") == 0) {
1503 dut->sta_pmf = STA_PMF_DISABLED;
1504 } else {
1505 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized PMF value");
1506 return 0;
1507 }
Sunil Duttc75a1e62018-01-11 20:47:50 +05301508 } else if (owe || suite_b) {
Jouni Malinen1287cd72018-01-04 17:08:01 +02001509 dut->sta_pmf = STA_PMF_REQUIRED;
1510 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1511 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001512 }
1513
1514 return id;
1515}
1516
1517
1518static int cmd_sta_set_psk(struct sigma_dut *dut, struct sigma_conn *conn,
1519 struct sigma_cmd *cmd)
1520{
1521 const char *intf = get_param(cmd, "Interface");
Jouni Malinen992a81e2017-08-22 13:57:47 +03001522 const char *type = get_param(cmd, "Type");
Jouni Malinen1287cd72018-01-04 17:08:01 +02001523 const char *pmf = get_param(cmd, "PMF");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001524 const char *ifname, *val, *alg;
1525 int id;
1526
1527 if (intf == NULL)
1528 return -1;
1529
1530 if (strcmp(intf, get_main_ifname()) == 0)
1531 ifname = get_station_ifname();
1532 else
1533 ifname = intf;
1534
1535 id = set_wpa_common(dut, conn, ifname, cmd);
1536 if (id < 0)
1537 return id;
1538
1539 val = get_param(cmd, "keyMgmtType");
1540 alg = get_param(cmd, "micAlg");
1541
Jouni Malinen992a81e2017-08-22 13:57:47 +03001542 if (type && strcasecmp(type, "SAE") == 0) {
1543 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1544 if (set_network(ifname, id, "key_mgmt", "FT-SAE") < 0)
1545 return -2;
1546 } else {
1547 if (set_network(ifname, id, "key_mgmt", "SAE") < 0)
1548 return -2;
1549 }
1550 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1551 sigma_dut_print(dut, DUT_MSG_ERROR,
1552 "Failed to clear sae_groups to default");
1553 return -2;
1554 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001555 if (!pmf) {
1556 dut->sta_pmf = STA_PMF_REQUIRED;
1557 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1558 return -2;
1559 }
Jouni Malinen0ab50f42017-08-31 01:34:59 +03001560 } else if (type && strcasecmp(type, "PSK-SAE") == 0) {
1561 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1562 if (set_network(ifname, id, "key_mgmt",
1563 "FT-SAE FT-PSK") < 0)
1564 return -2;
1565 } else {
1566 if (set_network(ifname, id, "key_mgmt",
1567 "SAE WPA-PSK") < 0)
1568 return -2;
1569 }
1570 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1571 sigma_dut_print(dut, DUT_MSG_ERROR,
1572 "Failed to clear sae_groups to default");
1573 return -2;
1574 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001575 if (!pmf) {
1576 dut->sta_pmf = STA_PMF_OPTIONAL;
1577 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1578 return -2;
1579 }
Jouni Malinen992a81e2017-08-22 13:57:47 +03001580 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001581 if (set_network(ifname, id, "key_mgmt", "WPA-PSK-SHA256") < 0)
1582 return -2;
1583 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1584 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1585 return -2;
Ashwini Patil6dbf7b02017-03-20 13:42:11 +05301586 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1587 if (set_network(ifname, id, "key_mgmt", "FT-PSK") < 0)
1588 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001589 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1590 dut->sta_pmf == STA_PMF_REQUIRED) {
1591 if (set_network(ifname, id, "key_mgmt",
1592 "WPA-PSK WPA-PSK-SHA256") < 0)
1593 return -2;
1594 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1595 if (set_network(ifname, id, "key_mgmt",
1596 "WPA-PSK WPA-PSK-SHA256") < 0)
1597 return -2;
1598 } else {
1599 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1600 return -2;
1601 }
1602
1603 val = get_param(cmd, "passPhrase");
1604 if (val == NULL)
1605 return -1;
Jouni Malinen2126f422017-10-11 23:24:33 +03001606 if (type && strcasecmp(type, "SAE") == 0) {
1607 if (set_network_quoted(ifname, id, "sae_password", val) < 0)
1608 return -2;
1609 } else {
1610 if (set_network_quoted(ifname, id, "psk", val) < 0)
1611 return -2;
1612 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001613
Jouni Malinen992a81e2017-08-22 13:57:47 +03001614 val = get_param(cmd, "ECGroupID");
1615 if (val) {
1616 char buf[50];
1617
1618 snprintf(buf, sizeof(buf), "SET sae_groups %u", atoi(val));
1619 if (wpa_command(ifname, buf) != 0) {
1620 sigma_dut_print(dut, DUT_MSG_ERROR,
1621 "Failed to clear sae_groups");
1622 return -2;
1623 }
1624 }
1625
Jouni Malinen68143132017-09-02 02:34:08 +03001626 val = get_param(cmd, "InvalidSAEElement");
1627 if (val) {
1628 free(dut->sae_commit_override);
1629 dut->sae_commit_override = strdup(val);
1630 }
1631
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001632 return 1;
1633}
1634
1635
1636static int set_eap_common(struct sigma_dut *dut, struct sigma_conn *conn,
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301637 const char *ifname, int username_identity,
1638 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001639{
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301640 const char *val, *alg, *akm;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001641 int id;
1642 char buf[200];
1643#ifdef ANDROID
1644 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1645 int length;
1646#endif /* ANDROID */
1647
1648 id = set_wpa_common(dut, conn, ifname, cmd);
1649 if (id < 0)
1650 return id;
1651
1652 val = get_param(cmd, "keyMgmtType");
1653 alg = get_param(cmd, "micAlg");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301654 akm = get_param(cmd, "AKMSuiteType");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001655
Jouni Malinenad395a22017-09-01 21:13:46 +03001656 if (val && strcasecmp(val, "SuiteB") == 0) {
1657 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SUITE-B-192") <
1658 0)
1659 return -2;
1660 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001661 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SHA256") < 0)
1662 return -2;
1663 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1664 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1665 return -2;
1666 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1667 if (set_network(ifname, id, "key_mgmt", "FT-EAP") < 0)
1668 return -2;
1669 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1670 dut->sta_pmf == STA_PMF_REQUIRED) {
1671 if (set_network(ifname, id, "key_mgmt",
1672 "WPA-EAP WPA-EAP-SHA256") < 0)
1673 return -2;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301674 } else if (akm && atoi(akm) == 14) {
1675 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1676 dut->sta_pmf == STA_PMF_REQUIRED) {
1677 if (set_network(ifname, id, "key_mgmt",
1678 "WPA-EAP-SHA256 FILS-SHA256") < 0)
1679 return -2;
1680 } else {
1681 if (set_network(ifname, id, "key_mgmt",
1682 "WPA-EAP FILS-SHA256") < 0)
1683 return -2;
1684 }
1685
1686 if (set_network(ifname, id, "erp", "1") < 0)
1687 return -2;
1688 } else if (akm && atoi(akm) == 15) {
1689 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1690 dut->sta_pmf == STA_PMF_REQUIRED) {
1691 if (set_network(ifname, id, "key_mgmt",
1692 "WPA-EAP-SHA256 FILS-SHA384") < 0)
1693 return -2;
1694 } else {
1695 if (set_network(ifname, id, "key_mgmt",
1696 "WPA-EAP FILS-SHA384") < 0)
1697 return -2;
1698 }
1699
1700 if (set_network(ifname, id, "erp", "1") < 0)
1701 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001702 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1703 if (set_network(ifname, id, "key_mgmt",
1704 "WPA-EAP WPA-EAP-SHA256") < 0)
1705 return -2;
1706 } else {
1707 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1708 return -2;
1709 }
1710
1711 val = get_param(cmd, "trustedRootCA");
1712 if (val) {
1713#ifdef ANDROID
1714 snprintf(buf, sizeof(buf), "CACERT_%s", val);
1715 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf,
1716 kvalue);
1717 if (length > 0) {
1718 sigma_dut_print(dut, DUT_MSG_INFO,
1719 "Use Android keystore [%s]", buf);
1720 snprintf(buf, sizeof(buf), "keystore://CACERT_%s",
1721 val);
1722 goto ca_cert_selected;
1723 }
1724#endif /* ANDROID */
1725
1726 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1727#ifdef __linux__
1728 if (!file_exists(buf)) {
1729 char msg[300];
1730 snprintf(msg, sizeof(msg), "ErrorCode,trustedRootCA "
1731 "file (%s) not found", buf);
1732 send_resp(dut, conn, SIGMA_ERROR, msg);
1733 return -3;
1734 }
1735#endif /* __linux__ */
1736#ifdef ANDROID
1737ca_cert_selected:
1738#endif /* ANDROID */
1739 if (set_network_quoted(ifname, id, "ca_cert", buf) < 0)
1740 return -2;
1741 }
1742
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301743 if (username_identity) {
1744 val = get_param(cmd, "username");
1745 if (val) {
1746 if (set_network_quoted(ifname, id, "identity", val) < 0)
1747 return -2;
1748 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001749
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301750 val = get_param(cmd, "password");
1751 if (val) {
1752 if (set_network_quoted(ifname, id, "password", val) < 0)
1753 return -2;
1754 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001755 }
1756
1757 return id;
1758}
1759
1760
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001761static int set_tls_cipher(const char *ifname, int id, const char *cipher)
1762{
1763 const char *val;
1764
1765 if (!cipher)
1766 return 0;
1767
1768 if (strcasecmp(cipher, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384") == 0)
1769 val = "ECDHE-ECDSA-AES256-GCM-SHA384";
1770 else if (strcasecmp(cipher,
1771 "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1772 val = "ECDHE-RSA-AES256-GCM-SHA384";
1773 else if (strcasecmp(cipher, "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1774 val = "DHE-RSA-AES256-GCM-SHA384";
1775 else if (strcasecmp(cipher,
1776 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256") == 0)
1777 val = "ECDHE-ECDSA-AES128-GCM-SHA256";
1778 else
1779 return -1;
1780
1781 /* Need to clear phase1="tls_suiteb=1" to allow cipher enforcement */
1782 set_network_quoted(ifname, id, "phase1", "");
1783
1784 return set_network_quoted(ifname, id, "openssl_ciphers", val);
1785}
1786
1787
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001788static int cmd_sta_set_eaptls(struct sigma_dut *dut, struct sigma_conn *conn,
1789 struct sigma_cmd *cmd)
1790{
1791 const char *intf = get_param(cmd, "Interface");
1792 const char *ifname, *val;
1793 int id;
1794 char buf[200];
1795#ifdef ANDROID
1796 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1797 int length;
1798 int jb_or_newer = 0;
1799 char prop[PROPERTY_VALUE_MAX];
1800#endif /* ANDROID */
1801
1802 if (intf == NULL)
1803 return -1;
1804
1805 if (strcmp(intf, get_main_ifname()) == 0)
1806 ifname = get_station_ifname();
1807 else
1808 ifname = intf;
1809
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301810 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001811 if (id < 0)
1812 return id;
1813
1814 if (set_network(ifname, id, "eap", "TLS") < 0)
1815 return -2;
1816
Pradeep Reddy POTTETI9f6c2132016-05-05 16:28:19 +05301817 if (!get_param(cmd, "username") &&
1818 set_network_quoted(ifname, id, "identity",
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001819 "wifi-user@wifilabs.local") < 0)
1820 return -2;
1821
1822 val = get_param(cmd, "clientCertificate");
1823 if (val == NULL)
1824 return -1;
1825#ifdef ANDROID
1826 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1827 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf, kvalue);
1828 if (length < 0) {
1829 /*
1830 * JB started reporting keystore type mismatches, so retry with
1831 * the GET_PUBKEY command if the generic GET fails.
1832 */
1833 length = android_keystore_get(ANDROID_KEYSTORE_GET_PUBKEY,
1834 buf, kvalue);
1835 }
1836
1837 if (property_get("ro.build.version.release", prop, NULL) != 0) {
1838 sigma_dut_print(dut, DUT_MSG_DEBUG, "Android release %s", prop);
1839 if (strncmp(prop, "4.0", 3) != 0)
1840 jb_or_newer = 1;
1841 } else
1842 jb_or_newer = 1; /* assume newer */
1843
1844 if (jb_or_newer && length > 0) {
1845 sigma_dut_print(dut, DUT_MSG_INFO,
1846 "Use Android keystore [%s]", buf);
1847 if (set_network(ifname, id, "engine", "1") < 0)
1848 return -2;
1849 if (set_network_quoted(ifname, id, "engine_id", "keystore") < 0)
1850 return -2;
1851 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1852 if (set_network_quoted(ifname, id, "key_id", buf) < 0)
1853 return -2;
1854 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1855 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1856 return -2;
1857 return 1;
1858 } else if (length > 0) {
1859 sigma_dut_print(dut, DUT_MSG_INFO,
1860 "Use Android keystore [%s]", buf);
1861 snprintf(buf, sizeof(buf), "keystore://USRPKEY_%s", val);
1862 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1863 return -2;
1864 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1865 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1866 return -2;
1867 return 1;
1868 }
1869#endif /* ANDROID */
1870
1871 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1872#ifdef __linux__
1873 if (!file_exists(buf)) {
1874 char msg[300];
1875 snprintf(msg, sizeof(msg), "ErrorCode,clientCertificate file "
1876 "(%s) not found", buf);
1877 send_resp(dut, conn, SIGMA_ERROR, msg);
1878 return -3;
1879 }
1880#endif /* __linux__ */
1881 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1882 return -2;
1883 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1884 return -2;
1885
1886 if (set_network_quoted(ifname, id, "private_key_passwd", "wifi") < 0)
1887 return -2;
1888
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001889 val = get_param(cmd, "keyMgmtType");
1890 if (val && strcasecmp(val, "SuiteB") == 0) {
1891 val = get_param(cmd, "CertType");
1892 if (val && strcasecmp(val, "RSA") == 0) {
1893 if (set_network_quoted(ifname, id, "phase1",
1894 "tls_suiteb=1") < 0)
1895 return -2;
1896 } else {
1897 if (set_network_quoted(ifname, id, "openssl_ciphers",
1898 "SUITEB192") < 0)
1899 return -2;
1900 }
1901
1902 val = get_param(cmd, "TLSCipher");
1903 if (set_tls_cipher(ifname, id, val) < 0) {
1904 send_resp(dut, conn, SIGMA_ERROR,
1905 "ErrorCode,Unsupported TLSCipher value");
1906 return -3;
1907 }
1908 }
1909
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001910 return 1;
1911}
1912
1913
1914static int cmd_sta_set_eapttls(struct sigma_dut *dut, struct sigma_conn *conn,
1915 struct sigma_cmd *cmd)
1916{
1917 const char *intf = get_param(cmd, "Interface");
1918 const char *ifname;
1919 int id;
1920
1921 if (intf == NULL)
1922 return -1;
1923
1924 if (strcmp(intf, get_main_ifname()) == 0)
1925 ifname = get_station_ifname();
1926 else
1927 ifname = intf;
1928
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301929 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001930 if (id < 0)
1931 return id;
1932
1933 if (set_network(ifname, id, "eap", "TTLS") < 0) {
1934 send_resp(dut, conn, SIGMA_ERROR,
1935 "errorCode,Failed to set TTLS method");
1936 return 0;
1937 }
1938
1939 if (set_network_quoted(ifname, id, "phase2", "auth=MSCHAPV2") < 0) {
1940 send_resp(dut, conn, SIGMA_ERROR,
1941 "errorCode,Failed to set MSCHAPv2 for TTLS Phase 2");
1942 return 0;
1943 }
1944
1945 return 1;
1946}
1947
1948
1949static int cmd_sta_set_eapsim(struct sigma_dut *dut, struct sigma_conn *conn,
1950 struct sigma_cmd *cmd)
1951{
1952 const char *intf = get_param(cmd, "Interface");
1953 const char *ifname;
1954 int id;
1955
1956 if (intf == NULL)
1957 return -1;
1958
1959 if (strcmp(intf, get_main_ifname()) == 0)
1960 ifname = get_station_ifname();
1961 else
1962 ifname = intf;
1963
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301964 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001965 if (id < 0)
1966 return id;
1967
1968 if (set_network(ifname, id, "eap", "SIM") < 0)
1969 return -2;
1970
1971 return 1;
1972}
1973
1974
1975static int cmd_sta_set_peap(struct sigma_dut *dut, struct sigma_conn *conn,
1976 struct sigma_cmd *cmd)
1977{
1978 const char *intf = get_param(cmd, "Interface");
1979 const char *ifname, *val;
1980 int id;
1981 char buf[100];
1982
1983 if (intf == NULL)
1984 return -1;
1985
1986 if (strcmp(intf, get_main_ifname()) == 0)
1987 ifname = get_station_ifname();
1988 else
1989 ifname = intf;
1990
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301991 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001992 if (id < 0)
1993 return id;
1994
1995 if (set_network(ifname, id, "eap", "PEAP") < 0)
1996 return -2;
1997
1998 val = get_param(cmd, "innerEAP");
1999 if (val) {
2000 if (strcasecmp(val, "MSCHAPv2") == 0) {
2001 if (set_network_quoted(ifname, id, "phase2",
2002 "auth=MSCHAPV2") < 0)
2003 return -2;
2004 } else if (strcasecmp(val, "GTC") == 0) {
2005 if (set_network_quoted(ifname, id, "phase2",
2006 "auth=GTC") < 0)
2007 return -2;
2008 } else
2009 return -1;
2010 }
2011
2012 val = get_param(cmd, "peapVersion");
2013 if (val) {
2014 int ver = atoi(val);
2015 if (ver < 0 || ver > 1)
2016 return -1;
2017 snprintf(buf, sizeof(buf), "peapver=%d", ver);
2018 if (set_network_quoted(ifname, id, "phase1", buf) < 0)
2019 return -2;
2020 }
2021
2022 return 1;
2023}
2024
2025
2026static int cmd_sta_set_eapfast(struct sigma_dut *dut, struct sigma_conn *conn,
2027 struct sigma_cmd *cmd)
2028{
2029 const char *intf = get_param(cmd, "Interface");
2030 const char *ifname, *val;
2031 int id;
2032 char buf[100];
2033
2034 if (intf == NULL)
2035 return -1;
2036
2037 if (strcmp(intf, get_main_ifname()) == 0)
2038 ifname = get_station_ifname();
2039 else
2040 ifname = intf;
2041
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302042 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002043 if (id < 0)
2044 return id;
2045
2046 if (set_network(ifname, id, "eap", "FAST") < 0)
2047 return -2;
2048
2049 val = get_param(cmd, "innerEAP");
2050 if (val) {
2051 if (strcasecmp(val, "MSCHAPV2") == 0) {
2052 if (set_network_quoted(ifname, id, "phase2",
2053 "auth=MSCHAPV2") < 0)
2054 return -2;
2055 } else if (strcasecmp(val, "GTC") == 0) {
2056 if (set_network_quoted(ifname, id, "phase2",
2057 "auth=GTC") < 0)
2058 return -2;
2059 } else
2060 return -1;
2061 }
2062
2063 val = get_param(cmd, "validateServer");
2064 if (val) {
2065 /* TODO */
2066 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored EAP-FAST "
2067 "validateServer=%s", val);
2068 }
2069
2070 val = get_param(cmd, "pacFile");
2071 if (val) {
2072 snprintf(buf, sizeof(buf), "blob://%s", val);
2073 if (set_network_quoted(ifname, id, "pac_file", buf) < 0)
2074 return -2;
2075 }
2076
2077 if (set_network_quoted(ifname, id, "phase1", "fast_provisioning=2") <
2078 0)
2079 return -2;
2080
2081 return 1;
2082}
2083
2084
2085static int cmd_sta_set_eapaka(struct sigma_dut *dut, struct sigma_conn *conn,
2086 struct sigma_cmd *cmd)
2087{
2088 const char *intf = get_param(cmd, "Interface");
2089 const char *ifname;
2090 int id;
2091
2092 if (intf == NULL)
2093 return -1;
2094
2095 if (strcmp(intf, get_main_ifname()) == 0)
2096 ifname = get_station_ifname();
2097 else
2098 ifname = intf;
2099
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302100 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002101 if (id < 0)
2102 return id;
2103
2104 if (set_network(ifname, id, "eap", "AKA") < 0)
2105 return -2;
2106
2107 return 1;
2108}
2109
2110
2111static int cmd_sta_set_eapakaprime(struct sigma_dut *dut,
2112 struct sigma_conn *conn,
2113 struct sigma_cmd *cmd)
2114{
2115 const char *intf = get_param(cmd, "Interface");
2116 const char *ifname;
2117 int id;
2118
2119 if (intf == NULL)
2120 return -1;
2121
2122 if (strcmp(intf, get_main_ifname()) == 0)
2123 ifname = get_station_ifname();
2124 else
2125 ifname = intf;
2126
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302127 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002128 if (id < 0)
2129 return id;
2130
2131 if (set_network(ifname, id, "eap", "AKA'") < 0)
2132 return -2;
2133
2134 return 1;
2135}
2136
2137
2138static int sta_set_open(struct sigma_dut *dut, struct sigma_conn *conn,
2139 struct sigma_cmd *cmd)
2140{
2141 const char *intf = get_param(cmd, "Interface");
2142 const char *ifname;
2143 int id;
2144
2145 if (strcmp(intf, get_main_ifname()) == 0)
2146 ifname = get_station_ifname();
2147 else
2148 ifname = intf;
2149
2150 id = add_network_common(dut, conn, ifname, cmd);
2151 if (id < 0)
2152 return id;
2153
2154 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
2155 return -2;
2156
2157 return 1;
2158}
2159
2160
Jouni Malinen47dcc952017-10-09 16:43:24 +03002161static int sta_set_owe(struct sigma_dut *dut, struct sigma_conn *conn,
2162 struct sigma_cmd *cmd)
2163{
2164 const char *intf = get_param(cmd, "Interface");
2165 const char *ifname, *val;
2166 int id;
2167
2168 if (intf == NULL)
2169 return -1;
2170
2171 if (strcmp(intf, get_main_ifname()) == 0)
2172 ifname = get_station_ifname();
2173 else
2174 ifname = intf;
2175
2176 id = set_wpa_common(dut, conn, ifname, cmd);
2177 if (id < 0)
2178 return id;
2179
2180 if (set_network(ifname, id, "key_mgmt", "OWE") < 0)
2181 return -2;
2182
2183 val = get_param(cmd, "ECGroupID");
Jouni Malinenfac9cad2017-10-10 18:35:55 +03002184 if (val && strcmp(val, "0") == 0) {
2185 if (wpa_command(ifname,
2186 "VENDOR_ELEM_ADD 13 ff23200000783590fb7440e03d5b3b33911f86affdcc6b4411b707846ac4ff08ddc8831ccd") != 0) {
2187 sigma_dut_print(dut, DUT_MSG_ERROR,
2188 "Failed to set OWE DH Param element override");
2189 return -2;
2190 }
2191 } else if (val && set_network(ifname, id, "owe_group", val) < 0) {
Jouni Malinen47dcc952017-10-09 16:43:24 +03002192 sigma_dut_print(dut, DUT_MSG_ERROR,
2193 "Failed to clear owe_group");
2194 return -2;
2195 }
2196
2197 return 1;
2198}
2199
2200
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002201static int cmd_sta_set_security(struct sigma_dut *dut, struct sigma_conn *conn,
2202 struct sigma_cmd *cmd)
2203{
2204 const char *type = get_param(cmd, "Type");
2205
2206 if (type == NULL) {
2207 send_resp(dut, conn, SIGMA_ERROR,
2208 "ErrorCode,Missing Type argument");
2209 return 0;
2210 }
2211
2212 if (strcasecmp(type, "OPEN") == 0)
2213 return sta_set_open(dut, conn, cmd);
Jouni Malinen47dcc952017-10-09 16:43:24 +03002214 if (strcasecmp(type, "OWE") == 0)
2215 return sta_set_owe(dut, conn, cmd);
Jouni Malinen992a81e2017-08-22 13:57:47 +03002216 if (strcasecmp(type, "PSK") == 0 ||
Jouni Malinen0ab50f42017-08-31 01:34:59 +03002217 strcasecmp(type, "PSK-SAE") == 0 ||
Jouni Malinen992a81e2017-08-22 13:57:47 +03002218 strcasecmp(type, "SAE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002219 return cmd_sta_set_psk(dut, conn, cmd);
2220 if (strcasecmp(type, "EAPTLS") == 0)
2221 return cmd_sta_set_eaptls(dut, conn, cmd);
2222 if (strcasecmp(type, "EAPTTLS") == 0)
2223 return cmd_sta_set_eapttls(dut, conn, cmd);
2224 if (strcasecmp(type, "EAPPEAP") == 0)
2225 return cmd_sta_set_peap(dut, conn, cmd);
2226 if (strcasecmp(type, "EAPSIM") == 0)
2227 return cmd_sta_set_eapsim(dut, conn, cmd);
2228 if (strcasecmp(type, "EAPFAST") == 0)
2229 return cmd_sta_set_eapfast(dut, conn, cmd);
2230 if (strcasecmp(type, "EAPAKA") == 0)
2231 return cmd_sta_set_eapaka(dut, conn, cmd);
2232 if (strcasecmp(type, "EAPAKAPRIME") == 0)
2233 return cmd_sta_set_eapakaprime(dut, conn, cmd);
Amarnath Hullur Subramanyam81b11cd2018-01-30 19:07:17 -08002234 if (strcasecmp(type, "wep") == 0)
2235 return cmd_sta_set_encryption(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002236
2237 send_resp(dut, conn, SIGMA_ERROR,
2238 "ErrorCode,Unsupported Type value");
2239 return 0;
2240}
2241
2242
2243int ath6kl_client_uapsd(struct sigma_dut *dut, const char *intf, int uapsd)
2244{
2245#ifdef __linux__
2246 /* special handling for ath6kl */
2247 char path[128], fname[128], *pos;
2248 ssize_t res;
2249 FILE *f;
2250
2251 snprintf(path, sizeof(path), "/sys/class/net/%s/phy80211", intf);
2252 res = readlink(path, path, sizeof(path));
2253 if (res < 0)
2254 return 0; /* not ath6kl */
2255
2256 if (res >= (int) sizeof(path))
2257 res = sizeof(path) - 1;
2258 path[res] = '\0';
2259 pos = strrchr(path, '/');
2260 if (pos == NULL)
2261 pos = path;
2262 else
2263 pos++;
2264 snprintf(fname, sizeof(fname),
2265 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2266 "create_qos", pos);
2267 if (!file_exists(fname))
2268 return 0; /* not ath6kl */
2269
2270 if (uapsd) {
2271 f = fopen(fname, "w");
2272 if (f == NULL)
2273 return -1;
2274
2275 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl create_qos");
2276 fprintf(f, "4 2 2 1 2 9999999 9999999 9999999 7777777 0 4 "
2277 "45000 200 56789000 56789000 5678900 0 0 9999999 "
2278 "20000 0\n");
2279 fclose(f);
2280 } else {
2281 snprintf(fname, sizeof(fname),
2282 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2283 "delete_qos", pos);
2284
2285 f = fopen(fname, "w");
2286 if (f == NULL)
2287 return -1;
2288
2289 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl delete_qos");
2290 fprintf(f, "2 4\n");
2291 fclose(f);
2292 }
2293#endif /* __linux__ */
2294
2295 return 0;
2296}
2297
2298
2299static int cmd_sta_set_uapsd(struct sigma_dut *dut, struct sigma_conn *conn,
2300 struct sigma_cmd *cmd)
2301{
2302 const char *intf = get_param(cmd, "Interface");
2303 /* const char *ssid = get_param(cmd, "ssid"); */
2304 const char *val;
2305 int max_sp_len = 4;
2306 int ac_be = 1, ac_bk = 1, ac_vi = 1, ac_vo = 1;
2307 char buf[100];
2308 int ret1, ret2;
2309
2310 val = get_param(cmd, "maxSPLength");
2311 if (val) {
2312 max_sp_len = atoi(val);
2313 if (max_sp_len != 0 && max_sp_len != 1 && max_sp_len != 2 &&
2314 max_sp_len != 4)
2315 return -1;
2316 }
2317
2318 val = get_param(cmd, "acBE");
2319 if (val)
2320 ac_be = atoi(val);
2321
2322 val = get_param(cmd, "acBK");
2323 if (val)
2324 ac_bk = atoi(val);
2325
2326 val = get_param(cmd, "acVI");
2327 if (val)
2328 ac_vi = atoi(val);
2329
2330 val = get_param(cmd, "acVO");
2331 if (val)
2332 ac_vo = atoi(val);
2333
2334 dut->client_uapsd = ac_be || ac_bk || ac_vi || ac_vo;
2335
2336 snprintf(buf, sizeof(buf), "P2P_SET client_apsd %d,%d,%d,%d;%d",
2337 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2338 ret1 = wpa_command(intf, buf);
2339
2340 snprintf(buf, sizeof(buf), "SET uapsd %d,%d,%d,%d;%d",
2341 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2342 ret2 = wpa_command(intf, buf);
2343
2344 if (ret1 && ret2) {
2345 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to set client mode "
2346 "UAPSD parameters.");
2347 return -2;
2348 }
2349
2350 if (ath6kl_client_uapsd(dut, intf, dut->client_uapsd) < 0) {
2351 send_resp(dut, conn, SIGMA_ERROR,
2352 "ErrorCode,Failed to set ath6kl QoS parameters");
2353 return 0;
2354 }
2355
2356 return 1;
2357}
2358
2359
2360static int cmd_sta_set_wmm(struct sigma_dut *dut, struct sigma_conn *conn,
2361 struct sigma_cmd *cmd)
2362{
2363 char buf[1000];
2364 const char *intf = get_param(cmd, "Interface");
2365 const char *grp = get_param(cmd, "Group");
2366 const char *act = get_param(cmd, "Action");
2367 const char *tid = get_param(cmd, "Tid");
2368 const char *dir = get_param(cmd, "Direction");
2369 const char *psb = get_param(cmd, "Psb");
2370 const char *up = get_param(cmd, "Up");
2371 const char *fixed = get_param(cmd, "Fixed");
2372 const char *size = get_param(cmd, "Size");
2373 const char *msize = get_param(cmd, "Maxsize");
2374 const char *minsi = get_param(cmd, "Min_srvc_intrvl");
2375 const char *maxsi = get_param(cmd, "Max_srvc_intrvl");
2376 const char *inact = get_param(cmd, "Inactivity");
2377 const char *sus = get_param(cmd, "Suspension");
2378 const char *mindr = get_param(cmd, "Mindatarate");
2379 const char *meandr = get_param(cmd, "Meandatarate");
2380 const char *peakdr = get_param(cmd, "Peakdatarate");
2381 const char *phyrate = get_param(cmd, "Phyrate");
2382 const char *burstsize = get_param(cmd, "Burstsize");
2383 const char *sba = get_param(cmd, "Sba");
2384 int direction;
2385 int handle;
Peng Xu93319622017-10-04 17:58:16 -07002386 float sba_fv = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002387 int fixed_int;
2388 int psb_ts;
2389
2390 if (intf == NULL || grp == NULL || act == NULL )
2391 return -1;
2392
2393 if (strcasecmp(act, "addts") == 0) {
2394 if (tid == NULL || dir == NULL || psb == NULL ||
2395 up == NULL || fixed == NULL || size == NULL)
2396 return -1;
2397
2398 /*
2399 * Note: Sigma CAPI spec lists uplink, downlink, and bidi as the
2400 * possible values, but WMM-AC and V-E test scripts use "UP,
2401 * "DOWN", and "BIDI".
2402 */
2403 if (strcasecmp(dir, "uplink") == 0 ||
2404 strcasecmp(dir, "up") == 0) {
2405 direction = 0;
2406 } else if (strcasecmp(dir, "downlink") == 0 ||
2407 strcasecmp(dir, "down") == 0) {
2408 direction = 1;
2409 } else if (strcasecmp(dir, "bidi") == 0) {
2410 direction = 2;
2411 } else {
2412 sigma_dut_print(dut, DUT_MSG_ERROR,
2413 "Direction %s not supported", dir);
2414 return -1;
2415 }
2416
2417 if (strcasecmp(psb, "legacy") == 0) {
2418 psb_ts = 0;
2419 } else if (strcasecmp(psb, "uapsd") == 0) {
2420 psb_ts = 1;
2421 } else {
2422 sigma_dut_print(dut, DUT_MSG_ERROR,
2423 "PSB %s not supported", psb);
2424 return -1;
2425 }
2426
2427 if (atoi(tid) < 0 || atoi(tid) > 7) {
2428 sigma_dut_print(dut, DUT_MSG_ERROR,
2429 "TID %s not supported", tid);
2430 return -1;
2431 }
2432
2433 if (strcasecmp(fixed, "true") == 0) {
2434 fixed_int = 1;
2435 } else {
2436 fixed_int = 0;
2437 }
2438
Peng Xu93319622017-10-04 17:58:16 -07002439 if (sba)
2440 sba_fv = atof(sba);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002441
2442 dut->dialog_token++;
2443 handle = 7000 + dut->dialog_token;
2444
2445 /*
2446 * size: convert to hex
2447 * maxsi: convert to hex
2448 * mindr: convert to hex
2449 * meandr: convert to hex
2450 * peakdr: convert to hex
2451 * burstsize: convert to hex
2452 * phyrate: convert to hex
2453 * sba: convert to hex with modification
2454 * minsi: convert to integer
2455 * sus: convert to integer
2456 * inact: convert to integer
2457 * maxsi: convert to integer
2458 */
2459
2460 /*
2461 * The Nominal MSDU Size field is 2 octets long and contains an
2462 * unsigned integer that specifies the nominal size, in octets,
2463 * of MSDUs belonging to the traffic under this traffic
2464 * specification and is defined in Figure 16. If the Fixed
2465 * subfield is set to 1, then the size of the MSDU is fixed and
2466 * is indicated by the Size Subfield. If the Fixed subfield is
2467 * set to 0, then the size of the MSDU might not be fixed and
2468 * the Size indicates the nominal MSDU size.
2469 *
2470 * The Surplus Bandwidth Allowance Factor field is 2 octets long
2471 * and specifies the excess allocation of time (and bandwidth)
2472 * over and above the stated rates required to transport an MSDU
2473 * belonging to the traffic in this TSPEC. This field is
2474 * represented as an unsigned binary number with an implicit
2475 * binary point after the leftmost 3 bits. For example, an SBA
2476 * of 1.75 is represented as 0x3800. This field is included to
2477 * account for retransmissions. As such, the value of this field
2478 * must be greater than unity.
2479 */
2480
2481 snprintf(buf, sizeof(buf),
2482 "iwpriv %s addTspec %d %s %d %d %s 0x%X"
2483 " 0x%X 0x%X 0x%X"
2484 " 0x%X 0x%X 0x%X"
2485 " 0x%X %d %d %d %d"
2486 " %d %d",
2487 intf, handle, tid, direction, psb_ts, up,
2488 (unsigned int) ((fixed_int << 15) | atoi(size)),
2489 msize ? atoi(msize) : 0,
2490 mindr ? atoi(mindr) : 0,
2491 meandr ? atoi(meandr) : 0,
2492 peakdr ? atoi(peakdr) : 0,
2493 burstsize ? atoi(burstsize) : 0,
2494 phyrate ? atoi(phyrate) : 0,
2495 sba ? ((unsigned int) (((int) sba_fv << 13) |
2496 (int)((sba_fv - (int) sba_fv) *
2497 8192))) : 0,
2498 minsi ? atoi(minsi) : 0,
2499 sus ? atoi(sus) : 0,
2500 0, 0,
2501 inact ? atoi(inact) : 0,
2502 maxsi ? atoi(maxsi) : 0);
2503
2504 if (system(buf) != 0) {
2505 sigma_dut_print(dut, DUT_MSG_ERROR,
2506 "iwpriv addtspec request failed");
2507 send_resp(dut, conn, SIGMA_ERROR,
2508 "errorCode,Failed to execute addTspec command");
2509 return 0;
2510 }
2511
2512 sigma_dut_print(dut, DUT_MSG_INFO,
2513 "iwpriv addtspec request send");
2514
2515 /* Mapping handle to a TID */
2516 dut->tid_to_handle[atoi(tid)] = handle;
2517 } else if (strcasecmp(act, "delts") == 0) {
2518 if (tid == NULL)
2519 return -1;
2520
2521 if (atoi(tid) < 0 || atoi(tid) > 7) {
2522 sigma_dut_print(dut, DUT_MSG_ERROR,
2523 "TID %s not supported", tid);
2524 send_resp(dut, conn, SIGMA_ERROR,
2525 "errorCode,Unsupported TID");
2526 return 0;
2527 }
2528
2529 handle = dut->tid_to_handle[atoi(tid)];
2530
2531 if (handle < 7000 || handle > 7255) {
2532 /* Invalid handle ie no mapping for that TID */
2533 sigma_dut_print(dut, DUT_MSG_ERROR,
2534 "handle-> %d not found", handle);
2535 }
2536
2537 snprintf(buf, sizeof(buf), "iwpriv %s delTspec %d",
2538 intf, handle);
2539
2540 if (system(buf) != 0) {
2541 sigma_dut_print(dut, DUT_MSG_ERROR,
2542 "iwpriv deltspec request failed");
2543 send_resp(dut, conn, SIGMA_ERROR,
2544 "errorCode,Failed to execute delTspec command");
2545 return 0;
2546 }
2547
2548 sigma_dut_print(dut, DUT_MSG_INFO,
2549 "iwpriv deltspec request send");
2550
2551 dut->tid_to_handle[atoi(tid)] = 0;
2552 } else {
2553 sigma_dut_print(dut, DUT_MSG_ERROR,
2554 "Action type %s not supported", act);
2555 send_resp(dut, conn, SIGMA_ERROR,
2556 "errorCode,Unsupported Action");
2557 return 0;
2558 }
2559
2560 return 1;
2561}
2562
2563
vamsi krishna52e16f92017-08-29 12:37:34 +05302564static int find_network(struct sigma_dut *dut, const char *ssid)
2565{
2566 char list[4096];
2567 char *pos;
2568
2569 sigma_dut_print(dut, DUT_MSG_DEBUG,
2570 "Search for profile based on SSID: '%s'", ssid);
2571 if (wpa_command_resp(get_station_ifname(), "LIST_NETWORKS",
2572 list, sizeof(list)) < 0)
2573 return -1;
2574 pos = strstr(list, ssid);
2575 if (!pos || pos == list || pos[-1] != '\t' || pos[strlen(ssid)] != '\t')
2576 return -1;
2577
2578 while (pos > list && pos[-1] != '\n')
2579 pos--;
2580 dut->infra_network_id = atoi(pos);
2581 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
2582 return 0;
2583}
2584
2585
Sunil Dutt44595082018-02-12 19:41:45 +05302586#ifdef NL80211_SUPPORT
2587static int sta_config_rsnie(struct sigma_dut *dut, int val)
2588{
2589 struct nl_msg *msg;
2590 int ret;
2591 struct nlattr *params;
2592 int ifindex;
2593
2594 ifindex = if_nametoindex("wlan0");
2595 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
2596 NL80211_CMD_VENDOR)) ||
2597 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
2598 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2599 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2600 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
2601 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2602 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_RSN_IE, val)) {
2603 sigma_dut_print(dut, DUT_MSG_ERROR,
2604 "%s: err in adding vendor_cmd and vendor_data",
2605 __func__);
2606 nlmsg_free(msg);
2607 return -1;
2608 }
2609 nla_nest_end(msg, params);
2610
2611 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
2612 if (ret) {
2613 sigma_dut_print(dut, DUT_MSG_ERROR,
2614 "%s: err in send_and_recv_msgs, ret=%d",
2615 __func__, ret);
2616 return ret;
2617 }
2618
2619 return 0;
2620}
2621#endif /* NL80211_SUPPORT */
2622
2623
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002624static int cmd_sta_associate(struct sigma_dut *dut, struct sigma_conn *conn,
2625 struct sigma_cmd *cmd)
2626{
2627 /* const char *intf = get_param(cmd, "Interface"); */
2628 const char *ssid = get_param(cmd, "ssid");
2629 const char *wps_param = get_param(cmd, "WPS");
2630 const char *bssid = get_param(cmd, "bssid");
Jouni Malinen46a19b62017-06-23 14:31:27 +03002631 const char *chan = get_param(cmd, "channel");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002632 int wps = 0;
Jouni Malinen3c367e82017-06-23 17:01:47 +03002633 char buf[1000], extra[50];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002634
2635 if (ssid == NULL)
2636 return -1;
2637
Jouni Malinen3c367e82017-06-23 17:01:47 +03002638 if (dut->rsne_override) {
Sunil Dutt44595082018-02-12 19:41:45 +05302639#ifdef NL80211_SUPPORT
2640 if (get_driver_type() == DRIVER_WCN) {
2641 sta_config_rsnie(dut, 1);
2642 dut->config_rsnie = 1;
2643 }
2644#endif /* NL80211_SUPPORT */
Jouni Malinen3c367e82017-06-23 17:01:47 +03002645 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
2646 dut->rsne_override);
2647 if (wpa_command(get_station_ifname(), buf) < 0) {
2648 send_resp(dut, conn, SIGMA_ERROR,
2649 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
2650 return 0;
2651 }
2652 }
2653
Jouni Malinen68143132017-09-02 02:34:08 +03002654 if (dut->sae_commit_override) {
2655 snprintf(buf, sizeof(buf), "SET sae_commit_override %s",
2656 dut->sae_commit_override);
2657 if (wpa_command(get_station_ifname(), buf) < 0) {
2658 send_resp(dut, conn, SIGMA_ERROR,
2659 "ErrorCode,Failed to set SAE commit override");
2660 return 0;
2661 }
2662 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05302663#ifdef ANDROID
2664 if (dut->fils_hlp)
2665 process_fils_hlp(dut);
2666#endif /* ANDROID */
Jouni Malinen68143132017-09-02 02:34:08 +03002667
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002668 if (wps_param &&
2669 (strcmp(wps_param, "1") == 0 || strcasecmp(wps_param, "On") == 0))
2670 wps = 1;
2671
2672 if (wps) {
2673 if (dut->wps_method == WFA_CS_WPS_NOT_READY) {
2674 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,WPS "
2675 "parameters not yet set");
2676 return 0;
2677 }
2678 if (dut->wps_method == WFA_CS_WPS_PBC) {
2679 if (wpa_command(get_station_ifname(), "WPS_PBC") < 0)
2680 return -2;
2681 } else {
2682 snprintf(buf, sizeof(buf), "WPS_PIN any %s",
2683 dut->wps_pin);
2684 if (wpa_command(get_station_ifname(), buf) < 0)
2685 return -2;
2686 }
2687 } else {
vamsi krishna52e16f92017-08-29 12:37:34 +05302688 if (strcmp(ssid, dut->infra_ssid) == 0) {
2689 sigma_dut_print(dut, DUT_MSG_DEBUG,
2690 "sta_associate for the most recently added network");
2691 } else if (find_network(dut, ssid) < 0) {
2692 sigma_dut_print(dut, DUT_MSG_DEBUG,
2693 "sta_associate for a previously stored network profile");
2694 send_resp(dut, conn, SIGMA_ERROR,
2695 "ErrorCode,Profile not found");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002696 return 0;
2697 }
2698
2699 if (bssid &&
2700 set_network(get_station_ifname(), dut->infra_network_id,
2701 "bssid", bssid) < 0) {
2702 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2703 "Invalid bssid argument");
2704 return 0;
2705 }
2706
Jouni Malinen46a19b62017-06-23 14:31:27 +03002707 extra[0] = '\0';
2708 if (chan)
2709 snprintf(extra, sizeof(extra), " freq=%u",
2710 channel_to_freq(atoi(chan)));
2711 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d%s",
2712 dut->infra_network_id, extra);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002713 if (wpa_command(get_station_ifname(), buf) < 0) {
2714 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to select "
2715 "network id %d on %s",
2716 dut->infra_network_id,
2717 get_station_ifname());
2718 return -2;
2719 }
2720 }
2721
2722 return 1;
2723}
2724
2725
2726static int run_hs20_osu(struct sigma_dut *dut, const char *params)
2727{
2728 char buf[500], cmd[200];
2729 int res;
2730
2731 /* Use hs20-osu-client file at the current dir, if found; otherwise use
2732 * default path */
2733 res = snprintf(cmd, sizeof(cmd),
2734 "%s -w \"%s\" -r hs20-osu-client.res %s%s -dddKt -f Logs/hs20-osu-client.txt",
2735 file_exists("./hs20-osu-client") ?
