|
@@ -0,0 +1,1038 @@
|
|
|
+# P2P protocol tests for various messages
|
|
|
+# Copyright (c) 2014, Jouni Malinen <j@w1.fi>
|
|
|
+#
|
|
|
+# This software may be distributed under the terms of the BSD license.
|
|
|
+# See README for more details.
|
|
|
+
|
|
|
+import binascii
|
|
|
+import struct
|
|
|
+import time
|
|
|
+
|
|
|
+import hostapd
|
|
|
+
|
|
|
+MGMT_SUBTYPE_PROBE_REQ = 4
|
|
|
+MGMT_SUBTYPE_ACTION = 13
|
|
|
+ACTION_CATEG_PUBLIC = 4
|
|
|
+
|
|
|
+P2P_GO_NEG_REQ = 0
|
|
|
+P2P_GO_NEG_RESP = 1
|
|
|
+P2P_GO_NEG_CONF = 2
|
|
|
+P2P_INVITATION_REQ = 3
|
|
|
+P2P_INVITATION_RESP = 4
|
|
|
+P2P_DEV_DISC_REQ = 5
|
|
|
+P2P_DEV_DISC_RESP = 6
|
|
|
+P2P_PROV_DISC_REQ = 7
|
|
|
+P2P_PROV_DISC_RESP = 8
|
|
|
+
|
|
|
+P2P_ATTR_STATUS = 0
|
|
|
+P2P_ATTR_MINOR_REASON_CODE = 1
|
|
|
+P2P_ATTR_CAPABILITY = 2
|
|
|
+P2P_ATTR_DEVICE_ID = 3
|
|
|
+P2P_ATTR_GROUP_OWNER_INTENT = 4
|
|
|
+P2P_ATTR_CONFIGURATION_TIMEOUT = 5
|
|
|
+P2P_ATTR_LISTEN_CHANNEL = 6
|
|
|
+P2P_ATTR_GROUP_BSSID = 7
|
|
|
+P2P_ATTR_EXT_LISTEN_TIMING = 8
|
|
|
+P2P_ATTR_INTENDED_INTERFACE_ADDR = 9
|
|
|
+P2P_ATTR_MANAGEABILITY = 10
|
|
|
+P2P_ATTR_CHANNEL_LIST = 11
|
|
|
+P2P_ATTR_NOTICE_OF_ABSENCE = 12
|
|
|
+P2P_ATTR_DEVICE_INFO = 13
|
|
|
+P2P_ATTR_GROUP_INFO = 14
|
|
|
+P2P_ATTR_GROUP_ID = 15
|
|
|
+P2P_ATTR_INTERFACE = 16
|
|
|
+P2P_ATTR_OPERATING_CHANNEL = 17
|
|
|
+P2P_ATTR_INVITATION_FLAGS = 18
|
|
|
+P2P_ATTR_OOB_GO_NEG_CHANNEL = 19
|
|
|
+P2P_ATTR_VENDOR_SPECIFIC = 221
|
|
|
+
|
|
|
+P2P_SC_SUCCESS = 0
|
|
|
+P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE = 1
|
|
|
+P2P_SC_FAIL_INCOMPATIBLE_PARAMS = 2
|
|
|
+P2P_SC_FAIL_LIMIT_REACHED = 3
|
|
|
+P2P_SC_FAIL_INVALID_PARAMS = 4
|
|
|
+P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE = 5
|
|
|
+P2P_SC_FAIL_PREV_PROTOCOL_ERROR = 6
|
|
|
+P2P_SC_FAIL_NO_COMMON_CHANNELS = 7
|
|
|
+P2P_SC_FAIL_UNKNOWN_GROUP = 8
|
|
|
+P2P_SC_FAIL_BOTH_GO_INTENT_15 = 9
|
|
|
+P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD = 10
|
|
|
+P2P_SC_FAIL_REJECTED_BY_USER = 11
|
|
|
+
|
|
|
+WSC_ATTR_CONFIG_METHODS = 0x1008
|
|
|
+
|
|
|
+WLAN_EID_SSID = 0
|
|
|
+WLAN_EID_SUPP_RATES = 1
|
|
|
+WLAN_EID_VENDOR_SPECIFIC = 221
|
|
|
+
|
|
|
+def ie_ssid(ssid):
|
|
|
+ return struct.pack("<BB", WLAN_EID_SSID, len(ssid)) + ssid
|
|
|
+
|
|
|
+def ie_supp_rates():
|
|
|
+ return struct.pack("<BBBBBBBBBB", WLAN_EID_SUPP_RATES, 8,
|
|
|
+ 2*6, 2*9, 2*12, 2*18, 2*24, 2*36, 2*48, 2*54)
|
|
|
+
|
|
|
+def ie_p2p(attrs):
|
|
|
+ return struct.pack("<BBBBBB", WLAN_EID_VENDOR_SPECIFIC, 4 + len(attrs),
|
|
|
+ 0x50, 0x6f, 0x9a, 9) + attrs
|
|
|
+
|
|
|
+def ie_wsc(attrs):
|
|
|
+ return struct.pack("<BBBBBB", WLAN_EID_VENDOR_SPECIFIC, 4 + len(attrs),
|
|
|
+ 0x00, 0x50, 0xf2, 4) + attrs
|
|
|
+
|
|
|
+def wsc_attr_config_methods(methods=0):
|
|
|
+ return struct.pack(">HHH", WSC_ATTR_CONFIG_METHODS, 2, methods)
|
|
|
+
|
|
|
+def p2p_attr_status(status=P2P_SC_SUCCESS):
|
|
|
+ return struct.pack("<BHB", P2P_ATTR_STATUS, 1, status)
|
|
|
+
|
|
|
+def p2p_attr_minor_reason_code(code=0):
|
|
|
+ return struct.pack("<BHB", P2P_ATTR_MINOR_REASON_CODE, 1, code)
|
|
|
+
|
|
|
+def p2p_attr_capability(dev_capab=0, group_capab=0):
|
|
|
+ return struct.pack("<BHBB", P2P_ATTR_CAPABILITY, 2, dev_capab, group_capab)
|
|
|
+
|
|
|
+def p2p_attr_device_id(addr):
|
|
|
+ val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
|
|
|
+ t = (P2P_ATTR_DEVICE_ID, 6) + val
|
|
|
+ return struct.pack('<BH6B', *t)
|
|
|
+
|
|
|
+def p2p_attr_go_intent(go_intent=0, tie_breaker=0):
|
|
|
+ return struct.pack("<BHB", P2P_ATTR_GROUP_OWNER_INTENT, 1,
|
|
|
+ (go_intent << 1) | (tie_breaker & 0x01))
|
|
|
+
|
|
|
+def p2p_attr_config_timeout(go_config_timeout=0, client_config_timeout=0):
|
|
|
+ return struct.pack("<BHBB", P2P_ATTR_CONFIGURATION_TIMEOUT, 2,
