blob: dba7783268a465f09d76e2b1651d5f1e067d5441 [file] [log] [blame]
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001/*
2 * Sigma Control API DUT (station/AP)
3 * Copyright (c) 2010-2011, Atheros Communications, Inc.
Jouni Malinen9d7e31d2017-12-22 18:55:04 +02004 * Copyright (c) 2011-2017, Qualcomm Atheros, Inc.
Jouni Malinenc12ea4a2018-01-05 21:07:10 +02005 * Copyright (c) 2018, The Linux Foundation
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006 * All Rights Reserved.
7 * Licensed under the Clear BSD license. See README for more details.
8 */
9
10#include "sigma_dut.h"
11#include <sys/ioctl.h>
12#include <sys/stat.h>
Jouni Malinen82905202018-04-29 17:20:10 +030013#include <sys/wait.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020014#ifdef __linux__
Lior Davidcc88b562017-01-03 18:52:09 +020015#include <regex.h>
16#include <dirent.h>
Jouni Malinencd4e3c32015-10-29 12:39:56 +020017#include <sys/time.h>
18#include <netpacket/packet.h>
19#include <linux/if_ether.h>
20#ifdef ANDROID
21#include <cutils/properties.h>
22#include <android/log.h>
23#include "keystore_get.h"
24#else /* ANDROID */
25#include <ifaddrs.h>
26#endif /* ANDROID */
27#include <netdb.h>
28#endif /* __linux__ */
29#ifdef __QNXNTO__
30#include <net/if_dl.h>
31#endif /* __QNXNTO__ */
32#include "wpa_ctrl.h"
33#include "wpa_helpers.h"
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -070034#include "miracast.h"
Jouni Malinencd4e3c32015-10-29 12:39:56 +020035
36/* Temporary files for sta_send_addba */
37#define VI_QOS_TMP_FILE "/tmp/vi-qos.tmp"
38#define VI_QOS_FILE "/tmp/vi-qos.txt"
39#define VI_QOS_REFFILE "/etc/vi-qos.txt"
40
41/*
42 * MTU for Ethernet need to take into account 8-byte SNAP header
43 * to be added when encapsulating Ethernet frame into 802.11
44 */
45#ifndef IEEE80211_MAX_DATA_LEN_DMG
46#define IEEE80211_MAX_DATA_LEN_DMG 7920
47#endif
48#ifndef IEEE80211_SNAP_LEN_DMG
49#define IEEE80211_SNAP_LEN_DMG 8
50#endif
51
Ashwini Patil00402582017-04-13 12:29:39 +053052#define NON_PREF_CH_LIST_SIZE 100
Ashwini Patil5acd7382017-04-13 15:55:04 +053053#define NEIGHBOR_REPORT_SIZE 1000
54#define DEFAULT_NEIGHBOR_BSSID_INFO "17"
55#define DEFAULT_NEIGHBOR_PHY_TYPE "1"
Ashwini Patil00402582017-04-13 12:29:39 +053056
Jouni Malinencd4e3c32015-10-29 12:39:56 +020057extern char *sigma_wpas_ctrl;
58extern char *sigma_cert_path;
59extern enum driver_type wifi_chip_type;
60extern char *sigma_radio_ifname[];
61
Lior David0fe101e2017-03-09 16:09:50 +020062#ifdef __linux__
63#define WIL_WMI_MAX_PAYLOAD 248
64#define WIL_WMI_BF_TRIG_CMDID 0x83a
65
66struct wil_wmi_header {
67 uint8_t mid;
68 uint8_t reserved;
69 uint16_t cmd;
70 uint32_t ts;
71} __attribute__((packed));
72
73enum wil_wmi_bf_trig_type {
74 WIL_WMI_SLS,
75 WIL_WMI_BRP_RX,
76 WIL_WMI_BRP_TX,
77};
78
79struct wil_wmi_bf_trig_cmd {
80 /* enum wil_wmi_bf_trig_type */
81 uint32_t bf_type;
82 /* cid when type == WMI_BRP_RX */
83 uint32_t sta_id;
84 uint32_t reserved;
85 /* mac address when type = WIL_WMI_SLS */
86 uint8_t dest_mac[6];
87} __attribute__((packed));
88#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +020089
90#ifdef ANDROID
91
92static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname);
93
94#define ANDROID_KEYSTORE_GET 'g'
95#define ANDROID_KEYSTORE_GET_PUBKEY 'b'
96
97static int android_keystore_get(char cmd, const char *key, unsigned char *val)
98{
Jouni Malinencd4e3c32015-10-29 12:39:56 +020099 /* Android 4.3 changed keystore design, so need to use keystore_get() */
100#ifndef KEYSTORE_MESSAGE_SIZE
101#define KEYSTORE_MESSAGE_SIZE 65535
102#endif /* KEYSTORE_MESSAGE_SIZE */
103
104 ssize_t len;
105 uint8_t *value = NULL;
106
107 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
108 "keystore command '%c' key '%s' --> keystore_get",
109 cmd, key);
110
111 len = keystore_get(key, strlen(key), &value);
112 if (len < 0) {
113 __android_log_print(ANDROID_LOG_DEBUG, "sigma_dut",
114 "keystore_get() failed");
115 return -1;
116 }
117
118 if (len > KEYSTORE_MESSAGE_SIZE)
119 len = KEYSTORE_MESSAGE_SIZE;
120 memcpy(val, value, len);
121 free(value);
122 return len;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200123}
124#endif /* ANDROID */
125
126
127int set_ps(const char *intf, struct sigma_dut *dut, int enabled)
128{
129#ifdef __linux__
130 char buf[100];
131
132 if (wifi_chip_type == DRIVER_WCN) {
133 if (enabled) {
134 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 906");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530135 if (system(buf) != 0)
136 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200137 } else {
138 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 905");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530139 if (system(buf) != 0)
140 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200141 snprintf(buf, sizeof(buf), "iwpriv wlan0 dump 912");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530142 if (system(buf) != 0)
143 goto set_power_save;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200144 }
145
146 return 0;
147 }
148
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530149set_power_save:
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200150 snprintf(buf, sizeof(buf), "./iw dev %s set power_save %s",
151 intf, enabled ? "on" : "off");
152 if (system(buf) != 0) {
153 snprintf(buf, sizeof(buf), "iw dev %s set power_save %s",
154 intf, enabled ? "on" : "off");
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530155 if (system(buf) != 0) {
156 sigma_dut_print(dut, DUT_MSG_ERROR,
157 "Failed to set power save %s",
158 enabled ? "on" : "off");
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200159 return -1;
Pradeep Reddy POTTETI625b3702016-09-20 17:09:58 +0530160 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200161 }
162
163 return 0;
164#else /* __linux__ */
165 return -1;
166#endif /* __linux__ */
167}
168
169
Lior Davidcc88b562017-01-03 18:52:09 +0200170#ifdef __linux__
Lior David0fe101e2017-03-09 16:09:50 +0200171
Lior Davidcc88b562017-01-03 18:52:09 +0200172static int wil6210_get_debugfs_dir(struct sigma_dut *dut, char *path,
173 size_t len)
174{
175 DIR *dir, *wil_dir;
176 struct dirent *entry;
177 int ret = -1;
178 const char *root_path = "/sys/kernel/debug/ieee80211";
179
180 dir = opendir(root_path);
181 if (!dir)
182 return -2;
183
184 while ((entry = readdir(dir))) {
185 if (strcmp(entry->d_name, ".") == 0 ||
186 strcmp(entry->d_name, "..") == 0)
187 continue;
188
189 if (snprintf(path, len, "%s/%s/wil6210",
190 root_path, entry->d_name) >= (int) len) {
191 ret = -3;
192 break;
193 }
194
195 wil_dir = opendir(path);
196 if (wil_dir) {
197 closedir(wil_dir);
198 ret = 0;
199 break;
200 }
201 }
202
203 closedir(dir);
204 return ret;
205}
Lior David0fe101e2017-03-09 16:09:50 +0200206
207
208static int wil6210_wmi_send(struct sigma_dut *dut, uint16_t command,
209 void *payload, uint16_t length)
210{
211 struct {
212 struct wil_wmi_header hdr;
213 char payload[WIL_WMI_MAX_PAYLOAD];
214 } __attribute__((packed)) cmd;
215 char buf[128], fname[128];
216 size_t towrite, written;
217 FILE *f;
218
219 if (length > WIL_WMI_MAX_PAYLOAD) {
220 sigma_dut_print(dut, DUT_MSG_ERROR,
221 "payload too large(%u, max %u)",
222 length, WIL_WMI_MAX_PAYLOAD);
223 return -1;
224 }
225
226 memset(&cmd.hdr, 0, sizeof(cmd.hdr));
227 cmd.hdr.cmd = command;
228 memcpy(cmd.payload, payload, length);
229
230 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
231 sigma_dut_print(dut, DUT_MSG_ERROR,
232 "failed to get wil6210 debugfs dir");
233 return -1;
234 }
235
236 snprintf(fname, sizeof(fname), "%s/wmi_send", buf);
237 f = fopen(fname, "wb");
238 if (!f) {
239 sigma_dut_print(dut, DUT_MSG_ERROR,
240 "failed to open: %s", fname);
241 return -1;
242 }
243
244 towrite = sizeof(cmd.hdr) + length;
245 written = fwrite(&cmd, 1, towrite, f);
246 fclose(f);
247 if (written != towrite) {
248 sigma_dut_print(dut, DUT_MSG_ERROR,
249 "failed to send wmi %u", command);
250 return -1;
251 }
252
253 return 0;
254}
255
256
257static int wil6210_get_sta_info_field(struct sigma_dut *dut, const char *bssid,
258 const char *pattern, unsigned int *field)
259{
260 char buf[128], fname[128];
261 FILE *f;
262 regex_t re;
263 regmatch_t m[2];
264 int rc, ret = -1;
265
266 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
267 sigma_dut_print(dut, DUT_MSG_ERROR,
268 "failed to get wil6210 debugfs dir");
269 return -1;
270 }
271
272 snprintf(fname, sizeof(fname), "%s/stations", buf);
273 f = fopen(fname, "r");
274 if (!f) {
275 sigma_dut_print(dut, DUT_MSG_ERROR,
276 "failed to open: %s", fname);
277 return -1;
278 }
279
280 if (regcomp(&re, pattern, REG_EXTENDED)) {
281 sigma_dut_print(dut, DUT_MSG_ERROR,
282 "regcomp failed: %s", pattern);
283 goto out;
284 }
285
286 /*
287 * find the entry for the mac address
288 * line is of the form: [n] 11:22:33:44:55:66 state AID aid
289 */
290 while (fgets(buf, sizeof(buf), f)) {
291 if (strcasestr(buf, bssid)) {
292 /* extract the field (CID/AID/state) */
293 rc = regexec(&re, buf, 2, m, 0);
294 if (!rc && (m[1].rm_so >= 0)) {
295 buf[m[1].rm_eo] = 0;
296 *field = atoi(&buf[m[1].rm_so]);
297 ret = 0;
298 break;
299 }
300 }
301 }
302
303 regfree(&re);
304 if (ret)
305 sigma_dut_print(dut, DUT_MSG_ERROR,
306 "could not extract field");
307
308out:
309 fclose(f);
310
311 return ret;
312}
313
314
315static int wil6210_get_cid(struct sigma_dut *dut, const char *bssid,
316 unsigned int *cid)
317{
318 const char *pattern = "\\[([0-9]+)\\]";
319
320 return wil6210_get_sta_info_field(dut, bssid, pattern, cid);
321}
322
323
324static int wil6210_send_brp_rx(struct sigma_dut *dut, const char *mac,
325 int l_rx)
326{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700327 struct wil_wmi_bf_trig_cmd cmd;
Lior David0fe101e2017-03-09 16:09:50 +0200328 unsigned int cid;
329
Rakesh Sunki556237d2017-03-30 14:49:31 -0700330 memset(&cmd, 0, sizeof(cmd));
331
Lior David0fe101e2017-03-09 16:09:50 +0200332 if (wil6210_get_cid(dut, mac, &cid))
333 return -1;
334
335 cmd.bf_type = WIL_WMI_BRP_RX;
336 cmd.sta_id = cid;
337 /* training length (l_rx) is ignored, FW always uses length 16 */
338 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
339 &cmd, sizeof(cmd));
340}
341
342
343static int wil6210_send_sls(struct sigma_dut *dut, const char *mac)
344{
Rakesh Sunki556237d2017-03-30 14:49:31 -0700345 struct wil_wmi_bf_trig_cmd cmd;
346
347 memset(&cmd, 0, sizeof(cmd));
Lior David0fe101e2017-03-09 16:09:50 +0200348
349 if (parse_mac_address(dut, mac, (unsigned char *)&cmd.dest_mac))
350 return -1;
351
352 cmd.bf_type = WIL_WMI_SLS;
353 return wil6210_wmi_send(dut, WIL_WMI_BF_TRIG_CMDID,
354 &cmd, sizeof(cmd));
355}
356
Lior Davidcc88b562017-01-03 18:52:09 +0200357#endif /* __linux__ */
358
359
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200360static void static_ip_file(int proto, const char *addr, const char *mask,
361 const char *gw)
362{
363 if (proto) {
364 FILE *f = fopen("static-ip", "w");
365 if (f) {
366 fprintf(f, "%d %s %s %s\n", proto, addr,
367 mask ? mask : "N/A",
368 gw ? gw : "N/A");
369 fclose(f);
370 }
371 } else {
372 unlink("static-ip");
373 }
374}
375
376
377static int send_neighbor_request(struct sigma_dut *dut, const char *intf,
378 const char *ssid)
379{
380#ifdef __linux__
381 char buf[100];
382
383 snprintf(buf, sizeof(buf), "iwpriv %s neighbor %s",
384 intf, ssid);
385 sigma_dut_print(dut, DUT_MSG_INFO, "Request: %s", buf);
386
387 if (system(buf) != 0) {
388 sigma_dut_print(dut, DUT_MSG_ERROR,
389 "iwpriv neighbor request failed");
390 return -1;
391 }
392
393 sigma_dut_print(dut, DUT_MSG_INFO, "iwpriv neighbor request send");
394
395 return 0;
396#else /* __linux__ */
397 return -1;
398#endif /* __linux__ */
399}
400
401
402static int send_trans_mgmt_query(struct sigma_dut *dut, const char *intf,
Ashwini Patil5acd7382017-04-13 15:55:04 +0530403 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200404{
Ashwini Patil5acd7382017-04-13 15:55:04 +0530405 const char *val;
406 int reason_code = 0;
407 char buf[1024];
408
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200409 /*
410 * In the earlier builds we used WNM_QUERY and in later
411 * builds used WNM_BSS_QUERY.
412 */
413
Ashwini Patil5acd7382017-04-13 15:55:04 +0530414 val = get_param(cmd, "BTMQuery_Reason_Code");
415 if (val)
416 reason_code = atoi(val);
417
418 val = get_param(cmd, "Cand_List");
419 if (val && atoi(val) == 1 && dut->btm_query_cand_list) {
420 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d%s", reason_code,
421 dut->btm_query_cand_list);
422 free(dut->btm_query_cand_list);
423 dut->btm_query_cand_list = NULL;
424 } else {
425 snprintf(buf, sizeof(buf), "WNM_BSS_QUERY %d", reason_code);
426 }
427
428 if (wpa_command(intf, buf) != 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200429 sigma_dut_print(dut, DUT_MSG_ERROR,
430 "transition management query failed");
431 return -1;
432 }
433
434 sigma_dut_print(dut, DUT_MSG_DEBUG,
435 "transition management query sent");
436
437 return 0;
438}
439
440
441int is_ip_addr(const char *str)
442{
443 const char *pos = str;
444 struct in_addr addr;
445
446 while (*pos) {
447 if (*pos != '.' && (*pos < '0' || *pos > '9'))
448 return 0;
449 pos++;
450 }
451
452 return inet_aton(str, &addr);
453}
454
455
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200456int get_ip_config(struct sigma_dut *dut, const char *ifname, char *buf,
457 size_t buf_len)
458{
vamsi krishnaa11d0732018-05-16 12:19:48 +0530459 char tmp[256];
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200460 char ip[16], mask[15], dns[16], sec_dns[16];
461 int is_dhcp = 0;
462 int s;
463#ifdef ANDROID
464 char prop[PROPERTY_VALUE_MAX];
vamsi krishnaa11d0732018-05-16 12:19:48 +0530465#else /* ANDROID */
466 FILE *f;
467#ifdef __linux__
468 const char *str_ps;
469#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200470#endif /* ANDROID */
471
472 ip[0] = '\0';
473 mask[0] = '\0';
474 dns[0] = '\0';
475 sec_dns[0] = '\0';
476
477 s = socket(PF_INET, SOCK_DGRAM, 0);
478 if (s >= 0) {
479 struct ifreq ifr;
480 struct sockaddr_in saddr;
481
482 memset(&ifr, 0, sizeof(ifr));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700483 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200484 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
485 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get "
486 "%s IP address: %s",
487 ifname, strerror(errno));
488 } else {
489 memcpy(&saddr, &ifr.ifr_addr,
490 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700491 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200492 }
493
494 if (ioctl(s, SIOCGIFNETMASK, &ifr) == 0) {
495 memcpy(&saddr, &ifr.ifr_addr,
496 sizeof(struct sockaddr_in));
Peng Xub8fc5cc2017-05-10 17:27:28 -0700497 strlcpy(mask, inet_ntoa(saddr.sin_addr), sizeof(mask));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200498 }
499 close(s);
500 }
501
502#ifdef ANDROID
503 snprintf(tmp, sizeof(tmp), "dhcp.%s.pid", ifname);
504 if (property_get(tmp, prop, NULL) != 0 && atoi(prop) > 0) {
505 snprintf(tmp, sizeof(tmp), "dhcp.%s.result", ifname);
506 if (property_get(tmp, prop, NULL) != 0 &&
507 strcmp(prop, "ok") == 0) {
508 snprintf(tmp, sizeof(tmp), "dhcp.%s.ipaddress",
509 ifname);
510 if (property_get(tmp, prop, NULL) != 0 &&
511 strcmp(ip, prop) == 0)
512 is_dhcp = 1;
513 }
514 }
515
516 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns1", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700517 if (property_get(tmp, prop, NULL) != 0)
518 strlcpy(dns, prop, sizeof(dns));
519 else if (property_get("net.dns1", prop, NULL) != 0)
520 strlcpy(dns, prop, sizeof(dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200521
522 snprintf(tmp, sizeof(tmp), "dhcp.%s.dns2", ifname);
Peng Xub8fc5cc2017-05-10 17:27:28 -0700523 if (property_get(tmp, prop, NULL) != 0)
524 strlcpy(sec_dns, prop, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200525#else /* ANDROID */
526#ifdef __linux__
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530527 if (get_driver_type() == DRIVER_OPENWRT)
528 str_ps = "ps -w";
529 else
530 str_ps = "ps ax";
531 snprintf(tmp, sizeof(tmp),
532 "%s | grep dhclient | grep -v grep | grep -q %s",
533 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200534 if (system(tmp) == 0)
535 is_dhcp = 1;
536 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530537 snprintf(tmp, sizeof(tmp),
538 "%s | grep udhcpc | grep -v grep | grep -q %s",
539 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200540 if (system(tmp) == 0)
541 is_dhcp = 1;
542 else {
Sarvepalli, Rajesh Babua76c6442016-03-18 20:34:26 +0530543 snprintf(tmp, sizeof(tmp),
544 "%s | grep dhcpcd | grep -v grep | grep -q %s",
545 str_ps, ifname);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200546 if (system(tmp) == 0)
547 is_dhcp = 1;
548 }
549 }
550#endif /* __linux__ */
551
552 f = fopen("/etc/resolv.conf", "r");
553 if (f) {
vamsi krishnaa11d0732018-05-16 12:19:48 +0530554 char *pos, *pos2;
555
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200556 while (fgets(tmp, sizeof(tmp), f)) {
557 if (strncmp(tmp, "nameserver", 10) != 0)
558 continue;
559 pos = tmp + 10;
560 while (*pos == ' ' || *pos == '\t')
561 pos++;
562 pos2 = pos;
563 while (*pos2) {
564 if (*pos2 == '\n' || *pos2 == '\r') {
565 *pos2 = '\0';
566 break;
567 }
568 pos2++;
569 }
Peng Xub8fc5cc2017-05-10 17:27:28 -0700570 if (!dns[0])
571 strlcpy(dns, pos, sizeof(dns));
572 else if (!sec_dns[0])
573 strlcpy(sec_dns, pos, sizeof(sec_dns));
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200574 }
575 fclose(f);
576 }
577#endif /* ANDROID */
578
579 snprintf(buf, buf_len, "dhcp,%d,ip,%s,mask,%s,primary-dns,%s",
580 is_dhcp, ip, mask, dns);
581 buf[buf_len - 1] = '\0';
582
583 return 0;
584}
585
586
587
588
589int get_ipv6_config(struct sigma_dut *dut, const char *ifname, char *buf,
590 size_t buf_len)
591{
592#ifdef __linux__
593#ifdef ANDROID
594 char cmd[200], result[1000], *pos, *end;
595 FILE *f;
596 size_t len;
597
598 snprintf(cmd, sizeof(cmd), "ip addr show dev %s scope global", ifname);
599 f = popen(cmd, "r");
600 if (f == NULL)
601 return -1;
602 len = fread(result, 1, sizeof(result) - 1, f);
603 pclose(f);
604 if (len == 0)
605 return -1;
606 result[len] = '\0';
607 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s result: %s\n", cmd, result);
608
609 pos = strstr(result, "inet6 ");
610 if (pos == NULL)
611 return -1;
612 pos += 6;
613 end = strchr(pos, ' ');
614 if (end)
615 *end = '\0';
616 end = strchr(pos, '/');
617 if (end)
618 *end = '\0';
619 snprintf(buf, buf_len, "ip,%s", pos);
620 buf[buf_len - 1] = '\0';
621 return 0;
622#else /* ANDROID */
623 struct ifaddrs *ifaddr, *ifa;
624 int res, found = 0;
625 char host[NI_MAXHOST];
626
627 if (getifaddrs(&ifaddr) < 0) {
628 perror("getifaddrs");
629 return -1;
630 }
631
632 for (ifa = ifaddr; ifa; ifa = ifa->ifa_next) {
633 if (strcasecmp(ifname, ifa->ifa_name) != 0)
634 continue;
635 if (ifa->ifa_addr == NULL ||
636 ifa->ifa_addr->sa_family != AF_INET6)
637 continue;
638
639 res = getnameinfo(ifa->ifa_addr, sizeof(struct sockaddr_in6),
640 host, NI_MAXHOST, NULL, 0, NI_NUMERICHOST);
641 if (res != 0) {
642 sigma_dut_print(dut, DUT_MSG_DEBUG, "getnameinfo: %s",
643 gai_strerror(res));
644 continue;
645 }
646 if (strncmp(host, "fe80::", 6) == 0)
647 continue; /* skip link-local */
648
649 sigma_dut_print(dut, DUT_MSG_DEBUG, "ifaddr: %s", host);
650 found = 1;
651 break;
652 }
653
654 freeifaddrs(ifaddr);
655
656 if (found) {
657 char *pos;
658 pos = strchr(host, '%');
659 if (pos)
660 *pos = '\0';
661 snprintf(buf, buf_len, "ip,%s", host);
662 buf[buf_len - 1] = '\0';
663 return 0;
664 }
665
666#endif /* ANDROID */
667#endif /* __linux__ */
668 return -1;
669}
670
671
672static int cmd_sta_get_ip_config(struct sigma_dut *dut,
673 struct sigma_conn *conn,
674 struct sigma_cmd *cmd)
675{
676 const char *intf = get_param(cmd, "Interface");
677 const char *ifname;
678 char buf[200];
679 const char *val;
680 int type = 1;
681
682 if (intf == NULL)
683 return -1;
684
685 if (strcmp(intf, get_main_ifname()) == 0)
686 ifname = get_station_ifname();
687 else
688 ifname = intf;
689
690 /*
691 * UCC may assume the IP address to be available immediately after
692 * association without trying to run sta_get_ip_config multiple times.
693 * Sigma CAPI does not specify this command as a block command that
694 * would wait for the address to become available, but to pass tests
695 * more reliably, it looks like such a wait may be needed here.
696 */
697 if (wait_ip_addr(dut, ifname, 15) < 0) {
698 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get IP address "
699 "for sta_get_ip_config");
700 /*
701 * Try to continue anyway since many UCC tests do not really
702 * care about the return value from here..
703 */
704 }
705
706 val = get_param(cmd, "Type");
707 if (val)
708 type = atoi(val);
709 if (type == 2 || dut->last_set_ip_config_ipv6) {
710 int i;
711
712 /*
713 * Since we do not have proper wait for IPv6 addresses, use a
714 * fixed two second delay here as a workaround for UCC script
715 * assuming IPv6 address is available when this command returns.
716 * Some scripts did not use Type,2 properly for IPv6, so include
717 * also the cases where the previous sta_set_ip_config indicated
718 * use of IPv6.
719 */
720 sigma_dut_print(dut, DUT_MSG_INFO, "Wait up to extra ten seconds in sta_get_ip_config for IPv6 address");
721 for (i = 0; i < 10; i++) {
722 sleep(1);
723 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) == 0)
724 {
725 sigma_dut_print(dut, DUT_MSG_INFO, "Found IPv6 address");
726 send_resp(dut, conn, SIGMA_COMPLETE, buf);
727#ifdef ANDROID
728 sigma_dut_print(dut, DUT_MSG_INFO,
729 "Adding IPv6 rule on Android");
730 add_ipv6_rule(dut, intf);
731#endif /* ANDROID */
732
733 return 0;
734 }
735 }
736 }
737 if (type == 1) {
738 if (get_ip_config(dut, ifname, buf, sizeof(buf)) < 0)
739 return -2;
740 } else if (type == 2) {
741 if (get_ipv6_config(dut, ifname, buf, sizeof(buf)) < 0)
742 return -2;
743 } else {
744 send_resp(dut, conn, SIGMA_ERROR,
745 "errorCode,Unsupported address type");
746 return 0;
747 }
748
749 send_resp(dut, conn, SIGMA_COMPLETE, buf);
750 return 0;
751}
752
753
754static void kill_dhcp_client(struct sigma_dut *dut, const char *ifname)
755{
756#ifdef __linux__
757 char buf[200];
758 char path[128];
759 struct stat s;
760
761#ifdef ANDROID
762 snprintf(path, sizeof(path), "/data/misc/dhcp/dhcpcd-%s.pid", ifname);
763#else /* ANDROID */
764 snprintf(path, sizeof(path), "/var/run/dhclient-%s.pid", ifname);
765#endif /* ANDROID */
766 if (stat(path, &s) == 0) {
767 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
768 sigma_dut_print(dut, DUT_MSG_INFO,
769 "Kill previous DHCP client: %s", buf);
770 if (system(buf) != 0)
771 sigma_dut_print(dut, DUT_MSG_INFO,
772 "Failed to kill DHCP client");
773 unlink(path);
774 sleep(1);
775 } else {
776 snprintf(path, sizeof(path), "/var/run/dhcpcd-%s.pid", ifname);
777
778 if (stat(path, &s) == 0) {
779 snprintf(buf, sizeof(buf), "kill `cat %s`", path);
780 sigma_dut_print(dut, DUT_MSG_INFO,
781 "Kill previous DHCP client: %s", buf);
782 if (system(buf) != 0)
783 sigma_dut_print(dut, DUT_MSG_INFO,
784 "Failed to kill DHCP client");
785 unlink(path);
786 sleep(1);
787 }
788 }
789#endif /* __linux__ */
790}
791
792
793static int start_dhcp_client(struct sigma_dut *dut, const char *ifname)
794{
795#ifdef __linux__
796 char buf[200];
797
798#ifdef ANDROID
Purushottam Kushwaha46d64262016-08-23 17:57:53 +0530799 if (access("/system/bin/dhcpcd", F_OK) != -1) {
800 snprintf(buf, sizeof(buf),
801 "/system/bin/dhcpcd -b %s", ifname);
802 } else if (access("/system/bin/dhcptool", F_OK) != -1) {
803 snprintf(buf, sizeof(buf), "/system/bin/dhcptool %s &", ifname);
804 } else {
805 sigma_dut_print(dut, DUT_MSG_ERROR,
806 "DHCP client program missing");
807 return 0;
808 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200809#else /* ANDROID */
810 snprintf(buf, sizeof(buf),
811 "dhclient -nw -pf /var/run/dhclient-%s.pid %s",
812 ifname, ifname);
813#endif /* ANDROID */
814 sigma_dut_print(dut, DUT_MSG_INFO, "Start DHCP client: %s", buf);
815 if (system(buf) != 0) {
816 snprintf(buf, sizeof(buf), "dhcpcd -t 0 %s &", ifname);
817 if (system(buf) != 0) {
818 sigma_dut_print(dut, DUT_MSG_INFO,
819 "Failed to start DHCP client");
820#ifndef ANDROID
821 return -1;
822#endif /* ANDROID */
823 }
824 }
825#endif /* __linux__ */
826
827 return 0;
828}
829
830
831static int clear_ip_addr(struct sigma_dut *dut, const char *ifname)
832{
833#ifdef __linux__
834 char buf[200];
835
836 snprintf(buf, sizeof(buf), "ip addr flush dev %s", ifname);
837 if (system(buf) != 0) {
838 sigma_dut_print(dut, DUT_MSG_INFO,
839 "Failed to clear IP addresses");
840 return -1;
841 }
842#endif /* __linux__ */
843
844 return 0;
845}
846
847
848#ifdef ANDROID
849static int add_ipv6_rule(struct sigma_dut *dut, const char *ifname)
850{
851 char cmd[200], *result, *pos;
852 FILE *fp;
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530853 int tableid;
854 size_t len, result_len = 1000;
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200855
856 snprintf(cmd, sizeof(cmd), "ip -6 route list table all | grep %s",
857 ifname);
858 fp = popen(cmd, "r");
859 if (fp == NULL)
860 return -1;
861
862 result = malloc(result_len);
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530863 if (result == NULL) {
864 fclose(fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200865 return -1;
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +0530866 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200867
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530868 len = fread(result, 1, result_len - 1, fp);
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200869 fclose(fp);
870
871 if (len == 0) {
872 free(result);
873 return -1;
874 }
Pradeep Reddy POTTETIf58a1fe2016-10-13 17:22:03 +0530875 result[len] = '\0';
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200876
877 pos = strstr(result, "table ");
878 if (pos == NULL) {
879 free(result);
880 return -1;
881 }
882
883 pos += strlen("table ");
884 tableid = atoi(pos);
885 if (tableid != 0) {
886 if (system("ip -6 rule del prio 22000") != 0) {
887 /* ignore any error */
888 }
889 snprintf(cmd, sizeof(cmd),
890 "ip -6 rule add from all lookup %d prio 22000",
891 tableid);
892 if (system(cmd) != 0) {
893 sigma_dut_print(dut, DUT_MSG_INFO,
894 "Failed to run %s", cmd);
895 free(result);
896 return -1;
897 }
898 } else {
899 sigma_dut_print(dut, DUT_MSG_INFO,
900 "No Valid Table Id found %s", pos);
901 free(result);
902 return -1;
903 }
904 free(result);
905
906 return 0;
907}
908#endif /* ANDROID */
909
910
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530911int set_ipv4_addr(struct sigma_dut *dut, const char *ifname,
912 const char *ip, const char *mask)
913{
914 char buf[200];
915
916 snprintf(buf, sizeof(buf), "ifconfig %s %s netmask %s",
917 ifname, ip, mask);
918 return system(buf) == 0;
919}
920
921
922int set_ipv4_gw(struct sigma_dut *dut, const char *gw)
923{
924 char buf[200];
925
926 if (!is_ip_addr(gw)) {
927 sigma_dut_print(dut, DUT_MSG_DEBUG, "Invalid gw addr - %s", gw);
928 return -1;
929 }
930
931 snprintf(buf, sizeof(buf), "route add default gw %s", gw);
932 if (!dut->no_ip_addr_set && system(buf) != 0) {
933 snprintf(buf, sizeof(buf), "ip ro re default via %s",
934 gw);
935 if (system(buf) != 0)
936 return 0;
937 }
938
939 return 1;
940}
941
942
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200943static int cmd_sta_set_ip_config(struct sigma_dut *dut,
944 struct sigma_conn *conn,
945 struct sigma_cmd *cmd)
946{
947 const char *intf = get_param(cmd, "Interface");
948 const char *ifname;
949 char buf[200];
950 const char *val, *ip, *mask, *gw;
951 int type = 1;
952
953 if (intf == NULL)
954 return -1;
955
956 if (strcmp(intf, get_main_ifname()) == 0)
957 ifname = get_station_ifname();
958 else
959 ifname = intf;
960
961 if (if_nametoindex(ifname) == 0) {
962 send_resp(dut, conn, SIGMA_ERROR,
963 "ErrorCode,Unknown interface");
964 return 0;
965 }
966
967 val = get_param(cmd, "Type");
968 if (val) {
969 type = atoi(val);
Ankita Bajaj1bde7942018-01-09 19:15:01 +0530970 if (type < 1 || type > 3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +0200971 send_resp(dut, conn, SIGMA_ERROR,
972 "ErrorCode,Unsupported address type");
973 return 0;
974 }
975 }
976
977 dut->last_set_ip_config_ipv6 = 0;
978
979 val = get_param(cmd, "dhcp");
980 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "true") == 0)) {
981 static_ip_file(0, NULL, NULL, NULL);
982#ifdef __linux__
983 if (type == 2) {
984 dut->last_set_ip_config_ipv6 = 1;
985 sigma_dut_print(dut, DUT_MSG_INFO, "Using IPv6 "
986 "stateless address autoconfiguration");
987#ifdef ANDROID
988 /*
989 * This sleep is required as the assignment in case of
990 * Android is taking time and is done by the kernel.
991 * The subsequent ping for IPv6 is impacting HS20 test
992 * case.
993 */
994 sleep(2);
995 add_ipv6_rule(dut, intf);
996#endif /* ANDROID */
997 /* Assume this happens by default */
998 return 1;
999 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301000 if (type != 3) {
1001 kill_dhcp_client(dut, ifname);
1002 if (start_dhcp_client(dut, ifname) < 0)
1003 return -2;
1004 } else {
1005 sigma_dut_print(dut, DUT_MSG_DEBUG,
1006 "Using FILS HLP DHCPv4 Rapid Commit");
1007 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001008
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001009 return 1;
1010#endif /* __linux__ */
1011 return -2;
1012 }
1013
1014 ip = get_param(cmd, "ip");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301015 if (!ip) {
1016 send_resp(dut, conn, SIGMA_INVALID,
1017 "ErrorCode,Missing IP address");
1018 return 0;
1019 }
1020
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001021 mask = get_param(cmd, "mask");
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301022 if (!mask) {
1023 send_resp(dut, conn, SIGMA_INVALID,
1024 "ErrorCode,Missing subnet mask");
1025 return 0;
1026 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001027
1028 if (type == 2) {
1029 int net = atoi(mask);
1030
1031 if ((net < 0 && net > 64) || !is_ipv6_addr(ip))
1032 return -1;
1033
1034 if (dut->no_ip_addr_set) {
1035 snprintf(buf, sizeof(buf),
1036 "sysctl net.ipv6.conf.%s.disable_ipv6=1",
1037 ifname);
1038 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1039 if (system(buf) != 0) {
1040 sigma_dut_print(dut, DUT_MSG_DEBUG,
1041 "Failed to disable IPv6 address before association");
1042 }
1043 } else {
1044 snprintf(buf, sizeof(buf),
1045 "ip -6 addr del %s/%s dev %s",
1046 ip, mask, ifname);
1047 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1048 if (system(buf) != 0) {
1049 /*
1050 * This command may fail if the address being
1051 * deleted does not exist. Inaction here is
1052 * intentional.