2736 "./hs20-osu-client" : "hs20-osu-client",
2737 sigma_wpas_ctrl,
2738 dut->summary_log ? "-s " : "",
2739 dut->summary_log ? dut->summary_log : "");
2740 if (res < 0 || res >= (int) sizeof(cmd))
2741 return -1;
2742
2743 res = snprintf(buf, sizeof(buf), "%s %s", cmd, params);
2744 if (res < 0 || res >= (int) sizeof(buf))
2745 return -1;
2746 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
2747
2748 if (system(buf) != 0) {
2749 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to run: %s", buf);
2750 return -1;
2751 }
2752 sigma_dut_print(dut, DUT_MSG_DEBUG,
2753 "Completed hs20-osu-client operation");
2754
2755 return 0;
2756}
2757
2758
2759static int download_ppsmo(struct sigma_dut *dut,
2760 struct sigma_conn *conn,
2761 const char *intf,
2762 struct sigma_cmd *cmd)
2763{
2764 const char *name, *path, *val;
2765 char url[500], buf[600], fbuf[100];
2766 char *fqdn = NULL;
2767
2768 name = get_param(cmd, "FileName");
2769 path = get_param(cmd, "FilePath");
2770 if (name == NULL || path == NULL)
2771 return -1;
2772
2773 if (strcasecmp(path, "VendorSpecific") == 0) {
2774 snprintf(url, sizeof(url), "PPS/%s", name);
2775 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured PPS MO "
2776 "from the device (%s)", url);
2777 if (!file_exists(url)) {
2778 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2779 "PPS MO file does not exist");
2780 return 0;
2781 }
2782 snprintf(buf, sizeof(buf), "cp %s pps-tnds.xml", url);
2783 if (system(buf) != 0) {
2784 send_resp(dut, conn, SIGMA_ERROR,
2785 "errorCode,Failed to copy PPS MO");
2786 return 0;
2787 }
2788 } else if (strncasecmp(path, "http:", 5) != 0 &&
2789 strncasecmp(path, "https:", 6) != 0) {
2790 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2791 "Unsupported FilePath value");
2792 return 0;
2793 } else {
2794 snprintf(url, sizeof(url), "%s/%s", path, name);
2795 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading PPS MO from %s",
2796 url);
2797 snprintf(buf, sizeof(buf), "wget -T 10 -t 3 -O pps-tnds.xml '%s'", url);
2798 remove("pps-tnds.xml");
2799 if (system(buf) != 0) {
2800 send_resp(dut, conn, SIGMA_ERROR,
2801 "errorCode,Failed to download PPS MO");
2802 return 0;
2803 }
2804 }
2805
2806 if (run_hs20_osu(dut, "from_tnds pps-tnds.xml pps.xml") < 0) {
2807 send_resp(dut, conn, SIGMA_ERROR,
2808 "errorCode,Failed to parse downloaded PPSMO");
2809 return 0;
2810 }
2811 unlink("pps-tnds.xml");
2812
2813 val = get_param(cmd, "managementTreeURI");
2814 if (val) {
2815 const char *pos, *end;
2816 sigma_dut_print(dut, DUT_MSG_DEBUG, "managementTreeURI: %s",
2817 val);
2818 if (strncmp(val, "./Wi-Fi/", 8) != 0) {
2819 send_resp(dut, conn, SIGMA_ERROR,
2820 "errorCode,Invalid managementTreeURI prefix");
2821 return 0;
2822 }
2823 pos = val + 8;
2824 end = strchr(pos, '/');
2825 if (end == NULL ||
2826 strcmp(end, "/PerProviderSubscription") != 0) {
2827 send_resp(dut, conn, SIGMA_ERROR,
2828 "errorCode,Invalid managementTreeURI postfix");
2829 return 0;
2830 }
2831 if (end - pos >= (int) sizeof(fbuf)) {
2832 send_resp(dut, conn, SIGMA_ERROR,
2833 "errorCode,Too long FQDN in managementTreeURI");
2834 return 0;
2835 }
2836 memcpy(fbuf, pos, end - pos);
2837 fbuf[end - pos] = '\0';
2838 fqdn = fbuf;
2839 sigma_dut_print(dut, DUT_MSG_INFO,
2840 "FQDN from managementTreeURI: %s", fqdn);
2841 } else if (run_hs20_osu(dut, "get_fqdn pps.xml") == 0) {
2842 FILE *f = fopen("pps-fqdn", "r");
2843 if (f) {
2844 if (fgets(fbuf, sizeof(fbuf), f)) {
2845 fbuf[sizeof(fbuf) - 1] = '\0';
2846 fqdn = fbuf;
2847 sigma_dut_print(dut, DUT_MSG_DEBUG,
2848 "Use FQDN %s", fqdn);
2849 }
2850 fclose(f);
2851 }
2852 }
2853
2854 if (fqdn == NULL) {
2855 send_resp(dut, conn, SIGMA_ERROR,
2856 "errorCode,No FQDN specified");
2857 return 0;
2858 }
2859
2860 mkdir("SP", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2861 snprintf(buf, sizeof(buf), "SP/%s", fqdn);
2862 mkdir(buf, S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2863
2864 snprintf(buf, sizeof(buf), "SP/%s/pps.xml", fqdn);
2865 if (rename("pps.xml", buf) < 0) {
2866 send_resp(dut, conn, SIGMA_ERROR,
2867 "errorCode,Could not move PPS MO");
2868 return 0;
2869 }
2870
2871 if (strcasecmp(path, "VendorSpecific") == 0) {
2872 snprintf(buf, sizeof(buf), "cp Certs/ca.pem SP/%s/ca.pem",
2873 fqdn);
2874 if (system(buf)) {
2875 send_resp(dut, conn, SIGMA_ERROR,
2876 "errorCode,Failed to copy OSU CA cert");
2877 return 0;
2878 }
2879
2880 snprintf(buf, sizeof(buf),
2881 "cp Certs/aaa-ca.pem SP/%s/aaa-ca.pem",
2882 fqdn);
2883 if (system(buf)) {
2884 send_resp(dut, conn, SIGMA_ERROR,
2885 "errorCode,Failed to copy AAA CA cert");
2886 return 0;
2887 }
2888 } else {
2889 snprintf(buf, sizeof(buf),
2890 "dl_osu_ca SP/%s/pps.xml SP/%s/ca.pem",
2891 fqdn, fqdn);
2892 if (run_hs20_osu(dut, buf) < 0) {
2893 send_resp(dut, conn, SIGMA_ERROR,
2894 "errorCode,Failed to download OSU CA cert");
2895 return 0;
2896 }
2897
2898 snprintf(buf, sizeof(buf),
2899 "dl_aaa_ca SP/%s/pps.xml SP/%s/aaa-ca.pem",
2900 fqdn, fqdn);
2901 if (run_hs20_osu(dut, buf) < 0) {
2902 sigma_dut_print(dut, DUT_MSG_INFO,
2903 "Failed to download AAA CA cert");
2904 }
2905 }
2906
2907 if (file_exists("next-client-cert.pem")) {
2908 snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn);
2909 if (rename("next-client-cert.pem", buf) < 0) {
2910 send_resp(dut, conn, SIGMA_ERROR,
2911 "errorCode,Could not move client certificate");
2912 return 0;
2913 }
2914 }
2915
2916 if (file_exists("next-client-key.pem")) {
2917 snprintf(buf, sizeof(buf), "SP/%s/client-key.pem", fqdn);
2918 if (rename("next-client-key.pem", buf) < 0) {
2919 send_resp(dut, conn, SIGMA_ERROR,
2920 "errorCode,Could not move client key");
2921 return 0;
2922 }
2923 }
2924
2925 snprintf(buf, sizeof(buf), "set_pps SP/%s/pps.xml", fqdn);
2926 if (run_hs20_osu(dut, buf) < 0) {
2927 send_resp(dut, conn, SIGMA_ERROR,
2928 "errorCode,Failed to configure credential from "
2929 "PPSMO");
2930 return 0;
2931 }
2932
2933 return 1;
2934}
2935
2936
2937static int download_cert(struct sigma_dut *dut,
2938 struct sigma_conn *conn,
2939 const char *intf,
2940 struct sigma_cmd *cmd)
2941{
2942 const char *name, *path;
2943 char url[500], buf[600];
2944
2945 name = get_param(cmd, "FileName");
2946 path = get_param(cmd, "FilePath");
2947 if (name == NULL || path == NULL)
2948 return -1;
2949
2950 if (strcasecmp(path, "VendorSpecific") == 0) {
2951 snprintf(url, sizeof(url), "Certs/%s-cert.pem", name);
2952 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2953 "certificate from the device (%s)", url);
2954 if (!file_exists(url)) {
2955 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2956 "certificate file does not exist");
2957 return 0;
2958 }
2959 snprintf(buf, sizeof(buf), "cp %s next-client-cert.pem", url);
2960 if (system(buf) != 0) {
2961 send_resp(dut, conn, SIGMA_ERROR,
2962 "errorCode,Failed to copy client "
2963 "certificate");
2964 return 0;
2965 }
2966
2967 snprintf(url, sizeof(url), "Certs/%s-key.pem", name);
2968 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2969 "private key from the device (%s)", url);
2970 if (!file_exists(url)) {
2971 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2972 "private key file does not exist");
2973 return 0;
2974 }
2975 snprintf(buf, sizeof(buf), "cp %s next-client-key.pem", url);
2976 if (system(buf) != 0) {
2977 send_resp(dut, conn, SIGMA_ERROR,
2978 "errorCode,Failed to copy client key");
2979 return 0;
2980 }
2981 } else if (strncasecmp(path, "http:", 5) != 0 &&
2982 strncasecmp(path, "https:", 6) != 0) {
2983 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2984 "Unsupported FilePath value");
2985 return 0;
2986 } else {
2987 snprintf(url, sizeof(url), "%s/%s.pem", path, name);
2988 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading client "
2989 "certificate/key from %s", url);
2990 snprintf(buf, sizeof(buf),
2991 "wget -T 10 -t 3 -O next-client-cert.pem '%s'", url);
2992 if (system(buf) != 0) {
2993 send_resp(dut, conn, SIGMA_ERROR,
2994 "errorCode,Failed to download client "
2995 "certificate");
2996 return 0;
2997 }
2998
2999 if (system("cp next-client-cert.pem next-client-key.pem") != 0)
3000 {
3001 send_resp(dut, conn, SIGMA_ERROR,
3002 "errorCode,Failed to copy client key");
3003 return 0;
3004 }
3005 }
3006
3007 return 1;
3008}
3009
3010
3011static int cmd_sta_preset_testparameters_hs2_r2(struct sigma_dut *dut,
3012 struct sigma_conn *conn,
3013 const char *intf,
3014 struct sigma_cmd *cmd)
3015{
3016 const char *val;
3017
3018 val = get_param(cmd, "FileType");
3019 if (val && strcasecmp(val, "PPSMO") == 0)
3020 return download_ppsmo(dut, conn, intf, cmd);
3021 if (val && strcasecmp(val, "CERT") == 0)
3022 return download_cert(dut, conn, intf, cmd);
3023 if (val) {
3024 send_resp(dut, conn, SIGMA_ERROR,
3025 "ErrorCode,Unsupported FileType");
3026 return 0;
3027 }
3028
3029 return 1;
3030}
3031
3032
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303033static int cmd_sta_preset_testparameters_oce(struct sigma_dut *dut,
3034 struct sigma_conn *conn,
3035 const char *intf,
3036 struct sigma_cmd *cmd)
3037{
3038 const char *val;
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303039 char buf[1000];
3040 char text[20];
3041 unsigned char addr[ETH_ALEN];
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303042
3043 val = get_param(cmd, "OCESupport");
3044 if (val && strcasecmp(val, "Disable") == 0) {
3045 if (wpa_command(intf, "SET oce 0") < 0) {
3046 send_resp(dut, conn, SIGMA_ERROR,
3047 "ErrorCode,Failed to disable OCE");
3048 return 0;
3049 }
3050 } else if (val && strcasecmp(val, "Enable") == 0) {
3051 if (wpa_command(intf, "SET oce 1") < 0) {
3052 send_resp(dut, conn, SIGMA_ERROR,
3053 "ErrorCode,Failed to enable OCE");
3054 return 0;
3055 }
3056 }
3057
vamsi krishnaa2799492017-12-05 14:28:01 +05303058 val = get_param(cmd, "FILScap");
3059 if (val && (atoi(val) == 1)) {
3060 if (wpa_command(intf, "SET disable_fils 0") < 0) {
3061 send_resp(dut, conn, SIGMA_ERROR,
3062 "ErrorCode,Failed to enable FILS");
3063 return 0;
3064 }
3065 } else if (val && (atoi(val) == 0)) {
3066 if (wpa_command(intf, "SET disable_fils 1") < 0) {
3067 send_resp(dut, conn, SIGMA_ERROR,
3068 "ErrorCode,Failed to disable FILS");
3069 return 0;
3070 }
3071 }
3072
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303073 val = get_param(cmd, "FILSHLP");
3074 if (val && strcasecmp(val, "Enable") == 0) {
3075 if (get_wpa_status(get_station_ifname(), "address", text,
3076 sizeof(text)) < 0)
3077 return -2;
3078 hwaddr_aton(text, addr);
3079 snprintf(buf, sizeof(buf),
3080 "FILS_HLP_REQ_ADD ff:ff:ff:ff:ff:ff "
3081 "080045100140000040004011399e00000000ffffffff00440043"
3082 "012cb30001010600fd4f46410000000000000000000000000000"
3083 "000000000000"
3084 "%02x%02x%02x%02x%02x%02x"
3085 "0000000000000000000000000000000000000000000000000000"
3086 "0000000000000000000000000000000000000000000000000000"
3087 "0000000000000000000000000000000000000000000000000000"
3088 "0000000000000000000000000000000000000000000000000000"
3089 "0000000000000000000000000000000000000000000000000000"
3090 "0000000000000000000000000000000000000000000000000000"
3091 "0000000000000000000000000000000000000000000000000000"
3092 "0000000000000000000000000000000000000000638253633501"
3093 "013d0701000af549d29b390205dc3c12616e64726f69642d6468"
3094 "63702d382e302e30370a0103060f1a1c333a3b2b5000ff00",
3095 addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]);
3096 if (wpa_command(intf, buf)) {
3097 send_resp(dut, conn, SIGMA_ERROR,
3098 "ErrorCode,Failed to add HLP");
3099 return 0;
3100 }
3101 dut->fils_hlp = 1;
3102 }
3103
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303104 return 1;
3105}
3106
3107
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003108static void ath_sta_set_noack(struct sigma_dut *dut, const char *intf,
3109 const char *val)
3110{
3111 int counter = 0;
3112 char token[50];
3113 char *result;
3114 char buf[100];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303115 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003116
Peng Xub8fc5cc2017-05-10 17:27:28 -07003117 strlcpy(token, val, sizeof(token));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003118 token[sizeof(token) - 1] = '\0';
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303119 result = strtok_r(token, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003120 while (result) {
3121 if (strcmp(result, "disable") == 0) {
3122 snprintf(buf, sizeof(buf),
3123 "iwpriv %s noackpolicy %d 1 0",
3124 intf, counter);
3125 } else {
3126 snprintf(buf, sizeof(buf),
3127 "iwpriv %s noackpolicy %d 1 1",
3128 intf, counter);
3129 }
3130 if (system(buf) != 0) {
3131 sigma_dut_print(dut, DUT_MSG_ERROR,
3132 "iwpriv noackpolicy failed");
3133 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303134 result = strtok_r(NULL, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003135 counter++;
3136 }
3137}
3138
3139
3140static void ath_sta_set_rts(struct sigma_dut *dut, const char *intf,
3141 const char *val)
3142{
3143 char buf[100];
3144
3145 snprintf(buf, sizeof(buf), "iwconfig %s rts %s", intf, val);
3146 if (system(buf) != 0) {
3147 sigma_dut_print(dut, DUT_MSG_ERROR, "iwconfig RTS failed");
3148 }
3149}
3150
3151
3152static void ath_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3153 const char *val)
3154{
3155 char buf[100];
3156
3157 if (strcasecmp(val, "off") == 0) {
3158 snprintf(buf, sizeof(buf), "iwpriv %s wmm 0", intf);
3159 if (system(buf) != 0) {
3160 sigma_dut_print(dut, DUT_MSG_ERROR,
3161 "Failed to turn off WMM");
3162 }
3163 }
3164}
3165
3166
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003167static int wcn_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3168 const char *val)
3169{
3170#ifdef NL80211_SUPPORT
3171 struct nl_msg *msg;
3172 int ret = 0;
3173 struct nlattr *params;
3174 int ifindex;
3175 int wmmenable = 1;
3176
3177 if (val &&
3178 (strcasecmp(val, "off") == 0 || strcmp(val, "0") == 0))
3179 wmmenable = 0;
3180
3181 ifindex = if_nametoindex(intf);
3182 if (ifindex == 0) {
3183 sigma_dut_print(dut, DUT_MSG_ERROR,
3184 "%s: Index for interface %s failed",
3185 __func__, intf);
3186 return -1;
3187 }
3188
3189 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3190 NL80211_CMD_VENDOR)) ||
3191 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3192 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3193 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3194 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3195 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3196 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WMM_ENABLE,
3197 wmmenable)) {
3198 sigma_dut_print(dut, DUT_MSG_ERROR,
3199 "%s: err in adding vendor_cmd and vendor_data",
3200 __func__);
3201 nlmsg_free(msg);
3202 return -1;
3203 }
3204 nla_nest_end(msg, params);
3205
3206 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3207 if (ret) {
3208 sigma_dut_print(dut, DUT_MSG_ERROR,
3209 "%s: err in send_and_recv_msgs, ret=%d",
3210 __func__, ret);
3211 }
3212 return ret;
3213#else /* NL80211_SUPPORT */
3214 sigma_dut_print(dut, DUT_MSG_ERROR,
3215 "WMM cannot be changed without NL80211_SUPPORT defined");
3216 return -1;
3217#endif /* NL80211_SUPPORT */
3218}
3219
3220
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003221static void ath_sta_set_sgi(struct sigma_dut *dut, const char *intf,
3222 const char *val)
3223{
3224 char buf[100];
3225 int sgi20;
3226
3227 sgi20 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
3228
3229 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi20);
3230 if (system(buf) != 0)
3231 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv shortgi failed");
3232}
3233
3234
3235static void ath_sta_set_11nrates(struct sigma_dut *dut, const char *intf,
3236 const char *val)
3237{
3238 char buf[100];
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303239 int rate_code, v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003240
3241 /* Disable Tx Beam forming when using a fixed rate */
3242 ath_disable_txbf(dut, intf);
3243
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303244 v = atoi(val);
3245 if (v < 0 || v > 32) {
3246 sigma_dut_print(dut, DUT_MSG_ERROR,
3247 "Invalid Fixed MCS rate: %d", v);
3248 return;
3249 }
3250 rate_code = 0x80 + v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003251
3252 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0x%x",
3253 intf, rate_code);
3254 if (system(buf) != 0) {
3255 sigma_dut_print(dut, DUT_MSG_ERROR,
3256 "iwpriv set11NRates failed");
3257 }
3258
3259 /* Channel width gets messed up, fix this */
3260 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d", intf, dut->chwidth);
3261 if (system(buf) != 0)
3262 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
3263}
3264
3265
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08003266static void iwpriv_sta_set_amsdu(struct sigma_dut *dut, const char *intf,
3267 const char *val)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003268{
3269 char buf[60];
3270
3271 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)
3272 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 2", intf);
3273 else
3274 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
3275
3276 if (system(buf) != 0)
3277 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv amsdu failed");
3278}
3279
3280
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003281static int iwpriv_sta_set_ampdu(struct sigma_dut *dut, const char *intf,
3282 int ampdu)
3283{
3284 char buf[60];
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003285 int maxaggregation = 63;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003286
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003287 if (ampdu)
3288 ampdu = maxaggregation;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003289 snprintf(buf, sizeof(buf), "iwpriv %s ampdu %d", intf, ampdu);
3290 if (system(buf) != 0) {
3291 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv ampdu failed");
3292 return -1;
3293 }
3294
3295 return 0;
3296}
3297
3298
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003299static void ath_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3300 const char *val)
3301{
3302 char buf[60];
3303
3304 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3305 if (system(buf) != 0) {
3306 sigma_dut_print(dut, DUT_MSG_ERROR,
3307 "iwpriv tx_stbc failed");
3308 }
3309
3310 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3311 if (system(buf) != 0) {
3312 sigma_dut_print(dut, DUT_MSG_ERROR,
3313 "iwpriv rx_stbc failed");
3314 }
3315}
3316
3317
3318static int wcn_sta_set_cts_width(struct sigma_dut *dut, const char *intf,
3319 const char *val)
3320{
3321 char buf[60];
3322
Peng Xucc317ed2017-05-18 16:44:37 -07003323 if (strcmp(val, "160") == 0) {
3324 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 5", intf);
3325 } else if (strcmp(val, "80") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003326 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
3327 } else if (strcmp(val, "40") == 0) {
3328 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 2", intf);
3329 } else if (strcmp(val, "20") == 0) {
3330 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 1", intf);
3331 } else if (strcasecmp(val, "Auto") == 0) {
3332 buf[0] = '\0';
3333 } else {
3334 sigma_dut_print(dut, DUT_MSG_ERROR,
3335 "WIDTH/CTS_WIDTH value not supported");
3336 return -1;
3337 }
3338
3339 if (buf[0] != '\0' && system(buf) != 0) {
3340 sigma_dut_print(dut, DUT_MSG_ERROR,
3341 "Failed to set WIDTH/CTS_WIDTH");
3342 return -1;
3343 }
3344
3345 return 0;
3346}
3347
3348
3349int ath_set_width(struct sigma_dut *dut, struct sigma_conn *conn,
3350 const char *intf, const char *val)
3351{
3352 char buf[60];
3353
3354 if (strcasecmp(val, "Auto") == 0) {
3355 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3356 dut->chwidth = 0;
3357 } else if (strcasecmp(val, "20") == 0) {
3358 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3359 dut->chwidth = 0;
3360 } else if (strcasecmp(val, "40") == 0) {
3361 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
3362 dut->chwidth = 1;
3363 } else if (strcasecmp(val, "80") == 0) {
3364 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
3365 dut->chwidth = 2;
3366 } else if (strcasecmp(val, "160") == 0) {
3367 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 3", intf);
3368 dut->chwidth = 3;
3369 } else {
3370 send_resp(dut, conn, SIGMA_ERROR,
3371 "ErrorCode,WIDTH not supported");
3372 return -1;
3373 }
3374
3375 if (system(buf) != 0) {
3376 sigma_dut_print(dut, DUT_MSG_ERROR,
3377 "iwpriv chwidth failed");
3378 }
3379
3380 return 0;
3381}
3382
3383
3384static int wcn_sta_set_sp_stream(struct sigma_dut *dut, const char *intf,
3385 const char *val)
3386{
3387 char buf[60];
Arif Hussainac6c5112018-05-25 17:34:00 -07003388 int sta_nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003389
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003390 if (strcmp(val, "1SS") == 0 || strcmp(val, "1") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003391 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003392 sta_nss = 1;
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003393 } else if (strcmp(val, "2SS") == 0 || strcmp(val, "2") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003394 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003395 sta_nss = 2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003396 } else {
3397 sigma_dut_print(dut, DUT_MSG_ERROR,
3398 "SP_STREAM value not supported");
3399 return -1;
3400 }
3401
3402 if (system(buf) != 0) {
3403 sigma_dut_print(dut, DUT_MSG_ERROR,
3404 "Failed to set SP_STREAM");
3405 return -1;
3406 }
3407
Arif Hussainac6c5112018-05-25 17:34:00 -07003408 dut->sta_nss = sta_nss;
3409
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003410 return 0;
3411}
3412
3413
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05303414static void wcn_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3415 const char *val)
3416{
3417 char buf[60];
3418
3419 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3420 if (system(buf) != 0)
3421 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv tx_stbc failed");
3422
3423 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3424 if (system(buf) != 0)
3425 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv rx_stbc failed");
3426}
3427
3428
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303429static int mbo_set_cellular_data_capa(struct sigma_dut *dut,
3430 struct sigma_conn *conn,
3431 const char *intf, int capa)
3432{
3433 char buf[32];
3434
3435 if (capa > 0 && capa < 4) {
3436 snprintf(buf, sizeof(buf), "SET mbo_cell_capa %d", capa);
3437 if (wpa_command(intf, buf) < 0) {
3438 send_resp(dut, conn, SIGMA_ERROR,
3439 "ErrorCode, Failed to set cellular data capability");
3440 return 0;
3441 }
3442 return 1;
3443 }
3444
3445 sigma_dut_print(dut, DUT_MSG_ERROR,
3446 "Invalid Cellular data capability: %d", capa);
3447 send_resp(dut, conn, SIGMA_INVALID,
3448 "ErrorCode,Invalid cellular data capability");
3449 return 0;
3450}
3451
3452
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303453static int mbo_set_roaming(struct sigma_dut *dut, struct sigma_conn *conn,
3454 const char *intf, const char *val)
3455{
3456 if (strcasecmp(val, "Disable") == 0) {
3457 if (wpa_command(intf, "SET roaming 0") < 0) {
3458 send_resp(dut, conn, SIGMA_ERROR,
3459 "ErrorCode,Failed to disable roaming");
3460 return 0;
3461 }
3462 return 1;
3463 }
3464
3465 if (strcasecmp(val, "Enable") == 0) {
3466 if (wpa_command(intf, "SET roaming 1") < 0) {
3467 send_resp(dut, conn, SIGMA_ERROR,
3468 "ErrorCode,Failed to enable roaming");
3469 return 0;
3470 }
3471 return 1;
3472 }
3473
3474 sigma_dut_print(dut, DUT_MSG_ERROR,
3475 "Invalid value provided for roaming: %s", val);
3476 send_resp(dut, conn, SIGMA_INVALID,
3477 "ErrorCode,Unknown value provided for Roaming");
3478 return 0;
3479}
3480
3481
Ashwini Patila75de5a2017-04-13 16:35:05 +05303482static int mbo_set_assoc_disallow(struct sigma_dut *dut,
3483 struct sigma_conn *conn,
3484 const char *intf, const char *val)
3485{
3486 if (strcasecmp(val, "Disable") == 0) {
3487 if (wpa_command(intf, "SET ignore_assoc_disallow 1") < 0) {
3488 send_resp(dut, conn, SIGMA_ERROR,
3489 "ErrorCode,Failed to disable Assoc_disallow");
3490 return 0;
3491 }
3492 return 1;
3493 }
3494
3495 if (strcasecmp(val, "Enable") == 0) {
3496 if (wpa_command(intf, "SET ignore_assoc_disallow 0") < 0) {
3497 send_resp(dut, conn, SIGMA_ERROR,
3498 "ErrorCode,Failed to enable Assoc_disallow");
3499 return 0;
3500 }
3501 return 1;
3502 }
3503
3504 sigma_dut_print(dut, DUT_MSG_ERROR,
3505 "Invalid value provided for Assoc_disallow: %s", val);
3506 send_resp(dut, conn, SIGMA_INVALID,
3507 "ErrorCode,Unknown value provided for Assoc_disallow");
3508 return 0;
3509}
3510
3511
Ashwini Patilc63161e2017-04-13 16:30:23 +05303512static int mbo_set_bss_trans_req(struct sigma_dut *dut, struct sigma_conn *conn,
3513 const char *intf, const char *val)
3514{
3515 if (strcasecmp(val, "Reject") == 0) {
3516 if (wpa_command(intf, "SET reject_btm_req_reason 1") < 0) {
3517 send_resp(dut, conn, SIGMA_ERROR,
3518 "ErrorCode,Failed to Reject BTM Request");
3519 return 0;
3520 }
3521 return 1;
3522 }
3523
3524 if (strcasecmp(val, "Accept") == 0) {
3525 if (wpa_command(intf, "SET reject_btm_req_reason 0") < 0) {
3526 send_resp(dut, conn, SIGMA_ERROR,
3527 "ErrorCode,Failed to Accept BTM Request");
3528 return 0;
3529 }
3530 return 1;
3531 }
3532
3533 sigma_dut_print(dut, DUT_MSG_ERROR,
3534 "Invalid value provided for BSS_Transition: %s", val);
3535 send_resp(dut, conn, SIGMA_INVALID,
3536 "ErrorCode,Unknown value provided for BSS_Transition");
3537 return 0;
3538}
3539
3540
Ashwini Patil00402582017-04-13 12:29:39 +05303541static int mbo_set_non_pref_ch_list(struct sigma_dut *dut,
3542 struct sigma_conn *conn,
3543 const char *intf,
3544 struct sigma_cmd *cmd)
3545{
3546 const char *ch, *pref, *op_class, *reason;
3547 char buf[120];
3548 int len, ret;
3549
3550 pref = get_param(cmd, "Ch_Pref");
3551 if (!pref)
3552 return 1;
3553
3554 if (strcasecmp(pref, "clear") == 0) {
3555 free(dut->non_pref_ch_list);
3556 dut->non_pref_ch_list = NULL;
3557 } else {
3558 op_class = get_param(cmd, "Ch_Op_Class");
3559 if (!op_class) {
3560 send_resp(dut, conn, SIGMA_INVALID,
3561 "ErrorCode,Ch_Op_Class not provided");
3562 return 0;
3563 }
3564
3565 ch = get_param(cmd, "Ch_Pref_Num");
3566 if (!ch) {
3567 send_resp(dut, conn, SIGMA_INVALID,
3568 "ErrorCode,Ch_Pref_Num not provided");
3569 return 0;
3570 }
3571
3572 reason = get_param(cmd, "Ch_Reason_Code");
3573 if (!reason) {
3574 send_resp(dut, conn, SIGMA_INVALID,
3575 "ErrorCode,Ch_Reason_Code not provided");
3576 return 0;
3577 }
3578
3579 if (!dut->non_pref_ch_list) {
3580 dut->non_pref_ch_list =
3581 calloc(1, NON_PREF_CH_LIST_SIZE);
3582 if (!dut->non_pref_ch_list) {
3583 send_resp(dut, conn, SIGMA_ERROR,
3584 "ErrorCode,Failed to allocate memory for non_pref_ch_list");
3585 return 0;
3586 }
3587 }
3588 len = strlen(dut->non_pref_ch_list);
3589 ret = snprintf(dut->non_pref_ch_list + len,
3590 NON_PREF_CH_LIST_SIZE - len,
3591 " %s:%s:%s:%s", op_class, ch, pref, reason);
3592 if (ret > 0 && ret < NON_PREF_CH_LIST_SIZE - len) {
3593 sigma_dut_print(dut, DUT_MSG_DEBUG, "non_pref_list: %s",
3594 dut->non_pref_ch_list);
3595 } else {
3596 sigma_dut_print(dut, DUT_MSG_ERROR,
3597 "snprintf failed for non_pref_list, ret = %d",
3598 ret);
3599 send_resp(dut, conn, SIGMA_ERROR,
3600 "ErrorCode,snprintf failed");
3601 free(dut->non_pref_ch_list);
3602 dut->non_pref_ch_list = NULL;
3603 return 0;
3604 }
3605 }
3606
3607 ret = snprintf(buf, sizeof(buf), "SET non_pref_chan%s",
3608 dut->non_pref_ch_list ? dut->non_pref_ch_list : " ");
3609 if (ret < 0 || ret >= (int) sizeof(buf)) {
3610 sigma_dut_print(dut, DUT_MSG_DEBUG,
3611 "snprintf failed for set non_pref_chan, ret: %d",
3612 ret);
3613 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,snprint failed");
3614 return 0;
3615 }
3616
3617 if (wpa_command(intf, buf) < 0) {
3618 send_resp(dut, conn, SIGMA_ERROR,
3619 "ErrorCode,Failed to set non-preferred channel list");
3620 return 0;
3621 }
3622
3623 return 1;
3624}
3625
3626
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003627#ifdef NL80211_SUPPORT
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003628
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003629static int sta_set_he_fragmentation(struct sigma_dut *dut, const char *intf,
3630 enum he_fragmentation_val frag)
3631{
3632 struct nl_msg *msg;
3633 int ret = 0;
3634 struct nlattr *params;
3635 int ifindex;
3636
3637 ifindex = if_nametoindex(intf);
3638 if (ifindex == 0) {
3639 sigma_dut_print(dut, DUT_MSG_ERROR,
3640 "%s: Index for interface %s failed",
3641 __func__, intf);
3642 return -1;
3643 }
3644
3645 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3646 NL80211_CMD_VENDOR)) ||
3647 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3648 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3649 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3650 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3651 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3652 nla_put_u8(msg,
3653 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_FRAGMENTATION,
3654 frag)) {
3655 sigma_dut_print(dut, DUT_MSG_ERROR,
3656 "%s: err in adding vendor_cmd and vendor_data",
3657 __func__);
3658 nlmsg_free(msg);
3659 return -1;
3660 }
3661 nla_nest_end(msg, params);
3662
3663 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3664 if (ret) {
3665 sigma_dut_print(dut, DUT_MSG_ERROR,
3666 "%s: err in send_and_recv_msgs, ret=%d",
3667 __func__, ret);
3668 }
3669 return ret;
3670}
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003671
3672
Subhani Shaik8e7a3052018-04-24 14:03:00 -07003673static int sta_set_he_ltf(struct sigma_dut *dut, const char *intf,
3674 enum qca_wlan_he_ltf_cfg ltf)
3675{
3676 struct nl_msg *msg;
3677 int ret = 0;
3678 struct nlattr *params;
3679 int ifindex;
3680
3681 ifindex = if_nametoindex(intf);
3682 if (ifindex == 0) {
3683 sigma_dut_print(dut, DUT_MSG_ERROR,
3684 "%s: Index for interface %s failed",
3685 __func__, intf);
3686 return -1;
3687 }
3688
3689 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3690 NL80211_CMD_VENDOR)) ||
3691 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3692 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3693 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3694 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3695 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3696 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_LTF,
3697 ltf)) {
3698 sigma_dut_print(dut, DUT_MSG_ERROR,
3699 "%s: err in adding vendor_cmd and vendor_data",
3700 __func__);
3701 nlmsg_free(msg);
3702 return -1;
3703 }
3704 nla_nest_end(msg, params);
3705
3706 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3707 if (ret) {
3708 sigma_dut_print(dut, DUT_MSG_ERROR,
3709 "%s: err in send_and_recv_msgs, ret=%d",
3710 __func__, ret);
3711 }
3712 return ret;
3713}
3714
3715
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003716static int nlvendor_sta_set_noack(struct sigma_dut *dut, const char *intf,
3717 int noack, enum qca_wlan_ac_type ac)
3718{
3719 struct nl_msg *msg;
3720 int ret = 0;
3721 struct nlattr *params;
3722 int ifindex;
3723
3724 ifindex = if_nametoindex(intf);
3725 if (ifindex == 0) {
3726 sigma_dut_print(dut, DUT_MSG_ERROR,
3727 "%s: Index for interface %s failed",
3728 __func__, intf);
3729 return -1;
3730 }
3731
3732 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3733 NL80211_CMD_VENDOR)) ||
3734 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3735 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3736 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3737 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3738 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3739 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_NO_ACK,
3740 noack) ||
3741 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_NO_ACK_AC,
3742 ac)) {
3743 sigma_dut_print(dut, DUT_MSG_ERROR,
3744 "%s: err in adding vendor_cmd and vendor_data",
3745 __func__);
3746 nlmsg_free(msg);
3747 return -1;
3748 }
3749 nla_nest_end(msg, params);
3750
3751 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3752 if (ret) {
3753 sigma_dut_print(dut, DUT_MSG_ERROR,
3754 "%s: err in send_and_recv_msgs, ret=%d",
3755 __func__, ret);
3756 }
3757 return ret;
3758}
3759
3760
3761static void wcn_sta_set_noack(struct sigma_dut *dut, const char *intf,
3762 const char *val)
3763{
3764 int noack, ret;
3765 char token[100];
3766 char *result;
3767 char *saveptr;
3768 enum qca_wlan_ac_type ac = QCA_WLAN_AC_BE;
3769
3770 strlcpy(token, val, sizeof(token));
3771 token[sizeof(token) - 1] = '\0';
3772 result = strtok_r(token, ":", &saveptr);
3773 while (result) {
3774 noack = strcasecmp(result, "Disable") != 0;
3775 ret = nlvendor_sta_set_noack(dut, intf, noack, ac);
3776 if (ret) {
3777 sigma_dut_print(dut, DUT_MSG_ERROR,
3778 "nlvendor_sta_set_noack failed for ac:%d, ret:%d",
3779 ac, ret);
3780 }
3781 result = strtok_r(NULL, ":", &saveptr);
3782 ac++;
3783 }
3784}
3785
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003786#endif /* NL80211_SUPPORT */
3787
3788
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003789static int cmd_sta_preset_testparameters(struct sigma_dut *dut,
3790 struct sigma_conn *conn,
3791 struct sigma_cmd *cmd)
3792{
3793 const char *intf = get_param(cmd, "Interface");
3794 const char *val;
3795
3796 val = get_param(cmd, "Program");
Jouni Malinen1f6ae642018-06-07 23:56:13 +03003797 if (val && (strcasecmp(val, "HS2-R2") == 0 ||
3798 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003799 return cmd_sta_preset_testparameters_hs2_r2(dut, conn, intf,
3800 cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003801
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07003802 if (val && strcasecmp(val, "LOC") == 0)
3803 return loc_cmd_sta_preset_testparameters(dut, conn, cmd);
3804
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003805#ifdef ANDROID_NAN
3806 if (val && strcasecmp(val, "NAN") == 0)
3807 return nan_cmd_sta_preset_testparameters(dut, conn, cmd);
3808#endif /* ANDROID_NAN */
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07003809#ifdef MIRACAST
3810 if (val && (strcasecmp(val, "WFD") == 0 ||
3811 strcasecmp(val, "DisplayR2") == 0))
3812 return miracast_preset_testparameters(dut, conn, cmd);
3813#endif /* MIRACAST */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003814
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303815 if (val && strcasecmp(val, "MBO") == 0) {
3816 val = get_param(cmd, "Cellular_Data_Cap");
3817 if (val &&
3818 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
3819 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05303820
3821 val = get_param(cmd, "Ch_Pref");
3822 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
3823 return 0;
3824
Ashwini Patilc63161e2017-04-13 16:30:23 +05303825 val = get_param(cmd, "BSS_Transition");
3826 if (val && mbo_set_bss_trans_req(dut, conn, intf, val) == 0)
3827 return 0;
3828
Ashwini Patila75de5a2017-04-13 16:35:05 +05303829 val = get_param(cmd, "Assoc_Disallow");
3830 if (val && mbo_set_assoc_disallow(dut, conn, intf, val) == 0)
3831 return 0;
3832
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303833 val = get_param(cmd, "Roaming");
3834 if (val && mbo_set_roaming(dut, conn, intf, val) == 0)
3835 return 0;
3836
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303837 return 1;
3838 }
3839
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303840 if (val && strcasecmp(val, "OCE") == 0)
3841 return cmd_sta_preset_testparameters_oce(dut, conn, intf, cmd);
3842
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003843#if 0
3844 val = get_param(cmd, "Supplicant");
3845 if (val && strcasecmp(val, "Default") != 0) {
3846 send_resp(dut, conn, SIGMA_ERROR,
3847 "ErrorCode,Only default(Vendor) supplicant "
3848 "supported");
3849 return 0;
3850 }
3851#endif
3852
3853 val = get_param(cmd, "RTS");
3854 if (val) {
3855 switch (get_driver_type()) {
3856 case DRIVER_ATHEROS:
3857 ath_sta_set_rts(dut, intf, val);
3858 break;
3859 default:
3860#if 0
3861 send_resp(dut, conn, SIGMA_ERROR,
3862 "ErrorCode,Setting RTS not supported");
3863 return 0;
3864#else
3865 sigma_dut_print(dut, DUT_MSG_DEBUG,
3866 "Setting RTS not supported");
3867 break;
3868#endif
3869 }
3870 }
3871
3872#if 0
3873 val = get_param(cmd, "FRGMNT");
3874 if (val) {
3875 /* TODO */
3876 send_resp(dut, conn, SIGMA_ERROR,
3877 "ErrorCode,Setting FRGMNT not supported");
3878 return 0;
3879 }
3880#endif
3881
3882#if 0
3883 val = get_param(cmd, "Preamble");
3884 if (val) {
3885 /* TODO: Long/Short */
3886 send_resp(dut, conn, SIGMA_ERROR,
3887 "ErrorCode,Setting Preamble not supported");
3888 return 0;
3889 }
3890#endif
3891
3892 val = get_param(cmd, "Mode");
3893 if (val) {
3894 if (strcmp(val, "11b") == 0 ||
3895 strcmp(val, "11g") == 0 ||
3896 strcmp(val, "11a") == 0 ||
3897 strcmp(val, "11n") == 0 ||
3898 strcmp(val, "11ng") == 0 ||
3899 strcmp(val, "11nl") == 0 ||
3900 strcmp(val, "11nl(nabg)") == 0 ||
3901 strcmp(val, "AC") == 0 ||
3902 strcmp(val, "11AC") == 0 ||
3903 strcmp(val, "11ac") == 0 ||
3904 strcmp(val, "11na") == 0 ||
Amarnath Hullur Subramanyamb0db2712018-01-30 19:40:35 -08003905 strcmp(val, "11an") == 0 ||
3906 strcmp(val, "11ax") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003907 /* STA supports all modes by default */
3908 } else {
3909 send_resp(dut, conn, SIGMA_ERROR,
3910 "ErrorCode,Setting Mode not supported");
3911 return 0;
3912 }
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003913
3914 /* Change the mode only in case of testbed for HE program
3915 * and for 11a and 11g modes only. */
3916 if (dut->program == PROGRAM_HE &&
3917 dut->device_type == STA_testbed) {
3918 int phymode;
3919 char buf[60];
3920
3921 if (strcmp(val, "11a") == 0) {
Amarnath Hullur Subramanyam94dfaf02018-03-02 19:26:57 -08003922 phymode = 1; /* IEEE80211_MODE_11A */
3923 } else if (strcmp(val, "11g") == 0) {
3924 phymode = 3; /* IEEE80211_MODE_11G */
3925 } else if (strcmp(val, "11b") == 0) {
3926 phymode = 2; /* IEEE80211_MODE_11B */
3927 } else if (strcmp(val, "11n") == 0 ||
3928 strcmp(val, "11nl") == 0 ||
3929 strcmp(val, "11nl(nabg)") == 0) {
3930 phymode = 22; /* IEEE80211_MODE_11AGN */
3931 } else if (strcmp(val, "11ng") == 0) {
3932 phymode = 13; /* IEEE80211_MODE_11NG_HT40 */
3933 } else if (strcmp(val, "AC") == 0 ||
3934 strcasecmp(val, "11AC") == 0) {
3935 phymode = 19; /* IEEE80211_MODE_11AC_VHT80 */
3936 } else if (strcmp(val, "11na") == 0 ||
3937 strcasecmp(val, "11an") == 0) {
3938 phymode = 14; /* IEEE80211_MODE_11NA_HT40 */
3939 } else if (strcmp(val, "11ax") == 0) {
3940 phymode = 0; /* IEEE80211_MODE_AUTO */
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003941 } else {
3942 sigma_dut_print(dut, DUT_MSG_DEBUG,
3943 "Ignoring mode change for mode: %s",
3944 val);
3945 phymode = -1;
3946 }
3947 if (phymode != -1) {
3948 snprintf(buf, sizeof(buf),
3949 "iwpriv %s setphymode %d",
3950 intf, phymode);
3951 if (system(buf) != 0) {
3952 sigma_dut_print(dut, DUT_MSG_ERROR,
3953 "iwpriv setting of phymode failed");
3954 }
3955 }
3956 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003957 }
3958
3959 val = get_param(cmd, "wmm");
3960 if (val) {
3961 switch (get_driver_type()) {
3962 case DRIVER_ATHEROS:
3963 ath_sta_set_wmm(dut, intf, val);
3964 break;
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003965 case DRIVER_WCN:
3966 wcn_sta_set_wmm(dut, intf, val);
3967 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003968 default:
3969 sigma_dut_print(dut, DUT_MSG_DEBUG,
3970 "Setting wmm not supported");
3971 break;
3972 }
3973 }
3974
3975 val = get_param(cmd, "Powersave");
3976 if (val) {
3977 if (strcmp(val, "0") == 0 || strcasecmp(val, "off") == 0) {
3978 if (wpa_command(get_station_ifname(),
3979 "P2P_SET ps 0") < 0)
3980 return -2;
3981 /* Make sure test modes are disabled */
3982 wpa_command(get_station_ifname(), "P2P_SET ps 98");
3983 wpa_command(get_station_ifname(), "P2P_SET ps 96");
3984 } else if (strcmp(val, "1") == 0 ||
3985 strcasecmp(val, "PSPoll") == 0 ||
3986 strcasecmp(val, "on") == 0) {
3987 /* Disable default power save mode */
3988 wpa_command(get_station_ifname(), "P2P_SET ps 0");
3989 /* Enable PS-Poll test mode */
3990 if (wpa_command(get_station_ifname(),
3991 "P2P_SET ps 97") < 0 ||
3992 wpa_command(get_station_ifname(),
3993 "P2P_SET ps 99") < 0)
3994 return -2;
3995 } else if (strcmp(val, "2") == 0 ||
3996 strcasecmp(val, "Fast") == 0) {
3997 /* TODO */
3998 send_resp(dut, conn, SIGMA_ERROR,
3999 "ErrorCode,Powersave=Fast not supported");
4000 return 0;
4001 } else if (strcmp(val, "3") == 0 ||
4002 strcasecmp(val, "PSNonPoll") == 0) {
4003 /* Make sure test modes are disabled */
4004 wpa_command(get_station_ifname(), "P2P_SET ps 98");
4005 wpa_command(get_station_ifname(), "P2P_SET ps 96");
4006
4007 /* Enable default power save mode */
4008 if (wpa_command(get_station_ifname(),
4009 "P2P_SET ps 1") < 0)
4010 return -2;
4011 } else
4012 return -1;
4013 }
4014
4015 val = get_param(cmd, "NoAck");
4016 if (val) {
4017 switch (get_driver_type()) {
4018 case DRIVER_ATHEROS:
4019 ath_sta_set_noack(dut, intf, val);
4020 break;
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08004021#ifdef NL80211_SUPPORT
4022 case DRIVER_WCN:
4023 wcn_sta_set_noack(dut, intf, val);
4024 break;
4025#endif /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004026 default:
4027 send_resp(dut, conn, SIGMA_ERROR,
4028 "ErrorCode,Setting NoAck not supported");
4029 return 0;
4030 }
4031 }
4032
4033 val = get_param(cmd, "IgnoreChswitchProhibit");
4034 if (val) {
4035 /* TODO: Enabled/disabled */
4036 if (strcasecmp(val, "Enabled") == 0) {
4037 send_resp(dut, conn, SIGMA_ERROR,
4038 "ErrorCode,Enabling IgnoreChswitchProhibit "
4039 "not supported");
4040 return 0;
4041 }
4042 }
4043
4044 val = get_param(cmd, "TDLS");
4045 if (val) {
4046 if (strcasecmp(val, "Disabled") == 0) {
4047 if (wpa_command(intf, "SET tdls_disabled 1")) {
4048 send_resp(dut, conn, SIGMA_ERROR,
4049 "ErrorCode,Failed to disable TDLS");
4050 return 0;
4051 }
4052 } else if (strcasecmp(val, "Enabled") == 0) {
4053 if (wpa_command(intf, "SET tdls_disabled 0")) {
4054 send_resp(dut, conn, SIGMA_ERROR,
4055 "ErrorCode,Failed to enable TDLS");
4056 return 0;
4057 }
4058 } else {
4059 send_resp(dut, conn, SIGMA_ERROR,
4060 "ErrorCode,Unsupported TDLS value");
4061 return 0;
4062 }
4063 }
4064
4065 val = get_param(cmd, "TDLSmode");
4066 if (val) {
4067 if (strcasecmp(val, "Default") == 0) {
4068 wpa_command(intf, "SET tdls_testing 0");
4069 } else if (strcasecmp(val, "APProhibit") == 0) {
4070 if (wpa_command(intf, "SET tdls_testing 0x400")) {
4071 send_resp(dut, conn, SIGMA_ERROR,
4072 "ErrorCode,Failed to enable ignore "
4073 "APProhibit TDLS mode");
4074 return 0;
4075 }
4076 } else if (strcasecmp(val, "HiLoMac") == 0) {
4077 /* STA should respond with TDLS setup req for a TDLS
4078 * setup req */
4079 if (wpa_command(intf, "SET tdls_testing 0x80")) {
4080 send_resp(dut, conn, SIGMA_ERROR,
4081 "ErrorCode,Failed to enable HiLoMac "
4082 "TDLS mode");
4083 return 0;
4084 }
4085 } else if (strcasecmp(val, "WeakSecurity") == 0) {
4086 /*
4087 * Since all security modes are enabled by default when
4088 * Sigma control is used, there is no need to do
4089 * anything here.
