2 * WPA Supplicant - testing driver interface
3 * Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
22 #include "wpa_supplicant.h"
23 #include "l2_packet.h"
30 struct wpa_driver_test_data {
32 u8 own_addr[ETH_ALEN];
34 struct sockaddr_un hostapd_addr;
36 char *own_socket_path;
41 #define MAX_SCAN_RESULTS 30
42 struct wpa_scan_result scanres[MAX_SCAN_RESULTS];
46 size_t assoc_wpa_ie_len;
51 static int wpa_driver_test_set_wpa(void *priv, int enabled)
53 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
58 static void wpa_driver_test_scan_timeout(void *eloop_ctx, void *timeout_ctx)
60 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
61 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
65 static void wpa_driver_scan_dir(struct wpa_driver_test_data *drv,
70 struct sockaddr_un addr;
76 while ((dent = readdir(dir))) {
77 if (os_strncmp(dent->d_name, "AP-", 3) != 0)
79 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
81 os_memset(&addr, 0, sizeof(addr));
82 addr.sun_family = AF_UNIX;
83 os_snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s",
86 if (sendto(drv->test_socket, "SCAN", 4, 0,
87 (struct sockaddr *) &addr, sizeof(addr)) < 0) {
88 perror("sendto(test_socket)");
95 static int wpa_driver_test_scan(void *priv, const u8 *ssid, size_t ssid_len)
97 struct wpa_driver_test_data *drv = priv;
98 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
100 drv->num_scanres = 0;
102 if (drv->test_socket >= 0 && drv->test_dir)
103 wpa_driver_scan_dir(drv, drv->test_dir);
105 if (drv->test_socket >= 0 && drv->hostapd_addr_set &&
106 sendto(drv->test_socket, "SCAN", 4, 0,
107 (struct sockaddr *) &drv->hostapd_addr,
108 sizeof(drv->hostapd_addr)) < 0) {
109 perror("sendto(test_socket)");
112 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
113 eloop_register_timeout(1, 0, wpa_driver_test_scan_timeout, drv,
119 static int wpa_driver_test_get_scan_results(void *priv,
120 struct wpa_scan_result *results,
123 struct wpa_driver_test_data *drv = priv;
124 size_t num = drv->num_scanres;
127 os_memcpy(results, &drv->scanres,
128 num * sizeof(struct wpa_scan_result));
133 static int wpa_driver_test_set_key(void *priv, wpa_alg alg, const u8 *addr,
134 int key_idx, int set_tx,
135 const u8 *seq, size_t seq_len,
136 const u8 *key, size_t key_len)
138 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
139 __func__, priv, alg, key_idx, set_tx);
141 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
144 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
147 wpa_hexdump(MSG_DEBUG, " key", key, key_len);
153 static int wpa_driver_test_associate(
154 void *priv, struct wpa_driver_associate_params *params)
156 struct wpa_driver_test_data *drv = priv;
157 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
158 "group_suite=%d key_mgmt_suite=%d auth_alg=%d mode=%d",
159 __func__, priv, params->freq, params->pairwise_suite,
160 params->group_suite, params->key_mgmt_suite,
161 params->auth_alg, params->mode);
163 wpa_printf(MSG_DEBUG, " bssid=" MACSTR,
164 MAC2STR(params->bssid));
167 wpa_hexdump_ascii(MSG_DEBUG, " ssid",
168 params->ssid, params->ssid_len);
170 if (params->wpa_ie) {