1053 */
1054 }
1055
1056 snprintf(buf, sizeof(buf),
1057 "ip -6 addr add %s/%s dev %s",
1058 ip, mask, ifname);
1059 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
1060 if (system(buf) != 0) {
1061 send_resp(dut, conn, SIGMA_ERROR,
1062 "ErrorCode,Failed to set IPv6 address");
1063 return 0;
1064 }
1065 }
1066
1067 dut->last_set_ip_config_ipv6 = 1;
1068 static_ip_file(6, ip, mask, NULL);
1069 return 1;
1070 } else if (type == 1) {
Pradeep Reddy POTTETIb18c5652016-01-18 12:45:37 +05301071 if (!is_ip_addr(ip) || !is_ip_addr(mask))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001072 return -1;
1073 }
1074
1075 kill_dhcp_client(dut, ifname);
1076
1077 if (!dut->no_ip_addr_set) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301078 if (!set_ipv4_addr(dut, ifname, ip, mask)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001079 send_resp(dut, conn, SIGMA_ERROR,
1080 "ErrorCode,Failed to set IP address");
1081 return 0;
1082 }
1083 }
1084
1085 gw = get_param(cmd, "defaultGateway");
1086 if (gw) {
Ankita Bajaj1bde7942018-01-09 19:15:01 +05301087 if (set_ipv4_gw(dut, gw) < 1) {
1088 send_resp(dut, conn, SIGMA_ERROR,
1089 "ErrorCode,Failed to set default gateway");
1090 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001091 }
1092 }
1093
1094 val = get_param(cmd, "primary-dns");
1095 if (val) {
1096 /* TODO */
1097 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored primary-dns %s "
1098 "setting", val);
1099 }
1100
1101 val = get_param(cmd, "secondary-dns");
1102 if (val) {
1103 /* TODO */
1104 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored secondary-dns %s "
1105 "setting", val);
1106 }
1107
1108 static_ip_file(4, ip, mask, gw);
1109
1110 return 1;
1111}
1112
1113
1114static int cmd_sta_get_info(struct sigma_dut *dut, struct sigma_conn *conn,
1115 struct sigma_cmd *cmd)
1116{
1117 /* const char *intf = get_param(cmd, "Interface"); */
1118 /* TODO: could report more details here */
1119 send_resp(dut, conn, SIGMA_COMPLETE, "vendor,Atheros");
1120 return 0;
1121}
1122
1123
1124static int cmd_sta_get_mac_address(struct sigma_dut *dut,
1125 struct sigma_conn *conn,
1126 struct sigma_cmd *cmd)
1127{
1128 /* const char *intf = get_param(cmd, "Interface"); */
1129 char addr[20], resp[50];
1130
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05301131 if (dut->dev_role == DEVROLE_STA_CFON)
1132 return sta_cfon_get_mac_address(dut, conn, cmd);
1133
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001134 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
1135 < 0)
1136 return -2;
1137
1138 snprintf(resp, sizeof(resp), "mac,%s", addr);
1139 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1140 return 0;
1141}
1142
1143
1144static int cmd_sta_is_connected(struct sigma_dut *dut, struct sigma_conn *conn,
1145 struct sigma_cmd *cmd)
1146{
1147 /* const char *intf = get_param(cmd, "Interface"); */
1148 int connected = 0;
1149 char result[32];
1150 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
1151 sizeof(result)) < 0) {
1152 sigma_dut_print(dut, DUT_MSG_INFO, "Could not get interface "
1153 "%s status", get_station_ifname());
1154 return -2;
1155 }
1156
1157 sigma_dut_print(dut, DUT_MSG_DEBUG, "wpa_state=%s", result);
1158 if (strncmp(result, "COMPLETED", 9) == 0)
1159 connected = 1;
1160
1161 if (connected)
1162 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1163 else
1164 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1165
1166 return 0;
1167}
1168
1169
1170static int cmd_sta_verify_ip_connection(struct sigma_dut *dut,
1171 struct sigma_conn *conn,
1172 struct sigma_cmd *cmd)
1173{
1174 /* const char *intf = get_param(cmd, "Interface"); */
1175 const char *dst, *timeout;
1176 int wait_time = 90;
1177 char buf[100];
1178 int res;
1179
1180 dst = get_param(cmd, "destination");
1181 if (dst == NULL || !is_ip_addr(dst))
1182 return -1;
1183
1184 timeout = get_param(cmd, "timeout");
1185 if (timeout) {
1186 wait_time = atoi(timeout);
1187 if (wait_time < 1)
1188 wait_time = 1;
1189 }
1190
1191 /* TODO: force renewal of IP lease if DHCP is enabled */
1192
1193 snprintf(buf, sizeof(buf), "ping %s -c 3 -W %d", dst, wait_time);
1194 res = system(buf);
1195 sigma_dut_print(dut, DUT_MSG_DEBUG, "ping returned: %d", res);
1196 if (res == 0)
1197 send_resp(dut, conn, SIGMA_COMPLETE, "connected,1");
1198 else if (res == 256)
1199 send_resp(dut, conn, SIGMA_COMPLETE, "connected,0");
1200 else
1201 return -2;
1202
1203 return 0;
1204}
1205
1206
1207static int cmd_sta_get_bssid(struct sigma_dut *dut, struct sigma_conn *conn,
1208 struct sigma_cmd *cmd)
1209{
1210 /* const char *intf = get_param(cmd, "Interface"); */
1211 char bssid[20], resp[50];
1212
1213 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
1214 < 0)
Peng Xub8fc5cc2017-05-10 17:27:28 -07001215 strlcpy(bssid, "00:00:00:00:00:00", sizeof(bssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001216
1217 snprintf(resp, sizeof(resp), "bssid,%s", bssid);
1218 send_resp(dut, conn, SIGMA_COMPLETE, resp);
1219 return 0;
1220}
1221
1222
1223#ifdef __SAMSUNG__
1224static int add_use_network(const char *ifname)
1225{
1226 char buf[100];
1227
1228 snprintf(buf, sizeof(buf), "USE_NETWORK ON");
1229 wpa_command(ifname, buf);
1230 return 0;
1231}
1232#endif /* __SAMSUNG__ */
1233
1234
1235static int add_network_common(struct sigma_dut *dut, struct sigma_conn *conn,
1236 const char *ifname, struct sigma_cmd *cmd)
1237{
1238 const char *ssid = get_param(cmd, "ssid");
1239 int id;
1240 const char *val;
1241
1242 if (ssid == NULL)
1243 return -1;
1244
1245 start_sta_mode(dut);
1246
1247#ifdef __SAMSUNG__
1248 add_use_network(ifname);
1249#endif /* __SAMSUNG__ */
1250
1251 id = add_network(ifname);
1252 if (id < 0)
1253 return -2;
1254 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding network %d", id);
1255
1256 if (set_network_quoted(ifname, id, "ssid", ssid) < 0)
1257 return -2;
1258
1259 dut->infra_network_id = id;
1260 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
1261
1262 val = get_param(cmd, "program");
1263 if (!val)
1264 val = get_param(cmd, "prog");
1265 if (val && strcasecmp(val, "hs2") == 0) {
1266 char buf[100];
1267 snprintf(buf, sizeof(buf), "ENABLE_NETWORK %d no-connect", id);
1268 wpa_command(ifname, buf);
1269
1270 val = get_param(cmd, "prefer");
1271 if (val && atoi(val) > 0)
1272 set_network(ifname, id, "priority", "1");
1273 }
1274
1275 return id;
1276}
1277
1278
1279static int cmd_sta_set_encryption(struct sigma_dut *dut,
1280 struct sigma_conn *conn,
1281 struct sigma_cmd *cmd)
1282{
1283 const char *intf = get_param(cmd, "Interface");
1284 const char *ssid = get_param(cmd, "ssid");
1285 const char *type = get_param(cmd, "encpType");
1286 const char *ifname;
1287 char buf[200];
1288 int id;
1289
1290 if (intf == NULL || ssid == NULL)
1291 return -1;
1292
1293 if (strcmp(intf, get_main_ifname()) == 0)
1294 ifname = get_station_ifname();
1295 else
1296 ifname = intf;
1297
1298 id = add_network_common(dut, conn, ifname, cmd);
1299 if (id < 0)
1300 return id;
1301
1302 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
1303 return -2;
1304
1305 if (type && strcasecmp(type, "wep") == 0) {
1306 const char *val;
1307 int i;
1308
1309 val = get_param(cmd, "activeKey");
1310 if (val) {
1311 int keyid;
1312 keyid = atoi(val);
1313 if (keyid < 1 || keyid > 4)
1314 return -1;
1315 snprintf(buf, sizeof(buf), "%d", keyid - 1);
1316 if (set_network(ifname, id, "wep_tx_keyidx", buf) < 0)
1317 return -2;
1318 }
1319
1320 for (i = 0; i < 4; i++) {
1321 snprintf(buf, sizeof(buf), "key%d", i + 1);
1322 val = get_param(cmd, buf);
1323 if (val == NULL)
1324 continue;
1325 snprintf(buf, sizeof(buf), "wep_key%d", i);
1326 if (set_network(ifname, id, buf, val) < 0)
1327 return -2;
1328 }
1329 }
1330
1331 return 1;
1332}
1333
1334
1335static int set_wpa_common(struct sigma_dut *dut, struct sigma_conn *conn,
1336 const char *ifname, struct sigma_cmd *cmd)
1337{
1338 const char *val;
1339 int id;
Jouni Malinenad395a22017-09-01 21:13:46 +03001340 int cipher_set = 0;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001341 int owe;
Sunil Duttc75a1e62018-01-11 20:47:50 +05301342 int suite_b = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001343
1344 id = add_network_common(dut, conn, ifname, cmd);
1345 if (id < 0)
1346 return id;
1347
Jouni Malinen47dcc952017-10-09 16:43:24 +03001348 val = get_param(cmd, "Type");
1349 owe = val && strcasecmp(val, "OWE") == 0;
1350
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001351 val = get_param(cmd, "keyMgmtType");
Jouni Malinen47dcc952017-10-09 16:43:24 +03001352 if (!val && owe)
1353 val = "OWE";
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001354 if (val == NULL) {
1355 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Missing keyMgmtType");
1356 return 0;
1357 }
1358 if (strcasecmp(val, "wpa") == 0 ||
1359 strcasecmp(val, "wpa-psk") == 0) {
1360 if (set_network(ifname, id, "proto", "WPA") < 0)
1361 return -2;
1362 } else if (strcasecmp(val, "wpa2") == 0 ||
1363 strcasecmp(val, "wpa2-psk") == 0 ||
1364 strcasecmp(val, "wpa2-ft") == 0 ||
1365 strcasecmp(val, "wpa2-sha256") == 0) {
1366 if (set_network(ifname, id, "proto", "WPA2") < 0)
1367 return -2;
Pradeep Reddy POTTETI6d04b3b2016-11-15 14:51:26 +05301368 } else if (strcasecmp(val, "wpa2-wpa-psk") == 0 ||
1369 strcasecmp(val, "wpa2-wpa-ent") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001370 if (set_network(ifname, id, "proto", "WPA WPA2") < 0)
1371 return -2;
Jouni Malinenad395a22017-09-01 21:13:46 +03001372 } else if (strcasecmp(val, "SuiteB") == 0) {
Sunil Duttc75a1e62018-01-11 20:47:50 +05301373 suite_b = 1;
Jouni Malinenad395a22017-09-01 21:13:46 +03001374 if (set_network(ifname, id, "proto", "WPA2") < 0)
1375 return -2;
Jouni Malinen47dcc952017-10-09 16:43:24 +03001376 } else if (strcasecmp(val, "OWE") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001377 } else {
1378 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized keyMgmtType value");
1379 return 0;
1380 }
1381
1382 val = get_param(cmd, "encpType");
Jouni Malinenad395a22017-09-01 21:13:46 +03001383 if (val) {
1384 cipher_set = 1;
1385 if (strcasecmp(val, "tkip") == 0) {
1386 if (set_network(ifname, id, "pairwise", "TKIP") < 0)
1387 return -2;
1388 } else if (strcasecmp(val, "aes-ccmp") == 0) {
1389 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1390 return -2;
1391 } else if (strcasecmp(val, "aes-ccmp-tkip") == 0) {
1392 if (set_network(ifname, id, "pairwise",
1393 "CCMP TKIP") < 0)
1394 return -2;
1395 } else if (strcasecmp(val, "aes-gcmp") == 0) {
1396 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1397 return -2;
1398 if (set_network(ifname, id, "group", "GCMP") < 0)
1399 return -2;
1400 } else {
1401 send_resp(dut, conn, SIGMA_ERROR,
1402 "errorCode,Unrecognized encpType value");
1403 return 0;
1404 }
1405 }
1406
1407 val = get_param(cmd, "PairwiseCipher");
1408 if (val) {
1409 cipher_set = 1;
1410 /* TODO: Support space separated list */
1411 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1412 if (set_network(ifname, id, "pairwise", "GCMP-256") < 0)
1413 return -2;
1414 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1415 if (set_network(ifname, id, "pairwise",
1416 "CCMP-256") < 0)
1417 return -2;
1418 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1419 if (set_network(ifname, id, "pairwise", "GCMP") < 0)
1420 return -2;
1421 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1422 if (set_network(ifname, id, "pairwise", "CCMP") < 0)
1423 return -2;
1424 } else {
1425 send_resp(dut, conn, SIGMA_ERROR,
1426 "errorCode,Unrecognized PairwiseCipher value");
1427 return 0;
1428 }
1429 }
1430
Jouni Malinen47dcc952017-10-09 16:43:24 +03001431 if (!cipher_set && !owe) {
Jouni Malinenad395a22017-09-01 21:13:46 +03001432 send_resp(dut, conn, SIGMA_ERROR,
1433 "errorCode,Missing encpType and PairwiseCipher");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001434 return 0;
1435 }
Jouni Malinenad395a22017-09-01 21:13:46 +03001436
1437 val = get_param(cmd, "GroupCipher");
1438 if (val) {
1439 if (strcasecmp(val, "AES-GCMP-256") == 0) {
1440 if (set_network(ifname, id, "group", "GCMP-256") < 0)
1441 return -2;
1442 } else if (strcasecmp(val, "AES-CCMP-256") == 0) {
1443 if (set_network(ifname, id, "group", "CCMP-256") < 0)
1444 return -2;
1445 } else if (strcasecmp(val, "AES-GCMP-128") == 0) {
1446 if (set_network(ifname, id, "group", "GCMP") < 0)
1447 return -2;
1448 } else if (strcasecmp(val, "AES-CCMP-128") == 0) {
1449 if (set_network(ifname, id, "group", "CCMP") < 0)
1450 return -2;
1451 } else {
1452 send_resp(dut, conn, SIGMA_ERROR,
1453 "errorCode,Unrecognized GroupCipher value");
1454 return 0;
1455 }
1456 }
1457
Jouni Malinen7b239522017-09-14 21:37:18 +03001458 val = get_param(cmd, "GroupMgntCipher");
Jouni Malinenad395a22017-09-01 21:13:46 +03001459 if (val) {
Jouni Malinene8898cb2017-09-26 17:55:26 +03001460 const char *cipher;
1461
1462 if (strcasecmp(val, "BIP-GMAC-256") == 0) {
1463 cipher = "BIP-GMAC-256";
1464 } else if (strcasecmp(val, "BIP-CMAC-256") == 0) {
1465 cipher = "BIP-CMAC-256";
1466 } else if (strcasecmp(val, "BIP-GMAC-128") == 0) {
1467 cipher = "BIP-GMAC-128";
1468 } else if (strcasecmp(val, "BIP-CMAC-128") == 0) {
1469 cipher = "AES-128-CMAC";
1470 } else {
1471 send_resp(dut, conn, SIGMA_INVALID,
1472 "errorCode,Unsupported GroupMgntCipher");
1473 return 0;
1474 }
1475 if (set_network(ifname, id, "group_mgmt", cipher) < 0) {
1476 send_resp(dut, conn, SIGMA_INVALID,
1477 "errorCode,Failed to set GroupMgntCipher");
1478 return 0;
1479 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001480 }
1481
1482 dut->sta_pmf = STA_PMF_DISABLED;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301483
1484 if (dut->program == PROGRAM_OCE) {
1485 dut->sta_pmf = STA_PMF_OPTIONAL;
1486 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1487 return -2;
1488 }
1489
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001490 val = get_param(cmd, "PMF");
1491 if (val) {
1492 if (strcasecmp(val, "Required") == 0 ||
1493 strcasecmp(val, "Forced_Required") == 0) {
1494 dut->sta_pmf = STA_PMF_REQUIRED;
1495 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1496 return -2;
1497 } else if (strcasecmp(val, "Optional") == 0) {
1498 dut->sta_pmf = STA_PMF_OPTIONAL;
1499 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1500 return -2;
1501 } else if (strcasecmp(val, "Disabled") == 0 ||
1502 strcasecmp(val, "Forced_Disabled") == 0) {
1503 dut->sta_pmf = STA_PMF_DISABLED;
1504 } else {
1505 send_resp(dut, conn, SIGMA_INVALID, "errorCode,Unrecognized PMF value");
1506 return 0;
1507 }
Sunil Duttc75a1e62018-01-11 20:47:50 +05301508 } else if (owe || suite_b) {
Jouni Malinen1287cd72018-01-04 17:08:01 +02001509 dut->sta_pmf = STA_PMF_REQUIRED;
1510 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1511 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001512 }
1513
1514 return id;
1515}
1516
1517
1518static int cmd_sta_set_psk(struct sigma_dut *dut, struct sigma_conn *conn,
1519 struct sigma_cmd *cmd)
1520{
1521 const char *intf = get_param(cmd, "Interface");
Jouni Malinen992a81e2017-08-22 13:57:47 +03001522 const char *type = get_param(cmd, "Type");
Jouni Malinen1287cd72018-01-04 17:08:01 +02001523 const char *pmf = get_param(cmd, "PMF");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001524 const char *ifname, *val, *alg;
1525 int id;
1526
1527 if (intf == NULL)
1528 return -1;
1529
1530 if (strcmp(intf, get_main_ifname()) == 0)
1531 ifname = get_station_ifname();
1532 else
1533 ifname = intf;
1534
1535 id = set_wpa_common(dut, conn, ifname, cmd);
1536 if (id < 0)
1537 return id;
1538
1539 val = get_param(cmd, "keyMgmtType");
1540 alg = get_param(cmd, "micAlg");
1541
Jouni Malinen992a81e2017-08-22 13:57:47 +03001542 if (type && strcasecmp(type, "SAE") == 0) {
1543 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1544 if (set_network(ifname, id, "key_mgmt", "FT-SAE") < 0)
1545 return -2;
1546 } else {
1547 if (set_network(ifname, id, "key_mgmt", "SAE") < 0)
1548 return -2;
1549 }
1550 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1551 sigma_dut_print(dut, DUT_MSG_ERROR,
1552 "Failed to clear sae_groups to default");
1553 return -2;
1554 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001555 if (!pmf) {
1556 dut->sta_pmf = STA_PMF_REQUIRED;
1557 if (set_network(ifname, id, "ieee80211w", "2") < 0)
1558 return -2;
1559 }
Jouni Malinen0ab50f42017-08-31 01:34:59 +03001560 } else if (type && strcasecmp(type, "PSK-SAE") == 0) {
1561 if (val && strcasecmp(val, "wpa2-ft") == 0) {
1562 if (set_network(ifname, id, "key_mgmt",
1563 "FT-SAE FT-PSK") < 0)
1564 return -2;
1565 } else {
1566 if (set_network(ifname, id, "key_mgmt",
1567 "SAE WPA-PSK") < 0)
1568 return -2;
1569 }
1570 if (wpa_command(ifname, "SET sae_groups ") != 0) {
1571 sigma_dut_print(dut, DUT_MSG_ERROR,
1572 "Failed to clear sae_groups to default");
1573 return -2;
1574 }
Jouni Malinen1287cd72018-01-04 17:08:01 +02001575 if (!pmf) {
1576 dut->sta_pmf = STA_PMF_OPTIONAL;
1577 if (set_network(ifname, id, "ieee80211w", "1") < 0)
1578 return -2;
1579 }
Jouni Malinen992a81e2017-08-22 13:57:47 +03001580 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001581 if (set_network(ifname, id, "key_mgmt", "WPA-PSK-SHA256") < 0)
1582 return -2;
1583 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1584 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1585 return -2;
Ashwini Patil6dbf7b02017-03-20 13:42:11 +05301586 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1587 if (set_network(ifname, id, "key_mgmt", "FT-PSK") < 0)
1588 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001589 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1590 dut->sta_pmf == STA_PMF_REQUIRED) {
1591 if (set_network(ifname, id, "key_mgmt",
1592 "WPA-PSK WPA-PSK-SHA256") < 0)
1593 return -2;
1594 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1595 if (set_network(ifname, id, "key_mgmt",
1596 "WPA-PSK WPA-PSK-SHA256") < 0)
1597 return -2;
1598 } else {
1599 if (set_network(ifname, id, "key_mgmt", "WPA-PSK") < 0)
1600 return -2;
1601 }
1602
1603 val = get_param(cmd, "passPhrase");
1604 if (val == NULL)
1605 return -1;
Jouni Malinen2126f422017-10-11 23:24:33 +03001606 if (type && strcasecmp(type, "SAE") == 0) {
1607 if (set_network_quoted(ifname, id, "sae_password", val) < 0)
1608 return -2;
1609 } else {
1610 if (set_network_quoted(ifname, id, "psk", val) < 0)
1611 return -2;
1612 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001613
Jouni Malinen992a81e2017-08-22 13:57:47 +03001614 val = get_param(cmd, "ECGroupID");
1615 if (val) {
1616 char buf[50];
1617
1618 snprintf(buf, sizeof(buf), "SET sae_groups %u", atoi(val));
1619 if (wpa_command(ifname, buf) != 0) {
1620 sigma_dut_print(dut, DUT_MSG_ERROR,
1621 "Failed to clear sae_groups");
1622 return -2;
1623 }
1624 }
1625
Jouni Malinen68143132017-09-02 02:34:08 +03001626 val = get_param(cmd, "InvalidSAEElement");
1627 if (val) {
1628 free(dut->sae_commit_override);
1629 dut->sae_commit_override = strdup(val);
1630 }
1631
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001632 return 1;
1633}
1634
1635
1636static int set_eap_common(struct sigma_dut *dut, struct sigma_conn *conn,
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301637 const char *ifname, int username_identity,
1638 struct sigma_cmd *cmd)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001639{
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301640 const char *val, *alg, *akm;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001641 int id;
1642 char buf[200];
1643#ifdef ANDROID
1644 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1645 int length;
1646#endif /* ANDROID */
1647
1648 id = set_wpa_common(dut, conn, ifname, cmd);
1649 if (id < 0)
1650 return id;
1651
1652 val = get_param(cmd, "keyMgmtType");
1653 alg = get_param(cmd, "micAlg");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301654 akm = get_param(cmd, "AKMSuiteType");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001655
Jouni Malinenad395a22017-09-01 21:13:46 +03001656 if (val && strcasecmp(val, "SuiteB") == 0) {
1657 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SUITE-B-192") <
1658 0)
1659 return -2;
1660 } else if (alg && strcasecmp(alg, "SHA-256") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001661 if (set_network(ifname, id, "key_mgmt", "WPA-EAP-SHA256") < 0)
1662 return -2;
1663 } else if (alg && strcasecmp(alg, "SHA-1") == 0) {
1664 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1665 return -2;
1666 } else if (val && strcasecmp(val, "wpa2-ft") == 0) {
1667 if (set_network(ifname, id, "key_mgmt", "FT-EAP") < 0)
1668 return -2;
1669 } else if ((val && strcasecmp(val, "wpa2-sha256") == 0) ||
1670 dut->sta_pmf == STA_PMF_REQUIRED) {
1671 if (set_network(ifname, id, "key_mgmt",
1672 "WPA-EAP WPA-EAP-SHA256") < 0)
1673 return -2;
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05301674 } else if (akm && atoi(akm) == 14) {
1675 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1676 dut->sta_pmf == STA_PMF_REQUIRED) {
1677 if (set_network(ifname, id, "key_mgmt",
1678 "WPA-EAP-SHA256 FILS-SHA256") < 0)
1679 return -2;
1680 } else {
1681 if (set_network(ifname, id, "key_mgmt",
1682 "WPA-EAP FILS-SHA256") < 0)
1683 return -2;
1684 }
1685
1686 if (set_network(ifname, id, "erp", "1") < 0)
1687 return -2;
1688 } else if (akm && atoi(akm) == 15) {
1689 if (dut->sta_pmf == STA_PMF_OPTIONAL ||
1690 dut->sta_pmf == STA_PMF_REQUIRED) {
1691 if (set_network(ifname, id, "key_mgmt",
1692 "WPA-EAP-SHA256 FILS-SHA384") < 0)
1693 return -2;
1694 } else {
1695 if (set_network(ifname, id, "key_mgmt",
1696 "WPA-EAP FILS-SHA384") < 0)
1697 return -2;
1698 }
1699
1700 if (set_network(ifname, id, "erp", "1") < 0)
1701 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001702 } else if (dut->sta_pmf == STA_PMF_OPTIONAL) {
1703 if (set_network(ifname, id, "key_mgmt",
1704 "WPA-EAP WPA-EAP-SHA256") < 0)
1705 return -2;
1706 } else {
1707 if (set_network(ifname, id, "key_mgmt", "WPA-EAP") < 0)
1708 return -2;
1709 }
1710
1711 val = get_param(cmd, "trustedRootCA");
1712 if (val) {
1713#ifdef ANDROID
1714 snprintf(buf, sizeof(buf), "CACERT_%s", val);
1715 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf,
1716 kvalue);
1717 if (length > 0) {
1718 sigma_dut_print(dut, DUT_MSG_INFO,
1719 "Use Android keystore [%s]", buf);
1720 snprintf(buf, sizeof(buf), "keystore://CACERT_%s",
1721 val);
1722 goto ca_cert_selected;
1723 }
1724#endif /* ANDROID */
1725
1726 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1727#ifdef __linux__
1728 if (!file_exists(buf)) {
1729 char msg[300];
1730 snprintf(msg, sizeof(msg), "ErrorCode,trustedRootCA "
1731 "file (%s) not found", buf);
1732 send_resp(dut, conn, SIGMA_ERROR, msg);
1733 return -3;
1734 }
1735#endif /* __linux__ */
1736#ifdef ANDROID
1737ca_cert_selected:
1738#endif /* ANDROID */
1739 if (set_network_quoted(ifname, id, "ca_cert", buf) < 0)
1740 return -2;
1741 }
1742
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301743 if (username_identity) {
1744 val = get_param(cmd, "username");
1745 if (val) {
1746 if (set_network_quoted(ifname, id, "identity", val) < 0)
1747 return -2;
1748 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001749
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301750 val = get_param(cmd, "password");
1751 if (val) {
1752 if (set_network_quoted(ifname, id, "password", val) < 0)
1753 return -2;
1754 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001755 }
1756
1757 return id;
1758}
1759
1760
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001761static int set_tls_cipher(const char *ifname, int id, const char *cipher)
1762{
1763 const char *val;
1764
1765 if (!cipher)
1766 return 0;
1767
1768 if (strcasecmp(cipher, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384") == 0)
1769 val = "ECDHE-ECDSA-AES256-GCM-SHA384";
1770 else if (strcasecmp(cipher,
1771 "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1772 val = "ECDHE-RSA-AES256-GCM-SHA384";
1773 else if (strcasecmp(cipher, "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384") == 0)
1774 val = "DHE-RSA-AES256-GCM-SHA384";
1775 else if (strcasecmp(cipher,
1776 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256") == 0)
1777 val = "ECDHE-ECDSA-AES128-GCM-SHA256";
1778 else
1779 return -1;
1780
1781 /* Need to clear phase1="tls_suiteb=1" to allow cipher enforcement */
1782 set_network_quoted(ifname, id, "phase1", "");
1783
1784 return set_network_quoted(ifname, id, "openssl_ciphers", val);
1785}
1786
1787
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001788static int cmd_sta_set_eaptls(struct sigma_dut *dut, struct sigma_conn *conn,
1789 struct sigma_cmd *cmd)
1790{
1791 const char *intf = get_param(cmd, "Interface");
1792 const char *ifname, *val;
1793 int id;
1794 char buf[200];
1795#ifdef ANDROID
1796 unsigned char kvalue[KEYSTORE_MESSAGE_SIZE];
1797 int length;
1798 int jb_or_newer = 0;
1799 char prop[PROPERTY_VALUE_MAX];
1800#endif /* ANDROID */
1801
1802 if (intf == NULL)
1803 return -1;
1804
1805 if (strcmp(intf, get_main_ifname()) == 0)
1806 ifname = get_station_ifname();
1807 else
1808 ifname = intf;
1809
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301810 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001811 if (id < 0)
1812 return id;
1813
1814 if (set_network(ifname, id, "eap", "TLS") < 0)
1815 return -2;
1816
Pradeep Reddy POTTETI9f6c2132016-05-05 16:28:19 +05301817 if (!get_param(cmd, "username") &&
1818 set_network_quoted(ifname, id, "identity",
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001819 "wifi-user@wifilabs.local") < 0)
1820 return -2;
1821
1822 val = get_param(cmd, "clientCertificate");
1823 if (val == NULL)
1824 return -1;
1825#ifdef ANDROID
1826 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1827 length = android_keystore_get(ANDROID_KEYSTORE_GET, buf, kvalue);
1828 if (length < 0) {
1829 /*
1830 * JB started reporting keystore type mismatches, so retry with
1831 * the GET_PUBKEY command if the generic GET fails.
1832 */
1833 length = android_keystore_get(ANDROID_KEYSTORE_GET_PUBKEY,
1834 buf, kvalue);
1835 }
1836
1837 if (property_get("ro.build.version.release", prop, NULL) != 0) {
1838 sigma_dut_print(dut, DUT_MSG_DEBUG, "Android release %s", prop);
1839 if (strncmp(prop, "4.0", 3) != 0)
1840 jb_or_newer = 1;
1841 } else
1842 jb_or_newer = 1; /* assume newer */
1843
1844 if (jb_or_newer && length > 0) {
1845 sigma_dut_print(dut, DUT_MSG_INFO,
1846 "Use Android keystore [%s]", buf);
1847 if (set_network(ifname, id, "engine", "1") < 0)
1848 return -2;
1849 if (set_network_quoted(ifname, id, "engine_id", "keystore") < 0)
1850 return -2;
1851 snprintf(buf, sizeof(buf), "USRPKEY_%s", val);
1852 if (set_network_quoted(ifname, id, "key_id", buf) < 0)
1853 return -2;
1854 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1855 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1856 return -2;
1857 return 1;
1858 } else if (length > 0) {
1859 sigma_dut_print(dut, DUT_MSG_INFO,
1860 "Use Android keystore [%s]", buf);
1861 snprintf(buf, sizeof(buf), "keystore://USRPKEY_%s", val);
1862 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1863 return -2;
1864 snprintf(buf, sizeof(buf), "keystore://USRCERT_%s", val);
1865 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1866 return -2;
1867 return 1;
1868 }
1869#endif /* ANDROID */
1870
1871 snprintf(buf, sizeof(buf), "%s/%s", sigma_cert_path, val);
1872#ifdef __linux__
1873 if (!file_exists(buf)) {
1874 char msg[300];
1875 snprintf(msg, sizeof(msg), "ErrorCode,clientCertificate file "
1876 "(%s) not found", buf);
1877 send_resp(dut, conn, SIGMA_ERROR, msg);
1878 return -3;
1879 }
1880#endif /* __linux__ */
1881 if (set_network_quoted(ifname, id, "private_key", buf) < 0)
1882 return -2;
1883 if (set_network_quoted(ifname, id, "client_cert", buf) < 0)
1884 return -2;
1885
1886 if (set_network_quoted(ifname, id, "private_key_passwd", "wifi") < 0)
1887 return -2;
1888
Jouni Malinen5eabb2a2017-10-03 18:17:30 +03001889 val = get_param(cmd, "keyMgmtType");
1890 if (val && strcasecmp(val, "SuiteB") == 0) {
1891 val = get_param(cmd, "CertType");
1892 if (val && strcasecmp(val, "RSA") == 0) {
1893 if (set_network_quoted(ifname, id, "phase1",
1894 "tls_suiteb=1") < 0)
1895 return -2;
1896 } else {
1897 if (set_network_quoted(ifname, id, "openssl_ciphers",
1898 "SUITEB192") < 0)
1899 return -2;
1900 }
1901
1902 val = get_param(cmd, "TLSCipher");
1903 if (set_tls_cipher(ifname, id, val) < 0) {
1904 send_resp(dut, conn, SIGMA_ERROR,
1905 "ErrorCode,Unsupported TLSCipher value");
1906 return -3;
1907 }
1908 }
1909
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001910 return 1;
1911}
1912
1913
1914static int cmd_sta_set_eapttls(struct sigma_dut *dut, struct sigma_conn *conn,
1915 struct sigma_cmd *cmd)
1916{
1917 const char *intf = get_param(cmd, "Interface");
1918 const char *ifname;
1919 int id;
1920
1921 if (intf == NULL)
1922 return -1;
1923
1924 if (strcmp(intf, get_main_ifname()) == 0)
1925 ifname = get_station_ifname();
1926 else
1927 ifname = intf;
1928
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301929 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001930 if (id < 0)
1931 return id;
1932
1933 if (set_network(ifname, id, "eap", "TTLS") < 0) {
1934 send_resp(dut, conn, SIGMA_ERROR,
1935 "errorCode,Failed to set TTLS method");
1936 return 0;
1937 }
1938
1939 if (set_network_quoted(ifname, id, "phase2", "auth=MSCHAPV2") < 0) {
1940 send_resp(dut, conn, SIGMA_ERROR,
1941 "errorCode,Failed to set MSCHAPv2 for TTLS Phase 2");
1942 return 0;
1943 }
1944
1945 return 1;
1946}
1947
1948
1949static int cmd_sta_set_eapsim(struct sigma_dut *dut, struct sigma_conn *conn,
1950 struct sigma_cmd *cmd)
1951{
1952 const char *intf = get_param(cmd, "Interface");
1953 const char *ifname;
1954 int id;
1955
1956 if (intf == NULL)
1957 return -1;
1958
1959 if (strcmp(intf, get_main_ifname()) == 0)
1960 ifname = get_station_ifname();
1961 else
1962 ifname = intf;
1963
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301964 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001965 if (id < 0)
1966 return id;
1967
1968 if (set_network(ifname, id, "eap", "SIM") < 0)
1969 return -2;
1970
1971 return 1;
1972}
1973
1974
1975static int cmd_sta_set_peap(struct sigma_dut *dut, struct sigma_conn *conn,
1976 struct sigma_cmd *cmd)
1977{
1978 const char *intf = get_param(cmd, "Interface");
1979 const char *ifname, *val;
1980 int id;
1981 char buf[100];
1982
1983 if (intf == NULL)
1984 return -1;
1985
1986 if (strcmp(intf, get_main_ifname()) == 0)
1987 ifname = get_station_ifname();
1988 else
1989 ifname = intf;
1990
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05301991 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02001992 if (id < 0)
1993 return id;
1994
1995 if (set_network(ifname, id, "eap", "PEAP") < 0)
1996 return -2;
1997
1998 val = get_param(cmd, "innerEAP");
1999 if (val) {
2000 if (strcasecmp(val, "MSCHAPv2") == 0) {
2001 if (set_network_quoted(ifname, id, "phase2",
2002 "auth=MSCHAPV2") < 0)
2003 return -2;
2004 } else if (strcasecmp(val, "GTC") == 0) {
2005 if (set_network_quoted(ifname, id, "phase2",
2006 "auth=GTC") < 0)
2007 return -2;
2008 } else
2009 return -1;
2010 }
2011
2012 val = get_param(cmd, "peapVersion");
2013 if (val) {
2014 int ver = atoi(val);
2015 if (ver < 0 || ver > 1)
2016 return -1;
2017 snprintf(buf, sizeof(buf), "peapver=%d", ver);
2018 if (set_network_quoted(ifname, id, "phase1", buf) < 0)
2019 return -2;
2020 }
2021
2022 return 1;
2023}
2024
2025
2026static int cmd_sta_set_eapfast(struct sigma_dut *dut, struct sigma_conn *conn,
2027 struct sigma_cmd *cmd)
2028{
2029 const char *intf = get_param(cmd, "Interface");
2030 const char *ifname, *val;
2031 int id;
2032 char buf[100];
2033
2034 if (intf == NULL)
2035 return -1;
2036
2037 if (strcmp(intf, get_main_ifname()) == 0)
2038 ifname = get_station_ifname();
2039 else
2040 ifname = intf;
2041
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302042 id = set_eap_common(dut, conn, ifname, 1, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002043 if (id < 0)
2044 return id;
2045
2046 if (set_network(ifname, id, "eap", "FAST") < 0)
2047 return -2;
2048
2049 val = get_param(cmd, "innerEAP");
2050 if (val) {
2051 if (strcasecmp(val, "MSCHAPV2") == 0) {
2052 if (set_network_quoted(ifname, id, "phase2",
2053 "auth=MSCHAPV2") < 0)
2054 return -2;
2055 } else if (strcasecmp(val, "GTC") == 0) {
2056 if (set_network_quoted(ifname, id, "phase2",
2057 "auth=GTC") < 0)
2058 return -2;
2059 } else
2060 return -1;
2061 }
2062
2063 val = get_param(cmd, "validateServer");
2064 if (val) {
2065 /* TODO */
2066 sigma_dut_print(dut, DUT_MSG_INFO, "Ignored EAP-FAST "
2067 "validateServer=%s", val);
2068 }
2069
2070 val = get_param(cmd, "pacFile");
2071 if (val) {
2072 snprintf(buf, sizeof(buf), "blob://%s", val);
2073 if (set_network_quoted(ifname, id, "pac_file", buf) < 0)
2074 return -2;
2075 }
2076
2077 if (set_network_quoted(ifname, id, "phase1", "fast_provisioning=2") <
2078 0)
2079 return -2;
2080
2081 return 1;
2082}
2083
2084
2085static int cmd_sta_set_eapaka(struct sigma_dut *dut, struct sigma_conn *conn,
2086 struct sigma_cmd *cmd)
2087{
2088 const char *intf = get_param(cmd, "Interface");
2089 const char *ifname;
2090 int id;
2091
2092 if (intf == NULL)
2093 return -1;
2094
2095 if (strcmp(intf, get_main_ifname()) == 0)
2096 ifname = get_station_ifname();
2097 else
2098 ifname = intf;
2099
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302100 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002101 if (id < 0)
2102 return id;
2103
2104 if (set_network(ifname, id, "eap", "AKA") < 0)
2105 return -2;
2106
2107 return 1;
2108}
2109
2110
2111static int cmd_sta_set_eapakaprime(struct sigma_dut *dut,
2112 struct sigma_conn *conn,
2113 struct sigma_cmd *cmd)
2114{
2115 const char *intf = get_param(cmd, "Interface");
2116 const char *ifname;
2117 int id;
2118
2119 if (intf == NULL)
2120 return -1;
2121
2122 if (strcmp(intf, get_main_ifname()) == 0)
2123 ifname = get_station_ifname();
2124 else
2125 ifname = intf;
2126
Bala Krishna Bhamidipati73d7af02016-03-24 12:27:56 +05302127 id = set_eap_common(dut, conn, ifname, !dut->sim_no_username, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002128 if (id < 0)
2129 return id;
2130
2131 if (set_network(ifname, id, "eap", "AKA'") < 0)
2132 return -2;
2133
2134 return 1;
2135}
2136
2137
2138static int sta_set_open(struct sigma_dut *dut, struct sigma_conn *conn,
2139 struct sigma_cmd *cmd)
2140{
2141 const char *intf = get_param(cmd, "Interface");
2142 const char *ifname;
2143 int id;
2144
2145 if (strcmp(intf, get_main_ifname()) == 0)
2146 ifname = get_station_ifname();
2147 else
2148 ifname = intf;
2149
2150 id = add_network_common(dut, conn, ifname, cmd);
2151 if (id < 0)
2152 return id;
2153
2154 if (set_network(ifname, id, "key_mgmt", "NONE") < 0)
2155 return -2;
2156
2157 return 1;
2158}
2159
2160
Jouni Malinen47dcc952017-10-09 16:43:24 +03002161static int sta_set_owe(struct sigma_dut *dut, struct sigma_conn *conn,
2162 struct sigma_cmd *cmd)
2163{
2164 const char *intf = get_param(cmd, "Interface");
2165 const char *ifname, *val;
2166 int id;
2167
2168 if (intf == NULL)
2169 return -1;
2170
2171 if (strcmp(intf, get_main_ifname()) == 0)
2172 ifname = get_station_ifname();
2173 else
2174 ifname = intf;
2175
2176 id = set_wpa_common(dut, conn, ifname, cmd);
2177 if (id < 0)
2178 return id;
2179
2180 if (set_network(ifname, id, "key_mgmt", "OWE") < 0)
2181 return -2;
2182
2183 val = get_param(cmd, "ECGroupID");
Jouni Malinenfac9cad2017-10-10 18:35:55 +03002184 if (val && strcmp(val, "0") == 0) {
2185 if (wpa_command(ifname,
2186 "VENDOR_ELEM_ADD 13 ff23200000783590fb7440e03d5b3b33911f86affdcc6b4411b707846ac4ff08ddc8831ccd") != 0) {
2187 sigma_dut_print(dut, DUT_MSG_ERROR,
2188 "Failed to set OWE DH Param element override");
2189 return -2;
2190 }
2191 } else if (val && set_network(ifname, id, "owe_group", val) < 0) {
Jouni Malinen47dcc952017-10-09 16:43:24 +03002192 sigma_dut_print(dut, DUT_MSG_ERROR,
2193 "Failed to clear owe_group");
2194 return -2;
2195 }
2196
2197 return 1;
2198}
2199
2200
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002201static int cmd_sta_set_security(struct sigma_dut *dut, struct sigma_conn *conn,
2202 struct sigma_cmd *cmd)
2203{
2204 const char *type = get_param(cmd, "Type");
2205
2206 if (type == NULL) {
2207 send_resp(dut, conn, SIGMA_ERROR,
2208 "ErrorCode,Missing Type argument");
2209 return 0;
2210 }
2211
2212 if (strcasecmp(type, "OPEN") == 0)
2213 return sta_set_open(dut, conn, cmd);
Jouni Malinen47dcc952017-10-09 16:43:24 +03002214 if (strcasecmp(type, "OWE") == 0)
2215 return sta_set_owe(dut, conn, cmd);
Jouni Malinen992a81e2017-08-22 13:57:47 +03002216 if (strcasecmp(type, "PSK") == 0 ||
Jouni Malinen0ab50f42017-08-31 01:34:59 +03002217 strcasecmp(type, "PSK-SAE") == 0 ||
Jouni Malinen992a81e2017-08-22 13:57:47 +03002218 strcasecmp(type, "SAE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002219 return cmd_sta_set_psk(dut, conn, cmd);
2220 if (strcasecmp(type, "EAPTLS") == 0)
2221 return cmd_sta_set_eaptls(dut, conn, cmd);
2222 if (strcasecmp(type, "EAPTTLS") == 0)
2223 return cmd_sta_set_eapttls(dut, conn, cmd);
2224 if (strcasecmp(type, "EAPPEAP") == 0)
2225 return cmd_sta_set_peap(dut, conn, cmd);
2226 if (strcasecmp(type, "EAPSIM") == 0)
2227 return cmd_sta_set_eapsim(dut, conn, cmd);
2228 if (strcasecmp(type, "EAPFAST") == 0)
2229 return cmd_sta_set_eapfast(dut, conn, cmd);
2230 if (strcasecmp(type, "EAPAKA") == 0)
2231 return cmd_sta_set_eapaka(dut, conn, cmd);
2232 if (strcasecmp(type, "EAPAKAPRIME") == 0)
2233 return cmd_sta_set_eapakaprime(dut, conn, cmd);
Amarnath Hullur Subramanyam81b11cd2018-01-30 19:07:17 -08002234 if (strcasecmp(type, "wep") == 0)
2235 return cmd_sta_set_encryption(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002236
2237 send_resp(dut, conn, SIGMA_ERROR,
2238 "ErrorCode,Unsupported Type value");
2239 return 0;
2240}
2241
2242
2243int ath6kl_client_uapsd(struct sigma_dut *dut, const char *intf, int uapsd)
2244{
2245#ifdef __linux__
2246 /* special handling for ath6kl */
2247 char path[128], fname[128], *pos;
2248 ssize_t res;
2249 FILE *f;
2250
2251 snprintf(path, sizeof(path), "/sys/class/net/%s/phy80211", intf);
2252 res = readlink(path, path, sizeof(path));
2253 if (res < 0)
2254 return 0; /* not ath6kl */
2255
2256 if (res >= (int) sizeof(path))
2257 res = sizeof(path) - 1;
2258 path[res] = '\0';
2259 pos = strrchr(path, '/');
2260 if (pos == NULL)
2261 pos = path;
2262 else
2263 pos++;
2264 snprintf(fname, sizeof(fname),
2265 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2266 "create_qos", pos);
2267 if (!file_exists(fname))
2268 return 0; /* not ath6kl */
2269
2270 if (uapsd) {
2271 f = fopen(fname, "w");
2272 if (f == NULL)
2273 return -1;
2274
2275 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl create_qos");
2276 fprintf(f, "4 2 2 1 2 9999999 9999999 9999999 7777777 0 4 "
2277 "45000 200 56789000 56789000 5678900 0 0 9999999 "
2278 "20000 0\n");
2279 fclose(f);
2280 } else {
2281 snprintf(fname, sizeof(fname),
2282 "/sys/kernel/debug/ieee80211/%s/ath6kl/"
2283 "delete_qos", pos);
2284
2285 f = fopen(fname, "w");
2286 if (f == NULL)
2287 return -1;
2288
2289 sigma_dut_print(dut, DUT_MSG_DEBUG, "Use ath6kl delete_qos");
2290 fprintf(f, "2 4\n");
2291 fclose(f);
2292 }
2293#endif /* __linux__ */
2294
2295 return 0;
2296}
2297
2298
2299static int cmd_sta_set_uapsd(struct sigma_dut *dut, struct sigma_conn *conn,
2300 struct sigma_cmd *cmd)
2301{
2302 const char *intf = get_param(cmd, "Interface");
2303 /* const char *ssid = get_param(cmd, "ssid"); */
2304 const char *val;
2305 int max_sp_len = 4;
2306 int ac_be = 1, ac_bk = 1, ac_vi = 1, ac_vo = 1;
2307 char buf[100];
2308 int ret1, ret2;
2309
2310 val = get_param(cmd, "maxSPLength");
2311 if (val) {
2312 max_sp_len = atoi(val);
2313 if (max_sp_len != 0 && max_sp_len != 1 && max_sp_len != 2 &&
2314 max_sp_len != 4)
2315 return -1;
2316 }
2317
2318 val = get_param(cmd, "acBE");
2319 if (val)
2320 ac_be = atoi(val);
2321
2322 val = get_param(cmd, "acBK");
2323 if (val)
2324 ac_bk = atoi(val);
2325
2326 val = get_param(cmd, "acVI");
2327 if (val)
2328 ac_vi = atoi(val);
2329
2330 val = get_param(cmd, "acVO");
2331 if (val)
2332 ac_vo = atoi(val);
2333
2334 dut->client_uapsd = ac_be || ac_bk || ac_vi || ac_vo;
2335
2336 snprintf(buf, sizeof(buf), "P2P_SET client_apsd %d,%d,%d,%d;%d",
2337 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2338 ret1 = wpa_command(intf, buf);
2339
2340 snprintf(buf, sizeof(buf), "SET uapsd %d,%d,%d,%d;%d",
2341 ac_be, ac_bk, ac_vi, ac_vo, max_sp_len);
2342 ret2 = wpa_command(intf, buf);
2343
2344 if (ret1 && ret2) {
2345 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to set client mode "
2346 "UAPSD parameters.");
2347 return -2;
2348 }
2349
2350 if (ath6kl_client_uapsd(dut, intf, dut->client_uapsd) < 0) {
2351 send_resp(dut, conn, SIGMA_ERROR,
2352 "ErrorCode,Failed to set ath6kl QoS parameters");
2353 return 0;
2354 }
2355
2356 return 1;
2357}
2358
2359
2360static int cmd_sta_set_wmm(struct sigma_dut *dut, struct sigma_conn *conn,
2361 struct sigma_cmd *cmd)
2362{
2363 char buf[1000];
2364 const char *intf = get_param(cmd, "Interface");
2365 const char *grp = get_param(cmd, "Group");
2366 const char *act = get_param(cmd, "Action");
2367 const char *tid = get_param(cmd, "Tid");
2368 const char *dir = get_param(cmd, "Direction");
2369 const char *psb = get_param(cmd, "Psb");
2370 const char *up = get_param(cmd, "Up");
2371 const char *fixed = get_param(cmd, "Fixed");
2372 const char *size = get_param(cmd, "Size");
2373 const char *msize = get_param(cmd, "Maxsize");
2374 const char *minsi = get_param(cmd, "Min_srvc_intrvl");
2375 const char *maxsi = get_param(cmd, "Max_srvc_intrvl");
2376 const char *inact = get_param(cmd, "Inactivity");
2377 const char *sus = get_param(cmd, "Suspension");
2378 const char *mindr = get_param(cmd, "Mindatarate");
2379 const char *meandr = get_param(cmd, "Meandatarate");
2380 const char *peakdr = get_param(cmd, "Peakdatarate");
2381 const char *phyrate = get_param(cmd, "Phyrate");
2382 const char *burstsize = get_param(cmd, "Burstsize");
2383 const char *sba = get_param(cmd, "Sba");
2384 int direction;
2385 int handle;
Peng Xu93319622017-10-04 17:58:16 -07002386 float sba_fv = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002387 int fixed_int;
2388 int psb_ts;
2389
2390 if (intf == NULL || grp == NULL || act == NULL )
2391 return -1;
2392
2393 if (strcasecmp(act, "addts") == 0) {
2394 if (tid == NULL || dir == NULL || psb == NULL ||
2395 up == NULL || fixed == NULL || size == NULL)
2396 return -1;
2397
2398 /*
2399 * Note: Sigma CAPI spec lists uplink, downlink, and bidi as the
2400 * possible values, but WMM-AC and V-E test scripts use "UP,
2401 * "DOWN", and "BIDI".
2402 */
2403 if (strcasecmp(dir, "uplink") == 0 ||
2404 strcasecmp(dir, "up") == 0) {
2405 direction = 0;
2406 } else if (strcasecmp(dir, "downlink") == 0 ||
2407 strcasecmp(dir, "down") == 0) {
2408 direction = 1;
2409 } else if (strcasecmp(dir, "bidi") == 0) {
2410 direction = 2;
2411 } else {
2412 sigma_dut_print(dut, DUT_MSG_ERROR,
2413 "Direction %s not supported", dir);
2414 return -1;
2415 }
2416
2417 if (strcasecmp(psb, "legacy") == 0) {
2418 psb_ts = 0;
2419 } else if (strcasecmp(psb, "uapsd") == 0) {
2420 psb_ts = 1;
2421 } else {
2422 sigma_dut_print(dut, DUT_MSG_ERROR,
2423 "PSB %s not supported", psb);
2424 return -1;
2425 }
2426
2427 if (atoi(tid) < 0 || atoi(tid) > 7) {
2428 sigma_dut_print(dut, DUT_MSG_ERROR,
2429 "TID %s not supported", tid);
2430 return -1;
2431 }
2432
2433 if (strcasecmp(fixed, "true") == 0) {
2434 fixed_int = 1;
2435 } else {
2436 fixed_int = 0;
2437 }
2438
Peng Xu93319622017-10-04 17:58:16 -07002439 if (sba)
2440 sba_fv = atof(sba);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002441
2442 dut->dialog_token++;
2443 handle = 7000 + dut->dialog_token;
2444
2445 /*
2446 * size: convert to hex
2447 * maxsi: convert to hex
2448 * mindr: convert to hex
2449 * meandr: convert to hex
2450 * peakdr: convert to hex
2451 * burstsize: convert to hex
2452 * phyrate: convert to hex
2453 * sba: convert to hex with modification
2454 * minsi: convert to integer
2455 * sus: convert to integer
2456 * inact: convert to integer
2457 * maxsi: convert to integer
2458 */
2459
2460 /*
2461 * The Nominal MSDU Size field is 2 octets long and contains an
2462 * unsigned integer that specifies the nominal size, in octets,
2463 * of MSDUs belonging to the traffic under this traffic
2464 * specification and is defined in Figure 16. If the Fixed
2465 * subfield is set to 1, then the size of the MSDU is fixed and
2466 * is indicated by the Size Subfield. If the Fixed subfield is
2467 * set to 0, then the size of the MSDU might not be fixed and
2468 * the Size indicates the nominal MSDU size.
2469 *
2470 * The Surplus Bandwidth Allowance Factor field is 2 octets long
2471 * and specifies the excess allocation of time (and bandwidth)
2472 * over and above the stated rates required to transport an MSDU
2473 * belonging to the traffic in this TSPEC. This field is
2474 * represented as an unsigned binary number with an implicit
2475 * binary point after the leftmost 3 bits. For example, an SBA
2476 * of 1.75 is represented as 0x3800. This field is included to
2477 * account for retransmissions. As such, the value of this field
2478 * must be greater than unity.
2479 */
2480
2481 snprintf(buf, sizeof(buf),
2482 "iwpriv %s addTspec %d %s %d %d %s 0x%X"
2483 " 0x%X 0x%X 0x%X"
2484 " 0x%X 0x%X 0x%X"
2485 " 0x%X %d %d %d %d"
2486 " %d %d",
2487 intf, handle, tid, direction, psb_ts, up,
2488 (unsigned int) ((fixed_int << 15) | atoi(size)),
2489 msize ? atoi(msize) : 0,
2490 mindr ? atoi(mindr) : 0,
2491 meandr ? atoi(meandr) : 0,
2492 peakdr ? atoi(peakdr) : 0,
2493 burstsize ? atoi(burstsize) : 0,
2494 phyrate ? atoi(phyrate) : 0,
2495 sba ? ((unsigned int) (((int) sba_fv << 13) |
2496 (int)((sba_fv - (int) sba_fv) *
2497 8192))) : 0,
2498 minsi ? atoi(minsi) : 0,
2499 sus ? atoi(sus) : 0,
2500 0, 0,
2501 inact ? atoi(inact) : 0,
2502 maxsi ? atoi(maxsi) : 0);
2503
2504 if (system(buf) != 0) {
2505 sigma_dut_print(dut, DUT_MSG_ERROR,
2506 "iwpriv addtspec request failed");
2507 send_resp(dut, conn, SIGMA_ERROR,
2508 "errorCode,Failed to execute addTspec command");
2509 return 0;
2510 }
2511
2512 sigma_dut_print(dut, DUT_MSG_INFO,
2513 "iwpriv addtspec request send");
2514
2515 /* Mapping handle to a TID */
2516 dut->tid_to_handle[atoi(tid)] = handle;
2517 } else if (strcasecmp(act, "delts") == 0) {
2518 if (tid == NULL)
2519 return -1;
2520
2521 if (atoi(tid) < 0 || atoi(tid) > 7) {
2522 sigma_dut_print(dut, DUT_MSG_ERROR,
2523 "TID %s not supported", tid);
2524 send_resp(dut, conn, SIGMA_ERROR,
2525 "errorCode,Unsupported TID");
2526 return 0;
2527 }
2528
2529 handle = dut->tid_to_handle[atoi(tid)];
2530
2531 if (handle < 7000 || handle > 7255) {
2532 /* Invalid handle ie no mapping for that TID */
2533 sigma_dut_print(dut, DUT_MSG_ERROR,
2534 "handle-> %d not found", handle);
2535 }
2536
2537 snprintf(buf, sizeof(buf), "iwpriv %s delTspec %d",
2538 intf, handle);
2539
2540 if (system(buf) != 0) {
2541 sigma_dut_print(dut, DUT_MSG_ERROR,
2542 "iwpriv deltspec request failed");
2543 send_resp(dut, conn, SIGMA_ERROR,
2544 "errorCode,Failed to execute delTspec command");
2545 return 0;
2546 }
2547
2548 sigma_dut_print(dut, DUT_MSG_INFO,
2549 "iwpriv deltspec request send");
2550
2551 dut->tid_to_handle[atoi(tid)] = 0;
2552 } else {
2553 sigma_dut_print(dut, DUT_MSG_ERROR,
2554 "Action type %s not supported", act);
2555 send_resp(dut, conn, SIGMA_ERROR,
2556 "errorCode,Unsupported Action");
2557 return 0;
2558 }
2559
2560 return 1;
2561}
2562
2563
vamsi krishna52e16f92017-08-29 12:37:34 +05302564static int find_network(struct sigma_dut *dut, const char *ssid)
2565{
2566 char list[4096];
2567 char *pos;
2568
2569 sigma_dut_print(dut, DUT_MSG_DEBUG,
2570 "Search for profile based on SSID: '%s'", ssid);
2571 if (wpa_command_resp(get_station_ifname(), "LIST_NETWORKS",
2572 list, sizeof(list)) < 0)
2573 return -1;
2574 pos = strstr(list, ssid);
2575 if (!pos || pos == list || pos[-1] != '\t' || pos[strlen(ssid)] != '\t')
2576 return -1;
2577
2578 while (pos > list && pos[-1] != '\n')
2579 pos--;
2580 dut->infra_network_id = atoi(pos);
2581 snprintf(dut->infra_ssid, sizeof(dut->infra_ssid), "%s", ssid);
2582 return 0;
2583}
2584
2585
Sunil Dutt44595082018-02-12 19:41:45 +05302586#ifdef NL80211_SUPPORT
2587static int sta_config_rsnie(struct sigma_dut *dut, int val)
2588{
2589 struct nl_msg *msg;
2590 int ret;
2591 struct nlattr *params;
2592 int ifindex;
2593
2594 ifindex = if_nametoindex("wlan0");
2595 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
2596 NL80211_CMD_VENDOR)) ||
2597 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
2598 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2599 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2600 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
2601 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2602 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_RSN_IE, val)) {
2603 sigma_dut_print(dut, DUT_MSG_ERROR,
2604 "%s: err in adding vendor_cmd and vendor_data",
2605 __func__);
2606 nlmsg_free(msg);
2607 return -1;
2608 }
2609 nla_nest_end(msg, params);
2610
2611 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
2612 if (ret) {
2613 sigma_dut_print(dut, DUT_MSG_ERROR,
2614 "%s: err in send_and_recv_msgs, ret=%d",
2615 __func__, ret);
2616 return ret;
2617 }
2618
2619 return 0;
2620}
2621#endif /* NL80211_SUPPORT */
2622
2623
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002624static int cmd_sta_associate(struct sigma_dut *dut, struct sigma_conn *conn,
2625 struct sigma_cmd *cmd)
2626{
2627 /* const char *intf = get_param(cmd, "Interface"); */
2628 const char *ssid = get_param(cmd, "ssid");
2629 const char *wps_param = get_param(cmd, "WPS");
2630 const char *bssid = get_param(cmd, "bssid");
Jouni Malinen46a19b62017-06-23 14:31:27 +03002631 const char *chan = get_param(cmd, "channel");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002632 int wps = 0;
Jouni Malinen3c367e82017-06-23 17:01:47 +03002633 char buf[1000], extra[50];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002634
2635 if (ssid == NULL)
2636 return -1;
2637
Jouni Malinen3c367e82017-06-23 17:01:47 +03002638 if (dut->rsne_override) {
Sunil Dutt44595082018-02-12 19:41:45 +05302639#ifdef NL80211_SUPPORT
2640 if (get_driver_type() == DRIVER_WCN) {
2641 sta_config_rsnie(dut, 1);
2642 dut->config_rsnie = 1;
2643 }
2644#endif /* NL80211_SUPPORT */
Jouni Malinen3c367e82017-06-23 17:01:47 +03002645 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
2646 dut->rsne_override);
2647 if (wpa_command(get_station_ifname(), buf) < 0) {
2648 send_resp(dut, conn, SIGMA_ERROR,
2649 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
2650 return 0;
2651 }
2652 }
2653
Jouni Malinen68143132017-09-02 02:34:08 +03002654 if (dut->sae_commit_override) {
2655 snprintf(buf, sizeof(buf), "SET sae_commit_override %s",
2656 dut->sae_commit_override);
2657 if (wpa_command(get_station_ifname(), buf) < 0) {
2658 send_resp(dut, conn, SIGMA_ERROR,
2659 "ErrorCode,Failed to set SAE commit override");
2660 return 0;
2661 }
2662 }
Ankita Bajaj1bde7942018-01-09 19:15:01 +05302663#ifdef ANDROID
2664 if (dut->fils_hlp)
2665 process_fils_hlp(dut);
2666#endif /* ANDROID */
Jouni Malinen68143132017-09-02 02:34:08 +03002667
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002668 if (wps_param &&
2669 (strcmp(wps_param, "1") == 0 || strcasecmp(wps_param, "On") == 0))
2670 wps = 1;
2671
2672 if (wps) {
2673 if (dut->wps_method == WFA_CS_WPS_NOT_READY) {
2674 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,WPS "
2675 "parameters not yet set");
2676 return 0;
2677 }
2678 if (dut->wps_method == WFA_CS_WPS_PBC) {
2679 if (wpa_command(get_station_ifname(), "WPS_PBC") < 0)
2680 return -2;
2681 } else {
2682 snprintf(buf, sizeof(buf), "WPS_PIN any %s",
2683 dut->wps_pin);
2684 if (wpa_command(get_station_ifname(), buf) < 0)
2685 return -2;
2686 }
2687 } else {
vamsi krishna52e16f92017-08-29 12:37:34 +05302688 if (strcmp(ssid, dut->infra_ssid) == 0) {
2689 sigma_dut_print(dut, DUT_MSG_DEBUG,
2690 "sta_associate for the most recently added network");
2691 } else if (find_network(dut, ssid) < 0) {
2692 sigma_dut_print(dut, DUT_MSG_DEBUG,
2693 "sta_associate for a previously stored network profile");
2694 send_resp(dut, conn, SIGMA_ERROR,
2695 "ErrorCode,Profile not found");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002696 return 0;
2697 }
2698
2699 if (bssid &&
2700 set_network(get_station_ifname(), dut->infra_network_id,
2701 "bssid", bssid) < 0) {
2702 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2703 "Invalid bssid argument");
2704 return 0;
2705 }
2706
Jouni Malinen46a19b62017-06-23 14:31:27 +03002707 extra[0] = '\0';
2708 if (chan)
2709 snprintf(extra, sizeof(extra), " freq=%u",
2710 channel_to_freq(atoi(chan)));
2711 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d%s",
2712 dut->infra_network_id, extra);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02002713 if (wpa_command(get_station_ifname(), buf) < 0) {
2714 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to select "
2715 "network id %d on %s",
2716 dut->infra_network_id,
2717 get_station_ifname());
2718 return -2;
2719 }
2720 }
2721
2722 return 1;
2723}
2724
2725
2726static int run_hs20_osu(struct sigma_dut *dut, const char *params)
2727{
2728 char buf[500], cmd[200];
2729 int res;
2730
2731 /* Use hs20-osu-client file at the current dir, if found; otherwise use
2732 * default path */
2733 res = snprintf(cmd, sizeof(cmd),
2734 "%s -w \"%s\" -r hs20-osu-client.res %s%s -dddKt -f Logs/hs20-osu-client.txt",
2735 file_exists("./hs20-osu-client") ?