4090 */
4091 } else if (strcasecmp(val, "ExistLink") == 0) {
4092 /*
4093 * Since we allow new TDLS Setup Request even if there
4094 * is an existing link, nothing needs to be done for
4095 * this.
4096 */
4097 } else {
4098 /* TODO:
4099 * ExistLink: STA should send TDLS setup req even if
4100 * direct link already exists
4101 */
4102 send_resp(dut, conn, SIGMA_ERROR,
4103 "ErrorCode,Unsupported TDLSmode value");
4104 return 0;
4105 }
4106 }
4107
4108 val = get_param(cmd, "FakePubKey");
4109 if (val && atoi(val) && wpa_command(intf, "SET wps_corrupt_pkhash 1")) {
4110 send_resp(dut, conn, SIGMA_ERROR,
4111 "ErrorCode,Failed to enable FakePubKey");
4112 return 0;
4113 }
4114
Amarnath Hullur Subramanyamae1042b2018-02-22 21:52:52 -08004115#ifdef NL80211_SUPPORT
4116 val = get_param(cmd, "FrgmntSupport");
4117 if (val) {
4118 if (strcasecmp(val, "Enable") == 0) {
4119 if (sta_set_he_fragmentation(dut, intf,
4120 HE_FRAG_LEVEL1)) {
4121 send_resp(dut, conn, SIGMA_ERROR,
4122 "ErrorCode,Failed to enable HE Fragmentation");
4123 return 0;
4124 }
4125 } else if (strcasecmp(val, "Disable") == 0) {
4126 if (sta_set_he_fragmentation(dut, intf,
4127 HE_FRAG_DISABLE)) {
4128 send_resp(dut, conn, SIGMA_ERROR,
4129 "ErrorCode,Failed to disable HE Fragmentation");
4130 return 0;
4131 }
4132 }
4133 }
4134#endif /* NL80211_SUPPORT */
4135
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004136 return 1;
4137}
4138
4139
4140static const char * ath_get_radio_name(const char *radio_name)
4141{
4142 if (radio_name == NULL)
4143 return "wifi0";
4144 if (strcmp(radio_name, "wifi1") == 0)
4145 return "wifi1";
4146 if (strcmp(radio_name, "wifi2") == 0)
4147 return "wifi2";
4148 return "wifi0";
4149}
4150
4151
4152static void ath_sta_set_txsp_stream(struct sigma_dut *dut, const char *intf,
4153 const char *val)
4154{
4155 char buf[60];
4156 unsigned int vht_mcsmap = 0;
4157 int txchainmask = 0;
4158 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4159
4160 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4161 if (dut->testbed_flag_txsp == 1) {
4162 vht_mcsmap = 0xfffc;
4163 dut->testbed_flag_txsp = 0;
4164 } else {
4165 vht_mcsmap = 0xfffe;
4166 }
4167 txchainmask = 1;
4168 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4169 if (dut->testbed_flag_txsp == 1) {
4170 vht_mcsmap = 0xfff0;
4171 dut->testbed_flag_txsp = 0;
4172 } else {
4173 vht_mcsmap = 0xfffa;
4174 }
4175 txchainmask = 3;
4176 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4177 if (dut->testbed_flag_txsp == 1) {
4178 vht_mcsmap = 0xffc0;
4179 dut->testbed_flag_txsp = 0;
4180 } else {
4181 vht_mcsmap = 0xffea;
4182 }
4183 txchainmask = 7;
4184 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4185 if (dut->testbed_flag_txsp == 1) {
4186 vht_mcsmap = 0xff00;
4187 dut->testbed_flag_txsp = 0;
4188 } else {
4189 vht_mcsmap = 0xffaa;
4190 }
4191 txchainmask = 15;
4192 } else {
4193 if (dut->testbed_flag_txsp == 1) {
4194 vht_mcsmap = 0xffc0;
4195 dut->testbed_flag_txsp = 0;
4196 } else {
4197 vht_mcsmap = 0xffea;
4198 }
4199 }
4200
4201 if (txchainmask) {
4202 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
4203 basedev, txchainmask);
4204 if (system(buf) != 0) {
4205 sigma_dut_print(dut, DUT_MSG_ERROR,
4206 "iwpriv txchainmask failed");
4207 }
4208 }
4209
4210 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4211 intf, vht_mcsmap);
4212 if (system(buf) != 0) {
4213 sigma_dut_print(dut, DUT_MSG_ERROR,
4214 "iwpriv %s vht_mcsmap 0x%04x failed",
4215 intf, vht_mcsmap);
4216 }
4217}
4218
4219
4220static void ath_sta_set_rxsp_stream(struct sigma_dut *dut, const char *intf,
4221 const char *val)
4222{
4223 char buf[60];
4224 unsigned int vht_mcsmap = 0;
4225 int rxchainmask = 0;
4226 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4227
4228 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4229 if (dut->testbed_flag_rxsp == 1) {
4230 vht_mcsmap = 0xfffc;
4231 dut->testbed_flag_rxsp = 0;
4232 } else {
4233 vht_mcsmap = 0xfffe;
4234 }
4235 rxchainmask = 1;
4236 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4237 if (dut->testbed_flag_rxsp == 1) {
4238 vht_mcsmap = 0xfff0;
4239 dut->testbed_flag_rxsp = 0;
4240 } else {
4241 vht_mcsmap = 0xfffa;
4242 }
4243 rxchainmask = 3;
4244 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4245 if (dut->testbed_flag_rxsp == 1) {
4246 vht_mcsmap = 0xffc0;
4247 dut->testbed_flag_rxsp = 0;
4248 } else {
4249 vht_mcsmap = 0xffea;
4250 }
4251 rxchainmask = 7;
4252 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4253 if (dut->testbed_flag_rxsp == 1) {
4254 vht_mcsmap = 0xff00;
4255 dut->testbed_flag_rxsp = 0;
4256 } else {
4257 vht_mcsmap = 0xffaa;
4258 }
4259 rxchainmask = 15;
4260 } else {
4261 if (dut->testbed_flag_rxsp == 1) {
4262 vht_mcsmap = 0xffc0;
4263 dut->testbed_flag_rxsp = 0;
4264 } else {
4265 vht_mcsmap = 0xffea;
4266 }
4267 }
4268
4269 if (rxchainmask) {
4270 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
4271 basedev, rxchainmask);
4272 if (system(buf) != 0) {
4273 sigma_dut_print(dut, DUT_MSG_ERROR,
4274 "iwpriv rxchainmask failed");
4275 }
4276 }
4277
4278 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4279 intf, vht_mcsmap);
4280 if (system(buf) != 0) {
4281 sigma_dut_print(dut, DUT_MSG_ERROR,
4282 "iwpriv %s vht_mcsmap 0x%04x",
4283 intf, vht_mcsmap);
4284 }
4285}
4286
4287
4288void ath_set_zero_crc(struct sigma_dut *dut, const char *val)
4289{
4290 if (strcasecmp(val, "enable") == 0) {
4291 if (system("athdiag --set --address=0x2a204 --and=0xbfffffff")
4292 != 0) {
4293 sigma_dut_print(dut, DUT_MSG_ERROR,
4294 "Disable BB_VHTSIGB_CRC_CALC failed");
4295 }
4296
4297 if (system("athdiag --set --address=0x2a204 --or=0x80000000")
4298 != 0) {
4299 sigma_dut_print(dut, DUT_MSG_ERROR,
4300 "Enable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4301 }
4302 } else {
4303 if (system("athdiag --set --address=0x2a204 --and=0x7fffffff")
4304 != 0) {
4305 sigma_dut_print(dut, DUT_MSG_ERROR,
4306 "Disable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4307 }
4308
4309 if (system("athdiag --set --address=0x2a204 --or=0x40000000")
4310 != 0) {
4311 sigma_dut_print(dut, DUT_MSG_ERROR,
4312 "Enable BB_VHTSIGB_CRC_CALC failed");
4313 }
4314 }
4315}
4316
4317
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004318static int wcn_sta_set_width(struct sigma_dut *dut, const char *intf,
4319 const char *val)
4320{
4321 char buf[60];
4322
4323 if (strcmp(val, "20") == 0) {
4324 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
4325 dut->chwidth = 0;
4326 } else if (strcmp(val, "40") == 0) {
4327 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
4328 dut->chwidth = 1;
4329 } else if (strcmp(val, "80") == 0) {
4330 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
4331 dut->chwidth = 2;
Sunil Duttb1cccac2018-05-22 21:03:12 +05304332 } else if (strcasecmp(val, "Auto") == 0) {
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004333 buf[0] = '\0';
4334 } else {
4335 sigma_dut_print(dut, DUT_MSG_ERROR, "WIDTH %s not supported",
4336 val);
4337 return -1;
4338 }
4339
4340 if (buf[0] != '\0' && system(buf) != 0) {
4341 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
4342 return -1;
4343 }
4344
4345 return 0;
4346}
4347
4348
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004349static int nlvendor_sta_set_addba_reject(struct sigma_dut *dut,
4350 const char *intf, int addbareject)
4351{
4352#ifdef NL80211_SUPPORT
4353 struct nl_msg *msg;
4354 int ret = 0;
4355 struct nlattr *params;
4356 int ifindex;
4357
4358 ifindex = if_nametoindex(intf);
4359 if (ifindex == 0) {
4360 sigma_dut_print(dut, DUT_MSG_ERROR,
4361 "%s: Index for interface %s failed",
4362 __func__, intf);
4363 return -1;
4364 }
4365
4366 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4367 NL80211_CMD_VENDOR)) ||
4368 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4369 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4370 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4371 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4372 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4373 nla_put_u8(msg,
4374 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ACCEPT_ADDBA_REQ,
4375 !addbareject)) {
4376 sigma_dut_print(dut, DUT_MSG_ERROR,
4377 "%s: err in adding vendor_cmd and vendor_data",
4378 __func__);
4379 nlmsg_free(msg);
4380 return -1;
4381 }
4382 nla_nest_end(msg, params);
4383
4384 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4385 if (ret) {
4386 sigma_dut_print(dut, DUT_MSG_ERROR,
4387 "%s: err in send_and_recv_msgs, ret=%d",
4388 __func__, ret);
4389 }
4390 return ret;
4391#else /* NL80211_SUPPORT */
4392 sigma_dut_print(dut, DUT_MSG_ERROR,
4393 "ADDBA_REJECT cannot be set without NL80211_SUPPORT defined");
4394 return -1;
4395#endif /* NL80211_SUPPORT */
4396}
4397
4398
4399static int sta_set_addba_reject(struct sigma_dut *dut, const char *intf,
4400 int addbareject)
4401{
4402 int ret;
4403
4404 switch (get_driver_type()) {
4405 case DRIVER_WCN:
4406 ret = nlvendor_sta_set_addba_reject(dut, intf, addbareject);
4407 if (ret) {
4408 sigma_dut_print(dut, DUT_MSG_ERROR,
4409 "nlvendor_sta_set_addba_reject failed, ret:%d",
4410 ret);
4411 return ret;
4412 }
4413 break;
4414 default:
4415 sigma_dut_print(dut, DUT_MSG_ERROR,
4416 "errorCode,Unsupported ADDBA_REJECT with the current driver");
4417 ret = -1;
4418 break;
4419 }
4420
4421 return ret;
4422}
4423
4424
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004425static int nlvendor_config_send_addba(struct sigma_dut *dut, const char *intf,
4426 int enable)
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004427{
4428#ifdef NL80211_SUPPORT
4429 struct nl_msg *msg;
4430 int ret = 0;
4431 struct nlattr *params;
4432 int ifindex;
4433
4434 ifindex = if_nametoindex(intf);
4435 if (ifindex == 0) {
4436 sigma_dut_print(dut, DUT_MSG_ERROR,
4437 "%s: Index for interface %s failed",
4438 __func__, intf);
4439 return -1;
4440 }
4441
4442 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4443 NL80211_CMD_VENDOR)) ||
4444 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4445 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4446 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4447 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4448 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4449 nla_put_u8(msg,
4450 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_SEND_ADDBA_REQ,
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004451 enable)) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004452 sigma_dut_print(dut, DUT_MSG_ERROR,
4453 "%s: err in adding vendor_cmd and vendor_data",
4454 __func__);
4455 nlmsg_free(msg);
4456 return -1;
4457 }
4458 nla_nest_end(msg, params);
4459
4460 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4461 if (ret) {
4462 sigma_dut_print(dut, DUT_MSG_ERROR,
4463 "%s: err in send_and_recv_msgs, ret=%d",
4464 __func__, ret);
4465 }
4466 return ret;
4467#else /* NL80211_SUPPORT */
4468 sigma_dut_print(dut, DUT_MSG_ERROR,
4469 "Disable addba not possible without NL80211_SUPPORT defined");
4470 return -1;
4471#endif /* NL80211_SUPPORT */
4472}
4473
4474
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004475static int cmd_sta_set_wireless_common(const char *intf, struct sigma_dut *dut,
4476 struct sigma_conn *conn,
4477 struct sigma_cmd *cmd)
4478{
4479 const char *val;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004480 int ampdu = -1, addbareject = -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004481 char buf[30];
4482
4483 val = get_param(cmd, "40_INTOLERANT");
4484 if (val) {
4485 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4486 /* TODO: iwpriv ht40intol through wpa_supplicant */
4487 send_resp(dut, conn, SIGMA_ERROR,
4488 "ErrorCode,40_INTOLERANT not supported");
4489 return 0;
4490 }
4491 }
4492
4493 val = get_param(cmd, "ADDBA_REJECT");
4494 if (val) {
4495 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4496 /* reject any ADDBA with status "decline" */
4497 ampdu = 0;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004498 addbareject = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004499 } else {
4500 /* accept ADDBA */
4501 ampdu = 1;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004502 addbareject = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004503 }
4504 }
4505
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004506 if (addbareject >= 0 &&
4507 sta_set_addba_reject(dut, intf, addbareject) < 0) {
4508 send_resp(dut, conn, SIGMA_ERROR,
4509 "ErrorCode,set addba_reject failed");
4510 return 0;
4511 }
4512
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004513 val = get_param(cmd, "AMPDU");
4514 if (val) {
4515 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4516 /* enable AMPDU Aggregation */
4517 if (ampdu == 0) {
4518 send_resp(dut, conn, SIGMA_ERROR,
4519 "ErrorCode,Mismatch in "
4520 "addba_reject/ampdu - "
4521 "not supported");
4522 return 0;
4523 }
4524 ampdu = 1;
4525 } else {
4526 /* disable AMPDU Aggregation */
4527 if (ampdu == 1) {
4528 send_resp(dut, conn, SIGMA_ERROR,
4529 "ErrorCode,Mismatch in "
4530 "addba_reject/ampdu - "
4531 "not supported");
4532 return 0;
4533 }
4534 ampdu = 0;
4535 }
4536 }
4537
4538 if (ampdu >= 0) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004539 int ret;
4540
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004541 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s A-MPDU aggregation",
4542 ampdu ? "Enabling" : "Disabling");
4543 snprintf(buf, sizeof(buf), "SET ampdu %d", ampdu);
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07004544 if (wpa_command(intf, buf) < 0 &&
4545 iwpriv_sta_set_ampdu(dut, intf, ampdu) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004546 send_resp(dut, conn, SIGMA_ERROR,
4547 "ErrorCode,set aggr failed");
4548 return 0;
4549 }
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004550
4551 if (ampdu == 0) {
4552 /* Disable sending of addba using nl vendor command */
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004553 ret = nlvendor_config_send_addba(dut, intf, 0);
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004554 if (ret) {
4555 sigma_dut_print(dut, DUT_MSG_ERROR,
4556 "Failed to disable addba, ret:%d",
4557 ret);
4558 }
4559 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004560 }
4561
4562 val = get_param(cmd, "AMSDU");
4563 if (val) {
4564 switch (get_driver_type()) {
4565 case DRIVER_ATHEROS:
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08004566 case DRIVER_WCN:
4567 iwpriv_sta_set_amsdu(dut, intf, val);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004568 break;
4569 default:
4570 if (strcmp(val, "1") == 0 ||
4571 strcasecmp(val, "Enable") == 0) {
4572 /* Enable AMSDU Aggregation */
4573 send_resp(dut, conn, SIGMA_ERROR,
4574 "ErrorCode,AMSDU aggregation not supported");
4575 return 0;
4576 }
4577 break;
4578 }
4579 }
4580
4581 val = get_param(cmd, "STBC_RX");
4582 if (val) {
4583 switch (get_driver_type()) {
4584 case DRIVER_ATHEROS:
4585 ath_sta_set_stbc(dut, intf, val);
4586 break;
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05304587 case DRIVER_WCN:
4588 wcn_sta_set_stbc(dut, intf, val);
4589 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004590 default:
4591 send_resp(dut, conn, SIGMA_ERROR,
4592 "ErrorCode,STBC_RX not supported");
4593 return 0;
4594 }
4595 }
4596
4597 val = get_param(cmd, "WIDTH");
4598 if (val) {
4599 switch (get_driver_type()) {
4600 case DRIVER_WCN:
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004601 if (wcn_sta_set_width(dut, intf, val) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004602 send_resp(dut, conn, SIGMA_ERROR,
4603 "ErrorCode,Failed to set WIDTH");
4604 return 0;
4605 }
4606 break;
4607 case DRIVER_ATHEROS:
4608 if (ath_set_width(dut, conn, intf, val) < 0)
4609 return 0;
4610 break;
4611 default:
4612 sigma_dut_print(dut, DUT_MSG_ERROR,
4613 "Setting WIDTH not supported");
4614 break;
4615 }
4616 }
4617
4618 val = get_param(cmd, "SMPS");
4619 if (val) {
4620 /* TODO: Dynamic/0, Static/1, No Limit/2 */
4621 send_resp(dut, conn, SIGMA_ERROR,
4622 "ErrorCode,SMPS not supported");
4623 return 0;
4624 }
4625
4626 val = get_param(cmd, "TXSP_STREAM");
4627 if (val) {
4628 switch (get_driver_type()) {
4629 case DRIVER_WCN:
4630 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4631 send_resp(dut, conn, SIGMA_ERROR,
4632 "ErrorCode,Failed to set TXSP_STREAM");
4633 return 0;
4634 }
4635 break;
4636 case DRIVER_ATHEROS:
4637 ath_sta_set_txsp_stream(dut, intf, val);
4638 break;
4639 default:
4640 sigma_dut_print(dut, DUT_MSG_ERROR,
4641 "Setting TXSP_STREAM not supported");
4642 break;
4643 }
4644 }
4645
4646 val = get_param(cmd, "RXSP_STREAM");
4647 if (val) {
4648 switch (get_driver_type()) {
4649 case DRIVER_WCN:
4650 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4651 send_resp(dut, conn, SIGMA_ERROR,
4652 "ErrorCode,Failed to set RXSP_STREAM");
4653 return 0;
4654 }
4655 break;
4656 case DRIVER_ATHEROS:
4657 ath_sta_set_rxsp_stream(dut, intf, val);
4658 break;
4659 default:
4660 sigma_dut_print(dut, DUT_MSG_ERROR,
4661 "Setting RXSP_STREAM not supported");
4662 break;
4663 }
4664 }
4665
4666 val = get_param(cmd, "DYN_BW_SGNL");
4667 if (val) {
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004668 switch (get_driver_type()) {
4669 case DRIVER_WCN:
Peng Xuc59afd32016-11-21 15:01:11 -08004670 if (strcasecmp(val, "enable") == 0) {
4671 snprintf(buf, sizeof(buf),
4672 "iwpriv %s cwmenable 1", intf);
4673 if (system(buf) != 0) {
4674 sigma_dut_print(dut, DUT_MSG_ERROR,
4675 "iwpriv cwmenable 1 failed");
4676 return 0;
4677 }
4678 } else if (strcasecmp(val, "disable") == 0) {
4679 snprintf(buf, sizeof(buf),
4680 "iwpriv %s cwmenable 0", intf);
4681 if (system(buf) != 0) {
4682 sigma_dut_print(dut, DUT_MSG_ERROR,
4683 "iwpriv cwmenable 0 failed");
4684 return 0;
4685 }
4686 } else {
4687 sigma_dut_print(dut, DUT_MSG_ERROR,
4688 "Unsupported DYN_BW_SGL");
4689 }
4690
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004691 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
4692 if (system(buf) != 0) {
4693 sigma_dut_print(dut, DUT_MSG_ERROR,
4694 "Failed to set cts_cbw in DYN_BW_SGNL");
4695 return 0;
4696 }
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004697 break;
4698 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004699 novap_reset(dut, intf);
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004700 ath_config_dyn_bw_sig(dut, intf, val);
4701 break;
4702 default:
4703 sigma_dut_print(dut, DUT_MSG_ERROR,
4704 "Failed to set DYN_BW_SGNL");
4705 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004706 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004707 }
4708
4709 val = get_param(cmd, "RTS_FORCE");
4710 if (val) {
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004711 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004712 if (strcasecmp(val, "Enable") == 0) {
4713 snprintf(buf, sizeof(buf), "iwconfig %s rts 64", intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004714 if (system(buf) != 0) {
4715 sigma_dut_print(dut, DUT_MSG_ERROR,
4716 "Failed to set RTS_FORCE 64");
4717 }
priyadharshini gowthaman270870e2015-12-09 10:10:23 -08004718 snprintf(buf, sizeof(buf),
4719 "wifitool %s beeliner_fw_test 100 1", intf);
4720 if (system(buf) != 0) {
4721 sigma_dut_print(dut, DUT_MSG_ERROR,
4722 "wifitool beeliner_fw_test 100 1 failed");
4723 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004724 } else if (strcasecmp(val, "Disable") == 0) {
4725 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347",
4726 intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004727 if (system(buf) != 0) {
4728 sigma_dut_print(dut, DUT_MSG_ERROR,
4729 "Failed to set RTS_FORCE 2347");
4730 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004731 } else {
4732 send_resp(dut, conn, SIGMA_ERROR,
4733 "ErrorCode,RTS_FORCE value not supported");
4734 return 0;
4735 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004736 }
4737
4738 val = get_param(cmd, "CTS_WIDTH");
4739 if (val) {
4740 switch (get_driver_type()) {
4741 case DRIVER_WCN:
4742 if (wcn_sta_set_cts_width(dut, intf, val) < 0) {
4743 send_resp(dut, conn, SIGMA_ERROR,
4744 "ErrorCode,Failed to set CTS_WIDTH");
4745 return 0;
4746 }
4747 break;
4748 case DRIVER_ATHEROS:
4749 ath_set_cts_width(dut, intf, val);
4750 break;
4751 default:
4752 sigma_dut_print(dut, DUT_MSG_ERROR,
4753 "Setting CTS_WIDTH not supported");
4754 break;
4755 }
4756 }
4757
4758 val = get_param(cmd, "BW_SGNL");
4759 if (val) {
4760 if (strcasecmp(val, "Enable") == 0) {
4761 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1",
4762 intf);
4763 } else if (strcasecmp(val, "Disable") == 0) {
4764 /* TODO: Disable */
4765 buf[0] = '\0';
4766 } else {
4767 send_resp(dut, conn, SIGMA_ERROR,
4768 "ErrorCode,BW_SGNL value not supported");
4769 return 0;
4770 }
4771
4772 if (buf[0] != '\0' && system(buf) != 0) {
4773 sigma_dut_print(dut, DUT_MSG_ERROR,
4774 "Failed to set BW_SGNL");
4775 }
4776 }
4777
4778 val = get_param(cmd, "Band");
4779 if (val) {
4780 if (strcmp(val, "2.4") == 0 || strcmp(val, "5") == 0) {
4781 /* STA supports all bands by default */
4782 } else {
4783 send_resp(dut, conn, SIGMA_ERROR,
4784 "ErrorCode,Unsupported Band");
4785 return 0;
4786 }
4787 }
4788
4789 val = get_param(cmd, "zero_crc");
4790 if (val) {
4791 switch (get_driver_type()) {
4792 case DRIVER_ATHEROS:
4793 ath_set_zero_crc(dut, val);
4794 break;
4795 default:
4796 break;
4797 }
4798 }
4799
4800 return 1;
4801}
4802
4803
4804static int sta_set_60g_common(struct sigma_dut *dut, struct sigma_conn *conn,
4805 struct sigma_cmd *cmd)
4806{
4807 const char *val;
4808 char buf[100];
4809
4810 val = get_param(cmd, "MSDUSize");
4811 if (val) {
4812 int mtu;
4813
4814 dut->amsdu_size = atoi(val);
4815 if (dut->amsdu_size > IEEE80211_MAX_DATA_LEN_DMG ||
4816 dut->amsdu_size < IEEE80211_SNAP_LEN_DMG) {
4817 sigma_dut_print(dut, DUT_MSG_ERROR,
4818 "MSDUSize %d is above max %d or below min %d",
4819 dut->amsdu_size,
4820 IEEE80211_MAX_DATA_LEN_DMG,
4821 IEEE80211_SNAP_LEN_DMG);
4822 dut->amsdu_size = 0;
4823 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4824 }
4825
4826 mtu = dut->amsdu_size - IEEE80211_SNAP_LEN_DMG;
4827 sigma_dut_print(dut, DUT_MSG_DEBUG,
4828 "Setting amsdu_size to %d", mtu);
4829 snprintf(buf, sizeof(buf), "ifconfig %s mtu %d",
4830 get_station_ifname(), mtu);
4831
4832 if (system(buf) != 0) {
4833 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set %s",
4834 buf);
4835 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4836 }
4837 }
4838
4839 val = get_param(cmd, "BAckRcvBuf");
4840 if (val) {
4841 dut->back_rcv_buf = atoi(val);
4842 if (dut->back_rcv_buf == 0) {
4843 sigma_dut_print(dut, DUT_MSG_ERROR,
4844 "Failed to convert %s or value is 0",
4845 val);
4846 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4847 }
4848
4849 sigma_dut_print(dut, DUT_MSG_DEBUG,
4850 "Setting BAckRcvBuf to %s", val);
4851 }
4852
4853 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4854}
4855
4856
4857static int sta_pcp_start(struct sigma_dut *dut, struct sigma_conn *conn,
4858 struct sigma_cmd *cmd)
4859{
4860 int net_id;
4861 char *ifname;
4862 const char *val;
4863 char buf[100];
4864
4865 dut->mode = SIGMA_MODE_STATION;
4866 ifname = get_main_ifname();
4867 if (wpa_command(ifname, "PING") != 0) {
4868 sigma_dut_print(dut, DUT_MSG_ERROR, "Supplicant not running");
4869 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4870 }
4871
4872 wpa_command(ifname, "FLUSH");
4873 net_id = add_network_common(dut, conn, ifname, cmd);
4874 if (net_id < 0) {
4875 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add network");
4876 return net_id;
4877 }
4878
4879 /* TODO: mode=2 for the AP; in the future, replace for mode PCP */
4880 if (set_network(ifname, net_id, "mode", "2") < 0) {
4881 sigma_dut_print(dut, DUT_MSG_ERROR,
4882 "Failed to set supplicant network mode");
4883 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4884 }
4885
4886 sigma_dut_print(dut, DUT_MSG_DEBUG,
4887 "Supplicant set network with mode 2");
4888
4889 val = get_param(cmd, "Security");
4890 if (val && strcasecmp(val, "OPEN") == 0) {
4891 dut->ap_key_mgmt = AP_OPEN;
4892 if (set_network(ifname, net_id, "key_mgmt", "NONE") < 0) {
4893 sigma_dut_print(dut, DUT_MSG_ERROR,
4894 "Failed to set supplicant to %s security",
4895 val);
4896 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4897 }
4898 } else if (val && strcasecmp(val, "WPA2-PSK") == 0) {
4899 dut->ap_key_mgmt = AP_WPA2_PSK;
4900 if (set_network(ifname, net_id, "key_mgmt", "WPA-PSK") < 0) {
4901 sigma_dut_print(dut, DUT_MSG_ERROR,
4902 "Failed to set supplicant to %s security",
4903 val);
4904 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4905 }
4906
4907 if (set_network(ifname, net_id, "proto", "RSN") < 0) {
4908 sigma_dut_print(dut, DUT_MSG_ERROR,
4909 "Failed to set supplicant to proto RSN");
4910 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4911 }
4912 } else if (val) {
4913 sigma_dut_print(dut, DUT_MSG_ERROR,
4914 "Requested Security %s is not supported on 60GHz",
4915 val);
4916 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4917 }
4918
4919 val = get_param(cmd, "Encrypt");
4920 if (val && strcasecmp(val, "AES-GCMP") == 0) {
4921 if (set_network(ifname, net_id, "pairwise", "GCMP") < 0) {
4922 sigma_dut_print(dut, DUT_MSG_ERROR,
4923 "Failed to set supplicant to pairwise GCMP");
4924 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4925 }
4926 if (set_network(ifname, net_id, "group", "GCMP") < 0) {
4927 sigma_dut_print(dut, DUT_MSG_ERROR,
4928 "Failed to set supplicant to group GCMP");
4929 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4930 }
4931 } else if (val) {
4932 sigma_dut_print(dut, DUT_MSG_ERROR,
4933 "Requested Encrypt %s is not supported on 60 GHz",
4934 val);
4935 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4936 }
4937
4938 val = get_param(cmd, "PSK");
4939 if (val && set_network_quoted(ifname, net_id, "psk", val) < 0) {
4940 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set psk %s",
4941 val);
4942 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4943 }
4944
4945 /* Convert 60G channel to freq */
4946 switch (dut->ap_channel) {
4947 case 1:
4948 val = "58320";
4949 break;
4950 case 2:
4951 val = "60480";
4952 break;
4953 case 3:
4954 val = "62640";
4955 break;
4956 default:
4957 sigma_dut_print(dut, DUT_MSG_ERROR,
4958 "Failed to configure channel %d. Not supported",
4959 dut->ap_channel);
4960 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4961 }
4962
4963 if (set_network(ifname, net_id, "frequency", val) < 0) {
4964 sigma_dut_print(dut, DUT_MSG_ERROR,
4965 "Failed to set supplicant network frequency");
4966 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4967 }
4968
4969 sigma_dut_print(dut, DUT_MSG_DEBUG,
4970 "Supplicant set network with frequency");
4971
4972 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d", net_id);
4973 if (wpa_command(ifname, buf) < 0) {
4974 sigma_dut_print(dut, DUT_MSG_INFO,
4975 "Failed to select network id %d on %s",
4976 net_id, ifname);
4977 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4978 }
4979
4980 sigma_dut_print(dut, DUT_MSG_DEBUG, "Selected network");
4981
4982 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4983}
4984
4985
Lior David67543f52017-01-03 19:04:22 +02004986static int wil6210_set_abft_len(struct sigma_dut *dut, int abft_len)
4987{
4988 char buf[128], fname[128];
4989 FILE *f;
4990
4991 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
4992 sigma_dut_print(dut, DUT_MSG_ERROR,
4993 "failed to get wil6210 debugfs dir");
4994 return -1;
4995 }
4996
4997 snprintf(fname, sizeof(fname), "%s/abft_len", buf);
4998 f = fopen(fname, "w");
4999 if (!f) {
5000 sigma_dut_print(dut, DUT_MSG_ERROR,
5001 "failed to open: %s", fname);
5002 return -1;
5003 }
5004
5005 fprintf(f, "%d\n", abft_len);
5006 fclose(f);
5007
5008 return 0;
5009}
5010
5011
5012static int sta_set_60g_abft_len(struct sigma_dut *dut, struct sigma_conn *conn,
5013 int abft_len)
5014{
5015 switch (get_driver_type()) {
5016 case DRIVER_WIL6210:
5017 return wil6210_set_abft_len(dut, abft_len);
5018 default:
5019 sigma_dut_print(dut, DUT_MSG_ERROR,
5020 "set abft_len not supported");
5021 return -1;
5022 }
5023}
5024
5025
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005026static int sta_set_60g_pcp(struct sigma_dut *dut, struct sigma_conn *conn,
5027 struct sigma_cmd *cmd)
5028{
5029 const char *val;
Lior David67543f52017-01-03 19:04:22 +02005030 unsigned int abft_len = 1; /* default is one slot */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005031
5032 if (dut->dev_role != DEVROLE_PCP) {
5033 send_resp(dut, conn, SIGMA_INVALID,
5034 "ErrorCode,Invalid DevRole");
5035 return 0;
5036 }
5037
5038 val = get_param(cmd, "SSID");
5039 if (val) {
5040 if (strlen(val) > sizeof(dut->ap_ssid) - 1) {
5041 send_resp(dut, conn, SIGMA_INVALID,
5042 "ErrorCode,Invalid SSID");
5043 return -1;
5044 }
5045
Peng Xub8fc5cc2017-05-10 17:27:28 -07005046 strlcpy(dut->ap_ssid, val, sizeof(dut->ap_ssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005047 }
5048
5049 val = get_param(cmd, "CHANNEL");
5050 if (val) {
5051 const char *pos;
5052
5053 dut->ap_channel = atoi(val);
5054 pos = strchr(val, ';');
5055 if (pos) {
5056 pos++;
5057 dut->ap_channel_1 = atoi(pos);
5058 }
5059 }
5060
5061 switch (dut->ap_channel) {
5062 case 1:
5063 case 2:
5064 case 3:
5065 break;
5066 default:
5067 sigma_dut_print(dut, DUT_MSG_ERROR,
5068 "Channel %d is not supported", dut->ap_channel);
5069 send_resp(dut, conn, SIGMA_ERROR,
5070 "Requested channel is not supported");
5071 return -1;
5072 }
5073
5074 val = get_param(cmd, "BCNINT");
5075 if (val)
5076 dut->ap_bcnint = atoi(val);
5077
5078
5079 val = get_param(cmd, "ExtSchIE");
5080 if (val) {
5081 send_resp(dut, conn, SIGMA_ERROR,
5082 "ErrorCode,ExtSchIE is not supported yet");
5083 return -1;
5084 }
5085
5086 val = get_param(cmd, "AllocType");
5087 if (val) {
5088 send_resp(dut, conn, SIGMA_ERROR,
5089 "ErrorCode,AllocType is not supported yet");
5090 return -1;
5091 }
5092
5093 val = get_param(cmd, "PercentBI");
5094 if (val) {
5095 send_resp(dut, conn, SIGMA_ERROR,
5096 "ErrorCode,PercentBI is not supported yet");
5097 return -1;
5098 }
5099
5100 val = get_param(cmd, "CBAPOnly");
5101 if (val) {
5102 send_resp(dut, conn, SIGMA_ERROR,
5103 "ErrorCode,CBAPOnly is not supported yet");
5104 return -1;
5105 }
5106
5107 val = get_param(cmd, "AMPDU");
5108 if (val) {
5109 if (strcasecmp(val, "Enable") == 0)
5110 dut->ap_ampdu = 1;
5111 else if (strcasecmp(val, "Disable") == 0)
5112 dut->ap_ampdu = 2;
5113 else {
5114 send_resp(dut, conn, SIGMA_ERROR,
5115 "ErrorCode,AMPDU value is not Enable nor Disabled");
5116 return -1;
5117 }
5118 }
5119
5120 val = get_param(cmd, "AMSDU");
5121 if (val) {
5122 if (strcasecmp(val, "Enable") == 0)
5123 dut->ap_amsdu = 1;
5124 else if (strcasecmp(val, "Disable") == 0)
5125 dut->ap_amsdu = 2;
5126 }
5127
5128 val = get_param(cmd, "NumMSDU");
5129 if (val) {
5130 send_resp(dut, conn, SIGMA_ERROR,
5131 "ErrorCode, NumMSDU is not supported yet");
5132 return -1;
5133 }
5134
5135 val = get_param(cmd, "ABFTLRang");
5136 if (val) {
5137 sigma_dut_print(dut, DUT_MSG_DEBUG,
Lior David67543f52017-01-03 19:04:22 +02005138 "ABFTLRang parameter %s", val);
5139 if (strcmp(val, "Gt1") == 0)
5140 abft_len = 2; /* 2 slots in this case */
5141 }
5142
5143 if (sta_set_60g_abft_len(dut, conn, abft_len)) {
5144 send_resp(dut, conn, SIGMA_ERROR,
5145 "ErrorCode, Can't set ABFT length");
5146 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005147 }
5148
5149 if (sta_pcp_start(dut, conn, cmd) < 0) {
5150 send_resp(dut, conn, SIGMA_ERROR,
5151 "ErrorCode, Can't start PCP role");
5152 return -1;
5153 }
5154
5155 return sta_set_60g_common(dut, conn, cmd);
5156}
5157
5158
5159static int sta_set_60g_sta(struct sigma_dut *dut, struct sigma_conn *conn,
5160 struct sigma_cmd *cmd)
5161{
5162 const char *val = get_param(cmd, "DiscoveryMode");
5163
5164 if (dut->dev_role != DEVROLE_STA) {
5165 send_resp(dut, conn, SIGMA_INVALID,
5166 "ErrorCode,Invalid DevRole");
5167 return 0;
5168 }
5169
5170 if (val) {
5171 sigma_dut_print(dut, DUT_MSG_DEBUG, "Discovery: %s", val);
5172 /* Ignore Discovery mode till Driver expose API. */
5173#if 0
5174 if (strcasecmp(val, "1") == 0) {
5175 send_resp(dut, conn, SIGMA_INVALID,
5176 "ErrorCode,DiscoveryMode 1 not supported");
5177 return 0;
5178 }
5179
5180 if (strcasecmp(val, "0") == 0) {
5181 /* OK */
5182 } else {
5183 send_resp(dut, conn, SIGMA_INVALID,
5184 "ErrorCode,DiscoveryMode not supported");
5185 return 0;
5186 }
5187#endif
5188 }
5189
5190 if (start_sta_mode(dut) != 0)
5191 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
5192 return sta_set_60g_common(dut, conn, cmd);
5193}
5194
5195
5196static int cmd_sta_disconnect(struct sigma_dut *dut, struct sigma_conn *conn,
5197 struct sigma_cmd *cmd)
5198{
5199 const char *intf = get_param(cmd, "Interface");
Jouni Malinened77e672018-01-10 16:45:13 +02005200 const char *val = get_param(cmd, "maintain_profile");
vamsi krishnad605c422017-09-20 14:56:31 +05305201
Jouni Malinened77e672018-01-10 16:45:13 +02005202 if (dut->program == PROGRAM_OCE ||
Amarnath Hullur Subramanyamebeda9e2018-01-31 03:21:48 -08005203 dut->program == PROGRAM_HE ||
Jouni Malinened77e672018-01-10 16:45:13 +02005204 (val && atoi(val) == 1)) {
vamsi krishnad605c422017-09-20 14:56:31 +05305205 wpa_command(intf, "DISCONNECT");
5206 return 1;
5207 }
5208
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005209 disconnect_station(dut);
5210 /* Try to ignore old scan results to avoid HS 2.0R2 test case failures
5211 * due to cached results. */
5212 wpa_command(intf, "SET ignore_old_scan_res 1");
5213 wpa_command(intf, "BSS_FLUSH");
5214 return 1;
5215}
5216
5217
5218static int cmd_sta_reassoc(struct sigma_dut *dut, struct sigma_conn *conn,
5219 struct sigma_cmd *cmd)
5220{
5221 const char *intf = get_param(cmd, "Interface");
5222 const char *bssid = get_param(cmd, "bssid");
5223 const char *val = get_param(cmd, "CHANNEL");
5224 struct wpa_ctrl *ctrl;
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305225 char buf[1000];
Sunil Duttd30ce092018-01-11 23:56:29 +05305226 char result[32];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005227 int res;