|
|
|
+ go_config_timeout, client_config_timeout)
|
|
|
+
|
|
|
+def p2p_attr_listen_channel(op_class=81, chan=1):
|
|
|
+ return struct.pack("<BHBBBBB", P2P_ATTR_LISTEN_CHANNEL, 5,
|
|
|
+ 0x58, 0x58, 0x04, op_class, chan)
|
|
|
+
|
|
|
+def p2p_attr_group_bssid(addr):
|
|
|
+ val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
|
|
|
+ t = (P2P_ATTR_GROUP_BSSID, 6) + val
|
|
|
+ return struct.pack('<BH6B', *t)
|
|
|
+
|
|
|
+def p2p_attr_ext_listen_timing(period=0, interval=0):
|
|
|
+ return struct.pack("<BHHH", P2P_ATTR_EXT_LISTEN_TIMING, 4, period, interval)
|
|
|
+
|
|
|
+def p2p_attr_intended_interface_addr(addr):
|
|
|
+ val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
|
|
|
+ t = (P2P_ATTR_INTENDED_INTERFACE_ADDR, 6) + val
|
|
|
+ return struct.pack('<BH6B', *t)
|
|
|
+
|
|
|
+def p2p_attr_manageability(bitmap=0):
|
|
|
+ return struct.pack("<BHB", P2P_ATTR_MANAGEABILITY, 1, bitmap)
|
|
|
+
|
|
|
+def p2p_attr_channel_list():
|
|
|
+ return struct.pack("<BH3BBB11B", P2P_ATTR_CHANNEL_LIST, 16,
|
|
|
+ 0x58, 0x58, 0x04,
|
|
|
+ 81, 11, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
|
|
|
+
|
|
|
+def p2p_attr_device_info(addr, name="Test", config_methods=0, dev_type="00010050F2040001"):
|
|
|
+ val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
|
|
|
+ val2 = struct.unpack('8B', binascii.unhexlify(dev_type))
|
|
|
+ t = (P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 4 + len(name)) + val + (config_methods,) + val2 + (0,)
|
|
|
+ return struct.pack("<BH6BH8BB", *t) + struct.pack('>HH', 0x1011, len(name)) +name
|
|
|
+
|
|
|
+def p2p_attr_group_id(addr, ssid):
|
|
|
+ val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
|
|
|
+ t = (P2P_ATTR_GROUP_ID, 6 + len(ssid)) + val
|
|
|
+ return struct.pack('<BH6B', *t) + ssid
|
|
|
+
|
|
|
+def p2p_attr_operating_channel(op_class=81, chan=1):
|
|
|
+ return struct.pack("<BHBBBBB", P2P_ATTR_OPERATING_CHANNEL, 5,
|
|
|
+ 0x58, 0x58, 0x04, op_class, chan)
|
|
|
+
|
|
|
+def p2p_attr_invitation_flags(bitmap=0):
|
|
|
+ return struct.pack("<BHB", P2P_ATTR_INVITATION_FLAGS, 1, bitmap)
|
|
|
+
|
|
|
+def p2p_hdr_helper(dst, src, type=None, dialog_token=1, req=True):
|
|
|
+ msg = {}
|
|
|
+ msg['fc'] = MGMT_SUBTYPE_ACTION << 4
|
|
|
+ msg['da'] = dst
|
|
|
+ msg['sa'] = src
|
|
|
+ if req:
|
|
|
+ msg['bssid'] = dst
|
|
|
+ else:
|
|
|
+ msg['bssid'] = src
|
|
|
+ msg['payload'] = struct.pack("<BBBBBB",
|
|
|
+ ACTION_CATEG_PUBLIC, 9, 0x50, 0x6f, 0x9a, 9)
|
|
|
+ if type is not None:
|
|
|
+ msg['payload'] += struct.pack("<B", type)
|
|
|
+ if dialog_token:
|
|
|
+ msg['payload'] += struct.pack("<B", dialog_token)
|
|
|
+ return msg
|
|
|
+
|
|
|
+def p2p_hdr(dst, src, type=None, dialog_token=1):
|
|
|
+ return p2p_hdr_helper(dst, src, type, dialog_token, True)
|
|
|
+
|
|
|
+def p2p_hdr_resp(dst, src, type=None, dialog_token=1):
|
|
|
+ return p2p_hdr_helper(dst, src, type, dialog_token, False)
|
|
|
+
|
|
|
+def start_p2p(dev, apdev):
|
|
|
+ addr0 = dev[0].p2p_dev_addr()
|
|
|
+ dev[0].p2p_listen()
|
|
|
+ dev[1].p2p_find(social=True)
|
|
|
+ ev = dev[1].wait_event(["P2P-DEVICE-FOUND"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Device discovery timed out")
|
|
|
+ dev[1].p2p_stop_find()
|
|
|
+ peer = dev[1].get_peer(addr0)
|
|
|
+
|
|
|
+ bssid = apdev[0]['bssid']
|
|
|
+ params = { 'ssid': "test", 'beacon_int': "2000" }
|
|
|
+ if peer['listen_freq'] == "2412":
|
|
|
+ params['channel'] = '1'
|
|
|
+ elif peer['listen_freq'] == "2437":
|
|
|
+ params['channel'] = '6'
|
|
|
+ elif peer['listen_freq'] == "2462":
|
|
|
+ params['channel'] = '11'
|
|
|
+ hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
+ hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
+ return addr0, bssid, hapd, int(params['channel'])