2736 "./hs20-osu-client" : "hs20-osu-client",
2737 sigma_wpas_ctrl,
2738 dut->summary_log ? "-s " : "",
2739 dut->summary_log ? dut->summary_log : "");
2740 if (res < 0 || res >= (int) sizeof(cmd))
2741 return -1;
2742
2743 res = snprintf(buf, sizeof(buf), "%s %s", cmd, params);
2744 if (res < 0 || res >= (int) sizeof(buf))
2745 return -1;
2746 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
2747
2748 if (system(buf) != 0) {
2749 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to run: %s", buf);
2750 return -1;
2751 }
2752 sigma_dut_print(dut, DUT_MSG_DEBUG,
2753 "Completed hs20-osu-client operation");
2754
2755 return 0;
2756}
2757
2758
2759static int download_ppsmo(struct sigma_dut *dut,
2760 struct sigma_conn *conn,
2761 const char *intf,
2762 struct sigma_cmd *cmd)
2763{
2764 const char *name, *path, *val;
2765 char url[500], buf[600], fbuf[100];
2766 char *fqdn = NULL;
2767
2768 name = get_param(cmd, "FileName");
2769 path = get_param(cmd, "FilePath");
2770 if (name == NULL || path == NULL)
2771 return -1;
2772
2773 if (strcasecmp(path, "VendorSpecific") == 0) {
2774 snprintf(url, sizeof(url), "PPS/%s", name);
2775 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured PPS MO "
2776 "from the device (%s)", url);
2777 if (!file_exists(url)) {
2778 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2779 "PPS MO file does not exist");
2780 return 0;
2781 }
2782 snprintf(buf, sizeof(buf), "cp %s pps-tnds.xml", url);
2783 if (system(buf) != 0) {
2784 send_resp(dut, conn, SIGMA_ERROR,
2785 "errorCode,Failed to copy PPS MO");
2786 return 0;
2787 }
2788 } else if (strncasecmp(path, "http:", 5) != 0 &&
2789 strncasecmp(path, "https:", 6) != 0) {
2790 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2791 "Unsupported FilePath value");
2792 return 0;
2793 } else {
2794 snprintf(url, sizeof(url), "%s/%s", path, name);
2795 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading PPS MO from %s",
2796 url);
2797 snprintf(buf, sizeof(buf), "wget -T 10 -t 3 -O pps-tnds.xml '%s'", url);
2798 remove("pps-tnds.xml");
2799 if (system(buf) != 0) {
2800 send_resp(dut, conn, SIGMA_ERROR,
2801 "errorCode,Failed to download PPS MO");
2802 return 0;
2803 }
2804 }
2805
2806 if (run_hs20_osu(dut, "from_tnds pps-tnds.xml pps.xml") < 0) {
2807 send_resp(dut, conn, SIGMA_ERROR,
2808 "errorCode,Failed to parse downloaded PPSMO");
2809 return 0;
2810 }
2811 unlink("pps-tnds.xml");
2812
2813 val = get_param(cmd, "managementTreeURI");
2814 if (val) {
2815 const char *pos, *end;
2816 sigma_dut_print(dut, DUT_MSG_DEBUG, "managementTreeURI: %s",
2817 val);
2818 if (strncmp(val, "./Wi-Fi/", 8) != 0) {
2819 send_resp(dut, conn, SIGMA_ERROR,
2820 "errorCode,Invalid managementTreeURI prefix");
2821 return 0;
2822 }
2823 pos = val + 8;
2824 end = strchr(pos, '/');
2825 if (end == NULL ||
2826 strcmp(end, "/PerProviderSubscription") != 0) {
2827 send_resp(dut, conn, SIGMA_ERROR,
2828 "errorCode,Invalid managementTreeURI postfix");
2829 return 0;
2830 }
2831 if (end - pos >= (int) sizeof(fbuf)) {
2832 send_resp(dut, conn, SIGMA_ERROR,
2833 "errorCode,Too long FQDN in managementTreeURI");
2834 return 0;
2835 }
2836 memcpy(fbuf, pos, end - pos);
2837 fbuf[end - pos] = '\0';
2838 fqdn = fbuf;
2839 sigma_dut_print(dut, DUT_MSG_INFO,
2840 "FQDN from managementTreeURI: %s", fqdn);
2841 } else if (run_hs20_osu(dut, "get_fqdn pps.xml") == 0) {
2842 FILE *f = fopen("pps-fqdn", "r");
2843 if (f) {
2844 if (fgets(fbuf, sizeof(fbuf), f)) {
2845 fbuf[sizeof(fbuf) - 1] = '\0';
2846 fqdn = fbuf;
2847 sigma_dut_print(dut, DUT_MSG_DEBUG,
2848 "Use FQDN %s", fqdn);
2849 }
2850 fclose(f);
2851 }
2852 }
2853
2854 if (fqdn == NULL) {
2855 send_resp(dut, conn, SIGMA_ERROR,
2856 "errorCode,No FQDN specified");
2857 return 0;
2858 }
2859
2860 mkdir("SP", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2861 snprintf(buf, sizeof(buf), "SP/%s", fqdn);
2862 mkdir(buf, S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
2863
2864 snprintf(buf, sizeof(buf), "SP/%s/pps.xml", fqdn);
2865 if (rename("pps.xml", buf) < 0) {
2866 send_resp(dut, conn, SIGMA_ERROR,
2867 "errorCode,Could not move PPS MO");
2868 return 0;
2869 }
2870
2871 if (strcasecmp(path, "VendorSpecific") == 0) {
2872 snprintf(buf, sizeof(buf), "cp Certs/ca.pem SP/%s/ca.pem",
2873 fqdn);
2874 if (system(buf)) {
2875 send_resp(dut, conn, SIGMA_ERROR,
2876 "errorCode,Failed to copy OSU CA cert");
2877 return 0;
2878 }
2879
2880 snprintf(buf, sizeof(buf),
2881 "cp Certs/aaa-ca.pem SP/%s/aaa-ca.pem",
2882 fqdn);
2883 if (system(buf)) {
2884 send_resp(dut, conn, SIGMA_ERROR,
2885 "errorCode,Failed to copy AAA CA cert");
2886 return 0;
2887 }
2888 } else {
2889 snprintf(buf, sizeof(buf),
2890 "dl_osu_ca SP/%s/pps.xml SP/%s/ca.pem",
2891 fqdn, fqdn);
2892 if (run_hs20_osu(dut, buf) < 0) {
2893 send_resp(dut, conn, SIGMA_ERROR,
2894 "errorCode,Failed to download OSU CA cert");
2895 return 0;
2896 }
2897
2898 snprintf(buf, sizeof(buf),
2899 "dl_aaa_ca SP/%s/pps.xml SP/%s/aaa-ca.pem",
2900 fqdn, fqdn);
2901 if (run_hs20_osu(dut, buf) < 0) {
2902 sigma_dut_print(dut, DUT_MSG_INFO,
2903 "Failed to download AAA CA cert");
2904 }
2905 }
2906
2907 if (file_exists("next-client-cert.pem")) {
2908 snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn);
2909 if (rename("next-client-cert.pem", buf) < 0) {
2910 send_resp(dut, conn, SIGMA_ERROR,
2911 "errorCode,Could not move client certificate");
2912 return 0;
2913 }
2914 }
2915
2916 if (file_exists("next-client-key.pem")) {
2917 snprintf(buf, sizeof(buf), "SP/%s/client-key.pem", fqdn);
2918 if (rename("next-client-key.pem", buf) < 0) {
2919 send_resp(dut, conn, SIGMA_ERROR,
2920 "errorCode,Could not move client key");
2921 return 0;
2922 }
2923 }
2924
2925 snprintf(buf, sizeof(buf), "set_pps SP/%s/pps.xml", fqdn);
2926 if (run_hs20_osu(dut, buf) < 0) {
2927 send_resp(dut, conn, SIGMA_ERROR,
2928 "errorCode,Failed to configure credential from "
2929 "PPSMO");
2930 return 0;
2931 }
2932
2933 return 1;
2934}
2935
2936
2937static int download_cert(struct sigma_dut *dut,
2938 struct sigma_conn *conn,
2939 const char *intf,
2940 struct sigma_cmd *cmd)
2941{
2942 const char *name, *path;
2943 char url[500], buf[600];
2944
2945 name = get_param(cmd, "FileName");
2946 path = get_param(cmd, "FilePath");
2947 if (name == NULL || path == NULL)
2948 return -1;
2949
2950 if (strcasecmp(path, "VendorSpecific") == 0) {
2951 snprintf(url, sizeof(url), "Certs/%s-cert.pem", name);
2952 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2953 "certificate from the device (%s)", url);
2954 if (!file_exists(url)) {
2955 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2956 "certificate file does not exist");
2957 return 0;
2958 }
2959 snprintf(buf, sizeof(buf), "cp %s next-client-cert.pem", url);
2960 if (system(buf) != 0) {
2961 send_resp(dut, conn, SIGMA_ERROR,
2962 "errorCode,Failed to copy client "
2963 "certificate");
2964 return 0;
2965 }
2966
2967 snprintf(url, sizeof(url), "Certs/%s-key.pem", name);
2968 sigma_dut_print(dut, DUT_MSG_INFO, "Use pre-configured client "
2969 "private key from the device (%s)", url);
2970 if (!file_exists(url)) {
2971 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Requested "
2972 "private key file does not exist");
2973 return 0;
2974 }
2975 snprintf(buf, sizeof(buf), "cp %s next-client-key.pem", url);
2976 if (system(buf) != 0) {
2977 send_resp(dut, conn, SIGMA_ERROR,
2978 "errorCode,Failed to copy client key");
2979 return 0;
2980 }
2981 } else if (strncasecmp(path, "http:", 5) != 0 &&
2982 strncasecmp(path, "https:", 6) != 0) {
2983 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,"
2984 "Unsupported FilePath value");
2985 return 0;
2986 } else {
2987 snprintf(url, sizeof(url), "%s/%s.pem", path, name);
2988 sigma_dut_print(dut, DUT_MSG_INFO, "Downloading client "
2989 "certificate/key from %s", url);
2990 snprintf(buf, sizeof(buf),
2991 "wget -T 10 -t 3 -O next-client-cert.pem '%s'", url);
2992 if (system(buf) != 0) {
2993 send_resp(dut, conn, SIGMA_ERROR,
2994 "errorCode,Failed to download client "
2995 "certificate");
2996 return 0;
2997 }
2998
2999 if (system("cp next-client-cert.pem next-client-key.pem") != 0)
3000 {
3001 send_resp(dut, conn, SIGMA_ERROR,
3002 "errorCode,Failed to copy client key");
3003 return 0;
3004 }
3005 }
3006
3007 return 1;
3008}
3009
3010
3011static int cmd_sta_preset_testparameters_hs2_r2(struct sigma_dut *dut,
3012 struct sigma_conn *conn,
3013 const char *intf,
3014 struct sigma_cmd *cmd)
3015{
3016 const char *val;
3017
3018 val = get_param(cmd, "FileType");
3019 if (val && strcasecmp(val, "PPSMO") == 0)
3020 return download_ppsmo(dut, conn, intf, cmd);
3021 if (val && strcasecmp(val, "CERT") == 0)
3022 return download_cert(dut, conn, intf, cmd);
3023 if (val) {
3024 send_resp(dut, conn, SIGMA_ERROR,
3025 "ErrorCode,Unsupported FileType");
3026 return 0;
3027 }
3028
3029 return 1;
3030}
3031
3032
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303033static int cmd_sta_preset_testparameters_oce(struct sigma_dut *dut,
3034 struct sigma_conn *conn,
3035 const char *intf,
3036 struct sigma_cmd *cmd)
3037{
3038 const char *val;
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303039 char buf[1000];
3040 char text[20];
3041 unsigned char addr[ETH_ALEN];
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303042
3043 val = get_param(cmd, "OCESupport");
3044 if (val && strcasecmp(val, "Disable") == 0) {
3045 if (wpa_command(intf, "SET oce 0") < 0) {
3046 send_resp(dut, conn, SIGMA_ERROR,
3047 "ErrorCode,Failed to disable OCE");
3048 return 0;
3049 }
3050 } else if (val && strcasecmp(val, "Enable") == 0) {
3051 if (wpa_command(intf, "SET oce 1") < 0) {
3052 send_resp(dut, conn, SIGMA_ERROR,
3053 "ErrorCode,Failed to enable OCE");
3054 return 0;
3055 }
3056 }
3057
vamsi krishnaa2799492017-12-05 14:28:01 +05303058 val = get_param(cmd, "FILScap");
3059 if (val && (atoi(val) == 1)) {
3060 if (wpa_command(intf, "SET disable_fils 0") < 0) {
3061 send_resp(dut, conn, SIGMA_ERROR,
3062 "ErrorCode,Failed to enable FILS");
3063 return 0;
3064 }
3065 } else if (val && (atoi(val) == 0)) {
3066 if (wpa_command(intf, "SET disable_fils 1") < 0) {
3067 send_resp(dut, conn, SIGMA_ERROR,
3068 "ErrorCode,Failed to disable FILS");
3069 return 0;
3070 }
3071 }
3072
Ankita Bajaj1bde7942018-01-09 19:15:01 +05303073 val = get_param(cmd, "FILSHLP");
3074 if (val && strcasecmp(val, "Enable") == 0) {
3075 if (get_wpa_status(get_station_ifname(), "address", text,
3076 sizeof(text)) < 0)
3077 return -2;
3078 hwaddr_aton(text, addr);
3079 snprintf(buf, sizeof(buf),
3080 "FILS_HLP_REQ_ADD ff:ff:ff:ff:ff:ff "
3081 "080045100140000040004011399e00000000ffffffff00440043"
3082 "012cb30001010600fd4f46410000000000000000000000000000"
3083 "000000000000"
3084 "%02x%02x%02x%02x%02x%02x"
3085 "0000000000000000000000000000000000000000000000000000"
3086 "0000000000000000000000000000000000000000000000000000"
3087 "0000000000000000000000000000000000000000000000000000"
3088 "0000000000000000000000000000000000000000000000000000"
3089 "0000000000000000000000000000000000000000000000000000"
3090 "0000000000000000000000000000000000000000000000000000"
3091 "0000000000000000000000000000000000000000000000000000"
3092 "0000000000000000000000000000000000000000638253633501"
3093 "013d0701000af549d29b390205dc3c12616e64726f69642d6468"
3094 "63702d382e302e30370a0103060f1a1c333a3b2b5000ff00",
3095 addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]);
3096 if (wpa_command(intf, buf)) {
3097 send_resp(dut, conn, SIGMA_ERROR,
3098 "ErrorCode,Failed to add HLP");
3099 return 0;
3100 }
3101 dut->fils_hlp = 1;
3102 }
3103
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303104 return 1;
3105}
3106
3107
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003108static void ath_sta_set_noack(struct sigma_dut *dut, const char *intf,
3109 const char *val)
3110{
3111 int counter = 0;
3112 char token[50];
3113 char *result;
3114 char buf[100];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303115 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003116
Peng Xub8fc5cc2017-05-10 17:27:28 -07003117 strlcpy(token, val, sizeof(token));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003118 token[sizeof(token) - 1] = '\0';
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303119 result = strtok_r(token, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003120 while (result) {
3121 if (strcmp(result, "disable") == 0) {
3122 snprintf(buf, sizeof(buf),
3123 "iwpriv %s noackpolicy %d 1 0",
3124 intf, counter);
3125 } else {
3126 snprintf(buf, sizeof(buf),
3127 "iwpriv %s noackpolicy %d 1 1",
3128 intf, counter);
3129 }
3130 if (system(buf) != 0) {
3131 sigma_dut_print(dut, DUT_MSG_ERROR,
3132 "iwpriv noackpolicy failed");
3133 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05303134 result = strtok_r(NULL, ":", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003135 counter++;
3136 }
3137}
3138
3139
3140static void ath_sta_set_rts(struct sigma_dut *dut, const char *intf,
3141 const char *val)
3142{
3143 char buf[100];
3144
3145 snprintf(buf, sizeof(buf), "iwconfig %s rts %s", intf, val);
3146 if (system(buf) != 0) {
3147 sigma_dut_print(dut, DUT_MSG_ERROR, "iwconfig RTS failed");
3148 }
3149}
3150
3151
3152static void ath_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3153 const char *val)
3154{
3155 char buf[100];
3156
3157 if (strcasecmp(val, "off") == 0) {
3158 snprintf(buf, sizeof(buf), "iwpriv %s wmm 0", intf);
3159 if (system(buf) != 0) {
3160 sigma_dut_print(dut, DUT_MSG_ERROR,
3161 "Failed to turn off WMM");
3162 }
3163 }
3164}
3165
3166
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003167static int wcn_sta_set_wmm(struct sigma_dut *dut, const char *intf,
3168 const char *val)
3169{
3170#ifdef NL80211_SUPPORT
3171 struct nl_msg *msg;
3172 int ret = 0;
3173 struct nlattr *params;
3174 int ifindex;
3175 int wmmenable = 1;
3176
3177 if (val &&
3178 (strcasecmp(val, "off") == 0 || strcmp(val, "0") == 0))
3179 wmmenable = 0;
3180
3181 ifindex = if_nametoindex(intf);
3182 if (ifindex == 0) {
3183 sigma_dut_print(dut, DUT_MSG_ERROR,
3184 "%s: Index for interface %s failed",
3185 __func__, intf);
3186 return -1;
3187 }
3188
3189 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3190 NL80211_CMD_VENDOR)) ||
3191 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3192 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3193 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3194 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3195 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3196 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WMM_ENABLE,
3197 wmmenable)) {
3198 sigma_dut_print(dut, DUT_MSG_ERROR,
3199 "%s: err in adding vendor_cmd and vendor_data",
3200 __func__);
3201 nlmsg_free(msg);
3202 return -1;
3203 }
3204 nla_nest_end(msg, params);
3205
3206 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3207 if (ret) {
3208 sigma_dut_print(dut, DUT_MSG_ERROR,
3209 "%s: err in send_and_recv_msgs, ret=%d",
3210 __func__, ret);
3211 }
3212 return ret;
3213#else /* NL80211_SUPPORT */
3214 sigma_dut_print(dut, DUT_MSG_ERROR,
3215 "WMM cannot be changed without NL80211_SUPPORT defined");
3216 return -1;
3217#endif /* NL80211_SUPPORT */
3218}
3219
3220
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003221static void ath_sta_set_sgi(struct sigma_dut *dut, const char *intf,
3222 const char *val)
3223{
3224 char buf[100];
3225 int sgi20;
3226
3227 sgi20 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
3228
3229 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi20);
3230 if (system(buf) != 0)
3231 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv shortgi failed");
3232}
3233
3234
3235static void ath_sta_set_11nrates(struct sigma_dut *dut, const char *intf,
3236 const char *val)
3237{
3238 char buf[100];
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303239 int rate_code, v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003240
3241 /* Disable Tx Beam forming when using a fixed rate */
3242 ath_disable_txbf(dut, intf);
3243
Pradeep Reddy POTTETI67376b72016-10-25 20:08:17 +05303244 v = atoi(val);
3245 if (v < 0 || v > 32) {
3246 sigma_dut_print(dut, DUT_MSG_ERROR,
3247 "Invalid Fixed MCS rate: %d", v);
3248 return;
3249 }
3250 rate_code = 0x80 + v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003251
3252 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0x%x",
3253 intf, rate_code);
3254 if (system(buf) != 0) {
3255 sigma_dut_print(dut, DUT_MSG_ERROR,
3256 "iwpriv set11NRates failed");
3257 }
3258
3259 /* Channel width gets messed up, fix this */
3260 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d", intf, dut->chwidth);
3261 if (system(buf) != 0)
3262 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
3263}
3264
3265
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08003266static void iwpriv_sta_set_amsdu(struct sigma_dut *dut, const char *intf,
3267 const char *val)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003268{
3269 char buf[60];
3270
3271 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)
3272 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 2", intf);
3273 else
3274 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
3275
3276 if (system(buf) != 0)
3277 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv amsdu failed");
3278}
3279
3280
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003281static int iwpriv_sta_set_ampdu(struct sigma_dut *dut, const char *intf,
3282 int ampdu)
3283{
3284 char buf[60];
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003285 int maxaggregation = 63;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003286
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08003287 if (ampdu)
3288 ampdu = maxaggregation;
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07003289 snprintf(buf, sizeof(buf), "iwpriv %s ampdu %d", intf, ampdu);
3290 if (system(buf) != 0) {
3291 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv ampdu failed");
3292 return -1;
3293 }
3294
3295 return 0;
3296}
3297
3298
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003299static void ath_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3300 const char *val)
3301{
3302 char buf[60];
3303
3304 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3305 if (system(buf) != 0) {
3306 sigma_dut_print(dut, DUT_MSG_ERROR,
3307 "iwpriv tx_stbc failed");
3308 }
3309
3310 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3311 if (system(buf) != 0) {
3312 sigma_dut_print(dut, DUT_MSG_ERROR,
3313 "iwpriv rx_stbc failed");
3314 }
3315}
3316
3317
3318static int wcn_sta_set_cts_width(struct sigma_dut *dut, const char *intf,
3319 const char *val)
3320{
3321 char buf[60];
3322
Peng Xucc317ed2017-05-18 16:44:37 -07003323 if (strcmp(val, "160") == 0) {
3324 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 5", intf);
3325 } else if (strcmp(val, "80") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003326 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
3327 } else if (strcmp(val, "40") == 0) {
3328 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 2", intf);
3329 } else if (strcmp(val, "20") == 0) {
3330 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 1", intf);
3331 } else if (strcasecmp(val, "Auto") == 0) {
3332 buf[0] = '\0';
3333 } else {
3334 sigma_dut_print(dut, DUT_MSG_ERROR,
3335 "WIDTH/CTS_WIDTH value not supported");
3336 return -1;
3337 }
3338
3339 if (buf[0] != '\0' && system(buf) != 0) {
3340 sigma_dut_print(dut, DUT_MSG_ERROR,
3341 "Failed to set WIDTH/CTS_WIDTH");
3342 return -1;
3343 }
3344
3345 return 0;
3346}
3347
3348
3349int ath_set_width(struct sigma_dut *dut, struct sigma_conn *conn,
3350 const char *intf, const char *val)
3351{
3352 char buf[60];
3353
3354 if (strcasecmp(val, "Auto") == 0) {
3355 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3356 dut->chwidth = 0;
3357 } else if (strcasecmp(val, "20") == 0) {
3358 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
3359 dut->chwidth = 0;
3360 } else if (strcasecmp(val, "40") == 0) {
3361 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
3362 dut->chwidth = 1;
3363 } else if (strcasecmp(val, "80") == 0) {
3364 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
3365 dut->chwidth = 2;
3366 } else if (strcasecmp(val, "160") == 0) {
3367 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 3", intf);
3368 dut->chwidth = 3;
3369 } else {
3370 send_resp(dut, conn, SIGMA_ERROR,
3371 "ErrorCode,WIDTH not supported");
3372 return -1;
3373 }
3374
3375 if (system(buf) != 0) {
3376 sigma_dut_print(dut, DUT_MSG_ERROR,
3377 "iwpriv chwidth failed");
3378 }
3379
3380 return 0;
3381}
3382
3383
3384static int wcn_sta_set_sp_stream(struct sigma_dut *dut, const char *intf,
3385 const char *val)
3386{
3387 char buf[60];
Arif Hussainac6c5112018-05-25 17:34:00 -07003388 int sta_nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003389
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003390 if (strcmp(val, "1SS") == 0 || strcmp(val, "1") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003391 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003392 sta_nss = 1;
Amarnath Hullur Subramanyamd5374fa2018-02-25 19:00:24 -08003393 } else if (strcmp(val, "2SS") == 0 || strcmp(val, "2") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003394 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
Arif Hussainac6c5112018-05-25 17:34:00 -07003395 sta_nss = 2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003396 } else {
3397 sigma_dut_print(dut, DUT_MSG_ERROR,
3398 "SP_STREAM value not supported");
3399 return -1;
3400 }
3401
3402 if (system(buf) != 0) {
3403 sigma_dut_print(dut, DUT_MSG_ERROR,
3404 "Failed to set SP_STREAM");
3405 return -1;
3406 }
3407
Arif Hussainac6c5112018-05-25 17:34:00 -07003408 dut->sta_nss = sta_nss;
3409
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003410 return 0;
3411}
3412
3413
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05303414static void wcn_sta_set_stbc(struct sigma_dut *dut, const char *intf,
3415 const char *val)
3416{
3417 char buf[60];
3418
3419 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc %s", intf, val);
3420 if (system(buf) != 0)
3421 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv tx_stbc failed");
3422
3423 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc %s", intf, val);
3424 if (system(buf) != 0)
3425 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv rx_stbc failed");
3426}
3427
3428
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303429static int mbo_set_cellular_data_capa(struct sigma_dut *dut,
3430 struct sigma_conn *conn,
3431 const char *intf, int capa)
3432{
3433 char buf[32];
3434
3435 if (capa > 0 && capa < 4) {
3436 snprintf(buf, sizeof(buf), "SET mbo_cell_capa %d", capa);
3437 if (wpa_command(intf, buf) < 0) {
3438 send_resp(dut, conn, SIGMA_ERROR,
3439 "ErrorCode, Failed to set cellular data capability");
3440 return 0;
3441 }
3442 return 1;
3443 }
3444
3445 sigma_dut_print(dut, DUT_MSG_ERROR,
3446 "Invalid Cellular data capability: %d", capa);
3447 send_resp(dut, conn, SIGMA_INVALID,
3448 "ErrorCode,Invalid cellular data capability");
3449 return 0;
3450}
3451
3452
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303453static int mbo_set_roaming(struct sigma_dut *dut, struct sigma_conn *conn,
3454 const char *intf, const char *val)
3455{
3456 if (strcasecmp(val, "Disable") == 0) {
3457 if (wpa_command(intf, "SET roaming 0") < 0) {
3458 send_resp(dut, conn, SIGMA_ERROR,
3459 "ErrorCode,Failed to disable roaming");
3460 return 0;
3461 }
3462 return 1;
3463 }
3464
3465 if (strcasecmp(val, "Enable") == 0) {
3466 if (wpa_command(intf, "SET roaming 1") < 0) {
3467 send_resp(dut, conn, SIGMA_ERROR,
3468 "ErrorCode,Failed to enable roaming");
3469 return 0;
3470 }
3471 return 1;
3472 }
3473
3474 sigma_dut_print(dut, DUT_MSG_ERROR,
3475 "Invalid value provided for roaming: %s", val);
3476 send_resp(dut, conn, SIGMA_INVALID,
3477 "ErrorCode,Unknown value provided for Roaming");
3478 return 0;
3479}
3480
3481
Ashwini Patila75de5a2017-04-13 16:35:05 +05303482static int mbo_set_assoc_disallow(struct sigma_dut *dut,
3483 struct sigma_conn *conn,
3484 const char *intf, const char *val)
3485{
3486 if (strcasecmp(val, "Disable") == 0) {
3487 if (wpa_command(intf, "SET ignore_assoc_disallow 1") < 0) {
3488 send_resp(dut, conn, SIGMA_ERROR,
3489 "ErrorCode,Failed to disable Assoc_disallow");
3490 return 0;
3491 }
3492 return 1;
3493 }
3494
3495 if (strcasecmp(val, "Enable") == 0) {
3496 if (wpa_command(intf, "SET ignore_assoc_disallow 0") < 0) {
3497 send_resp(dut, conn, SIGMA_ERROR,
3498 "ErrorCode,Failed to enable Assoc_disallow");
3499 return 0;
3500 }
3501 return 1;
3502 }
3503
3504 sigma_dut_print(dut, DUT_MSG_ERROR,
3505 "Invalid value provided for Assoc_disallow: %s", val);
3506 send_resp(dut, conn, SIGMA_INVALID,
3507 "ErrorCode,Unknown value provided for Assoc_disallow");
3508 return 0;
3509}
3510
3511
Ashwini Patilc63161e2017-04-13 16:30:23 +05303512static int mbo_set_bss_trans_req(struct sigma_dut *dut, struct sigma_conn *conn,
3513 const char *intf, const char *val)
3514{
3515 if (strcasecmp(val, "Reject") == 0) {
3516 if (wpa_command(intf, "SET reject_btm_req_reason 1") < 0) {
3517 send_resp(dut, conn, SIGMA_ERROR,
3518 "ErrorCode,Failed to Reject BTM Request");
3519 return 0;
3520 }
3521 return 1;
3522 }
3523
3524 if (strcasecmp(val, "Accept") == 0) {
3525 if (wpa_command(intf, "SET reject_btm_req_reason 0") < 0) {
3526 send_resp(dut, conn, SIGMA_ERROR,
3527 "ErrorCode,Failed to Accept BTM Request");
3528 return 0;
3529 }
3530 return 1;
3531 }
3532
3533 sigma_dut_print(dut, DUT_MSG_ERROR,
3534 "Invalid value provided for BSS_Transition: %s", val);
3535 send_resp(dut, conn, SIGMA_INVALID,
3536 "ErrorCode,Unknown value provided for BSS_Transition");
3537 return 0;
3538}
3539
3540
Ashwini Patil00402582017-04-13 12:29:39 +05303541static int mbo_set_non_pref_ch_list(struct sigma_dut *dut,
3542 struct sigma_conn *conn,
3543 const char *intf,
3544 struct sigma_cmd *cmd)
3545{
3546 const char *ch, *pref, *op_class, *reason;
3547 char buf[120];
3548 int len, ret;
3549
3550 pref = get_param(cmd, "Ch_Pref");
3551 if (!pref)
3552 return 1;
3553
3554 if (strcasecmp(pref, "clear") == 0) {
3555 free(dut->non_pref_ch_list);
3556 dut->non_pref_ch_list = NULL;
3557 } else {
3558 op_class = get_param(cmd, "Ch_Op_Class");
3559 if (!op_class) {
3560 send_resp(dut, conn, SIGMA_INVALID,
3561 "ErrorCode,Ch_Op_Class not provided");
3562 return 0;
3563 }
3564
3565 ch = get_param(cmd, "Ch_Pref_Num");
3566 if (!ch) {
3567 send_resp(dut, conn, SIGMA_INVALID,
3568 "ErrorCode,Ch_Pref_Num not provided");
3569 return 0;
3570 }
3571
3572 reason = get_param(cmd, "Ch_Reason_Code");
3573 if (!reason) {
3574 send_resp(dut, conn, SIGMA_INVALID,
3575 "ErrorCode,Ch_Reason_Code not provided");
3576 return 0;
3577 }
3578
3579 if (!dut->non_pref_ch_list) {
3580 dut->non_pref_ch_list =
3581 calloc(1, NON_PREF_CH_LIST_SIZE);
3582 if (!dut->non_pref_ch_list) {
3583 send_resp(dut, conn, SIGMA_ERROR,
3584 "ErrorCode,Failed to allocate memory for non_pref_ch_list");
3585 return 0;
3586 }
3587 }
3588 len = strlen(dut->non_pref_ch_list);
3589 ret = snprintf(dut->non_pref_ch_list + len,
3590 NON_PREF_CH_LIST_SIZE - len,
3591 " %s:%s:%s:%s", op_class, ch, pref, reason);
3592 if (ret > 0 && ret < NON_PREF_CH_LIST_SIZE - len) {
3593 sigma_dut_print(dut, DUT_MSG_DEBUG, "non_pref_list: %s",
3594 dut->non_pref_ch_list);
3595 } else {
3596 sigma_dut_print(dut, DUT_MSG_ERROR,
3597 "snprintf failed for non_pref_list, ret = %d",
3598 ret);
3599 send_resp(dut, conn, SIGMA_ERROR,
3600 "ErrorCode,snprintf failed");
3601 free(dut->non_pref_ch_list);
3602 dut->non_pref_ch_list = NULL;
3603 return 0;
3604 }
3605 }
3606
3607 ret = snprintf(buf, sizeof(buf), "SET non_pref_chan%s",
3608 dut->non_pref_ch_list ? dut->non_pref_ch_list : " ");
3609 if (ret < 0 || ret >= (int) sizeof(buf)) {
3610 sigma_dut_print(dut, DUT_MSG_DEBUG,
3611 "snprintf failed for set non_pref_chan, ret: %d",
3612 ret);
3613 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,snprint failed");
3614 return 0;
3615 }
3616
3617 if (wpa_command(intf, buf) < 0) {
3618 send_resp(dut, conn, SIGMA_ERROR,
3619 "ErrorCode,Failed to set non-preferred channel list");
3620 return 0;
3621 }
3622
3623 return 1;
3624}
3625
3626
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003627#ifdef NL80211_SUPPORT
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003628
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003629static int sta_set_he_fragmentation(struct sigma_dut *dut, const char *intf,
3630 enum he_fragmentation_val frag)
3631{
3632 struct nl_msg *msg;
3633 int ret = 0;
3634 struct nlattr *params;
3635 int ifindex;
3636
3637 ifindex = if_nametoindex(intf);
3638 if (ifindex == 0) {
3639 sigma_dut_print(dut, DUT_MSG_ERROR,
3640 "%s: Index for interface %s failed",
3641 __func__, intf);
3642 return -1;
3643 }
3644
3645 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3646 NL80211_CMD_VENDOR)) ||
3647 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3648 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3649 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3650 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3651 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3652 nla_put_u8(msg,
3653 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_FRAGMENTATION,
3654 frag)) {
3655 sigma_dut_print(dut, DUT_MSG_ERROR,
3656 "%s: err in adding vendor_cmd and vendor_data",
3657 __func__);
3658 nlmsg_free(msg);
3659 return -1;
3660 }
3661 nla_nest_end(msg, params);
3662
3663 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3664 if (ret) {
3665 sigma_dut_print(dut, DUT_MSG_ERROR,
3666 "%s: err in send_and_recv_msgs, ret=%d",
3667 __func__, ret);
3668 }
3669 return ret;
3670}
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003671
3672
Subhani Shaik8e7a3052018-04-24 14:03:00 -07003673static int sta_set_he_ltf(struct sigma_dut *dut, const char *intf,
3674 enum qca_wlan_he_ltf_cfg ltf)
3675{
3676 struct nl_msg *msg;
3677 int ret = 0;
3678 struct nlattr *params;
3679 int ifindex;
3680
3681 ifindex = if_nametoindex(intf);
3682 if (ifindex == 0) {
3683 sigma_dut_print(dut, DUT_MSG_ERROR,
3684 "%s: Index for interface %s failed",
3685 __func__, intf);
3686 return -1;
3687 }
3688
3689 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3690 NL80211_CMD_VENDOR)) ||
3691 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3692 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3693 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3694 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3695 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3696 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_LTF,
3697 ltf)) {
3698 sigma_dut_print(dut, DUT_MSG_ERROR,
3699 "%s: err in adding vendor_cmd and vendor_data",
3700 __func__);
3701 nlmsg_free(msg);
3702 return -1;
3703 }
3704 nla_nest_end(msg, params);
3705
3706 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3707 if (ret) {
3708 sigma_dut_print(dut, DUT_MSG_ERROR,
3709 "%s: err in send_and_recv_msgs, ret=%d",
3710 __func__, ret);
3711 }
3712 return ret;
3713}
3714
3715
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08003716static int nlvendor_sta_set_noack(struct sigma_dut *dut, const char *intf,
3717 int noack, enum qca_wlan_ac_type ac)
3718{
3719 struct nl_msg *msg;
3720 int ret = 0;
3721 struct nlattr *params;
3722 int ifindex;
3723
3724 ifindex = if_nametoindex(intf);
3725 if (ifindex == 0) {
3726 sigma_dut_print(dut, DUT_MSG_ERROR,
3727 "%s: Index for interface %s failed",
3728 __func__, intf);
3729 return -1;
3730 }
3731
3732 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
3733 NL80211_CMD_VENDOR)) ||
3734 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
3735 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3736 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3737 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
3738 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3739 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_NO_ACK,
3740 noack) ||
3741 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_NO_ACK_AC,
3742 ac)) {
3743 sigma_dut_print(dut, DUT_MSG_ERROR,
3744 "%s: err in adding vendor_cmd and vendor_data",
3745 __func__);
3746 nlmsg_free(msg);
3747 return -1;
3748 }
3749 nla_nest_end(msg, params);
3750
3751 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
3752 if (ret) {
3753 sigma_dut_print(dut, DUT_MSG_ERROR,
3754 "%s: err in send_and_recv_msgs, ret=%d",
3755 __func__, ret);
3756 }
3757 return ret;
3758}
3759
3760
3761static void wcn_sta_set_noack(struct sigma_dut *dut, const char *intf,
3762 const char *val)
3763{
3764 int noack, ret;
3765 char token[100];
3766 char *result;
3767 char *saveptr;
3768 enum qca_wlan_ac_type ac = QCA_WLAN_AC_BE;
3769
3770 strlcpy(token, val, sizeof(token));
3771 token[sizeof(token) - 1] = '\0';
3772 result = strtok_r(token, ":", &saveptr);
3773 while (result) {
3774 noack = strcasecmp(result, "Disable") != 0;
3775 ret = nlvendor_sta_set_noack(dut, intf, noack, ac);
3776 if (ret) {
3777 sigma_dut_print(dut, DUT_MSG_ERROR,
3778 "nlvendor_sta_set_noack failed for ac:%d, ret:%d",
3779 ac, ret);
3780 }
3781 result = strtok_r(NULL, ":", &saveptr);
3782 ac++;
3783 }
3784}
3785
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08003786#endif /* NL80211_SUPPORT */
3787
3788
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003789static int cmd_sta_preset_testparameters(struct sigma_dut *dut,
3790 struct sigma_conn *conn,
3791 struct sigma_cmd *cmd)
3792{
3793 const char *intf = get_param(cmd, "Interface");
3794 const char *val;
3795
3796 val = get_param(cmd, "Program");
Jouni Malinen1f6ae642018-06-07 23:56:13 +03003797 if (val && (strcasecmp(val, "HS2-R2") == 0 ||
3798 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003799 return cmd_sta_preset_testparameters_hs2_r2(dut, conn, intf,
3800 cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003801
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07003802 if (val && strcasecmp(val, "LOC") == 0)
3803 return loc_cmd_sta_preset_testparameters(dut, conn, cmd);
3804
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003805#ifdef ANDROID_NAN
3806 if (val && strcasecmp(val, "NAN") == 0)
3807 return nan_cmd_sta_preset_testparameters(dut, conn, cmd);
3808#endif /* ANDROID_NAN */
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07003809#ifdef MIRACAST
3810 if (val && (strcasecmp(val, "WFD") == 0 ||
3811 strcasecmp(val, "DisplayR2") == 0))
3812 return miracast_preset_testparameters(dut, conn, cmd);
3813#endif /* MIRACAST */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003814
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303815 if (val && strcasecmp(val, "MBO") == 0) {
3816 val = get_param(cmd, "Cellular_Data_Cap");
3817 if (val &&
3818 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
3819 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05303820
3821 val = get_param(cmd, "Ch_Pref");
3822 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
3823 return 0;
3824
Ashwini Patilc63161e2017-04-13 16:30:23 +05303825 val = get_param(cmd, "BSS_Transition");
3826 if (val && mbo_set_bss_trans_req(dut, conn, intf, val) == 0)
3827 return 0;
3828
Ashwini Patila75de5a2017-04-13 16:35:05 +05303829 val = get_param(cmd, "Assoc_Disallow");
3830 if (val && mbo_set_assoc_disallow(dut, conn, intf, val) == 0)
3831 return 0;
3832
Ashwini Patil9183fdb2017-04-13 16:58:25 +05303833 val = get_param(cmd, "Roaming");
3834 if (val && mbo_set_roaming(dut, conn, intf, val) == 0)
3835 return 0;
3836
Ashwini Patil68d02cd2017-01-10 15:39:16 +05303837 return 1;
3838 }
3839
Ankita Bajaja2cb5672017-10-25 16:08:28 +05303840 if (val && strcasecmp(val, "OCE") == 0)
3841 return cmd_sta_preset_testparameters_oce(dut, conn, intf, cmd);
3842
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003843#if 0
3844 val = get_param(cmd, "Supplicant");
3845 if (val && strcasecmp(val, "Default") != 0) {
3846 send_resp(dut, conn, SIGMA_ERROR,
3847 "ErrorCode,Only default(Vendor) supplicant "
3848 "supported");
3849 return 0;
3850 }
3851#endif
3852
3853 val = get_param(cmd, "RTS");
3854 if (val) {
3855 switch (get_driver_type()) {
3856 case DRIVER_ATHEROS:
3857 ath_sta_set_rts(dut, intf, val);
3858 break;
3859 default:
3860#if 0
3861 send_resp(dut, conn, SIGMA_ERROR,
3862 "ErrorCode,Setting RTS not supported");
3863 return 0;
3864#else
3865 sigma_dut_print(dut, DUT_MSG_DEBUG,
3866 "Setting RTS not supported");
3867 break;
3868#endif
3869 }
3870 }
3871
3872#if 0
3873 val = get_param(cmd, "FRGMNT");
3874 if (val) {
3875 /* TODO */
3876 send_resp(dut, conn, SIGMA_ERROR,
3877 "ErrorCode,Setting FRGMNT not supported");
3878 return 0;
3879 }
3880#endif
3881
3882#if 0
3883 val = get_param(cmd, "Preamble");
3884 if (val) {
3885 /* TODO: Long/Short */
3886 send_resp(dut, conn, SIGMA_ERROR,
3887 "ErrorCode,Setting Preamble not supported");
3888 return 0;
3889 }
3890#endif
3891
3892 val = get_param(cmd, "Mode");
3893 if (val) {
3894 if (strcmp(val, "11b") == 0 ||
3895 strcmp(val, "11g") == 0 ||
3896 strcmp(val, "11a") == 0 ||
3897 strcmp(val, "11n") == 0 ||
3898 strcmp(val, "11ng") == 0 ||
3899 strcmp(val, "11nl") == 0 ||
3900 strcmp(val, "11nl(nabg)") == 0 ||
3901 strcmp(val, "AC") == 0 ||
3902 strcmp(val, "11AC") == 0 ||
3903 strcmp(val, "11ac") == 0 ||
3904 strcmp(val, "11na") == 0 ||
Amarnath Hullur Subramanyamb0db2712018-01-30 19:40:35 -08003905 strcmp(val, "11an") == 0 ||
3906 strcmp(val, "11ax") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003907 /* STA supports all modes by default */
3908 } else {
3909 send_resp(dut, conn, SIGMA_ERROR,
3910 "ErrorCode,Setting Mode not supported");
3911 return 0;
3912 }
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003913
3914 /* Change the mode only in case of testbed for HE program
3915 * and for 11a and 11g modes only. */
3916 if (dut->program == PROGRAM_HE &&
3917 dut->device_type == STA_testbed) {
3918 int phymode;
3919 char buf[60];
3920
3921 if (strcmp(val, "11a") == 0) {
Amarnath Hullur Subramanyam94dfaf02018-03-02 19:26:57 -08003922 phymode = 1; /* IEEE80211_MODE_11A */
3923 } else if (strcmp(val, "11g") == 0) {
3924 phymode = 3; /* IEEE80211_MODE_11G */
3925 } else if (strcmp(val, "11b") == 0) {
3926 phymode = 2; /* IEEE80211_MODE_11B */
3927 } else if (strcmp(val, "11n") == 0 ||
3928 strcmp(val, "11nl") == 0 ||
3929 strcmp(val, "11nl(nabg)") == 0) {
3930 phymode = 22; /* IEEE80211_MODE_11AGN */
3931 } else if (strcmp(val, "11ng") == 0) {
3932 phymode = 13; /* IEEE80211_MODE_11NG_HT40 */
3933 } else if (strcmp(val, "AC") == 0 ||
3934 strcasecmp(val, "11AC") == 0) {
3935 phymode = 19; /* IEEE80211_MODE_11AC_VHT80 */
3936 } else if (strcmp(val, "11na") == 0 ||
3937 strcasecmp(val, "11an") == 0) {
3938 phymode = 14; /* IEEE80211_MODE_11NA_HT40 */
3939 } else if (strcmp(val, "11ax") == 0) {
3940 phymode = 0; /* IEEE80211_MODE_AUTO */
Amarnath Hullur Subramanyam97d0e532018-01-31 02:53:02 -08003941 } else {
3942 sigma_dut_print(dut, DUT_MSG_DEBUG,
3943 "Ignoring mode change for mode: %s",
3944 val);
3945 phymode = -1;
3946 }
3947 if (phymode != -1) {
3948 snprintf(buf, sizeof(buf),
3949 "iwpriv %s setphymode %d",
3950 intf, phymode);
3951 if (system(buf) != 0) {
3952 sigma_dut_print(dut, DUT_MSG_ERROR,
3953 "iwpriv setting of phymode failed");
3954 }
3955 }
3956 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003957 }
3958
3959 val = get_param(cmd, "wmm");
3960 if (val) {
3961 switch (get_driver_type()) {
3962 case DRIVER_ATHEROS:
3963 ath_sta_set_wmm(dut, intf, val);
3964 break;
Amarnath Hullur Subramanyam75214d22018-02-04 19:17:11 -08003965 case DRIVER_WCN:
3966 wcn_sta_set_wmm(dut, intf, val);
3967 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02003968 default:
3969 sigma_dut_print(dut, DUT_MSG_DEBUG,
3970 "Setting wmm not supported");
3971 break;
3972 }
3973 }
3974
3975 val = get_param(cmd, "Powersave");
3976 if (val) {
3977 if (strcmp(val, "0") == 0 || strcasecmp(val, "off") == 0) {
3978 if (wpa_command(get_station_ifname(),
3979 "P2P_SET ps 0") < 0)
3980 return -2;
3981 /* Make sure test modes are disabled */
3982 wpa_command(get_station_ifname(), "P2P_SET ps 98");
3983 wpa_command(get_station_ifname(), "P2P_SET ps 96");
3984 } else if (strcmp(val, "1") == 0 ||
3985 strcasecmp(val, "PSPoll") == 0 ||
3986 strcasecmp(val, "on") == 0) {
3987 /* Disable default power save mode */
3988 wpa_command(get_station_ifname(), "P2P_SET ps 0");
3989 /* Enable PS-Poll test mode */
3990 if (wpa_command(get_station_ifname(),
3991 "P2P_SET ps 97") < 0 ||
3992 wpa_command(get_station_ifname(),
3993 "P2P_SET ps 99") < 0)
3994 return -2;
3995 } else if (strcmp(val, "2") == 0 ||
3996 strcasecmp(val, "Fast") == 0) {
3997 /* TODO */
3998 send_resp(dut, conn, SIGMA_ERROR,
3999 "ErrorCode,Powersave=Fast not supported");
4000 return 0;
4001 } else if (strcmp(val, "3") == 0 ||
4002 strcasecmp(val, "PSNonPoll") == 0) {
4003 /* Make sure test modes are disabled */
4004 wpa_command(get_station_ifname(), "P2P_SET ps 98");
4005 wpa_command(get_station_ifname(), "P2P_SET ps 96");
4006
4007 /* Enable default power save mode */
4008 if (wpa_command(get_station_ifname(),
4009 "P2P_SET ps 1") < 0)
4010 return -2;
4011 } else
4012 return -1;
4013 }
4014
4015 val = get_param(cmd, "NoAck");
4016 if (val) {
4017 switch (get_driver_type()) {
4018 case DRIVER_ATHEROS:
4019 ath_sta_set_noack(dut, intf, val);
4020 break;
Amarnath Hullur Subramanyamae8a2d92018-03-01 06:32:21 -08004021#ifdef NL80211_SUPPORT
4022 case DRIVER_WCN:
4023 wcn_sta_set_noack(dut, intf, val);
4024 break;
4025#endif /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004026 default:
4027 send_resp(dut, conn, SIGMA_ERROR,
4028 "ErrorCode,Setting NoAck not supported");
4029 return 0;
4030 }
4031 }
4032
4033 val = get_param(cmd, "IgnoreChswitchProhibit");
4034 if (val) {
4035 /* TODO: Enabled/disabled */
4036 if (strcasecmp(val, "Enabled") == 0) {
4037 send_resp(dut, conn, SIGMA_ERROR,
4038 "ErrorCode,Enabling IgnoreChswitchProhibit "
4039 "not supported");
4040 return 0;
4041 }
4042 }
4043
4044 val = get_param(cmd, "TDLS");
4045 if (val) {
4046 if (strcasecmp(val, "Disabled") == 0) {
4047 if (wpa_command(intf, "SET tdls_disabled 1")) {
4048 send_resp(dut, conn, SIGMA_ERROR,
4049 "ErrorCode,Failed to disable TDLS");
4050 return 0;
4051 }
4052 } else if (strcasecmp(val, "Enabled") == 0) {
4053 if (wpa_command(intf, "SET tdls_disabled 0")) {
4054 send_resp(dut, conn, SIGMA_ERROR,
4055 "ErrorCode,Failed to enable TDLS");
4056 return 0;
4057 }
4058 } else {
4059 send_resp(dut, conn, SIGMA_ERROR,
4060 "ErrorCode,Unsupported TDLS value");
4061 return 0;
4062 }
4063 }
4064
4065 val = get_param(cmd, "TDLSmode");
4066 if (val) {
4067 if (strcasecmp(val, "Default") == 0) {
4068 wpa_command(intf, "SET tdls_testing 0");
4069 } else if (strcasecmp(val, "APProhibit") == 0) {
4070 if (wpa_command(intf, "SET tdls_testing 0x400")) {
4071 send_resp(dut, conn, SIGMA_ERROR,
4072 "ErrorCode,Failed to enable ignore "
4073 "APProhibit TDLS mode");
4074 return 0;
4075 }
4076 } else if (strcasecmp(val, "HiLoMac") == 0) {
4077 /* STA should respond with TDLS setup req for a TDLS
4078 * setup req */
4079 if (wpa_command(intf, "SET tdls_testing 0x80")) {
4080 send_resp(dut, conn, SIGMA_ERROR,
4081 "ErrorCode,Failed to enable HiLoMac "
4082 "TDLS mode");
4083 return 0;
4084 }
4085 } else if (strcasecmp(val, "WeakSecurity") == 0) {
4086 /*
4087 * Since all security modes are enabled by default when
4088 * Sigma control is used, there is no need to do
4089 * anything here.