5228 int chan = 0;
Ashwini Patil467efef2017-05-25 12:18:27 +05305229 int status = 0;
Sunil Duttd30ce092018-01-11 23:56:29 +05305230 int fastreassoc = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005231
5232 if (bssid == NULL) {
5233 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing bssid "
5234 "argument");
5235 return 0;
5236 }
5237
5238 if (val)
5239 chan = atoi(val);
5240
5241 if (wifi_chip_type != DRIVER_WCN && wifi_chip_type != DRIVER_AR6003) {
5242 /* The current network may be from sta_associate or
5243 * sta_hs2_associate
5244 */
5245 if (set_network(intf, dut->infra_network_id, "bssid", bssid) <
5246 0 ||
5247 set_network(intf, 0, "bssid", bssid) < 0)
5248 return -2;
5249 }
5250
5251 ctrl = open_wpa_mon(intf);
5252 if (ctrl == NULL) {
5253 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
5254 "wpa_supplicant monitor connection");
5255 return -1;
5256 }
5257
Sunil Duttd30ce092018-01-11 23:56:29 +05305258 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
5259 sizeof(result)) < 0 ||
5260 strncmp(result, "COMPLETED", 9) != 0) {
5261 sigma_dut_print(dut, DUT_MSG_DEBUG,
5262 "sta_reassoc: Not connected");
5263 fastreassoc = 0;
5264 }
5265
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305266 if (dut->rsne_override) {
5267#ifdef NL80211_SUPPORT
5268 if (get_driver_type() == DRIVER_WCN && dut->config_rsnie == 0) {
5269 sta_config_rsnie(dut, 1);
5270 dut->config_rsnie = 1;
5271 }
5272#endif /* NL80211_SUPPORT */
5273 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
5274 dut->rsne_override);
5275 if (wpa_command(intf, buf) < 0) {
5276 send_resp(dut, conn, SIGMA_ERROR,
5277 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
5278 return 0;
5279 }
5280 }
5281
Sunil Duttd30ce092018-01-11 23:56:29 +05305282 if (wifi_chip_type == DRIVER_WCN && fastreassoc) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005283#ifdef ANDROID
Ashwini Patil4c8158f2017-05-25 12:49:21 +05305284 if (chan) {
5285 unsigned int freq;
5286
5287 freq = channel_to_freq(chan);
5288 if (!freq) {
5289 sigma_dut_print(dut, DUT_MSG_ERROR,
5290 "Invalid channel number provided: %d",
5291 chan);
5292 send_resp(dut, conn, SIGMA_INVALID,
5293 "ErrorCode,Invalid channel number");
5294 goto close_mon_conn;
5295 }
5296 res = snprintf(buf, sizeof(buf),
5297 "SCAN TYPE=ONLY freq=%d", freq);
5298 } else {
5299 res = snprintf(buf, sizeof(buf), "SCAN TYPE=ONLY");
5300 }
5301 if (res < 0 || res >= (int) sizeof(buf)) {
5302 send_resp(dut, conn, SIGMA_ERROR,
5303 "ErrorCode,snprintf failed");
5304 goto close_mon_conn;
5305 }
5306 if (wpa_command(intf, buf) < 0) {
5307 sigma_dut_print(dut, DUT_MSG_INFO,
5308 "Failed to start scan");
5309 send_resp(dut, conn, SIGMA_ERROR,
5310 "ErrorCode,scan failed");
5311 goto close_mon_conn;
5312 }
5313
5314 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
5315 buf, sizeof(buf));
5316 if (res < 0) {
5317 sigma_dut_print(dut, DUT_MSG_INFO,
5318 "Scan did not complete");
5319 send_resp(dut, conn, SIGMA_ERROR,
5320 "ErrorCode,scan did not complete");
5321 goto close_mon_conn;
5322 }
5323
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005324 if (set_network(intf, dut->infra_network_id, "bssid", "any")
5325 < 0) {
5326 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
5327 "bssid to any during FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305328 status = -2;
5329 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005330 }
5331 res = snprintf(buf, sizeof(buf), "DRIVER FASTREASSOC %s %d",
5332 bssid, chan);
5333 if (res > 0 && res < (int) sizeof(buf))
5334 res = wpa_command(intf, buf);
5335
5336 if (res < 0 || res >= (int) sizeof(buf)) {
5337 send_resp(dut, conn, SIGMA_ERROR,
5338 "errorCode,Failed to run DRIVER FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305339 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005340 }
5341#else /* ANDROID */
5342 sigma_dut_print(dut, DUT_MSG_DEBUG,
5343 "Reassoc using iwpriv - skip chan=%d info",
5344 chan);
5345 snprintf(buf, sizeof(buf), "iwpriv %s reassoc", intf);
5346 if (system(buf) != 0) {
5347 sigma_dut_print(dut, DUT_MSG_ERROR, "%s failed", buf);
Ashwini Patil467efef2017-05-25 12:18:27 +05305348 status = -2;
5349 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005350 }
5351#endif /* ANDROID */
5352 sigma_dut_print(dut, DUT_MSG_INFO,
5353 "sta_reassoc: Run %s successful", buf);
5354 } else if (wpa_command(intf, "REASSOCIATE")) {
5355 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
5356 "request reassociation");
Ashwini Patil467efef2017-05-25 12:18:27 +05305357 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005358 }
5359
5360 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
5361 buf, sizeof(buf));
Ashwini Patil467efef2017-05-25 12:18:27 +05305362 if (res < 0) {
5363 sigma_dut_print(dut, DUT_MSG_INFO, "Connection did not complete");
5364 status = -1;
5365 goto close_mon_conn;
5366 }
5367 status = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005368
Ashwini Patil467efef2017-05-25 12:18:27 +05305369close_mon_conn:
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005370 wpa_ctrl_detach(ctrl);
5371 wpa_ctrl_close(ctrl);
Ashwini Patil467efef2017-05-25 12:18:27 +05305372 return status;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005373}
5374
5375
5376static void hs2_clear_credentials(const char *intf)
5377{
5378 wpa_command(intf, "REMOVE_CRED all");
5379}
5380
5381
Lior Davidcc88b562017-01-03 18:52:09 +02005382#ifdef __linux__
5383static int wil6210_get_aid(struct sigma_dut *dut, const char *bssid,
5384 unsigned int *aid)
5385{
Lior David0fe101e2017-03-09 16:09:50 +02005386 const char *pattern = "AID[ \t]+([0-9]+)";
Lior Davidcc88b562017-01-03 18:52:09 +02005387
Lior David0fe101e2017-03-09 16:09:50 +02005388 return wil6210_get_sta_info_field(dut, bssid, pattern, aid);
Lior Davidcc88b562017-01-03 18:52:09 +02005389}
5390#endif /* __linux__ */
5391
5392
5393static int sta_get_aid_60g(struct sigma_dut *dut, const char *bssid,
5394 unsigned int *aid)
5395{
5396 switch (get_driver_type()) {
5397#ifdef __linux__
5398 case DRIVER_WIL6210:
5399 return wil6210_get_aid(dut, bssid, aid);
5400#endif /* __linux__ */
5401 default:
5402 sigma_dut_print(dut, DUT_MSG_ERROR, "get AID not supported");
5403 return -1;
5404 }
5405}
5406
5407
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005408static int sta_get_parameter_60g(struct sigma_dut *dut, struct sigma_conn *conn,
5409 struct sigma_cmd *cmd)
5410{
5411 char buf[MAX_CMD_LEN];
5412 char bss_list[MAX_CMD_LEN];
5413 const char *parameter = get_param(cmd, "Parameter");
5414
5415 if (parameter == NULL)
5416 return -1;
5417
Lior Davidcc88b562017-01-03 18:52:09 +02005418 if (strcasecmp(parameter, "AID") == 0) {
5419 unsigned int aid = 0;
5420 char bssid[20];
5421
5422 if (get_wpa_status(get_station_ifname(), "bssid",
5423 bssid, sizeof(bssid)) < 0) {
5424 sigma_dut_print(dut, DUT_MSG_ERROR,
5425 "could not get bssid");
5426 return -2;
5427 }
5428
5429 if (sta_get_aid_60g(dut, bssid, &aid))
5430 return -2;
5431
5432 snprintf(buf, sizeof(buf), "aid,%d", aid);
5433 sigma_dut_print(dut, DUT_MSG_INFO, "%s", buf);
5434 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5435 return 0;
5436 }
5437
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005438 if (strcasecmp(parameter, "DiscoveredDevList") == 0) {
5439 char *bss_line;
5440 char *bss_id = NULL;
5441 const char *ifname = get_param(cmd, "Interface");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305442 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005443
5444 if (ifname == NULL) {
5445 sigma_dut_print(dut, DUT_MSG_INFO,
5446 "For get DiscoveredDevList need Interface name.");
5447 return -1;
5448 }
5449
5450 /*
5451 * Use "BSS RANGE=ALL MASK=0x2" which provides a list
5452 * of BSSIDs in "bssid=<BSSID>\n"
5453 */
5454 if (wpa_command_resp(ifname, "BSS RANGE=ALL MASK=0x2",
5455 bss_list,
5456 sizeof(bss_list)) < 0) {
5457 sigma_dut_print(dut, DUT_MSG_ERROR,
5458 "Failed to get bss list");
5459 return -1;
5460 }
5461
5462 sigma_dut_print(dut, DUT_MSG_DEBUG,
5463 "bss list for ifname:%s is:%s",
5464 ifname, bss_list);
5465
5466 snprintf(buf, sizeof(buf), "DeviceList");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305467 bss_line = strtok_r(bss_list, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005468 while (bss_line) {
5469 if (sscanf(bss_line, "bssid=%ms", &bss_id) > 0 &&
5470 bss_id) {
5471 int len;
5472
5473 len = snprintf(buf + strlen(buf),
5474 sizeof(buf) - strlen(buf),
5475 ",%s", bss_id);
5476 free(bss_id);
5477 bss_id = NULL;
5478 if (len < 0) {
5479 sigma_dut_print(dut,
5480 DUT_MSG_ERROR,
5481 "Failed to read BSSID");
5482 send_resp(dut, conn, SIGMA_ERROR,
5483 "ErrorCode,Failed to read BSS ID");
5484 return 0;
5485 }
5486
5487 if ((size_t) len >= sizeof(buf) - strlen(buf)) {
5488 sigma_dut_print(dut,
5489 DUT_MSG_ERROR,
5490 "Response buf too small for list");
5491 send_resp(dut, conn,
5492 SIGMA_ERROR,
5493 "ErrorCode,Response buf too small for list");
5494 return 0;
5495 }
5496 }
5497
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305498 bss_line = strtok_r(NULL, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005499 }
5500
5501 sigma_dut_print(dut, DUT_MSG_INFO, "DiscoveredDevList is %s",
5502 buf);
5503 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5504 return 0;
5505 }
5506
5507 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5508 return 0;
5509}
5510
5511
5512static int cmd_sta_get_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
5513 struct sigma_cmd *cmd)
5514{
5515 const char *program = get_param(cmd, "Program");
5516
5517 if (program == NULL)
5518 return -1;
5519
5520 if (strcasecmp(program, "P2PNFC") == 0)
5521 return p2p_cmd_sta_get_parameter(dut, conn, cmd);
5522
5523 if (strcasecmp(program, "60ghz") == 0)
5524 return sta_get_parameter_60g(dut, conn, cmd);
5525
5526#ifdef ANDROID_NAN
5527 if (strcasecmp(program, "NAN") == 0)
Amarnath Hullur Subramanyam1854ec62016-08-11 19:29:35 -07005528 return nan_cmd_sta_get_parameter(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005529#endif /* ANDROID_NAN */
5530
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07005531#ifdef MIRACAST
5532 if (strcasecmp(program, "WFD") == 0 ||
5533 strcasecmp(program, "DisplayR2") == 0)
5534 return miracast_cmd_sta_get_parameter(dut, conn, cmd);
5535#endif /* MIRACAST */
5536
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005537 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5538 return 0;
5539}
5540
5541
5542static void sta_reset_default_ath(struct sigma_dut *dut, const char *intf,
5543 const char *type)
5544{
5545 char buf[100];
5546
5547 if (dut->program == PROGRAM_VHT) {
5548 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
5549 if (system(buf) != 0) {
5550 sigma_dut_print(dut, DUT_MSG_ERROR,
5551 "iwpriv %s chwidth failed", intf);
5552 }
5553
5554 snprintf(buf, sizeof(buf), "iwpriv %s mode 11ACVHT80", intf);
5555 if (system(buf) != 0) {
5556 sigma_dut_print(dut, DUT_MSG_ERROR,
5557 "iwpriv %s mode 11ACVHT80 failed",
5558 intf);
5559 }
5560
5561 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs -1", intf);
5562 if (system(buf) != 0) {
5563 sigma_dut_print(dut, DUT_MSG_ERROR,
5564 "iwpriv %s vhtmcs -1 failed", intf);
5565 }
5566 }
5567
5568 if (dut->program == PROGRAM_HT) {
5569 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
5570 if (system(buf) != 0) {
5571 sigma_dut_print(dut, DUT_MSG_ERROR,
5572 "iwpriv %s chwidth failed", intf);
5573 }
5574
5575 snprintf(buf, sizeof(buf), "iwpriv %s mode 11naht40", intf);
5576 if (system(buf) != 0) {
5577 sigma_dut_print(dut, DUT_MSG_ERROR,
5578 "iwpriv %s mode 11naht40 failed",
5579 intf);
5580 }
5581
5582 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0", intf);
5583 if (system(buf) != 0) {
5584 sigma_dut_print(dut, DUT_MSG_ERROR,
5585 "iwpriv set11NRates failed");
5586 }
5587 }
5588
5589 if (dut->program == PROGRAM_VHT || dut->program == PROGRAM_HT) {
5590 snprintf(buf, sizeof(buf), "iwpriv %s powersave 0", intf);
5591 if (system(buf) != 0) {
5592 sigma_dut_print(dut, DUT_MSG_ERROR,
5593 "disabling powersave failed");
5594 }
5595
5596 /* Reset CTS width */
5597 snprintf(buf, sizeof(buf), "wifitool %s beeliner_fw_test 54 0",
5598 intf);
5599 if (system(buf) != 0) {
5600 sigma_dut_print(dut, DUT_MSG_ERROR,
5601 "wifitool %s beeliner_fw_test 54 0 failed",
5602 intf);
5603 }
5604
5605 /* Enable Dynamic Bandwidth signalling by default */
5606 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1", intf);
5607 if (system(buf) != 0) {
5608 sigma_dut_print(dut, DUT_MSG_ERROR,
5609 "iwpriv %s cwmenable 1 failed", intf);
5610 }
5611
5612 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347", intf);
5613 if (system(buf) != 0) {
5614 sigma_dut_print(dut, DUT_MSG_ERROR,
5615 "iwpriv rts failed");
5616 }
5617 }
5618
5619 if (type && strcasecmp(type, "Testbed") == 0) {
5620 dut->testbed_flag_txsp = 1;
5621 dut->testbed_flag_rxsp = 1;
5622 /* STA has to set spatial stream to 2 per Appendix H */
5623 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0xfff0", intf);
5624 if (system(buf) != 0) {
5625 sigma_dut_print(dut, DUT_MSG_ERROR,
5626 "iwpriv vht_mcsmap failed");
5627 }
5628
5629 /* Disable LDPC per Appendix H */
5630 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 0", intf);
5631 if (system(buf) != 0) {
5632 sigma_dut_print(dut, DUT_MSG_ERROR,
5633 "iwpriv %s ldpc 0 failed", intf);
5634 }
5635
5636 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
5637 if (system(buf) != 0) {
5638 sigma_dut_print(dut, DUT_MSG_ERROR,
5639 "iwpriv amsdu failed");
5640 }
5641
5642 /* TODO: Disable STBC 2x1 transmit and receive */
5643 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc 0", intf);
5644 if (system(buf) != 0) {
5645 sigma_dut_print(dut, DUT_MSG_ERROR,
5646 "Disable tx_stbc 0 failed");
5647 }
5648
5649 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc 0", intf);
5650 if (system(buf) != 0) {
5651 sigma_dut_print(dut, DUT_MSG_ERROR,
5652 "Disable rx_stbc 0 failed");
5653 }
5654
5655 /* STA has to disable Short GI per Appendix H */
5656 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 0", intf);
5657 if (system(buf) != 0) {
5658 sigma_dut_print(dut, DUT_MSG_ERROR,
5659 "iwpriv %s shortgi 0 failed", intf);
5660 }
5661 }
5662
5663 if (type && strcasecmp(type, "DUT") == 0) {
5664 snprintf(buf, sizeof(buf), "iwpriv %s nss 3", intf);
5665 if (system(buf) != 0) {
5666 sigma_dut_print(dut, DUT_MSG_ERROR,
5667 "iwpriv %s nss 3 failed", intf);
5668 }
Arif Hussainac6c5112018-05-25 17:34:00 -07005669 dut->sta_nss = 3;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005670
5671 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 1", intf);
5672 if (system(buf) != 0) {
5673 sigma_dut_print(dut, DUT_MSG_ERROR,
5674 "iwpriv %s shortgi 1 failed", intf);
5675 }
5676 }
5677}
5678
5679
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005680#ifdef NL80211_SUPPORT
5681static int sta_set_he_mcs(struct sigma_dut *dut, const char *intf,
5682 enum he_mcs_config mcs)
5683{
5684 struct nl_msg *msg;
5685 int ret = 0;
5686 struct nlattr *params;
5687 int ifindex;
5688
5689 ifindex = if_nametoindex(intf);
5690 if (ifindex == 0) {
5691 sigma_dut_print(dut, DUT_MSG_ERROR,
5692 "%s: Index for interface %s failed",
5693 __func__, intf);
5694 return -1;
5695 }
5696
5697 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5698 NL80211_CMD_VENDOR)) ||
5699 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5700 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5701 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5702 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5703 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5704 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_MCS,
5705 mcs)) {
5706 sigma_dut_print(dut, DUT_MSG_ERROR,
5707 "%s: err in adding vendor_cmd and vendor_data",
5708 __func__);
5709 nlmsg_free(msg);
5710 return -1;
5711 }
5712 nla_nest_end(msg, params);
5713
5714 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5715 if (ret) {
5716 sigma_dut_print(dut, DUT_MSG_ERROR,
5717 "%s: err in send_and_recv_msgs, ret=%d",
5718 __func__, ret);
5719 }
5720 return ret;
5721}
5722#endif /* NL80211_SUPPORT */
5723
5724
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08005725static int sta_set_heconfig_and_wep_tkip(struct sigma_dut *dut,
5726 const char *intf, int enable)
5727{
5728#ifdef NL80211_SUPPORT
5729 struct nl_msg *msg;
5730 int ret = 0;
5731 struct nlattr *params;
5732 int ifindex;
5733
5734 ifindex = if_nametoindex(intf);
5735 if (ifindex == 0) {
5736 sigma_dut_print(dut, DUT_MSG_ERROR,
5737 "%s: Index for interface %s failed",
5738 __func__, intf);
5739 return -1;
5740 }
5741
5742 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5743 NL80211_CMD_VENDOR)) ||
5744 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5745 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5746 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5747 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5748 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5749 nla_put_u8(msg,
5750 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WEP_TKIP_IN_HE,
5751 enable)) {
5752 sigma_dut_print(dut, DUT_MSG_ERROR,
5753 "%s: err in adding vendor_cmd and vendor_data",
5754 __func__);
5755 nlmsg_free(msg);
5756 return -1;
5757 }
5758 nla_nest_end(msg, params);
5759
5760 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5761 if (ret) {
5762 sigma_dut_print(dut, DUT_MSG_ERROR,
5763 "%s: err in send_and_recv_msgs, ret=%d",
5764 __func__, ret);
5765 }
5766 return ret;
5767#else /* NL80211_SUPPORT */
5768 sigma_dut_print(dut, DUT_MSG_ERROR,
5769 "HE config enablement cannot be changed without NL80211_SUPPORT defined");
5770 return -1;
5771#endif /* NL80211_SUPPORT */
5772}
5773
5774
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005775static int sta_set_addba_buf_size(struct sigma_dut *dut,
5776 const char *intf, int bufsize)
5777{
5778#ifdef NL80211_SUPPORT
5779 struct nl_msg *msg;
5780 int ret = 0;
5781 struct nlattr *params;
5782 int ifindex;
5783
5784 ifindex = if_nametoindex(intf);
5785 if (ifindex == 0) {
5786 sigma_dut_print(dut, DUT_MSG_ERROR,
5787 "%s: Index for interface %s failed",
5788 __func__, intf);
5789 return -1;
5790 }
5791
5792 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5793 NL80211_CMD_VENDOR)) ||
5794 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5795 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5796 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5797 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5798 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5799 nla_put_u8(msg,
5800 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
5801 bufsize)) {
5802 sigma_dut_print(dut, DUT_MSG_ERROR,
5803 "%s: err in adding vendor_cmd and vendor_data",
5804 __func__);
5805 nlmsg_free(msg);
5806 return -1;
5807 }
5808 nla_nest_end(msg, params);
5809
5810 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5811 if (ret) {
5812 sigma_dut_print(dut, DUT_MSG_ERROR,
5813 "%s: err in send_and_recv_msgs, ret=%d",
5814 __func__, ret);
5815 }
5816 return ret;
5817#else /* NL80211_SUPPORT */
5818 sigma_dut_print(dut, DUT_MSG_ERROR,
5819 "AddBA bufsize cannot be changed without NL80211_SUPPORT defined");
5820 return -1;
5821#endif /* NL80211_SUPPORT */
5822}
5823
5824
Arif Hussain8d5b27b2018-05-14 14:31:03 -07005825static int sta_set_tx_beamformee(struct sigma_dut *dut, const char *intf,
5826 int enable)
5827{
5828#ifdef NL80211_SUPPORT
5829 struct nl_msg *msg;
5830 int ret = 0;
5831 struct nlattr *params;
5832 int ifindex;
5833
5834 ifindex = if_nametoindex(intf);
5835 if (ifindex == 0) {
5836 sigma_dut_print(dut, DUT_MSG_ERROR,
5837 "%s: Index for interface %s failed",
5838 __func__, intf);
5839 return -1;
5840 }
5841
5842 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5843 NL80211_CMD_VENDOR)) ||
5844 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5845 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5846 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5847 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5848 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5849 nla_put_u8(msg,
5850 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_TX_BEAMFORMEE,
5851 enable)) {
5852 sigma_dut_print(dut, DUT_MSG_ERROR,
5853 "%s: err in adding vendor_cmd and vendor_data",
5854 __func__);
5855 nlmsg_free(msg);
5856 return -1;
5857 }
5858 nla_nest_end(msg, params);
5859
5860 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5861 if (ret) {
5862 sigma_dut_print(dut, DUT_MSG_ERROR,
5863 "%s: err in send_and_recv_msgs, ret=%d",
5864 __func__, ret);
5865 }
5866 return ret;
5867#else /* NL80211_SUPPORT */
5868 sigma_dut_print(dut, DUT_MSG_ERROR,
5869 "tx beamformee cannot be changed without NL80211_SUPPORT defined");
5870 return -1;
5871#endif /* NL80211_SUPPORT */
5872}
5873
5874
Arif Hussain9765f7d2018-07-03 08:28:26 -07005875static int sta_set_beamformee_sts(struct sigma_dut *dut, const char *intf,
5876 int val)
5877{
5878#ifdef NL80211_SUPPORT
5879 struct nl_msg *msg;
5880 int ret = 0;
5881 struct nlattr *params;
5882 int ifindex;
5883
5884 ifindex = if_nametoindex(intf);
5885 if (ifindex == 0) {
5886 sigma_dut_print(dut, DUT_MSG_ERROR,
5887 "%s: Index for interface %s failed, val:%d",
5888 __func__, intf, val);
5889 return -1;
5890 }
5891
5892 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5893 NL80211_CMD_VENDOR)) ||
5894 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5895 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5896 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5897 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5898 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5899 nla_put_u8(msg,
5900 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_TX_BEAMFORMEE_NSTS,
5901 val)) {
5902 sigma_dut_print(dut, DUT_MSG_ERROR,
5903 "%s: err in adding vendor_cmd and vendor_data, val: %d",
5904 __func__, val);
5905 nlmsg_free(msg);
5906 return -1;
5907 }
5908 nla_nest_end(msg, params);
5909
5910 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5911 if (ret) {
5912 sigma_dut_print(dut, DUT_MSG_ERROR,
5913 "%s: err in send_and_recv_msgs, ret=%d, val=%d",
5914 __func__, ret, val);
5915 }
5916 return ret;
5917#else /* NL80211_SUPPORT */
5918 sigma_dut_print(dut, DUT_MSG_ERROR,
5919 "beamformee sts cannot be changed without NL80211_SUPPORT defined");
5920 return -1;
5921#endif /* NL80211_SUPPORT */
5922}
5923
5924
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005925static void sta_reset_default_wcn(struct sigma_dut *dut, const char *intf,
5926 const char *type)
5927{
5928 char buf[60];
5929
5930 if (dut->program == PROGRAM_HE) {
5931 /* resetting phymode to auto in case of HE program */
5932 snprintf(buf, sizeof(buf), "iwpriv %s setphymode 0", intf);
5933 if (system(buf) != 0) {
5934 sigma_dut_print(dut, DUT_MSG_ERROR,
5935 "iwpriv %s setphymode failed", intf);
5936 }
5937
Amarnath Hullur Subramanyam9cecb502018-04-25 13:26:30 -07005938 /* reset the rate to Auto rate */
5939 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0xff",
5940 intf);
5941 if (system(buf) != 0) {
5942 sigma_dut_print(dut, DUT_MSG_ERROR,
5943 "iwpriv %s set_11ax_rate 0xff failed",
5944 intf);
5945 }
5946
Kiran Kumar Lokere86cfe3a2018-06-01 11:55:15 -07005947 /* reset the LDPC setting */
5948 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 1", intf);
5949 if (system(buf) != 0) {
5950 sigma_dut_print(dut, DUT_MSG_ERROR,
5951 "iwpriv %s ldpc 1 failed", intf);
5952 }
5953
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005954 /* remove all network profiles */
5955 remove_wpa_networks(intf);
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005956
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005957 /* Configure ADDBA Req/Rsp buffer size to be 64 */
5958 sta_set_addba_buf_size(dut, intf, 64);
5959
Amarnath Hullur Subramanyam5f32d572018-03-02 00:02:33 -08005960#ifdef NL80211_SUPPORT
5961 /* Disable noackpolicy for all AC */
5962 if (nlvendor_sta_set_noack(dut, intf, 0, QCA_WLAN_AC_ALL)) {
5963 sigma_dut_print(dut, DUT_MSG_ERROR,
5964 "Disable of noackpolicy for all AC failed");
5965 }
5966#endif /* NL80211_SUPPORT */
5967
Amarnath Hullur Subramanyamb1724a52018-03-07 14:31:46 -08005968 /* Enable WMM by default */
5969 if (wcn_sta_set_wmm(dut, intf, "on")) {
5970 sigma_dut_print(dut, DUT_MSG_ERROR,
5971 "Enable of WMM in sta_reset_default_wcn failed");
5972 }
5973
5974 /* Disable ADDBA_REJECT by default */
5975 if (nlvendor_sta_set_addba_reject(dut, intf, 0)) {
5976 sigma_dut_print(dut, DUT_MSG_ERROR,
5977 "Disable of addba_reject in sta_reset_default_wcn failed");
5978 }
5979
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08005980 /* Enable sending of ADDBA by default */
5981 if (nlvendor_config_send_addba(dut, intf, 1)) {
5982 sigma_dut_print(dut, DUT_MSG_ERROR,
5983 "Enable sending of ADDBA in sta_reset_default_wcn failed");
5984 }
5985
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08005986 /* Enable AMPDU by default */
5987 iwpriv_sta_set_ampdu(dut, intf, 1);
5988
Subhani Shaik8e7a3052018-04-24 14:03:00 -07005989#ifdef NL80211_SUPPORT
5990 if (sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_AUTO)) {
5991 sigma_dut_print(dut, DUT_MSG_ERROR,
5992 "Set LTF config to default in sta_reset_default_wcn failed");
5993 }
Arif Hussain9765f7d2018-07-03 08:28:26 -07005994
5995 if (sta_set_beamformee_sts(dut, intf, 0)) {
5996 sigma_dut_print(dut, DUT_MSG_ERROR,
5997 "Failed to set BeamformeeSTS");
5998 }
Subhani Shaik8e7a3052018-04-24 14:03:00 -07005999#endif /* NL80211_SUPPORT */
6000
Arif Hussain8d5b27b2018-05-14 14:31:03 -07006001 if (sta_set_tx_beamformee(dut, intf, 1)) {
6002 sigma_dut_print(dut, DUT_MSG_ERROR,
6003 "Set tx beamformee enable by default in sta_reset_default_wcn failed");
6004 }
6005
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08006006 /* Set nss to 1 and MCS 0-7 in case of testbed */
6007 if (type && strcasecmp(type, "Testbed") == 0) {
6008#ifdef NL80211_SUPPORT
6009 int ret;
6010#endif /* NL80211_SUPPORT */
6011
6012 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
6013 if (system(buf) != 0) {
6014 sigma_dut_print(dut, DUT_MSG_ERROR,
6015 "iwpriv %s nss failed", intf);
6016 }
6017
6018#ifdef NL80211_SUPPORT
6019 ret = sta_set_he_mcs(dut, intf, HE_80_MCS0_7);
6020 if (ret) {
6021 sigma_dut_print(dut, DUT_MSG_ERROR,
6022 "Setting of MCS failed, ret:%d",
6023 ret);
6024 }
6025#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyamc67621d2018-02-04 23:18:01 -08006026
6027 /* Disable STBC as default */
6028 wcn_sta_set_stbc(dut, intf, "0");
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08006029
6030 /* Disable AMSDU as default */
6031 iwpriv_sta_set_amsdu(dut, intf, "0");
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08006032
6033#ifdef NL80211_SUPPORT
6034 /* HE fragmentation default off */
6035 if (sta_set_he_fragmentation(dut, intf,
6036 HE_FRAG_DISABLE)) {
6037 sigma_dut_print(dut, DUT_MSG_ERROR,
6038 "Setting of HE fragmentation failed");
6039 }
6040#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08006041
6042 /* Enable WEP/TKIP with HE capability in testbed */
6043 if (sta_set_heconfig_and_wep_tkip(dut, intf, 1)) {
6044 sigma_dut_print(dut, DUT_MSG_ERROR,
6045 "Enabling HE config with WEP/TKIP failed");
6046 }
Arif Hussain8d5b27b2018-05-14 14:31:03 -07006047
6048 if (sta_set_tx_beamformee(dut, intf, 0)) {
6049 sigma_dut_print(dut, DUT_MSG_ERROR,
6050 "Set tx beamformee disable by default for testbed in sta_reset_default_wcn failed");
6051 }
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08006052 }
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006053
6054 /* Defaults in case of DUT */
6055 if (type && strcasecmp(type, "DUT") == 0) {
Arif Hussaind48fcc72018-05-01 18:34:18 -07006056 /* Enable STBC by default */
6057 wcn_sta_set_stbc(dut, intf, "1");
6058
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006059 /* set nss to 2 */
6060 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
6061 if (system(buf) != 0) {
6062 sigma_dut_print(dut, DUT_MSG_ERROR,
6063 "iwpriv %s nss 2 failed", intf);
6064 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006065 dut->sta_nss = 2;
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006066
6067#ifdef NL80211_SUPPORT
Arif Hussainae239842018-05-01 18:20:05 -07006068 /* Set HE_MCS to 0-11 */
6069 if (sta_set_he_mcs(dut, intf, HE_80_MCS0_11)) {
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006070 sigma_dut_print(dut, DUT_MSG_ERROR,
6071 "Setting of MCS failed");
6072 }
6073#endif /* NL80211_SUPPORT */
6074
6075 /* Disable WEP/TKIP with HE capability in DUT */
6076 if (sta_set_heconfig_and_wep_tkip(dut, intf, 0)) {
6077 sigma_dut_print(dut, DUT_MSG_ERROR,
6078 "Enabling HE config with WEP/TKIP failed");
6079 }
6080 }
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006081 }
6082}
6083
6084
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006085static int cmd_sta_reset_default(struct sigma_dut *dut,
6086 struct sigma_conn *conn,
6087 struct sigma_cmd *cmd)
6088{
6089 int cmd_sta_p2p_reset(struct sigma_dut *dut, struct sigma_conn *conn,
6090 struct sigma_cmd *cmd);
6091 const char *intf = get_param(cmd, "Interface");
6092 const char *type;
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006093 const char *program = get_param(cmd, "program");
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306094 const char *dev_role = get_param(cmd, "DevRole");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006095
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006096 if (!program)
6097 program = get_param(cmd, "prog");
6098 dut->program = sigma_program_to_enum(program);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006099 dut->device_type = STA_unknown;
6100 type = get_param(cmd, "type");
6101 if (type && strcasecmp(type, "Testbed") == 0)
6102 dut->device_type = STA_testbed;
6103 if (type && strcasecmp(type, "DUT") == 0)
6104 dut->device_type = STA_dut;
6105
6106 if (dut->program == PROGRAM_TDLS) {
6107 /* Clear TDLS testing mode */
6108 wpa_command(intf, "SET tdls_disabled 0");
6109 wpa_command(intf, "SET tdls_testing 0");
6110 dut->no_tpk_expiration = 0;
Pradeep Reddy POTTETI8ce2a232016-10-28 12:17:32 +05306111 if (get_driver_type() == DRIVER_WCN) {
6112 /* Enable the WCN driver in TDLS Explicit trigger mode
6113 */
6114 wpa_command(intf, "SET tdls_external_control 0");
6115 wpa_command(intf, "SET tdls_trigger_control 0");
6116 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006117 }
6118
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006119#ifdef MIRACAST
6120 if (dut->program == PROGRAM_WFD ||
6121 dut->program == PROGRAM_DISPLAYR2)
6122 miracast_sta_reset_default(dut, conn, cmd);
6123#endif /* MIRACAST */
6124
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006125 switch (get_driver_type()) {
6126 case DRIVER_ATHEROS:
6127 sta_reset_default_ath(dut, intf, type);
6128 break;
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006129 case DRIVER_WCN:
6130 sta_reset_default_wcn(dut, intf, type);
6131 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006132 default:
6133 break;
6134 }
6135
6136#ifdef ANDROID_NAN
6137 if (dut->program == PROGRAM_NAN)
6138 nan_cmd_sta_reset_default(dut, conn, cmd);
6139#endif /* ANDROID_NAN */
6140
Jouni Malinenba630452018-06-22 11:49:59 +03006141 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006142 unlink("SP/wi-fi.org/pps.xml");
6143 if (system("rm -r SP/*") != 0) {
6144 }
6145 unlink("next-client-cert.pem");
6146 unlink("next-client-key.pem");
6147 }
6148
6149 if (dut->program == PROGRAM_60GHZ) {
6150 const char *dev_role = get_param(cmd, "DevRole");
6151
6152 if (!dev_role) {
6153 send_resp(dut, conn, SIGMA_ERROR,
6154 "errorCode,Missing DevRole argument");
6155 return 0;
6156 }
6157
6158 if (strcasecmp(dev_role, "STA") == 0)
6159 dut->dev_role = DEVROLE_STA;
6160 else if (strcasecmp(dev_role, "PCP") == 0)
6161 dut->dev_role = DEVROLE_PCP;
6162 else {
6163 send_resp(dut, conn, SIGMA_ERROR,
6164 "errorCode,Unknown DevRole");
6165 return 0;
6166 }
6167
6168 if (dut->device_type == STA_unknown) {
6169 sigma_dut_print(dut, DUT_MSG_ERROR,
6170 "Device type is not STA testbed or DUT");
6171 send_resp(dut, conn, SIGMA_ERROR,
6172 "errorCode,Unknown device type");
6173 return 0;
6174 }
6175 }
6176
6177 wpa_command(intf, "WPS_ER_STOP");
6178 wpa_command(intf, "FLUSH");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05306179 wpa_command(intf, "ERP_FLUSH");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006180 wpa_command(intf, "SET radio_disabled 0");
6181
6182 if (dut->tmp_mac_addr && dut->set_macaddr) {
6183 dut->tmp_mac_addr = 0;
6184 if (system(dut->set_macaddr) != 0) {
6185 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to clear "
6186 "temporary MAC address");
6187 }
6188 }
6189
6190 set_ps(intf, dut, 0);
6191
Jouni Malinenba630452018-06-22 11:49:59 +03006192 if (dut->program == PROGRAM_HS2 || dut->program == PROGRAM_HS2_R2 ||
6193 dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006194 wpa_command(intf, "SET interworking 1");
6195 wpa_command(intf, "SET hs20 1");
6196 }
6197
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006198 if (dut->program == PROGRAM_HS2_R2 ||
Jouni Malinenba630452018-06-22 11:49:59 +03006199 dut->program == PROGRAM_HS2_R3 ||
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006200 dut->program == PROGRAM_OCE) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006201 wpa_command(intf, "SET pmf 1");
6202 } else {
6203 wpa_command(intf, "SET pmf 0");
6204 }
6205
6206 hs2_clear_credentials(intf);
6207 wpa_command(intf, "SET hessid 00:00:00:00:00:00");
6208 wpa_command(intf, "SET access_network_type 15");
6209
6210 static_ip_file(0, NULL, NULL, NULL);
6211 kill_dhcp_client(dut, intf);
6212 clear_ip_addr(dut, intf);
6213
6214 dut->er_oper_performed = 0;
6215 dut->er_oper_bssid[0] = '\0';
6216
priyadharshini gowthamanad6cbba2016-10-04 10:39:58 -07006217 if (dut->program == PROGRAM_LOC) {
6218 /* Disable Interworking by default */
6219 wpa_command(get_station_ifname(), "SET interworking 0");
6220 }
6221
Ashwini Patil00402582017-04-13 12:29:39 +05306222 if (dut->program == PROGRAM_MBO) {
6223 free(dut->non_pref_ch_list);
6224 dut->non_pref_ch_list = NULL;