171 wpa_hexdump(MSG_DEBUG, " wpa_ie",
172 params->wpa_ie, params->wpa_ie_len);
173 drv->assoc_wpa_ie_len = params->wpa_ie_len;
174 if (drv->assoc_wpa_ie_len > sizeof(drv->assoc_wpa_ie))
175 drv->assoc_wpa_ie_len = sizeof(drv->assoc_wpa_ie);
176 os_memcpy(drv->assoc_wpa_ie, params->wpa_ie,
177 drv->assoc_wpa_ie_len);
179 drv->assoc_wpa_ie_len = 0;
181 if (drv->test_dir && params->bssid) {
182 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
183 drv->hostapd_addr.sun_family = AF_UNIX;
184 os_snprintf(drv->hostapd_addr.sun_path,
185 sizeof(drv->hostapd_addr.sun_path),
187 drv->test_dir, MAC2STR(params->bssid));
188 drv->hostapd_addr_set = 1;
191 if (drv->test_socket >= 0 && drv->hostapd_addr_set) {
192 char cmd[200], *pos, *end;
194 end = cmd + sizeof(cmd);
196 ret = os_snprintf(pos, end - pos, "ASSOC " MACSTR " ",
197 MAC2STR(drv->own_addr));
198 if (ret >= 0 && ret < end - pos)
200 pos += wpa_snprintf_hex(pos, end - pos, params->ssid,
202 ret = os_snprintf(pos, end - pos, " ");
203 if (ret >= 0 && ret < end - pos)
205 pos += wpa_snprintf_hex(pos, end - pos, params->wpa_ie,
208 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
209 (struct sockaddr *) &drv->hostapd_addr,
210 sizeof(drv->hostapd_addr)) < 0) {
211 perror("sendto(test_socket)");
215 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
216 drv->ssid_len = params->ssid_len;
218 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
224 static int wpa_driver_test_get_bssid(void *priv, u8 *bssid)
226 struct wpa_driver_test_data *drv = priv;
227 os_memcpy(bssid, drv->bssid, ETH_ALEN);
232 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid)
234 struct wpa_driver_test_data *drv = priv;
235 os_memcpy(ssid, drv->ssid, 32);
236 return drv->ssid_len;
240 static int wpa_driver_test_send_disassoc(struct wpa_driver_test_data *drv)
242 if (drv->test_socket >= 0 &&
243 sendto(drv->test_socket, "DISASSOC", 8, 0,
244 (struct sockaddr *) &drv->hostapd_addr,
245 sizeof(drv->hostapd_addr)) < 0) {
246 perror("sendto(test_socket)");
253 static int wpa_driver_test_deauthenticate(void *priv, const u8 *addr,
256 struct wpa_driver_test_data *drv = priv;
257 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
258 __func__, MAC2STR(addr), reason_code);
259 os_memset(drv->bssid, 0, ETH_ALEN);
260 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
261 return wpa_driver_test_send_disassoc(drv);
265 static int wpa_driver_test_disassociate(void *priv, const u8 *addr,
268 struct wpa_driver_test_data *drv = priv;
269 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
270 __func__, MAC2STR(addr), reason_code);
271 os_memset(drv->bssid, 0, ETH_ALEN);
272 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
273 return wpa_driver_test_send_disassoc(drv);
277 static void wpa_driver_test_scanresp(struct wpa_driver_test_data *drv,
278 struct sockaddr_un *from,
282 struct wpa_scan_result *res;
283 const char *pos, *pos2;
285 u8 ie[200], *ipos, *end;
287 wpa_printf(MSG_DEBUG, "test_driver: SCANRESP %s", data);
288 if (drv->num_scanres >= MAX_SCAN_RESULTS) {
289 wpa_printf(MSG_DEBUG, "test_driver: No room for the new scan "
294 /* SCANRESP BSSID SSID IEs */
295 res = &drv->scanres[drv->num_scanres];