4090 */
4091 } else if (strcasecmp(val, "ExistLink") == 0) {
4092 /*
4093 * Since we allow new TDLS Setup Request even if there
4094 * is an existing link, nothing needs to be done for
4095 * this.
4096 */
4097 } else {
4098 /* TODO:
4099 * ExistLink: STA should send TDLS setup req even if
4100 * direct link already exists
4101 */
4102 send_resp(dut, conn, SIGMA_ERROR,
4103 "ErrorCode,Unsupported TDLSmode value");
4104 return 0;
4105 }
4106 }
4107
4108 val = get_param(cmd, "FakePubKey");
4109 if (val && atoi(val) && wpa_command(intf, "SET wps_corrupt_pkhash 1")) {
4110 send_resp(dut, conn, SIGMA_ERROR,
4111 "ErrorCode,Failed to enable FakePubKey");
4112 return 0;
4113 }
4114
Amarnath Hullur Subramanyamae1042b2018-02-22 21:52:52 -08004115#ifdef NL80211_SUPPORT
4116 val = get_param(cmd, "FrgmntSupport");
4117 if (val) {
4118 if (strcasecmp(val, "Enable") == 0) {
4119 if (sta_set_he_fragmentation(dut, intf,
4120 HE_FRAG_LEVEL1)) {
4121 send_resp(dut, conn, SIGMA_ERROR,
4122 "ErrorCode,Failed to enable HE Fragmentation");
4123 return 0;
4124 }
4125 } else if (strcasecmp(val, "Disable") == 0) {
4126 if (sta_set_he_fragmentation(dut, intf,
4127 HE_FRAG_DISABLE)) {
4128 send_resp(dut, conn, SIGMA_ERROR,
4129 "ErrorCode,Failed to disable HE Fragmentation");
4130 return 0;
4131 }
4132 }
4133 }
4134#endif /* NL80211_SUPPORT */
4135
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004136 return 1;
4137}
4138
4139
4140static const char * ath_get_radio_name(const char *radio_name)
4141{
4142 if (radio_name == NULL)
4143 return "wifi0";
4144 if (strcmp(radio_name, "wifi1") == 0)
4145 return "wifi1";
4146 if (strcmp(radio_name, "wifi2") == 0)
4147 return "wifi2";
4148 return "wifi0";
4149}
4150
4151
4152static void ath_sta_set_txsp_stream(struct sigma_dut *dut, const char *intf,
4153 const char *val)
4154{
4155 char buf[60];
4156 unsigned int vht_mcsmap = 0;
4157 int txchainmask = 0;
4158 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4159
4160 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4161 if (dut->testbed_flag_txsp == 1) {
4162 vht_mcsmap = 0xfffc;
4163 dut->testbed_flag_txsp = 0;
4164 } else {
4165 vht_mcsmap = 0xfffe;
4166 }
4167 txchainmask = 1;
4168 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4169 if (dut->testbed_flag_txsp == 1) {
4170 vht_mcsmap = 0xfff0;
4171 dut->testbed_flag_txsp = 0;
4172 } else {
4173 vht_mcsmap = 0xfffa;
4174 }
4175 txchainmask = 3;
4176 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4177 if (dut->testbed_flag_txsp == 1) {
4178 vht_mcsmap = 0xffc0;
4179 dut->testbed_flag_txsp = 0;
4180 } else {
4181 vht_mcsmap = 0xffea;
4182 }
4183 txchainmask = 7;
4184 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4185 if (dut->testbed_flag_txsp == 1) {
4186 vht_mcsmap = 0xff00;
4187 dut->testbed_flag_txsp = 0;
4188 } else {
4189 vht_mcsmap = 0xffaa;
4190 }
4191 txchainmask = 15;
4192 } else {
4193 if (dut->testbed_flag_txsp == 1) {
4194 vht_mcsmap = 0xffc0;
4195 dut->testbed_flag_txsp = 0;
4196 } else {
4197 vht_mcsmap = 0xffea;
4198 }
4199 }
4200
4201 if (txchainmask) {
4202 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
4203 basedev, txchainmask);
4204 if (system(buf) != 0) {
4205 sigma_dut_print(dut, DUT_MSG_ERROR,
4206 "iwpriv txchainmask failed");
4207 }
4208 }
4209
4210 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4211 intf, vht_mcsmap);
4212 if (system(buf) != 0) {
4213 sigma_dut_print(dut, DUT_MSG_ERROR,
4214 "iwpriv %s vht_mcsmap 0x%04x failed",
4215 intf, vht_mcsmap);
4216 }
4217}
4218
4219
4220static void ath_sta_set_rxsp_stream(struct sigma_dut *dut, const char *intf,
4221 const char *val)
4222{
4223 char buf[60];
4224 unsigned int vht_mcsmap = 0;
4225 int rxchainmask = 0;
4226 const char *basedev = ath_get_radio_name(sigma_radio_ifname[0]);
4227
4228 if (strcasecmp(val, "1") == 0 || strcasecmp(val, "1SS") == 0) {
4229 if (dut->testbed_flag_rxsp == 1) {
4230 vht_mcsmap = 0xfffc;
4231 dut->testbed_flag_rxsp = 0;
4232 } else {
4233 vht_mcsmap = 0xfffe;
4234 }
4235 rxchainmask = 1;
4236 } else if (strcasecmp(val, "2") == 0 || strcasecmp(val, "2SS") == 0) {
4237 if (dut->testbed_flag_rxsp == 1) {
4238 vht_mcsmap = 0xfff0;
4239 dut->testbed_flag_rxsp = 0;
4240 } else {
4241 vht_mcsmap = 0xfffa;
4242 }
4243 rxchainmask = 3;
4244 } else if (strcasecmp(val, "3") == 0 || strcasecmp(val, "3SS") == 0) {
4245 if (dut->testbed_flag_rxsp == 1) {
4246 vht_mcsmap = 0xffc0;
4247 dut->testbed_flag_rxsp = 0;
4248 } else {
4249 vht_mcsmap = 0xffea;
4250 }
4251 rxchainmask = 7;
4252 } else if (strcasecmp(val, "4") == 0 || strcasecmp(val, "4SS") == 0) {
4253 if (dut->testbed_flag_rxsp == 1) {
4254 vht_mcsmap = 0xff00;
4255 dut->testbed_flag_rxsp = 0;
4256 } else {
4257 vht_mcsmap = 0xffaa;
4258 }
4259 rxchainmask = 15;
4260 } else {
4261 if (dut->testbed_flag_rxsp == 1) {
4262 vht_mcsmap = 0xffc0;
4263 dut->testbed_flag_rxsp = 0;
4264 } else {
4265 vht_mcsmap = 0xffea;
4266 }
4267 }
4268
4269 if (rxchainmask) {
4270 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
4271 basedev, rxchainmask);
4272 if (system(buf) != 0) {
4273 sigma_dut_print(dut, DUT_MSG_ERROR,
4274 "iwpriv rxchainmask failed");
4275 }
4276 }
4277
4278 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0x%04x",
4279 intf, vht_mcsmap);
4280 if (system(buf) != 0) {
4281 sigma_dut_print(dut, DUT_MSG_ERROR,
4282 "iwpriv %s vht_mcsmap 0x%04x",
4283 intf, vht_mcsmap);
4284 }
4285}
4286
4287
4288void ath_set_zero_crc(struct sigma_dut *dut, const char *val)
4289{
4290 if (strcasecmp(val, "enable") == 0) {
4291 if (system("athdiag --set --address=0x2a204 --and=0xbfffffff")
4292 != 0) {
4293 sigma_dut_print(dut, DUT_MSG_ERROR,
4294 "Disable BB_VHTSIGB_CRC_CALC failed");
4295 }
4296
4297 if (system("athdiag --set --address=0x2a204 --or=0x80000000")
4298 != 0) {
4299 sigma_dut_print(dut, DUT_MSG_ERROR,
4300 "Enable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4301 }
4302 } else {
4303 if (system("athdiag --set --address=0x2a204 --and=0x7fffffff")
4304 != 0) {
4305 sigma_dut_print(dut, DUT_MSG_ERROR,
4306 "Disable FORCE_VHT_SIGB_CRC_VALUE_ZERO failed");
4307 }
4308
4309 if (system("athdiag --set --address=0x2a204 --or=0x40000000")
4310 != 0) {
4311 sigma_dut_print(dut, DUT_MSG_ERROR,
4312 "Enable BB_VHTSIGB_CRC_CALC failed");
4313 }
4314 }
4315}
4316
4317
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004318static int wcn_sta_set_width(struct sigma_dut *dut, const char *intf,
4319 const char *val)
4320{
4321 char buf[60];
4322
4323 if (strcmp(val, "20") == 0) {
4324 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
4325 dut->chwidth = 0;
4326 } else if (strcmp(val, "40") == 0) {
4327 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 1", intf);
4328 dut->chwidth = 1;
4329 } else if (strcmp(val, "80") == 0) {
4330 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
4331 dut->chwidth = 2;
Sunil Duttb1cccac2018-05-22 21:03:12 +05304332 } else if (strcasecmp(val, "Auto") == 0) {
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004333 buf[0] = '\0';
4334 } else {
4335 sigma_dut_print(dut, DUT_MSG_ERROR, "WIDTH %s not supported",
4336 val);
4337 return -1;
4338 }
4339
4340 if (buf[0] != '\0' && system(buf) != 0) {
4341 sigma_dut_print(dut, DUT_MSG_ERROR, "iwpriv chwidth failed");
4342 return -1;
4343 }
4344
4345 return 0;
4346}
4347
4348
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004349static int nlvendor_sta_set_addba_reject(struct sigma_dut *dut,
4350 const char *intf, int addbareject)
4351{
4352#ifdef NL80211_SUPPORT
4353 struct nl_msg *msg;
4354 int ret = 0;
4355 struct nlattr *params;
4356 int ifindex;
4357
4358 ifindex = if_nametoindex(intf);
4359 if (ifindex == 0) {
4360 sigma_dut_print(dut, DUT_MSG_ERROR,
4361 "%s: Index for interface %s failed",
4362 __func__, intf);
4363 return -1;
4364 }
4365
4366 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4367 NL80211_CMD_VENDOR)) ||
4368 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4369 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4370 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4371 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4372 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4373 nla_put_u8(msg,
4374 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ACCEPT_ADDBA_REQ,
4375 !addbareject)) {
4376 sigma_dut_print(dut, DUT_MSG_ERROR,
4377 "%s: err in adding vendor_cmd and vendor_data",
4378 __func__);
4379 nlmsg_free(msg);
4380 return -1;
4381 }
4382 nla_nest_end(msg, params);
4383
4384 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4385 if (ret) {
4386 sigma_dut_print(dut, DUT_MSG_ERROR,
4387 "%s: err in send_and_recv_msgs, ret=%d",
4388 __func__, ret);
4389 }
4390 return ret;
4391#else /* NL80211_SUPPORT */
4392 sigma_dut_print(dut, DUT_MSG_ERROR,
4393 "ADDBA_REJECT cannot be set without NL80211_SUPPORT defined");
4394 return -1;
4395#endif /* NL80211_SUPPORT */
4396}
4397
4398
4399static int sta_set_addba_reject(struct sigma_dut *dut, const char *intf,
4400 int addbareject)
4401{
4402 int ret;
4403
4404 switch (get_driver_type()) {
4405 case DRIVER_WCN:
4406 ret = nlvendor_sta_set_addba_reject(dut, intf, addbareject);
4407 if (ret) {
4408 sigma_dut_print(dut, DUT_MSG_ERROR,
4409 "nlvendor_sta_set_addba_reject failed, ret:%d",
4410 ret);
4411 return ret;
4412 }
4413 break;
4414 default:
4415 sigma_dut_print(dut, DUT_MSG_ERROR,
4416 "errorCode,Unsupported ADDBA_REJECT with the current driver");
4417 ret = -1;
4418 break;
4419 }
4420
4421 return ret;
4422}
4423
4424
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004425static int nlvendor_config_send_addba(struct sigma_dut *dut, const char *intf,
4426 int enable)
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004427{
4428#ifdef NL80211_SUPPORT
4429 struct nl_msg *msg;
4430 int ret = 0;
4431 struct nlattr *params;
4432 int ifindex;
4433
4434 ifindex = if_nametoindex(intf);
4435 if (ifindex == 0) {
4436 sigma_dut_print(dut, DUT_MSG_ERROR,
4437 "%s: Index for interface %s failed",
4438 __func__, intf);
4439 return -1;
4440 }
4441
4442 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
4443 NL80211_CMD_VENDOR)) ||
4444 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
4445 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4446 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4447 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
4448 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
4449 nla_put_u8(msg,
4450 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_SEND_ADDBA_REQ,
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004451 enable)) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004452 sigma_dut_print(dut, DUT_MSG_ERROR,
4453 "%s: err in adding vendor_cmd and vendor_data",
4454 __func__);
4455 nlmsg_free(msg);
4456 return -1;
4457 }
4458 nla_nest_end(msg, params);
4459
4460 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
4461 if (ret) {
4462 sigma_dut_print(dut, DUT_MSG_ERROR,
4463 "%s: err in send_and_recv_msgs, ret=%d",
4464 __func__, ret);
4465 }
4466 return ret;
4467#else /* NL80211_SUPPORT */
4468 sigma_dut_print(dut, DUT_MSG_ERROR,
4469 "Disable addba not possible without NL80211_SUPPORT defined");
4470 return -1;
4471#endif /* NL80211_SUPPORT */
4472}
4473
4474
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004475static int cmd_sta_set_wireless_common(const char *intf, struct sigma_dut *dut,
4476 struct sigma_conn *conn,
4477 struct sigma_cmd *cmd)
4478{
4479 const char *val;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004480 int ampdu = -1, addbareject = -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004481 char buf[30];
4482
4483 val = get_param(cmd, "40_INTOLERANT");
4484 if (val) {
4485 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4486 /* TODO: iwpriv ht40intol through wpa_supplicant */
4487 send_resp(dut, conn, SIGMA_ERROR,
4488 "ErrorCode,40_INTOLERANT not supported");
4489 return 0;
4490 }
4491 }
4492
4493 val = get_param(cmd, "ADDBA_REJECT");
4494 if (val) {
4495 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4496 /* reject any ADDBA with status "decline" */
4497 ampdu = 0;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004498 addbareject = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004499 } else {
4500 /* accept ADDBA */
4501 ampdu = 1;
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004502 addbareject = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004503 }
4504 }
4505
Amarnath Hullur Subramanyamd8a9db92018-02-02 18:53:14 -08004506 if (addbareject >= 0 &&
4507 sta_set_addba_reject(dut, intf, addbareject) < 0) {
4508 send_resp(dut, conn, SIGMA_ERROR,
4509 "ErrorCode,set addba_reject failed");
4510 return 0;
4511 }
4512
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004513 val = get_param(cmd, "AMPDU");
4514 if (val) {
4515 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
4516 /* enable AMPDU Aggregation */
4517 if (ampdu == 0) {
4518 send_resp(dut, conn, SIGMA_ERROR,
4519 "ErrorCode,Mismatch in "
4520 "addba_reject/ampdu - "
4521 "not supported");
4522 return 0;
4523 }
4524 ampdu = 1;
4525 } else {
4526 /* disable AMPDU Aggregation */
4527 if (ampdu == 1) {
4528 send_resp(dut, conn, SIGMA_ERROR,
4529 "ErrorCode,Mismatch in "
4530 "addba_reject/ampdu - "
4531 "not supported");
4532 return 0;
4533 }
4534 ampdu = 0;
4535 }
4536 }
4537
4538 if (ampdu >= 0) {
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004539 int ret;
4540
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004541 sigma_dut_print(dut, DUT_MSG_DEBUG, "%s A-MPDU aggregation",
4542 ampdu ? "Enabling" : "Disabling");
4543 snprintf(buf, sizeof(buf), "SET ampdu %d", ampdu);
Deepak Dhamdhere80356cb2016-03-28 16:48:32 -07004544 if (wpa_command(intf, buf) < 0 &&
4545 iwpriv_sta_set_ampdu(dut, intf, ampdu) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004546 send_resp(dut, conn, SIGMA_ERROR,
4547 "ErrorCode,set aggr failed");
4548 return 0;
4549 }
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004550
4551 if (ampdu == 0) {
4552 /* Disable sending of addba using nl vendor command */
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08004553 ret = nlvendor_config_send_addba(dut, intf, 0);
Amarnath Hullur Subramanyam9745b3c2018-02-04 21:27:57 -08004554 if (ret) {
4555 sigma_dut_print(dut, DUT_MSG_ERROR,
4556 "Failed to disable addba, ret:%d",
4557 ret);
4558 }
4559 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004560 }
4561
4562 val = get_param(cmd, "AMSDU");
4563 if (val) {
4564 switch (get_driver_type()) {
4565 case DRIVER_ATHEROS:
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08004566 case DRIVER_WCN:
4567 iwpriv_sta_set_amsdu(dut, intf, val);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004568 break;
4569 default:
4570 if (strcmp(val, "1") == 0 ||
4571 strcasecmp(val, "Enable") == 0) {
4572 /* Enable AMSDU Aggregation */
4573 send_resp(dut, conn, SIGMA_ERROR,
4574 "ErrorCode,AMSDU aggregation not supported");
4575 return 0;
4576 }
4577 break;
4578 }
4579 }
4580
4581 val = get_param(cmd, "STBC_RX");
4582 if (val) {
4583 switch (get_driver_type()) {
4584 case DRIVER_ATHEROS:
4585 ath_sta_set_stbc(dut, intf, val);
4586 break;
Pradeep Reddy POTTETI4a1f6b32016-11-23 13:15:21 +05304587 case DRIVER_WCN:
4588 wcn_sta_set_stbc(dut, intf, val);
4589 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004590 default:
4591 send_resp(dut, conn, SIGMA_ERROR,
4592 "ErrorCode,STBC_RX not supported");
4593 return 0;
4594 }
4595 }
4596
4597 val = get_param(cmd, "WIDTH");
4598 if (val) {
4599 switch (get_driver_type()) {
4600 case DRIVER_WCN:
Amarnath Hullur Subramanyamebfe6b62018-01-31 03:04:17 -08004601 if (wcn_sta_set_width(dut, intf, val) < 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004602 send_resp(dut, conn, SIGMA_ERROR,
4603 "ErrorCode,Failed to set WIDTH");
4604 return 0;
4605 }
4606 break;
4607 case DRIVER_ATHEROS:
4608 if (ath_set_width(dut, conn, intf, val) < 0)
4609 return 0;
4610 break;
4611 default:
4612 sigma_dut_print(dut, DUT_MSG_ERROR,
4613 "Setting WIDTH not supported");
4614 break;
4615 }
4616 }
4617
4618 val = get_param(cmd, "SMPS");
4619 if (val) {
4620 /* TODO: Dynamic/0, Static/1, No Limit/2 */
4621 send_resp(dut, conn, SIGMA_ERROR,
4622 "ErrorCode,SMPS not supported");
4623 return 0;
4624 }
4625
4626 val = get_param(cmd, "TXSP_STREAM");
4627 if (val) {
4628 switch (get_driver_type()) {
4629 case DRIVER_WCN:
4630 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4631 send_resp(dut, conn, SIGMA_ERROR,
4632 "ErrorCode,Failed to set TXSP_STREAM");
4633 return 0;
4634 }
4635 break;
4636 case DRIVER_ATHEROS:
4637 ath_sta_set_txsp_stream(dut, intf, val);
4638 break;
4639 default:
4640 sigma_dut_print(dut, DUT_MSG_ERROR,
4641 "Setting TXSP_STREAM not supported");
4642 break;
4643 }
4644 }
4645
4646 val = get_param(cmd, "RXSP_STREAM");
4647 if (val) {
4648 switch (get_driver_type()) {
4649 case DRIVER_WCN:
4650 if (wcn_sta_set_sp_stream(dut, intf, val) < 0) {
4651 send_resp(dut, conn, SIGMA_ERROR,
4652 "ErrorCode,Failed to set RXSP_STREAM");
4653 return 0;
4654 }
4655 break;
4656 case DRIVER_ATHEROS:
4657 ath_sta_set_rxsp_stream(dut, intf, val);
4658 break;
4659 default:
4660 sigma_dut_print(dut, DUT_MSG_ERROR,
4661 "Setting RXSP_STREAM not supported");
4662 break;
4663 }
4664 }
4665
4666 val = get_param(cmd, "DYN_BW_SGNL");
4667 if (val) {
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004668 switch (get_driver_type()) {
4669 case DRIVER_WCN:
Peng Xuc59afd32016-11-21 15:01:11 -08004670 if (strcasecmp(val, "enable") == 0) {
4671 snprintf(buf, sizeof(buf),
4672 "iwpriv %s cwmenable 1", intf);
4673 if (system(buf) != 0) {
4674 sigma_dut_print(dut, DUT_MSG_ERROR,
4675 "iwpriv cwmenable 1 failed");
4676 return 0;
4677 }
4678 } else if (strcasecmp(val, "disable") == 0) {
4679 snprintf(buf, sizeof(buf),
4680 "iwpriv %s cwmenable 0", intf);
4681 if (system(buf) != 0) {
4682 sigma_dut_print(dut, DUT_MSG_ERROR,
4683 "iwpriv cwmenable 0 failed");
4684 return 0;
4685 }
4686 } else {
4687 sigma_dut_print(dut, DUT_MSG_ERROR,
4688 "Unsupported DYN_BW_SGL");
4689 }
4690
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004691 snprintf(buf, sizeof(buf), "iwpriv %s cts_cbw 3", intf);
4692 if (system(buf) != 0) {
4693 sigma_dut_print(dut, DUT_MSG_ERROR,
4694 "Failed to set cts_cbw in DYN_BW_SGNL");
4695 return 0;
4696 }
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004697 break;
4698 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004699 novap_reset(dut, intf);
Priyadharshini Gowthaman818afef2015-11-09 13:28:15 -08004700 ath_config_dyn_bw_sig(dut, intf, val);
4701 break;
4702 default:
4703 sigma_dut_print(dut, DUT_MSG_ERROR,
4704 "Failed to set DYN_BW_SGNL");
4705 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004706 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004707 }
4708
4709 val = get_param(cmd, "RTS_FORCE");
4710 if (val) {
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08004711 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004712 if (strcasecmp(val, "Enable") == 0) {
4713 snprintf(buf, sizeof(buf), "iwconfig %s rts 64", intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004714 if (system(buf) != 0) {
4715 sigma_dut_print(dut, DUT_MSG_ERROR,
4716 "Failed to set RTS_FORCE 64");
4717 }
priyadharshini gowthaman270870e2015-12-09 10:10:23 -08004718 snprintf(buf, sizeof(buf),
4719 "wifitool %s beeliner_fw_test 100 1", intf);
4720 if (system(buf) != 0) {
4721 sigma_dut_print(dut, DUT_MSG_ERROR,
4722 "wifitool beeliner_fw_test 100 1 failed");
4723 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004724 } else if (strcasecmp(val, "Disable") == 0) {
4725 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347",
4726 intf);
Priyadharshini Gowthamanabdb2122015-11-17 11:52:19 +02004727 if (system(buf) != 0) {
4728 sigma_dut_print(dut, DUT_MSG_ERROR,
4729 "Failed to set RTS_FORCE 2347");
4730 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004731 } else {
4732 send_resp(dut, conn, SIGMA_ERROR,
4733 "ErrorCode,RTS_FORCE value not supported");
4734 return 0;
4735 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02004736 }
4737
4738 val = get_param(cmd, "CTS_WIDTH");
4739 if (val) {
4740 switch (get_driver_type()) {
4741 case DRIVER_WCN:
4742 if (wcn_sta_set_cts_width(dut, intf, val) < 0) {
4743 send_resp(dut, conn, SIGMA_ERROR,
4744 "ErrorCode,Failed to set CTS_WIDTH");
4745 return 0;
4746 }
4747 break;
4748 case DRIVER_ATHEROS:
4749 ath_set_cts_width(dut, intf, val);
4750 break;
4751 default:
4752 sigma_dut_print(dut, DUT_MSG_ERROR,
4753 "Setting CTS_WIDTH not supported");
4754 break;
4755 }
4756 }
4757
4758 val = get_param(cmd, "BW_SGNL");
4759 if (val) {
4760 if (strcasecmp(val, "Enable") == 0) {
4761 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1",
4762 intf);
4763 } else if (strcasecmp(val, "Disable") == 0) {
4764 /* TODO: Disable */
4765 buf[0] = '\0';
4766 } else {
4767 send_resp(dut, conn, SIGMA_ERROR,
4768 "ErrorCode,BW_SGNL value not supported");
4769 return 0;
4770 }
4771
4772 if (buf[0] != '\0' && system(buf) != 0) {
4773 sigma_dut_print(dut, DUT_MSG_ERROR,
4774 "Failed to set BW_SGNL");
4775 }
4776 }
4777
4778 val = get_param(cmd, "Band");
4779 if (val) {
4780 if (strcmp(val, "2.4") == 0 || strcmp(val, "5") == 0) {
4781 /* STA supports all bands by default */
4782 } else {
4783 send_resp(dut, conn, SIGMA_ERROR,
4784 "ErrorCode,Unsupported Band");
4785 return 0;
4786 }
4787 }
4788
4789 val = get_param(cmd, "zero_crc");
4790 if (val) {
4791 switch (get_driver_type()) {
4792 case DRIVER_ATHEROS:
4793 ath_set_zero_crc(dut, val);
4794 break;
4795 default:
4796 break;
4797 }
4798 }
4799
4800 return 1;
4801}
4802
4803
4804static int sta_set_60g_common(struct sigma_dut *dut, struct sigma_conn *conn,
4805 struct sigma_cmd *cmd)
4806{
4807 const char *val;
4808 char buf[100];
4809
4810 val = get_param(cmd, "MSDUSize");
4811 if (val) {
4812 int mtu;
4813
4814 dut->amsdu_size = atoi(val);
4815 if (dut->amsdu_size > IEEE80211_MAX_DATA_LEN_DMG ||
4816 dut->amsdu_size < IEEE80211_SNAP_LEN_DMG) {
4817 sigma_dut_print(dut, DUT_MSG_ERROR,
4818 "MSDUSize %d is above max %d or below min %d",
4819 dut->amsdu_size,
4820 IEEE80211_MAX_DATA_LEN_DMG,
4821 IEEE80211_SNAP_LEN_DMG);
4822 dut->amsdu_size = 0;
4823 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4824 }
4825
4826 mtu = dut->amsdu_size - IEEE80211_SNAP_LEN_DMG;
4827 sigma_dut_print(dut, DUT_MSG_DEBUG,
4828 "Setting amsdu_size to %d", mtu);
4829 snprintf(buf, sizeof(buf), "ifconfig %s mtu %d",
4830 get_station_ifname(), mtu);
4831
4832 if (system(buf) != 0) {
4833 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set %s",
4834 buf);
4835 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4836 }
4837 }
4838
4839 val = get_param(cmd, "BAckRcvBuf");
4840 if (val) {
4841 dut->back_rcv_buf = atoi(val);
4842 if (dut->back_rcv_buf == 0) {
4843 sigma_dut_print(dut, DUT_MSG_ERROR,
4844 "Failed to convert %s or value is 0",
4845 val);
4846 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4847 }
4848
4849 sigma_dut_print(dut, DUT_MSG_DEBUG,
4850 "Setting BAckRcvBuf to %s", val);
4851 }
4852
4853 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4854}
4855
4856
4857static int sta_pcp_start(struct sigma_dut *dut, struct sigma_conn *conn,
4858 struct sigma_cmd *cmd)
4859{
4860 int net_id;
4861 char *ifname;
4862 const char *val;
4863 char buf[100];
4864
4865 dut->mode = SIGMA_MODE_STATION;
4866 ifname = get_main_ifname();
4867 if (wpa_command(ifname, "PING") != 0) {
4868 sigma_dut_print(dut, DUT_MSG_ERROR, "Supplicant not running");
4869 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4870 }
4871
4872 wpa_command(ifname, "FLUSH");
4873 net_id = add_network_common(dut, conn, ifname, cmd);
4874 if (net_id < 0) {
4875 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add network");
4876 return net_id;
4877 }
4878
4879 /* TODO: mode=2 for the AP; in the future, replace for mode PCP */
4880 if (set_network(ifname, net_id, "mode", "2") < 0) {
4881 sigma_dut_print(dut, DUT_MSG_ERROR,
4882 "Failed to set supplicant network mode");
4883 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4884 }
4885
4886 sigma_dut_print(dut, DUT_MSG_DEBUG,
4887 "Supplicant set network with mode 2");
4888
4889 val = get_param(cmd, "Security");
4890 if (val && strcasecmp(val, "OPEN") == 0) {
4891 dut->ap_key_mgmt = AP_OPEN;
4892 if (set_network(ifname, net_id, "key_mgmt", "NONE") < 0) {
4893 sigma_dut_print(dut, DUT_MSG_ERROR,
4894 "Failed to set supplicant to %s security",
4895 val);
4896 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4897 }
4898 } else if (val && strcasecmp(val, "WPA2-PSK") == 0) {
4899 dut->ap_key_mgmt = AP_WPA2_PSK;
4900 if (set_network(ifname, net_id, "key_mgmt", "WPA-PSK") < 0) {
4901 sigma_dut_print(dut, DUT_MSG_ERROR,
4902 "Failed to set supplicant to %s security",
4903 val);
4904 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4905 }
4906
4907 if (set_network(ifname, net_id, "proto", "RSN") < 0) {
4908 sigma_dut_print(dut, DUT_MSG_ERROR,
4909 "Failed to set supplicant to proto RSN");
4910 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4911 }
4912 } else if (val) {
4913 sigma_dut_print(dut, DUT_MSG_ERROR,
4914 "Requested Security %s is not supported on 60GHz",
4915 val);
4916 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4917 }
4918
4919 val = get_param(cmd, "Encrypt");
4920 if (val && strcasecmp(val, "AES-GCMP") == 0) {
4921 if (set_network(ifname, net_id, "pairwise", "GCMP") < 0) {
4922 sigma_dut_print(dut, DUT_MSG_ERROR,
4923 "Failed to set supplicant to pairwise GCMP");
4924 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4925 }
4926 if (set_network(ifname, net_id, "group", "GCMP") < 0) {
4927 sigma_dut_print(dut, DUT_MSG_ERROR,
4928 "Failed to set supplicant to group GCMP");
4929 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4930 }
4931 } else if (val) {
4932 sigma_dut_print(dut, DUT_MSG_ERROR,
4933 "Requested Encrypt %s is not supported on 60 GHz",
4934 val);
4935 return SIGMA_DUT_INVALID_CALLER_SEND_STATUS;
4936 }
4937
4938 val = get_param(cmd, "PSK");
4939 if (val && set_network_quoted(ifname, net_id, "psk", val) < 0) {
4940 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set psk %s",
4941 val);
4942 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4943 }
4944
4945 /* Convert 60G channel to freq */
4946 switch (dut->ap_channel) {
4947 case 1:
4948 val = "58320";
4949 break;
4950 case 2:
4951 val = "60480";
4952 break;
4953 case 3:
4954 val = "62640";
4955 break;
4956 default:
4957 sigma_dut_print(dut, DUT_MSG_ERROR,
4958 "Failed to configure channel %d. Not supported",
4959 dut->ap_channel);
4960 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4961 }
4962
4963 if (set_network(ifname, net_id, "frequency", val) < 0) {
4964 sigma_dut_print(dut, DUT_MSG_ERROR,
4965 "Failed to set supplicant network frequency");
4966 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4967 }
4968
4969 sigma_dut_print(dut, DUT_MSG_DEBUG,
4970 "Supplicant set network with frequency");
4971
4972 snprintf(buf, sizeof(buf), "SELECT_NETWORK %d", net_id);
4973 if (wpa_command(ifname, buf) < 0) {
4974 sigma_dut_print(dut, DUT_MSG_INFO,
4975 "Failed to select network id %d on %s",
4976 net_id, ifname);
4977 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
4978 }
4979
4980 sigma_dut_print(dut, DUT_MSG_DEBUG, "Selected network");
4981
4982 return SIGMA_DUT_SUCCESS_CALLER_SEND_STATUS;
4983}
4984
4985
Lior David67543f52017-01-03 19:04:22 +02004986static int wil6210_set_abft_len(struct sigma_dut *dut, int abft_len)
4987{
4988 char buf[128], fname[128];
4989 FILE *f;
4990
4991 if (wil6210_get_debugfs_dir(dut, buf, sizeof(buf))) {
4992 sigma_dut_print(dut, DUT_MSG_ERROR,
4993 "failed to get wil6210 debugfs dir");
4994 return -1;
4995 }
4996
4997 snprintf(fname, sizeof(fname), "%s/abft_len", buf);
4998 f = fopen(fname, "w");
4999 if (!f) {
5000 sigma_dut_print(dut, DUT_MSG_ERROR,
5001 "failed to open: %s", fname);
5002 return -1;
5003 }
5004
5005 fprintf(f, "%d\n", abft_len);
5006 fclose(f);
5007
5008 return 0;
5009}
5010
5011
5012static int sta_set_60g_abft_len(struct sigma_dut *dut, struct sigma_conn *conn,
5013 int abft_len)
5014{
5015 switch (get_driver_type()) {
5016 case DRIVER_WIL6210:
5017 return wil6210_set_abft_len(dut, abft_len);
5018 default:
5019 sigma_dut_print(dut, DUT_MSG_ERROR,
5020 "set abft_len not supported");
5021 return -1;
5022 }
5023}
5024
5025
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005026static int sta_set_60g_pcp(struct sigma_dut *dut, struct sigma_conn *conn,
5027 struct sigma_cmd *cmd)
5028{
5029 const char *val;
Lior David67543f52017-01-03 19:04:22 +02005030 unsigned int abft_len = 1; /* default is one slot */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005031
5032 if (dut->dev_role != DEVROLE_PCP) {
5033 send_resp(dut, conn, SIGMA_INVALID,
5034 "ErrorCode,Invalid DevRole");
5035 return 0;
5036 }
5037
5038 val = get_param(cmd, "SSID");
5039 if (val) {
5040 if (strlen(val) > sizeof(dut->ap_ssid) - 1) {
5041 send_resp(dut, conn, SIGMA_INVALID,
5042 "ErrorCode,Invalid SSID");
5043 return -1;
5044 }
5045
Peng Xub8fc5cc2017-05-10 17:27:28 -07005046 strlcpy(dut->ap_ssid, val, sizeof(dut->ap_ssid));
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005047 }
5048
5049 val = get_param(cmd, "CHANNEL");
5050 if (val) {
5051 const char *pos;
5052
5053 dut->ap_channel = atoi(val);
5054 pos = strchr(val, ';');
5055 if (pos) {
5056 pos++;
5057 dut->ap_channel_1 = atoi(pos);
5058 }
5059 }
5060
5061 switch (dut->ap_channel) {
5062 case 1:
5063 case 2:
5064 case 3:
5065 break;
5066 default:
5067 sigma_dut_print(dut, DUT_MSG_ERROR,
5068 "Channel %d is not supported", dut->ap_channel);
5069 send_resp(dut, conn, SIGMA_ERROR,
5070 "Requested channel is not supported");
5071 return -1;
5072 }
5073
5074 val = get_param(cmd, "BCNINT");
5075 if (val)
5076 dut->ap_bcnint = atoi(val);
5077
5078
5079 val = get_param(cmd, "ExtSchIE");
5080 if (val) {
5081 send_resp(dut, conn, SIGMA_ERROR,
5082 "ErrorCode,ExtSchIE is not supported yet");
5083 return -1;
5084 }
5085
5086 val = get_param(cmd, "AllocType");
5087 if (val) {
5088 send_resp(dut, conn, SIGMA_ERROR,
5089 "ErrorCode,AllocType is not supported yet");
5090 return -1;
5091 }
5092
5093 val = get_param(cmd, "PercentBI");
5094 if (val) {
5095 send_resp(dut, conn, SIGMA_ERROR,
5096 "ErrorCode,PercentBI is not supported yet");
5097 return -1;
5098 }
5099
5100 val = get_param(cmd, "CBAPOnly");
5101 if (val) {
5102 send_resp(dut, conn, SIGMA_ERROR,
5103 "ErrorCode,CBAPOnly is not supported yet");
5104 return -1;
5105 }
5106
5107 val = get_param(cmd, "AMPDU");
5108 if (val) {
5109 if (strcasecmp(val, "Enable") == 0)
5110 dut->ap_ampdu = 1;
5111 else if (strcasecmp(val, "Disable") == 0)
5112 dut->ap_ampdu = 2;
5113 else {
5114 send_resp(dut, conn, SIGMA_ERROR,
5115 "ErrorCode,AMPDU value is not Enable nor Disabled");
5116 return -1;
5117 }
5118 }
5119
5120 val = get_param(cmd, "AMSDU");
5121 if (val) {
5122 if (strcasecmp(val, "Enable") == 0)
5123 dut->ap_amsdu = 1;
5124 else if (strcasecmp(val, "Disable") == 0)
5125 dut->ap_amsdu = 2;
5126 }
5127
5128 val = get_param(cmd, "NumMSDU");
5129 if (val) {
5130 send_resp(dut, conn, SIGMA_ERROR,
5131 "ErrorCode, NumMSDU is not supported yet");
5132 return -1;
5133 }
5134
5135 val = get_param(cmd, "ABFTLRang");
5136 if (val) {
5137 sigma_dut_print(dut, DUT_MSG_DEBUG,
Lior David67543f52017-01-03 19:04:22 +02005138 "ABFTLRang parameter %s", val);
5139 if (strcmp(val, "Gt1") == 0)
5140 abft_len = 2; /* 2 slots in this case */
5141 }
5142
5143 if (sta_set_60g_abft_len(dut, conn, abft_len)) {
5144 send_resp(dut, conn, SIGMA_ERROR,
5145 "ErrorCode, Can't set ABFT length");
5146 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005147 }
5148
5149 if (sta_pcp_start(dut, conn, cmd) < 0) {
5150 send_resp(dut, conn, SIGMA_ERROR,
5151 "ErrorCode, Can't start PCP role");
5152 return -1;
5153 }
5154
5155 return sta_set_60g_common(dut, conn, cmd);
5156}
5157
5158
5159static int sta_set_60g_sta(struct sigma_dut *dut, struct sigma_conn *conn,
5160 struct sigma_cmd *cmd)
5161{
5162 const char *val = get_param(cmd, "DiscoveryMode");
5163
5164 if (dut->dev_role != DEVROLE_STA) {
5165 send_resp(dut, conn, SIGMA_INVALID,
5166 "ErrorCode,Invalid DevRole");
5167 return 0;
5168 }
5169
5170 if (val) {
5171 sigma_dut_print(dut, DUT_MSG_DEBUG, "Discovery: %s", val);
5172 /* Ignore Discovery mode till Driver expose API. */
5173#if 0
5174 if (strcasecmp(val, "1") == 0) {
5175 send_resp(dut, conn, SIGMA_INVALID,
5176 "ErrorCode,DiscoveryMode 1 not supported");
5177 return 0;
5178 }
5179
5180 if (strcasecmp(val, "0") == 0) {
5181 /* OK */
5182 } else {
5183 send_resp(dut, conn, SIGMA_INVALID,
5184 "ErrorCode,DiscoveryMode not supported");
5185 return 0;
5186 }
5187#endif
5188 }
5189
5190 if (start_sta_mode(dut) != 0)
5191 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
5192 return sta_set_60g_common(dut, conn, cmd);
5193}
5194
5195
5196static int cmd_sta_disconnect(struct sigma_dut *dut, struct sigma_conn *conn,
5197 struct sigma_cmd *cmd)
5198{
5199 const char *intf = get_param(cmd, "Interface");
Jouni Malinened77e672018-01-10 16:45:13 +02005200 const char *val = get_param(cmd, "maintain_profile");
vamsi krishnad605c422017-09-20 14:56:31 +05305201
Jouni Malinened77e672018-01-10 16:45:13 +02005202 if (dut->program == PROGRAM_OCE ||
Amarnath Hullur Subramanyamebeda9e2018-01-31 03:21:48 -08005203 dut->program == PROGRAM_HE ||
Jouni Malinened77e672018-01-10 16:45:13 +02005204 (val && atoi(val) == 1)) {
vamsi krishnad605c422017-09-20 14:56:31 +05305205 wpa_command(intf, "DISCONNECT");
5206 return 1;
5207 }
5208
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005209 disconnect_station(dut);
5210 /* Try to ignore old scan results to avoid HS 2.0R2 test case failures
5211 * due to cached results. */
5212 wpa_command(intf, "SET ignore_old_scan_res 1");
5213 wpa_command(intf, "BSS_FLUSH");
5214 return 1;
5215}
5216
5217
5218static int cmd_sta_reassoc(struct sigma_dut *dut, struct sigma_conn *conn,
5219 struct sigma_cmd *cmd)
5220{
5221 const char *intf = get_param(cmd, "Interface");
5222 const char *bssid = get_param(cmd, "bssid");
5223 const char *val = get_param(cmd, "CHANNEL");
5224 struct wpa_ctrl *ctrl;
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305225 char buf[1000];
Sunil Duttd30ce092018-01-11 23:56:29 +05305226 char result[32];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005227 int res;
5228 int chan = 0;
Ashwini Patil467efef2017-05-25 12:18:27 +05305229 int status = 0;
Sunil Duttd30ce092018-01-11 23:56:29 +05305230 int fastreassoc = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005231
5232 if (bssid == NULL) {
5233 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing bssid "
5234 "argument");
5235 return 0;
5236 }
5237
5238 if (val)
5239 chan = atoi(val);
5240
5241 if (wifi_chip_type != DRIVER_WCN && wifi_chip_type != DRIVER_AR6003) {
5242 /* The current network may be from sta_associate or
5243 * sta_hs2_associate
5244 */
5245 if (set_network(intf, dut->infra_network_id, "bssid", bssid) <
5246 0 ||
5247 set_network(intf, 0, "bssid", bssid) < 0)
5248 return -2;
5249 }
5250
5251 ctrl = open_wpa_mon(intf);
5252 if (ctrl == NULL) {
5253 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
5254 "wpa_supplicant monitor connection");
5255 return -1;
5256 }
5257
Sunil Duttd30ce092018-01-11 23:56:29 +05305258 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
5259 sizeof(result)) < 0 ||
5260 strncmp(result, "COMPLETED", 9) != 0) {
5261 sigma_dut_print(dut, DUT_MSG_DEBUG,
5262 "sta_reassoc: Not connected");
5263 fastreassoc = 0;
5264 }
5265
Srinivas Dasari0ebedb12018-02-14 17:03:51 +05305266 if (dut->rsne_override) {
5267#ifdef NL80211_SUPPORT
5268 if (get_driver_type() == DRIVER_WCN && dut->config_rsnie == 0) {
5269 sta_config_rsnie(dut, 1);
5270 dut->config_rsnie = 1;
5271 }
5272#endif /* NL80211_SUPPORT */
5273 snprintf(buf, sizeof(buf), "TEST_ASSOC_IE %s",
5274 dut->rsne_override);
5275 if (wpa_command(intf, buf) < 0) {
5276 send_resp(dut, conn, SIGMA_ERROR,
5277 "ErrorCode,Failed to set DEV_CONFIGURE_IE RSNE override");
5278 return 0;
5279 }
5280 }
5281
Sunil Duttd30ce092018-01-11 23:56:29 +05305282 if (wifi_chip_type == DRIVER_WCN && fastreassoc) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005283#ifdef ANDROID
Ashwini Patil4c8158f2017-05-25 12:49:21 +05305284 if (chan) {
5285 unsigned int freq;
5286
5287 freq = channel_to_freq(chan);
5288 if (!freq) {
5289 sigma_dut_print(dut, DUT_MSG_ERROR,
5290 "Invalid channel number provided: %d",
5291 chan);
5292 send_resp(dut, conn, SIGMA_INVALID,
5293 "ErrorCode,Invalid channel number");
5294 goto close_mon_conn;
5295 }
5296 res = snprintf(buf, sizeof(buf),
5297 "SCAN TYPE=ONLY freq=%d", freq);
5298 } else {
5299 res = snprintf(buf, sizeof(buf), "SCAN TYPE=ONLY");
5300 }
5301 if (res < 0 || res >= (int) sizeof(buf)) {
5302 send_resp(dut, conn, SIGMA_ERROR,
5303 "ErrorCode,snprintf failed");
5304 goto close_mon_conn;
5305 }
5306 if (wpa_command(intf, buf) < 0) {
5307 sigma_dut_print(dut, DUT_MSG_INFO,
5308 "Failed to start scan");
5309 send_resp(dut, conn, SIGMA_ERROR,
5310 "ErrorCode,scan failed");
5311 goto close_mon_conn;
5312 }
5313
5314 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
5315 buf, sizeof(buf));
5316 if (res < 0) {
5317 sigma_dut_print(dut, DUT_MSG_INFO,
5318 "Scan did not complete");
5319 send_resp(dut, conn, SIGMA_ERROR,
5320 "ErrorCode,scan did not complete");
5321 goto close_mon_conn;
5322 }
5323
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005324 if (set_network(intf, dut->infra_network_id, "bssid", "any")
5325 < 0) {
5326 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
5327 "bssid to any during FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305328 status = -2;
5329 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005330 }
5331 res = snprintf(buf, sizeof(buf), "DRIVER FASTREASSOC %s %d",
5332 bssid, chan);
5333 if (res > 0 && res < (int) sizeof(buf))
5334 res = wpa_command(intf, buf);
5335
5336 if (res < 0 || res >= (int) sizeof(buf)) {
5337 send_resp(dut, conn, SIGMA_ERROR,
5338 "errorCode,Failed to run DRIVER FASTREASSOC");
Ashwini Patil467efef2017-05-25 12:18:27 +05305339 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005340 }
5341#else /* ANDROID */
5342 sigma_dut_print(dut, DUT_MSG_DEBUG,
5343 "Reassoc using iwpriv - skip chan=%d info",
5344 chan);
5345 snprintf(buf, sizeof(buf), "iwpriv %s reassoc", intf);
5346 if (system(buf) != 0) {
5347 sigma_dut_print(dut, DUT_MSG_ERROR, "%s failed", buf);
Ashwini Patil467efef2017-05-25 12:18:27 +05305348 status = -2;
5349 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005350 }
5351#endif /* ANDROID */
5352 sigma_dut_print(dut, DUT_MSG_INFO,
5353 "sta_reassoc: Run %s successful", buf);
5354 } else if (wpa_command(intf, "REASSOCIATE")) {
5355 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
5356 "request reassociation");
Ashwini Patil467efef2017-05-25 12:18:27 +05305357 goto close_mon_conn;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005358 }
5359
5360 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
5361 buf, sizeof(buf));
Ashwini Patil467efef2017-05-25 12:18:27 +05305362 if (res < 0) {
5363 sigma_dut_print(dut, DUT_MSG_INFO, "Connection did not complete");
5364 status = -1;
5365 goto close_mon_conn;
5366 }
5367 status = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005368
Ashwini Patil467efef2017-05-25 12:18:27 +05305369close_mon_conn:
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005370 wpa_ctrl_detach(ctrl);
5371 wpa_ctrl_close(ctrl);
Ashwini Patil467efef2017-05-25 12:18:27 +05305372 return status;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005373}
5374
5375
5376static void hs2_clear_credentials(const char *intf)
5377{
5378 wpa_command(intf, "REMOVE_CRED all");
5379}
5380
5381
Lior Davidcc88b562017-01-03 18:52:09 +02005382#ifdef __linux__
5383static int wil6210_get_aid(struct sigma_dut *dut, const char *bssid,
5384 unsigned int *aid)
5385{
Lior David0fe101e2017-03-09 16:09:50 +02005386 const char *pattern = "AID[ \t]+([0-9]+)";
Lior Davidcc88b562017-01-03 18:52:09 +02005387