Ashwini Patil5acd7382017-04-13 15:55:04 +05306225 free(dut->btm_query_cand_list);
6226 dut->btm_query_cand_list = NULL;
Ashwini Patilc63161e2017-04-13 16:30:23 +05306227 wpa_command(intf, "SET reject_btm_req_reason 0");
Ashwini Patila75de5a2017-04-13 16:35:05 +05306228 wpa_command(intf, "SET ignore_assoc_disallow 0");
Ashwini Patild174f2c2017-04-13 16:49:46 +05306229 wpa_command(intf, "SET gas_address3 0");
Ashwini Patil9183fdb2017-04-13 16:58:25 +05306230 wpa_command(intf, "SET roaming 1");
Ashwini Patil00402582017-04-13 12:29:39 +05306231 }
6232
Jouni Malinen3c367e82017-06-23 17:01:47 +03006233 free(dut->rsne_override);
6234 dut->rsne_override = NULL;
6235
Jouni Malinen68143132017-09-02 02:34:08 +03006236 free(dut->sae_commit_override);
6237 dut->sae_commit_override = NULL;
6238
Jouni Malinend86e5822017-08-29 03:55:32 +03006239 dut->dpp_conf_id = -1;
Jouni Malinenb1dd21f2017-11-13 19:14:29 +02006240 free(dut->dpp_peer_uri);
6241 dut->dpp_peer_uri = NULL;
Jouni Malinen63d50412017-11-24 11:55:38 +02006242 dut->dpp_local_bootstrap = -1;
Jouni Malinen5011fb52017-12-05 21:00:15 +02006243 wpa_command(intf, "SET dpp_config_processing 2");
Jouni Malinend86e5822017-08-29 03:55:32 +03006244
Jouni Malinenfac9cad2017-10-10 18:35:55 +03006245 wpa_command(intf, "VENDOR_ELEM_REMOVE 13 *");
6246
vamsi krishnaa2799492017-12-05 14:28:01 +05306247 if (dut->program == PROGRAM_OCE) {
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306248 wpa_command(intf, "SET oce 1");
vamsi krishnaa2799492017-12-05 14:28:01 +05306249 wpa_command(intf, "SET disable_fils 0");
Ankita Bajaj1bde7942018-01-09 19:15:01 +05306250 wpa_command(intf, "FILS_HLP_REQ_FLUSH");
6251 dut->fils_hlp = 0;
6252#ifdef ANDROID
6253 hlp_thread_cleanup(dut);
6254#endif /* ANDROID */
vamsi krishnaa2799492017-12-05 14:28:01 +05306255 }
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306256
Sunil Dutt076081f2018-02-05 19:45:50 +05306257#ifdef NL80211_SUPPORT
Sunil Dutt44595082018-02-12 19:41:45 +05306258 if (get_driver_type() == DRIVER_WCN &&
6259 dut->config_rsnie == 1) {
6260 dut->config_rsnie = 0;
6261 sta_config_rsnie(dut, 0);
Sunil Dutt076081f2018-02-05 19:45:50 +05306262 }
6263#endif /* NL80211_SUPPORT */
6264
Sunil Duttfebf8a82018-02-09 18:50:13 +05306265 if (dev_role && strcasecmp(dev_role, "STA-CFON") == 0) {
6266 dut->dev_role = DEVROLE_STA_CFON;
6267 return sta_cfon_reset_default(dut, conn, cmd);
6268 }
6269
6270 if (dut->program != PROGRAM_VHT)
6271 return cmd_sta_p2p_reset(dut, conn, cmd);
6272
Priyadharshini Gowthamana7dfd492015-11-09 14:34:08 -08006273 return 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006274}
6275
6276
6277static int cmd_sta_get_events(struct sigma_dut *dut, struct sigma_conn *conn,
6278 struct sigma_cmd *cmd)
6279{
6280 const char *program = get_param(cmd, "Program");
6281
6282 if (program == NULL)
6283 return -1;
6284#ifdef ANDROID_NAN
6285 if (strcasecmp(program, "NAN") == 0)
6286 return nan_cmd_sta_get_events(dut, conn, cmd);
6287#endif /* ANDROID_NAN */
6288 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6289 return 0;
6290}
6291
6292
Jouni Malinen82905202018-04-29 17:20:10 +03006293static int sta_exec_action_url(struct sigma_dut *dut, struct sigma_conn *conn,
6294 struct sigma_cmd *cmd)
6295{
6296 const char *url = get_param(cmd, "url");
6297 const char *method = get_param(cmd, "method");
6298 pid_t pid;
6299 int status;
6300
6301 if (!url || !method)
6302 return -1;
6303
6304 /* TODO: Add support for method,post */
6305 if (strcasecmp(method, "get") != 0) {
6306 send_resp(dut, conn, SIGMA_ERROR,
6307 "ErrorCode,Unsupported method");
6308 return 0;
6309 }
6310
6311 pid = fork();
6312 if (pid < 0) {
6313 perror("fork");
6314 return -1;
6315 }
6316
6317 if (pid == 0) {
6318 char * argv[5] = { "wget", "-O", "/dev/null",
6319 (char *) url, NULL };
6320
6321 execv("/usr/bin/wget", argv);
6322 perror("execv");
6323 exit(0);
6324 return -1;
6325 }
6326
6327 if (waitpid(pid, &status, 0) < 0) {
6328 perror("waitpid");
6329 return -1;
6330 }
6331
6332 if (WIFEXITED(status)) {
6333 const char *errmsg;
6334
6335 if (WEXITSTATUS(status) == 0)
6336 return 1;
6337 sigma_dut_print(dut, DUT_MSG_INFO, "wget exit status %d",
6338 WEXITSTATUS(status));
6339 switch (WEXITSTATUS(status)) {
6340 case 4:
6341 errmsg = "errmsg,Network failure";
6342 break;
6343 case 8:
6344 errmsg = "errmsg,Server issued an error response";
6345 break;
6346 default:
6347 errmsg = "errmsg,Unknown failure from wget";
6348 break;
6349 }
6350 send_resp(dut, conn, SIGMA_ERROR, errmsg);
6351 return 0;
6352 }
6353
6354 send_resp(dut, conn, SIGMA_ERROR, "errmsg,Unknown failure");
6355 return 0;
6356}
6357
6358
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006359static int cmd_sta_exec_action(struct sigma_dut *dut, struct sigma_conn *conn,
6360 struct sigma_cmd *cmd)
6361{
6362 const char *program = get_param(cmd, "Prog");
6363
Jouni Malinen82905202018-04-29 17:20:10 +03006364 if (program && !get_param(cmd, "interface"))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006365 return -1;
6366#ifdef ANDROID_NAN
Jouni Malinen82905202018-04-29 17:20:10 +03006367 if (program && strcasecmp(program, "NAN") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006368 return nan_cmd_sta_exec_action(dut, conn, cmd);
6369#endif /* ANDROID_NAN */
Jouni Malinen82905202018-04-29 17:20:10 +03006370
6371 if (program && strcasecmp(program, "Loc") == 0)
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07006372 return loc_cmd_sta_exec_action(dut, conn, cmd);
Jouni Malinen82905202018-04-29 17:20:10 +03006373
6374 if (get_param(cmd, "url"))
6375 return sta_exec_action_url(dut, conn, cmd);
6376
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006377 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6378 return 0;
6379}
6380
6381
6382static int cmd_sta_set_11n(struct sigma_dut *dut, struct sigma_conn *conn,
6383 struct sigma_cmd *cmd)
6384{
6385 const char *intf = get_param(cmd, "Interface");
6386 const char *val, *mcs32, *rate;
6387
6388 val = get_param(cmd, "GREENFIELD");
6389 if (val) {
6390 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
6391 /* Enable GD */
6392 send_resp(dut, conn, SIGMA_ERROR,
6393 "ErrorCode,GF not supported");
6394 return 0;
6395 }
6396 }
6397
6398 val = get_param(cmd, "SGI20");
6399 if (val) {
6400 switch (get_driver_type()) {
6401 case DRIVER_ATHEROS:
6402 ath_sta_set_sgi(dut, intf, val);
6403 break;
6404 default:
6405 send_resp(dut, conn, SIGMA_ERROR,
6406 "ErrorCode,SGI20 not supported");
6407 return 0;
6408 }
6409 }
6410
6411 mcs32 = get_param(cmd, "MCS32"); /* HT Duplicate Mode Enable/Disable */
6412 rate = get_param(cmd, "MCS_FIXEDRATE"); /* Fixed MCS rate (0..31) */
6413 if (mcs32 && rate) {
6414 /* TODO */
6415 send_resp(dut, conn, SIGMA_ERROR,
6416 "ErrorCode,MCS32,MCS_FIXEDRATE not supported");
6417 return 0;
6418 } else if (mcs32 && !rate) {
6419 /* TODO */
6420 send_resp(dut, conn, SIGMA_ERROR,
6421 "ErrorCode,MCS32 not supported");
6422 return 0;
6423 } else if (!mcs32 && rate) {
6424 switch (get_driver_type()) {
6425 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08006426 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006427 ath_sta_set_11nrates(dut, intf, rate);
6428 break;
6429 default:
6430 send_resp(dut, conn, SIGMA_ERROR,
6431 "ErrorCode,MCS32_FIXEDRATE not supported");
6432 return 0;
6433 }
6434 }
6435
6436 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6437}
6438
6439
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006440static void cmd_set_max_he_mcs(struct sigma_dut *dut, const char *intf,
6441 int mcs_config)
6442{
6443#ifdef NL80211_SUPPORT
6444 int ret;
6445
6446 switch (mcs_config) {
6447 case HE_80_MCS0_7:
6448 case HE_80_MCS0_9:
6449 case HE_80_MCS0_11:
6450 ret = sta_set_he_mcs(dut, intf, mcs_config);
6451 if (ret) {
6452 sigma_dut_print(dut, DUT_MSG_ERROR,
6453 "cmd_set_max_he_mcs: Setting of MCS:%d failed, ret:%d",
6454 mcs_config, ret);
6455 }
6456 break;
6457 default:
6458 sigma_dut_print(dut, DUT_MSG_ERROR,
6459 "cmd_set_max_he_mcs: Invalid mcs %d",
6460 mcs_config);
6461 break;
6462 }
6463#else /* NL80211_SUPPORT */
6464 sigma_dut_print(dut, DUT_MSG_ERROR,
6465 "max HE MCS cannot be changed without NL80211_SUPPORT defined");
6466#endif /* NL80211_SUPPORT */
6467}
6468
6469
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006470static int cmd_sta_set_wireless_vht(struct sigma_dut *dut,
6471 struct sigma_conn *conn,
6472 struct sigma_cmd *cmd)
6473{
6474 const char *intf = get_param(cmd, "Interface");
6475 const char *val;
Arif Hussaina37e9552018-06-20 17:05:59 -07006476 const char *program;
Arif Hussaind13d6952018-07-02 16:23:47 -07006477 char buf[60];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006478 int tkip = -1;
6479 int wep = -1;
6480
Arif Hussaina37e9552018-06-20 17:05:59 -07006481 program = get_param(cmd, "Program");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006482 val = get_param(cmd, "SGI80");
6483 if (val) {
6484 int sgi80;
6485
6486 sgi80 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6487 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi80);
6488 if (system(buf) != 0) {
6489 sigma_dut_print(dut, DUT_MSG_ERROR,
6490 "iwpriv shortgi failed");
6491 }
6492 }
6493
6494 val = get_param(cmd, "TxBF");
6495 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
6496 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfee 1", intf);
6497 if (system(buf) != 0) {
6498 sigma_dut_print(dut, DUT_MSG_ERROR,
6499 "iwpriv vhtsubfee failed");
6500 }
6501 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfer 1", intf);
6502 if (system(buf) != 0) {
6503 sigma_dut_print(dut, DUT_MSG_ERROR,
6504 "iwpriv vhtsubfer failed");
6505 }
6506 }
6507
6508 val = get_param(cmd, "MU_TxBF");
6509 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
6510 switch (get_driver_type()) {
6511 case DRIVER_ATHEROS:
6512 ath_sta_set_txsp_stream(dut, intf, "1SS");
6513 ath_sta_set_rxsp_stream(dut, intf, "1SS");
Sunil Duttae9e5d12018-06-29 11:50:47 +05306514 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfee 1",
6515 intf);
6516 if (system(buf) != 0) {
6517 sigma_dut_print(dut, DUT_MSG_ERROR,
6518 "iwpriv vhtmubfee failed");
6519 }
6520 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfer 1",
6521 intf);
6522 if (system(buf) != 0) {
6523 sigma_dut_print(dut, DUT_MSG_ERROR,
6524 "iwpriv vhtmubfer failed");
6525 }
6526 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006527 case DRIVER_WCN:
6528 if (wcn_sta_set_sp_stream(dut, intf, "1SS") < 0) {
6529 send_resp(dut, conn, SIGMA_ERROR,
6530 "ErrorCode,Failed to set RX/TXSP_STREAM");
6531 return 0;
6532 }
Sunil Duttae9e5d12018-06-29 11:50:47 +05306533 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006534 default:
6535 sigma_dut_print(dut, DUT_MSG_ERROR,
6536 "Setting SP_STREAM not supported");
6537 break;
6538 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006539 }
6540
6541 val = get_param(cmd, "LDPC");
6542 if (val) {
6543 int ldpc;
6544
6545 ldpc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6546 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, ldpc);
6547 if (system(buf) != 0) {
6548 sigma_dut_print(dut, DUT_MSG_ERROR,
6549 "iwpriv ldpc failed");
6550 }
6551 }
6552
Amarnath Hullur Subramanyam7bae60e2018-01-31 03:46:50 -08006553 val = get_param(cmd, "BCC");
6554 if (val) {
6555 int bcc;
6556
6557 bcc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6558 /* use LDPC iwpriv itself to set bcc coding, bcc coding
6559 * is mutually exclusive to bcc */
6560 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, !bcc);
6561 if (system(buf) != 0) {
6562 sigma_dut_print(dut, DUT_MSG_ERROR,
6563 "Enabling/Disabling of BCC failed");
6564 }
6565 }
6566
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006567 val = get_param(cmd, "MaxHE-MCS_1SS_RxMapLTE80");
6568 if (val && dut->sta_nss == 1)
6569 cmd_set_max_he_mcs(dut, intf, atoi(val));
6570
6571 val = get_param(cmd, "MaxHE-MCS_2SS_RxMapLTE80");
6572 if (val && dut->sta_nss == 2)
6573 cmd_set_max_he_mcs(dut, intf, atoi(val));
6574
Arif Hussainac6c5112018-05-25 17:34:00 -07006575 val = get_param(cmd, "MCS_FixedRate");
6576 if (val) {
6577#ifdef NL80211_SUPPORT
6578 int mcs, ratecode = 0;
6579 enum he_mcs_config mcs_config;
6580 int ret;
6581
6582 ratecode = (0x07 & dut->sta_nss) << 5;
6583 mcs = atoi(val);
6584 /* Add the MCS to the ratecode */
6585 if (mcs >= 0 && mcs <= 11) {
6586 ratecode += mcs;
6587 if (dut->device_type == STA_testbed &&
6588 mcs > 7 && mcs <= 11) {
6589 if (mcs <= 9)
6590 mcs_config = HE_80_MCS0_9;
6591 else
6592 mcs_config = HE_80_MCS0_11;
6593 ret = sta_set_he_mcs(dut, intf, mcs_config);
6594 if (ret) {
6595 sigma_dut_print(dut, DUT_MSG_ERROR,
6596 "MCS_FixedRate: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
6597 mcs, mcs_config, ret);
6598 }
6599 }
6600 snprintf(buf, sizeof(buf),
6601 "iwpriv %s set_11ax_rate 0x%03x",
6602 intf, ratecode);
6603 if (system(buf) != 0) {
6604 sigma_dut_print(dut, DUT_MSG_ERROR,
6605 "MCS_FixedRate: iwpriv setting of 11ax rates 0x%03x failed",
6606 ratecode);
6607 }
6608 } else {
6609 sigma_dut_print(dut, DUT_MSG_ERROR,
6610 "MCS_FixedRate: HE MCS %d not supported",
6611 mcs);
6612 }
6613#else /* NL80211_SUPPORT */
6614 sigma_dut_print(dut, DUT_MSG_ERROR,
6615 "MCS_FixedRate cannot be changed without NL80211_SUPPORT defined");
6616#endif /* NL80211_SUPPORT */
6617 }
6618
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006619 val = get_param(cmd, "opt_md_notif_ie");
6620 if (val) {
6621 char *result = NULL;
6622 char delim[] = ";";
6623 char token[30];
6624 int value, config_val = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306625 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006626
Peng Xub8fc5cc2017-05-10 17:27:28 -07006627 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306628 result = strtok_r(token, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006629
6630 /* Extract the NSS information */
6631 if (result) {
6632 value = atoi(result);
6633 switch (value) {
6634 case 1:
6635 config_val = 1;
6636 break;
6637 case 2:
6638 config_val = 3;
6639 break;
6640 case 3:
6641 config_val = 7;
6642 break;
6643 case 4:
6644 config_val = 15;
6645 break;
6646 default:
6647 config_val = 3;
6648 break;
6649 }
6650
6651 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
6652 intf, config_val);
6653 if (system(buf) != 0) {
6654 sigma_dut_print(dut, DUT_MSG_ERROR,
6655 "iwpriv rxchainmask failed");
6656 }
6657
6658 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
6659 intf, config_val);
6660 if (system(buf) != 0) {
6661 sigma_dut_print(dut, DUT_MSG_ERROR,
6662 "iwpriv txchainmask failed");
6663 }
6664 }
6665
6666 /* Extract the channel width information */
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306667 result = strtok_r(NULL, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006668 if (result) {
6669 value = atoi(result);
6670 switch (value) {
6671 case 20:
6672 config_val = 0;
6673 break;
6674 case 40:
6675 config_val = 1;
6676 break;
6677 case 80:
6678 config_val = 2;
6679 break;
6680 case 160:
6681 config_val = 3;
6682 break;
6683 default:
6684 config_val = 2;
6685 break;
6686 }
6687
6688 dut->chwidth = config_val;
6689
6690 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
6691 intf, config_val);
6692 if (system(buf) != 0) {
6693 sigma_dut_print(dut, DUT_MSG_ERROR,
6694 "iwpriv chwidth failed");
6695 }
6696 }
6697
6698 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", intf);
6699 if (system(buf) != 0) {
6700 sigma_dut_print(dut, DUT_MSG_ERROR,
6701 "iwpriv opmode_notify failed");
6702 }
6703 }
6704
6705 val = get_param(cmd, "nss_mcs_cap");
6706 if (val) {
6707 int nss, mcs;
6708 char token[20];
6709 char *result = NULL;
6710 unsigned int vht_mcsmap = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306711 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006712
Peng Xub8fc5cc2017-05-10 17:27:28 -07006713 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306714 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306715 if (!result) {
6716 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006717 "NSS not specified");
6718 send_resp(dut, conn, SIGMA_ERROR,
6719 "errorCode,NSS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306720 return 0;
6721 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006722 nss = atoi(result);
6723
6724 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
6725 if (system(buf) != 0) {
6726 sigma_dut_print(dut, DUT_MSG_ERROR,
6727 "iwpriv nss failed");
6728 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006729 dut->sta_nss = nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006730
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306731 result = strtok_r(NULL, ";", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006732 if (result == NULL) {
6733 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006734 "MCS not specified");
6735 send_resp(dut, conn, SIGMA_ERROR,
6736 "errorCode,MCS not specified");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006737 return 0;
6738 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306739 result = strtok_r(result, "-", &saveptr);
6740 result = strtok_r(NULL, "-", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306741 if (!result) {
6742 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006743 "MCS not specified");
6744 send_resp(dut, conn, SIGMA_ERROR,
6745 "errorCode,MCS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306746 return 0;
6747 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006748 mcs = atoi(result);
6749
Arif Hussaina37e9552018-06-20 17:05:59 -07006750 if (program && strcasecmp(program, "HE") == 0) {
6751#ifdef NL80211_SUPPORT
6752 enum he_mcs_config mcs_config;
6753 int ret;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006754
Arif Hussaina37e9552018-06-20 17:05:59 -07006755 if (mcs >= 0 && mcs <= 7) {
6756 mcs_config = HE_80_MCS0_7;
6757 } else if (mcs > 7 && mcs <= 9) {
6758 mcs_config = HE_80_MCS0_9;
6759 } else if (mcs > 9 && mcs <= 11) {
6760 mcs_config = HE_80_MCS0_11;
6761 } else {
6762 sigma_dut_print(dut, DUT_MSG_ERROR,
6763 "nss_mcs_cap: HE: Invalid mcs: %d",
6764 mcs);
6765 send_resp(dut, conn, SIGMA_ERROR,
6766 "errorCode,Invalid MCS");
6767 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006768 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006769
6770 ret = sta_set_he_mcs(dut, intf, mcs_config);
6771 if (ret) {
6772 sigma_dut_print(dut, DUT_MSG_ERROR,
6773 "nss_mcs_cap: HE: Setting of MCS failed, mcs_config: %d, ret: %d",
6774 mcs_config, ret);
6775 send_resp(dut, conn, SIGMA_ERROR,
6776 "errorCode,Failed to set MCS");
6777 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006778 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006779#else /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006780 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006781 "nss_mcs_cap: HE: MCS cannot be changed without NL80211_SUPPORT defined");
6782#endif /* NL80211_SUPPORT */
6783 } else {
6784 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
6785 intf, mcs);
6786 if (system(buf) != 0) {
6787 sigma_dut_print(dut, DUT_MSG_ERROR,
6788 "iwpriv mcs failed");
6789 }
6790
6791 switch (nss) {
6792 case 1:
6793 switch (mcs) {
6794 case 7:
6795 vht_mcsmap = 0xfffc;
6796 break;
6797 case 8:
6798 vht_mcsmap = 0xfffd;
6799 break;
6800 case 9:
6801 vht_mcsmap = 0xfffe;
6802 break;
6803 default:
6804 vht_mcsmap = 0xfffe;
6805 break;
6806 }
6807 break;
6808 case 2:
6809 switch (mcs) {
6810 case 7:
6811 vht_mcsmap = 0xfff0;
6812 break;
6813 case 8:
6814 vht_mcsmap = 0xfff5;
6815 break;
6816 case 9:
6817 vht_mcsmap = 0xfffa;
6818 break;
6819 default:
6820 vht_mcsmap = 0xfffa;
6821 break;
6822 }
6823 break;
6824 case 3:
6825 switch (mcs) {
6826 case 7:
6827 vht_mcsmap = 0xffc0;
6828 break;
6829 case 8:
6830 vht_mcsmap = 0xffd5;
6831 break;
6832 case 9:
6833 vht_mcsmap = 0xffea;
6834 break;
6835 default:
6836 vht_mcsmap = 0xffea;
6837 break;
6838 }
6839 break;
6840 default:
6841 vht_mcsmap = 0xffea;
6842 break;
6843 }
6844 snprintf(buf, sizeof(buf),
6845 "iwpriv %s vht_mcsmap 0x%04x",
6846 intf, vht_mcsmap);
6847 if (system(buf) != 0) {
6848 sigma_dut_print(dut, DUT_MSG_ERROR,
6849 "iwpriv vht_mcsmap failed");
6850 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006851 }
6852 }
6853
6854 /* UNSUPPORTED: val = get_param(cmd, "Tx_lgi_rate"); */
6855
6856 val = get_param(cmd, "Vht_tkip");
6857 if (val)
6858 tkip = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6859
6860 val = get_param(cmd, "Vht_wep");
6861 if (val)
6862 wep = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6863
6864 if (tkip != -1 || wep != -1) {
6865 if ((tkip == 1 && wep != 0) || (wep == 1 && tkip != 0)) {
6866 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 1",
6867 intf);
6868 } else if ((tkip == 0 && wep != 1) || (wep == 0 && tkip != 1)) {
6869 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 0",
6870 intf);
6871 } else {
6872 sigma_dut_print(dut, DUT_MSG_ERROR,
6873 "ErrorCode,mixed mode of VHT TKIP/WEP not supported");
6874 return 0;
6875 }
6876
6877 if (system(buf) != 0) {
6878 sigma_dut_print(dut, DUT_MSG_ERROR,
6879 "iwpriv htweptkip failed");
6880 }
6881 }
6882
Arif Hussain55f00da2018-07-03 08:28:26 -07006883 val = get_param(cmd, "txBandwidth");
6884 if (val) {
6885 switch (get_driver_type()) {
6886 case DRIVER_WCN:
6887 if (wcn_sta_set_width(dut, intf, val) < 0) {
6888 send_resp(dut, conn, SIGMA_ERROR,
6889 "ErrorCode,Failed to set txBandwidth");
6890 return 0;
6891 }
6892 break;
6893 case DRIVER_ATHEROS:
6894 if (ath_set_width(dut, conn, intf, val) < 0) {
6895 send_resp(dut, conn, SIGMA_ERROR,
6896 "ErrorCode,Failed to set txBandwidth");
6897 return 0;
6898 }
6899 break;
6900 default:
6901 sigma_dut_print(dut, DUT_MSG_ERROR,
6902 "Setting txBandwidth not supported");
6903 break;
6904 }
6905 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006906
Arif Hussain9765f7d2018-07-03 08:28:26 -07006907 val = get_param(cmd, "BeamformeeSTS");
6908 if (val) {
6909 if (sta_set_beamformee_sts(dut, intf, atoi(val))) {
6910 send_resp(dut, conn, SIGMA_ERROR,
6911 "ErrorCode,Failed to set BeamformeeSTS");
6912 return 0;
6913 }
6914 }
6915
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006916 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6917}
6918
6919
6920static int sta_set_wireless_60g(struct sigma_dut *dut,
6921 struct sigma_conn *conn,
6922 struct sigma_cmd *cmd)
6923{
6924 const char *dev_role = get_param(cmd, "DevRole");
6925
6926 if (!dev_role) {
6927 send_resp(dut, conn, SIGMA_INVALID,
6928 "ErrorCode,DevRole not specified");
6929 return 0;
6930 }
6931
6932 if (strcasecmp(dev_role, "PCP") == 0)
6933 return sta_set_60g_pcp(dut, conn, cmd);
6934 if (strcasecmp(dev_role, "STA") == 0)
6935 return sta_set_60g_sta(dut, conn, cmd);
6936 send_resp(dut, conn, SIGMA_INVALID,
6937 "ErrorCode,DevRole not supported");
6938 return 0;
6939}
6940
6941
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306942static int sta_set_wireless_oce(struct sigma_dut *dut, struct sigma_conn *conn,
6943 struct sigma_cmd *cmd)
6944{
6945 int status;
6946 const char *intf = get_param(cmd, "Interface");
6947 const char *val = get_param(cmd, "DevRole");
6948
6949 if (val && strcasecmp(val, "STA-CFON") == 0) {
6950 status = sta_cfon_set_wireless(dut, conn, cmd);
6951 if (status)
6952 return status;
6953 }
6954 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6955}
6956
6957
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006958static int cmd_sta_set_wireless(struct sigma_dut *dut, struct sigma_conn *conn,
6959 struct sigma_cmd *cmd)
6960{
6961 const char *val;
6962
6963 val = get_param(cmd, "Program");
6964 if (val) {
6965 if (strcasecmp(val, "11n") == 0)
6966 return cmd_sta_set_11n(dut, conn, cmd);
Amarnath Hullur Subramanyam4f860292018-01-31 03:49:35 -08006967 if (strcasecmp(val, "VHT") == 0 || strcasecmp(val, "HE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006968 return cmd_sta_set_wireless_vht(dut, conn, cmd);
6969 if (strcasecmp(val, "60ghz") == 0)
6970 return sta_set_wireless_60g(dut, conn, cmd);
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306971 if (strcasecmp(val, "OCE") == 0)
6972 return sta_set_wireless_oce(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006973 send_resp(dut, conn, SIGMA_ERROR,
6974 "ErrorCode,Program value not supported");
6975 } else {
6976 send_resp(dut, conn, SIGMA_ERROR,
6977 "ErrorCode,Program argument not available");
6978 }
6979
6980 return 0;
6981}
6982
6983
6984static void ath_sta_inject_frame(struct sigma_dut *dut, const char *intf,
6985 int tid)
6986{
6987 char buf[100];
6988 int tid_to_dscp [] = { 0x00, 0x20, 0x40, 0x60, 0x80, 0xa0, 0xc0, 0xe0 };
6989
Pradeep Reddy POTTETId31d1322016-10-13 17:22:03 +05306990 if (tid < 0 ||
6991 tid >= (int) (sizeof(tid_to_dscp) / sizeof(tid_to_dscp[0]))) {
6992 sigma_dut_print(dut, DUT_MSG_ERROR, "Unsupported TID: %d", tid);
6993 return;
6994 }
6995
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006996 /*
6997 * Two ways to ensure that addba request with a
6998 * non zero TID could be sent out. EV 117296
6999 */
7000 snprintf(buf, sizeof(buf),
7001 "ping -c 8 -Q %d `arp -a | grep wlan0 | awk '{print $2}' | tr -d '()'`",
7002 tid);
7003 if (system(buf) != 0) {
7004 sigma_dut_print(dut, DUT_MSG_ERROR,
7005 "Ping did not send out");
7006 }
7007
7008 snprintf(buf, sizeof(buf),
7009 "iwconfig %s | grep Access | awk '{print $6}' > %s",
7010 intf, VI_QOS_TMP_FILE);
7011 if (system(buf) != 0)
7012 return;
7013
7014 snprintf(buf, sizeof(buf),
7015 "ifconfig %s | grep HWaddr | cut -b 39-56 >> %s",
7016 intf, VI_QOS_TMP_FILE);
7017 if (system(buf) != 0)
7018 sigma_dut_print(dut, DUT_MSG_ERROR, "HWaddr matching failed");
7019
7020 snprintf(buf,sizeof(buf), "sed -n '3,$p' %s >> %s",
7021 VI_QOS_REFFILE, VI_QOS_TMP_FILE);
7022 if (system(buf) != 0) {
7023 sigma_dut_print(dut, DUT_MSG_ERROR,
7024 "VI_QOS_TEMP_FILE generation error failed");
7025 }
7026 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
7027 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
7028 if (system(buf) != 0) {
7029 sigma_dut_print(dut, DUT_MSG_ERROR,
7030 "VI_QOS_FILE generation failed");
7031 }
7032
7033 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
7034 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
7035 if (system(buf) != 0) {
7036 sigma_dut_print(dut, DUT_MSG_ERROR,
7037 "VI_QOS_FILE generation failed");
7038 }
7039
7040 snprintf(buf, sizeof(buf), "ethinject %s %s", intf, VI_QOS_FILE);
7041 if (system(buf) != 0) {
7042 }
7043}
7044
7045
7046static int ath_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7047 struct sigma_cmd *cmd)
7048{
7049 const char *intf = get_param(cmd, "Interface");
7050 const char *val;
7051 int tid = 0;
7052 char buf[100];
7053
7054 val = get_param(cmd, "TID");
7055 if (val) {
7056 tid = atoi(val);
7057 if (tid)
7058 ath_sta_inject_frame(dut, intf, tid);
7059 }
7060
7061 /* Command sequence for ADDBA request on Peregrine based devices */
7062 snprintf(buf, sizeof(buf), "iwpriv %s setaddbaoper 1", intf);
7063 if (system(buf) != 0) {
7064 sigma_dut_print(dut, DUT_MSG_ERROR,
7065 "iwpriv setaddbaoper failed");
7066 }
7067
7068 snprintf(buf, sizeof(buf), "wifitool %s senddelba 1 %d 1 4", intf, tid);
7069 if (system(buf) != 0) {
7070 sigma_dut_print(dut, DUT_MSG_ERROR,
7071 "wifitool senddelba failed");
7072 }
7073
7074 snprintf(buf, sizeof(buf), "wifitool %s sendaddba 1 %d 64", intf, tid);
7075 if (system(buf) != 0) {
7076 sigma_dut_print(dut, DUT_MSG_ERROR,
7077 "wifitool sendaddba failed");
7078 }
7079
7080 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7081
7082 return 1;
7083}
7084
7085
Lior David9981b512017-01-20 13:16:40 +02007086#ifdef __linux__
7087
7088static int wil6210_send_addba(struct sigma_dut *dut, const char *dest_mac,
7089 int agg_size)
7090{
7091 char dir[128], buf[128];
7092 FILE *f;
7093 regex_t re;
7094 regmatch_t m[2];
7095 int rc, ret = -1, vring_id, found;
7096
7097 if (wil6210_get_debugfs_dir(dut, dir, sizeof(dir))) {
7098 sigma_dut_print(dut, DUT_MSG_ERROR,
7099 "failed to get wil6210 debugfs dir");
7100 return -1;
7101 }
7102
7103 snprintf(buf, sizeof(buf), "%s/vrings", dir);
7104 f = fopen(buf, "r");
7105 if (!f) {
7106 sigma_dut_print(dut, DUT_MSG_ERROR, "failed to open: %s", buf);
7107 return -1;
7108 }
7109
7110 if (regcomp(&re, "VRING tx_[ \t]*([0-9]+)", REG_EXTENDED)) {
7111 sigma_dut_print(dut, DUT_MSG_ERROR, "regcomp failed");
7112 goto out;
7113 }
7114
7115 /* find TX VRING for the mac address */
7116 found = 0;
7117 while (fgets(buf, sizeof(buf), f)) {
7118 if (strcasestr(buf, dest_mac)) {
7119 found = 1;
7120 break;
7121 }
7122 }
7123
7124 if (!found) {
7125 sigma_dut_print(dut, DUT_MSG_ERROR,
7126 "no TX VRING for %s", dest_mac);
7127 goto out;
7128 }
7129
7130 /* extract VRING ID, "VRING tx_<id> = {" */
7131 if (!fgets(buf, sizeof(buf), f)) {
7132 sigma_dut_print(dut, DUT_MSG_ERROR,
7133 "no VRING start line for %s", dest_mac);
7134 goto out;
7135 }
7136
7137 rc = regexec(&re, buf, 2, m, 0);
7138 regfree(&re);
7139 if (rc || m[1].rm_so < 0) {
7140 sigma_dut_print(dut, DUT_MSG_ERROR,
7141 "no VRING TX ID for %s", dest_mac);
7142 goto out;
7143 }
7144 buf[m[1].rm_eo] = 0;
7145 vring_id = atoi(&buf[m[1].rm_so]);
7146
7147 /* send the addba command */
7148 fclose(f);
7149 snprintf(buf, sizeof(buf), "%s/back", dir);
7150 f = fopen(buf, "w");
7151 if (!f) {
7152 sigma_dut_print(dut, DUT_MSG_ERROR,
7153 "failed to open: %s", buf);
7154 return -1;
7155 }
7156
7157 fprintf(f, "add %d %d\n", vring_id, agg_size);
7158
7159 ret = 0;
7160
7161out:
7162 fclose(f);
7163
7164 return ret;
7165}
7166
7167
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007168static int send_addba_60g(struct sigma_dut *dut, struct sigma_conn *conn,
7169 struct sigma_cmd *cmd)
7170{
7171 const char *val;
7172 int tid = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007173
7174 val = get_param(cmd, "TID");
7175 if (val) {
7176 tid = atoi(val);
7177 if (tid != 0) {
7178 sigma_dut_print(dut, DUT_MSG_ERROR,
7179 "Ignore TID %d for send_addba use TID 0 for 60g since only 0 required on TX",
7180 tid);
7181 }
7182 }
7183
7184 val = get_param(cmd, "Dest_mac");
7185 if (!val) {
7186 sigma_dut_print(dut, DUT_MSG_ERROR,
7187 "Currently not supporting addba for 60G without Dest_mac");
7188 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
7189 }
7190
Lior David9981b512017-01-20 13:16:40 +02007191 if (wil6210_send_addba(dut, val, dut->back_rcv_buf))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007192 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007193
7194 return 1;
7195}
7196
Lior David9981b512017-01-20 13:16:40 +02007197#endif /* __linux__ */
7198
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007199
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007200static int wcn_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7201 struct sigma_cmd *cmd)
7202{
7203#ifdef NL80211_SUPPORT
7204 const char *intf = get_param(cmd, "Interface");
7205 const char *val;
7206 int tid = -1;
7207 int bufsize = 64;
7208 struct nl_msg *msg;
7209 int ret = 0;
7210 struct nlattr *params;
7211 int ifindex;
7212
7213 val = get_param(cmd, "TID");
7214 if (val)
7215 tid = atoi(val);
7216
7217 if (tid == -1) {
7218 send_resp(dut, conn, SIGMA_ERROR,
7219 "ErrorCode,sta_send_addba tid invalid");
7220 return 0;
7221 }
7222
7223 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7224
7225 ifindex = if_nametoindex(intf);
7226 if (ifindex == 0) {
7227 sigma_dut_print(dut, DUT_MSG_ERROR,
7228 "%s: Index for interface %s failed",
7229 __func__, intf);
7230 send_resp(dut, conn, SIGMA_ERROR,
7231 "ErrorCode,sta_send_addba interface invalid");
7232 return 0;
7233 }
7234
7235 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
7236 NL80211_CMD_VENDOR)) ||
7237 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
7238 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
7239 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
7240 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
7241 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
7242 nla_put_u8(msg,
7243 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADD_DEL_BA_SESSION,
7244 QCA_WLAN_ADD_BA) ||
7245 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_BA_TID,
7246 tid) ||
7247 nla_put_u8(msg,
7248 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
7249 bufsize)) {
7250 sigma_dut_print(dut, DUT_MSG_ERROR,
7251 "%s: err in adding vendor_cmd and vendor_data",
7252 __func__);
7253 nlmsg_free(msg);
7254 send_resp(dut, conn, SIGMA_ERROR,
7255 "ErrorCode,sta_send_addba err in adding vendor_cmd and vendor_data");
7256 return 0;
7257 }
7258 nla_nest_end(msg, params);
7259
7260 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
7261 if (ret) {
7262 sigma_dut_print(dut, DUT_MSG_ERROR,
7263 "%s: err in send_and_recv_msgs, ret=%d",
7264 __func__, ret);
Sunil Dutt30605592018-05-04 20:35:50 +05307265 if (ret == -EOPNOTSUPP)
7266 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007267 send_resp(dut, conn, SIGMA_ERROR,
7268 "ErrorCode,sta_send_addba err in send_and_recv_msgs");
7269 return 0;
7270 }
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007271#else /* NL80211_SUPPORT */
7272 sigma_dut_print(dut, DUT_MSG_ERROR,
7273 "sta_send_addba not supported without NL80211_SUPPORT defined");
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007274#endif /* NL80211_SUPPORT */
Sunil Dutt30605592018-05-04 20:35:50 +05307275
7276 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007277}
7278
7279
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007280static int cmd_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7281 struct sigma_cmd *cmd)
7282{
7283 switch (get_driver_type()) {
7284 case DRIVER_ATHEROS:
7285 return ath_sta_send_addba(dut, conn, cmd);
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007286 case DRIVER_WCN:
7287 return wcn_sta_send_addba(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007288#ifdef __linux__
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007289 case DRIVER_WIL6210:
7290 return send_addba_60g(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007291#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007292 default:
7293 /*
7294 * There is no driver specific implementation for other drivers.