297 os_memset(res, 0, sizeof(*res));
298 if (hwaddr_aton(data, res->bssid)) {
299 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in scanres");
306 pos2 = os_strchr(pos, ' ');
308 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID termination "
312 len = (pos2 - pos) / 2;
313 if (len > sizeof(res->ssid))
314 len = sizeof(res->ssid);
315 if (hexstr2bin(pos, res->ssid, len) < 0) {
316 wpa_printf(MSG_DEBUG, "test_driver: invalid SSID in scanres");
322 pos2 = os_strchr(pos, ' ');
324 len = os_strlen(pos) / 2;
326 len = (pos2 - pos) / 2;
327 if (len > sizeof(ie))
329 if (hexstr2bin(pos, ie, len) < 0) {
330 wpa_printf(MSG_DEBUG, "test_driver: invalid IEs in scanres");
336 while (ipos + 1 < end && ipos + 2 + ipos[1] <= end) {
338 if (len > SSID_MAX_WPA_IE_LEN)
339 len = SSID_MAX_WPA_IE_LEN;
340 if (ipos[0] == RSN_INFO_ELEM) {
341 os_memcpy(res->rsn_ie, ipos, len);
342 res->rsn_ie_len = len;
343 } else if (ipos[0] == GENERIC_INFO_ELEM) {
344 os_memcpy(res->wpa_ie, ipos, len);
345 res->wpa_ie_len = len;
355 if (os_strncmp(pos, "PRIVACY", 7) == 0)
356 res->caps |= IEEE80211_CAP_PRIVACY;
363 static void wpa_driver_test_assocresp(struct wpa_driver_test_data *drv,
364 struct sockaddr_un *from,
368 /* ASSOCRESP BSSID <res> */
369 if (hwaddr_aton(data, drv->bssid)) {
370 wpa_printf(MSG_DEBUG, "test_driver: invalid BSSID in "
373 if (drv->use_associnfo) {
374 union wpa_event_data event;
375 os_memset(&event, 0, sizeof(event));
376 event.assoc_info.req_ies = drv->assoc_wpa_ie;
377 event.assoc_info.req_ies_len = drv->assoc_wpa_ie_len;
378 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &event);
380 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
384 static void wpa_driver_test_disassoc(struct wpa_driver_test_data *drv,
385 struct sockaddr_un *from,
388 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
392 static void wpa_driver_test_eapol(struct wpa_driver_test_data *drv,
393 struct sockaddr_un *from,
395 const u8 *data, size_t data_len)
397 const u8 *src = drv->bssid;
400 /* Skip Ethernet header */
401 src = data + ETH_ALEN;
405 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len);
409 static void wpa_driver_test_mlme(struct wpa_driver_test_data *drv,
410 struct sockaddr_un *from,
412 const u8 *data, size_t data_len)
414 struct ieee80211_rx_status rx_status;
415 os_memset(&rx_status, 0, sizeof(rx_status));
416 ieee80211_sta_rx(drv->ctx, data, data_len, &rx_status);
420 static void wpa_driver_test_receive_unix(int sock, void *eloop_ctx,
423 struct wpa_driver_test_data *drv = eloop_ctx;
426 struct sockaddr_un from;
427 socklen_t fromlen = sizeof(from);
428 const size_t buflen = 2000;
430 buf = os_malloc(buflen);
433 res = recvfrom(sock, buf, buflen - 1, 0,
434 (struct sockaddr *) &from, &fromlen);
436 perror("recvfrom(test_socket)");
442 wpa_printf(MSG_DEBUG, "test_driver: received %u bytes", res);
444 if (os_strncmp(buf, "SCANRESP ", 9) == 0) {
445 wpa_driver_test_scanresp(drv, &from, fromlen, buf + 9);
446 } else if (os_strncmp(buf, "ASSOCRESP ", 10) == 0) {
447 wpa_driver_test_assocresp(drv, &from, fromlen, buf + 10);
448 } else if (os_strcmp(buf, "DISASSOC") == 0) {