Lior David0fe101e2017-03-09 16:09:50 +02005388 return wil6210_get_sta_info_field(dut, bssid, pattern, aid);
Lior Davidcc88b562017-01-03 18:52:09 +02005389}
5390#endif /* __linux__ */
5391
5392
5393static int sta_get_aid_60g(struct sigma_dut *dut, const char *bssid,
5394 unsigned int *aid)
5395{
5396 switch (get_driver_type()) {
5397#ifdef __linux__
5398 case DRIVER_WIL6210:
5399 return wil6210_get_aid(dut, bssid, aid);
5400#endif /* __linux__ */
5401 default:
5402 sigma_dut_print(dut, DUT_MSG_ERROR, "get AID not supported");
5403 return -1;
5404 }
5405}
5406
5407
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005408static int sta_get_parameter_60g(struct sigma_dut *dut, struct sigma_conn *conn,
5409 struct sigma_cmd *cmd)
5410{
5411 char buf[MAX_CMD_LEN];
5412 char bss_list[MAX_CMD_LEN];
5413 const char *parameter = get_param(cmd, "Parameter");
5414
5415 if (parameter == NULL)
5416 return -1;
5417
Lior Davidcc88b562017-01-03 18:52:09 +02005418 if (strcasecmp(parameter, "AID") == 0) {
5419 unsigned int aid = 0;
5420 char bssid[20];
5421
5422 if (get_wpa_status(get_station_ifname(), "bssid",
5423 bssid, sizeof(bssid)) < 0) {
5424 sigma_dut_print(dut, DUT_MSG_ERROR,
5425 "could not get bssid");
5426 return -2;
5427 }
5428
5429 if (sta_get_aid_60g(dut, bssid, &aid))
5430 return -2;
5431
5432 snprintf(buf, sizeof(buf), "aid,%d", aid);
5433 sigma_dut_print(dut, DUT_MSG_INFO, "%s", buf);
5434 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5435 return 0;
5436 }
5437
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005438 if (strcasecmp(parameter, "DiscoveredDevList") == 0) {
5439 char *bss_line;
5440 char *bss_id = NULL;
5441 const char *ifname = get_param(cmd, "Interface");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305442 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005443
5444 if (ifname == NULL) {
5445 sigma_dut_print(dut, DUT_MSG_INFO,
5446 "For get DiscoveredDevList need Interface name.");
5447 return -1;
5448 }
5449
5450 /*
5451 * Use "BSS RANGE=ALL MASK=0x2" which provides a list
5452 * of BSSIDs in "bssid=<BSSID>\n"
5453 */
5454 if (wpa_command_resp(ifname, "BSS RANGE=ALL MASK=0x2",
5455 bss_list,
5456 sizeof(bss_list)) < 0) {
5457 sigma_dut_print(dut, DUT_MSG_ERROR,
5458 "Failed to get bss list");
5459 return -1;
5460 }
5461
5462 sigma_dut_print(dut, DUT_MSG_DEBUG,
5463 "bss list for ifname:%s is:%s",
5464 ifname, bss_list);
5465
5466 snprintf(buf, sizeof(buf), "DeviceList");
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305467 bss_line = strtok_r(bss_list, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005468 while (bss_line) {
5469 if (sscanf(bss_line, "bssid=%ms", &bss_id) > 0 &&
5470 bss_id) {
5471 int len;
5472
5473 len = snprintf(buf + strlen(buf),
5474 sizeof(buf) - strlen(buf),
5475 ",%s", bss_id);
5476 free(bss_id);
5477 bss_id = NULL;
5478 if (len < 0) {
5479 sigma_dut_print(dut,
5480 DUT_MSG_ERROR,
5481 "Failed to read BSSID");
5482 send_resp(dut, conn, SIGMA_ERROR,
5483 "ErrorCode,Failed to read BSS ID");
5484 return 0;
5485 }
5486
5487 if ((size_t) len >= sizeof(buf) - strlen(buf)) {
5488 sigma_dut_print(dut,
5489 DUT_MSG_ERROR,
5490 "Response buf too small for list");
5491 send_resp(dut, conn,
5492 SIGMA_ERROR,
5493 "ErrorCode,Response buf too small for list");
5494 return 0;
5495 }
5496 }
5497
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05305498 bss_line = strtok_r(NULL, "\n", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005499 }
5500
5501 sigma_dut_print(dut, DUT_MSG_INFO, "DiscoveredDevList is %s",
5502 buf);
5503 send_resp(dut, conn, SIGMA_COMPLETE, buf);
5504 return 0;
5505 }
5506
5507 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5508 return 0;
5509}
5510
5511
5512static int cmd_sta_get_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
5513 struct sigma_cmd *cmd)
5514{
5515 const char *program = get_param(cmd, "Program");
5516
5517 if (program == NULL)
5518 return -1;
5519
5520 if (strcasecmp(program, "P2PNFC") == 0)
5521 return p2p_cmd_sta_get_parameter(dut, conn, cmd);
5522
5523 if (strcasecmp(program, "60ghz") == 0)
5524 return sta_get_parameter_60g(dut, conn, cmd);
5525
5526#ifdef ANDROID_NAN
5527 if (strcasecmp(program, "NAN") == 0)
Amarnath Hullur Subramanyam1854ec62016-08-11 19:29:35 -07005528 return nan_cmd_sta_get_parameter(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005529#endif /* ANDROID_NAN */
5530
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07005531#ifdef MIRACAST
5532 if (strcasecmp(program, "WFD") == 0 ||
5533 strcasecmp(program, "DisplayR2") == 0)
5534 return miracast_cmd_sta_get_parameter(dut, conn, cmd);
5535#endif /* MIRACAST */
5536
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005537 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
5538 return 0;
5539}
5540
5541
5542static void sta_reset_default_ath(struct sigma_dut *dut, const char *intf,
5543 const char *type)
5544{
5545 char buf[100];
5546
5547 if (dut->program == PROGRAM_VHT) {
5548 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 2", intf);
5549 if (system(buf) != 0) {
5550 sigma_dut_print(dut, DUT_MSG_ERROR,
5551 "iwpriv %s chwidth failed", intf);
5552 }
5553
5554 snprintf(buf, sizeof(buf), "iwpriv %s mode 11ACVHT80", intf);
5555 if (system(buf) != 0) {
5556 sigma_dut_print(dut, DUT_MSG_ERROR,
5557 "iwpriv %s mode 11ACVHT80 failed",
5558 intf);
5559 }
5560
5561 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs -1", intf);
5562 if (system(buf) != 0) {
5563 sigma_dut_print(dut, DUT_MSG_ERROR,
5564 "iwpriv %s vhtmcs -1 failed", intf);
5565 }
5566 }
5567
5568 if (dut->program == PROGRAM_HT) {
5569 snprintf(buf, sizeof(buf), "iwpriv %s chwidth 0", intf);
5570 if (system(buf) != 0) {
5571 sigma_dut_print(dut, DUT_MSG_ERROR,
5572 "iwpriv %s chwidth failed", intf);
5573 }
5574
5575 snprintf(buf, sizeof(buf), "iwpriv %s mode 11naht40", intf);
5576 if (system(buf) != 0) {
5577 sigma_dut_print(dut, DUT_MSG_ERROR,
5578 "iwpriv %s mode 11naht40 failed",
5579 intf);
5580 }
5581
5582 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0", intf);
5583 if (system(buf) != 0) {
5584 sigma_dut_print(dut, DUT_MSG_ERROR,
5585 "iwpriv set11NRates failed");
5586 }
5587 }
5588
5589 if (dut->program == PROGRAM_VHT || dut->program == PROGRAM_HT) {
5590 snprintf(buf, sizeof(buf), "iwpriv %s powersave 0", intf);
5591 if (system(buf) != 0) {
5592 sigma_dut_print(dut, DUT_MSG_ERROR,
5593 "disabling powersave failed");
5594 }
5595
5596 /* Reset CTS width */
5597 snprintf(buf, sizeof(buf), "wifitool %s beeliner_fw_test 54 0",
5598 intf);
5599 if (system(buf) != 0) {
5600 sigma_dut_print(dut, DUT_MSG_ERROR,
5601 "wifitool %s beeliner_fw_test 54 0 failed",
5602 intf);
5603 }
5604
5605 /* Enable Dynamic Bandwidth signalling by default */
5606 snprintf(buf, sizeof(buf), "iwpriv %s cwmenable 1", intf);
5607 if (system(buf) != 0) {
5608 sigma_dut_print(dut, DUT_MSG_ERROR,
5609 "iwpriv %s cwmenable 1 failed", intf);
5610 }
5611
5612 snprintf(buf, sizeof(buf), "iwconfig %s rts 2347", intf);
5613 if (system(buf) != 0) {
5614 sigma_dut_print(dut, DUT_MSG_ERROR,
5615 "iwpriv rts failed");
5616 }
5617 }
5618
5619 if (type && strcasecmp(type, "Testbed") == 0) {
5620 dut->testbed_flag_txsp = 1;
5621 dut->testbed_flag_rxsp = 1;
5622 /* STA has to set spatial stream to 2 per Appendix H */
5623 snprintf(buf, sizeof(buf), "iwpriv %s vht_mcsmap 0xfff0", intf);
5624 if (system(buf) != 0) {
5625 sigma_dut_print(dut, DUT_MSG_ERROR,
5626 "iwpriv vht_mcsmap failed");
5627 }
5628
5629 /* Disable LDPC per Appendix H */
5630 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 0", intf);
5631 if (system(buf) != 0) {
5632 sigma_dut_print(dut, DUT_MSG_ERROR,
5633 "iwpriv %s ldpc 0 failed", intf);
5634 }
5635
5636 snprintf(buf, sizeof(buf), "iwpriv %s amsdu 1", intf);
5637 if (system(buf) != 0) {
5638 sigma_dut_print(dut, DUT_MSG_ERROR,
5639 "iwpriv amsdu failed");
5640 }
5641
5642 /* TODO: Disable STBC 2x1 transmit and receive */
5643 snprintf(buf, sizeof(buf), "iwpriv %s tx_stbc 0", intf);
5644 if (system(buf) != 0) {
5645 sigma_dut_print(dut, DUT_MSG_ERROR,
5646 "Disable tx_stbc 0 failed");
5647 }
5648
5649 snprintf(buf, sizeof(buf), "iwpriv %s rx_stbc 0", intf);
5650 if (system(buf) != 0) {
5651 sigma_dut_print(dut, DUT_MSG_ERROR,
5652 "Disable rx_stbc 0 failed");
5653 }
5654
5655 /* STA has to disable Short GI per Appendix H */
5656 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 0", intf);
5657 if (system(buf) != 0) {
5658 sigma_dut_print(dut, DUT_MSG_ERROR,
5659 "iwpriv %s shortgi 0 failed", intf);
5660 }
5661 }
5662
5663 if (type && strcasecmp(type, "DUT") == 0) {
5664 snprintf(buf, sizeof(buf), "iwpriv %s nss 3", intf);
5665 if (system(buf) != 0) {
5666 sigma_dut_print(dut, DUT_MSG_ERROR,
5667 "iwpriv %s nss 3 failed", intf);
5668 }
Arif Hussainac6c5112018-05-25 17:34:00 -07005669 dut->sta_nss = 3;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02005670
5671 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 1", intf);
5672 if (system(buf) != 0) {
5673 sigma_dut_print(dut, DUT_MSG_ERROR,
5674 "iwpriv %s shortgi 1 failed", intf);
5675 }
5676 }
5677}
5678
5679
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005680#ifdef NL80211_SUPPORT
5681static int sta_set_he_mcs(struct sigma_dut *dut, const char *intf,
5682 enum he_mcs_config mcs)
5683{
5684 struct nl_msg *msg;
5685 int ret = 0;
5686 struct nlattr *params;
5687 int ifindex;
5688
5689 ifindex = if_nametoindex(intf);
5690 if (ifindex == 0) {
5691 sigma_dut_print(dut, DUT_MSG_ERROR,
5692 "%s: Index for interface %s failed",
5693 __func__, intf);
5694 return -1;
5695 }
5696
5697 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5698 NL80211_CMD_VENDOR)) ||
5699 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5700 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5701 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5702 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5703 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5704 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_HE_MCS,
5705 mcs)) {
5706 sigma_dut_print(dut, DUT_MSG_ERROR,
5707 "%s: err in adding vendor_cmd and vendor_data",
5708 __func__);
5709 nlmsg_free(msg);
5710 return -1;
5711 }
5712 nla_nest_end(msg, params);
5713
5714 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5715 if (ret) {
5716 sigma_dut_print(dut, DUT_MSG_ERROR,
5717 "%s: err in send_and_recv_msgs, ret=%d",
5718 __func__, ret);
5719 }
5720 return ret;
5721}
5722#endif /* NL80211_SUPPORT */
5723
5724
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08005725static int sta_set_heconfig_and_wep_tkip(struct sigma_dut *dut,
5726 const char *intf, int enable)
5727{
5728#ifdef NL80211_SUPPORT
5729 struct nl_msg *msg;
5730 int ret = 0;
5731 struct nlattr *params;
5732 int ifindex;
5733
5734 ifindex = if_nametoindex(intf);
5735 if (ifindex == 0) {
5736 sigma_dut_print(dut, DUT_MSG_ERROR,
5737 "%s: Index for interface %s failed",
5738 __func__, intf);
5739 return -1;
5740 }
5741
5742 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5743 NL80211_CMD_VENDOR)) ||
5744 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5745 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5746 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5747 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5748 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5749 nla_put_u8(msg,
5750 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_WEP_TKIP_IN_HE,
5751 enable)) {
5752 sigma_dut_print(dut, DUT_MSG_ERROR,
5753 "%s: err in adding vendor_cmd and vendor_data",
5754 __func__);
5755 nlmsg_free(msg);
5756 return -1;
5757 }
5758 nla_nest_end(msg, params);
5759
5760 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5761 if (ret) {
5762 sigma_dut_print(dut, DUT_MSG_ERROR,
5763 "%s: err in send_and_recv_msgs, ret=%d",
5764 __func__, ret);
5765 }
5766 return ret;
5767#else /* NL80211_SUPPORT */
5768 sigma_dut_print(dut, DUT_MSG_ERROR,
5769 "HE config enablement cannot be changed without NL80211_SUPPORT defined");
5770 return -1;
5771#endif /* NL80211_SUPPORT */
5772}
5773
5774
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005775static int sta_set_addba_buf_size(struct sigma_dut *dut,
5776 const char *intf, int bufsize)
5777{
5778#ifdef NL80211_SUPPORT
5779 struct nl_msg *msg;
5780 int ret = 0;
5781 struct nlattr *params;
5782 int ifindex;
5783
5784 ifindex = if_nametoindex(intf);
5785 if (ifindex == 0) {
5786 sigma_dut_print(dut, DUT_MSG_ERROR,
5787 "%s: Index for interface %s failed",
5788 __func__, intf);
5789 return -1;
5790 }
5791
5792 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5793 NL80211_CMD_VENDOR)) ||
5794 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5795 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5796 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5797 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5798 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5799 nla_put_u8(msg,
5800 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
5801 bufsize)) {
5802 sigma_dut_print(dut, DUT_MSG_ERROR,
5803 "%s: err in adding vendor_cmd and vendor_data",
5804 __func__);
5805 nlmsg_free(msg);
5806 return -1;
5807 }
5808 nla_nest_end(msg, params);
5809
5810 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5811 if (ret) {
5812 sigma_dut_print(dut, DUT_MSG_ERROR,
5813 "%s: err in send_and_recv_msgs, ret=%d",
5814 __func__, ret);
5815 }
5816 return ret;
5817#else /* NL80211_SUPPORT */
5818 sigma_dut_print(dut, DUT_MSG_ERROR,
5819 "AddBA bufsize cannot be changed without NL80211_SUPPORT defined");
5820 return -1;
5821#endif /* NL80211_SUPPORT */
5822}
5823
5824
Arif Hussain8d5b27b2018-05-14 14:31:03 -07005825static int sta_set_tx_beamformee(struct sigma_dut *dut, const char *intf,
5826 int enable)
5827{
5828#ifdef NL80211_SUPPORT
5829 struct nl_msg *msg;
5830 int ret = 0;
5831 struct nlattr *params;
5832 int ifindex;
5833
5834 ifindex = if_nametoindex(intf);
5835 if (ifindex == 0) {
5836 sigma_dut_print(dut, DUT_MSG_ERROR,
5837 "%s: Index for interface %s failed",
5838 __func__, intf);
5839 return -1;
5840 }
5841
5842 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
5843 NL80211_CMD_VENDOR)) ||
5844 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
5845 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
5846 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
5847 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
5848 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
5849 nla_put_u8(msg,
5850 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ENABLE_TX_BEAMFORMEE,
5851 enable)) {
5852 sigma_dut_print(dut, DUT_MSG_ERROR,
5853 "%s: err in adding vendor_cmd and vendor_data",
5854 __func__);
5855 nlmsg_free(msg);
5856 return -1;
5857 }
5858 nla_nest_end(msg, params);
5859
5860 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
5861 if (ret) {
5862 sigma_dut_print(dut, DUT_MSG_ERROR,
5863 "%s: err in send_and_recv_msgs, ret=%d",
5864 __func__, ret);
5865 }
5866 return ret;
5867#else /* NL80211_SUPPORT */
5868 sigma_dut_print(dut, DUT_MSG_ERROR,
5869 "tx beamformee cannot be changed without NL80211_SUPPORT defined");
5870 return -1;
5871#endif /* NL80211_SUPPORT */
5872}
5873
5874
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005875static void sta_reset_default_wcn(struct sigma_dut *dut, const char *intf,
5876 const char *type)
5877{
5878 char buf[60];
5879
5880 if (dut->program == PROGRAM_HE) {
5881 /* resetting phymode to auto in case of HE program */
5882 snprintf(buf, sizeof(buf), "iwpriv %s setphymode 0", intf);
5883 if (system(buf) != 0) {
5884 sigma_dut_print(dut, DUT_MSG_ERROR,
5885 "iwpriv %s setphymode failed", intf);
5886 }
5887
Amarnath Hullur Subramanyam9cecb502018-04-25 13:26:30 -07005888 /* reset the rate to Auto rate */
5889 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0xff",
5890 intf);
5891 if (system(buf) != 0) {
5892 sigma_dut_print(dut, DUT_MSG_ERROR,
5893 "iwpriv %s set_11ax_rate 0xff failed",
5894 intf);
5895 }
5896
Kiran Kumar Lokere86cfe3a2018-06-01 11:55:15 -07005897 /* reset the LDPC setting */
5898 snprintf(buf, sizeof(buf), "iwpriv %s ldpc 1", intf);
5899 if (system(buf) != 0) {
5900 sigma_dut_print(dut, DUT_MSG_ERROR,
5901 "iwpriv %s ldpc 1 failed", intf);
5902 }
5903
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08005904 /* remove all network profiles */
5905 remove_wpa_networks(intf);
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005906
Amarnath Hullur Subramanyam13215de2018-02-27 14:12:55 -08005907 /* Configure ADDBA Req/Rsp buffer size to be 64 */
5908 sta_set_addba_buf_size(dut, intf, 64);
5909
Amarnath Hullur Subramanyam5f32d572018-03-02 00:02:33 -08005910#ifdef NL80211_SUPPORT
5911 /* Disable noackpolicy for all AC */
5912 if (nlvendor_sta_set_noack(dut, intf, 0, QCA_WLAN_AC_ALL)) {
5913 sigma_dut_print(dut, DUT_MSG_ERROR,
5914 "Disable of noackpolicy for all AC failed");
5915 }
5916#endif /* NL80211_SUPPORT */
5917
Amarnath Hullur Subramanyamb1724a52018-03-07 14:31:46 -08005918 /* Enable WMM by default */
5919 if (wcn_sta_set_wmm(dut, intf, "on")) {
5920 sigma_dut_print(dut, DUT_MSG_ERROR,
5921 "Enable of WMM in sta_reset_default_wcn failed");
5922 }
5923
5924 /* Disable ADDBA_REJECT by default */
5925 if (nlvendor_sta_set_addba_reject(dut, intf, 0)) {
5926 sigma_dut_print(dut, DUT_MSG_ERROR,
5927 "Disable of addba_reject in sta_reset_default_wcn failed");
5928 }
5929
Amarnath Hullur Subramanyam1f65a672018-03-07 14:50:29 -08005930 /* Enable sending of ADDBA by default */
5931 if (nlvendor_config_send_addba(dut, intf, 1)) {
5932 sigma_dut_print(dut, DUT_MSG_ERROR,
5933 "Enable sending of ADDBA in sta_reset_default_wcn failed");
5934 }
5935
Amarnath Hullur Subramanyam63c590a2018-03-07 15:26:21 -08005936 /* Enable AMPDU by default */
5937 iwpriv_sta_set_ampdu(dut, intf, 1);
5938
Subhani Shaik8e7a3052018-04-24 14:03:00 -07005939#ifdef NL80211_SUPPORT
5940 if (sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_AUTO)) {
5941 sigma_dut_print(dut, DUT_MSG_ERROR,
5942 "Set LTF config to default in sta_reset_default_wcn failed");
5943 }
5944#endif /* NL80211_SUPPORT */
5945
Arif Hussain8d5b27b2018-05-14 14:31:03 -07005946 if (sta_set_tx_beamformee(dut, intf, 1)) {
5947 sigma_dut_print(dut, DUT_MSG_ERROR,
5948 "Set tx beamformee enable by default in sta_reset_default_wcn failed");
5949 }
5950
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005951 /* Set nss to 1 and MCS 0-7 in case of testbed */
5952 if (type && strcasecmp(type, "Testbed") == 0) {
5953#ifdef NL80211_SUPPORT
5954 int ret;
5955#endif /* NL80211_SUPPORT */
5956
5957 snprintf(buf, sizeof(buf), "iwpriv %s nss 1", intf);
5958 if (system(buf) != 0) {
5959 sigma_dut_print(dut, DUT_MSG_ERROR,
5960 "iwpriv %s nss failed", intf);
5961 }
5962
5963#ifdef NL80211_SUPPORT
5964 ret = sta_set_he_mcs(dut, intf, HE_80_MCS0_7);
5965 if (ret) {
5966 sigma_dut_print(dut, DUT_MSG_ERROR,
5967 "Setting of MCS failed, ret:%d",
5968 ret);
5969 }
5970#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyamc67621d2018-02-04 23:18:01 -08005971
5972 /* Disable STBC as default */
5973 wcn_sta_set_stbc(dut, intf, "0");
Amarnath Hullur Subramanyamd5bb5732018-02-22 15:50:38 -08005974
5975 /* Disable AMSDU as default */
5976 iwpriv_sta_set_amsdu(dut, intf, "0");
Amarnath Hullur Subramanyam474a17d2018-02-22 18:45:54 -08005977
5978#ifdef NL80211_SUPPORT
5979 /* HE fragmentation default off */
5980 if (sta_set_he_fragmentation(dut, intf,
5981 HE_FRAG_DISABLE)) {
5982 sigma_dut_print(dut, DUT_MSG_ERROR,
5983 "Setting of HE fragmentation failed");
5984 }
5985#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam4622a212018-02-23 12:12:14 -08005986
5987 /* Enable WEP/TKIP with HE capability in testbed */
5988 if (sta_set_heconfig_and_wep_tkip(dut, intf, 1)) {
5989 sigma_dut_print(dut, DUT_MSG_ERROR,
5990 "Enabling HE config with WEP/TKIP failed");
5991 }
Arif Hussain8d5b27b2018-05-14 14:31:03 -07005992
5993 if (sta_set_tx_beamformee(dut, intf, 0)) {
5994 sigma_dut_print(dut, DUT_MSG_ERROR,
5995 "Set tx beamformee disable by default for testbed in sta_reset_default_wcn failed");
5996 }
Amarnath Hullur Subramanyam2538acc2018-02-02 16:15:25 -08005997 }
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08005998
5999 /* Defaults in case of DUT */
6000 if (type && strcasecmp(type, "DUT") == 0) {
Arif Hussaind48fcc72018-05-01 18:34:18 -07006001 /* Enable STBC by default */
6002 wcn_sta_set_stbc(dut, intf, "1");
6003
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006004 /* set nss to 2 */
6005 snprintf(buf, sizeof(buf), "iwpriv %s nss 2", intf);
6006 if (system(buf) != 0) {
6007 sigma_dut_print(dut, DUT_MSG_ERROR,
6008 "iwpriv %s nss 2 failed", intf);
6009 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006010 dut->sta_nss = 2;
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006011
6012#ifdef NL80211_SUPPORT
Arif Hussainae239842018-05-01 18:20:05 -07006013 /* Set HE_MCS to 0-11 */
6014 if (sta_set_he_mcs(dut, intf, HE_80_MCS0_11)) {
Amarnath Hullur Subramanyam0acce2c2018-03-06 06:05:17 -08006015 sigma_dut_print(dut, DUT_MSG_ERROR,
6016 "Setting of MCS failed");
6017 }
6018#endif /* NL80211_SUPPORT */
6019
6020 /* Disable WEP/TKIP with HE capability in DUT */
6021 if (sta_set_heconfig_and_wep_tkip(dut, intf, 0)) {
6022 sigma_dut_print(dut, DUT_MSG_ERROR,
6023 "Enabling HE config with WEP/TKIP failed");
6024 }
6025 }
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006026 }
6027}
6028
6029
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006030static int cmd_sta_reset_default(struct sigma_dut *dut,
6031 struct sigma_conn *conn,
6032 struct sigma_cmd *cmd)
6033{
6034 int cmd_sta_p2p_reset(struct sigma_dut *dut, struct sigma_conn *conn,
6035 struct sigma_cmd *cmd);
6036 const char *intf = get_param(cmd, "Interface");
6037 const char *type;
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006038 const char *program = get_param(cmd, "program");
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306039 const char *dev_role = get_param(cmd, "DevRole");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006040
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006041 if (!program)
6042 program = get_param(cmd, "prog");
6043 dut->program = sigma_program_to_enum(program);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006044 dut->device_type = STA_unknown;
6045 type = get_param(cmd, "type");
6046 if (type && strcasecmp(type, "Testbed") == 0)
6047 dut->device_type = STA_testbed;
6048 if (type && strcasecmp(type, "DUT") == 0)
6049 dut->device_type = STA_dut;
6050
6051 if (dut->program == PROGRAM_TDLS) {
6052 /* Clear TDLS testing mode */
6053 wpa_command(intf, "SET tdls_disabled 0");
6054 wpa_command(intf, "SET tdls_testing 0");
6055 dut->no_tpk_expiration = 0;
Pradeep Reddy POTTETI8ce2a232016-10-28 12:17:32 +05306056 if (get_driver_type() == DRIVER_WCN) {
6057 /* Enable the WCN driver in TDLS Explicit trigger mode
6058 */
6059 wpa_command(intf, "SET tdls_external_control 0");
6060 wpa_command(intf, "SET tdls_trigger_control 0");
6061 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006062 }
6063
Amarnath Hullur Subramanyam9c381f52017-03-17 00:04:41 -07006064#ifdef MIRACAST
6065 if (dut->program == PROGRAM_WFD ||
6066 dut->program == PROGRAM_DISPLAYR2)
6067 miracast_sta_reset_default(dut, conn, cmd);
6068#endif /* MIRACAST */
6069
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006070 switch (get_driver_type()) {
6071 case DRIVER_ATHEROS:
6072 sta_reset_default_ath(dut, intf, type);
6073 break;
Amarnath Hullur Subramanyam58f2a6e2018-01-31 03:36:00 -08006074 case DRIVER_WCN:
6075 sta_reset_default_wcn(dut, intf, type);
6076 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006077 default:
6078 break;
6079 }
6080
6081#ifdef ANDROID_NAN
6082 if (dut->program == PROGRAM_NAN)
6083 nan_cmd_sta_reset_default(dut, conn, cmd);
6084#endif /* ANDROID_NAN */
6085
Jouni Malinenba630452018-06-22 11:49:59 +03006086 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006087 unlink("SP/wi-fi.org/pps.xml");
6088 if (system("rm -r SP/*") != 0) {
6089 }
6090 unlink("next-client-cert.pem");
6091 unlink("next-client-key.pem");
6092 }
6093
6094 if (dut->program == PROGRAM_60GHZ) {
6095 const char *dev_role = get_param(cmd, "DevRole");
6096
6097 if (!dev_role) {
6098 send_resp(dut, conn, SIGMA_ERROR,
6099 "errorCode,Missing DevRole argument");
6100 return 0;
6101 }
6102
6103 if (strcasecmp(dev_role, "STA") == 0)
6104 dut->dev_role = DEVROLE_STA;
6105 else if (strcasecmp(dev_role, "PCP") == 0)
6106 dut->dev_role = DEVROLE_PCP;
6107 else {
6108 send_resp(dut, conn, SIGMA_ERROR,
6109 "errorCode,Unknown DevRole");
6110 return 0;
6111 }
6112
6113 if (dut->device_type == STA_unknown) {
6114 sigma_dut_print(dut, DUT_MSG_ERROR,
6115 "Device type is not STA testbed or DUT");
6116 send_resp(dut, conn, SIGMA_ERROR,
6117 "errorCode,Unknown device type");
6118 return 0;
6119 }
6120 }
6121
6122 wpa_command(intf, "WPS_ER_STOP");
6123 wpa_command(intf, "FLUSH");
vamsi krishnaf39bc1e2017-08-23 17:37:53 +05306124 wpa_command(intf, "ERP_FLUSH");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006125 wpa_command(intf, "SET radio_disabled 0");
6126
6127 if (dut->tmp_mac_addr && dut->set_macaddr) {
6128 dut->tmp_mac_addr = 0;
6129 if (system(dut->set_macaddr) != 0) {
6130 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to clear "
6131 "temporary MAC address");
6132 }
6133 }
6134
6135 set_ps(intf, dut, 0);
6136
Jouni Malinenba630452018-06-22 11:49:59 +03006137 if (dut->program == PROGRAM_HS2 || dut->program == PROGRAM_HS2_R2 ||
6138 dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006139 wpa_command(intf, "SET interworking 1");
6140 wpa_command(intf, "SET hs20 1");
6141 }
6142
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006143 if (dut->program == PROGRAM_HS2_R2 ||
Jouni Malinenba630452018-06-22 11:49:59 +03006144 dut->program == PROGRAM_HS2_R3 ||
Deepak Dhamdhere0fe0e452017-12-18 14:52:09 -08006145 dut->program == PROGRAM_OCE) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006146 wpa_command(intf, "SET pmf 1");
6147 } else {
6148 wpa_command(intf, "SET pmf 0");
6149 }
6150
6151 hs2_clear_credentials(intf);
6152 wpa_command(intf, "SET hessid 00:00:00:00:00:00");
6153 wpa_command(intf, "SET access_network_type 15");
6154
6155 static_ip_file(0, NULL, NULL, NULL);
6156 kill_dhcp_client(dut, intf);
6157 clear_ip_addr(dut, intf);
6158
6159 dut->er_oper_performed = 0;
6160 dut->er_oper_bssid[0] = '\0';
6161
priyadharshini gowthamanad6cbba2016-10-04 10:39:58 -07006162 if (dut->program == PROGRAM_LOC) {
6163 /* Disable Interworking by default */
6164 wpa_command(get_station_ifname(), "SET interworking 0");
6165 }
6166
Ashwini Patil00402582017-04-13 12:29:39 +05306167 if (dut->program == PROGRAM_MBO) {
6168 free(dut->non_pref_ch_list);
6169 dut->non_pref_ch_list = NULL;
Ashwini Patil5acd7382017-04-13 15:55:04 +05306170 free(dut->btm_query_cand_list);
6171 dut->btm_query_cand_list = NULL;
Ashwini Patilc63161e2017-04-13 16:30:23 +05306172 wpa_command(intf, "SET reject_btm_req_reason 0");
Ashwini Patila75de5a2017-04-13 16:35:05 +05306173 wpa_command(intf, "SET ignore_assoc_disallow 0");
Ashwini Patild174f2c2017-04-13 16:49:46 +05306174 wpa_command(intf, "SET gas_address3 0");
Ashwini Patil9183fdb2017-04-13 16:58:25 +05306175 wpa_command(intf, "SET roaming 1");
Ashwini Patil00402582017-04-13 12:29:39 +05306176 }
6177
Jouni Malinen3c367e82017-06-23 17:01:47 +03006178 free(dut->rsne_override);
6179 dut->rsne_override = NULL;
6180
Jouni Malinen68143132017-09-02 02:34:08 +03006181 free(dut->sae_commit_override);
6182 dut->sae_commit_override = NULL;
6183
Jouni Malinend86e5822017-08-29 03:55:32 +03006184 dut->dpp_conf_id = -1;
Jouni Malinenb1dd21f2017-11-13 19:14:29 +02006185 free(dut->dpp_peer_uri);
6186 dut->dpp_peer_uri = NULL;
Jouni Malinen63d50412017-11-24 11:55:38 +02006187 dut->dpp_local_bootstrap = -1;
Jouni Malinen5011fb52017-12-05 21:00:15 +02006188 wpa_command(intf, "SET dpp_config_processing 2");
Jouni Malinend86e5822017-08-29 03:55:32 +03006189
Jouni Malinenfac9cad2017-10-10 18:35:55 +03006190 wpa_command(intf, "VENDOR_ELEM_REMOVE 13 *");
6191
vamsi krishnaa2799492017-12-05 14:28:01 +05306192 if (dut->program == PROGRAM_OCE) {
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306193 wpa_command(intf, "SET oce 1");
vamsi krishnaa2799492017-12-05 14:28:01 +05306194 wpa_command(intf, "SET disable_fils 0");
Ankita Bajaj1bde7942018-01-09 19:15:01 +05306195 wpa_command(intf, "FILS_HLP_REQ_FLUSH");
6196 dut->fils_hlp = 0;
6197#ifdef ANDROID
6198 hlp_thread_cleanup(dut);
6199#endif /* ANDROID */
vamsi krishnaa2799492017-12-05 14:28:01 +05306200 }
Ankita Bajaja2cb5672017-10-25 16:08:28 +05306201
Sunil Dutt076081f2018-02-05 19:45:50 +05306202#ifdef NL80211_SUPPORT
Sunil Dutt44595082018-02-12 19:41:45 +05306203 if (get_driver_type() == DRIVER_WCN &&
6204 dut->config_rsnie == 1) {
6205 dut->config_rsnie = 0;
6206 sta_config_rsnie(dut, 0);
Sunil Dutt076081f2018-02-05 19:45:50 +05306207 }
6208#endif /* NL80211_SUPPORT */
6209
Sunil Duttfebf8a82018-02-09 18:50:13 +05306210 if (dev_role && strcasecmp(dev_role, "STA-CFON") == 0) {
6211 dut->dev_role = DEVROLE_STA_CFON;
6212 return sta_cfon_reset_default(dut, conn, cmd);
6213 }
6214
6215 if (dut->program != PROGRAM_VHT)
6216 return cmd_sta_p2p_reset(dut, conn, cmd);
6217
Priyadharshini Gowthamana7dfd492015-11-09 14:34:08 -08006218 return 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006219}
6220
6221
6222static int cmd_sta_get_events(struct sigma_dut *dut, struct sigma_conn *conn,
6223 struct sigma_cmd *cmd)
6224{
6225 const char *program = get_param(cmd, "Program");
6226
6227 if (program == NULL)
6228 return -1;
6229#ifdef ANDROID_NAN
6230 if (strcasecmp(program, "NAN") == 0)
6231 return nan_cmd_sta_get_events(dut, conn, cmd);
6232#endif /* ANDROID_NAN */
6233 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6234 return 0;
6235}
6236
6237
Jouni Malinen82905202018-04-29 17:20:10 +03006238static int sta_exec_action_url(struct sigma_dut *dut, struct sigma_conn *conn,
6239 struct sigma_cmd *cmd)
6240{
6241 const char *url = get_param(cmd, "url");
6242 const char *method = get_param(cmd, "method");
6243 pid_t pid;
6244 int status;
6245
6246 if (!url || !method)
6247 return -1;
6248
6249 /* TODO: Add support for method,post */
6250 if (strcasecmp(method, "get") != 0) {
6251 send_resp(dut, conn, SIGMA_ERROR,
6252 "ErrorCode,Unsupported method");
6253 return 0;
6254 }
6255
6256 pid = fork();
6257 if (pid < 0) {
6258 perror("fork");
6259 return -1;
6260 }
6261
6262 if (pid == 0) {
6263 char * argv[5] = { "wget", "-O", "/dev/null",
6264 (char *) url, NULL };
6265
6266 execv("/usr/bin/wget", argv);
6267 perror("execv");
6268 exit(0);
6269 return -1;
6270 }
6271
6272 if (waitpid(pid, &status, 0) < 0) {
6273 perror("waitpid");
6274 return -1;
6275 }
6276
6277 if (WIFEXITED(status)) {
6278 const char *errmsg;
6279
6280 if (WEXITSTATUS(status) == 0)
6281 return 1;
6282 sigma_dut_print(dut, DUT_MSG_INFO, "wget exit status %d",
6283 WEXITSTATUS(status));
6284 switch (WEXITSTATUS(status)) {
6285 case 4:
6286 errmsg = "errmsg,Network failure";
6287 break;
6288 case 8:
6289 errmsg = "errmsg,Server issued an error response";
6290 break;
6291 default:
6292 errmsg = "errmsg,Unknown failure from wget";
6293 break;
6294 }
6295 send_resp(dut, conn, SIGMA_ERROR, errmsg);
6296 return 0;
6297 }
6298
6299 send_resp(dut, conn, SIGMA_ERROR, "errmsg,Unknown failure");
6300 return 0;
6301}
6302
6303
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006304static int cmd_sta_exec_action(struct sigma_dut *dut, struct sigma_conn *conn,
6305 struct sigma_cmd *cmd)
6306{
6307 const char *program = get_param(cmd, "Prog");
6308
Jouni Malinen82905202018-04-29 17:20:10 +03006309 if (program && !get_param(cmd, "interface"))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006310 return -1;
6311#ifdef ANDROID_NAN
Jouni Malinen82905202018-04-29 17:20:10 +03006312 if (program && strcasecmp(program, "NAN") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006313 return nan_cmd_sta_exec_action(dut, conn, cmd);
6314#endif /* ANDROID_NAN */
Jouni Malinen82905202018-04-29 17:20:10 +03006315
6316 if (program && strcasecmp(program, "Loc") == 0)
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07006317 return loc_cmd_sta_exec_action(dut, conn, cmd);
Jouni Malinen82905202018-04-29 17:20:10 +03006318
6319 if (get_param(cmd, "url"))
6320 return sta_exec_action_url(dut, conn, cmd);
6321
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006322 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported parameter");
6323 return 0;
6324}
6325
6326
6327static int cmd_sta_set_11n(struct sigma_dut *dut, struct sigma_conn *conn,
6328 struct sigma_cmd *cmd)
6329{
6330 const char *intf = get_param(cmd, "Interface");
6331 const char *val, *mcs32, *rate;
6332
6333 val = get_param(cmd, "GREENFIELD");
6334 if (val) {
6335 if (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0) {
6336 /* Enable GD */
6337 send_resp(dut, conn, SIGMA_ERROR,
6338 "ErrorCode,GF not supported");
6339 return 0;
6340 }
6341 }
6342
6343 val = get_param(cmd, "SGI20");
6344 if (val) {
6345 switch (get_driver_type()) {
6346 case DRIVER_ATHEROS:
6347 ath_sta_set_sgi(dut, intf, val);
6348 break;
6349 default:
6350 send_resp(dut, conn, SIGMA_ERROR,
6351 "ErrorCode,SGI20 not supported");
6352 return 0;
6353 }
6354 }
6355
6356 mcs32 = get_param(cmd, "MCS32"); /* HT Duplicate Mode Enable/Disable */
6357 rate = get_param(cmd, "MCS_FIXEDRATE"); /* Fixed MCS rate (0..31) */
6358 if (mcs32 && rate) {
6359 /* TODO */
6360 send_resp(dut, conn, SIGMA_ERROR,
6361 "ErrorCode,MCS32,MCS_FIXEDRATE not supported");
6362 return 0;
6363 } else if (mcs32 && !rate) {
6364 /* TODO */
6365 send_resp(dut, conn, SIGMA_ERROR,
6366 "ErrorCode,MCS32 not supported");
6367 return 0;
6368 } else if (!mcs32 && rate) {
6369 switch (get_driver_type()) {
6370 case DRIVER_ATHEROS:
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08006371 novap_reset(dut, intf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006372 ath_sta_set_11nrates(dut, intf, rate);
6373 break;
6374 default:
6375 send_resp(dut, conn, SIGMA_ERROR,
6376 "ErrorCode,MCS32_FIXEDRATE not supported");
6377 return 0;
6378 }
6379 }
6380
6381 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6382}
6383
6384
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006385static void cmd_set_max_he_mcs(struct sigma_dut *dut, const char *intf,
6386 int mcs_config)
6387{
6388#ifdef NL80211_SUPPORT
6389 int ret;
6390
6391 switch (mcs_config) {
6392 case HE_80_MCS0_7:
6393 case HE_80_MCS0_9:
6394 case HE_80_MCS0_11:
6395 ret = sta_set_he_mcs(dut, intf, mcs_config);
6396 if (ret) {
6397 sigma_dut_print(dut, DUT_MSG_ERROR,
6398 "cmd_set_max_he_mcs: Setting of MCS:%d failed, ret:%d",
6399 mcs_config, ret);
6400 }
6401 break;
6402 default:
6403 sigma_dut_print(dut, DUT_MSG_ERROR,
6404 "cmd_set_max_he_mcs: Invalid mcs %d",
6405 mcs_config);
6406 break;
6407 }
6408#else /* NL80211_SUPPORT */
6409 sigma_dut_print(dut, DUT_MSG_ERROR,
6410 "max HE MCS cannot be changed without NL80211_SUPPORT defined");
6411#endif /* NL80211_SUPPORT */
6412}
6413
6414
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006415static int cmd_sta_set_wireless_vht(struct sigma_dut *dut,
6416 struct sigma_conn *conn,
6417 struct sigma_cmd *cmd)
6418{
6419 const char *intf = get_param(cmd, "Interface");
6420 const char *val;
Arif Hussaina37e9552018-06-20 17:05:59 -07006421 const char *program;
Arif Hussaind13d6952018-07-02 16:23:47 -07006422 char buf[60];
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006423 int tkip = -1;
6424 int wep = -1;
6425
Arif Hussaina37e9552018-06-20 17:05:59 -07006426 program = get_param(cmd, "Program");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006427 val = get_param(cmd, "SGI80");
6428 if (val) {
6429 int sgi80;
6430
6431 sgi80 = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6432 snprintf(buf, sizeof(buf), "iwpriv %s shortgi %d", intf, sgi80);
6433 if (system(buf) != 0) {
6434 sigma_dut_print(dut, DUT_MSG_ERROR,
6435 "iwpriv shortgi failed");
6436 }
6437 }
6438
6439 val = get_param(cmd, "TxBF");
6440 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
6441 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfee 1", intf);
6442 if (system(buf) != 0) {
6443 sigma_dut_print(dut, DUT_MSG_ERROR,
6444 "iwpriv vhtsubfee failed");
6445 }
6446 snprintf(buf, sizeof(buf), "iwpriv %s vhtsubfer 1", intf);
6447 if (system(buf) != 0) {
6448 sigma_dut_print(dut, DUT_MSG_ERROR,
6449 "iwpriv vhtsubfer failed");
6450 }
6451 }
6452
6453 val = get_param(cmd, "MU_TxBF");
6454 if (val && (strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0)) {
6455 switch (get_driver_type()) {
6456 case DRIVER_ATHEROS:
6457 ath_sta_set_txsp_stream(dut, intf, "1SS");
6458 ath_sta_set_rxsp_stream(dut, intf, "1SS");
Sunil Duttae9e5d12018-06-29 11:50:47 +05306459 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfee 1",
6460 intf);
6461 if (system(buf) != 0) {
6462 sigma_dut_print(dut, DUT_MSG_ERROR,
6463 "iwpriv vhtmubfee failed");
6464 }
6465 snprintf(buf, sizeof(buf), "iwpriv %s vhtmubfer 1",
6466 intf);
6467 if (system(buf) != 0) {
6468 sigma_dut_print(dut, DUT_MSG_ERROR,
6469 "iwpriv vhtmubfer failed");
6470 }
6471 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006472 case DRIVER_WCN:
6473 if (wcn_sta_set_sp_stream(dut, intf, "1SS") < 0) {
6474 send_resp(dut, conn, SIGMA_ERROR,
6475 "ErrorCode,Failed to set RX/TXSP_STREAM");
6476 return 0;
6477 }
Sunil Duttae9e5d12018-06-29 11:50:47 +05306478 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006479 default:
6480 sigma_dut_print(dut, DUT_MSG_ERROR,
6481 "Setting SP_STREAM not supported");
6482 break;
6483 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006484 }
6485
6486 val = get_param(cmd, "LDPC");
6487 if (val) {
6488 int ldpc;
6489
6490 ldpc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6491 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, ldpc);
6492 if (system(buf) != 0) {
6493 sigma_dut_print(dut, DUT_MSG_ERROR,
6494 "iwpriv ldpc failed");
6495 }
6496 }
6497
Amarnath Hullur Subramanyam7bae60e2018-01-31 03:46:50 -08006498 val = get_param(cmd, "BCC");
6499 if (val) {
6500 int bcc;
6501
6502 bcc = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6503 /* use LDPC iwpriv itself to set bcc coding, bcc coding
6504 * is mutually exclusive to bcc */
6505 snprintf(buf, sizeof(buf), "iwpriv %s ldpc %d", intf, !bcc);
6506 if (system(buf) != 0) {
6507 sigma_dut_print(dut, DUT_MSG_ERROR,
6508 "Enabling/Disabling of BCC failed");
6509 }
6510 }
6511
Arif Hussain7b47d2d2018-05-09 10:44:02 -07006512 val = get_param(cmd, "MaxHE-MCS_1SS_RxMapLTE80");
6513 if (val && dut->sta_nss == 1)
6514 cmd_set_max_he_mcs(dut, intf, atoi(val));
6515
6516 val = get_param(cmd, "MaxHE-MCS_2SS_RxMapLTE80");
6517 if (val && dut->sta_nss == 2)
6518 cmd_set_max_he_mcs(dut, intf, atoi(val));
6519
Arif Hussainac6c5112018-05-25 17:34:00 -07006520 val = get_param(cmd, "MCS_FixedRate");
6521 if (val) {
6522#ifdef NL80211_SUPPORT
6523 int mcs, ratecode = 0;
6524 enum he_mcs_config mcs_config;
6525 int ret;
6526
6527 ratecode = (0x07 & dut->sta_nss) << 5;
6528 mcs = atoi(val);
6529 /* Add the MCS to the ratecode */
6530 if (mcs >= 0 && mcs <= 11) {
6531 ratecode += mcs;
6532 if (dut->device_type == STA_testbed &&
6533 mcs > 7 && mcs <= 11) {
6534 if (mcs <= 9)
6535 mcs_config = HE_80_MCS0_9;
6536 else
6537 mcs_config = HE_80_MCS0_11;
6538 ret = sta_set_he_mcs(dut, intf, mcs_config);
6539 if (ret) {
6540 sigma_dut_print(dut, DUT_MSG_ERROR,
6541 "MCS_FixedRate: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
6542 mcs, mcs_config, ret);
6543 }
6544 }
6545 snprintf(buf, sizeof(buf),
6546 "iwpriv %s set_11ax_rate 0x%03x",
6547 intf, ratecode);
6548 if (system(buf) != 0) {
6549 sigma_dut_print(dut, DUT_MSG_ERROR,
6550 "MCS_FixedRate: iwpriv setting of 11ax rates 0x%03x failed",
6551 ratecode);
6552 }
6553 } else {
6554 sigma_dut_print(dut, DUT_MSG_ERROR,
6555 "MCS_FixedRate: HE MCS %d not supported",
6556 mcs);
6557 }
6558#else /* NL80211_SUPPORT */
6559 sigma_dut_print(dut, DUT_MSG_ERROR,