7295 * Ignore the command and report COMPLETE since the following
7296 * throughput test operation will end up sending ADDBA anyway.
7297 */
7298 return 1;
7299 }
7300}
7301
7302
7303int inject_eth_frame(int s, const void *data, size_t len,
7304 unsigned short ethtype, char *dst, char *src)
7305{
7306 struct iovec iov[4] = {
7307 {
7308 .iov_base = dst,
7309 .iov_len = ETH_ALEN,
7310 },
7311 {
7312 .iov_base = src,
7313 .iov_len = ETH_ALEN,
7314 },
7315 {
7316 .iov_base = &ethtype,
7317 .iov_len = sizeof(unsigned short),
7318 },
7319 {
7320 .iov_base = (void *) data,
7321 .iov_len = len,
7322 }
7323 };
7324 struct msghdr msg = {
7325 .msg_name = NULL,
7326 .msg_namelen = 0,
7327 .msg_iov = iov,
7328 .msg_iovlen = 4,
7329 .msg_control = NULL,
7330 .msg_controllen = 0,
7331 .msg_flags = 0,
7332 };
7333
7334 return sendmsg(s, &msg, 0);
7335}
7336
7337#if defined(__linux__) || defined(__QNXNTO__)
7338
7339int inject_frame(int s, const void *data, size_t len, int encrypt)
7340{
7341#define IEEE80211_RADIOTAP_F_WEP 0x04
7342#define IEEE80211_RADIOTAP_F_FRAG 0x08
7343 unsigned char rtap_hdr[] = {
7344 0x00, 0x00, /* radiotap version */
7345 0x0e, 0x00, /* radiotap length */
7346 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
7347 IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
7348 0x00, /* padding */
7349 0x00, 0x00, /* RX and TX flags to indicate that */
7350 0x00, 0x00, /* this is the injected frame directly */
7351 };
7352 struct iovec iov[2] = {
7353 {
7354 .iov_base = &rtap_hdr,
7355 .iov_len = sizeof(rtap_hdr),
7356 },
7357 {
7358 .iov_base = (void *) data,
7359 .iov_len = len,
7360 }
7361 };
7362 struct msghdr msg = {
7363 .msg_name = NULL,
7364 .msg_namelen = 0,
7365 .msg_iov = iov,
7366 .msg_iovlen = 2,
7367 .msg_control = NULL,
7368 .msg_controllen = 0,
7369 .msg_flags = 0,
7370 };
7371
7372 if (encrypt)
7373 rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
7374
7375 return sendmsg(s, &msg, 0);
7376}
7377
7378
7379int open_monitor(const char *ifname)
7380{
7381#ifdef __QNXNTO__
7382 struct sockaddr_dl ll;
7383 int s;
7384
7385 memset(&ll, 0, sizeof(ll));
7386 ll.sdl_family = AF_LINK;
7387 ll.sdl_index = if_nametoindex(ifname);
7388 if (ll.sdl_index == 0) {
7389 perror("if_nametoindex");
7390 return -1;
7391 }
7392 s = socket(PF_INET, SOCK_RAW, 0);
7393#else /* __QNXNTO__ */
7394 struct sockaddr_ll ll;
7395 int s;
7396
7397 memset(&ll, 0, sizeof(ll));
7398 ll.sll_family = AF_PACKET;
7399 ll.sll_ifindex = if_nametoindex(ifname);
7400 if (ll.sll_ifindex == 0) {
7401 perror("if_nametoindex");
7402 return -1;
7403 }
7404 s = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
7405#endif /* __QNXNTO__ */
7406 if (s < 0) {
7407 perror("socket[PF_PACKET,SOCK_RAW]");
7408 return -1;
7409 }
7410
7411 if (bind(s, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
7412 perror("monitor socket bind");
7413 close(s);
7414 return -1;
7415 }
7416
7417 return s;
7418}
7419
7420
7421static int hex2num(char c)
7422{
7423 if (c >= '0' && c <= '9')
7424 return c - '0';
7425 if (c >= 'a' && c <= 'f')
7426 return c - 'a' + 10;
7427 if (c >= 'A' && c <= 'F')
7428 return c - 'A' + 10;
7429 return -1;
7430}
7431
7432
7433int hwaddr_aton(const char *txt, unsigned char *addr)
7434{
7435 int i;
7436
7437 for (i = 0; i < 6; i++) {
7438 int a, b;
7439
7440 a = hex2num(*txt++);
7441 if (a < 0)
7442 return -1;
7443 b = hex2num(*txt++);
7444 if (b < 0)
7445 return -1;
7446 *addr++ = (a << 4) | b;
7447 if (i < 5 && *txt++ != ':')
7448 return -1;
7449 }
7450
7451 return 0;
7452}
7453
7454#endif /* defined(__linux__) || defined(__QNXNTO__) */
7455
7456enum send_frame_type {
7457 DISASSOC, DEAUTH, SAQUERY, AUTH, ASSOCREQ, REASSOCREQ, DLS_REQ
7458};
7459enum send_frame_protection {
7460 CORRECT_KEY, INCORRECT_KEY, UNPROTECTED
7461};
7462
7463
7464static int sta_inject_frame(struct sigma_dut *dut, struct sigma_conn *conn,
7465 enum send_frame_type frame,
7466 enum send_frame_protection protected,
7467 const char *dest)
7468{
7469#ifdef __linux__
7470 unsigned char buf[1000], *pos;
7471 int s, res;
7472 char bssid[20], addr[20];
7473 char result[32], ssid[100];
7474 size_t ssid_len;
7475
7476 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
7477 sizeof(result)) < 0 ||
7478 strncmp(result, "COMPLETED", 9) != 0) {
7479 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Not connected");
7480 return 0;
7481 }
7482
7483 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
7484 < 0) {
7485 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7486 "current BSSID");
7487 return 0;
7488 }
7489
7490 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
7491 < 0) {
7492 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7493 "own MAC address");
7494 return 0;
7495 }
7496
7497 if (get_wpa_status(get_station_ifname(), "ssid", ssid, sizeof(ssid))
7498 < 0) {
7499 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7500 "current SSID");
7501 return 0;
7502 }
7503 ssid_len = strlen(ssid);
7504
7505 pos = buf;
7506
7507 /* Frame Control */
7508 switch (frame) {
7509 case DISASSOC:
7510 *pos++ = 0xa0;
7511 break;
7512 case DEAUTH:
7513 *pos++ = 0xc0;
7514 break;
7515 case SAQUERY:
7516 *pos++ = 0xd0;
7517 break;
7518 case AUTH:
7519 *pos++ = 0xb0;
7520 break;
7521 case ASSOCREQ:
7522 *pos++ = 0x00;
7523 break;
7524 case REASSOCREQ:
7525 *pos++ = 0x20;
7526 break;
7527 case DLS_REQ:
7528 *pos++ = 0xd0;
7529 break;
7530 }
7531
7532 if (protected == INCORRECT_KEY)
7533 *pos++ = 0x40; /* Set Protected field to 1 */
7534 else
7535 *pos++ = 0x00;
7536
7537 /* Duration */
7538 *pos++ = 0x00;
7539 *pos++ = 0x00;
7540
7541 /* addr1 = DA (current AP) */
7542 hwaddr_aton(bssid, pos);
7543 pos += 6;
7544 /* addr2 = SA (own address) */
7545 hwaddr_aton(addr, pos);
7546 pos += 6;
7547 /* addr3 = BSSID (current AP) */
7548 hwaddr_aton(bssid, pos);
7549 pos += 6;
7550
7551 /* Seq# (to be filled by driver/mac80211) */
7552 *pos++ = 0x00;
7553 *pos++ = 0x00;
7554
7555 if (protected == INCORRECT_KEY) {
7556 /* CCMP parameters */
7557 memcpy(pos, "\x61\x01\x00\x20\x00\x10\x00\x00", 8);
7558 pos += 8;
7559 }
7560
7561 if (protected == INCORRECT_KEY) {
7562 switch (frame) {
7563 case DEAUTH:
7564 /* Reason code (encrypted) */
7565 memcpy(pos, "\xa7\x39", 2);
7566 pos += 2;
7567 break;
7568 case DISASSOC:
7569 /* Reason code (encrypted) */
7570 memcpy(pos, "\xa7\x39", 2);
7571 pos += 2;
7572 break;
7573 case SAQUERY:
7574 /* Category|Action|TransID (encrypted) */
7575 memcpy(pos, "\x6f\xbd\xe9\x4d", 4);
7576 pos += 4;
7577 break;
7578 default:
7579 return -1;
7580 }
7581
7582 /* CCMP MIC */
7583 memcpy(pos, "\xc8\xd8\x3b\x06\x5d\xb7\x25\x68", 8);
7584 pos += 8;
7585 } else {
7586 switch (frame) {
7587 case DEAUTH:
7588 /* reason code = 8 */
7589 *pos++ = 0x08;
7590 *pos++ = 0x00;
7591 break;
7592 case DISASSOC:
7593 /* reason code = 8 */
7594 *pos++ = 0x08;
7595 *pos++ = 0x00;
7596 break;
7597 case SAQUERY:
7598 /* Category - SA Query */
7599 *pos++ = 0x08;
7600 /* SA query Action - Request */
7601 *pos++ = 0x00;
7602 /* Transaction ID */
7603 *pos++ = 0x12;
7604 *pos++ = 0x34;
7605 break;
7606 case AUTH:
7607 /* Auth Alg (Open) */
7608 *pos++ = 0x00;
7609 *pos++ = 0x00;
7610 /* Seq# */
7611 *pos++ = 0x01;
7612 *pos++ = 0x00;
7613 /* Status code */
7614 *pos++ = 0x00;
7615 *pos++ = 0x00;
7616 break;
7617 case ASSOCREQ:
7618 /* Capability Information */
7619 *pos++ = 0x31;
7620 *pos++ = 0x04;
7621 /* Listen Interval */
7622 *pos++ = 0x0a;
7623 *pos++ = 0x00;
7624 /* SSID */
7625 *pos++ = 0x00;
7626 *pos++ = ssid_len;
7627 memcpy(pos, ssid, ssid_len);
7628 pos += ssid_len;
7629 /* Supported Rates */
7630 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7631 10);
7632 pos += 10;
7633 /* Extended Supported Rates */
7634 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7635 pos += 6;
7636 /* RSN */
7637 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7638 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7639 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7640 pos += 28;
7641 break;
7642 case REASSOCREQ:
7643 /* Capability Information */
7644 *pos++ = 0x31;
7645 *pos++ = 0x04;
7646 /* Listen Interval */
7647 *pos++ = 0x0a;
7648 *pos++ = 0x00;
7649 /* Current AP */
7650 hwaddr_aton(bssid, pos);
7651 pos += 6;
7652 /* SSID */
7653 *pos++ = 0x00;
7654 *pos++ = ssid_len;
7655 memcpy(pos, ssid, ssid_len);
7656 pos += ssid_len;
7657 /* Supported Rates */
7658 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7659 10);
7660 pos += 10;
7661 /* Extended Supported Rates */
7662 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7663 pos += 6;
7664 /* RSN */
7665 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7666 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7667 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7668 pos += 28;
7669 break;
7670 case DLS_REQ:
7671 /* Category - DLS */
7672 *pos++ = 0x02;
7673 /* DLS Action - Request */
7674 *pos++ = 0x00;
7675 /* Destination MACAddress */
7676 if (dest)
7677 hwaddr_aton(dest, pos);
7678 else
7679 memset(pos, 0, 6);
7680 pos += 6;
7681 /* Source MACAddress */
7682 hwaddr_aton(addr, pos);
7683 pos += 6;
7684 /* Capability Information */
7685 *pos++ = 0x10; /* Privacy */
7686 *pos++ = 0x06; /* QoS */
7687 /* DLS Timeout Value */
7688 *pos++ = 0x00;
7689 *pos++ = 0x01;
7690 /* Supported rates */
7691 *pos++ = 0x01;
7692 *pos++ = 0x08;
7693 *pos++ = 0x0c; /* 6 Mbps */
7694 *pos++ = 0x12; /* 9 Mbps */
7695 *pos++ = 0x18; /* 12 Mbps */
7696 *pos++ = 0x24; /* 18 Mbps */
7697 *pos++ = 0x30; /* 24 Mbps */
7698 *pos++ = 0x48; /* 36 Mbps */
7699 *pos++ = 0x60; /* 48 Mbps */
7700 *pos++ = 0x6c; /* 54 Mbps */
7701 /* TODO: Extended Supported Rates */
7702 /* TODO: HT Capabilities */
7703 break;
7704 }
7705 }
7706
7707 s = open_monitor("sigmadut");
7708 if (s < 0) {
7709 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
7710 "monitor socket");
7711 return 0;
7712 }
7713
7714 res = inject_frame(s, buf, pos - buf, protected == CORRECT_KEY);
7715 if (res < 0) {
7716 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
7717 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307718 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007719 return 0;
7720 }
7721 if (res < pos - buf) {
7722 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Only partial "
7723 "frame sent");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307724 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007725 return 0;
7726 }
7727
7728 close(s);
7729
7730 return 1;
7731#else /* __linux__ */
7732 send_resp(dut, conn, SIGMA_ERROR, "errorCode,sta_send_frame not "
7733 "yet supported");
7734 return 0;
7735#endif /* __linux__ */
7736}
7737
7738
7739static int cmd_sta_send_frame_tdls(struct sigma_dut *dut,
7740 struct sigma_conn *conn,
7741 struct sigma_cmd *cmd)
7742{
7743 const char *intf = get_param(cmd, "Interface");
7744 const char *sta, *val;
7745 unsigned char addr[ETH_ALEN];
7746 char buf[100];
7747
7748 sta = get_param(cmd, "peer");
7749 if (sta == NULL)
7750 sta = get_param(cmd, "station");
7751 if (sta == NULL) {
7752 send_resp(dut, conn, SIGMA_ERROR,
7753 "ErrorCode,Missing peer address");
7754 return 0;
7755 }
7756 if (hwaddr_aton(sta, addr) < 0) {
7757 send_resp(dut, conn, SIGMA_ERROR,
7758 "ErrorCode,Invalid peer address");
7759 return 0;
7760 }
7761
7762 val = get_param(cmd, "type");
7763 if (val == NULL)
7764 return -1;
7765
7766 if (strcasecmp(val, "DISCOVERY") == 0) {
7767 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", sta);
7768 if (wpa_command(intf, buf) < 0) {
7769 send_resp(dut, conn, SIGMA_ERROR,
7770 "ErrorCode,Failed to send TDLS discovery");
7771 return 0;
7772 }
7773 return 1;
7774 }
7775
7776 if (strcasecmp(val, "SETUP") == 0) {
7777 int status = 0, timeout = 0;
7778
7779 val = get_param(cmd, "Status");
7780 if (val)
7781 status = atoi(val);
7782
7783 val = get_param(cmd, "Timeout");
7784 if (val)
7785 timeout = atoi(val);
7786
7787 if (status != 0 && status != 37) {
7788 send_resp(dut, conn, SIGMA_ERROR,
7789 "ErrorCode,Unsupported status value");
7790 return 0;
7791 }
7792
7793 if (timeout != 0 && timeout != 301) {
7794 send_resp(dut, conn, SIGMA_ERROR,
7795 "ErrorCode,Unsupported timeout value");
7796 return 0;
7797 }
7798
7799 if (status && timeout) {
7800 send_resp(dut, conn, SIGMA_ERROR,
7801 "ErrorCode,Unsupported timeout+status "
7802 "combination");
7803 return 0;
7804 }
7805
7806 if (status == 37 &&
7807 wpa_command(intf, "SET tdls_testing 0x200")) {
7808 send_resp(dut, conn, SIGMA_ERROR,
7809 "ErrorCode,Failed to enable "
7810 "decline setup response test mode");
7811 return 0;
7812 }
7813
7814 if (timeout == 301) {
7815 int res;
7816 if (dut->no_tpk_expiration)
7817 res = wpa_command(intf,
7818 "SET tdls_testing 0x108");
7819 else
7820 res = wpa_command(intf,
7821 "SET tdls_testing 0x8");
7822 if (res) {
7823 send_resp(dut, conn, SIGMA_ERROR,
7824 "ErrorCode,Failed to set short TPK "
7825 "lifetime");
7826 return 0;
7827 }
7828 }
7829
7830 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", sta);
7831 if (wpa_command(intf, buf) < 0) {
7832 send_resp(dut, conn, SIGMA_ERROR,
7833 "ErrorCode,Failed to send TDLS setup");
7834 return 0;
7835 }
7836 return 1;
7837 }
7838
7839 if (strcasecmp(val, "TEARDOWN") == 0) {
7840 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", sta);
7841 if (wpa_command(intf, buf) < 0) {
7842 send_resp(dut, conn, SIGMA_ERROR,
7843 "ErrorCode,Failed to send TDLS teardown");
7844 return 0;
7845 }
7846 return 1;
7847 }
7848
7849 send_resp(dut, conn, SIGMA_ERROR,
7850 "ErrorCode,Unsupported TDLS frame");
7851 return 0;
7852}
7853
7854
7855static int sta_ap_known(const char *ifname, const char *bssid)
7856{
7857 char buf[4096];
7858
7859 snprintf(buf, sizeof(buf), "BSS %s", bssid);
7860 if (wpa_command_resp(ifname, buf, buf, sizeof(buf)) < 0)
7861 return 0;
7862 if (strncmp(buf, "id=", 3) != 0)
7863 return 0;
7864 return 1;
7865}
7866
7867
7868static int sta_scan_ap(struct sigma_dut *dut, const char *ifname,
7869 const char *bssid)
7870{
7871 int res;
7872 struct wpa_ctrl *ctrl;
7873 char buf[256];
7874
7875 if (sta_ap_known(ifname, bssid))
7876 return 0;
7877 sigma_dut_print(dut, DUT_MSG_DEBUG,
7878 "AP not in BSS table - start scan");
7879
7880 ctrl = open_wpa_mon(ifname);
7881 if (ctrl == NULL) {
7882 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
7883 "wpa_supplicant monitor connection");
7884 return -1;
7885 }
7886
7887 if (wpa_command(ifname, "SCAN") < 0) {
7888 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to start scan");
7889 wpa_ctrl_detach(ctrl);
7890 wpa_ctrl_close(ctrl);
7891 return -1;
7892 }
7893
7894 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
7895 buf, sizeof(buf));
7896
7897 wpa_ctrl_detach(ctrl);
7898 wpa_ctrl_close(ctrl);
7899
7900 if (res < 0) {
7901 sigma_dut_print(dut, DUT_MSG_INFO, "Scan did not complete");
7902 return -1;
7903 }
7904
7905 if (sta_ap_known(ifname, bssid))
7906 return 0;
7907 sigma_dut_print(dut, DUT_MSG_INFO, "AP not in BSS table");
7908 return -1;
7909}
7910
7911
7912static int cmd_sta_send_frame_hs2_neighadv(struct sigma_dut *dut,
7913 struct sigma_conn *conn,
7914 struct sigma_cmd *cmd,
7915 const char *intf)
7916{
7917 char buf[200];
7918
7919 snprintf(buf, sizeof(buf), "ndsend 2001:DB8::1 %s", intf);
7920 if (system(buf) != 0) {
7921 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Failed to run "
7922 "ndsend");
7923 return 0;
7924 }
7925
7926 return 1;
7927}
7928
7929
7930static int cmd_sta_send_frame_hs2_neighsolreq(struct sigma_dut *dut,
7931 struct sigma_conn *conn,
7932 struct sigma_cmd *cmd,
7933 const char *intf)
7934{
7935 char buf[200];
7936 const char *ip = get_param(cmd, "SenderIP");
7937
Peng Xu26b356d2017-10-04 17:58:16 -07007938 if (!ip)
7939 return 0;
7940
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007941 snprintf(buf, sizeof(buf), "ndisc6 -nm %s %s -r 4", ip, intf);
7942 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7943 if (system(buf) == 0) {
7944 sigma_dut_print(dut, DUT_MSG_INFO,
7945 "Neighbor Solicitation got a response "
7946 "for %s@%s", ip, intf);
7947 }
7948
7949 return 1;
7950}
7951
7952
7953static int cmd_sta_send_frame_hs2_arpprobe(struct sigma_dut *dut,
7954 struct sigma_conn *conn,
7955 struct sigma_cmd *cmd,
7956 const char *ifname)
7957{
7958 char buf[200];
7959 const char *ip = get_param(cmd, "SenderIP");
7960
7961 if (ip == NULL) {
7962 send_resp(dut, conn, SIGMA_ERROR,
7963 "ErrorCode,Missing SenderIP parameter");
7964 return 0;
7965 }
7966 snprintf(buf, sizeof(buf), "arping -I %s -D %s -c 4", ifname, ip);
7967 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7968 if (system(buf) != 0) {
7969 sigma_dut_print(dut, DUT_MSG_INFO, "arping DAD got a response "
7970 "for %s@%s", ip, ifname);
7971 }
7972
7973 return 1;
7974}
7975
7976
7977static int cmd_sta_send_frame_hs2_arpannounce(struct sigma_dut *dut,
7978 struct sigma_conn *conn,
7979 struct sigma_cmd *cmd,
7980 const char *ifname)
7981{
7982 char buf[200];
7983 char ip[16];
7984 int s;
Peng Xub3756882017-10-04 14:39:09 -07007985 struct ifreq ifr;
7986 struct sockaddr_in saddr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007987
7988 s = socket(PF_INET, SOCK_DGRAM, 0);
Peng Xub3756882017-10-04 14:39:09 -07007989 if (s < 0) {
7990 perror("socket");
7991 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007992 }
7993
Peng Xub3756882017-10-04 14:39:09 -07007994 memset(&ifr, 0, sizeof(ifr));
7995 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
7996 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
7997 sigma_dut_print(dut, DUT_MSG_INFO,
7998 "Failed to get %s IP address: %s",
7999 ifname, strerror(errno));
8000 close(s);
8001 return -1;
8002 }
8003 close(s);
8004
8005 memcpy(&saddr, &ifr.ifr_addr, sizeof(struct sockaddr_in));
8006 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
8007
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008008 snprintf(buf, sizeof(buf), "arping -I %s -s %s %s -c 4", ifname, ip,
8009 ip);
8010 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8011 if (system(buf) != 0) {
8012 }
8013
8014 return 1;
8015}
8016
8017
8018static int cmd_sta_send_frame_hs2_arpreply(struct sigma_dut *dut,
8019 struct sigma_conn *conn,
8020 struct sigma_cmd *cmd,
8021 const char *ifname)
8022{
8023 char buf[200], addr[20];
8024 char dst[ETH_ALEN], src[ETH_ALEN];
8025 short ethtype = htons(ETH_P_ARP);
8026 char *pos;
8027 int s, res;
8028 const char *val;
8029 struct sockaddr_in taddr;
8030
8031 val = get_param(cmd, "dest");
8032 if (val)
8033 hwaddr_aton(val, (unsigned char *) dst);
8034
8035 val = get_param(cmd, "DestIP");
8036 if (val)
8037 inet_aton(val, &taddr.sin_addr);
Peng Xu151c9e12017-10-04 14:39:09 -07008038 else
8039 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008040
8041 if (get_wpa_status(get_station_ifname(), "address", addr,
8042 sizeof(addr)) < 0)
8043 return -2;
8044 hwaddr_aton(addr, (unsigned char *) src);
8045
8046 pos = buf;
8047 *pos++ = 0x00;
8048 *pos++ = 0x01;
8049 *pos++ = 0x08;
8050 *pos++ = 0x00;
8051 *pos++ = 0x06;
8052 *pos++ = 0x04;
8053 *pos++ = 0x00;
8054 *pos++ = 0x02;
8055 memcpy(pos, src, ETH_ALEN);
8056 pos += ETH_ALEN;
8057 memcpy(pos, &taddr.sin_addr, 4);
8058 pos += 4;
8059 memcpy(pos, dst, ETH_ALEN);
8060 pos += ETH_ALEN;
8061 memcpy(pos, &taddr.sin_addr, 4);
8062 pos += 4;
8063
8064 s = open_monitor(get_station_ifname());
8065 if (s < 0) {
8066 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
8067 "monitor socket");
8068 return 0;
8069 }
8070
8071 res = inject_eth_frame(s, buf, pos - buf, ethtype, dst, src);
8072 if (res < 0) {
8073 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
8074 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05308075 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008076 return 0;
8077 }
8078
8079 close(s);
8080
8081 return 1;
8082}
8083
8084
8085static int cmd_sta_send_frame_hs2_dls_req(struct sigma_dut *dut,
8086 struct sigma_conn *conn,
8087 struct sigma_cmd *cmd,
8088 const char *intf, const char *dest)
8089{
8090 char buf[100];
8091
8092 if (if_nametoindex("sigmadut") == 0) {
8093 snprintf(buf, sizeof(buf),
8094 "iw dev %s interface add sigmadut type monitor",
8095 get_station_ifname());
8096 if (system(buf) != 0 ||
8097 if_nametoindex("sigmadut") == 0) {
8098 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8099 "monitor interface with '%s'", buf);
8100 return -2;
8101 }
8102 }
8103
8104 if (system("ifconfig sigmadut up") != 0) {
8105 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8106 "monitor interface up");
8107 return -2;
8108 }
8109
8110 return sta_inject_frame(dut, conn, DLS_REQ, UNPROTECTED, dest);
8111}
8112
8113
8114static int cmd_sta_send_frame_hs2(struct sigma_dut *dut,
8115 struct sigma_conn *conn,
8116 struct sigma_cmd *cmd)
8117{
8118 const char *intf = get_param(cmd, "Interface");
8119 const char *dest = get_param(cmd, "Dest");
8120 const char *type = get_param(cmd, "FrameName");
8121 const char *val;
8122 char buf[200], *pos, *end;
8123 int count, count2;
8124
8125 if (type == NULL)
8126 type = get_param(cmd, "Type");
8127
8128 if (intf == NULL || dest == NULL || type == NULL)
8129 return -1;
8130
8131 if (strcasecmp(type, "NeighAdv") == 0)
8132 return cmd_sta_send_frame_hs2_neighadv(dut, conn, cmd, intf);
8133
8134 if (strcasecmp(type, "NeighSolicitReq") == 0)
8135 return cmd_sta_send_frame_hs2_neighsolreq(dut, conn, cmd, intf);
8136
8137 if (strcasecmp(type, "ARPProbe") == 0)
8138 return cmd_sta_send_frame_hs2_arpprobe(dut, conn, cmd, intf);
8139
8140 if (strcasecmp(type, "ARPAnnounce") == 0)
8141 return cmd_sta_send_frame_hs2_arpannounce(dut, conn, cmd, intf);
8142
8143 if (strcasecmp(type, "ARPReply") == 0)
8144 return cmd_sta_send_frame_hs2_arpreply(dut, conn, cmd, intf);
8145
8146 if (strcasecmp(type, "DLS-request") == 0 ||
8147 strcasecmp(type, "DLSrequest") == 0)
8148 return cmd_sta_send_frame_hs2_dls_req(dut, conn, cmd, intf,
8149 dest);
8150
8151 if (strcasecmp(type, "ANQPQuery") != 0 &&
8152 strcasecmp(type, "Query") != 0) {
8153 send_resp(dut, conn, SIGMA_ERROR,
8154 "ErrorCode,Unsupported HS 2.0 send frame type");
8155 return 0;
8156 }
8157
8158 if (sta_scan_ap(dut, intf, dest) < 0) {
8159 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not find "
8160 "the requested AP");
8161 return 0;
8162 }
8163
8164 pos = buf;
8165 end = buf + sizeof(buf);
8166 count = 0;
8167 pos += snprintf(pos, end - pos, "ANQP_GET %s ", dest);
8168
8169 val = get_param(cmd, "ANQP_CAP_LIST");
8170 if (val && atoi(val)) {
8171 pos += snprintf(pos, end - pos, "%s257", count > 0 ? "," : "");
8172 count++;
8173 }
8174
8175 val = get_param(cmd, "VENUE_NAME");
8176 if (val && atoi(val)) {
8177 pos += snprintf(pos, end - pos, "%s258", count > 0 ? "," : "");
8178 count++;
8179 }
8180
8181 val = get_param(cmd, "NETWORK_AUTH_TYPE");
8182 if (val && atoi(val)) {
8183 pos += snprintf(pos, end - pos, "%s260", count > 0 ? "," : "");
8184 count++;
8185 }
8186
8187 val = get_param(cmd, "ROAMING_CONS");
8188 if (val && atoi(val)) {
8189 pos += snprintf(pos, end - pos, "%s261", count > 0 ? "," : "");
8190 count++;
8191 }
8192
8193 val = get_param(cmd, "IP_ADDR_TYPE_AVAILABILITY");
8194 if (val && atoi(val)) {
8195 pos += snprintf(pos, end - pos, "%s262", count > 0 ? "," : "");
8196 count++;
8197 }
8198
8199 val = get_param(cmd, "NAI_REALM_LIST");
8200 if (val && atoi(val)) {
8201 pos += snprintf(pos, end - pos, "%s263", count > 0 ? "," : "");
8202 count++;
8203 }
8204
8205 val = get_param(cmd, "3GPP_INFO");
8206 if (val && atoi(val)) {
8207 pos += snprintf(pos, end - pos, "%s264", count > 0 ? "," : "");
8208 count++;
8209 }
8210
8211 val = get_param(cmd, "DOMAIN_LIST");
8212 if (val && atoi(val)) {
8213 pos += snprintf(pos, end - pos, "%s268", count > 0 ? "," : "");
8214 count++;
8215 }
8216
Jouni Malinen34cf9532018-04-29 19:26:33 +03008217 val = get_param(cmd, "Venue_URL");
8218 if (val && atoi(val)) {
8219 pos += snprintf(pos, end - pos, "%s277", count > 0 ? "," : "");
8220 count++;
8221 }
8222
Jouni Malinend3bca5d2018-04-29 17:25:23 +03008223 val = get_param(cmd, "Advice_Of_Charge");
8224 if (val && atoi(val)) {
8225 pos += snprintf(pos, end - pos, "%s278", count > 0 ? "," : "");
8226 count++;
8227 }
8228
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008229 if (count && wpa_command(intf, buf)) {
8230 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,ANQP_GET failed");
8231 return 0;
8232 }
8233
8234 pos = buf;
8235 end = buf + sizeof(buf);
8236 count2 = 0;
8237 pos += snprintf(pos, end - pos, "HS20_ANQP_GET %s ", dest);
8238
8239 val = get_param(cmd, "HS_CAP_LIST");
8240 if (val && atoi(val)) {
8241 pos += snprintf(pos, end - pos, "%s2", count2 > 0 ? "," : "");
8242 count2++;
8243 }
8244
8245 val = get_param(cmd, "OPER_NAME");
8246 if (val && atoi(val)) {
8247 pos += snprintf(pos, end - pos, "%s3", count2 > 0 ? "," : "");
8248 count2++;
8249 }
8250
8251 val = get_param(cmd, "WAN_METRICS");
8252 if (!val)
8253 val = get_param(cmd, "WAN_MAT");
8254 if (!val)
8255 val = get_param(cmd, "WAN_MET");
8256 if (val && atoi(val)) {
8257 pos += snprintf(pos, end - pos, "%s4", count2 > 0 ? "," : "");
8258 count2++;
8259 }
8260
8261 val = get_param(cmd, "CONNECTION_CAPABILITY");
8262 if (val && atoi(val)) {
8263 pos += snprintf(pos, end - pos, "%s5", count2 > 0 ? "," : "");
8264 count2++;
8265 }
8266
8267 val = get_param(cmd, "OP_CLASS");
8268 if (val && atoi(val)) {
8269 pos += snprintf(pos, end - pos, "%s7", count2 > 0 ? "," : "");
8270 count2++;
8271 }
8272
8273 val = get_param(cmd, "OSU_PROVIDER_LIST");
8274 if (val && atoi(val)) {
8275 pos += snprintf(pos, end - pos, "%s8", count2 > 0 ? "," : "");
8276 count2++;
8277 }
8278
Jouni Malinenf67afec2018-04-29 19:24:58 +03008279 val = get_param(cmd, "OPER_ICON_METADATA");
8280 if (!val)
8281 val = get_param(cmd, "OPERATOR_ICON_METADATA");
8282 if (val && atoi(val)) {
8283 pos += snprintf(pos, end - pos, "%s12", count2 > 0 ? "," : "");
8284 count2++;
8285 }
8286
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008287 if (count && count2) {
8288 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before sending out "
8289 "second query");
8290 sleep(1);
8291 }
8292
8293 if (count2 && wpa_command(intf, buf)) {
8294 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,HS20_ANQP_GET "
8295 "failed");
8296 return 0;
8297 }
8298
8299 val = get_param(cmd, "NAI_HOME_REALM_LIST");
8300 if (val) {
8301 if (count || count2) {
8302 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8303 "sending out second query");
8304 sleep(1);
8305 }
8306
8307 if (strcmp(val, "1") == 0)
8308 val = "mail.example.com";
8309 snprintf(buf, end - pos,
8310 "HS20_GET_NAI_HOME_REALM_LIST %s realm=%s",
8311 dest, val);
8312 if (wpa_command(intf, buf)) {
8313 send_resp(dut, conn, SIGMA_ERROR,
8314 "ErrorCode,HS20_GET_NAI_HOME_REALM_LIST "
8315 "failed");
8316 return 0;
8317 }
8318 }
8319
8320 val = get_param(cmd, "ICON_REQUEST");
8321 if (val) {
8322 if (count || count2) {
8323 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8324 "sending out second query");
8325 sleep(1);
8326 }
8327
8328 snprintf(buf, end - pos,
8329 "HS20_ICON_REQUEST %s %s", dest, val);
8330 if (wpa_command(intf, buf)) {
8331 send_resp(dut, conn, SIGMA_ERROR,
8332 "ErrorCode,HS20_ICON_REQUEST failed");
8333 return 0;
8334 }
8335 }
8336
8337 return 1;
8338}
8339
8340
8341static int ath_sta_send_frame_vht(struct sigma_dut *dut,
8342 struct sigma_conn *conn,
8343 struct sigma_cmd *cmd)
8344{
8345 const char *val;
8346 char *ifname;
8347 char buf[100];
8348 int chwidth, nss;
8349
8350 val = get_param(cmd, "framename");
8351 if (!val)
8352 return -1;
8353 sigma_dut_print(dut, DUT_MSG_DEBUG, "framename is %s", val);
8354
8355 /* Command sequence to generate Op mode notification */
8356 if (val && strcasecmp(val, "Op_md_notif_frm") == 0) {
8357 ifname = get_station_ifname();
8358
8359 /* Disable STBC */
8360 snprintf(buf, sizeof(buf),
8361 "iwpriv %s tx_stbc 0", ifname);
8362 if (system(buf) != 0) {
8363 sigma_dut_print(dut, DUT_MSG_ERROR,
8364 "iwpriv tx_stbc 0 failed!");
8365 }
8366
8367 /* Extract Channel width */
8368 val = get_param(cmd, "Channel_width");
8369 if (val) {
8370 switch (atoi(val)) {
8371 case 20:
8372 chwidth = 0;
8373 break;
8374 case 40:
8375 chwidth = 1;
8376 break;
8377 case 80:
8378 chwidth = 2;
8379 break;
8380 case 160:
8381 chwidth = 3;
8382 break;
8383 default:
8384 chwidth = 2;
8385 break;
8386 }
8387
8388 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
8389 ifname, chwidth);
8390 if (system(buf) != 0) {
8391 sigma_dut_print(dut, DUT_MSG_ERROR,
8392 "iwpriv chwidth failed!");
8393 }
8394 }
8395
8396 /* Extract NSS */
8397 val = get_param(cmd, "NSS");
8398 if (val) {
8399 switch (atoi(val)) {
8400 case 1:
8401 nss = 1;
8402 break;
8403 case 2:
8404 nss = 3;
8405 break;
8406 case 3:
8407 nss = 7;
8408 break;
8409 default:
8410 /* We do not support NSS > 3 */
8411 nss = 3;
8412 break;
8413 }
8414 snprintf(buf, sizeof(buf),
8415 "iwpriv %s rxchainmask %d", ifname, nss);
8416 if (system(buf) != 0) {
8417 sigma_dut_print(dut, DUT_MSG_ERROR,
8418 "iwpriv rxchainmask failed!");
8419 }
8420 }
8421
8422 /* Opmode notify */
8423 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", ifname);
8424 if (system(buf) != 0) {
8425 sigma_dut_print(dut, DUT_MSG_ERROR,
8426 "iwpriv opmode_notify failed!");
8427 } else {
8428 sigma_dut_print(dut, DUT_MSG_INFO,
8429 "Sent out the notify frame!");
8430 }
8431 }
8432
8433 return 1;
8434}
8435
8436
8437static int cmd_sta_send_frame_vht(struct sigma_dut *dut,
8438 struct sigma_conn *conn,
8439 struct sigma_cmd *cmd)
8440{
8441 switch (get_driver_type()) {
8442 case DRIVER_ATHEROS:
8443 return ath_sta_send_frame_vht(dut, conn, cmd);
8444 default:
8445 send_resp(dut, conn, SIGMA_ERROR,
8446 "errorCode,Unsupported sta_set_frame(VHT) with the current driver");
8447 return 0;
8448 }
8449}
8450
8451
Lior David0fe101e2017-03-09 16:09:50 +02008452#ifdef __linux__
8453int wil6210_send_frame_60g(struct sigma_dut *dut, struct sigma_conn *conn,
8454 struct sigma_cmd *cmd)
8455{
8456 const char *frame_name = get_param(cmd, "framename");
8457 const char *mac = get_param(cmd, "dest_mac");
8458
8459 if (!frame_name || !mac) {
8460 sigma_dut_print(dut, DUT_MSG_ERROR,
8461 "framename and dest_mac must be provided");
8462 return -1;
8463 }
8464
8465 if (strcasecmp(frame_name, "brp") == 0) {
8466 const char *l_rx = get_param(cmd, "L-RX");
8467 int l_rx_i;
8468
8469 if (!l_rx) {
8470 sigma_dut_print(dut, DUT_MSG_ERROR,
8471 "L-RX must be provided");
8472 return -1;
8473 }
8474 l_rx_i = atoi(l_rx);
8475
8476 sigma_dut_print(dut, DUT_MSG_INFO,
8477 "dev_send_frame: BRP-RX, dest_mac %s, L-RX %s",
8478 mac, l_rx);
8479 if (l_rx_i != 16) {
8480 sigma_dut_print(dut, DUT_MSG_ERROR,
8481 "unsupported L-RX: %s", l_rx);
8482 return -1;
8483 }
8484
8485 if (wil6210_send_brp_rx(dut, mac, l_rx_i))
8486 return -1;
8487 } else if (strcasecmp(frame_name, "ssw") == 0) {
8488 sigma_dut_print(dut, DUT_MSG_INFO,
8489 "dev_send_frame: SLS, dest_mac %s", mac);
8490 if (wil6210_send_sls(dut, mac))
8491 return -1;
8492 } else {
8493 sigma_dut_print(dut, DUT_MSG_ERROR,
8494 "unsupported frame type: %s", frame_name);
8495 return -1;
8496 }
8497
8498 return 1;
8499}
8500#endif /* __linux__ */
8501
8502
8503static int cmd_sta_send_frame_60g(struct sigma_dut *dut,
8504 struct sigma_conn *conn,
8505 struct sigma_cmd *cmd)
8506{
8507 switch (get_driver_type()) {
8508#ifdef __linux__
8509 case DRIVER_WIL6210:
8510 return wil6210_send_frame_60g(dut, conn, cmd);
8511#endif /* __linux__ */
8512 default:
8513 send_resp(dut, conn, SIGMA_ERROR,
8514 "errorCode,Unsupported sta_set_frame(60G) with the current driver");
8515 return 0;
8516 }
8517}
8518
8519
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308520static int mbo_send_anqp_query(struct sigma_dut *dut, struct sigma_conn *conn,
8521 const char *intf, struct sigma_cmd *cmd)
8522{
8523 const char *val, *addr;
8524 char buf[100];
8525
8526 addr = get_param(cmd, "DestMac");
8527 if (!addr) {
8528 send_resp(dut, conn, SIGMA_INVALID,
8529 "ErrorCode,AP MAC address is missing");
8530 return 0;
8531 }
8532
8533 val = get_param(cmd, "ANQPQuery_ID");
8534 if (!val) {
8535 send_resp(dut, conn, SIGMA_INVALID,
8536 "ErrorCode,Missing ANQPQuery_ID");
8537 return 0;
8538 }
8539
8540 if (strcasecmp(val, "NeighborReportReq") == 0) {
8541 snprintf(buf, sizeof(buf), "ANQP_GET %s 272", addr);
8542 } else if (strcasecmp(val, "QueryListWithCellPref") == 0) {
8543 snprintf(buf, sizeof(buf), "ANQP_GET %s 272,mbo:2", addr);
8544 } else {
8545 sigma_dut_print(dut, DUT_MSG_ERROR, "Invalid ANQPQuery_ID: %s",
8546 val);
8547 send_resp(dut, conn, SIGMA_INVALID,
8548 "ErrorCode,Invalid ANQPQuery_ID");
8549 return 0;
8550 }
8551
Ashwini Patild174f2c2017-04-13 16:49:46 +05308552 /* Set gas_address3 field to IEEE 802.11-2012 standard compliant form
8553 * (Address3 = Wildcard BSSID when sent to not-associated AP;
8554 * if associated, AP BSSID).