|
|
|
+
|
|
|
+def p2p_probe(hapd, src, chan=1):
|
|
|
+ msg = {}
|
|
|
+ msg['fc'] = MGMT_SUBTYPE_PROBE_REQ << 4
|
|
|
+ msg['da'] = "ff:ff:ff:ff:ff:ff"
|
|
|
+ msg['sa'] = src
|
|
|
+ msg['bssid'] = "ff:ff:ff:ff:ff:ff"
|
|
|
+ attrs = p2p_attr_listen_channel(chan=chan)
|
|
|
+ msg['payload'] = ie_ssid("DIRECT-") + ie_supp_rates() + ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+def parse_p2p_public_action(payload):
|
|
|
+ pos = payload
|
|
|
+ (category, action) = struct.unpack('BB', pos[0:2])
|
|
|
+ if category != ACTION_CATEG_PUBLIC:
|
|
|
+ return None
|
|
|
+ if action != 9:
|
|
|
+ return None
|
|
|
+ pos = pos[2:]
|
|
|
+ (oui1,oui2,oui3,subtype) = struct.unpack('BBBB', pos[0:4])
|
|
|
+ if oui1 != 0x50 or oui2 != 0x6f or oui3 != 0x9a or subtype != 9:
|
|
|
+ return None
|
|
|
+ pos = pos[4:]
|
|
|
+ (subtype,dialog_token) = struct.unpack('BB', pos[0:2])
|
|
|
+ p2p = {}
|
|
|
+ p2p['subtype'] = subtype
|
|
|
+ p2p['dialog_token'] = dialog_token
|
|
|
+ p2p['data'] = pos[2:]
|
|
|
+ return p2p
|
|
|
+
|
|
|
+def test_p2p_msg_empty(dev, apdev):
|
|
|
+ """P2P protocol test: empty P2P Public Action frame"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ msg = p2p_hdr(dst, src)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+def test_p2p_msg_invitation_req(dev, apdev):
|
|
|
+ """P2P protocol tests for invitation request processing"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+
|
|
|
+ # Empty P2P Invitation Request (missing dialog token)
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=None)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ # Various p2p_parse() failure cases due to invalid attributes
|
|
|
+
|
|
|
+ # Too short attribute header
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Minimal attribute underflow
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_CAPABILITY, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Large attribute underflow
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_CAPABILITY, 0xffff, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Capability attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_CAPABILITY, 1, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Device ID attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ val = struct.unpack('5B', binascii.unhexlify("1122334455"))
|
|
|
+ t = (P2P_ATTR_DEVICE_ID, 5) + val
|
|
|
+ attrs = struct.pack('<BH5B', *t)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short GO Intent attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_GROUP_OWNER_INTENT, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Status attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_STATUS, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # null Listen channel and too short Listen Channel attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_LISTEN_CHANNEL, 0)
|
|
|
+ attrs += struct.pack("<BHB", P2P_ATTR_LISTEN_CHANNEL, 1, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # null Operating channel and too short Operating Channel attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_OPERATING_CHANNEL, 0)
|
|
|
+ attrs += struct.pack("<BHB", P2P_ATTR_OPERATING_CHANNEL, 1, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Channel List attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHBB", P2P_ATTR_CHANNEL_LIST, 2, 1, 2)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHBB", P2P_ATTR_DEVICE_INFO, 2, 1, 2)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Truncated Secondary Device Types in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6BH8BB", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1,
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x11, 0x22,
|
|
|