6560 "MCS_FixedRate cannot be changed without NL80211_SUPPORT defined");
6561#endif /* NL80211_SUPPORT */
6562 }
6563
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006564 val = get_param(cmd, "opt_md_notif_ie");
6565 if (val) {
6566 char *result = NULL;
6567 char delim[] = ";";
6568 char token[30];
6569 int value, config_val = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306570 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006571
Peng Xub8fc5cc2017-05-10 17:27:28 -07006572 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306573 result = strtok_r(token, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006574
6575 /* Extract the NSS information */
6576 if (result) {
6577 value = atoi(result);
6578 switch (value) {
6579 case 1:
6580 config_val = 1;
6581 break;
6582 case 2:
6583 config_val = 3;
6584 break;
6585 case 3:
6586 config_val = 7;
6587 break;
6588 case 4:
6589 config_val = 15;
6590 break;
6591 default:
6592 config_val = 3;
6593 break;
6594 }
6595
6596 snprintf(buf, sizeof(buf), "iwpriv %s rxchainmask %d",
6597 intf, config_val);
6598 if (system(buf) != 0) {
6599 sigma_dut_print(dut, DUT_MSG_ERROR,
6600 "iwpriv rxchainmask failed");
6601 }
6602
6603 snprintf(buf, sizeof(buf), "iwpriv %s txchainmask %d",
6604 intf, config_val);
6605 if (system(buf) != 0) {
6606 sigma_dut_print(dut, DUT_MSG_ERROR,
6607 "iwpriv txchainmask failed");
6608 }
6609 }
6610
6611 /* Extract the channel width information */
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306612 result = strtok_r(NULL, delim, &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006613 if (result) {
6614 value = atoi(result);
6615 switch (value) {
6616 case 20:
6617 config_val = 0;
6618 break;
6619 case 40:
6620 config_val = 1;
6621 break;
6622 case 80:
6623 config_val = 2;
6624 break;
6625 case 160:
6626 config_val = 3;
6627 break;
6628 default:
6629 config_val = 2;
6630 break;
6631 }
6632
6633 dut->chwidth = config_val;
6634
6635 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
6636 intf, config_val);
6637 if (system(buf) != 0) {
6638 sigma_dut_print(dut, DUT_MSG_ERROR,
6639 "iwpriv chwidth failed");
6640 }
6641 }
6642
6643 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", intf);
6644 if (system(buf) != 0) {
6645 sigma_dut_print(dut, DUT_MSG_ERROR,
6646 "iwpriv opmode_notify failed");
6647 }
6648 }
6649
6650 val = get_param(cmd, "nss_mcs_cap");
6651 if (val) {
6652 int nss, mcs;
6653 char token[20];
6654 char *result = NULL;
6655 unsigned int vht_mcsmap = 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306656 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006657
Peng Xub8fc5cc2017-05-10 17:27:28 -07006658 strlcpy(token, val, sizeof(token));
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306659 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306660 if (!result) {
6661 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006662 "NSS not specified");
6663 send_resp(dut, conn, SIGMA_ERROR,
6664 "errorCode,NSS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306665 return 0;
6666 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006667 nss = atoi(result);
6668
6669 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
6670 if (system(buf) != 0) {
6671 sigma_dut_print(dut, DUT_MSG_ERROR,
6672 "iwpriv nss failed");
6673 }
Arif Hussainac6c5112018-05-25 17:34:00 -07006674 dut->sta_nss = nss;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006675
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306676 result = strtok_r(NULL, ";", &saveptr);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006677 if (result == NULL) {
6678 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006679 "MCS not specified");
6680 send_resp(dut, conn, SIGMA_ERROR,
6681 "errorCode,MCS not specified");
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006682 return 0;
6683 }
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05306684 result = strtok_r(result, "-", &saveptr);
6685 result = strtok_r(NULL, "-", &saveptr);
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306686 if (!result) {
6687 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006688 "MCS not specified");
6689 send_resp(dut, conn, SIGMA_ERROR,
6690 "errorCode,MCS not specified");
Pradeep Reddy POTTETIcd649a22016-01-29 12:55:59 +05306691 return 0;
6692 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006693 mcs = atoi(result);
6694
Arif Hussaina37e9552018-06-20 17:05:59 -07006695 if (program && strcasecmp(program, "HE") == 0) {
6696#ifdef NL80211_SUPPORT
6697 enum he_mcs_config mcs_config;
6698 int ret;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006699
Arif Hussaina37e9552018-06-20 17:05:59 -07006700 if (mcs >= 0 && mcs <= 7) {
6701 mcs_config = HE_80_MCS0_7;
6702 } else if (mcs > 7 && mcs <= 9) {
6703 mcs_config = HE_80_MCS0_9;
6704 } else if (mcs > 9 && mcs <= 11) {
6705 mcs_config = HE_80_MCS0_11;
6706 } else {
6707 sigma_dut_print(dut, DUT_MSG_ERROR,
6708 "nss_mcs_cap: HE: Invalid mcs: %d",
6709 mcs);
6710 send_resp(dut, conn, SIGMA_ERROR,
6711 "errorCode,Invalid MCS");
6712 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006713 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006714
6715 ret = sta_set_he_mcs(dut, intf, mcs_config);
6716 if (ret) {
6717 sigma_dut_print(dut, DUT_MSG_ERROR,
6718 "nss_mcs_cap: HE: Setting of MCS failed, mcs_config: %d, ret: %d",
6719 mcs_config, ret);
6720 send_resp(dut, conn, SIGMA_ERROR,
6721 "errorCode,Failed to set MCS");
6722 return 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006723 }
Arif Hussaina37e9552018-06-20 17:05:59 -07006724#else /* NL80211_SUPPORT */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006725 sigma_dut_print(dut, DUT_MSG_ERROR,
Arif Hussaina37e9552018-06-20 17:05:59 -07006726 "nss_mcs_cap: HE: MCS cannot be changed without NL80211_SUPPORT defined");
6727#endif /* NL80211_SUPPORT */
6728 } else {
6729 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
6730 intf, mcs);
6731 if (system(buf) != 0) {
6732 sigma_dut_print(dut, DUT_MSG_ERROR,
6733 "iwpriv mcs failed");
6734 }
6735
6736 switch (nss) {
6737 case 1:
6738 switch (mcs) {
6739 case 7:
6740 vht_mcsmap = 0xfffc;
6741 break;
6742 case 8:
6743 vht_mcsmap = 0xfffd;
6744 break;
6745 case 9:
6746 vht_mcsmap = 0xfffe;
6747 break;
6748 default:
6749 vht_mcsmap = 0xfffe;
6750 break;
6751 }
6752 break;
6753 case 2:
6754 switch (mcs) {
6755 case 7:
6756 vht_mcsmap = 0xfff0;
6757 break;
6758 case 8:
6759 vht_mcsmap = 0xfff5;
6760 break;
6761 case 9:
6762 vht_mcsmap = 0xfffa;
6763 break;
6764 default:
6765 vht_mcsmap = 0xfffa;
6766 break;
6767 }
6768 break;
6769 case 3:
6770 switch (mcs) {
6771 case 7:
6772 vht_mcsmap = 0xffc0;
6773 break;
6774 case 8:
6775 vht_mcsmap = 0xffd5;
6776 break;
6777 case 9:
6778 vht_mcsmap = 0xffea;
6779 break;
6780 default:
6781 vht_mcsmap = 0xffea;
6782 break;
6783 }
6784 break;
6785 default:
6786 vht_mcsmap = 0xffea;
6787 break;
6788 }
6789 snprintf(buf, sizeof(buf),
6790 "iwpriv %s vht_mcsmap 0x%04x",
6791 intf, vht_mcsmap);
6792 if (system(buf) != 0) {
6793 sigma_dut_print(dut, DUT_MSG_ERROR,
6794 "iwpriv vht_mcsmap failed");
6795 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006796 }
6797 }
6798
6799 /* UNSUPPORTED: val = get_param(cmd, "Tx_lgi_rate"); */
6800
6801 val = get_param(cmd, "Vht_tkip");
6802 if (val)
6803 tkip = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6804
6805 val = get_param(cmd, "Vht_wep");
6806 if (val)
6807 wep = strcmp(val, "1") == 0 || strcasecmp(val, "Enable") == 0;
6808
6809 if (tkip != -1 || wep != -1) {
6810 if ((tkip == 1 && wep != 0) || (wep == 1 && tkip != 0)) {
6811 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 1",
6812 intf);
6813 } else if ((tkip == 0 && wep != 1) || (wep == 0 && tkip != 1)) {
6814 snprintf(buf, sizeof(buf), "iwpriv %s htweptkip 0",
6815 intf);
6816 } else {
6817 sigma_dut_print(dut, DUT_MSG_ERROR,
6818 "ErrorCode,mixed mode of VHT TKIP/WEP not supported");
6819 return 0;
6820 }
6821
6822 if (system(buf) != 0) {
6823 sigma_dut_print(dut, DUT_MSG_ERROR,
6824 "iwpriv htweptkip failed");
6825 }
6826 }
6827
6828 val = get_param(cmd, "txBandwidth");
6829 if (val) {
6830 switch (get_driver_type()) {
Amarnath Hullur Subramanyam4f860292018-01-31 03:49:35 -08006831 case DRIVER_WCN:
6832 if (wcn_sta_set_width(dut, intf, val) < 0) {
6833 send_resp(dut, conn, SIGMA_ERROR,
6834 "ErrorCode,Failed to set txBandwidth");
6835 return 0;
6836 }
6837 break;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006838 case DRIVER_ATHEROS:
6839 if (ath_set_width(dut, conn, intf, val) < 0) {
6840 send_resp(dut, conn, SIGMA_ERROR,
6841 "ErrorCode,Failed to set txBandwidth");
6842 return 0;
6843 }
6844 break;
6845 default:
6846 sigma_dut_print(dut, DUT_MSG_ERROR,
6847 "Setting txBandwidth not supported");
6848 break;
6849 }
6850 }
6851
6852 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6853}
6854
6855
6856static int sta_set_wireless_60g(struct sigma_dut *dut,
6857 struct sigma_conn *conn,
6858 struct sigma_cmd *cmd)
6859{
6860 const char *dev_role = get_param(cmd, "DevRole");
6861
6862 if (!dev_role) {
6863 send_resp(dut, conn, SIGMA_INVALID,
6864 "ErrorCode,DevRole not specified");
6865 return 0;
6866 }
6867
6868 if (strcasecmp(dev_role, "PCP") == 0)
6869 return sta_set_60g_pcp(dut, conn, cmd);
6870 if (strcasecmp(dev_role, "STA") == 0)
6871 return sta_set_60g_sta(dut, conn, cmd);
6872 send_resp(dut, conn, SIGMA_INVALID,
6873 "ErrorCode,DevRole not supported");
6874 return 0;
6875}
6876
6877
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306878static int sta_set_wireless_oce(struct sigma_dut *dut, struct sigma_conn *conn,
6879 struct sigma_cmd *cmd)
6880{
6881 int status;
6882 const char *intf = get_param(cmd, "Interface");
6883 const char *val = get_param(cmd, "DevRole");
6884
6885 if (val && strcasecmp(val, "STA-CFON") == 0) {
6886 status = sta_cfon_set_wireless(dut, conn, cmd);
6887 if (status)
6888 return status;
6889 }
6890 return cmd_sta_set_wireless_common(intf, dut, conn, cmd);
6891}
6892
6893
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006894static int cmd_sta_set_wireless(struct sigma_dut *dut, struct sigma_conn *conn,
6895 struct sigma_cmd *cmd)
6896{
6897 const char *val;
6898
6899 val = get_param(cmd, "Program");
6900 if (val) {
6901 if (strcasecmp(val, "11n") == 0)
6902 return cmd_sta_set_11n(dut, conn, cmd);
Amarnath Hullur Subramanyam4f860292018-01-31 03:49:35 -08006903 if (strcasecmp(val, "VHT") == 0 || strcasecmp(val, "HE") == 0)
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006904 return cmd_sta_set_wireless_vht(dut, conn, cmd);
6905 if (strcasecmp(val, "60ghz") == 0)
6906 return sta_set_wireless_60g(dut, conn, cmd);
Ankita Bajaj0d5825b2017-10-25 16:20:17 +05306907 if (strcasecmp(val, "OCE") == 0)
6908 return sta_set_wireless_oce(dut, conn, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006909 send_resp(dut, conn, SIGMA_ERROR,
6910 "ErrorCode,Program value not supported");
6911 } else {
6912 send_resp(dut, conn, SIGMA_ERROR,
6913 "ErrorCode,Program argument not available");
6914 }
6915
6916 return 0;
6917}
6918
6919
6920static void ath_sta_inject_frame(struct sigma_dut *dut, const char *intf,
6921 int tid)
6922{
6923 char buf[100];
6924 int tid_to_dscp [] = { 0x00, 0x20, 0x40, 0x60, 0x80, 0xa0, 0xc0, 0xe0 };
6925
Pradeep Reddy POTTETId31d1322016-10-13 17:22:03 +05306926 if (tid < 0 ||
6927 tid >= (int) (sizeof(tid_to_dscp) / sizeof(tid_to_dscp[0]))) {
6928 sigma_dut_print(dut, DUT_MSG_ERROR, "Unsupported TID: %d", tid);
6929 return;
6930 }
6931
Jouni Malinencd4e3c32015-10-29 12:39:56 +02006932 /*
6933 * Two ways to ensure that addba request with a
6934 * non zero TID could be sent out. EV 117296
6935 */
6936 snprintf(buf, sizeof(buf),
6937 "ping -c 8 -Q %d `arp -a | grep wlan0 | awk '{print $2}' | tr -d '()'`",
6938 tid);
6939 if (system(buf) != 0) {
6940 sigma_dut_print(dut, DUT_MSG_ERROR,
6941 "Ping did not send out");
6942 }
6943
6944 snprintf(buf, sizeof(buf),
6945 "iwconfig %s | grep Access | awk '{print $6}' > %s",
6946 intf, VI_QOS_TMP_FILE);
6947 if (system(buf) != 0)
6948 return;
6949
6950 snprintf(buf, sizeof(buf),
6951 "ifconfig %s | grep HWaddr | cut -b 39-56 >> %s",
6952 intf, VI_QOS_TMP_FILE);
6953 if (system(buf) != 0)
6954 sigma_dut_print(dut, DUT_MSG_ERROR, "HWaddr matching failed");
6955
6956 snprintf(buf,sizeof(buf), "sed -n '3,$p' %s >> %s",
6957 VI_QOS_REFFILE, VI_QOS_TMP_FILE);
6958 if (system(buf) != 0) {
6959 sigma_dut_print(dut, DUT_MSG_ERROR,
6960 "VI_QOS_TEMP_FILE generation error failed");
6961 }
6962 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
6963 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
6964 if (system(buf) != 0) {
6965 sigma_dut_print(dut, DUT_MSG_ERROR,
6966 "VI_QOS_FILE generation failed");
6967 }
6968
6969 snprintf(buf, sizeof(buf), "sed '5 c %x' %s > %s",
6970 tid_to_dscp[tid], VI_QOS_TMP_FILE, VI_QOS_FILE);
6971 if (system(buf) != 0) {
6972 sigma_dut_print(dut, DUT_MSG_ERROR,
6973 "VI_QOS_FILE generation failed");
6974 }
6975
6976 snprintf(buf, sizeof(buf), "ethinject %s %s", intf, VI_QOS_FILE);
6977 if (system(buf) != 0) {
6978 }
6979}
6980
6981
6982static int ath_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
6983 struct sigma_cmd *cmd)
6984{
6985 const char *intf = get_param(cmd, "Interface");
6986 const char *val;
6987 int tid = 0;
6988 char buf[100];
6989
6990 val = get_param(cmd, "TID");
6991 if (val) {
6992 tid = atoi(val);
6993 if (tid)
6994 ath_sta_inject_frame(dut, intf, tid);
6995 }
6996
6997 /* Command sequence for ADDBA request on Peregrine based devices */
6998 snprintf(buf, sizeof(buf), "iwpriv %s setaddbaoper 1", intf);
6999 if (system(buf) != 0) {
7000 sigma_dut_print(dut, DUT_MSG_ERROR,
7001 "iwpriv setaddbaoper failed");
7002 }
7003
7004 snprintf(buf, sizeof(buf), "wifitool %s senddelba 1 %d 1 4", intf, tid);
7005 if (system(buf) != 0) {
7006 sigma_dut_print(dut, DUT_MSG_ERROR,
7007 "wifitool senddelba failed");
7008 }
7009
7010 snprintf(buf, sizeof(buf), "wifitool %s sendaddba 1 %d 64", intf, tid);
7011 if (system(buf) != 0) {
7012 sigma_dut_print(dut, DUT_MSG_ERROR,
7013 "wifitool sendaddba failed");
7014 }
7015
7016 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7017
7018 return 1;
7019}
7020
7021
Lior David9981b512017-01-20 13:16:40 +02007022#ifdef __linux__
7023
7024static int wil6210_send_addba(struct sigma_dut *dut, const char *dest_mac,
7025 int agg_size)
7026{
7027 char dir[128], buf[128];
7028 FILE *f;
7029 regex_t re;
7030 regmatch_t m[2];
7031 int rc, ret = -1, vring_id, found;
7032
7033 if (wil6210_get_debugfs_dir(dut, dir, sizeof(dir))) {
7034 sigma_dut_print(dut, DUT_MSG_ERROR,
7035 "failed to get wil6210 debugfs dir");
7036 return -1;
7037 }
7038
7039 snprintf(buf, sizeof(buf), "%s/vrings", dir);
7040 f = fopen(buf, "r");
7041 if (!f) {
7042 sigma_dut_print(dut, DUT_MSG_ERROR, "failed to open: %s", buf);
7043 return -1;
7044 }
7045
7046 if (regcomp(&re, "VRING tx_[ \t]*([0-9]+)", REG_EXTENDED)) {
7047 sigma_dut_print(dut, DUT_MSG_ERROR, "regcomp failed");
7048 goto out;
7049 }
7050
7051 /* find TX VRING for the mac address */
7052 found = 0;
7053 while (fgets(buf, sizeof(buf), f)) {
7054 if (strcasestr(buf, dest_mac)) {
7055 found = 1;
7056 break;
7057 }
7058 }
7059
7060 if (!found) {
7061 sigma_dut_print(dut, DUT_MSG_ERROR,
7062 "no TX VRING for %s", dest_mac);
7063 goto out;
7064 }
7065
7066 /* extract VRING ID, "VRING tx_<id> = {" */
7067 if (!fgets(buf, sizeof(buf), f)) {
7068 sigma_dut_print(dut, DUT_MSG_ERROR,
7069 "no VRING start line for %s", dest_mac);
7070 goto out;
7071 }
7072
7073 rc = regexec(&re, buf, 2, m, 0);
7074 regfree(&re);
7075 if (rc || m[1].rm_so < 0) {
7076 sigma_dut_print(dut, DUT_MSG_ERROR,
7077 "no VRING TX ID for %s", dest_mac);
7078 goto out;
7079 }
7080 buf[m[1].rm_eo] = 0;
7081 vring_id = atoi(&buf[m[1].rm_so]);
7082
7083 /* send the addba command */
7084 fclose(f);
7085 snprintf(buf, sizeof(buf), "%s/back", dir);
7086 f = fopen(buf, "w");
7087 if (!f) {
7088 sigma_dut_print(dut, DUT_MSG_ERROR,
7089 "failed to open: %s", buf);
7090 return -1;
7091 }
7092
7093 fprintf(f, "add %d %d\n", vring_id, agg_size);
7094
7095 ret = 0;
7096
7097out:
7098 fclose(f);
7099
7100 return ret;
7101}
7102
7103
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007104static int send_addba_60g(struct sigma_dut *dut, struct sigma_conn *conn,
7105 struct sigma_cmd *cmd)
7106{
7107 const char *val;
7108 int tid = 0;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007109
7110 val = get_param(cmd, "TID");
7111 if (val) {
7112 tid = atoi(val);
7113 if (tid != 0) {
7114 sigma_dut_print(dut, DUT_MSG_ERROR,
7115 "Ignore TID %d for send_addba use TID 0 for 60g since only 0 required on TX",
7116 tid);
7117 }
7118 }
7119
7120 val = get_param(cmd, "Dest_mac");
7121 if (!val) {
7122 sigma_dut_print(dut, DUT_MSG_ERROR,
7123 "Currently not supporting addba for 60G without Dest_mac");
7124 return SIGMA_DUT_ERROR_CALLER_SEND_STATUS;
7125 }
7126
Lior David9981b512017-01-20 13:16:40 +02007127 if (wil6210_send_addba(dut, val, dut->back_rcv_buf))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007128 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007129
7130 return 1;
7131}
7132
Lior David9981b512017-01-20 13:16:40 +02007133#endif /* __linux__ */
7134
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007135
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007136static int wcn_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7137 struct sigma_cmd *cmd)
7138{
7139#ifdef NL80211_SUPPORT
7140 const char *intf = get_param(cmd, "Interface");
7141 const char *val;
7142 int tid = -1;
7143 int bufsize = 64;
7144 struct nl_msg *msg;
7145 int ret = 0;
7146 struct nlattr *params;
7147 int ifindex;
7148
7149 val = get_param(cmd, "TID");
7150 if (val)
7151 tid = atoi(val);
7152
7153 if (tid == -1) {
7154 send_resp(dut, conn, SIGMA_ERROR,
7155 "ErrorCode,sta_send_addba tid invalid");
7156 return 0;
7157 }
7158
7159 /* UNSUPPORTED: val = get_param(cmd, "Dest_mac"); */
7160
7161 ifindex = if_nametoindex(intf);
7162 if (ifindex == 0) {
7163 sigma_dut_print(dut, DUT_MSG_ERROR,
7164 "%s: Index for interface %s failed",
7165 __func__, intf);
7166 send_resp(dut, conn, SIGMA_ERROR,
7167 "ErrorCode,sta_send_addba interface invalid");
7168 return 0;
7169 }
7170
7171 if (!(msg = nl80211_drv_msg(dut, dut->nl_ctx, ifindex, 0,
7172 NL80211_CMD_VENDOR)) ||
7173 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex) ||
7174 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
7175 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
7176 QCA_NL80211_VENDOR_SUBCMD_WIFI_TEST_CONFIGURATION) ||
7177 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
7178 nla_put_u8(msg,
7179 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADD_DEL_BA_SESSION,
7180 QCA_WLAN_ADD_BA) ||
7181 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_BA_TID,
7182 tid) ||
7183 nla_put_u8(msg,
7184 QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_ADDBA_BUFF_SIZE,
7185 bufsize)) {
7186 sigma_dut_print(dut, DUT_MSG_ERROR,
7187 "%s: err in adding vendor_cmd and vendor_data",
7188 __func__);
7189 nlmsg_free(msg);
7190 send_resp(dut, conn, SIGMA_ERROR,
7191 "ErrorCode,sta_send_addba err in adding vendor_cmd and vendor_data");
7192 return 0;
7193 }
7194 nla_nest_end(msg, params);
7195
7196 ret = send_and_recv_msgs(dut, dut->nl_ctx, msg, NULL, NULL);
7197 if (ret) {
7198 sigma_dut_print(dut, DUT_MSG_ERROR,
7199 "%s: err in send_and_recv_msgs, ret=%d",
7200 __func__, ret);
Sunil Dutt30605592018-05-04 20:35:50 +05307201 if (ret == -EOPNOTSUPP)
7202 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007203 send_resp(dut, conn, SIGMA_ERROR,
7204 "ErrorCode,sta_send_addba err in send_and_recv_msgs");
7205 return 0;
7206 }
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007207#else /* NL80211_SUPPORT */
7208 sigma_dut_print(dut, DUT_MSG_ERROR,
7209 "sta_send_addba not supported without NL80211_SUPPORT defined");
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007210#endif /* NL80211_SUPPORT */
Sunil Dutt30605592018-05-04 20:35:50 +05307211
7212 return 1;
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007213}
7214
7215
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007216static int cmd_sta_send_addba(struct sigma_dut *dut, struct sigma_conn *conn,
7217 struct sigma_cmd *cmd)
7218{
7219 switch (get_driver_type()) {
7220 case DRIVER_ATHEROS:
7221 return ath_sta_send_addba(dut, conn, cmd);
Amarnath Hullur Subramanyama72c0162018-02-27 14:49:09 -08007222 case DRIVER_WCN:
7223 return wcn_sta_send_addba(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007224#ifdef __linux__
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007225 case DRIVER_WIL6210:
7226 return send_addba_60g(dut, conn, cmd);
Lior David9981b512017-01-20 13:16:40 +02007227#endif /* __linux__ */
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007228 default:
7229 /*
7230 * There is no driver specific implementation for other drivers.
7231 * Ignore the command and report COMPLETE since the following
7232 * throughput test operation will end up sending ADDBA anyway.
7233 */
7234 return 1;
7235 }
7236}
7237
7238
7239int inject_eth_frame(int s, const void *data, size_t len,
7240 unsigned short ethtype, char *dst, char *src)
7241{
7242 struct iovec iov[4] = {
7243 {
7244 .iov_base = dst,
7245 .iov_len = ETH_ALEN,
7246 },
7247 {
7248 .iov_base = src,
7249 .iov_len = ETH_ALEN,
7250 },
7251 {
7252 .iov_base = &ethtype,
7253 .iov_len = sizeof(unsigned short),
7254 },
7255 {
7256 .iov_base = (void *) data,
7257 .iov_len = len,
7258 }
7259 };
7260 struct msghdr msg = {
7261 .msg_name = NULL,
7262 .msg_namelen = 0,
7263 .msg_iov = iov,
7264 .msg_iovlen = 4,
7265 .msg_control = NULL,
7266 .msg_controllen = 0,
7267 .msg_flags = 0,
7268 };
7269
7270 return sendmsg(s, &msg, 0);
7271}
7272
7273#if defined(__linux__) || defined(__QNXNTO__)
7274
7275int inject_frame(int s, const void *data, size_t len, int encrypt)
7276{
7277#define IEEE80211_RADIOTAP_F_WEP 0x04
7278#define IEEE80211_RADIOTAP_F_FRAG 0x08
7279 unsigned char rtap_hdr[] = {
7280 0x00, 0x00, /* radiotap version */
7281 0x0e, 0x00, /* radiotap length */
7282 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
7283 IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
7284 0x00, /* padding */
7285 0x00, 0x00, /* RX and TX flags to indicate that */
7286 0x00, 0x00, /* this is the injected frame directly */
7287 };
7288 struct iovec iov[2] = {
7289 {
7290 .iov_base = &rtap_hdr,
7291 .iov_len = sizeof(rtap_hdr),
7292 },
7293 {
7294 .iov_base = (void *) data,
7295 .iov_len = len,
7296 }
7297 };
7298 struct msghdr msg = {
7299 .msg_name = NULL,
7300 .msg_namelen = 0,
7301 .msg_iov = iov,
7302 .msg_iovlen = 2,
7303 .msg_control = NULL,
7304 .msg_controllen = 0,
7305 .msg_flags = 0,
7306 };
7307
7308 if (encrypt)
7309 rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
7310
7311 return sendmsg(s, &msg, 0);
7312}
7313
7314
7315int open_monitor(const char *ifname)
7316{
7317#ifdef __QNXNTO__
7318 struct sockaddr_dl ll;
7319 int s;
7320
7321 memset(&ll, 0, sizeof(ll));
7322 ll.sdl_family = AF_LINK;
7323 ll.sdl_index = if_nametoindex(ifname);
7324 if (ll.sdl_index == 0) {
7325 perror("if_nametoindex");
7326 return -1;
7327 }
7328 s = socket(PF_INET, SOCK_RAW, 0);
7329#else /* __QNXNTO__ */
7330 struct sockaddr_ll ll;
7331 int s;
7332
7333 memset(&ll, 0, sizeof(ll));
7334 ll.sll_family = AF_PACKET;
7335 ll.sll_ifindex = if_nametoindex(ifname);
7336 if (ll.sll_ifindex == 0) {
7337 perror("if_nametoindex");
7338 return -1;
7339 }
7340 s = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
7341#endif /* __QNXNTO__ */
7342 if (s < 0) {
7343 perror("socket[PF_PACKET,SOCK_RAW]");
7344 return -1;
7345 }
7346
7347 if (bind(s, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
7348 perror("monitor socket bind");
7349 close(s);
7350 return -1;
7351 }
7352
7353 return s;
7354}
7355
7356
7357static int hex2num(char c)
7358{
7359 if (c >= '0' && c <= '9')
7360 return c - '0';
7361 if (c >= 'a' && c <= 'f')
7362 return c - 'a' + 10;
7363 if (c >= 'A' && c <= 'F')
7364 return c - 'A' + 10;
7365 return -1;
7366}
7367
7368
7369int hwaddr_aton(const char *txt, unsigned char *addr)
7370{
7371 int i;
7372
7373 for (i = 0; i < 6; i++) {
7374 int a, b;
7375
7376 a = hex2num(*txt++);
7377 if (a < 0)
7378 return -1;
7379 b = hex2num(*txt++);
7380 if (b < 0)
7381 return -1;
7382 *addr++ = (a << 4) | b;
7383 if (i < 5 && *txt++ != ':')
7384 return -1;
7385 }
7386
7387 return 0;
7388}
7389
7390#endif /* defined(__linux__) || defined(__QNXNTO__) */
7391
7392enum send_frame_type {
7393 DISASSOC, DEAUTH, SAQUERY, AUTH, ASSOCREQ, REASSOCREQ, DLS_REQ
7394};
7395enum send_frame_protection {
7396 CORRECT_KEY, INCORRECT_KEY, UNPROTECTED
7397};
7398
7399
7400static int sta_inject_frame(struct sigma_dut *dut, struct sigma_conn *conn,
7401 enum send_frame_type frame,
7402 enum send_frame_protection protected,
7403 const char *dest)
7404{
7405#ifdef __linux__
7406 unsigned char buf[1000], *pos;
7407 int s, res;
7408 char bssid[20], addr[20];
7409 char result[32], ssid[100];
7410 size_t ssid_len;
7411
7412 if (get_wpa_status(get_station_ifname(), "wpa_state", result,
7413 sizeof(result)) < 0 ||
7414 strncmp(result, "COMPLETED", 9) != 0) {
7415 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Not connected");
7416 return 0;
7417 }
7418
7419 if (get_wpa_status(get_station_ifname(), "bssid", bssid, sizeof(bssid))
7420 < 0) {
7421 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7422 "current BSSID");
7423 return 0;
7424 }
7425
7426 if (get_wpa_status(get_station_ifname(), "address", addr, sizeof(addr))
7427 < 0) {
7428 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7429 "own MAC address");
7430 return 0;
7431 }
7432
7433 if (get_wpa_status(get_station_ifname(), "ssid", ssid, sizeof(ssid))
7434 < 0) {
7435 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not get "
7436 "current SSID");
7437 return 0;
7438 }
7439 ssid_len = strlen(ssid);
7440
7441 pos = buf;
7442
7443 /* Frame Control */
7444 switch (frame) {
7445 case DISASSOC:
7446 *pos++ = 0xa0;
7447 break;
7448 case DEAUTH:
7449 *pos++ = 0xc0;
7450 break;
7451 case SAQUERY:
7452 *pos++ = 0xd0;
7453 break;
7454 case AUTH:
7455 *pos++ = 0xb0;
7456 break;
7457 case ASSOCREQ:
7458 *pos++ = 0x00;
7459 break;
7460 case REASSOCREQ:
7461 *pos++ = 0x20;
7462 break;
7463 case DLS_REQ:
7464 *pos++ = 0xd0;
7465 break;
7466 }
7467
7468 if (protected == INCORRECT_KEY)
7469 *pos++ = 0x40; /* Set Protected field to 1 */
7470 else
7471 *pos++ = 0x00;
7472
7473 /* Duration */
7474 *pos++ = 0x00;
7475 *pos++ = 0x00;
7476
7477 /* addr1 = DA (current AP) */
7478 hwaddr_aton(bssid, pos);
7479 pos += 6;
7480 /* addr2 = SA (own address) */
7481 hwaddr_aton(addr, pos);
7482 pos += 6;
7483 /* addr3 = BSSID (current AP) */
7484 hwaddr_aton(bssid, pos);
7485 pos += 6;
7486
7487 /* Seq# (to be filled by driver/mac80211) */
7488 *pos++ = 0x00;
7489 *pos++ = 0x00;
7490
7491 if (protected == INCORRECT_KEY) {
7492 /* CCMP parameters */
7493 memcpy(pos, "\x61\x01\x00\x20\x00\x10\x00\x00", 8);
7494 pos += 8;
7495 }
7496
7497 if (protected == INCORRECT_KEY) {
7498 switch (frame) {
7499 case DEAUTH:
7500 /* Reason code (encrypted) */
7501 memcpy(pos, "\xa7\x39", 2);
7502 pos += 2;
7503 break;
7504 case DISASSOC:
7505 /* Reason code (encrypted) */
7506 memcpy(pos, "\xa7\x39", 2);
7507 pos += 2;
7508 break;
7509 case SAQUERY:
7510 /* Category|Action|TransID (encrypted) */
7511 memcpy(pos, "\x6f\xbd\xe9\x4d", 4);
7512 pos += 4;
7513 break;
7514 default:
7515 return -1;
7516 }
7517
7518 /* CCMP MIC */
7519 memcpy(pos, "\xc8\xd8\x3b\x06\x5d\xb7\x25\x68", 8);
7520 pos += 8;
7521 } else {
7522 switch (frame) {
7523 case DEAUTH:
7524 /* reason code = 8 */
7525 *pos++ = 0x08;
7526 *pos++ = 0x00;
7527 break;
7528 case DISASSOC:
7529 /* reason code = 8 */
7530 *pos++ = 0x08;
7531 *pos++ = 0x00;
7532 break;
7533 case SAQUERY:
7534 /* Category - SA Query */
7535 *pos++ = 0x08;
7536 /* SA query Action - Request */
7537 *pos++ = 0x00;
7538 /* Transaction ID */
7539 *pos++ = 0x12;
7540 *pos++ = 0x34;
7541 break;
7542 case AUTH:
7543 /* Auth Alg (Open) */
7544 *pos++ = 0x00;
7545 *pos++ = 0x00;
7546 /* Seq# */
7547 *pos++ = 0x01;
7548 *pos++ = 0x00;
7549 /* Status code */
7550 *pos++ = 0x00;
7551 *pos++ = 0x00;
7552 break;
7553 case ASSOCREQ:
7554 /* Capability Information */
7555 *pos++ = 0x31;
7556 *pos++ = 0x04;
7557 /* Listen Interval */
7558 *pos++ = 0x0a;
7559 *pos++ = 0x00;
7560 /* SSID */
7561 *pos++ = 0x00;
7562 *pos++ = ssid_len;
7563 memcpy(pos, ssid, ssid_len);
7564 pos += ssid_len;
7565 /* Supported Rates */
7566 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7567 10);
7568 pos += 10;
7569 /* Extended Supported Rates */
7570 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7571 pos += 6;
7572 /* RSN */
7573 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7574 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7575 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7576 pos += 28;
7577 break;
7578 case REASSOCREQ:
7579 /* Capability Information */
7580 *pos++ = 0x31;
7581 *pos++ = 0x04;
7582 /* Listen Interval */
7583 *pos++ = 0x0a;
7584 *pos++ = 0x00;
7585 /* Current AP */
7586 hwaddr_aton(bssid, pos);
7587 pos += 6;
7588 /* SSID */
7589 *pos++ = 0x00;
7590 *pos++ = ssid_len;
7591 memcpy(pos, ssid, ssid_len);
7592 pos += ssid_len;
7593 /* Supported Rates */
7594 memcpy(pos, "\x01\x08\x02\x04\x0b\x16\x0c\x12\x18\x24",
7595 10);
7596 pos += 10;
7597 /* Extended Supported Rates */
7598 memcpy(pos, "\x32\x04\x30\x48\x60\x6c", 6);
7599 pos += 6;
7600 /* RSN */
7601 memcpy(pos, "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00"
7602 "\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x02\xc0"
7603 "\x00\x00\x00\x00\x0f\xac\x06", 28);
7604 pos += 28;
7605 break;
7606 case DLS_REQ:
7607 /* Category - DLS */
7608 *pos++ = 0x02;
7609 /* DLS Action - Request */
7610 *pos++ = 0x00;
7611 /* Destination MACAddress */
7612 if (dest)
7613 hwaddr_aton(dest, pos);
7614 else
7615 memset(pos, 0, 6);
7616 pos += 6;
7617 /* Source MACAddress */
7618 hwaddr_aton(addr, pos);
7619 pos += 6;
7620 /* Capability Information */
7621 *pos++ = 0x10; /* Privacy */
7622 *pos++ = 0x06; /* QoS */
7623 /* DLS Timeout Value */
7624 *pos++ = 0x00;
7625 *pos++ = 0x01;
7626 /* Supported rates */
7627 *pos++ = 0x01;
7628 *pos++ = 0x08;
7629 *pos++ = 0x0c; /* 6 Mbps */
7630 *pos++ = 0x12; /* 9 Mbps */
7631 *pos++ = 0x18; /* 12 Mbps */
7632 *pos++ = 0x24; /* 18 Mbps */
7633 *pos++ = 0x30; /* 24 Mbps */
7634 *pos++ = 0x48; /* 36 Mbps */
7635 *pos++ = 0x60; /* 48 Mbps */
7636 *pos++ = 0x6c; /* 54 Mbps */
7637 /* TODO: Extended Supported Rates */
7638 /* TODO: HT Capabilities */
7639 break;
7640 }
7641 }
7642
7643 s = open_monitor("sigmadut");
7644 if (s < 0) {
7645 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
7646 "monitor socket");
7647 return 0;
7648 }
7649
7650 res = inject_frame(s, buf, pos - buf, protected == CORRECT_KEY);
7651 if (res < 0) {
7652 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
7653 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307654 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007655 return 0;
7656 }
7657 if (res < pos - buf) {
7658 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Only partial "
7659 "frame sent");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05307660 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007661 return 0;
7662 }
7663
7664 close(s);
7665
7666 return 1;
7667#else /* __linux__ */
7668 send_resp(dut, conn, SIGMA_ERROR, "errorCode,sta_send_frame not "
7669 "yet supported");
7670 return 0;
7671#endif /* __linux__ */
7672}
7673
7674
7675static int cmd_sta_send_frame_tdls(struct sigma_dut *dut,
7676 struct sigma_conn *conn,
7677 struct sigma_cmd *cmd)
7678{
7679 const char *intf = get_param(cmd, "Interface");
7680 const char *sta, *val;
7681 unsigned char addr[ETH_ALEN];
7682 char buf[100];
7683
7684 sta = get_param(cmd, "peer");
7685 if (sta == NULL)
7686 sta = get_param(cmd, "station");
7687 if (sta == NULL) {
7688 send_resp(dut, conn, SIGMA_ERROR,
7689 "ErrorCode,Missing peer address");
7690 return 0;
7691 }
7692 if (hwaddr_aton(sta, addr) < 0) {
7693 send_resp(dut, conn, SIGMA_ERROR,
7694 "ErrorCode,Invalid peer address");
7695 return 0;
7696 }
7697
7698 val = get_param(cmd, "type");
7699 if (val == NULL)
7700 return -1;
7701
7702 if (strcasecmp(val, "DISCOVERY") == 0) {
7703 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", sta);
7704 if (wpa_command(intf, buf) < 0) {
7705 send_resp(dut, conn, SIGMA_ERROR,
7706 "ErrorCode,Failed to send TDLS discovery");
7707 return 0;
7708 }
7709 return 1;
7710 }
7711
7712 if (strcasecmp(val, "SETUP") == 0) {
7713 int status = 0, timeout = 0;
7714
7715 val = get_param(cmd, "Status");
7716 if (val)
7717 status = atoi(val);
7718
7719 val = get_param(cmd, "Timeout");
7720 if (val)
7721 timeout = atoi(val);
7722
7723 if (status != 0 && status != 37) {
7724 send_resp(dut, conn, SIGMA_ERROR,
7725 "ErrorCode,Unsupported status value");
7726 return 0;
7727 }
7728
7729 if (timeout != 0 && timeout != 301) {
7730 send_resp(dut, conn, SIGMA_ERROR,
7731 "ErrorCode,Unsupported timeout value");
7732 return 0;
7733 }
7734
7735 if (status && timeout) {
7736 send_resp(dut, conn, SIGMA_ERROR,
7737 "ErrorCode,Unsupported timeout+status "
7738 "combination");
7739 return 0;
7740 }
7741
7742 if (status == 37 &&
7743 wpa_command(intf, "SET tdls_testing 0x200")) {
7744 send_resp(dut, conn, SIGMA_ERROR,
7745 "ErrorCode,Failed to enable "
7746 "decline setup response test mode");
7747 return 0;
7748 }
7749
7750 if (timeout == 301) {
7751 int res;
7752 if (dut->no_tpk_expiration)
7753 res = wpa_command(intf,
7754 "SET tdls_testing 0x108");
7755 else
7756 res = wpa_command(intf,
7757 "SET tdls_testing 0x8");
7758 if (res) {
7759 send_resp(dut, conn, SIGMA_ERROR,
7760 "ErrorCode,Failed to set short TPK "
7761 "lifetime");
7762 return 0;
7763 }
7764 }
7765
7766 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", sta);
7767 if (wpa_command(intf, buf) < 0) {
7768 send_resp(dut, conn, SIGMA_ERROR,
7769 "ErrorCode,Failed to send TDLS setup");
7770 return 0;
7771 }
7772 return 1;
7773 }
7774
7775 if (strcasecmp(val, "TEARDOWN") == 0) {
7776 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", sta);
7777 if (wpa_command(intf, buf) < 0) {
7778 send_resp(dut, conn, SIGMA_ERROR,
7779 "ErrorCode,Failed to send TDLS teardown");
7780 return 0;
7781 }
7782 return 1;
7783 }
7784
7785 send_resp(dut, conn, SIGMA_ERROR,
7786 "ErrorCode,Unsupported TDLS frame");
7787 return 0;
7788}
7789
7790
7791static int sta_ap_known(const char *ifname, const char *bssid)
7792{
7793 char buf[4096];
7794
7795 snprintf(buf, sizeof(buf), "BSS %s", bssid);
7796 if (wpa_command_resp(ifname, buf, buf, sizeof(buf)) < 0)
7797 return 0;
7798 if (strncmp(buf, "id=", 3) != 0)
7799 return 0;
7800 return 1;
7801}
7802
7803
7804static int sta_scan_ap(struct sigma_dut *dut, const char *ifname,
7805 const char *bssid)
7806{
7807 int res;
7808 struct wpa_ctrl *ctrl;
7809 char buf[256];
7810
7811 if (sta_ap_known(ifname, bssid))
7812 return 0;
7813 sigma_dut_print(dut, DUT_MSG_DEBUG,
7814 "AP not in BSS table - start scan");
7815
7816 ctrl = open_wpa_mon(ifname);
7817 if (ctrl == NULL) {
7818 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
7819 "wpa_supplicant monitor connection");
7820 return -1;
7821 }
7822
7823 if (wpa_command(ifname, "SCAN") < 0) {
7824 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to start scan");
7825 wpa_ctrl_detach(ctrl);
7826 wpa_ctrl_close(ctrl);
7827 return -1;
7828 }
7829
7830 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
7831 buf, sizeof(buf));
7832
7833 wpa_ctrl_detach(ctrl);
7834 wpa_ctrl_close(ctrl);
7835
7836 if (res < 0) {
7837 sigma_dut_print(dut, DUT_MSG_INFO, "Scan did not complete");
7838 return -1;
7839 }
7840
7841 if (sta_ap_known(ifname, bssid))
7842 return 0;
7843 sigma_dut_print(dut, DUT_MSG_INFO, "AP not in BSS table");
7844 return -1;
7845}
7846
7847
7848static int cmd_sta_send_frame_hs2_neighadv(struct sigma_dut *dut,
7849 struct sigma_conn *conn,
7850 struct sigma_cmd *cmd,
7851 const char *intf)
7852{
7853 char buf[200];
7854
7855 snprintf(buf, sizeof(buf), "ndsend 2001:DB8::1 %s", intf);
7856 if (system(buf) != 0) {
7857 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Failed to run "
7858 "ndsend");
7859 return 0;
7860 }
7861
7862 return 1;
7863}
7864
7865
7866static int cmd_sta_send_frame_hs2_neighsolreq(struct sigma_dut *dut,
7867 struct sigma_conn *conn,
7868 struct sigma_cmd *cmd,
7869 const char *intf)
7870{
7871 char buf[200];
7872 const char *ip = get_param(cmd, "SenderIP");
7873
Peng Xu26b356d2017-10-04 17:58:16 -07007874 if (!ip)
7875 return 0;
7876
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007877 snprintf(buf, sizeof(buf), "ndisc6 -nm %s %s -r 4", ip, intf);
7878 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7879 if (system(buf) == 0) {
7880 sigma_dut_print(dut, DUT_MSG_INFO,
7881 "Neighbor Solicitation got a response "
7882 "for %s@%s", ip, intf);
7883 }
7884
7885 return 1;
7886}
7887
7888
7889static int cmd_sta_send_frame_hs2_arpprobe(struct sigma_dut *dut,
7890 struct sigma_conn *conn,
7891 struct sigma_cmd *cmd,
7892 const char *ifname)
7893{
7894 char buf[200];
7895 const char *ip = get_param(cmd, "SenderIP");
7896
7897 if (ip == NULL) {
7898 send_resp(dut, conn, SIGMA_ERROR,
7899 "ErrorCode,Missing SenderIP parameter");
7900 return 0;
7901 }
7902 snprintf(buf, sizeof(buf), "arping -I %s -D %s -c 4", ifname, ip);
7903 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7904 if (system(buf) != 0) {
7905 sigma_dut_print(dut, DUT_MSG_INFO, "arping DAD got a response "
7906 "for %s@%s", ip, ifname);
7907 }
7908
7909 return 1;
7910}
7911
7912
7913static int cmd_sta_send_frame_hs2_arpannounce(struct sigma_dut *dut,
7914 struct sigma_conn *conn,
7915 struct sigma_cmd *cmd,
7916 const char *ifname)
7917{
7918 char buf[200];
7919 char ip[16];
7920 int s;
Peng Xub3756882017-10-04 14:39:09 -07007921 struct ifreq ifr;
7922 struct sockaddr_in saddr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007923
7924 s = socket(PF_INET, SOCK_DGRAM, 0);
Peng Xub3756882017-10-04 14:39:09 -07007925 if (s < 0) {
7926 perror("socket");
7927 return -1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007928 }
7929
Peng Xub3756882017-10-04 14:39:09 -07007930 memset(&ifr, 0, sizeof(ifr));
7931 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
7932 if (ioctl(s, SIOCGIFADDR, &ifr) < 0) {
7933 sigma_dut_print(dut, DUT_MSG_INFO,
7934 "Failed to get %s IP address: %s",
7935 ifname, strerror(errno));
7936 close(s);
7937 return -1;
7938 }
7939 close(s);
7940
7941 memcpy(&saddr, &ifr.ifr_addr, sizeof(struct sockaddr_in));
7942 strlcpy(ip, inet_ntoa(saddr.sin_addr), sizeof(ip));
7943
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007944 snprintf(buf, sizeof(buf), "arping -I %s -s %s %s -c 4", ifname, ip,
7945 ip);
7946 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
7947 if (system(buf) != 0) {
7948 }
7949
7950 return 1;
7951}
7952
7953
7954static int cmd_sta_send_frame_hs2_arpreply(struct sigma_dut *dut,
7955 struct sigma_conn *conn,
7956 struct sigma_cmd *cmd,
7957 const char *ifname)
7958{
7959 char buf[200], addr[20];
7960 char dst[ETH_ALEN], src[ETH_ALEN];
7961 short ethtype = htons(ETH_P_ARP);
7962 char *pos;
7963 int s, res;
7964 const char *val;
7965 struct sockaddr_in taddr;
7966
7967 val = get_param(cmd, "dest");
7968 if (val)
7969 hwaddr_aton(val, (unsigned char *) dst);
7970
7971 val = get_param(cmd, "DestIP");
7972 if (val)
7973 inet_aton(val, &taddr.sin_addr);
Peng Xu151c9e12017-10-04 14:39:09 -07007974 else
7975 return -2;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02007976
7977 if (get_wpa_status(get_station_ifname(), "address", addr,
7978 sizeof(addr)) < 0)
7979 return -2;
7980 hwaddr_aton(addr, (unsigned char *) src);
7981
7982 pos = buf;
7983 *pos++ = 0x00;
7984 *pos++ = 0x01;
7985 *pos++ = 0x08;
7986 *pos++ = 0x00;
7987 *pos++ = 0x06;
7988 *pos++ = 0x04;
7989 *pos++ = 0x00;
7990 *pos++ = 0x02;
7991 memcpy(pos, src, ETH_ALEN);
7992 pos += ETH_ALEN;