449 wpa_driver_test_disassoc(drv, &from, fromlen);
450 } else if (os_strcmp(buf, "DEAUTH") == 0) {
451 wpa_driver_test_disassoc(drv, &from, fromlen);
452 } else if (os_strncmp(buf, "EAPOL ", 6) == 0) {
453 wpa_driver_test_eapol(drv, &from, fromlen,
454 (const u8 *) buf + 6, res - 6);
455 } else if (os_strncmp(buf, "MLME ", 5) == 0) {
456 wpa_driver_test_mlme(drv, &from, fromlen,
457 (const u8 *) buf + 5, res - 5);
459 wpa_hexdump_ascii(MSG_DEBUG, "Unknown test_socket command",
466 static void * wpa_driver_test_init(void *ctx, const char *ifname)
468 struct wpa_driver_test_data *drv;
470 drv = os_zalloc(sizeof(*drv));
474 drv->test_socket = -1;
476 /* Set dummy BSSID and SSID for testing. */
477 drv->bssid[0] = 0x02;
478 drv->bssid[1] = 0x00;
479 drv->bssid[2] = 0x00;
480 drv->bssid[3] = 0x00;
481 drv->bssid[4] = 0x00;
482 drv->bssid[5] = 0x01;
483 os_memcpy(drv->ssid, "test", 5);
486 /* Generate a MAC address to help testing with multiple STAs */
487 drv->own_addr[0] = 0x02; /* locally administered */
488 sha1_prf((const u8 *) ifname, os_strlen(ifname),
489 "wpa_supplicant test mac addr generation",
490 NULL, 0, drv->own_addr + 1, ETH_ALEN - 1);
496 static void wpa_driver_test_close_test_socket(struct wpa_driver_test_data *drv)
498 if (drv->test_socket >= 0) {
499 eloop_unregister_read_sock(drv->test_socket);
500 close(drv->test_socket);
501 drv->test_socket = -1;
504 if (drv->own_socket_path) {
505 unlink(drv->own_socket_path);
506 os_free(drv->own_socket_path);
507 drv->own_socket_path = NULL;
512 static void wpa_driver_test_deinit(void *priv)
514 struct wpa_driver_test_data *drv = priv;
515 wpa_driver_test_close_test_socket(drv);
516 eloop_cancel_timeout(wpa_driver_test_scan_timeout, drv, drv->ctx);
517 os_free(drv->test_dir);
522 static int wpa_driver_test_attach(struct wpa_driver_test_data *drv,
525 static unsigned int counter = 0;
526 struct sockaddr_un addr;
529 os_free(drv->own_socket_path);
531 len = os_strlen(dir) + 30;
532 drv->own_socket_path = os_malloc(len);
533 if (drv->own_socket_path == NULL)
535 os_snprintf(drv->own_socket_path, len, "%s/STA-" MACSTR,
536 dir, MAC2STR(drv->own_addr));
538 drv->own_socket_path = os_malloc(100);
539 if (drv->own_socket_path == NULL)
541 os_snprintf(drv->own_socket_path, 100,
542 "/tmp/wpa_supplicant_test-%d-%d",
543 getpid(), counter++);
546 drv->test_socket = socket(PF_UNIX, SOCK_DGRAM, 0);
547 if (drv->test_socket < 0) {
548 perror("socket(PF_UNIX)");
549 os_free(drv->own_socket_path);
550 drv->own_socket_path = NULL;
554 os_memset(&addr, 0, sizeof(addr));
555 addr.sun_family = AF_UNIX;
556 os_strncpy(addr.sun_path, drv->own_socket_path, sizeof(addr.sun_path));
557 if (bind(drv->test_socket, (struct sockaddr *) &addr,
559 perror("bind(PF_UNIX)");
560 close(drv->test_socket);
561 unlink(drv->own_socket_path);
562 os_free(drv->own_socket_path);
563 drv->own_socket_path = NULL;
567 eloop_register_read_sock(drv->test_socket,
568 wpa_driver_test_receive_unix, drv, NULL);
574 static int wpa_driver_test_set_param(void *priv, const char *param)
576 struct wpa_driver_test_data *drv = priv;
577 const char *pos, *pos2;
580 wpa_printf(MSG_DEBUG, "%s: param='%s'", __func__, param);