+ 255)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Missing Device Name in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6BH8BB8B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8,
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Invalid Device Name header in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4,
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8,
|
|
|
+ 0x11, 0x12, 0, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Invalid Device Name header length in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4,
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8,
|
|
|
+ 0x10, 0x11, 0xff, 0xff)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Invalid Device Name header length in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ devname = 'A'
|
|
|
+ attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + len(devname),
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8,
|
|
|
+ 0x10, 0x11, 0, len(devname) + 1) + devname
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Device Name filtering and too long Device Name in Device Info attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6BH8BB8B4B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + 4,
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8,
|
|
|
+ 0x10, 0x11, 0, 4,
|
|
|
+ 64, 9, 0, 64)
|
|
|
+ devname = '123456789012345678901234567890123'
|
|
|
+ attrs += struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + len(devname),
|
|
|
+ 0, 0, 0, 0, 0, 0,
|
|
|
+ 0,
|
|
|
+ 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
+ 1,
|
|
|
+ 1, 2, 3, 4, 5, 6, 7, 8,
|
|
|
+ 0x10, 0x11, 0, len(devname)) + devname
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Configuration Timeout attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_CONFIGURATION_TIMEOUT, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Intended P2P Interface Address attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_INTENDED_INTERFACE_ADDR, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short P2P Group BSSID attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_GROUP_BSSID, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short P2P Group ID attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_GROUP_ID, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too long P2P Group ID attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH6B", P2P_ATTR_GROUP_ID, 6 + 33, 0, 0, 0, 0, 0, 0) + "123456789012345678901234567890123"
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short Invitation Flags attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BH", P2P_ATTR_INVITATION_FLAGS, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Valid and too short Manageability attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_manageability()
|
|
|
+ attrs += struct.pack("<BH", P2P_ATTR_MANAGEABILITY, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Too short NoA attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", P2P_ATTR_NOTICE_OF_ABSENCE, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Valid and too short Extended Listen Timing attributes
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_ext_listen_timing(period=100, interval=50)
|
|
|
+ attrs += struct.pack("<BHBBB", P2P_ATTR_EXT_LISTEN_TIMING, 3, 0, 0, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Valid and too short Minor Reason Code attributes
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_minor_reason_code(code=2)
|
|
|
+ attrs += struct.pack("<BH", P2P_ATTR_MINOR_REASON_CODE, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ # Unknown attribute and too short OOB GO Negotiation Channel attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BHB", 99, 1, 1)
|
|
|
+ attrs += struct.pack("<BHB", P2P_ATTR_OOB_GO_NEG_CHANNEL, 1, 1)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ if hapd.mgmt_rx(timeout=0.5) is not None:
|
|
|
+ raise Exception("Unexpected management frame received")
|
|
|
+
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-DEVICE-FOUND"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on device found event")
|
|
|
+ ev = dev[0].wait_event(["P2P-INVITATION-RECEIVED"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on invitation event " + str(dialog_token))
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-INVITATION-RECEIVED"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on invitation event " + str(dialog_token))
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ #attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ #attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ #attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ #attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ #attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ #attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ #attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+ time.sleep(0.1)
|
|
|
+ dev[0].dump_monitor()
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+def test_p2p_msg_invitation_req_unknown(dev, apdev):
|
|
|
+ """P2P protocol tests for invitation request from unknown peer"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ #attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ #attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-INVITATION-RECEIVED"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on invitation event " + str(dialog_token))
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+
|
|
|
+def test_p2p_msg_invitation_no_common_channels(dev, apdev):
|
|
|
+ """P2P protocol tests for invitation request without common channels"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_invitation_flags()
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_group_bssid(src)
|
|
|
+ attrs += struct.pack("<BH3BBB", P2P_ATTR_CHANNEL_LIST, 5,
|
|
|
+ 0x58, 0x58, 0x04,
|
|
|
+ 81, 0)
|
|
|
+ attrs += p2p_attr_group_id(src, "DIRECT-foo")
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No invitation response " + str(dialog_token))
|
|
|
+ ev = dev[0].wait_event(["P2P-INVITATION-RECEIVED"], timeout=0.1)
|
|
|
+ if ev is not None:
|
|
|
+ raise Exception("Unexpected invitation event")
|
|
|
+
|
|
|
+def test_p2p_msg_pd_req(dev, apdev):
|
|
|
+ """P2P protocol tests for provision discovery request processing"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ # Too short attribute header
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+
|
|
|
+ if hapd.mgmt_rx(timeout=0.5) is not None:
|
|
|
+ raise Exception("Unexpected management frame received")
|
|
|
+
|
|
|
+ # No attributes
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = ""
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No PD response " + str(dialog_token))
|
|
|
+
|
|
|
+ # Valid request
|
|
|
+ time.sleep(0.1)
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = wsc_attr_config_methods(methods=0x1008)
|
|
|
+ msg['payload'] += ie_wsc(attrs)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-DEVICE-FOUND"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on device found event")
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on PD event")
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No PD response " + str(dialog_token))
|
|
|
+
|
|
|
+ # Unknown group
|
|
|
+ time.sleep(0.1)
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = wsc_attr_config_methods(methods=0x1008)
|
|
|
+ msg['payload'] += ie_wsc(attrs)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_group_id("02:02:02:02:02:02", "DIRECT-foo")
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No PD response " + str(dialog_token))