8555 */
8556 if (wpa_command(intf, "SET gas_address3 1") < 0) {
8557 send_resp(dut, conn, SIGMA_ERROR,
8558 "ErrorCode,Failed to set gas_address3");
8559 return 0;
8560 }
8561
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308562 if (wpa_command(intf, buf) < 0) {
8563 send_resp(dut, conn, SIGMA_ERROR,
8564 "ErrorCode,Failed to send ANQP query");
8565 return 0;
8566 }
8567
8568 return 1;
8569}
8570
8571
8572static int mbo_cmd_sta_send_frame(struct sigma_dut *dut,
8573 struct sigma_conn *conn,
8574 const char *intf,
8575 struct sigma_cmd *cmd)
8576{
8577 const char *val = get_param(cmd, "FrameName");
8578
8579 if (val && strcasecmp(val, "ANQPQuery") == 0)
8580 return mbo_send_anqp_query(dut, conn, intf, cmd);
8581
8582 return 2;
8583}
8584
8585
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008586int cmd_sta_send_frame(struct sigma_dut *dut, struct sigma_conn *conn,
8587 struct sigma_cmd *cmd)
8588{
8589 const char *intf = get_param(cmd, "Interface");
8590 const char *val;
8591 enum send_frame_type frame;
8592 enum send_frame_protection protected;
8593 char buf[100];
8594 unsigned char addr[ETH_ALEN];
8595 int res;
8596
8597 val = get_param(cmd, "program");
8598 if (val == NULL)
8599 val = get_param(cmd, "frame");
8600 if (val && strcasecmp(val, "TDLS") == 0)
8601 return cmd_sta_send_frame_tdls(dut, conn, cmd);
8602 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008603 strcasecmp(val, "HS2-R2") == 0 ||
8604 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008605 return cmd_sta_send_frame_hs2(dut, conn, cmd);
8606 if (val && strcasecmp(val, "VHT") == 0)
8607 return cmd_sta_send_frame_vht(dut, conn, cmd);
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07008608 if (val && strcasecmp(val, "LOC") == 0)
8609 return loc_cmd_sta_send_frame(dut, conn, cmd);
Lior David0fe101e2017-03-09 16:09:50 +02008610 if (val && strcasecmp(val, "60GHz") == 0)
8611 return cmd_sta_send_frame_60g(dut, conn, cmd);
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308612 if (val && strcasecmp(val, "MBO") == 0) {
8613 res = mbo_cmd_sta_send_frame(dut, conn, intf, cmd);
8614 if (res != 2)
8615 return res;
8616 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008617
8618 val = get_param(cmd, "TD_DISC");
8619 if (val) {
8620 if (hwaddr_aton(val, addr) < 0)
8621 return -1;
8622 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", val);
8623 if (wpa_command(intf, buf) < 0) {
8624 send_resp(dut, conn, SIGMA_ERROR,
8625 "ErrorCode,Failed to send TDLS discovery");
8626 return 0;
8627 }
8628 return 1;
8629 }
8630
8631 val = get_param(cmd, "TD_Setup");
8632 if (val) {
8633 if (hwaddr_aton(val, addr) < 0)
8634 return -1;
8635 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", val);
8636 if (wpa_command(intf, buf) < 0) {
8637 send_resp(dut, conn, SIGMA_ERROR,
8638 "ErrorCode,Failed to start TDLS setup");
8639 return 0;
8640 }
8641 return 1;
8642 }
8643
8644 val = get_param(cmd, "TD_TearDown");
8645 if (val) {
8646 if (hwaddr_aton(val, addr) < 0)
8647 return -1;
8648 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", val);
8649 if (wpa_command(intf, buf) < 0) {
8650 send_resp(dut, conn, SIGMA_ERROR,
8651 "ErrorCode,Failed to tear down TDLS link");
8652 return 0;
8653 }
8654 return 1;
8655 }
8656
8657 val = get_param(cmd, "TD_ChannelSwitch");
8658 if (val) {
8659 /* TODO */
8660 send_resp(dut, conn, SIGMA_ERROR,
8661 "ErrorCode,TD_ChannelSwitch not yet supported");
8662 return 0;
8663 }
8664
8665 val = get_param(cmd, "TD_NF");
8666 if (val) {
8667 /* TODO */
8668 send_resp(dut, conn, SIGMA_ERROR,
8669 "ErrorCode,TD_NF not yet supported");
8670 return 0;
8671 }
8672
8673 val = get_param(cmd, "PMFFrameType");
8674 if (val == NULL)
8675 val = get_param(cmd, "FrameName");
8676 if (val == NULL)
8677 val = get_param(cmd, "Type");
8678 if (val == NULL)
8679 return -1;
8680 if (strcasecmp(val, "disassoc") == 0)
8681 frame = DISASSOC;
8682 else if (strcasecmp(val, "deauth") == 0)
8683 frame = DEAUTH;
8684 else if (strcasecmp(val, "saquery") == 0)
8685 frame = SAQUERY;
8686 else if (strcasecmp(val, "auth") == 0)
8687 frame = AUTH;
8688 else if (strcasecmp(val, "assocreq") == 0)
8689 frame = ASSOCREQ;
8690 else if (strcasecmp(val, "reassocreq") == 0)
8691 frame = REASSOCREQ;
8692 else if (strcasecmp(val, "neigreq") == 0) {
8693 sigma_dut_print(dut, DUT_MSG_INFO, "Got neighbor request");
8694
8695 val = get_param(cmd, "ssid");
8696 if (val == NULL)
8697 return -1;
8698
8699 res = send_neighbor_request(dut, intf, val);
8700 if (res) {
8701 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8702 "Failed to send neighbor report request");
8703 return 0;
8704 }
8705
8706 return 1;
Ashwini Patil5acd7382017-04-13 15:55:04 +05308707 } else if (strcasecmp(val, "transmgmtquery") == 0 ||
8708 strcasecmp(val, "BTMQuery") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008709 sigma_dut_print(dut, DUT_MSG_DEBUG,
8710 "Got Transition Management Query");
8711
Ashwini Patil5acd7382017-04-13 15:55:04 +05308712 res = send_trans_mgmt_query(dut, intf, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008713 if (res) {
8714 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8715 "Failed to send Transition Management Query");
8716 return 0;
8717 }
8718
8719 return 1;
8720 } else {
8721 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8722 "PMFFrameType");
8723 return 0;
8724 }
8725
8726 val = get_param(cmd, "PMFProtected");
8727 if (val == NULL)
8728 val = get_param(cmd, "Protected");
8729 if (val == NULL)
8730 return -1;
8731 if (strcasecmp(val, "Correct-key") == 0 ||
8732 strcasecmp(val, "CorrectKey") == 0)
8733 protected = CORRECT_KEY;
8734 else if (strcasecmp(val, "IncorrectKey") == 0)
8735 protected = INCORRECT_KEY;
8736 else if (strcasecmp(val, "Unprotected") == 0)
8737 protected = UNPROTECTED;
8738 else {
8739 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8740 "PMFProtected");
8741 return 0;
8742 }
8743
8744 if (protected != UNPROTECTED &&
8745 (frame == AUTH || frame == ASSOCREQ || frame == REASSOCREQ)) {
8746 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Impossible "
8747 "PMFProtected for auth/assocreq/reassocreq");
8748 return 0;
8749 }
8750
8751 if (if_nametoindex("sigmadut") == 0) {
8752 snprintf(buf, sizeof(buf),
8753 "iw dev %s interface add sigmadut type monitor",
8754 get_station_ifname());
8755 if (system(buf) != 0 ||
8756 if_nametoindex("sigmadut") == 0) {
8757 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8758 "monitor interface with '%s'", buf);
8759 return -2;
8760 }
8761 }
8762
8763 if (system("ifconfig sigmadut up") != 0) {
8764 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8765 "monitor interface up");
8766 return -2;
8767 }
8768
8769 return sta_inject_frame(dut, conn, frame, protected, NULL);
8770}
8771
8772
8773static int cmd_sta_set_parameter_hs2(struct sigma_dut *dut,
8774 struct sigma_conn *conn,
8775 struct sigma_cmd *cmd,
8776 const char *ifname)
8777{
8778 char buf[200];
8779 const char *val;
8780
8781 val = get_param(cmd, "ClearARP");
8782 if (val && atoi(val) == 1) {
8783 snprintf(buf, sizeof(buf), "ip neigh flush dev %s", ifname);
8784 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8785 if (system(buf) != 0) {
8786 send_resp(dut, conn, SIGMA_ERROR,
8787 "errorCode,Failed to clear ARP cache");
8788 return 0;
8789 }
8790 }
8791
8792 return 1;
8793}
8794
8795
8796int cmd_sta_set_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
8797 struct sigma_cmd *cmd)
8798{
8799 const char *intf = get_param(cmd, "Interface");
8800 const char *val;
8801
8802 if (intf == NULL)
8803 return -1;
8804
8805 val = get_param(cmd, "program");
8806 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008807 strcasecmp(val, "HS2-R2") == 0 ||
8808 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008809 return cmd_sta_set_parameter_hs2(dut, conn, cmd, intf);
8810
8811 return -1;
8812}
8813
8814
8815static int cmd_sta_set_macaddr(struct sigma_dut *dut, struct sigma_conn *conn,
8816 struct sigma_cmd *cmd)
8817{
8818 const char *intf = get_param(cmd, "Interface");
8819 const char *mac = get_param(cmd, "MAC");
8820
8821 if (intf == NULL || mac == NULL)
8822 return -1;
8823
8824 sigma_dut_print(dut, DUT_MSG_INFO, "Change local MAC address for "
8825 "interface %s to %s", intf, mac);
8826
8827 if (dut->set_macaddr) {
8828 char buf[128];
8829 int res;
8830 if (strcasecmp(mac, "default") == 0) {
8831 res = snprintf(buf, sizeof(buf), "%s",
8832 dut->set_macaddr);
8833 dut->tmp_mac_addr = 0;
8834 } else {
8835 res = snprintf(buf, sizeof(buf), "%s %s",
8836 dut->set_macaddr, mac);
8837 dut->tmp_mac_addr = 1;
8838 }
8839 if (res < 0 || res >= (int) sizeof(buf))
8840 return -1;
8841 if (system(buf) != 0) {
8842 send_resp(dut, conn, SIGMA_ERROR,
8843 "errorCode,Failed to set MAC "
8844 "address");
8845 return 0;
8846 }
8847 return 1;
8848 }
8849
8850 if (strcasecmp(mac, "default") == 0)
8851 return 1;
8852
8853 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8854 "command");
8855 return 0;
8856}
8857
8858
8859static int iwpriv_tdlsoffchnmode(struct sigma_dut *dut,
8860 struct sigma_conn *conn, const char *intf,
8861 int val)
8862{
8863 char buf[200];
8864 int res;
8865
8866 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchnmode %d",
8867 intf, val);
8868 if (res < 0 || res >= (int) sizeof(buf))
8869 return -1;
8870 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8871 if (system(buf) != 0) {
8872 send_resp(dut, conn, SIGMA_ERROR,
8873 "errorCode,Failed to configure offchannel mode");
8874 return 0;
8875 }
8876
8877 return 1;
8878}
8879
8880
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008881static int off_chan_val(enum sec_ch_offset off)
8882{
8883 switch (off) {
8884 case SEC_CH_NO:
8885 return 0;
8886 case SEC_CH_40ABOVE:
8887 return 40;
8888 case SEC_CH_40BELOW:
8889 return -40;
8890 }
8891
8892 return 0;
8893}
8894
8895
8896static int iwpriv_set_offchan(struct sigma_dut *dut, struct sigma_conn *conn,
8897 const char *intf, int off_ch_num,
8898 enum sec_ch_offset sec)
8899{
8900 char buf[200];
8901 int res;
8902
8903 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchan %d",
8904 intf, off_ch_num);
8905 if (res < 0 || res >= (int) sizeof(buf))
8906 return -1;
8907 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8908 if (system(buf) != 0) {
8909 send_resp(dut, conn, SIGMA_ERROR,
8910 "errorCode,Failed to set offchan");
8911 return 0;
8912 }
8913
8914 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsecchnoffst %d",
8915 intf, off_chan_val(sec));
8916 if (res < 0 || res >= (int) sizeof(buf))
8917 return -1;
8918 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8919 if (system(buf) != 0) {
8920 send_resp(dut, conn, SIGMA_ERROR,
8921 "errorCode,Failed to set sec chan offset");
8922 return 0;
8923 }
8924
8925 return 1;
8926}
8927
8928
8929static int tdls_set_offchannel_offset(struct sigma_dut *dut,
8930 struct sigma_conn *conn,
8931 const char *intf, int off_ch_num,
8932 enum sec_ch_offset sec)
8933{
8934 char buf[200];
8935 int res;
8936
8937 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNEL %d",
8938 off_ch_num);
8939 if (res < 0 || res >= (int) sizeof(buf))
8940 return -1;
8941 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8942
8943 if (wpa_command(intf, buf) < 0) {
8944 send_resp(dut, conn, SIGMA_ERROR,
8945 "ErrorCode,Failed to set offchan");
8946 return 0;
8947 }
8948 res = snprintf(buf, sizeof(buf), "DRIVER TDLSSECONDARYCHANNELOFFSET %d",
8949 off_chan_val(sec));
8950 if (res < 0 || res >= (int) sizeof(buf))
8951 return -1;
8952
8953 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8954
8955 if (wpa_command(intf, buf) < 0) {
8956 send_resp(dut, conn, SIGMA_ERROR,
8957 "ErrorCode,Failed to set sec chan offset");
8958 return 0;
8959 }
8960
8961 return 1;
8962}
8963
8964
8965static int tdls_set_offchannel_mode(struct sigma_dut *dut,
8966 struct sigma_conn *conn,
8967 const char *intf, int val)
8968{
8969 char buf[200];
8970 int res;
8971
8972 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNELMODE %d",
8973 val);
8974 if (res < 0 || res >= (int) sizeof(buf))
8975 return -1;
8976 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8977
8978 if (wpa_command(intf, buf) < 0) {
8979 send_resp(dut, conn, SIGMA_ERROR,
8980 "ErrorCode,Failed to configure offchannel mode");
8981 return 0;
8982 }
8983
8984 return 1;
8985}
8986
8987
8988static int cmd_sta_set_rfeature_tdls(const char *intf, struct sigma_dut *dut,
8989 struct sigma_conn *conn,
8990 struct sigma_cmd *cmd)
8991{
8992 const char *val;
8993 enum {
8994 CHSM_NOT_SET,
8995 CHSM_ENABLE,
8996 CHSM_DISABLE,
8997 CHSM_REJREQ,
8998 CHSM_UNSOLRESP
8999 } chsm = CHSM_NOT_SET;
9000 int off_ch_num = -1;
9001 enum sec_ch_offset sec_ch = SEC_CH_NO;
9002 int res;
9003
9004 val = get_param(cmd, "Uapsd");
9005 if (val) {
9006 char buf[100];
9007 if (strcasecmp(val, "Enable") == 0)
9008 snprintf(buf, sizeof(buf), "SET ps 99");
9009 else if (strcasecmp(val, "Disable") == 0)
9010 snprintf(buf, sizeof(buf), "SET ps 98");
9011 else {
9012 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
9013 "Unsupported uapsd parameter value");
9014 return 0;
9015 }
9016 if (wpa_command(intf, buf)) {
9017 send_resp(dut, conn, SIGMA_ERROR,
9018 "ErrorCode,Failed to change U-APSD "
9019 "powersave mode");
9020 return 0;
9021 }
9022 }
9023
9024 val = get_param(cmd, "TPKTIMER");
9025 if (val && strcasecmp(val, "DISABLE") == 0) {
9026 if (wpa_command(intf, "SET tdls_testing 0x100")) {
9027 send_resp(dut, conn, SIGMA_ERROR,
9028 "ErrorCode,Failed to enable no TPK "
9029 "expiration test mode");
9030 return 0;
9031 }
9032 dut->no_tpk_expiration = 1;
9033 }
9034
9035 val = get_param(cmd, "ChSwitchMode");
9036 if (val) {
9037 if (strcasecmp(val, "Enable") == 0 ||
9038 strcasecmp(val, "Initiate") == 0)
9039 chsm = CHSM_ENABLE;
9040 else if (strcasecmp(val, "Disable") == 0 ||
9041 strcasecmp(val, "passive") == 0)
9042 chsm = CHSM_DISABLE;
9043 else if (strcasecmp(val, "RejReq") == 0)
9044 chsm = CHSM_REJREQ;
9045 else if (strcasecmp(val, "UnSolResp") == 0)
9046 chsm = CHSM_UNSOLRESP;
9047 else {
9048 send_resp(dut, conn, SIGMA_ERROR,
9049 "ErrorCode,Unknown ChSwitchMode value");
9050 return 0;
9051 }
9052 }
9053
9054 val = get_param(cmd, "OffChNum");
9055 if (val) {
9056 off_ch_num = atoi(val);
9057 if (off_ch_num == 0) {
9058 send_resp(dut, conn, SIGMA_ERROR,
9059 "ErrorCode,Invalid OffChNum");
9060 return 0;
9061 }
9062 }
9063
9064 val = get_param(cmd, "SecChOffset");
9065 if (val) {
9066 if (strcmp(val, "20") == 0)
9067 sec_ch = SEC_CH_NO;
9068 else if (strcasecmp(val, "40above") == 0)
9069 sec_ch = SEC_CH_40ABOVE;
9070 else if (strcasecmp(val, "40below") == 0)
9071 sec_ch = SEC_CH_40BELOW;
9072 else {
9073 send_resp(dut, conn, SIGMA_ERROR,
9074 "ErrorCode,Unknown SecChOffset value");
9075 return 0;
9076 }
9077 }
9078
9079 if (chsm == CHSM_NOT_SET) {
9080 /* no offchannel changes requested */
9081 return 1;
9082 }
9083
9084 if (strcmp(intf, get_main_ifname()) != 0 &&
9085 strcmp(intf, get_station_ifname()) != 0) {
9086 send_resp(dut, conn, SIGMA_ERROR,
9087 "ErrorCode,Unknown interface");
9088 return 0;
9089 }
9090
9091 switch (chsm) {
9092 case CHSM_NOT_SET:
Jouni Malinen280f5ba2016-08-29 21:33:10 +03009093 res = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009094 break;
9095 case CHSM_ENABLE:
9096 if (off_ch_num < 0) {
9097 send_resp(dut, conn, SIGMA_ERROR,
9098 "ErrorCode,Missing OffChNum argument");
9099 return 0;
9100 }
9101 if (wifi_chip_type == DRIVER_WCN) {
9102 res = tdls_set_offchannel_offset(dut, conn, intf,
9103 off_ch_num, sec_ch);
9104 } else {
9105 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9106 sec_ch);
9107 }
9108 if (res != 1)
9109 return res;
9110 if (wifi_chip_type == DRIVER_WCN)
9111 res = tdls_set_offchannel_mode(dut, conn, intf, 1);
9112 else
9113 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 1);
9114 break;
9115 case CHSM_DISABLE:
9116 if (wifi_chip_type == DRIVER_WCN)
9117 res = tdls_set_offchannel_mode(dut, conn, intf, 2);
9118 else
9119 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 2);
9120 break;
9121 case CHSM_REJREQ:
9122 if (wifi_chip_type == DRIVER_WCN)
9123 res = tdls_set_offchannel_mode(dut, conn, intf, 3);
9124 else
9125 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 3);
9126 break;
9127 case CHSM_UNSOLRESP:
9128 if (off_ch_num < 0) {
9129 send_resp(dut, conn, SIGMA_ERROR,
9130 "ErrorCode,Missing OffChNum argument");
9131 return 0;
9132 }
9133 if (wifi_chip_type == DRIVER_WCN) {
9134 res = tdls_set_offchannel_offset(dut, conn, intf,
9135 off_ch_num, sec_ch);
9136 } else {
9137 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9138 sec_ch);
9139 }
9140 if (res != 1)
9141 return res;
9142 if (wifi_chip_type == DRIVER_WCN)
9143 res = tdls_set_offchannel_mode(dut, conn, intf, 4);
9144 else
9145 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 4);
9146 break;
9147 }
9148
9149 return res;
9150}
9151
9152
9153static int ath_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9154 struct sigma_conn *conn,
9155 struct sigma_cmd *cmd)
9156{
9157 const char *val;
9158 char *token, *result;
9159
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08009160 novap_reset(dut, intf);
9161
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009162 val = get_param(cmd, "nss_mcs_opt");
9163 if (val) {
9164 /* String (nss_operating_mode; mcs_operating_mode) */
9165 int nss, mcs;
9166 char buf[50];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309167 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009168
9169 token = strdup(val);
9170 if (!token)
9171 return 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309172 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309173 if (!result) {
9174 sigma_dut_print(dut, DUT_MSG_ERROR,
9175 "VHT NSS not specified");
9176 goto failed;
9177 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009178 if (strcasecmp(result, "def") != 0) {
9179 nss = atoi(result);
9180 if (nss == 4)
9181 ath_disable_txbf(dut, intf);
9182 snprintf(buf, sizeof(buf), "iwpriv %s nss %d",
9183 intf, nss);
9184 if (system(buf) != 0) {
9185 sigma_dut_print(dut, DUT_MSG_ERROR,
9186 "iwpriv nss failed");
9187 goto failed;
9188 }
9189 }
9190
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309191 result = strtok_r(NULL, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309192 if (!result) {
9193 sigma_dut_print(dut, DUT_MSG_ERROR,
9194 "VHT MCS not specified");
9195 goto failed;
9196 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009197 if (strcasecmp(result, "def") == 0) {
9198 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0",
9199 intf);
9200 if (system(buf) != 0) {
9201 sigma_dut_print(dut, DUT_MSG_ERROR,
9202 "iwpriv set11NRates failed");
9203 goto failed;
9204 }
9205
9206 } else {
9207 mcs = atoi(result);
9208 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
9209 intf, mcs);
9210 if (system(buf) != 0) {
9211 sigma_dut_print(dut, DUT_MSG_ERROR,
9212 "iwpriv vhtmcs failed");
9213 goto failed;
9214 }
9215 }
9216 /* Channel width gets messed up, fix this */
9217 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
9218 intf, dut->chwidth);
9219 if (system(buf) != 0) {
9220 sigma_dut_print(dut, DUT_MSG_ERROR,
9221 "iwpriv chwidth failed");
9222 }
9223 }
9224
9225 return 1;
9226failed:
9227 free(token);
9228 return 0;
9229}
9230
9231
9232static int cmd_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9233 struct sigma_conn *conn,
9234 struct sigma_cmd *cmd)
9235{
9236 switch (get_driver_type()) {
9237 case DRIVER_ATHEROS:
9238 return ath_sta_set_rfeature_vht(intf, dut, conn, cmd);
9239 default:
9240 send_resp(dut, conn, SIGMA_ERROR,
9241 "errorCode,Unsupported sta_set_rfeature(VHT) with the current driver");
9242 return 0;
9243 }
9244}
9245
9246
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009247static int wcn_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9248 struct sigma_conn *conn,
9249 struct sigma_cmd *cmd)
9250{
9251 const char *val;
9252 char *token = NULL, *result;
9253 char buf[60];
9254
9255 val = get_param(cmd, "nss_mcs_opt");
9256 if (val) {
9257 /* String (nss_operating_mode; mcs_operating_mode) */
9258 int nss, mcs, ratecode;
9259 char *saveptr;
9260
9261 token = strdup(val);
9262 if (!token)
9263 return -2;
9264
9265 result = strtok_r(token, ";", &saveptr);
9266 if (!result) {
9267 sigma_dut_print(dut, DUT_MSG_ERROR,
9268 "HE NSS not specified");
9269 goto failed;
9270 }
9271 nss = 1;
9272 if (strcasecmp(result, "def") != 0)
9273 nss = atoi(result);
9274
9275 result = strtok_r(NULL, ";", &saveptr);
9276 if (!result) {
9277 sigma_dut_print(dut, DUT_MSG_ERROR,
9278 "HE MCS not specified");
9279 goto failed;
9280 }
9281 mcs = 7;
9282 if (strcasecmp(result, "def") != 0)
9283 mcs = atoi(result);
9284
Arif Hussain557bf412018-05-25 17:29:36 -07009285 ratecode = 0x20; /* for nss:1 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009286 if (nss == 2) {
Arif Hussain557bf412018-05-25 17:29:36 -07009287 ratecode = 0x40; /* for nss:2 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009288 } else if (nss > 2) {
9289 sigma_dut_print(dut, DUT_MSG_ERROR,
9290 "HE NSS %d not supported", nss);
9291 goto failed;
9292 }
9293
Arif Hussain557bf412018-05-25 17:29:36 -07009294 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
9295 if (system(buf) != 0) {
9296 sigma_dut_print(dut, DUT_MSG_ERROR,
9297 "nss_mcs_opt: iwpriv %s nss %d failed",
9298 intf, nss);
9299 goto failed;
9300 }
Arif Hussainac6c5112018-05-25 17:34:00 -07009301 dut->sta_nss = nss;
Arif Hussain557bf412018-05-25 17:29:36 -07009302
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009303 /* Add the MCS to the ratecode */
9304 if (mcs >= 0 && mcs <= 11) {
9305 ratecode += mcs;
Arif Hussain557bf412018-05-25 17:29:36 -07009306#ifdef NL80211_SUPPORT
9307 if (dut->device_type == STA_testbed) {
9308 enum he_mcs_config mcs_config;
9309 int ret;
9310
9311 if (mcs <= 7)
9312 mcs_config = HE_80_MCS0_7;
9313 else if (mcs <= 9)
9314 mcs_config = HE_80_MCS0_9;
9315 else
9316 mcs_config = HE_80_MCS0_11;
9317 ret = sta_set_he_mcs(dut, intf, mcs_config);
9318 if (ret) {
9319 sigma_dut_print(dut, DUT_MSG_ERROR,
9320 "nss_mcs_opt: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
9321 mcs, mcs_config, ret);
9322 goto failed;
9323 }
9324 }
9325#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009326 } else {
9327 sigma_dut_print(dut, DUT_MSG_ERROR,
9328 "HE MCS %d not supported", mcs);
9329 goto failed;
9330 }
9331 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0x%03x",
9332 intf, ratecode);
9333 if (system(buf) != 0) {
9334 sigma_dut_print(dut, DUT_MSG_ERROR,
9335 "iwpriv setting of 11ax rates failed");
9336 goto failed;
9337 }
9338 free(token);
9339 }
9340
9341 val = get_param(cmd, "GI");
9342 if (val) {
9343 if (strcmp(val, "0.8") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009344 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 9", intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009345 } else if (strcmp(val, "1.6") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009346 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 10",
9347 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009348 } else if (strcmp(val, "3.2") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009349 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 11",
9350 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009351 } else {
9352 send_resp(dut, conn, SIGMA_ERROR,
9353 "errorCode,GI value not supported");
9354 return 0;
9355 }
9356 if (system(buf) != 0) {
9357 send_resp(dut, conn, SIGMA_ERROR,
9358 "errorCode,Failed to set shortgi");
9359 return 0;
9360 }
9361 }
9362
Subhani Shaik8e7a3052018-04-24 14:03:00 -07009363 val = get_param(cmd, "LTF");
9364 if (val) {
9365#ifdef NL80211_SUPPORT
9366 if (strcmp(val, "3.2") == 0) {
9367 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_1X);
9368 } if (strcmp(val, "6.4") == 0) {
9369 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_2X);
9370 } else if (strcmp(val, "12.8") == 0) {
9371 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_4X);
9372 } else {
9373 send_resp(dut, conn, SIGMA_ERROR,
9374 "errorCode, LTF value not supported");
9375 return 0;
9376 }
9377#else /* NL80211_SUPPORT */
9378 sigma_dut_print(dut, DUT_MSG_ERROR,
9379 "LTF cannot be set without NL80211_SUPPORT defined");
9380 return -2;
9381#endif /* NL80211_SUPPORT */
9382 }
9383
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009384 return 1;
9385
9386failed:
9387 free(token);
9388 return -2;
9389}
9390
9391
9392static int cmd_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9393 struct sigma_conn *conn,
9394 struct sigma_cmd *cmd)
9395{
9396 switch (get_driver_type()) {
9397 case DRIVER_WCN:
9398 return wcn_sta_set_rfeature_he(intf, dut, conn, cmd);
9399 default:
9400 send_resp(dut, conn, SIGMA_ERROR,
9401 "errorCode,Unsupported sta_set_rfeature(HE) with the current driver");
9402 return 0;
9403 }
9404}
9405
9406
Ashwini Patil5acd7382017-04-13 15:55:04 +05309407static int btm_query_candidate_list(struct sigma_dut *dut,
9408 struct sigma_conn *conn,
9409 struct sigma_cmd *cmd)
9410{
9411 const char *bssid, *info, *op_class, *ch, *phy_type, *pref;
9412 int len, ret;
9413 char buf[10];
9414
9415 /*
9416 * Neighbor Report elements format:
9417 * neighbor=<BSSID>,<BSSID Information>,<Operating Class>,
9418 * <Channel Number>,<PHY Type>[,<hexdump of Optional Subelements>]
9419 * eg: neighbor=aa:bb:cc:dd:ee:ff,17,81,6,1,030101
9420 */
9421
9422 bssid = get_param(cmd, "Nebor_BSSID");
9423 if (!bssid) {
9424 send_resp(dut, conn, SIGMA_INVALID,
9425 "errorCode,Nebor_BSSID is missing");
9426 return 0;
9427 }
9428
9429 info = get_param(cmd, "Nebor_Bssid_Info");
9430 if (!info) {
9431 sigma_dut_print(dut, DUT_MSG_INFO,
9432 "Using default value for Nebor_Bssid_Info: %s",
9433 DEFAULT_NEIGHBOR_BSSID_INFO);
9434 info = DEFAULT_NEIGHBOR_BSSID_INFO;
9435 }
9436
9437 op_class = get_param(cmd, "Nebor_Op_Class");
9438 if (!op_class) {
9439 send_resp(dut, conn, SIGMA_INVALID,
9440 "errorCode,Nebor_Op_Class is missing");
9441 return 0;
9442 }
9443
9444 ch = get_param(cmd, "Nebor_Op_Ch");
9445 if (!ch) {
9446 send_resp(dut, conn, SIGMA_INVALID,
9447 "errorCode,Nebor_Op_Ch is missing");
9448 return 0;
9449 }
9450
9451 phy_type = get_param(cmd, "Nebor_Phy_Type");
9452 if (!phy_type) {
9453 sigma_dut_print(dut, DUT_MSG_INFO,
9454 "Using default value for Nebor_Phy_Type: %s",
9455 DEFAULT_NEIGHBOR_PHY_TYPE);
9456 phy_type = DEFAULT_NEIGHBOR_PHY_TYPE;
9457 }
9458
9459 /* Parse optional subelements */
9460 buf[0] = '\0';
9461 pref = get_param(cmd, "Nebor_Pref");
9462 if (pref) {
9463 /* hexdump for preferrence subelement */
9464 ret = snprintf(buf, sizeof(buf), ",0301%02x", atoi(pref));
9465 if (ret < 0 || ret >= (int) sizeof(buf)) {
9466 sigma_dut_print(dut, DUT_MSG_ERROR,
9467 "snprintf failed for optional subelement ret: %d",
9468 ret);
9469 send_resp(dut, conn, SIGMA_ERROR,
9470 "errorCode,snprintf failed for subelement");
9471 return 0;
9472 }
9473 }
9474
9475 if (!dut->btm_query_cand_list) {
9476 dut->btm_query_cand_list = calloc(1, NEIGHBOR_REPORT_SIZE);
9477 if (!dut->btm_query_cand_list) {
9478 send_resp(dut, conn, SIGMA_ERROR,
9479 "errorCode,Failed to allocate memory for btm_query_cand_list");
9480 return 0;
9481 }
9482 }
9483
9484 len = strlen(dut->btm_query_cand_list);
9485 ret = snprintf(dut->btm_query_cand_list + len,
9486 NEIGHBOR_REPORT_SIZE - len, " neighbor=%s,%s,%s,%s,%s%s",
9487 bssid, info, op_class, ch, phy_type, buf);
9488 if (ret < 0 || ret >= NEIGHBOR_REPORT_SIZE - len) {
9489 sigma_dut_print(dut, DUT_MSG_ERROR,
9490 "snprintf failed for neighbor report list ret: %d",
9491 ret);
9492 send_resp(dut, conn, SIGMA_ERROR,
9493 "errorCode,snprintf failed for neighbor report");
9494 free(dut->btm_query_cand_list);
9495 dut->btm_query_cand_list = NULL;
9496 return 0;
9497 }
9498
9499 return 1;
9500}
9501
9502
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009503static int cmd_sta_set_rfeature(struct sigma_dut *dut, struct sigma_conn *conn,
9504 struct sigma_cmd *cmd)
9505{
9506 const char *intf = get_param(cmd, "Interface");
9507 const char *prog = get_param(cmd, "Prog");
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309508 const char *val;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009509
9510 if (intf == NULL || prog == NULL)
9511 return -1;
9512
Ashwini Patil5acd7382017-04-13 15:55:04 +05309513 /* BSS Transition candidate list for BTM query */
9514 val = get_param(cmd, "Nebor_BSSID");
9515 if (val && btm_query_candidate_list(dut, conn, cmd) == 0)
9516 return 0;
9517
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009518 if (strcasecmp(prog, "TDLS") == 0)
9519 return cmd_sta_set_rfeature_tdls(intf, dut, conn, cmd);
9520
9521 if (strcasecmp(prog, "VHT") == 0)
9522 return cmd_sta_set_rfeature_vht(intf, dut, conn, cmd);
9523
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009524 if (strcasecmp(prog, "HE") == 0)
9525 return cmd_sta_set_rfeature_he(intf, dut, conn, cmd);
9526
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309527 if (strcasecmp(prog, "MBO") == 0) {
9528 val = get_param(cmd, "Cellular_Data_Cap");
9529 if (val &&
9530 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
9531 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05309532
9533 val = get_param(cmd, "Ch_Pref");
9534 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
9535 return 0;
9536
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309537 return 1;
9538 }
9539
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009540 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported Prog");
9541 return 0;
9542}
9543
9544
9545static int cmd_sta_set_radio(struct sigma_dut *dut, struct sigma_conn *conn,
9546 struct sigma_cmd *cmd)
9547{
9548 const char *intf = get_param(cmd, "Interface");
9549 const char *mode = get_param(cmd, "Mode");
9550 int res;
9551
9552 if (intf == NULL || mode == NULL)
9553 return -1;
9554
9555 if (strcasecmp(mode, "On") == 0)
9556 res = wpa_command(intf, "SET radio_disabled 0");
9557 else if (strcasecmp(mode, "Off") == 0)
9558 res = wpa_command(intf, "SET radio_disabled 1");
9559 else
9560 return -1;
9561
9562 if (res) {
9563 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9564 "radio mode");
9565 return 0;
9566 }
9567
9568 return 1;
9569}
9570
9571
9572static int cmd_sta_set_pwrsave(struct sigma_dut *dut, struct sigma_conn *conn,
9573 struct sigma_cmd *cmd)
9574{
9575 const char *intf = get_param(cmd, "Interface");
9576 const char *mode = get_param(cmd, "Mode");
9577 int res;
9578
9579 if (intf == NULL || mode == NULL)
9580 return -1;
9581
9582 if (strcasecmp(mode, "On") == 0)
9583 res = set_ps(intf, dut, 1);
9584 else if (strcasecmp(mode, "Off") == 0)
9585 res = set_ps(intf, dut, 0);
9586 else
9587 return -1;
9588
9589 if (res) {
9590 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9591 "power save mode");
9592 return 0;
9593 }
9594
9595 return 1;
9596}
9597
9598
9599static int cmd_sta_bssid_pool(struct sigma_dut *dut, struct sigma_conn *conn,
9600 struct sigma_cmd *cmd)
9601{
9602 const char *intf = get_param(cmd, "Interface");
9603 const char *val, *bssid;
9604 int res;
9605 char *buf;
9606 size_t buf_len;
9607
9608 val = get_param(cmd, "BSSID_FILTER");
9609 if (val == NULL)
9610 return -1;
9611
9612 bssid = get_param(cmd, "BSSID_List");
9613 if (atoi(val) == 0 || bssid == NULL) {
9614 /* Disable BSSID filter */
9615 if (wpa_command(intf, "SET bssid_filter ")) {
9616 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed "
9617 "to disable BSSID filter");
9618 return 0;
9619 }
9620
9621 return 1;
9622 }
9623
9624 buf_len = 100 + strlen(bssid);
9625 buf = malloc(buf_len);
9626 if (buf == NULL)
9627 return -1;
9628
9629 snprintf(buf, buf_len, "SET bssid_filter %s", bssid);
9630 res = wpa_command(intf, buf);
9631 free(buf);
9632 if (res) {
9633 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to enable "
9634 "BSSID filter");
9635 return 0;
9636 }
9637
9638 return 1;
9639}
9640
9641
9642static int cmd_sta_reset_parm(struct sigma_dut *dut, struct sigma_conn *conn,
9643 struct sigma_cmd *cmd)
9644{
9645 const char *intf = get_param(cmd, "Interface");
9646 const char *val;
9647
9648 /* TODO: ARP */
9649
9650 val = get_param(cmd, "HS2_CACHE_PROFILE");
9651 if (val && strcasecmp(val, "All") == 0)
9652 hs2_clear_credentials(intf);
9653
9654 return 1;
9655}
9656
9657
9658static int cmd_sta_get_key(struct sigma_dut *dut, struct sigma_conn *conn,
9659 struct sigma_cmd *cmd)
9660{
9661 const char *intf = get_param(cmd, "Interface");
9662 const char *key_type = get_param(cmd, "KeyType");
9663 char buf[100], resp[200];
9664
9665 if (key_type == NULL)
9666 return -1;
9667
9668 if (strcasecmp(key_type, "GTK") == 0) {
9669 if (wpa_command_resp(intf, "GET gtk", buf, sizeof(buf)) < 0 ||
9670 strncmp(buf, "FAIL", 4) == 0) {
9671 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9672 "not fetch current GTK");
9673 return 0;
9674 }
9675 snprintf(resp, sizeof(resp), "KeyValue,%s", buf);
9676 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9677 return 0;
9678 } else {