7993 memcpy(pos, &taddr.sin_addr, 4);
7994 pos += 4;
7995 memcpy(pos, dst, ETH_ALEN);
7996 pos += ETH_ALEN;
7997 memcpy(pos, &taddr.sin_addr, 4);
7998 pos += 4;
7999
8000 s = open_monitor(get_station_ifname());
8001 if (s < 0) {
8002 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to open "
8003 "monitor socket");
8004 return 0;
8005 }
8006
8007 res = inject_eth_frame(s, buf, pos - buf, ethtype, dst, src);
8008 if (res < 0) {
8009 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to "
8010 "inject frame");
Pradeep Reddy POTTETI673d85c2016-07-26 19:08:07 +05308011 close(s);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008012 return 0;
8013 }
8014
8015 close(s);
8016
8017 return 1;
8018}
8019
8020
8021static int cmd_sta_send_frame_hs2_dls_req(struct sigma_dut *dut,
8022 struct sigma_conn *conn,
8023 struct sigma_cmd *cmd,
8024 const char *intf, const char *dest)
8025{
8026 char buf[100];
8027
8028 if (if_nametoindex("sigmadut") == 0) {
8029 snprintf(buf, sizeof(buf),
8030 "iw dev %s interface add sigmadut type monitor",
8031 get_station_ifname());
8032 if (system(buf) != 0 ||
8033 if_nametoindex("sigmadut") == 0) {
8034 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8035 "monitor interface with '%s'", buf);
8036 return -2;
8037 }
8038 }
8039
8040 if (system("ifconfig sigmadut up") != 0) {
8041 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8042 "monitor interface up");
8043 return -2;
8044 }
8045
8046 return sta_inject_frame(dut, conn, DLS_REQ, UNPROTECTED, dest);
8047}
8048
8049
8050static int cmd_sta_send_frame_hs2(struct sigma_dut *dut,
8051 struct sigma_conn *conn,
8052 struct sigma_cmd *cmd)
8053{
8054 const char *intf = get_param(cmd, "Interface");
8055 const char *dest = get_param(cmd, "Dest");
8056 const char *type = get_param(cmd, "FrameName");
8057 const char *val;
8058 char buf[200], *pos, *end;
8059 int count, count2;
8060
8061 if (type == NULL)
8062 type = get_param(cmd, "Type");
8063
8064 if (intf == NULL || dest == NULL || type == NULL)
8065 return -1;
8066
8067 if (strcasecmp(type, "NeighAdv") == 0)
8068 return cmd_sta_send_frame_hs2_neighadv(dut, conn, cmd, intf);
8069
8070 if (strcasecmp(type, "NeighSolicitReq") == 0)
8071 return cmd_sta_send_frame_hs2_neighsolreq(dut, conn, cmd, intf);
8072
8073 if (strcasecmp(type, "ARPProbe") == 0)
8074 return cmd_sta_send_frame_hs2_arpprobe(dut, conn, cmd, intf);
8075
8076 if (strcasecmp(type, "ARPAnnounce") == 0)
8077 return cmd_sta_send_frame_hs2_arpannounce(dut, conn, cmd, intf);
8078
8079 if (strcasecmp(type, "ARPReply") == 0)
8080 return cmd_sta_send_frame_hs2_arpreply(dut, conn, cmd, intf);
8081
8082 if (strcasecmp(type, "DLS-request") == 0 ||
8083 strcasecmp(type, "DLSrequest") == 0)
8084 return cmd_sta_send_frame_hs2_dls_req(dut, conn, cmd, intf,
8085 dest);
8086
8087 if (strcasecmp(type, "ANQPQuery") != 0 &&
8088 strcasecmp(type, "Query") != 0) {
8089 send_resp(dut, conn, SIGMA_ERROR,
8090 "ErrorCode,Unsupported HS 2.0 send frame type");
8091 return 0;
8092 }
8093
8094 if (sta_scan_ap(dut, intf, dest) < 0) {
8095 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not find "
8096 "the requested AP");
8097 return 0;
8098 }
8099
8100 pos = buf;
8101 end = buf + sizeof(buf);
8102 count = 0;
8103 pos += snprintf(pos, end - pos, "ANQP_GET %s ", dest);
8104
8105 val = get_param(cmd, "ANQP_CAP_LIST");
8106 if (val && atoi(val)) {
8107 pos += snprintf(pos, end - pos, "%s257", count > 0 ? "," : "");
8108 count++;
8109 }
8110
8111 val = get_param(cmd, "VENUE_NAME");
8112 if (val && atoi(val)) {
8113 pos += snprintf(pos, end - pos, "%s258", count > 0 ? "," : "");
8114 count++;
8115 }
8116
8117 val = get_param(cmd, "NETWORK_AUTH_TYPE");
8118 if (val && atoi(val)) {
8119 pos += snprintf(pos, end - pos, "%s260", count > 0 ? "," : "");
8120 count++;
8121 }
8122
8123 val = get_param(cmd, "ROAMING_CONS");
8124 if (val && atoi(val)) {
8125 pos += snprintf(pos, end - pos, "%s261", count > 0 ? "," : "");
8126 count++;
8127 }
8128
8129 val = get_param(cmd, "IP_ADDR_TYPE_AVAILABILITY");
8130 if (val && atoi(val)) {
8131 pos += snprintf(pos, end - pos, "%s262", count > 0 ? "," : "");
8132 count++;
8133 }
8134
8135 val = get_param(cmd, "NAI_REALM_LIST");
8136 if (val && atoi(val)) {
8137 pos += snprintf(pos, end - pos, "%s263", count > 0 ? "," : "");
8138 count++;
8139 }
8140
8141 val = get_param(cmd, "3GPP_INFO");
8142 if (val && atoi(val)) {
8143 pos += snprintf(pos, end - pos, "%s264", count > 0 ? "," : "");
8144 count++;
8145 }
8146
8147 val = get_param(cmd, "DOMAIN_LIST");
8148 if (val && atoi(val)) {
8149 pos += snprintf(pos, end - pos, "%s268", count > 0 ? "," : "");
8150 count++;
8151 }
8152
Jouni Malinen34cf9532018-04-29 19:26:33 +03008153 val = get_param(cmd, "Venue_URL");
8154 if (val && atoi(val)) {
8155 pos += snprintf(pos, end - pos, "%s277", count > 0 ? "," : "");
8156 count++;
8157 }
8158
Jouni Malinend3bca5d2018-04-29 17:25:23 +03008159 val = get_param(cmd, "Advice_Of_Charge");
8160 if (val && atoi(val)) {
8161 pos += snprintf(pos, end - pos, "%s278", count > 0 ? "," : "");
8162 count++;
8163 }
8164
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008165 if (count && wpa_command(intf, buf)) {
8166 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,ANQP_GET failed");
8167 return 0;
8168 }
8169
8170 pos = buf;
8171 end = buf + sizeof(buf);
8172 count2 = 0;
8173 pos += snprintf(pos, end - pos, "HS20_ANQP_GET %s ", dest);
8174
8175 val = get_param(cmd, "HS_CAP_LIST");
8176 if (val && atoi(val)) {
8177 pos += snprintf(pos, end - pos, "%s2", count2 > 0 ? "," : "");
8178 count2++;
8179 }
8180
8181 val = get_param(cmd, "OPER_NAME");
8182 if (val && atoi(val)) {
8183 pos += snprintf(pos, end - pos, "%s3", count2 > 0 ? "," : "");
8184 count2++;
8185 }
8186
8187 val = get_param(cmd, "WAN_METRICS");
8188 if (!val)
8189 val = get_param(cmd, "WAN_MAT");
8190 if (!val)
8191 val = get_param(cmd, "WAN_MET");
8192 if (val && atoi(val)) {
8193 pos += snprintf(pos, end - pos, "%s4", count2 > 0 ? "," : "");
8194 count2++;
8195 }
8196
8197 val = get_param(cmd, "CONNECTION_CAPABILITY");
8198 if (val && atoi(val)) {
8199 pos += snprintf(pos, end - pos, "%s5", count2 > 0 ? "," : "");
8200 count2++;
8201 }
8202
8203 val = get_param(cmd, "OP_CLASS");
8204 if (val && atoi(val)) {
8205 pos += snprintf(pos, end - pos, "%s7", count2 > 0 ? "," : "");
8206 count2++;
8207 }
8208
8209 val = get_param(cmd, "OSU_PROVIDER_LIST");
8210 if (val && atoi(val)) {
8211 pos += snprintf(pos, end - pos, "%s8", count2 > 0 ? "," : "");
8212 count2++;
8213 }
8214
Jouni Malinenf67afec2018-04-29 19:24:58 +03008215 val = get_param(cmd, "OPER_ICON_METADATA");
8216 if (!val)
8217 val = get_param(cmd, "OPERATOR_ICON_METADATA");
8218 if (val && atoi(val)) {
8219 pos += snprintf(pos, end - pos, "%s12", count2 > 0 ? "," : "");
8220 count2++;
8221 }
8222
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008223 if (count && count2) {
8224 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before sending out "
8225 "second query");
8226 sleep(1);
8227 }
8228
8229 if (count2 && wpa_command(intf, buf)) {
8230 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,HS20_ANQP_GET "
8231 "failed");
8232 return 0;
8233 }
8234
8235 val = get_param(cmd, "NAI_HOME_REALM_LIST");
8236 if (val) {
8237 if (count || count2) {
8238 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8239 "sending out second query");
8240 sleep(1);
8241 }
8242
8243 if (strcmp(val, "1") == 0)
8244 val = "mail.example.com";
8245 snprintf(buf, end - pos,
8246 "HS20_GET_NAI_HOME_REALM_LIST %s realm=%s",
8247 dest, val);
8248 if (wpa_command(intf, buf)) {
8249 send_resp(dut, conn, SIGMA_ERROR,
8250 "ErrorCode,HS20_GET_NAI_HOME_REALM_LIST "
8251 "failed");
8252 return 0;
8253 }
8254 }
8255
8256 val = get_param(cmd, "ICON_REQUEST");
8257 if (val) {
8258 if (count || count2) {
8259 sigma_dut_print(dut, DUT_MSG_DEBUG, "Wait before "
8260 "sending out second query");
8261 sleep(1);
8262 }
8263
8264 snprintf(buf, end - pos,
8265 "HS20_ICON_REQUEST %s %s", dest, val);
8266 if (wpa_command(intf, buf)) {
8267 send_resp(dut, conn, SIGMA_ERROR,
8268 "ErrorCode,HS20_ICON_REQUEST failed");
8269 return 0;
8270 }
8271 }
8272
8273 return 1;
8274}
8275
8276
8277static int ath_sta_send_frame_vht(struct sigma_dut *dut,
8278 struct sigma_conn *conn,
8279 struct sigma_cmd *cmd)
8280{
8281 const char *val;
8282 char *ifname;
8283 char buf[100];
8284 int chwidth, nss;
8285
8286 val = get_param(cmd, "framename");
8287 if (!val)
8288 return -1;
8289 sigma_dut_print(dut, DUT_MSG_DEBUG, "framename is %s", val);
8290
8291 /* Command sequence to generate Op mode notification */
8292 if (val && strcasecmp(val, "Op_md_notif_frm") == 0) {
8293 ifname = get_station_ifname();
8294
8295 /* Disable STBC */
8296 snprintf(buf, sizeof(buf),
8297 "iwpriv %s tx_stbc 0", ifname);
8298 if (system(buf) != 0) {
8299 sigma_dut_print(dut, DUT_MSG_ERROR,
8300 "iwpriv tx_stbc 0 failed!");
8301 }
8302
8303 /* Extract Channel width */
8304 val = get_param(cmd, "Channel_width");
8305 if (val) {
8306 switch (atoi(val)) {
8307 case 20:
8308 chwidth = 0;
8309 break;
8310 case 40:
8311 chwidth = 1;
8312 break;
8313 case 80:
8314 chwidth = 2;
8315 break;
8316 case 160:
8317 chwidth = 3;
8318 break;
8319 default:
8320 chwidth = 2;
8321 break;
8322 }
8323
8324 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
8325 ifname, chwidth);
8326 if (system(buf) != 0) {
8327 sigma_dut_print(dut, DUT_MSG_ERROR,
8328 "iwpriv chwidth failed!");
8329 }
8330 }
8331
8332 /* Extract NSS */
8333 val = get_param(cmd, "NSS");
8334 if (val) {
8335 switch (atoi(val)) {
8336 case 1:
8337 nss = 1;
8338 break;
8339 case 2:
8340 nss = 3;
8341 break;
8342 case 3:
8343 nss = 7;
8344 break;
8345 default:
8346 /* We do not support NSS > 3 */
8347 nss = 3;
8348 break;
8349 }
8350 snprintf(buf, sizeof(buf),
8351 "iwpriv %s rxchainmask %d", ifname, nss);
8352 if (system(buf) != 0) {
8353 sigma_dut_print(dut, DUT_MSG_ERROR,
8354 "iwpriv rxchainmask failed!");
8355 }
8356 }
8357
8358 /* Opmode notify */
8359 snprintf(buf, sizeof(buf), "iwpriv %s opmode_notify 1", ifname);
8360 if (system(buf) != 0) {
8361 sigma_dut_print(dut, DUT_MSG_ERROR,
8362 "iwpriv opmode_notify failed!");
8363 } else {
8364 sigma_dut_print(dut, DUT_MSG_INFO,
8365 "Sent out the notify frame!");
8366 }
8367 }
8368
8369 return 1;
8370}
8371
8372
8373static int cmd_sta_send_frame_vht(struct sigma_dut *dut,
8374 struct sigma_conn *conn,
8375 struct sigma_cmd *cmd)
8376{
8377 switch (get_driver_type()) {
8378 case DRIVER_ATHEROS:
8379 return ath_sta_send_frame_vht(dut, conn, cmd);
8380 default:
8381 send_resp(dut, conn, SIGMA_ERROR,
8382 "errorCode,Unsupported sta_set_frame(VHT) with the current driver");
8383 return 0;
8384 }
8385}
8386
8387
Lior David0fe101e2017-03-09 16:09:50 +02008388#ifdef __linux__
8389int wil6210_send_frame_60g(struct sigma_dut *dut, struct sigma_conn *conn,
8390 struct sigma_cmd *cmd)
8391{
8392 const char *frame_name = get_param(cmd, "framename");
8393 const char *mac = get_param(cmd, "dest_mac");
8394
8395 if (!frame_name || !mac) {
8396 sigma_dut_print(dut, DUT_MSG_ERROR,
8397 "framename and dest_mac must be provided");
8398 return -1;
8399 }
8400
8401 if (strcasecmp(frame_name, "brp") == 0) {
8402 const char *l_rx = get_param(cmd, "L-RX");
8403 int l_rx_i;
8404
8405 if (!l_rx) {
8406 sigma_dut_print(dut, DUT_MSG_ERROR,
8407 "L-RX must be provided");
8408 return -1;
8409 }
8410 l_rx_i = atoi(l_rx);
8411
8412 sigma_dut_print(dut, DUT_MSG_INFO,
8413 "dev_send_frame: BRP-RX, dest_mac %s, L-RX %s",
8414 mac, l_rx);
8415 if (l_rx_i != 16) {
8416 sigma_dut_print(dut, DUT_MSG_ERROR,
8417 "unsupported L-RX: %s", l_rx);
8418 return -1;
8419 }
8420
8421 if (wil6210_send_brp_rx(dut, mac, l_rx_i))
8422 return -1;
8423 } else if (strcasecmp(frame_name, "ssw") == 0) {
8424 sigma_dut_print(dut, DUT_MSG_INFO,
8425 "dev_send_frame: SLS, dest_mac %s", mac);
8426 if (wil6210_send_sls(dut, mac))
8427 return -1;
8428 } else {
8429 sigma_dut_print(dut, DUT_MSG_ERROR,
8430 "unsupported frame type: %s", frame_name);
8431 return -1;
8432 }
8433
8434 return 1;
8435}
8436#endif /* __linux__ */
8437
8438
8439static int cmd_sta_send_frame_60g(struct sigma_dut *dut,
8440 struct sigma_conn *conn,
8441 struct sigma_cmd *cmd)
8442{
8443 switch (get_driver_type()) {
8444#ifdef __linux__
8445 case DRIVER_WIL6210:
8446 return wil6210_send_frame_60g(dut, conn, cmd);
8447#endif /* __linux__ */
8448 default:
8449 send_resp(dut, conn, SIGMA_ERROR,
8450 "errorCode,Unsupported sta_set_frame(60G) with the current driver");
8451 return 0;
8452 }
8453}
8454
8455
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308456static int mbo_send_anqp_query(struct sigma_dut *dut, struct sigma_conn *conn,
8457 const char *intf, struct sigma_cmd *cmd)
8458{
8459 const char *val, *addr;
8460 char buf[100];
8461
8462 addr = get_param(cmd, "DestMac");
8463 if (!addr) {
8464 send_resp(dut, conn, SIGMA_INVALID,
8465 "ErrorCode,AP MAC address is missing");
8466 return 0;
8467 }
8468
8469 val = get_param(cmd, "ANQPQuery_ID");
8470 if (!val) {
8471 send_resp(dut, conn, SIGMA_INVALID,
8472 "ErrorCode,Missing ANQPQuery_ID");
8473 return 0;
8474 }
8475
8476 if (strcasecmp(val, "NeighborReportReq") == 0) {
8477 snprintf(buf, sizeof(buf), "ANQP_GET %s 272", addr);
8478 } else if (strcasecmp(val, "QueryListWithCellPref") == 0) {
8479 snprintf(buf, sizeof(buf), "ANQP_GET %s 272,mbo:2", addr);
8480 } else {
8481 sigma_dut_print(dut, DUT_MSG_ERROR, "Invalid ANQPQuery_ID: %s",
8482 val);
8483 send_resp(dut, conn, SIGMA_INVALID,
8484 "ErrorCode,Invalid ANQPQuery_ID");
8485 return 0;
8486 }
8487
Ashwini Patild174f2c2017-04-13 16:49:46 +05308488 /* Set gas_address3 field to IEEE 802.11-2012 standard compliant form
8489 * (Address3 = Wildcard BSSID when sent to not-associated AP;
8490 * if associated, AP BSSID).
8491 */
8492 if (wpa_command(intf, "SET gas_address3 1") < 0) {
8493 send_resp(dut, conn, SIGMA_ERROR,
8494 "ErrorCode,Failed to set gas_address3");
8495 return 0;
8496 }
8497
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308498 if (wpa_command(intf, buf) < 0) {
8499 send_resp(dut, conn, SIGMA_ERROR,
8500 "ErrorCode,Failed to send ANQP query");
8501 return 0;
8502 }
8503
8504 return 1;
8505}
8506
8507
8508static int mbo_cmd_sta_send_frame(struct sigma_dut *dut,
8509 struct sigma_conn *conn,
8510 const char *intf,
8511 struct sigma_cmd *cmd)
8512{
8513 const char *val = get_param(cmd, "FrameName");
8514
8515 if (val && strcasecmp(val, "ANQPQuery") == 0)
8516 return mbo_send_anqp_query(dut, conn, intf, cmd);
8517
8518 return 2;
8519}
8520
8521
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008522int cmd_sta_send_frame(struct sigma_dut *dut, struct sigma_conn *conn,
8523 struct sigma_cmd *cmd)
8524{
8525 const char *intf = get_param(cmd, "Interface");
8526 const char *val;
8527 enum send_frame_type frame;
8528 enum send_frame_protection protected;
8529 char buf[100];
8530 unsigned char addr[ETH_ALEN];
8531 int res;
8532
8533 val = get_param(cmd, "program");
8534 if (val == NULL)
8535 val = get_param(cmd, "frame");
8536 if (val && strcasecmp(val, "TDLS") == 0)
8537 return cmd_sta_send_frame_tdls(dut, conn, cmd);
8538 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008539 strcasecmp(val, "HS2-R2") == 0 ||
8540 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008541 return cmd_sta_send_frame_hs2(dut, conn, cmd);
8542 if (val && strcasecmp(val, "VHT") == 0)
8543 return cmd_sta_send_frame_vht(dut, conn, cmd);
priyadharshini gowthamand66913a2016-07-29 15:11:17 -07008544 if (val && strcasecmp(val, "LOC") == 0)
8545 return loc_cmd_sta_send_frame(dut, conn, cmd);
Lior David0fe101e2017-03-09 16:09:50 +02008546 if (val && strcasecmp(val, "60GHz") == 0)
8547 return cmd_sta_send_frame_60g(dut, conn, cmd);
Ashwini Patildb59b3c2017-04-13 15:19:23 +05308548 if (val && strcasecmp(val, "MBO") == 0) {
8549 res = mbo_cmd_sta_send_frame(dut, conn, intf, cmd);
8550 if (res != 2)
8551 return res;
8552 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008553
8554 val = get_param(cmd, "TD_DISC");
8555 if (val) {
8556 if (hwaddr_aton(val, addr) < 0)
8557 return -1;
8558 snprintf(buf, sizeof(buf), "TDLS_DISCOVER %s", val);
8559 if (wpa_command(intf, buf) < 0) {
8560 send_resp(dut, conn, SIGMA_ERROR,
8561 "ErrorCode,Failed to send TDLS discovery");
8562 return 0;
8563 }
8564 return 1;
8565 }
8566
8567 val = get_param(cmd, "TD_Setup");
8568 if (val) {
8569 if (hwaddr_aton(val, addr) < 0)
8570 return -1;
8571 snprintf(buf, sizeof(buf), "TDLS_SETUP %s", val);
8572 if (wpa_command(intf, buf) < 0) {
8573 send_resp(dut, conn, SIGMA_ERROR,
8574 "ErrorCode,Failed to start TDLS setup");
8575 return 0;
8576 }
8577 return 1;
8578 }
8579
8580 val = get_param(cmd, "TD_TearDown");
8581 if (val) {
8582 if (hwaddr_aton(val, addr) < 0)
8583 return -1;
8584 snprintf(buf, sizeof(buf), "TDLS_TEARDOWN %s", val);
8585 if (wpa_command(intf, buf) < 0) {
8586 send_resp(dut, conn, SIGMA_ERROR,
8587 "ErrorCode,Failed to tear down TDLS link");
8588 return 0;
8589 }
8590 return 1;
8591 }
8592
8593 val = get_param(cmd, "TD_ChannelSwitch");
8594 if (val) {
8595 /* TODO */
8596 send_resp(dut, conn, SIGMA_ERROR,
8597 "ErrorCode,TD_ChannelSwitch not yet supported");
8598 return 0;
8599 }
8600
8601 val = get_param(cmd, "TD_NF");
8602 if (val) {
8603 /* TODO */
8604 send_resp(dut, conn, SIGMA_ERROR,
8605 "ErrorCode,TD_NF not yet supported");
8606 return 0;
8607 }
8608
8609 val = get_param(cmd, "PMFFrameType");
8610 if (val == NULL)
8611 val = get_param(cmd, "FrameName");
8612 if (val == NULL)
8613 val = get_param(cmd, "Type");
8614 if (val == NULL)
8615 return -1;
8616 if (strcasecmp(val, "disassoc") == 0)
8617 frame = DISASSOC;
8618 else if (strcasecmp(val, "deauth") == 0)
8619 frame = DEAUTH;
8620 else if (strcasecmp(val, "saquery") == 0)
8621 frame = SAQUERY;
8622 else if (strcasecmp(val, "auth") == 0)
8623 frame = AUTH;
8624 else if (strcasecmp(val, "assocreq") == 0)
8625 frame = ASSOCREQ;
8626 else if (strcasecmp(val, "reassocreq") == 0)
8627 frame = REASSOCREQ;
8628 else if (strcasecmp(val, "neigreq") == 0) {
8629 sigma_dut_print(dut, DUT_MSG_INFO, "Got neighbor request");
8630
8631 val = get_param(cmd, "ssid");
8632 if (val == NULL)
8633 return -1;
8634
8635 res = send_neighbor_request(dut, intf, val);
8636 if (res) {
8637 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8638 "Failed to send neighbor report request");
8639 return 0;
8640 }
8641
8642 return 1;
Ashwini Patil5acd7382017-04-13 15:55:04 +05308643 } else if (strcasecmp(val, "transmgmtquery") == 0 ||
8644 strcasecmp(val, "BTMQuery") == 0) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008645 sigma_dut_print(dut, DUT_MSG_DEBUG,
8646 "Got Transition Management Query");
8647
Ashwini Patil5acd7382017-04-13 15:55:04 +05308648 res = send_trans_mgmt_query(dut, intf, cmd);
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008649 if (res) {
8650 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8651 "Failed to send Transition Management Query");
8652 return 0;
8653 }
8654
8655 return 1;
8656 } else {
8657 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8658 "PMFFrameType");
8659 return 0;
8660 }
8661
8662 val = get_param(cmd, "PMFProtected");
8663 if (val == NULL)
8664 val = get_param(cmd, "Protected");
8665 if (val == NULL)
8666 return -1;
8667 if (strcasecmp(val, "Correct-key") == 0 ||
8668 strcasecmp(val, "CorrectKey") == 0)
8669 protected = CORRECT_KEY;
8670 else if (strcasecmp(val, "IncorrectKey") == 0)
8671 protected = INCORRECT_KEY;
8672 else if (strcasecmp(val, "Unprotected") == 0)
8673 protected = UNPROTECTED;
8674 else {
8675 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8676 "PMFProtected");
8677 return 0;
8678 }
8679
8680 if (protected != UNPROTECTED &&
8681 (frame == AUTH || frame == ASSOCREQ || frame == REASSOCREQ)) {
8682 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Impossible "
8683 "PMFProtected for auth/assocreq/reassocreq");
8684 return 0;
8685 }
8686
8687 if (if_nametoindex("sigmadut") == 0) {
8688 snprintf(buf, sizeof(buf),
8689 "iw dev %s interface add sigmadut type monitor",
8690 get_station_ifname());
8691 if (system(buf) != 0 ||
8692 if_nametoindex("sigmadut") == 0) {
8693 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to add "
8694 "monitor interface with '%s'", buf);
8695 return -2;
8696 }
8697 }
8698
8699 if (system("ifconfig sigmadut up") != 0) {
8700 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to set "
8701 "monitor interface up");
8702 return -2;
8703 }
8704
8705 return sta_inject_frame(dut, conn, frame, protected, NULL);
8706}
8707
8708
8709static int cmd_sta_set_parameter_hs2(struct sigma_dut *dut,
8710 struct sigma_conn *conn,
8711 struct sigma_cmd *cmd,
8712 const char *ifname)
8713{
8714 char buf[200];
8715 const char *val;
8716
8717 val = get_param(cmd, "ClearARP");
8718 if (val && atoi(val) == 1) {
8719 snprintf(buf, sizeof(buf), "ip neigh flush dev %s", ifname);
8720 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8721 if (system(buf) != 0) {
8722 send_resp(dut, conn, SIGMA_ERROR,
8723 "errorCode,Failed to clear ARP cache");
8724 return 0;
8725 }
8726 }
8727
8728 return 1;
8729}
8730
8731
8732int cmd_sta_set_parameter(struct sigma_dut *dut, struct sigma_conn *conn,
8733 struct sigma_cmd *cmd)
8734{
8735 const char *intf = get_param(cmd, "Interface");
8736 const char *val;
8737
8738 if (intf == NULL)
8739 return -1;
8740
8741 val = get_param(cmd, "program");
8742 if (val && (strcasecmp(val, "HS2") == 0 ||
Jouni Malinen1f6ae642018-06-07 23:56:13 +03008743 strcasecmp(val, "HS2-R2") == 0 ||
8744 strcasecmp(val, "HS2-R3") == 0))
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008745 return cmd_sta_set_parameter_hs2(dut, conn, cmd, intf);
8746
8747 return -1;
8748}
8749
8750
8751static int cmd_sta_set_macaddr(struct sigma_dut *dut, struct sigma_conn *conn,
8752 struct sigma_cmd *cmd)
8753{
8754 const char *intf = get_param(cmd, "Interface");
8755 const char *mac = get_param(cmd, "MAC");
8756
8757 if (intf == NULL || mac == NULL)
8758 return -1;
8759
8760 sigma_dut_print(dut, DUT_MSG_INFO, "Change local MAC address for "
8761 "interface %s to %s", intf, mac);
8762
8763 if (dut->set_macaddr) {
8764 char buf[128];
8765 int res;
8766 if (strcasecmp(mac, "default") == 0) {
8767 res = snprintf(buf, sizeof(buf), "%s",
8768 dut->set_macaddr);
8769 dut->tmp_mac_addr = 0;
8770 } else {
8771 res = snprintf(buf, sizeof(buf), "%s %s",
8772 dut->set_macaddr, mac);
8773 dut->tmp_mac_addr = 1;
8774 }
8775 if (res < 0 || res >= (int) sizeof(buf))
8776 return -1;
8777 if (system(buf) != 0) {
8778 send_resp(dut, conn, SIGMA_ERROR,
8779 "errorCode,Failed to set MAC "
8780 "address");
8781 return 0;
8782 }
8783 return 1;
8784 }
8785
8786 if (strcasecmp(mac, "default") == 0)
8787 return 1;
8788
8789 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
8790 "command");
8791 return 0;
8792}
8793
8794
8795static int iwpriv_tdlsoffchnmode(struct sigma_dut *dut,
8796 struct sigma_conn *conn, const char *intf,
8797 int val)
8798{
8799 char buf[200];
8800 int res;
8801
8802 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchnmode %d",
8803 intf, val);
8804 if (res < 0 || res >= (int) sizeof(buf))
8805 return -1;
8806 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8807 if (system(buf) != 0) {
8808 send_resp(dut, conn, SIGMA_ERROR,
8809 "errorCode,Failed to configure offchannel mode");
8810 return 0;
8811 }
8812
8813 return 1;
8814}
8815
8816
Jouni Malinencd4e3c32015-10-29 12:39:56 +02008817static int off_chan_val(enum sec_ch_offset off)
8818{
8819 switch (off) {
8820 case SEC_CH_NO:
8821 return 0;
8822 case SEC_CH_40ABOVE:
8823 return 40;
8824 case SEC_CH_40BELOW:
8825 return -40;
8826 }
8827
8828 return 0;
8829}
8830
8831
8832static int iwpriv_set_offchan(struct sigma_dut *dut, struct sigma_conn *conn,
8833 const char *intf, int off_ch_num,
8834 enum sec_ch_offset sec)
8835{
8836 char buf[200];
8837 int res;
8838
8839 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsoffchan %d",
8840 intf, off_ch_num);
8841 if (res < 0 || res >= (int) sizeof(buf))
8842 return -1;
8843 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8844 if (system(buf) != 0) {
8845 send_resp(dut, conn, SIGMA_ERROR,
8846 "errorCode,Failed to set offchan");
8847 return 0;
8848 }
8849
8850 res = snprintf(buf, sizeof(buf), "iwpriv %s tdlsecchnoffst %d",
8851 intf, off_chan_val(sec));
8852 if (res < 0 || res >= (int) sizeof(buf))
8853 return -1;
8854 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8855 if (system(buf) != 0) {
8856 send_resp(dut, conn, SIGMA_ERROR,
8857 "errorCode,Failed to set sec chan offset");
8858 return 0;
8859 }
8860
8861 return 1;
8862}
8863
8864
8865static int tdls_set_offchannel_offset(struct sigma_dut *dut,
8866 struct sigma_conn *conn,
8867 const char *intf, int off_ch_num,
8868 enum sec_ch_offset sec)
8869{
8870 char buf[200];
8871 int res;
8872
8873 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNEL %d",
8874 off_ch_num);
8875 if (res < 0 || res >= (int) sizeof(buf))
8876 return -1;
8877 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8878
8879 if (wpa_command(intf, buf) < 0) {
8880 send_resp(dut, conn, SIGMA_ERROR,
8881 "ErrorCode,Failed to set offchan");
8882 return 0;
8883 }
8884 res = snprintf(buf, sizeof(buf), "DRIVER TDLSSECONDARYCHANNELOFFSET %d",
8885 off_chan_val(sec));
8886 if (res < 0 || res >= (int) sizeof(buf))
8887 return -1;
8888
8889 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8890
8891 if (wpa_command(intf, buf) < 0) {
8892 send_resp(dut, conn, SIGMA_ERROR,
8893 "ErrorCode,Failed to set sec chan offset");
8894 return 0;
8895 }
8896
8897 return 1;
8898}
8899
8900
8901static int tdls_set_offchannel_mode(struct sigma_dut *dut,
8902 struct sigma_conn *conn,
8903 const char *intf, int val)
8904{
8905 char buf[200];
8906 int res;
8907
8908 res = snprintf(buf, sizeof(buf), "DRIVER TDLSOFFCHANNELMODE %d",
8909 val);
8910 if (res < 0 || res >= (int) sizeof(buf))
8911 return -1;
8912 sigma_dut_print(dut, DUT_MSG_DEBUG, "Run: %s", buf);
8913
8914 if (wpa_command(intf, buf) < 0) {
8915 send_resp(dut, conn, SIGMA_ERROR,
8916 "ErrorCode,Failed to configure offchannel mode");
8917 return 0;
8918 }
8919
8920 return 1;
8921}
8922
8923
8924static int cmd_sta_set_rfeature_tdls(const char *intf, struct sigma_dut *dut,
8925 struct sigma_conn *conn,
8926 struct sigma_cmd *cmd)
8927{
8928 const char *val;
8929 enum {
8930 CHSM_NOT_SET,
8931 CHSM_ENABLE,
8932 CHSM_DISABLE,
8933 CHSM_REJREQ,
8934 CHSM_UNSOLRESP
8935 } chsm = CHSM_NOT_SET;
8936 int off_ch_num = -1;
8937 enum sec_ch_offset sec_ch = SEC_CH_NO;
8938 int res;
8939
8940 val = get_param(cmd, "Uapsd");
8941 if (val) {
8942 char buf[100];
8943 if (strcasecmp(val, "Enable") == 0)
8944 snprintf(buf, sizeof(buf), "SET ps 99");
8945 else if (strcasecmp(val, "Disable") == 0)
8946 snprintf(buf, sizeof(buf), "SET ps 98");
8947 else {
8948 send_resp(dut, conn, SIGMA_ERROR, "errorCode,"
8949 "Unsupported uapsd parameter value");
8950 return 0;
8951 }
8952 if (wpa_command(intf, buf)) {
8953 send_resp(dut, conn, SIGMA_ERROR,
8954 "ErrorCode,Failed to change U-APSD "
8955 "powersave mode");
8956 return 0;
8957 }
8958 }
8959
8960 val = get_param(cmd, "TPKTIMER");
8961 if (val && strcasecmp(val, "DISABLE") == 0) {
8962 if (wpa_command(intf, "SET tdls_testing 0x100")) {
8963 send_resp(dut, conn, SIGMA_ERROR,
8964 "ErrorCode,Failed to enable no TPK "
8965 "expiration test mode");
8966 return 0;
8967 }
8968 dut->no_tpk_expiration = 1;
8969 }
8970
8971 val = get_param(cmd, "ChSwitchMode");
8972 if (val) {
8973 if (strcasecmp(val, "Enable") == 0 ||
8974 strcasecmp(val, "Initiate") == 0)
8975 chsm = CHSM_ENABLE;
8976 else if (strcasecmp(val, "Disable") == 0 ||
8977 strcasecmp(val, "passive") == 0)
8978 chsm = CHSM_DISABLE;
8979 else if (strcasecmp(val, "RejReq") == 0)
8980 chsm = CHSM_REJREQ;
8981 else if (strcasecmp(val, "UnSolResp") == 0)
8982 chsm = CHSM_UNSOLRESP;
8983 else {
8984 send_resp(dut, conn, SIGMA_ERROR,
8985 "ErrorCode,Unknown ChSwitchMode value");
8986 return 0;
8987 }
8988 }
8989
8990 val = get_param(cmd, "OffChNum");
8991 if (val) {
8992 off_ch_num = atoi(val);
8993 if (off_ch_num == 0) {
8994 send_resp(dut, conn, SIGMA_ERROR,
8995 "ErrorCode,Invalid OffChNum");
8996 return 0;
8997 }
8998 }
8999
9000 val = get_param(cmd, "SecChOffset");
9001 if (val) {
9002 if (strcmp(val, "20") == 0)
9003 sec_ch = SEC_CH_NO;
9004 else if (strcasecmp(val, "40above") == 0)
9005 sec_ch = SEC_CH_40ABOVE;
9006 else if (strcasecmp(val, "40below") == 0)
9007 sec_ch = SEC_CH_40BELOW;
9008 else {
9009 send_resp(dut, conn, SIGMA_ERROR,
9010 "ErrorCode,Unknown SecChOffset value");
9011 return 0;
9012 }
9013 }
9014
9015 if (chsm == CHSM_NOT_SET) {
9016 /* no offchannel changes requested */
9017 return 1;
9018 }
9019
9020 if (strcmp(intf, get_main_ifname()) != 0 &&
9021 strcmp(intf, get_station_ifname()) != 0) {
9022 send_resp(dut, conn, SIGMA_ERROR,
9023 "ErrorCode,Unknown interface");
9024 return 0;
9025 }
9026
9027 switch (chsm) {
9028 case CHSM_NOT_SET:
Jouni Malinen280f5ba2016-08-29 21:33:10 +03009029 res = 1;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009030 break;
9031 case CHSM_ENABLE:
9032 if (off_ch_num < 0) {
9033 send_resp(dut, conn, SIGMA_ERROR,
9034 "ErrorCode,Missing OffChNum argument");
9035 return 0;
9036 }
9037 if (wifi_chip_type == DRIVER_WCN) {
9038 res = tdls_set_offchannel_offset(dut, conn, intf,
9039 off_ch_num, sec_ch);
9040 } else {
9041 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9042 sec_ch);
9043 }
9044 if (res != 1)
9045 return res;
9046 if (wifi_chip_type == DRIVER_WCN)
9047 res = tdls_set_offchannel_mode(dut, conn, intf, 1);
9048 else
9049 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 1);
9050 break;
9051 case CHSM_DISABLE:
9052 if (wifi_chip_type == DRIVER_WCN)
9053 res = tdls_set_offchannel_mode(dut, conn, intf, 2);
9054 else
9055 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 2);
9056 break;
9057 case CHSM_REJREQ:
9058 if (wifi_chip_type == DRIVER_WCN)
9059 res = tdls_set_offchannel_mode(dut, conn, intf, 3);
9060 else
9061 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 3);
9062 break;
9063 case CHSM_UNSOLRESP:
9064 if (off_ch_num < 0) {
9065 send_resp(dut, conn, SIGMA_ERROR,
9066 "ErrorCode,Missing OffChNum argument");
9067 return 0;
9068 }
9069 if (wifi_chip_type == DRIVER_WCN) {
9070 res = tdls_set_offchannel_offset(dut, conn, intf,
9071 off_ch_num, sec_ch);
9072 } else {
9073 res = iwpriv_set_offchan(dut, conn, intf, off_ch_num,
9074 sec_ch);
9075 }
9076 if (res != 1)
9077 return res;
9078 if (wifi_chip_type == DRIVER_WCN)
9079 res = tdls_set_offchannel_mode(dut, conn, intf, 4);
9080 else
9081 res = iwpriv_tdlsoffchnmode(dut, conn, intf, 4);
9082 break;
9083 }
9084
9085 return res;
9086}
9087
9088
9089static int ath_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9090 struct sigma_conn *conn,
9091 struct sigma_cmd *cmd)
9092{
9093 const char *val;
9094 char *token, *result;
9095
priyadharshini gowthamane5e25172015-12-08 14:53:48 -08009096 novap_reset(dut, intf);
9097
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009098 val = get_param(cmd, "nss_mcs_opt");
9099 if (val) {
9100 /* String (nss_operating_mode; mcs_operating_mode) */
9101 int nss, mcs;
9102 char buf[50];
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309103 char *saveptr;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009104
9105 token = strdup(val);
9106 if (!token)
9107 return 0;
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309108 result = strtok_r(token, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309109 if (!result) {
9110 sigma_dut_print(dut, DUT_MSG_ERROR,
9111 "VHT NSS not specified");
9112 goto failed;
9113 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009114 if (strcasecmp(result, "def") != 0) {
9115 nss = atoi(result);
9116 if (nss == 4)
9117 ath_disable_txbf(dut, intf);
9118 snprintf(buf, sizeof(buf), "iwpriv %s nss %d",
9119 intf, nss);
9120 if (system(buf) != 0) {
9121 sigma_dut_print(dut, DUT_MSG_ERROR,
9122 "iwpriv nss failed");
9123 goto failed;
9124 }
9125 }
9126
Pradeep Reddy POTTETIdbf7d712016-04-28 18:42:07 +05309127 result = strtok_r(NULL, ";", &saveptr);
Pradeep Reddy POTTETI41b8c542016-06-15 16:09:46 +05309128 if (!result) {
9129 sigma_dut_print(dut, DUT_MSG_ERROR,
9130 "VHT MCS not specified");
9131 goto failed;
9132 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009133 if (strcasecmp(result, "def") == 0) {
9134 snprintf(buf, sizeof(buf), "iwpriv %s set11NRates 0",
9135 intf);
9136 if (system(buf) != 0) {
9137 sigma_dut_print(dut, DUT_MSG_ERROR,
9138 "iwpriv set11NRates failed");
9139 goto failed;
9140 }
9141
9142 } else {
9143 mcs = atoi(result);
9144 snprintf(buf, sizeof(buf), "iwpriv %s vhtmcs %d",
9145 intf, mcs);
9146 if (system(buf) != 0) {
9147 sigma_dut_print(dut, DUT_MSG_ERROR,
9148 "iwpriv vhtmcs failed");
9149 goto failed;
9150 }
9151 }
9152 /* Channel width gets messed up, fix this */
9153 snprintf(buf, sizeof(buf), "iwpriv %s chwidth %d",
9154 intf, dut->chwidth);
9155 if (system(buf) != 0) {
9156 sigma_dut_print(dut, DUT_MSG_ERROR,
9157 "iwpriv chwidth failed");
9158 }
9159 }
9160
9161 return 1;
9162failed:
9163 free(token);
9164 return 0;
9165}
9166
9167
9168static int cmd_sta_set_rfeature_vht(const char *intf, struct sigma_dut *dut,
9169 struct sigma_conn *conn,
9170 struct sigma_cmd *cmd)
9171{
9172 switch (get_driver_type()) {
9173 case DRIVER_ATHEROS:
9174 return ath_sta_set_rfeature_vht(intf, dut, conn, cmd);
9175 default:
9176 send_resp(dut, conn, SIGMA_ERROR,
9177 "errorCode,Unsupported sta_set_rfeature(VHT) with the current driver");
9178 return 0;
9179 }
9180}
9181
9182
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009183static int wcn_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9184 struct sigma_conn *conn,
9185 struct sigma_cmd *cmd)
9186{
9187 const char *val;
9188 char *token = NULL, *result;
9189 char buf[60];
9190
9191 val = get_param(cmd, "nss_mcs_opt");
9192 if (val) {
9193 /* String (nss_operating_mode; mcs_operating_mode) */
9194 int nss, mcs, ratecode;
9195 char *saveptr;
9196
9197 token = strdup(val);
9198 if (!token)
9199 return -2;
9200
9201 result = strtok_r(token, ";", &saveptr);
9202 if (!result) {
9203 sigma_dut_print(dut, DUT_MSG_ERROR,
9204 "HE NSS not specified");
9205 goto failed;
9206 }
9207 nss = 1;
9208 if (strcasecmp(result, "def") != 0)
9209 nss = atoi(result);
9210
9211 result = strtok_r(NULL, ";", &saveptr);
9212 if (!result) {
9213 sigma_dut_print(dut, DUT_MSG_ERROR,
9214 "HE MCS not specified");
9215 goto failed;
9216 }
9217 mcs = 7;
9218 if (strcasecmp(result, "def") != 0)
9219 mcs = atoi(result);
9220
Arif Hussain557bf412018-05-25 17:29:36 -07009221 ratecode = 0x20; /* for nss:1 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009222 if (nss == 2) {
Arif Hussain557bf412018-05-25 17:29:36 -07009223 ratecode = 0x40; /* for nss:2 MCS 0 */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009224 } else if (nss > 2) {
9225 sigma_dut_print(dut, DUT_MSG_ERROR,
9226 "HE NSS %d not supported", nss);
9227 goto failed;
9228 }
9229
Arif Hussain557bf412018-05-25 17:29:36 -07009230 snprintf(buf, sizeof(buf), "iwpriv %s nss %d", intf, nss);
9231 if (system(buf) != 0) {
9232 sigma_dut_print(dut, DUT_MSG_ERROR,
9233 "nss_mcs_opt: iwpriv %s nss %d failed",
9234 intf, nss);
9235 goto failed;
9236 }
Arif Hussainac6c5112018-05-25 17:34:00 -07009237 dut->sta_nss = nss;
Arif Hussain557bf412018-05-25 17:29:36 -07009238
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009239 /* Add the MCS to the ratecode */
9240 if (mcs >= 0 && mcs <= 11) {
9241 ratecode += mcs;
Arif Hussain557bf412018-05-25 17:29:36 -07009242#ifdef NL80211_SUPPORT
9243 if (dut->device_type == STA_testbed) {
9244 enum he_mcs_config mcs_config;
9245 int ret;
9246
9247 if (mcs <= 7)
9248 mcs_config = HE_80_MCS0_7;
9249 else if (mcs <= 9)
9250 mcs_config = HE_80_MCS0_9;
9251 else
9252 mcs_config = HE_80_MCS0_11;
9253 ret = sta_set_he_mcs(dut, intf, mcs_config);
9254 if (ret) {
9255 sigma_dut_print(dut, DUT_MSG_ERROR,
9256 "nss_mcs_opt: mcs setting failed, mcs:%d, mcs_config %d, ret:%d",
9257 mcs, mcs_config, ret);
9258 goto failed;
9259 }
9260 }
9261#endif /* NL80211_SUPPORT */
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009262 } else {
9263 sigma_dut_print(dut, DUT_MSG_ERROR,
9264 "HE MCS %d not supported", mcs);
9265 goto failed;
9266 }
9267 snprintf(buf, sizeof(buf), "iwpriv %s set_11ax_rate 0x%03x",
9268 intf, ratecode);
9269 if (system(buf) != 0) {
9270 sigma_dut_print(dut, DUT_MSG_ERROR,
9271 "iwpriv setting of 11ax rates failed");
9272 goto failed;
9273 }
9274 free(token);
9275 }
9276
9277 val = get_param(cmd, "GI");
9278 if (val) {
9279 if (strcmp(val, "0.8") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009280 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 9", intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009281 } else if (strcmp(val, "1.6") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009282 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 10",
9283 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009284 } else if (strcmp(val, "3.2") == 0) {
Kiran Kumar Lokereb8fec522018-05-01 14:26:00 -07009285 snprintf(buf, sizeof(buf), "iwpriv %s shortgi 11",
9286 intf);
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009287 } else {
9288 send_resp(dut, conn, SIGMA_ERROR,
9289 "errorCode,GI value not supported");
9290 return 0;
9291 }
9292 if (system(buf) != 0) {
9293 send_resp(dut, conn, SIGMA_ERROR,
9294 "errorCode,Failed to set shortgi");
9295 return 0;
9296 }
9297 }
9298
Subhani Shaik8e7a3052018-04-24 14:03:00 -07009299 val = get_param(cmd, "LTF");
9300 if (val) {
9301#ifdef NL80211_SUPPORT
9302 if (strcmp(val, "3.2") == 0) {
9303 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_1X);
9304 } if (strcmp(val, "6.4") == 0) {
9305 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_2X);
9306 } else if (strcmp(val, "12.8") == 0) {
9307 sta_set_he_ltf(dut, intf, QCA_WLAN_HE_LTF_4X);
9308 } else {
9309 send_resp(dut, conn, SIGMA_ERROR,
9310 "errorCode, LTF value not supported");
9311 return 0;
9312 }
9313#else /* NL80211_SUPPORT */
9314 sigma_dut_print(dut, DUT_MSG_ERROR,
9315 "LTF cannot be set without NL80211_SUPPORT defined");
9316 return -2;
9317#endif /* NL80211_SUPPORT */
9318 }
9319
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009320 return 1;
9321
9322failed:
9323 free(token);
9324 return -2;
9325}
9326
9327
9328static int cmd_sta_set_rfeature_he(const char *intf, struct sigma_dut *dut,
9329 struct sigma_conn *conn,
9330 struct sigma_cmd *cmd)
9331{
9332 switch (get_driver_type()) {
9333 case DRIVER_WCN:
9334 return wcn_sta_set_rfeature_he(intf, dut, conn, cmd);
9335 default:
9336 send_resp(dut, conn, SIGMA_ERROR,
9337 "errorCode,Unsupported sta_set_rfeature(HE) with the current driver");
9338 return 0;
9339 }
9340}
9341
9342
Ashwini Patil5acd7382017-04-13 15:55:04 +05309343static int btm_query_candidate_list(struct sigma_dut *dut,
9344 struct sigma_conn *conn,
9345 struct sigma_cmd *cmd)
9346{
9347 const char *bssid, *info, *op_class, *ch, *phy_type, *pref;
9348 int len, ret;
9349 char buf[10];
9350
9351 /*
9352 * Neighbor Report elements format:
9353 * neighbor=<BSSID>,<BSSID Information>,<Operating Class>,
9354 * <Channel Number>,<PHY Type>[,<hexdump of Optional Subelements>]
9355 * eg: neighbor=aa:bb:cc:dd:ee:ff,17,81,6,1,030101
9356 */
9357
9358 bssid = get_param(cmd, "Nebor_BSSID");
9359 if (!bssid) {
9360 send_resp(dut, conn, SIGMA_INVALID,
9361 "errorCode,Nebor_BSSID is missing");
9362 return 0;
9363 }
9364
9365 info = get_param(cmd, "Nebor_Bssid_Info");
9366 if (!info) {
9367 sigma_dut_print(dut, DUT_MSG_INFO,
9368 "Using default value for Nebor_Bssid_Info: %s",
9369 DEFAULT_NEIGHBOR_BSSID_INFO);
9370 info = DEFAULT_NEIGHBOR_BSSID_INFO;
9371 }
9372
9373 op_class = get_param(cmd, "Nebor_Op_Class");
9374 if (!op_class) {
9375 send_resp(dut, conn, SIGMA_INVALID,
9376 "errorCode,Nebor_Op_Class is missing");
9377 return 0;
9378 }
9379
9380 ch = get_param(cmd, "Nebor_Op_Ch");
9381 if (!ch) {
9382 send_resp(dut, conn, SIGMA_INVALID,
9383 "errorCode,Nebor_Op_Ch is missing");