584 wpa_driver_test_close_test_socket(drv);
585 pos = os_strstr(param, "test_socket=");
588 pos2 = os_strchr(pos, ' ');
592 len = os_strlen(pos);
593 if (len > sizeof(drv->hostapd_addr.sun_path))
595 os_memset(&drv->hostapd_addr, 0, sizeof(drv->hostapd_addr));
596 drv->hostapd_addr.sun_family = AF_UNIX;
597 os_memcpy(drv->hostapd_addr.sun_path, pos, len);
598 drv->hostapd_addr_set = 1;
601 pos = os_strstr(param, "test_dir=");
604 os_free(drv->test_dir);
605 drv->test_dir = os_strdup(pos + 9);
606 if (drv->test_dir == NULL)
608 end = os_strchr(drv->test_dir, ' ');
611 wpa_driver_test_attach(drv, drv->test_dir);
613 wpa_driver_test_attach(drv, NULL);
615 if (os_strstr(param, "use_associnfo=1")) {
616 wpa_printf(MSG_DEBUG, "test_driver: Use AssocInfo events");
617 drv->use_associnfo = 1;
620 #ifdef CONFIG_CLIENT_MLME
621 if (os_strstr(param, "use_mlme=1")) {
622 wpa_printf(MSG_DEBUG, "test_driver: Use internal MLME");
625 #endif /* CONFIG_CLIENT_MLME */
631 static const u8 * wpa_driver_test_get_mac_addr(void *priv)
633 struct wpa_driver_test_data *drv = priv;
634 wpa_printf(MSG_DEBUG, "%s", __func__);
635 return drv->own_addr;
639 static int wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto,
640 const u8 *data, size_t data_len)
642 struct wpa_driver_test_data *drv = priv;
645 struct l2_ethhdr eth;
646 struct sockaddr_un addr;
648 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len);
650 os_memset(ð, 0, sizeof(eth));
651 os_memcpy(eth.h_dest, dest, ETH_ALEN);
652 os_memcpy(eth.h_source, drv->own_addr, ETH_ALEN);
653 eth.h_proto = host_to_be16(proto);
655 io[0].iov_base = "EAPOL ";
657 io[1].iov_base = (u8 *) ð
658 io[1].iov_len = sizeof(eth);
659 io[2].iov_base = (u8 *) data;
660 io[2].iov_len = data_len;
662 os_memset(&msg, 0, sizeof(msg));
665 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
666 drv->test_dir == NULL) {
667 msg.msg_name = &drv->hostapd_addr;
668 msg.msg_namelen = sizeof(drv->hostapd_addr);
671 os_memset(&addr, 0, sizeof(addr));
672 addr.sun_family = AF_UNIX;
673 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
674 "%s/STA-" MACSTR, drv->test_dir, MAC2STR(dest));
675 if (stat(addr.sun_path, &st) < 0) {
676 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
678 drv->test_dir, MAC2STR(dest));
680 msg.msg_name = &addr;
681 msg.msg_namelen = sizeof(addr);
684 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
685 perror("sendmsg(test_socket)");
693 static int wpa_driver_test_get_capa(void *priv, struct wpa_driver_capa *capa)
695 struct wpa_driver_test_data *drv = priv;
696 os_memset(capa, 0, sizeof(*capa));
697 capa->key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
698 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
699 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
700 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK |
701 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE;
702 capa->enc = WPA_DRIVER_CAPA_ENC_WEP40 |
703 WPA_DRIVER_CAPA_ENC_WEP104 |
704 WPA_DRIVER_CAPA_ENC_TKIP |
705 WPA_DRIVER_CAPA_ENC_CCMP;
706 capa->auth = WPA_DRIVER_AUTH_OPEN |
707 WPA_DRIVER_AUTH_SHARED |
708 WPA_DRIVER_AUTH_LEAP;