9679 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
9680 "KeyType");
9681 return 0;
9682 }
9683
9684 return 1;
9685}
9686
9687
9688static int hs2_set_policy(struct sigma_dut *dut)
9689{
9690#ifdef ANDROID
9691 system("ip rule del prio 23000");
9692 if (system("ip rule add from all lookup main prio 23000") != 0) {
9693 sigma_dut_print(dut, DUT_MSG_ERROR,
9694 "Failed to run:ip rule add from all lookup main prio");
9695 return -1;
9696 }
9697 if (system("ip route flush cache") != 0) {
9698 sigma_dut_print(dut, DUT_MSG_ERROR,
9699 "Failed to run ip route flush cache");
9700 return -1;
9701 }
9702 return 1;
9703#else /* ANDROID */
9704 return 0;
9705#endif /* ANDROID */
9706}
9707
9708
9709static int cmd_sta_hs2_associate(struct sigma_dut *dut,
9710 struct sigma_conn *conn,
9711 struct sigma_cmd *cmd)
9712{
9713 const char *intf = get_param(cmd, "Interface");
9714 const char *val = get_param(cmd, "Ignore_blacklist");
9715 struct wpa_ctrl *ctrl;
9716 int res;
9717 char bssid[20], ssid[40], resp[100], buf[100], blacklisted[100];
9718 int tries = 0;
9719 int ignore_blacklist = 0;
9720 const char *events[] = {
9721 "CTRL-EVENT-CONNECTED",
9722 "INTERWORKING-BLACKLISTED",
9723 "INTERWORKING-NO-MATCH",
9724 NULL
9725 };
9726
9727 start_sta_mode(dut);
9728
9729 blacklisted[0] = '\0';
9730 if (val && atoi(val))
9731 ignore_blacklist = 1;
9732
9733try_again:
9734 ctrl = open_wpa_mon(intf);
9735 if (ctrl == NULL) {
9736 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
9737 "wpa_supplicant monitor connection");
9738 return -2;
9739 }
9740
9741 tries++;
9742 if (wpa_command(intf, "INTERWORKING_SELECT auto")) {
9743 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start "
9744 "Interworking connection");
9745 wpa_ctrl_detach(ctrl);
9746 wpa_ctrl_close(ctrl);
9747 return 0;
9748 }
9749
9750 buf[0] = '\0';
9751 while (1) {
9752 char *pos;
9753 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
9754 pos = strstr(buf, "INTERWORKING-BLACKLISTED");
9755 if (!pos)
9756 break;
9757 pos += 25;
9758 sigma_dut_print(dut, DUT_MSG_DEBUG, "Found blacklisted AP: %s",
9759 pos);
9760 if (!blacklisted[0])
9761 memcpy(blacklisted, pos, strlen(pos) + 1);
9762 }
9763
9764 if (ignore_blacklist && blacklisted[0]) {
9765 char *end;
9766 end = strchr(blacklisted, ' ');
9767 if (end)
9768 *end = '\0';
9769 sigma_dut_print(dut, DUT_MSG_DEBUG, "Try to connect to a blacklisted network: %s",
9770 blacklisted);
9771 snprintf(buf, sizeof(buf), "INTERWORKING_CONNECT %s",
9772 blacklisted);
9773 if (wpa_command(intf, buf)) {
9774 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start Interworking connection to blacklisted network");
9775 wpa_ctrl_detach(ctrl);
9776 wpa_ctrl_close(ctrl);
9777 return 0;
9778 }
9779 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
9780 buf, sizeof(buf));
9781 }
9782
9783 wpa_ctrl_detach(ctrl);
9784 wpa_ctrl_close(ctrl);
9785
9786 if (res < 0) {
9787 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9788 "connect");
9789 return 0;
9790 }
9791
9792 if (strstr(buf, "INTERWORKING-NO-MATCH") ||
9793 strstr(buf, "INTERWORKING-BLACKLISTED")) {
9794 if (tries < 2) {
9795 sigma_dut_print(dut, DUT_MSG_INFO, "No match found - try again to verify no APs were missed in the scan");
9796 goto try_again;
9797 }
9798 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,No network with "
9799 "matching credentials found");
9800 return 0;
9801 }
9802
9803 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
9804 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
9805 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9806 "get current BSSID/SSID");
9807 return 0;
9808 }
9809
9810 snprintf(resp, sizeof(resp), "SSID,%s,BSSID,%s", ssid, bssid);
9811 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9812 hs2_set_policy(dut);
9813 return 0;
9814}
9815
9816
9817static int sta_add_credential_uname_pwd(struct sigma_dut *dut,
9818 struct sigma_conn *conn,
9819 const char *ifname,
9820 struct sigma_cmd *cmd)
9821{
9822 const char *val;
9823 int id;
9824
9825 id = add_cred(ifname);
9826 if (id < 0)
9827 return -2;
9828 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9829
9830 val = get_param(cmd, "prefer");
9831 if (val && atoi(val) > 0)
9832 set_cred(ifname, id, "priority", "1");
9833
9834 val = get_param(cmd, "REALM");
9835 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
9836 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9837 "realm");
9838 return 0;
9839 }
9840
9841 val = get_param(cmd, "HOME_FQDN");
9842 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
9843 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9844 "home_fqdn");
9845 return 0;
9846 }
9847
9848 val = get_param(cmd, "Username");
9849 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
9850 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9851 "username");
9852 return 0;
9853 }
9854
9855 val = get_param(cmd, "Password");
9856 if (val && set_cred_quoted(ifname, id, "password", val) < 0) {
9857 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9858 "password");
9859 return 0;
9860 }
9861
9862 val = get_param(cmd, "ROOT_CA");
9863 if (val) {
9864 char fname[200];
9865 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
9866#ifdef __linux__
9867 if (!file_exists(fname)) {
9868 char msg[300];
9869 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
9870 "file (%s) not found", fname);
9871 send_resp(dut, conn, SIGMA_ERROR, msg);
9872 return 0;
9873 }
9874#endif /* __linux__ */
9875 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
9876 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9877 "not set root CA");
9878 return 0;
9879 }
9880 }
9881
9882 return 1;
9883}
9884
9885
9886static int update_devdetail_imsi(struct sigma_dut *dut, const char *imsi)
9887{
9888 FILE *in, *out;
9889 char buf[500];
9890 int found = 0;
9891
9892 in = fopen("devdetail.xml", "r");
9893 if (in == NULL)
9894 return -1;
9895 out = fopen("devdetail.xml.tmp", "w");
9896 if (out == NULL) {
9897 fclose(in);
9898 return -1;
9899 }
9900
9901 while (fgets(buf, sizeof(buf), in)) {
9902 char *pos = strstr(buf, "<IMSI>");
9903 if (pos) {
9904 sigma_dut_print(dut, DUT_MSG_INFO, "Updated DevDetail IMSI to %s",
9905 imsi);
9906 pos += 6;
9907 *pos = '\0';
9908 fprintf(out, "%s%s</IMSI>\n", buf, imsi);
9909 found++;
9910 } else {
9911 fprintf(out, "%s", buf);
9912 }
9913 }
9914
9915 fclose(out);
9916 fclose(in);
9917 if (found)
9918 rename("devdetail.xml.tmp", "devdetail.xml");
9919 else
9920 unlink("devdetail.xml.tmp");
9921
9922 return 0;
9923}
9924
9925
9926static int sta_add_credential_sim(struct sigma_dut *dut,
9927 struct sigma_conn *conn,
9928 const char *ifname, struct sigma_cmd *cmd)
9929{
9930 const char *val, *imsi = NULL;
9931 int id;
9932 char buf[200];
9933 int res;
9934 const char *pos;
9935 size_t mnc_len;
9936 char plmn_mcc[4];
9937 char plmn_mnc[4];
9938
9939 id = add_cred(ifname);
9940 if (id < 0)
9941 return -2;
9942 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9943
9944 val = get_param(cmd, "prefer");
9945 if (val && atoi(val) > 0)
9946 set_cred(ifname, id, "priority", "1");
9947
9948 val = get_param(cmd, "PLMN_MCC");
9949 if (val == NULL) {
9950 send_resp(dut, conn, SIGMA_ERROR,
9951 "errorCode,Missing PLMN_MCC");
9952 return 0;
9953 }
9954 if (strlen(val) != 3) {
9955 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MCC");
9956 return 0;
9957 }
9958 snprintf(plmn_mcc, sizeof(plmn_mcc), "%s", val);
9959
9960 val = get_param(cmd, "PLMN_MNC");
9961 if (val == NULL) {
9962 send_resp(dut, conn, SIGMA_ERROR,
9963 "errorCode,Missing PLMN_MNC");
9964 return 0;
9965 }
9966 if (strlen(val) != 2 && strlen(val) != 3) {
9967 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MNC");
9968 return 0;
9969 }
9970 snprintf(plmn_mnc, sizeof(plmn_mnc), "%s", val);
9971
9972 val = get_param(cmd, "IMSI");
9973 if (val == NULL) {
9974 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing SIM "
9975 "IMSI");
9976 return 0;
9977 }
9978
9979 imsi = pos = val;
9980
9981 if (strncmp(plmn_mcc, pos, 3) != 0) {
9982 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MCC mismatch");
9983 return 0;
9984 }
9985 pos += 3;
9986
9987 mnc_len = strlen(plmn_mnc);
9988 if (mnc_len < 2) {
9989 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC not set");
9990 return 0;
9991 }
9992
9993 if (strncmp(plmn_mnc, pos, mnc_len) != 0) {
9994 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC mismatch");
9995 return 0;
9996 }
9997 pos += mnc_len;
9998
9999 res = snprintf(buf, sizeof(buf), "%s%s-%s",plmn_mcc, plmn_mnc, pos);
10000 if (res < 0 || res >= (int) sizeof(buf))
10001 return -1;
10002 if (set_cred_quoted(ifname, id, "imsi", buf) < 0) {
10003 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10004 "not set IMSI");
10005 return 0;
10006 }
10007
10008 val = get_param(cmd, "Password");
10009 if (val && set_cred_quoted(ifname, id, "milenage", val) < 0) {
10010 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10011 "not set password");
10012 return 0;
10013 }
10014
Jouni Malinenba630452018-06-22 11:49:59 +030010015 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010016 /*
10017 * Set provisioning_sp for the test cases where SIM/USIM
10018 * provisioning is used.
10019 */
10020 if (val && set_cred_quoted(ifname, id, "provisioning_sp",
10021 "wi-fi.org") < 0) {
10022 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10023 "not set provisioning_sp");
10024 return 0;
10025 }
10026
10027 update_devdetail_imsi(dut, imsi);
10028 }
10029
10030 return 1;
10031}
10032
10033
10034static int sta_add_credential_cert(struct sigma_dut *dut,
10035 struct sigma_conn *conn,
10036 const char *ifname,
10037 struct sigma_cmd *cmd)
10038{
10039 const char *val;
10040 int id;
10041
10042 id = add_cred(ifname);
10043 if (id < 0)
10044 return -2;
10045 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
10046
10047 val = get_param(cmd, "prefer");
10048 if (val && atoi(val) > 0)
10049 set_cred(ifname, id, "priority", "1");
10050
10051 val = get_param(cmd, "REALM");
10052 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
10053 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10054 "realm");
10055 return 0;
10056 }
10057
10058 val = get_param(cmd, "HOME_FQDN");
10059 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
10060 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10061 "home_fqdn");
10062 return 0;
10063 }
10064
10065 val = get_param(cmd, "Username");
10066 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
10067 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10068 "username");
10069 return 0;
10070 }
10071
10072 val = get_param(cmd, "clientCertificate");
10073 if (val) {
10074 char fname[200];
10075 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10076#ifdef __linux__
10077 if (!file_exists(fname)) {
10078 char msg[300];
10079 snprintf(msg, sizeof(msg),
10080 "ErrorCode,clientCertificate "
10081 "file (%s) not found", fname);
10082 send_resp(dut, conn, SIGMA_ERROR, msg);
10083 return 0;
10084 }
10085#endif /* __linux__ */
10086 if (set_cred_quoted(ifname, id, "client_cert", fname) < 0) {
10087 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10088 "not set client_cert");
10089 return 0;
10090 }
10091 if (set_cred_quoted(ifname, id, "private_key", fname) < 0) {
10092 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10093 "not set private_key");
10094 return 0;
10095 }
10096 }
10097
10098 val = get_param(cmd, "ROOT_CA");
10099 if (val) {
10100 char fname[200];
10101 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10102#ifdef __linux__
10103 if (!file_exists(fname)) {
10104 char msg[300];
10105 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
10106 "file (%s) not found", fname);
10107 send_resp(dut, conn, SIGMA_ERROR, msg);
10108 return 0;
10109 }
10110#endif /* __linux__ */
10111 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
10112 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10113 "not set root CA");
10114 return 0;
10115 }
10116 }
10117
10118 return 1;
10119}
10120
10121
10122static int cmd_sta_add_credential(struct sigma_dut *dut,
10123 struct sigma_conn *conn,
10124 struct sigma_cmd *cmd)
10125{
10126 const char *intf = get_param(cmd, "Interface");
10127 const char *type;
10128
10129 start_sta_mode(dut);
10130
10131 type = get_param(cmd, "Type");
10132 if (!type)
10133 return -1;
10134
10135 if (strcasecmp(type, "uname_pwd") == 0)
10136 return sta_add_credential_uname_pwd(dut, conn, intf, cmd);
10137
10138 if (strcasecmp(type, "sim") == 0)
10139 return sta_add_credential_sim(dut, conn, intf, cmd);
10140
10141 if (strcasecmp(type, "cert") == 0)
10142 return sta_add_credential_cert(dut, conn, intf, cmd);
10143
10144 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported credential "
10145 "type");
10146 return 0;
10147}
10148
10149
10150static int cmd_sta_scan(struct sigma_dut *dut, struct sigma_conn *conn,
10151 struct sigma_cmd *cmd)
10152{
10153 const char *intf = get_param(cmd, "Interface");
vamsi krishna89ad8c62017-09-19 12:51:18 +053010154 const char *val, *bssid, *ssid;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010155 char buf[100];
vamsi krishna89ad8c62017-09-19 12:51:18 +053010156 char ssid_hex[65];
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010157 int res;
10158
10159 val = get_param(cmd, "HESSID");
10160 if (val) {
10161 res = snprintf(buf, sizeof(buf), "SET hessid %s", val);
10162 if (res < 0 || res >= (int) sizeof(buf))
10163 return -1;
10164 wpa_command(intf, buf);
10165 }
10166
10167 val = get_param(cmd, "ACCS_NET_TYPE");
10168 if (val) {
10169 res = snprintf(buf, sizeof(buf), "SET access_network_type %s",
10170 val);
10171 if (res < 0 || res >= (int) sizeof(buf))
10172 return -1;
10173 wpa_command(intf, buf);
10174 }
10175
vamsi krishna89ad8c62017-09-19 12:51:18 +053010176 bssid = get_param(cmd, "Bssid");
10177 ssid = get_param(cmd, "Ssid");
10178
10179 if (ssid) {
10180 if (2 * strlen(ssid) >= sizeof(ssid_hex)) {
10181 send_resp(dut, conn, SIGMA_ERROR,
10182 "ErrorCode,Too long SSID");
10183 return 0;
10184 }
10185 ascii2hexstr(ssid, ssid_hex);
10186 }
10187
10188 res = snprintf(buf, sizeof(buf), "SCAN%s%s%s%s",
10189 bssid ? " bssid=": "",
10190 bssid ? bssid : "",
10191 ssid ? " ssid " : "",
10192 ssid ? ssid_hex : "");
10193 if (res < 0 || res >= (int) sizeof(buf))
10194 return -1;
10195
10196 if (wpa_command(intf, buf)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010197 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not start "
10198 "scan");
10199 return 0;
10200 }
10201
10202 return 1;
10203}
10204
10205
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010206static int cmd_sta_scan_bss(struct sigma_dut *dut, struct sigma_conn *conn,
10207 struct sigma_cmd *cmd)
10208{
10209 const char *intf = get_param(cmd, "Interface");
10210 const char *bssid;
10211 char buf[4096], *pos;
10212 int freq, chan;
10213 char *ssid;
10214 char resp[100];
10215 int res;
10216 struct wpa_ctrl *ctrl;
10217
10218 bssid = get_param(cmd, "BSSID");
10219 if (!bssid) {
10220 send_resp(dut, conn, SIGMA_INVALID,
10221 "errorCode,BSSID argument is missing");
10222 return 0;
10223 }
10224
10225 ctrl = open_wpa_mon(intf);
10226 if (!ctrl) {
10227 sigma_dut_print(dut, DUT_MSG_ERROR,
10228 "Failed to open wpa_supplicant monitor connection");
10229 return -1;
10230 }
10231
10232 if (wpa_command(intf, "SCAN TYPE=ONLY")) {
10233 send_resp(dut, conn, SIGMA_ERROR,
10234 "errorCode,Could not start scan");
10235 wpa_ctrl_detach(ctrl);
10236 wpa_ctrl_close(ctrl);
10237 return 0;
10238 }
10239
10240 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
10241 buf, sizeof(buf));
10242
10243 wpa_ctrl_detach(ctrl);
10244 wpa_ctrl_close(ctrl);
10245
10246 if (res < 0) {
10247 send_resp(dut, conn, SIGMA_ERROR,
10248 "errorCode,Scan did not complete");
10249 return 0;
10250 }
10251
10252 snprintf(buf, sizeof(buf), "BSS %s", bssid);
10253 if (wpa_command_resp(intf, buf, buf, sizeof(buf)) < 0 ||
10254 strncmp(buf, "id=", 3) != 0) {
10255 send_resp(dut, conn, SIGMA_ERROR,
10256 "errorCode,Specified BSSID not found");
10257 return 0;
10258 }
10259
10260 pos = strstr(buf, "\nfreq=");
10261 if (!pos) {
10262 send_resp(dut, conn, SIGMA_ERROR,
10263 "errorCode,Channel not found");
10264 return 0;
10265 }
10266 freq = atoi(pos + 6);
10267 chan = freq_to_channel(freq);
10268
10269 pos = strstr(buf, "\nssid=");
10270 if (!pos) {
10271 send_resp(dut, conn, SIGMA_ERROR,
10272 "errorCode,SSID not found");
10273 return 0;
10274 }
10275 ssid = pos + 6;
10276 pos = strchr(ssid, '\n');
10277 if (pos)
10278 *pos = '\0';
10279 snprintf(resp, sizeof(resp), "ssid,%s,bsschannel,%d", ssid, chan);
10280 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10281 return 0;
10282}
10283
10284
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010285static int cmd_sta_set_systime(struct sigma_dut *dut, struct sigma_conn *conn,
10286 struct sigma_cmd *cmd)
10287{
10288#ifdef __linux__
10289 struct timeval tv;
10290 struct tm tm;
10291 time_t t;
10292 const char *val;
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010293 int v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010294
10295 wpa_command(get_station_ifname(), "PMKSA_FLUSH");
10296
10297 memset(&tm, 0, sizeof(tm));
10298 val = get_param(cmd, "seconds");
10299 if (val)
10300 tm.tm_sec = atoi(val);
10301 val = get_param(cmd, "minutes");
10302 if (val)
10303 tm.tm_min = atoi(val);
10304 val = get_param(cmd, "hours");
10305 if (val)
10306 tm.tm_hour = atoi(val);
10307 val = get_param(cmd, "date");
10308 if (val)
10309 tm.tm_mday = atoi(val);
10310 val = get_param(cmd, "month");
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010311 if (val) {
10312 v = atoi(val);
10313 if (v < 1 || v > 12) {
10314 send_resp(dut, conn, SIGMA_INVALID,
10315 "errorCode,Invalid month");
10316 return 0;
10317 }
10318 tm.tm_mon = v - 1;
10319 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010320 val = get_param(cmd, "year");
10321 if (val) {
10322 int year = atoi(val);
10323#ifdef ANDROID
10324 if (year > 2035)
10325 year = 2035; /* years beyond 2035 not supported */
10326#endif /* ANDROID */
10327 tm.tm_year = year - 1900;
10328 }
10329 t = mktime(&tm);
10330 if (t == (time_t) -1) {
10331 send_resp(dut, conn, SIGMA_ERROR,
10332 "errorCode,Invalid date or time");
10333 return 0;
10334 }
10335
10336 memset(&tv, 0, sizeof(tv));
10337 tv.tv_sec = t;
10338
10339 if (settimeofday(&tv, NULL) < 0) {
10340 sigma_dut_print(dut, DUT_MSG_INFO, "settimeofday failed: %s",
10341 strerror(errno));
10342 send_resp(dut, conn, SIGMA_ERROR,
10343 "errorCode,Failed to set time");
10344 return 0;
10345 }
10346
10347 return 1;
10348#endif /* __linux__ */
10349
10350 return -1;
10351}
10352
10353
10354static int cmd_sta_osu(struct sigma_dut *dut, struct sigma_conn *conn,
10355 struct sigma_cmd *cmd)
10356{
10357 const char *intf = get_param(cmd, "Interface");
10358 const char *name, *val;
10359 int prod_ess_assoc = 1;
10360 char buf[200], bssid[100], ssid[100];
10361 int res;
10362 struct wpa_ctrl *ctrl;
10363
10364 name = get_param(cmd, "osuFriendlyName");
10365
10366 val = get_param(cmd, "ProdESSAssoc");
10367 if (val)
10368 prod_ess_assoc = atoi(val);
10369
10370 kill_dhcp_client(dut, intf);
10371 if (start_dhcp_client(dut, intf) < 0)
10372 return -2;
10373
10374 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger OSU");
10375 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10376 res = snprintf(buf, sizeof(buf),
10377 "%s %s%s%s signup osu-ca.pem",
10378 prod_ess_assoc ? "" : "-N",
10379 name ? "-O'" : "", name ? name : "",
10380 name ? "'" : "");
10381
Kanchanapally, Vidyullatha12b66762015-12-31 16:46:42 +053010382 hs2_set_policy(dut);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010383 if (run_hs20_osu(dut, buf) < 0) {
10384 FILE *f;
10385
10386 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to complete OSU");
10387
10388 f = fopen("hs20-osu-client.res", "r");
10389 if (f) {
10390 char resp[400], res[300], *pos;
10391 if (!fgets(res, sizeof(res), f))
10392 res[0] = '\0';
10393 pos = strchr(res, '\n');
10394 if (pos)
10395 *pos = '\0';
10396 fclose(f);
10397 sigma_dut_summary(dut, "hs20-osu-client provisioning failed: %s",
10398 res);
10399 snprintf(resp, sizeof(resp), "notify-send '%s'", res);
10400 if (system(resp) != 0) {
10401 }
10402 snprintf(resp, sizeof(resp),
10403 "SSID,,BSSID,,failureReason,%s", res);
10404 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10405 return 0;
10406 }
10407
10408 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10409 return 0;
10410 }
10411
10412 if (!prod_ess_assoc)
10413 goto report;
10414
10415 ctrl = open_wpa_mon(intf);
10416 if (ctrl == NULL) {
10417 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10418 "wpa_supplicant monitor connection");
10419 return -1;
10420 }
10421
10422 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
10423 buf, sizeof(buf));
10424
10425 wpa_ctrl_detach(ctrl);
10426 wpa_ctrl_close(ctrl);
10427
10428 if (res < 0) {
10429 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to connect to "
10430 "network after OSU");
10431 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10432 return 0;
10433 }
10434
10435report:
10436 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
10437 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
10438 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get BSSID/SSID");
10439 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10440 return 0;
10441 }
10442
10443 snprintf(buf, sizeof(buf), "SSID,%s,BSSID,%s", ssid, bssid);
10444 send_resp(dut, conn, SIGMA_COMPLETE, buf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010445 return 0;
10446}
10447
10448
10449static int cmd_sta_policy_update(struct sigma_dut *dut, struct sigma_conn *conn,
10450 struct sigma_cmd *cmd)
10451{
10452 const char *val;
10453 int timeout = 120;
10454
10455 val = get_param(cmd, "PolicyUpdate");
10456 if (val == NULL || atoi(val) == 0)
10457 return 1; /* No operation requested */
10458
10459 val = get_param(cmd, "Timeout");
10460 if (val)
10461 timeout = atoi(val);
10462
10463 if (timeout) {
10464 /* TODO: time out the command and return
10465 * PolicyUpdateStatus,TIMEOUT if needed. */
10466 }
10467
10468 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger policy update");
10469 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10470 if (run_hs20_osu(dut, "pol_upd fqdn=wi-fi.org") < 0) {
10471 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,FAIL");
10472 return 0;
10473 }
10474
10475 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,SUCCESS");
10476 return 0;
10477}
10478
10479
10480static int cmd_sta_er_config(struct sigma_dut *dut, struct sigma_conn *conn,
10481 struct sigma_cmd *cmd)
10482{
10483 struct wpa_ctrl *ctrl;
10484 const char *intf = get_param(cmd, "Interface");
10485 const char *bssid = get_param(cmd, "Bssid");
10486 const char *ssid = get_param(cmd, "SSID");
10487 const char *security = get_param(cmd, "Security");
10488 const char *passphrase = get_param(cmd, "Passphrase");
10489 const char *pin = get_param(cmd, "PIN");
10490 char buf[1000];
10491 char ssid_hex[200], passphrase_hex[200];
10492 const char *keymgmt, *cipher;
10493
10494 if (intf == NULL)
10495 intf = get_main_ifname();
10496
10497 if (!bssid) {
10498 send_resp(dut, conn, SIGMA_ERROR,
10499 "ErrorCode,Missing Bssid argument");
10500 return 0;
10501 }
10502
10503 if (!ssid) {
10504 send_resp(dut, conn, SIGMA_ERROR,
10505 "ErrorCode,Missing SSID argument");
10506 return 0;
10507 }
10508
10509 if (!security) {
10510 send_resp(dut, conn, SIGMA_ERROR,
10511 "ErrorCode,Missing Security argument");
10512 return 0;
10513 }
10514
10515 if (!passphrase) {
10516 send_resp(dut, conn, SIGMA_ERROR,
10517 "ErrorCode,Missing Passphrase argument");
10518 return 0;
10519 }
10520
10521 if (!pin) {
10522 send_resp(dut, conn, SIGMA_ERROR,
10523 "ErrorCode,Missing PIN argument");
10524 return 0;
10525 }
10526
vamsi krishna8c9c1562017-05-12 15:51:46 +053010527 if (2 * strlen(ssid) >= sizeof(ssid_hex) ||
10528 2 * strlen(passphrase) >= sizeof(passphrase_hex)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010529 send_resp(dut, conn, SIGMA_ERROR,
10530 "ErrorCode,Too long SSID/passphrase");
10531 return 0;
10532 }
10533
10534 ctrl = open_wpa_mon(intf);
10535 if (ctrl == NULL) {
10536 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10537 "wpa_supplicant monitor connection");
10538 return -2;
10539 }
10540
10541 if (strcasecmp(security, "wpa2-psk") == 0) {
10542 keymgmt = "WPA2PSK";
10543 cipher = "CCMP";
10544 } else {
10545 wpa_ctrl_detach(ctrl);
10546 wpa_ctrl_close(ctrl);
10547 send_resp(dut, conn, SIGMA_ERROR,
10548 "ErrorCode,Unsupported Security value");
10549 return 0;
10550 }
10551
10552 ascii2hexstr(ssid, ssid_hex);
10553 ascii2hexstr(passphrase, passphrase_hex);
10554 snprintf(buf, sizeof(buf), "WPS_REG %s %s %s %s %s %s",
10555 bssid, pin, ssid_hex, keymgmt, cipher, passphrase_hex);
10556
10557 if (wpa_command(intf, buf) < 0) {
10558 wpa_ctrl_detach(ctrl);
10559 wpa_ctrl_close(ctrl);
10560 send_resp(dut, conn, SIGMA_ERROR,
10561 "ErrorCode,Failed to start registrar");
10562 return 0;
10563 }
10564
10565 snprintf(dut->er_oper_bssid, sizeof(dut->er_oper_bssid), "%s", bssid);
10566 dut->er_oper_performed = 1;
10567
10568 return wps_connection_event(dut, conn, ctrl, intf, 0);
10569}
10570
10571
10572static int cmd_sta_wps_connect_pw_token(struct sigma_dut *dut,
10573 struct sigma_conn *conn,
10574 struct sigma_cmd *cmd)
10575{
10576 struct wpa_ctrl *ctrl;
10577 const char *intf = get_param(cmd, "Interface");
10578 const char *bssid = get_param(cmd, "Bssid");
10579 char buf[100];
10580
10581 if (!bssid) {
10582 send_resp(dut, conn, SIGMA_ERROR,
10583 "ErrorCode,Missing Bssid argument");
10584 return 0;
10585 }
10586
10587 ctrl = open_wpa_mon(intf);
10588 if (ctrl == NULL) {
10589 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10590 "wpa_supplicant monitor connection");
10591 return -2;
10592 }
10593
10594 snprintf(buf, sizeof(buf), "WPS_NFC %s", bssid);
10595
10596 if (wpa_command(intf, buf) < 0) {
10597 wpa_ctrl_detach(ctrl);
10598 wpa_ctrl_close(ctrl);
10599 send_resp(dut, conn, SIGMA_ERROR,
10600 "ErrorCode,Failed to start registrar");
10601 return 0;
10602 }
10603
10604 return wps_connection_event(dut, conn, ctrl, intf, 0);
10605}
10606
10607
vamsi krishna9b144002017-09-20 13:28:13 +053010608static int cmd_start_wps_registration(struct sigma_dut *dut,
10609 struct sigma_conn *conn,
10610 struct sigma_cmd *cmd)
10611{
10612 struct wpa_ctrl *ctrl;
10613 const char *intf = get_param(cmd, "Interface");
10614 const char *role, *method;
10615 int res;
10616 char buf[256];
10617 const char *events[] = {
10618 "CTRL-EVENT-CONNECTED",
10619 "WPS-OVERLAP-DETECTED",
10620 "WPS-TIMEOUT",
10621 "WPS-FAIL",
10622 NULL
10623 };
10624
10625 ctrl = open_wpa_mon(intf);
10626 if (!ctrl) {
10627 sigma_dut_print(dut, DUT_MSG_ERROR,
10628 "Failed to open wpa_supplicant monitor connection");
10629 return -2;
10630 }
10631
10632 role = get_param(cmd, "WpsRole");
10633 if (!role) {
10634 send_resp(dut, conn, SIGMA_INVALID,
10635 "ErrorCode,WpsRole not provided");
10636 goto fail;
10637 }
10638
10639 if (strcasecmp(role, "Enrollee") == 0) {
10640 method = get_param(cmd, "WpsConfigMethod");
10641 if (!method) {
10642 send_resp(dut, conn, SIGMA_INVALID,
10643 "ErrorCode,WpsConfigMethod not provided");
10644 goto fail;
10645 }
10646 if (strcasecmp(method, "PBC") == 0) {
10647 if (wpa_command(intf, "WPS_PBC") < 0) {
10648 send_resp(dut, conn, SIGMA_ERROR,
10649 "ErrorCode,Failed to enable PBC");
10650 goto fail;
10651 }
10652 } else {
10653 /* TODO: PIN method */
10654 send_resp(dut, conn, SIGMA_ERROR,
10655 "ErrorCode,Unsupported WpsConfigMethod value");
10656 goto fail;
10657 }
10658 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
10659 if (res < 0) {
10660 send_resp(dut, conn, SIGMA_ERROR,
10661 "ErrorCode,WPS connection did not complete");
10662 goto fail;
10663 }
10664 if (strstr(buf, "WPS-TIMEOUT")) {
10665 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,NoPeer");
10666 } else if (strstr(buf, "WPS-OVERLAP-DETECTED")) {
10667 send_resp(dut, conn, SIGMA_ERROR,
10668 "ErrorCode,OverlapSession");
10669 } else if (strstr(buf, "CTRL-EVENT-CONNECTED")) {
10670 send_resp(dut, conn, SIGMA_COMPLETE, "Successful");
10671 } else {
10672 send_resp(dut, conn, SIGMA_ERROR,
10673 "ErrorCode,WPS operation failed");
10674 }
10675 } else {
10676 /* TODO: Registrar role */
10677 send_resp(dut, conn, SIGMA_ERROR,
10678 "ErrorCode,Unsupported WpsRole value");
10679 }
10680
10681fail:
10682 wpa_ctrl_detach(ctrl);
10683 wpa_ctrl_close(ctrl);
10684 return 0;
10685}
10686
10687
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010688static int req_intf(struct sigma_cmd *cmd)
10689{
10690 return get_param(cmd, "interface") == NULL ? -1 : 0;
10691}
10692
10693
10694void sta_register_cmds(void)
10695{
10696 sigma_dut_reg_cmd("sta_get_ip_config", req_intf,
10697 cmd_sta_get_ip_config);
10698 sigma_dut_reg_cmd("sta_set_ip_config", req_intf,
10699 cmd_sta_set_ip_config);
10700 sigma_dut_reg_cmd("sta_get_info", req_intf, cmd_sta_get_info);
10701 sigma_dut_reg_cmd("sta_get_mac_address", req_intf,
10702 cmd_sta_get_mac_address);
10703 sigma_dut_reg_cmd("sta_is_connected", req_intf, cmd_sta_is_connected);
10704 sigma_dut_reg_cmd("sta_verify_ip_connection", req_intf,
10705 cmd_sta_verify_ip_connection);
10706 sigma_dut_reg_cmd("sta_get_bssid", req_intf, cmd_sta_get_bssid);
10707 sigma_dut_reg_cmd("sta_set_encryption", req_intf,
10708 cmd_sta_set_encryption);
10709 sigma_dut_reg_cmd("sta_set_psk", req_intf, cmd_sta_set_psk);
10710 sigma_dut_reg_cmd("sta_set_eaptls", req_intf, cmd_sta_set_eaptls);
10711 sigma_dut_reg_cmd("sta_set_eapttls", req_intf, cmd_sta_set_eapttls);
10712 sigma_dut_reg_cmd("sta_set_eapsim", req_intf, cmd_sta_set_eapsim);
10713 sigma_dut_reg_cmd("sta_set_peap", req_intf, cmd_sta_set_peap);
10714 sigma_dut_reg_cmd("sta_set_eapfast", req_intf, cmd_sta_set_eapfast);
10715 sigma_dut_reg_cmd("sta_set_eapaka", req_intf, cmd_sta_set_eapaka);
10716 sigma_dut_reg_cmd("sta_set_eapakaprime", req_intf,
10717 cmd_sta_set_eapakaprime);
10718 sigma_dut_reg_cmd("sta_set_security", req_intf, cmd_sta_set_security);
10719 sigma_dut_reg_cmd("sta_set_uapsd", req_intf, cmd_sta_set_uapsd);
10720 /* TODO: sta_set_ibss */
10721 /* TODO: sta_set_mode */
10722 sigma_dut_reg_cmd("sta_set_wmm", req_intf, cmd_sta_set_wmm);
10723 sigma_dut_reg_cmd("sta_associate", req_intf, cmd_sta_associate);
10724 /* TODO: sta_up_load */
10725 sigma_dut_reg_cmd("sta_preset_testparameters", req_intf,
10726 cmd_sta_preset_testparameters);
10727 /* TODO: sta_set_system */
10728 sigma_dut_reg_cmd("sta_set_11n", req_intf, cmd_sta_set_11n);
10729 /* TODO: sta_set_rifs_test */
10730 sigma_dut_reg_cmd("sta_set_wireless", req_intf, cmd_sta_set_wireless);
10731 sigma_dut_reg_cmd("sta_send_addba", req_intf, cmd_sta_send_addba);
10732 /* TODO: sta_send_coexist_mgmt */
10733 sigma_dut_reg_cmd("sta_disconnect", req_intf, cmd_sta_disconnect);
10734 sigma_dut_reg_cmd("sta_reassoc", req_intf, cmd_sta_reassoc);
10735 sigma_dut_reg_cmd("sta_reassociate", req_intf, cmd_sta_reassoc);
10736 sigma_dut_reg_cmd("sta_reset_default", req_intf,
10737 cmd_sta_reset_default);
10738 sigma_dut_reg_cmd("sta_send_frame", req_intf, cmd_sta_send_frame);
10739 sigma_dut_reg_cmd("sta_set_macaddr", req_intf, cmd_sta_set_macaddr);
10740 sigma_dut_reg_cmd("sta_set_rfeature", req_intf, cmd_sta_set_rfeature);
10741 sigma_dut_reg_cmd("sta_set_radio", req_intf, cmd_sta_set_radio);
10742 sigma_dut_reg_cmd("sta_set_pwrsave", req_intf, cmd_sta_set_pwrsave);
10743 sigma_dut_reg_cmd("sta_bssid_pool", req_intf, cmd_sta_bssid_pool);
10744 sigma_dut_reg_cmd("sta_reset_parm", req_intf, cmd_sta_reset_parm);
10745 sigma_dut_reg_cmd("sta_get_key", req_intf, cmd_sta_get_key);
10746 sigma_dut_reg_cmd("sta_hs2_associate", req_intf,
10747 cmd_sta_hs2_associate);
10748 sigma_dut_reg_cmd("sta_add_credential", req_intf,
10749 cmd_sta_add_credential);
10750 sigma_dut_reg_cmd("sta_scan", req_intf, cmd_sta_scan);
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010751 sigma_dut_reg_cmd("sta_scan_bss", req_intf, cmd_sta_scan_bss);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010752 sigma_dut_reg_cmd("sta_set_systime", NULL, cmd_sta_set_systime);
10753 sigma_dut_reg_cmd("sta_osu", req_intf, cmd_sta_osu);
10754 sigma_dut_reg_cmd("sta_policy_update", req_intf, cmd_sta_policy_update);
10755 sigma_dut_reg_cmd("sta_er_config", NULL, cmd_sta_er_config);
10756 sigma_dut_reg_cmd("sta_wps_connect_pw_token", req_intf,
10757 cmd_sta_wps_connect_pw_token);
Jouni Malinen82905202018-04-29 17:20:10 +030010758 sigma_dut_reg_cmd("sta_exec_action", NULL, cmd_sta_exec_action);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010759 sigma_dut_reg_cmd("sta_get_events", req_intf, cmd_sta_get_events);
10760 sigma_dut_reg_cmd("sta_get_parameter", req_intf, cmd_sta_get_parameter);
vamsi krishna9b144002017-09-20 13:28:13 +053010761 sigma_dut_reg_cmd("start_wps_registration", req_intf,
10762 cmd_start_wps_registration);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010763}