9384 return 0;
9385 }
9386
9387 phy_type = get_param(cmd, "Nebor_Phy_Type");
9388 if (!phy_type) {
9389 sigma_dut_print(dut, DUT_MSG_INFO,
9390 "Using default value for Nebor_Phy_Type: %s",
9391 DEFAULT_NEIGHBOR_PHY_TYPE);
9392 phy_type = DEFAULT_NEIGHBOR_PHY_TYPE;
9393 }
9394
9395 /* Parse optional subelements */
9396 buf[0] = '\0';
9397 pref = get_param(cmd, "Nebor_Pref");
9398 if (pref) {
9399 /* hexdump for preferrence subelement */
9400 ret = snprintf(buf, sizeof(buf), ",0301%02x", atoi(pref));
9401 if (ret < 0 || ret >= (int) sizeof(buf)) {
9402 sigma_dut_print(dut, DUT_MSG_ERROR,
9403 "snprintf failed for optional subelement ret: %d",
9404 ret);
9405 send_resp(dut, conn, SIGMA_ERROR,
9406 "errorCode,snprintf failed for subelement");
9407 return 0;
9408 }
9409 }
9410
9411 if (!dut->btm_query_cand_list) {
9412 dut->btm_query_cand_list = calloc(1, NEIGHBOR_REPORT_SIZE);
9413 if (!dut->btm_query_cand_list) {
9414 send_resp(dut, conn, SIGMA_ERROR,
9415 "errorCode,Failed to allocate memory for btm_query_cand_list");
9416 return 0;
9417 }
9418 }
9419
9420 len = strlen(dut->btm_query_cand_list);
9421 ret = snprintf(dut->btm_query_cand_list + len,
9422 NEIGHBOR_REPORT_SIZE - len, " neighbor=%s,%s,%s,%s,%s%s",
9423 bssid, info, op_class, ch, phy_type, buf);
9424 if (ret < 0 || ret >= NEIGHBOR_REPORT_SIZE - len) {
9425 sigma_dut_print(dut, DUT_MSG_ERROR,
9426 "snprintf failed for neighbor report list ret: %d",
9427 ret);
9428 send_resp(dut, conn, SIGMA_ERROR,
9429 "errorCode,snprintf failed for neighbor report");
9430 free(dut->btm_query_cand_list);
9431 dut->btm_query_cand_list = NULL;
9432 return 0;
9433 }
9434
9435 return 1;
9436}
9437
9438
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009439static int cmd_sta_set_rfeature(struct sigma_dut *dut, struct sigma_conn *conn,
9440 struct sigma_cmd *cmd)
9441{
9442 const char *intf = get_param(cmd, "Interface");
9443 const char *prog = get_param(cmd, "Prog");
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309444 const char *val;
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009445
9446 if (intf == NULL || prog == NULL)
9447 return -1;
9448
Ashwini Patil5acd7382017-04-13 15:55:04 +05309449 /* BSS Transition candidate list for BTM query */
9450 val = get_param(cmd, "Nebor_BSSID");
9451 if (val && btm_query_candidate_list(dut, conn, cmd) == 0)
9452 return 0;
9453
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009454 if (strcasecmp(prog, "TDLS") == 0)
9455 return cmd_sta_set_rfeature_tdls(intf, dut, conn, cmd);
9456
9457 if (strcasecmp(prog, "VHT") == 0)
9458 return cmd_sta_set_rfeature_vht(intf, dut, conn, cmd);
9459
Amarnath Hullur Subramanyam42c25a02018-01-31 04:02:27 -08009460 if (strcasecmp(prog, "HE") == 0)
9461 return cmd_sta_set_rfeature_he(intf, dut, conn, cmd);
9462
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309463 if (strcasecmp(prog, "MBO") == 0) {
9464 val = get_param(cmd, "Cellular_Data_Cap");
9465 if (val &&
9466 mbo_set_cellular_data_capa(dut, conn, intf, atoi(val)) == 0)
9467 return 0;
Ashwini Patil00402582017-04-13 12:29:39 +05309468
9469 val = get_param(cmd, "Ch_Pref");
9470 if (val && mbo_set_non_pref_ch_list(dut, conn, intf, cmd) == 0)
9471 return 0;
9472
Ashwini Patil68d02cd2017-01-10 15:39:16 +05309473 return 1;
9474 }
9475
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009476 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported Prog");
9477 return 0;
9478}
9479
9480
9481static int cmd_sta_set_radio(struct sigma_dut *dut, struct sigma_conn *conn,
9482 struct sigma_cmd *cmd)
9483{
9484 const char *intf = get_param(cmd, "Interface");
9485 const char *mode = get_param(cmd, "Mode");
9486 int res;
9487
9488 if (intf == NULL || mode == NULL)
9489 return -1;
9490
9491 if (strcasecmp(mode, "On") == 0)
9492 res = wpa_command(intf, "SET radio_disabled 0");
9493 else if (strcasecmp(mode, "Off") == 0)
9494 res = wpa_command(intf, "SET radio_disabled 1");
9495 else
9496 return -1;
9497
9498 if (res) {
9499 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9500 "radio mode");
9501 return 0;
9502 }
9503
9504 return 1;
9505}
9506
9507
9508static int cmd_sta_set_pwrsave(struct sigma_dut *dut, struct sigma_conn *conn,
9509 struct sigma_cmd *cmd)
9510{
9511 const char *intf = get_param(cmd, "Interface");
9512 const char *mode = get_param(cmd, "Mode");
9513 int res;
9514
9515 if (intf == NULL || mode == NULL)
9516 return -1;
9517
9518 if (strcasecmp(mode, "On") == 0)
9519 res = set_ps(intf, dut, 1);
9520 else if (strcasecmp(mode, "Off") == 0)
9521 res = set_ps(intf, dut, 0);
9522 else
9523 return -1;
9524
9525 if (res) {
9526 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to change "
9527 "power save mode");
9528 return 0;
9529 }
9530
9531 return 1;
9532}
9533
9534
9535static int cmd_sta_bssid_pool(struct sigma_dut *dut, struct sigma_conn *conn,
9536 struct sigma_cmd *cmd)
9537{
9538 const char *intf = get_param(cmd, "Interface");
9539 const char *val, *bssid;
9540 int res;
9541 char *buf;
9542 size_t buf_len;
9543
9544 val = get_param(cmd, "BSSID_FILTER");
9545 if (val == NULL)
9546 return -1;
9547
9548 bssid = get_param(cmd, "BSSID_List");
9549 if (atoi(val) == 0 || bssid == NULL) {
9550 /* Disable BSSID filter */
9551 if (wpa_command(intf, "SET bssid_filter ")) {
9552 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed "
9553 "to disable BSSID filter");
9554 return 0;
9555 }
9556
9557 return 1;
9558 }
9559
9560 buf_len = 100 + strlen(bssid);
9561 buf = malloc(buf_len);
9562 if (buf == NULL)
9563 return -1;
9564
9565 snprintf(buf, buf_len, "SET bssid_filter %s", bssid);
9566 res = wpa_command(intf, buf);
9567 free(buf);
9568 if (res) {
9569 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to enable "
9570 "BSSID filter");
9571 return 0;
9572 }
9573
9574 return 1;
9575}
9576
9577
9578static int cmd_sta_reset_parm(struct sigma_dut *dut, struct sigma_conn *conn,
9579 struct sigma_cmd *cmd)
9580{
9581 const char *intf = get_param(cmd, "Interface");
9582 const char *val;
9583
9584 /* TODO: ARP */
9585
9586 val = get_param(cmd, "HS2_CACHE_PROFILE");
9587 if (val && strcasecmp(val, "All") == 0)
9588 hs2_clear_credentials(intf);
9589
9590 return 1;
9591}
9592
9593
9594static int cmd_sta_get_key(struct sigma_dut *dut, struct sigma_conn *conn,
9595 struct sigma_cmd *cmd)
9596{
9597 const char *intf = get_param(cmd, "Interface");
9598 const char *key_type = get_param(cmd, "KeyType");
9599 char buf[100], resp[200];
9600
9601 if (key_type == NULL)
9602 return -1;
9603
9604 if (strcasecmp(key_type, "GTK") == 0) {
9605 if (wpa_command_resp(intf, "GET gtk", buf, sizeof(buf)) < 0 ||
9606 strncmp(buf, "FAIL", 4) == 0) {
9607 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9608 "not fetch current GTK");
9609 return 0;
9610 }
9611 snprintf(resp, sizeof(resp), "KeyValue,%s", buf);
9612 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9613 return 0;
9614 } else {
9615 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Unsupported "
9616 "KeyType");
9617 return 0;
9618 }
9619
9620 return 1;
9621}
9622
9623
9624static int hs2_set_policy(struct sigma_dut *dut)
9625{
9626#ifdef ANDROID
9627 system("ip rule del prio 23000");
9628 if (system("ip rule add from all lookup main prio 23000") != 0) {
9629 sigma_dut_print(dut, DUT_MSG_ERROR,
9630 "Failed to run:ip rule add from all lookup main prio");
9631 return -1;
9632 }
9633 if (system("ip route flush cache") != 0) {
9634 sigma_dut_print(dut, DUT_MSG_ERROR,
9635 "Failed to run ip route flush cache");
9636 return -1;
9637 }
9638 return 1;
9639#else /* ANDROID */
9640 return 0;
9641#endif /* ANDROID */
9642}
9643
9644
9645static int cmd_sta_hs2_associate(struct sigma_dut *dut,
9646 struct sigma_conn *conn,
9647 struct sigma_cmd *cmd)
9648{
9649 const char *intf = get_param(cmd, "Interface");
9650 const char *val = get_param(cmd, "Ignore_blacklist");
9651 struct wpa_ctrl *ctrl;
9652 int res;
9653 char bssid[20], ssid[40], resp[100], buf[100], blacklisted[100];
9654 int tries = 0;
9655 int ignore_blacklist = 0;
9656 const char *events[] = {
9657 "CTRL-EVENT-CONNECTED",
9658 "INTERWORKING-BLACKLISTED",
9659 "INTERWORKING-NO-MATCH",
9660 NULL
9661 };
9662
9663 start_sta_mode(dut);
9664
9665 blacklisted[0] = '\0';
9666 if (val && atoi(val))
9667 ignore_blacklist = 1;
9668
9669try_again:
9670 ctrl = open_wpa_mon(intf);
9671 if (ctrl == NULL) {
9672 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
9673 "wpa_supplicant monitor connection");
9674 return -2;
9675 }
9676
9677 tries++;
9678 if (wpa_command(intf, "INTERWORKING_SELECT auto")) {
9679 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start "
9680 "Interworking connection");
9681 wpa_ctrl_detach(ctrl);
9682 wpa_ctrl_close(ctrl);
9683 return 0;
9684 }
9685
9686 buf[0] = '\0';
9687 while (1) {
9688 char *pos;
9689 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
9690 pos = strstr(buf, "INTERWORKING-BLACKLISTED");
9691 if (!pos)
9692 break;
9693 pos += 25;
9694 sigma_dut_print(dut, DUT_MSG_DEBUG, "Found blacklisted AP: %s",
9695 pos);
9696 if (!blacklisted[0])
9697 memcpy(blacklisted, pos, strlen(pos) + 1);
9698 }
9699
9700 if (ignore_blacklist && blacklisted[0]) {
9701 char *end;
9702 end = strchr(blacklisted, ' ');
9703 if (end)
9704 *end = '\0';
9705 sigma_dut_print(dut, DUT_MSG_DEBUG, "Try to connect to a blacklisted network: %s",
9706 blacklisted);
9707 snprintf(buf, sizeof(buf), "INTERWORKING_CONNECT %s",
9708 blacklisted);
9709 if (wpa_command(intf, buf)) {
9710 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Failed to start Interworking connection to blacklisted network");
9711 wpa_ctrl_detach(ctrl);
9712 wpa_ctrl_close(ctrl);
9713 return 0;
9714 }
9715 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
9716 buf, sizeof(buf));
9717 }
9718
9719 wpa_ctrl_detach(ctrl);
9720 wpa_ctrl_close(ctrl);
9721
9722 if (res < 0) {
9723 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9724 "connect");
9725 return 0;
9726 }
9727
9728 if (strstr(buf, "INTERWORKING-NO-MATCH") ||
9729 strstr(buf, "INTERWORKING-BLACKLISTED")) {
9730 if (tries < 2) {
9731 sigma_dut_print(dut, DUT_MSG_INFO, "No match found - try again to verify no APs were missed in the scan");
9732 goto try_again;
9733 }
9734 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,No network with "
9735 "matching credentials found");
9736 return 0;
9737 }
9738
9739 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
9740 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
9741 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Could not "
9742 "get current BSSID/SSID");
9743 return 0;
9744 }
9745
9746 snprintf(resp, sizeof(resp), "SSID,%s,BSSID,%s", ssid, bssid);
9747 send_resp(dut, conn, SIGMA_COMPLETE, resp);
9748 hs2_set_policy(dut);
9749 return 0;
9750}
9751
9752
9753static int sta_add_credential_uname_pwd(struct sigma_dut *dut,
9754 struct sigma_conn *conn,
9755 const char *ifname,
9756 struct sigma_cmd *cmd)
9757{
9758 const char *val;
9759 int id;
9760
9761 id = add_cred(ifname);
9762 if (id < 0)
9763 return -2;
9764 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9765
9766 val = get_param(cmd, "prefer");
9767 if (val && atoi(val) > 0)
9768 set_cred(ifname, id, "priority", "1");
9769
9770 val = get_param(cmd, "REALM");
9771 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
9772 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9773 "realm");
9774 return 0;
9775 }
9776
9777 val = get_param(cmd, "HOME_FQDN");
9778 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
9779 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9780 "home_fqdn");
9781 return 0;
9782 }
9783
9784 val = get_param(cmd, "Username");
9785 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
9786 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9787 "username");
9788 return 0;
9789 }
9790
9791 val = get_param(cmd, "Password");
9792 if (val && set_cred_quoted(ifname, id, "password", val) < 0) {
9793 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9794 "password");
9795 return 0;
9796 }
9797
9798 val = get_param(cmd, "ROOT_CA");
9799 if (val) {
9800 char fname[200];
9801 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
9802#ifdef __linux__
9803 if (!file_exists(fname)) {
9804 char msg[300];
9805 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
9806 "file (%s) not found", fname);
9807 send_resp(dut, conn, SIGMA_ERROR, msg);
9808 return 0;
9809 }
9810#endif /* __linux__ */
9811 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
9812 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9813 "not set root CA");
9814 return 0;
9815 }
9816 }
9817
9818 return 1;
9819}
9820
9821
9822static int update_devdetail_imsi(struct sigma_dut *dut, const char *imsi)
9823{
9824 FILE *in, *out;
9825 char buf[500];
9826 int found = 0;
9827
9828 in = fopen("devdetail.xml", "r");
9829 if (in == NULL)
9830 return -1;
9831 out = fopen("devdetail.xml.tmp", "w");
9832 if (out == NULL) {
9833 fclose(in);
9834 return -1;
9835 }
9836
9837 while (fgets(buf, sizeof(buf), in)) {
9838 char *pos = strstr(buf, "<IMSI>");
9839 if (pos) {
9840 sigma_dut_print(dut, DUT_MSG_INFO, "Updated DevDetail IMSI to %s",
9841 imsi);
9842 pos += 6;
9843 *pos = '\0';
9844 fprintf(out, "%s%s</IMSI>\n", buf, imsi);
9845 found++;
9846 } else {
9847 fprintf(out, "%s", buf);
9848 }
9849 }
9850
9851 fclose(out);
9852 fclose(in);
9853 if (found)
9854 rename("devdetail.xml.tmp", "devdetail.xml");
9855 else
9856 unlink("devdetail.xml.tmp");
9857
9858 return 0;
9859}
9860
9861
9862static int sta_add_credential_sim(struct sigma_dut *dut,
9863 struct sigma_conn *conn,
9864 const char *ifname, struct sigma_cmd *cmd)
9865{
9866 const char *val, *imsi = NULL;
9867 int id;
9868 char buf[200];
9869 int res;
9870 const char *pos;
9871 size_t mnc_len;
9872 char plmn_mcc[4];
9873 char plmn_mnc[4];
9874
9875 id = add_cred(ifname);
9876 if (id < 0)
9877 return -2;
9878 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9879
9880 val = get_param(cmd, "prefer");
9881 if (val && atoi(val) > 0)
9882 set_cred(ifname, id, "priority", "1");
9883
9884 val = get_param(cmd, "PLMN_MCC");
9885 if (val == NULL) {
9886 send_resp(dut, conn, SIGMA_ERROR,
9887 "errorCode,Missing PLMN_MCC");
9888 return 0;
9889 }
9890 if (strlen(val) != 3) {
9891 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MCC");
9892 return 0;
9893 }
9894 snprintf(plmn_mcc, sizeof(plmn_mcc), "%s", val);
9895
9896 val = get_param(cmd, "PLMN_MNC");
9897 if (val == NULL) {
9898 send_resp(dut, conn, SIGMA_ERROR,
9899 "errorCode,Missing PLMN_MNC");
9900 return 0;
9901 }
9902 if (strlen(val) != 2 && strlen(val) != 3) {
9903 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Invalid MNC");
9904 return 0;
9905 }
9906 snprintf(plmn_mnc, sizeof(plmn_mnc), "%s", val);
9907
9908 val = get_param(cmd, "IMSI");
9909 if (val == NULL) {
9910 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Missing SIM "
9911 "IMSI");
9912 return 0;
9913 }
9914
9915 imsi = pos = val;
9916
9917 if (strncmp(plmn_mcc, pos, 3) != 0) {
9918 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MCC mismatch");
9919 return 0;
9920 }
9921 pos += 3;
9922
9923 mnc_len = strlen(plmn_mnc);
9924 if (mnc_len < 2) {
9925 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC not set");
9926 return 0;
9927 }
9928
9929 if (strncmp(plmn_mnc, pos, mnc_len) != 0) {
9930 send_resp(dut, conn, SIGMA_ERROR, "errorCode,MNC mismatch");
9931 return 0;
9932 }
9933 pos += mnc_len;
9934
9935 res = snprintf(buf, sizeof(buf), "%s%s-%s",plmn_mcc, plmn_mnc, pos);
9936 if (res < 0 || res >= (int) sizeof(buf))
9937 return -1;
9938 if (set_cred_quoted(ifname, id, "imsi", buf) < 0) {
9939 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9940 "not set IMSI");
9941 return 0;
9942 }
9943
9944 val = get_param(cmd, "Password");
9945 if (val && set_cred_quoted(ifname, id, "milenage", val) < 0) {
9946 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9947 "not set password");
9948 return 0;
9949 }
9950
Jouni Malinenba630452018-06-22 11:49:59 +03009951 if (dut->program == PROGRAM_HS2_R2 || dut->program == PROGRAM_HS2_R3) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +02009952 /*
9953 * Set provisioning_sp for the test cases where SIM/USIM
9954 * provisioning is used.
9955 */
9956 if (val && set_cred_quoted(ifname, id, "provisioning_sp",
9957 "wi-fi.org") < 0) {
9958 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
9959 "not set provisioning_sp");
9960 return 0;
9961 }
9962
9963 update_devdetail_imsi(dut, imsi);
9964 }
9965
9966 return 1;
9967}
9968
9969
9970static int sta_add_credential_cert(struct sigma_dut *dut,
9971 struct sigma_conn *conn,
9972 const char *ifname,
9973 struct sigma_cmd *cmd)
9974{
9975 const char *val;
9976 int id;
9977
9978 id = add_cred(ifname);
9979 if (id < 0)
9980 return -2;
9981 sigma_dut_print(dut, DUT_MSG_DEBUG, "Adding credential %d", id);
9982
9983 val = get_param(cmd, "prefer");
9984 if (val && atoi(val) > 0)
9985 set_cred(ifname, id, "priority", "1");
9986
9987 val = get_param(cmd, "REALM");
9988 if (val && set_cred_quoted(ifname, id, "realm", val) < 0) {
9989 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9990 "realm");
9991 return 0;
9992 }
9993
9994 val = get_param(cmd, "HOME_FQDN");
9995 if (val && set_cred_quoted(ifname, id, "domain", val) < 0) {
9996 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
9997 "home_fqdn");
9998 return 0;
9999 }
10000
10001 val = get_param(cmd, "Username");
10002 if (val && set_cred_quoted(ifname, id, "username", val) < 0) {
10003 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not set "
10004 "username");
10005 return 0;
10006 }
10007
10008 val = get_param(cmd, "clientCertificate");
10009 if (val) {
10010 char fname[200];
10011 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10012#ifdef __linux__
10013 if (!file_exists(fname)) {
10014 char msg[300];
10015 snprintf(msg, sizeof(msg),
10016 "ErrorCode,clientCertificate "
10017 "file (%s) not found", fname);
10018 send_resp(dut, conn, SIGMA_ERROR, msg);
10019 return 0;
10020 }
10021#endif /* __linux__ */
10022 if (set_cred_quoted(ifname, id, "client_cert", fname) < 0) {
10023 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10024 "not set client_cert");
10025 return 0;
10026 }
10027 if (set_cred_quoted(ifname, id, "private_key", fname) < 0) {
10028 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10029 "not set private_key");
10030 return 0;
10031 }
10032 }
10033
10034 val = get_param(cmd, "ROOT_CA");
10035 if (val) {
10036 char fname[200];
10037 snprintf(fname, sizeof(fname), "%s/%s", sigma_cert_path, val);
10038#ifdef __linux__
10039 if (!file_exists(fname)) {
10040 char msg[300];
10041 snprintf(msg, sizeof(msg), "ErrorCode,ROOT_CA "
10042 "file (%s) not found", fname);
10043 send_resp(dut, conn, SIGMA_ERROR, msg);
10044 return 0;
10045 }
10046#endif /* __linux__ */
10047 if (set_cred_quoted(ifname, id, "ca_cert", fname) < 0) {
10048 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could "
10049 "not set root CA");
10050 return 0;
10051 }
10052 }
10053
10054 return 1;
10055}
10056
10057
10058static int cmd_sta_add_credential(struct sigma_dut *dut,
10059 struct sigma_conn *conn,
10060 struct sigma_cmd *cmd)
10061{
10062 const char *intf = get_param(cmd, "Interface");
10063 const char *type;
10064
10065 start_sta_mode(dut);
10066
10067 type = get_param(cmd, "Type");
10068 if (!type)
10069 return -1;
10070
10071 if (strcasecmp(type, "uname_pwd") == 0)
10072 return sta_add_credential_uname_pwd(dut, conn, intf, cmd);
10073
10074 if (strcasecmp(type, "sim") == 0)
10075 return sta_add_credential_sim(dut, conn, intf, cmd);
10076
10077 if (strcasecmp(type, "cert") == 0)
10078 return sta_add_credential_cert(dut, conn, intf, cmd);
10079
10080 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,Unsupported credential "
10081 "type");
10082 return 0;
10083}
10084
10085
10086static int cmd_sta_scan(struct sigma_dut *dut, struct sigma_conn *conn,
10087 struct sigma_cmd *cmd)
10088{
10089 const char *intf = get_param(cmd, "Interface");
vamsi krishna89ad8c62017-09-19 12:51:18 +053010090 const char *val, *bssid, *ssid;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010091 char buf[100];
vamsi krishna89ad8c62017-09-19 12:51:18 +053010092 char ssid_hex[65];
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010093 int res;
10094
10095 val = get_param(cmd, "HESSID");
10096 if (val) {
10097 res = snprintf(buf, sizeof(buf), "SET hessid %s", val);
10098 if (res < 0 || res >= (int) sizeof(buf))
10099 return -1;
10100 wpa_command(intf, buf);
10101 }
10102
10103 val = get_param(cmd, "ACCS_NET_TYPE");
10104 if (val) {
10105 res = snprintf(buf, sizeof(buf), "SET access_network_type %s",
10106 val);
10107 if (res < 0 || res >= (int) sizeof(buf))
10108 return -1;
10109 wpa_command(intf, buf);
10110 }
10111
vamsi krishna89ad8c62017-09-19 12:51:18 +053010112 bssid = get_param(cmd, "Bssid");
10113 ssid = get_param(cmd, "Ssid");
10114
10115 if (ssid) {
10116 if (2 * strlen(ssid) >= sizeof(ssid_hex)) {
10117 send_resp(dut, conn, SIGMA_ERROR,
10118 "ErrorCode,Too long SSID");
10119 return 0;
10120 }
10121 ascii2hexstr(ssid, ssid_hex);
10122 }
10123
10124 res = snprintf(buf, sizeof(buf), "SCAN%s%s%s%s",
10125 bssid ? " bssid=": "",
10126 bssid ? bssid : "",
10127 ssid ? " ssid " : "",
10128 ssid ? ssid_hex : "");
10129 if (res < 0 || res >= (int) sizeof(buf))
10130 return -1;
10131
10132 if (wpa_command(intf, buf)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010133 send_resp(dut, conn, SIGMA_ERROR, "errorCode,Could not start "
10134 "scan");
10135 return 0;
10136 }
10137
10138 return 1;
10139}
10140
10141
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010142static int cmd_sta_scan_bss(struct sigma_dut *dut, struct sigma_conn *conn,
10143 struct sigma_cmd *cmd)
10144{
10145 const char *intf = get_param(cmd, "Interface");
10146 const char *bssid;
10147 char buf[4096], *pos;
10148 int freq, chan;
10149 char *ssid;
10150 char resp[100];
10151 int res;
10152 struct wpa_ctrl *ctrl;
10153
10154 bssid = get_param(cmd, "BSSID");
10155 if (!bssid) {
10156 send_resp(dut, conn, SIGMA_INVALID,
10157 "errorCode,BSSID argument is missing");
10158 return 0;
10159 }
10160
10161 ctrl = open_wpa_mon(intf);
10162 if (!ctrl) {
10163 sigma_dut_print(dut, DUT_MSG_ERROR,
10164 "Failed to open wpa_supplicant monitor connection");
10165 return -1;
10166 }
10167
10168 if (wpa_command(intf, "SCAN TYPE=ONLY")) {
10169 send_resp(dut, conn, SIGMA_ERROR,
10170 "errorCode,Could not start scan");
10171 wpa_ctrl_detach(ctrl);
10172 wpa_ctrl_close(ctrl);
10173 return 0;
10174 }
10175
10176 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-SCAN-RESULTS",
10177 buf, sizeof(buf));
10178
10179 wpa_ctrl_detach(ctrl);
10180 wpa_ctrl_close(ctrl);
10181
10182 if (res < 0) {
10183 send_resp(dut, conn, SIGMA_ERROR,
10184 "errorCode,Scan did not complete");
10185 return 0;
10186 }
10187
10188 snprintf(buf, sizeof(buf), "BSS %s", bssid);
10189 if (wpa_command_resp(intf, buf, buf, sizeof(buf)) < 0 ||
10190 strncmp(buf, "id=", 3) != 0) {
10191 send_resp(dut, conn, SIGMA_ERROR,
10192 "errorCode,Specified BSSID not found");
10193 return 0;
10194 }
10195
10196 pos = strstr(buf, "\nfreq=");
10197 if (!pos) {
10198 send_resp(dut, conn, SIGMA_ERROR,
10199 "errorCode,Channel not found");
10200 return 0;
10201 }
10202 freq = atoi(pos + 6);
10203 chan = freq_to_channel(freq);
10204
10205 pos = strstr(buf, "\nssid=");
10206 if (!pos) {
10207 send_resp(dut, conn, SIGMA_ERROR,
10208 "errorCode,SSID not found");
10209 return 0;
10210 }
10211 ssid = pos + 6;
10212 pos = strchr(ssid, '\n');
10213 if (pos)
10214 *pos = '\0';
10215 snprintf(resp, sizeof(resp), "ssid,%s,bsschannel,%d", ssid, chan);
10216 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10217 return 0;
10218}
10219
10220
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010221static int cmd_sta_set_systime(struct sigma_dut *dut, struct sigma_conn *conn,
10222 struct sigma_cmd *cmd)
10223{
10224#ifdef __linux__
10225 struct timeval tv;
10226 struct tm tm;
10227 time_t t;
10228 const char *val;
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010229 int v;
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010230
10231 wpa_command(get_station_ifname(), "PMKSA_FLUSH");
10232
10233 memset(&tm, 0, sizeof(tm));
10234 val = get_param(cmd, "seconds");
10235 if (val)
10236 tm.tm_sec = atoi(val);
10237 val = get_param(cmd, "minutes");
10238 if (val)
10239 tm.tm_min = atoi(val);
10240 val = get_param(cmd, "hours");
10241 if (val)
10242 tm.tm_hour = atoi(val);
10243 val = get_param(cmd, "date");
10244 if (val)
10245 tm.tm_mday = atoi(val);
10246 val = get_param(cmd, "month");
Pradeep Reddy POTTETI429c69e2016-10-13 17:22:03 +053010247 if (val) {
10248 v = atoi(val);
10249 if (v < 1 || v > 12) {
10250 send_resp(dut, conn, SIGMA_INVALID,
10251 "errorCode,Invalid month");
10252 return 0;
10253 }
10254 tm.tm_mon = v - 1;
10255 }
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010256 val = get_param(cmd, "year");
10257 if (val) {
10258 int year = atoi(val);
10259#ifdef ANDROID
10260 if (year > 2035)
10261 year = 2035; /* years beyond 2035 not supported */
10262#endif /* ANDROID */
10263 tm.tm_year = year - 1900;
10264 }
10265 t = mktime(&tm);
10266 if (t == (time_t) -1) {
10267 send_resp(dut, conn, SIGMA_ERROR,
10268 "errorCode,Invalid date or time");
10269 return 0;
10270 }
10271
10272 memset(&tv, 0, sizeof(tv));
10273 tv.tv_sec = t;
10274
10275 if (settimeofday(&tv, NULL) < 0) {
10276 sigma_dut_print(dut, DUT_MSG_INFO, "settimeofday failed: %s",
10277 strerror(errno));
10278 send_resp(dut, conn, SIGMA_ERROR,
10279 "errorCode,Failed to set time");
10280 return 0;
10281 }
10282
10283 return 1;
10284#endif /* __linux__ */
10285
10286 return -1;
10287}
10288
10289
10290static int cmd_sta_osu(struct sigma_dut *dut, struct sigma_conn *conn,
10291 struct sigma_cmd *cmd)
10292{
10293 const char *intf = get_param(cmd, "Interface");
10294 const char *name, *val;
10295 int prod_ess_assoc = 1;
10296 char buf[200], bssid[100], ssid[100];
10297 int res;
10298 struct wpa_ctrl *ctrl;
10299
10300 name = get_param(cmd, "osuFriendlyName");
10301
10302 val = get_param(cmd, "ProdESSAssoc");
10303 if (val)
10304 prod_ess_assoc = atoi(val);
10305
10306 kill_dhcp_client(dut, intf);
10307 if (start_dhcp_client(dut, intf) < 0)
10308 return -2;
10309
10310 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger OSU");
10311 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10312 res = snprintf(buf, sizeof(buf),
10313 "%s %s%s%s signup osu-ca.pem",
10314 prod_ess_assoc ? "" : "-N",
10315 name ? "-O'" : "", name ? name : "",
10316 name ? "'" : "");
10317
Kanchanapally, Vidyullatha12b66762015-12-31 16:46:42 +053010318 hs2_set_policy(dut);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010319 if (run_hs20_osu(dut, buf) < 0) {
10320 FILE *f;
10321
10322 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to complete OSU");
10323
10324 f = fopen("hs20-osu-client.res", "r");
10325 if (f) {
10326 char resp[400], res[300], *pos;
10327 if (!fgets(res, sizeof(res), f))
10328 res[0] = '\0';
10329 pos = strchr(res, '\n');
10330 if (pos)
10331 *pos = '\0';
10332 fclose(f);
10333 sigma_dut_summary(dut, "hs20-osu-client provisioning failed: %s",
10334 res);
10335 snprintf(resp, sizeof(resp), "notify-send '%s'", res);
10336 if (system(resp) != 0) {
10337 }
10338 snprintf(resp, sizeof(resp),
10339 "SSID,,BSSID,,failureReason,%s", res);
10340 send_resp(dut, conn, SIGMA_COMPLETE, resp);
10341 return 0;
10342 }
10343
10344 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10345 return 0;
10346 }
10347
10348 if (!prod_ess_assoc)
10349 goto report;
10350
10351 ctrl = open_wpa_mon(intf);
10352 if (ctrl == NULL) {
10353 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10354 "wpa_supplicant monitor connection");
10355 return -1;
10356 }
10357
10358 res = get_wpa_cli_event(dut, ctrl, "CTRL-EVENT-CONNECTED",
10359 buf, sizeof(buf));
10360
10361 wpa_ctrl_detach(ctrl);
10362 wpa_ctrl_close(ctrl);
10363
10364 if (res < 0) {
10365 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to connect to "
10366 "network after OSU");
10367 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10368 return 0;
10369 }
10370
10371report:
10372 if (get_wpa_status(intf, "bssid", bssid, sizeof(bssid)) < 0 ||
10373 get_wpa_status(intf, "ssid", ssid, sizeof(ssid)) < 0) {
10374 sigma_dut_print(dut, DUT_MSG_INFO, "Failed to get BSSID/SSID");
10375 send_resp(dut, conn, SIGMA_COMPLETE, "SSID,,BSSID,");
10376 return 0;
10377 }
10378
10379 snprintf(buf, sizeof(buf), "SSID,%s,BSSID,%s", ssid, bssid);
10380 send_resp(dut, conn, SIGMA_COMPLETE, buf);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010381 return 0;
10382}
10383
10384
10385static int cmd_sta_policy_update(struct sigma_dut *dut, struct sigma_conn *conn,
10386 struct sigma_cmd *cmd)
10387{
10388 const char *val;
10389 int timeout = 120;
10390
10391 val = get_param(cmd, "PolicyUpdate");
10392 if (val == NULL || atoi(val) == 0)
10393 return 1; /* No operation requested */
10394
10395 val = get_param(cmd, "Timeout");
10396 if (val)
10397 timeout = atoi(val);
10398
10399 if (timeout) {
10400 /* TODO: time out the command and return
10401 * PolicyUpdateStatus,TIMEOUT if needed. */
10402 }
10403
10404 sigma_dut_print(dut, DUT_MSG_DEBUG, "Trigger policy update");
10405 mkdir("Logs", S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
10406 if (run_hs20_osu(dut, "pol_upd fqdn=wi-fi.org") < 0) {
10407 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,FAIL");
10408 return 0;
10409 }
10410
10411 send_resp(dut, conn, SIGMA_COMPLETE, "PolicyUpdateStatus,SUCCESS");
10412 return 0;
10413}
10414
10415
10416static int cmd_sta_er_config(struct sigma_dut *dut, struct sigma_conn *conn,
10417 struct sigma_cmd *cmd)
10418{
10419 struct wpa_ctrl *ctrl;
10420 const char *intf = get_param(cmd, "Interface");
10421 const char *bssid = get_param(cmd, "Bssid");
10422 const char *ssid = get_param(cmd, "SSID");
10423 const char *security = get_param(cmd, "Security");
10424 const char *passphrase = get_param(cmd, "Passphrase");
10425 const char *pin = get_param(cmd, "PIN");
10426 char buf[1000];
10427 char ssid_hex[200], passphrase_hex[200];
10428 const char *keymgmt, *cipher;
10429
10430 if (intf == NULL)
10431 intf = get_main_ifname();
10432
10433 if (!bssid) {
10434 send_resp(dut, conn, SIGMA_ERROR,
10435 "ErrorCode,Missing Bssid argument");
10436 return 0;
10437 }
10438
10439 if (!ssid) {
10440 send_resp(dut, conn, SIGMA_ERROR,
10441 "ErrorCode,Missing SSID argument");
10442 return 0;
10443 }
10444
10445 if (!security) {
10446 send_resp(dut, conn, SIGMA_ERROR,
10447 "ErrorCode,Missing Security argument");
10448 return 0;
10449 }
10450
10451 if (!passphrase) {
10452 send_resp(dut, conn, SIGMA_ERROR,
10453 "ErrorCode,Missing Passphrase argument");
10454 return 0;
10455 }
10456
10457 if (!pin) {
10458 send_resp(dut, conn, SIGMA_ERROR,
10459 "ErrorCode,Missing PIN argument");
10460 return 0;
10461 }
10462
vamsi krishna8c9c1562017-05-12 15:51:46 +053010463 if (2 * strlen(ssid) >= sizeof(ssid_hex) ||
10464 2 * strlen(passphrase) >= sizeof(passphrase_hex)) {
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010465 send_resp(dut, conn, SIGMA_ERROR,
10466 "ErrorCode,Too long SSID/passphrase");
10467 return 0;
10468 }
10469
10470 ctrl = open_wpa_mon(intf);
10471 if (ctrl == NULL) {
10472 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10473 "wpa_supplicant monitor connection");
10474 return -2;
10475 }
10476
10477 if (strcasecmp(security, "wpa2-psk") == 0) {
10478 keymgmt = "WPA2PSK";
10479 cipher = "CCMP";
10480 } else {
10481 wpa_ctrl_detach(ctrl);
10482 wpa_ctrl_close(ctrl);
10483 send_resp(dut, conn, SIGMA_ERROR,
10484 "ErrorCode,Unsupported Security value");
10485 return 0;
10486 }
10487
10488 ascii2hexstr(ssid, ssid_hex);
10489 ascii2hexstr(passphrase, passphrase_hex);
10490 snprintf(buf, sizeof(buf), "WPS_REG %s %s %s %s %s %s",
10491 bssid, pin, ssid_hex, keymgmt, cipher, passphrase_hex);
10492
10493 if (wpa_command(intf, buf) < 0) {
10494 wpa_ctrl_detach(ctrl);
10495 wpa_ctrl_close(ctrl);
10496 send_resp(dut, conn, SIGMA_ERROR,
10497 "ErrorCode,Failed to start registrar");
10498 return 0;
10499 }
10500
10501 snprintf(dut->er_oper_bssid, sizeof(dut->er_oper_bssid), "%s", bssid);
10502 dut->er_oper_performed = 1;
10503
10504 return wps_connection_event(dut, conn, ctrl, intf, 0);
10505}
10506
10507
10508static int cmd_sta_wps_connect_pw_token(struct sigma_dut *dut,
10509 struct sigma_conn *conn,
10510 struct sigma_cmd *cmd)
10511{
10512 struct wpa_ctrl *ctrl;
10513 const char *intf = get_param(cmd, "Interface");
10514 const char *bssid = get_param(cmd, "Bssid");
10515 char buf[100];
10516
10517 if (!bssid) {
10518 send_resp(dut, conn, SIGMA_ERROR,
10519 "ErrorCode,Missing Bssid argument");
10520 return 0;
10521 }
10522
10523 ctrl = open_wpa_mon(intf);
10524 if (ctrl == NULL) {
10525 sigma_dut_print(dut, DUT_MSG_ERROR, "Failed to open "
10526 "wpa_supplicant monitor connection");
10527 return -2;
10528 }
10529
10530 snprintf(buf, sizeof(buf), "WPS_NFC %s", bssid);
10531
10532 if (wpa_command(intf, buf) < 0) {
10533 wpa_ctrl_detach(ctrl);
10534 wpa_ctrl_close(ctrl);
10535 send_resp(dut, conn, SIGMA_ERROR,
10536 "ErrorCode,Failed to start registrar");
10537 return 0;
10538 }
10539
10540 return wps_connection_event(dut, conn, ctrl, intf, 0);
10541}
10542
10543
vamsi krishna9b144002017-09-20 13:28:13 +053010544static int cmd_start_wps_registration(struct sigma_dut *dut,
10545 struct sigma_conn *conn,
10546 struct sigma_cmd *cmd)
10547{
10548 struct wpa_ctrl *ctrl;
10549 const char *intf = get_param(cmd, "Interface");
10550 const char *role, *method;
10551 int res;
10552 char buf[256];
10553 const char *events[] = {
10554 "CTRL-EVENT-CONNECTED",
10555 "WPS-OVERLAP-DETECTED",
10556 "WPS-TIMEOUT",
10557 "WPS-FAIL",
10558 NULL
10559 };
10560
10561 ctrl = open_wpa_mon(intf);
10562 if (!ctrl) {
10563 sigma_dut_print(dut, DUT_MSG_ERROR,
10564 "Failed to open wpa_supplicant monitor connection");
10565 return -2;
10566 }
10567
10568 role = get_param(cmd, "WpsRole");
10569 if (!role) {
10570 send_resp(dut, conn, SIGMA_INVALID,
10571 "ErrorCode,WpsRole not provided");
10572 goto fail;
10573 }
10574
10575 if (strcasecmp(role, "Enrollee") == 0) {
10576 method = get_param(cmd, "WpsConfigMethod");
10577 if (!method) {
10578 send_resp(dut, conn, SIGMA_INVALID,
10579 "ErrorCode,WpsConfigMethod not provided");
10580 goto fail;
10581 }
10582 if (strcasecmp(method, "PBC") == 0) {
10583 if (wpa_command(intf, "WPS_PBC") < 0) {
10584 send_resp(dut, conn, SIGMA_ERROR,
10585 "ErrorCode,Failed to enable PBC");
10586 goto fail;
10587 }
10588 } else {
10589 /* TODO: PIN method */
10590 send_resp(dut, conn, SIGMA_ERROR,
10591 "ErrorCode,Unsupported WpsConfigMethod value");
10592 goto fail;
10593 }
10594 res = get_wpa_cli_events(dut, ctrl, events, buf, sizeof(buf));
10595 if (res < 0) {
10596 send_resp(dut, conn, SIGMA_ERROR,
10597 "ErrorCode,WPS connection did not complete");
10598 goto fail;
10599 }
10600 if (strstr(buf, "WPS-TIMEOUT")) {
10601 send_resp(dut, conn, SIGMA_ERROR, "ErrorCode,NoPeer");
10602 } else if (strstr(buf, "WPS-OVERLAP-DETECTED")) {
10603 send_resp(dut, conn, SIGMA_ERROR,
10604 "ErrorCode,OverlapSession");
10605 } else if (strstr(buf, "CTRL-EVENT-CONNECTED")) {
10606 send_resp(dut, conn, SIGMA_COMPLETE, "Successful");
10607 } else {
10608 send_resp(dut, conn, SIGMA_ERROR,
10609 "ErrorCode,WPS operation failed");
10610 }
10611 } else {
10612 /* TODO: Registrar role */
10613 send_resp(dut, conn, SIGMA_ERROR,
10614 "ErrorCode,Unsupported WpsRole value");
10615 }
10616
10617fail:
10618 wpa_ctrl_detach(ctrl);
10619 wpa_ctrl_close(ctrl);
10620 return 0;
10621}
10622
10623
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010624static int req_intf(struct sigma_cmd *cmd)
10625{
10626 return get_param(cmd, "interface") == NULL ? -1 : 0;
10627}
10628
10629
10630void sta_register_cmds(void)
10631{
10632 sigma_dut_reg_cmd("sta_get_ip_config", req_intf,
10633 cmd_sta_get_ip_config);
10634 sigma_dut_reg_cmd("sta_set_ip_config", req_intf,
10635 cmd_sta_set_ip_config);
10636 sigma_dut_reg_cmd("sta_get_info", req_intf, cmd_sta_get_info);
10637 sigma_dut_reg_cmd("sta_get_mac_address", req_intf,
10638 cmd_sta_get_mac_address);
10639 sigma_dut_reg_cmd("sta_is_connected", req_intf, cmd_sta_is_connected);
10640 sigma_dut_reg_cmd("sta_verify_ip_connection", req_intf,
10641 cmd_sta_verify_ip_connection);
10642 sigma_dut_reg_cmd("sta_get_bssid", req_intf, cmd_sta_get_bssid);
10643 sigma_dut_reg_cmd("sta_set_encryption", req_intf,
10644 cmd_sta_set_encryption);
10645 sigma_dut_reg_cmd("sta_set_psk", req_intf, cmd_sta_set_psk);
10646 sigma_dut_reg_cmd("sta_set_eaptls", req_intf, cmd_sta_set_eaptls);
10647 sigma_dut_reg_cmd("sta_set_eapttls", req_intf, cmd_sta_set_eapttls);
10648 sigma_dut_reg_cmd("sta_set_eapsim", req_intf, cmd_sta_set_eapsim);
10649 sigma_dut_reg_cmd("sta_set_peap", req_intf, cmd_sta_set_peap);
10650 sigma_dut_reg_cmd("sta_set_eapfast", req_intf, cmd_sta_set_eapfast);
10651 sigma_dut_reg_cmd("sta_set_eapaka", req_intf, cmd_sta_set_eapaka);
10652 sigma_dut_reg_cmd("sta_set_eapakaprime", req_intf,
10653 cmd_sta_set_eapakaprime);
10654 sigma_dut_reg_cmd("sta_set_security", req_intf, cmd_sta_set_security);
10655 sigma_dut_reg_cmd("sta_set_uapsd", req_intf, cmd_sta_set_uapsd);
10656 /* TODO: sta_set_ibss */
10657 /* TODO: sta_set_mode */
10658 sigma_dut_reg_cmd("sta_set_wmm", req_intf, cmd_sta_set_wmm);
10659 sigma_dut_reg_cmd("sta_associate", req_intf, cmd_sta_associate);
10660 /* TODO: sta_up_load */
10661 sigma_dut_reg_cmd("sta_preset_testparameters", req_intf,
10662 cmd_sta_preset_testparameters);
10663 /* TODO: sta_set_system */
10664 sigma_dut_reg_cmd("sta_set_11n", req_intf, cmd_sta_set_11n);
10665 /* TODO: sta_set_rifs_test */
10666 sigma_dut_reg_cmd("sta_set_wireless", req_intf, cmd_sta_set_wireless);
10667 sigma_dut_reg_cmd("sta_send_addba", req_intf, cmd_sta_send_addba);
10668 /* TODO: sta_send_coexist_mgmt */
10669 sigma_dut_reg_cmd("sta_disconnect", req_intf, cmd_sta_disconnect);
10670 sigma_dut_reg_cmd("sta_reassoc", req_intf, cmd_sta_reassoc);
10671 sigma_dut_reg_cmd("sta_reassociate", req_intf, cmd_sta_reassoc);
10672 sigma_dut_reg_cmd("sta_reset_default", req_intf,
10673 cmd_sta_reset_default);
10674 sigma_dut_reg_cmd("sta_send_frame", req_intf, cmd_sta_send_frame);
10675 sigma_dut_reg_cmd("sta_set_macaddr", req_intf, cmd_sta_set_macaddr);
10676 sigma_dut_reg_cmd("sta_set_rfeature", req_intf, cmd_sta_set_rfeature);
10677 sigma_dut_reg_cmd("sta_set_radio", req_intf, cmd_sta_set_radio);
10678 sigma_dut_reg_cmd("sta_set_pwrsave", req_intf, cmd_sta_set_pwrsave);
10679 sigma_dut_reg_cmd("sta_bssid_pool", req_intf, cmd_sta_bssid_pool);
10680 sigma_dut_reg_cmd("sta_reset_parm", req_intf, cmd_sta_reset_parm);
10681 sigma_dut_reg_cmd("sta_get_key", req_intf, cmd_sta_get_key);
10682 sigma_dut_reg_cmd("sta_hs2_associate", req_intf,
10683 cmd_sta_hs2_associate);
10684 sigma_dut_reg_cmd("sta_add_credential", req_intf,
10685 cmd_sta_add_credential);
10686 sigma_dut_reg_cmd("sta_scan", req_intf, cmd_sta_scan);
Jouni Malinen5e5d43d2018-01-10 17:29:33 +020010687 sigma_dut_reg_cmd("sta_scan_bss", req_intf, cmd_sta_scan_bss);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010688 sigma_dut_reg_cmd("sta_set_systime", NULL, cmd_sta_set_systime);
10689 sigma_dut_reg_cmd("sta_osu", req_intf, cmd_sta_osu);
10690 sigma_dut_reg_cmd("sta_policy_update", req_intf, cmd_sta_policy_update);
10691 sigma_dut_reg_cmd("sta_er_config", NULL, cmd_sta_er_config);
10692 sigma_dut_reg_cmd("sta_wps_connect_pw_token", req_intf,
10693 cmd_sta_wps_connect_pw_token);
Jouni Malinen82905202018-04-29 17:20:10 +030010694 sigma_dut_reg_cmd("sta_exec_action", NULL, cmd_sta_exec_action);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010695 sigma_dut_reg_cmd("sta_get_events", req_intf, cmd_sta_get_events);
10696 sigma_dut_reg_cmd("sta_get_parameter", req_intf, cmd_sta_get_parameter);
vamsi krishna9b144002017-09-20 13:28:13 +053010697 sigma_dut_reg_cmd("start_wps_registration", req_intf,
10698 cmd_start_wps_registration);
Jouni Malinencd4e3c32015-10-29 12:39:56 +020010699}