710 capa->flags |= WPA_DRIVER_FLAGS_USER_SPACE_MLME;
716 static int wpa_driver_test_mlme_setprotection(void *priv, const u8 *addr,
720 wpa_printf(MSG_DEBUG, "%s: protect_type=%d key_type=%d",
721 __func__, protect_type, key_type);
724 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR,
725 __func__, MAC2STR(addr));
732 #ifdef CONFIG_CLIENT_MLME
733 static struct wpa_hw_modes *
734 wpa_driver_test_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
736 struct wpa_hw_modes *modes;
740 modes = os_zalloc(*num_modes * sizeof(struct wpa_hw_modes));
743 modes[0].mode = WPA_MODE_IEEE80211G;
744 modes[0].num_channels = 1;
745 modes[0].num_rates = 1;
746 modes[0].channels = os_zalloc(sizeof(struct wpa_channel_data));
747 modes[0].rates = os_zalloc(sizeof(struct wpa_rate_data));
748 if (modes[0].channels == NULL || modes[0].rates == NULL) {
749 ieee80211_sta_free_hw_features(modes, *num_modes);
752 modes[0].channels[0].chan = 1;
753 modes[0].channels[0].freq = 2412;
754 modes[0].channels[0].flag = WPA_CHAN_W_SCAN | WPA_CHAN_W_ACTIVE_SCAN;
755 modes[0].rates[0].rate = 10;
756 modes[0].rates[0].flags = WPA_RATE_BASIC | WPA_RATE_SUPPORTED |
757 WPA_RATE_CCK | WPA_RATE_MANDATORY;
763 int wpa_driver_test_set_channel(void *priv, wpa_hw_mode phymode, int chan,
766 wpa_printf(MSG_DEBUG, "%s: phymode=%d chan=%d freq=%d",
767 __func__, phymode, chan, freq);
772 static int wpa_driver_test_send_mlme(void *priv, const u8 *data,
775 struct wpa_driver_test_data *drv = priv;
778 struct sockaddr_un addr;
783 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len);
788 io[0].iov_base = "MLME ";
790 io[1].iov_base = (u8 *) data;
791 io[1].iov_len = data_len;
793 os_memset(&msg, 0, sizeof(msg));
796 if (os_memcmp(dest, drv->bssid, ETH_ALEN) == 0 ||
797 drv->test_dir == NULL) {
798 msg.msg_name = &drv->hostapd_addr;
799 msg.msg_namelen = sizeof(drv->hostapd_addr);
800 } else if (os_memcmp(dest, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0)
802 dir = opendir(drv->test_dir);
805 while ((dent = readdir(dir))) {
806 #ifdef _DIRENT_HAVE_D_TYPE
807 /* Skip the file if it is not a socket.
808 * Also accept DT_UNKNOWN (0) in case
809 * the C library or underlying file
810 * system does not support d_type. */
811 if (dent->d_type != DT_SOCK &&
812 dent->d_type != DT_UNKNOWN)
814 #endif /* _DIRENT_HAVE_D_TYPE */
815 if (os_strcmp(dent->d_name, ".") == 0 ||
816 os_strcmp(dent->d_name, "..") == 0)
818 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
819 __func__, dent->d_name);
820 os_memset(&addr, 0, sizeof(addr));
821 addr.sun_family = AF_UNIX;
822 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
823 "%s/%s", drv->test_dir, dent->d_name);
825 msg.msg_name = &addr;
826 msg.msg_namelen = sizeof(addr);
828 if (sendmsg(drv->test_socket, &msg, 0) < 0)
829 perror("sendmsg(test_socket)");
835 os_memset(&addr, 0, sizeof(addr));
836 addr.sun_family = AF_UNIX;
837 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
838 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
839 if (stat(addr.sun_path, &st) < 0) {
840 os_snprintf(addr.sun_path, sizeof(addr.sun_path),
842 drv->test_dir, MAC2STR(dest));
844 msg.msg_name = &addr;
845 msg.msg_namelen = sizeof(addr);
848 if (sendmsg(drv->test_socket, &msg, 0) < 0) {
849 perror("sendmsg(test_socket)");
857 static int wpa_driver_test_mlme_add_sta(void *priv, const u8 *addr,
858 const u8 *supp_rates,
859 size_t supp_rates_len)
861 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
866 static int wpa_driver_test_mlme_remove_sta(void *priv, const u8 *addr)
868 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, MAC2STR(addr));
873 int wpa_driver_test_set_ssid(void *priv, const u8 *ssid, size_t ssid_len)
875 wpa_printf(MSG_DEBUG, "%s", __func__);
880 int wpa_driver_test_set_bssid(void *priv, const u8 *bssid)
882 wpa_printf(MSG_DEBUG, "%s: bssid=" MACSTR, __func__, MAC2STR(bssid));
885 #endif /* CONFIG_CLIENT_MLME */
887 int wpa_driver_test_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len )
889 struct wpa_driver_test_data *drv = (struct wpa_driver_test_data *)priv;
892 wpa_printf(MSG_DEBUG, "%s %s", __func__, cmd);
893 if( os_strncasecmp(cmd, "start", 5) == 0 ) {
894 wpa_printf(MSG_DEBUG,"Start command");
897 else if( os_strncasecmp(cmd, "stop", 4) == 0 ) {
898 wpa_printf(MSG_DEBUG,"Stop command");
901 else if( os_strncasecmp(cmd, "macaddr", 7) == 0 ) {
902 u8 *macaddr = (u8 *)wpa_driver_test_get_mac_addr(priv);
903 wpa_printf(MSG_DEBUG,"Macaddr command");
904 wpa_printf(MSG_DEBUG, " Macaddr = " MACSTR, MAC2STR(macaddr));
905 ret = os_snprintf(buf, buf_len, "Macaddr = " MACSTR "\n", MAC2STR(macaddr));
907 else if( os_strncasecmp(cmd, "rssi", 4) == 0 ) {
908 wpa_printf(MSG_DEBUG,"RSSI command");
909 ret = os_snprintf(buf, buf_len, MACSTR " Rssi %d\n", MAC2STR(drv->bssid), -10);
910 } else if (os_strncasecmp(cmd, "linkspeed", 9) == 0) {
911 wpa_printf(MSG_DEBUG, "LinkSpeed command");
912 ret = os_snprintf(buf, buf_len, "LinkSpeed %u\n", 11);
917 const struct wpa_driver_ops wpa_driver_test_ops = {
919 "wpa_supplicant test driver",
920 wpa_driver_test_get_bssid,
921 wpa_driver_test_get_ssid,
922 wpa_driver_test_set_wpa,
923 wpa_driver_test_set_key,
924 wpa_driver_test_init,
925 wpa_driver_test_deinit,
926 wpa_driver_test_set_param,
927 NULL /* set_countermeasures */,
928 NULL /* set_drop_unencrypted */,
929 wpa_driver_test_scan,
930 wpa_driver_test_get_scan_results,
931 wpa_driver_test_deauthenticate,
932 wpa_driver_test_disassociate,
933 wpa_driver_test_associate,
934 NULL /* set_auth_alg */,
935 NULL /* add_pmkid */,
936 NULL /* remove_pmkid */,
937 NULL /* flush_pmkid */,
938 wpa_driver_test_get_capa,
940 NULL /* get_ifname */,
941 wpa_driver_test_get_mac_addr,
942 wpa_driver_test_send_eapol,
943 NULL /* set_operstate */,
944 wpa_driver_test_mlme_setprotection,
945 #ifdef CONFIG_CLIENT_MLME
946 wpa_driver_test_get_hw_feature_data,
947 wpa_driver_test_set_channel,
948 wpa_driver_test_set_ssid,
949 wpa_driver_test_set_bssid,
950 wpa_driver_test_send_mlme,
951 wpa_driver_test_mlme_add_sta,
952 wpa_driver_test_mlme_remove_sta,
953 #else /* CONFIG_CLIENT_MLME */
954 NULL /* get_hw_feature_data */,
955 NULL /* set_channel */,
957 NULL /* set_bssid */,
958 NULL /* send_mlme */,
959 NULL /* mlme_add_sta */,
960 NULL /* mlme_remove_sta */,
961 #endif /* CONFIG_CLIENT_MLME */
962 wpa_driver_test_driver_cmd