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=1)
|
|
|
+ if ev is not None:
|
|
|
+ raise Exception("Unexpected PD event")
|
|
|
+
|
|
|
+ # Listen channel is not yet known
|
|
|
+ if "FAIL" not in dev[0].global_request("P2P_PROV_DISC " + src + " display"):
|
|
|
+ raise Exception("Unexpected P2P_PROV_DISC success")
|
|
|
+
|
|
|
+ # Unknown peer
|
|
|
+ if "FAIL" not in dev[0].global_request("P2P_PROV_DISC 02:03:04:05:06:07 display"):
|
|
|
+ raise Exception("Unexpected P2P_PROV_DISC success (2)")
|
|
|
+
|
|
|
+def test_p2p_msg_pd(dev, apdev):
|
|
|
+ """P2P protocol tests for provision discovery request processing (known)"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ p2p_probe(hapd, src, chan=channel)
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ # Valid request
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = wsc_attr_config_methods(methods=0x1008)
|
|
|
+ msg['payload'] += ie_wsc(attrs)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-DEVICE-FOUND"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on device found event")
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on PD event")
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No PD response " + str(dialog_token))
|
|
|
+
|
|
|
+ if "FAIL" in dev[0].global_request("P2P_PROV_DISC " + src + " display"):
|
|
|
+ raise Exception("Unexpected P2P_PROV_DISC failure")
|
|
|
+ frame = hapd.mgmt_rx(timeout=1)
|
|
|
+ if frame is None:
|
|
|
+ raise Exception("No PD request " + str(dialog_token))
|
|
|
+ p2p = parse_p2p_public_action(frame['payload'])
|
|
|
+ if p2p is None:
|
|
|
+ raise Exception("Failed to parse PD request")
|
|
|
+
|
|
|
+ # invalid dialog token
|
|
|
+ msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
|
|
|
+ dialog_token=p2p['dialog_token'] + 1)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-FAILURE"], timeout=0.1)
|
|
|
+ if ev is not None:
|
|
|
+ raise Exception("Unexpected PD result event")
|
|
|
+
|
|
|
+ # valid dialog token
|
|
|
+ msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
|
|
|
+ dialog_token=p2p['dialog_token'])
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-FAILURE"], timeout=5)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on PD result event")
|
|
|
+
|
|
|
+ # valid dialog token
|
|
|
+ msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
|
|
|
+ dialog_token=p2p['dialog_token'])
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ ev = dev[0].wait_event(["P2P-PROV-DISC-FAILURE"], timeout=0.1)
|
|
|
+ if ev is not None:
|
|
|
+ raise Exception("Unexpected PD result event")
|
|
|
+
|
|
|
+def test_p2p_msg_go_neg_req(dev, apdev):
|
|
|
+ """P2P protocol tests for invitation request from unknown peer"""
|
|
|
+ dst, src, hapd, channel = start_p2p(dev, apdev)
|
|
|
+ dialog_token = 0
|
|
|
+
|
|
|
+ # invalid attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ frame = hapd.mgmt_rx(timeout=0.1)
|
|
|
+ if frame is not None:
|
|
|
+ print frame
|
|
|
+ raise Exception("Unexpected GO Neg Response")
|
|
|
+
|
|
|
+ # missing atributes
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ #attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ #attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ #attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ #attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ #attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ # SA != P2P Device address
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info("02:02:02:02:02:02", config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ # unexpected Status attribute
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ attrs += p2p_attr_status(status=P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response(1) " + str(dialog_token))
|
|
|
+ time.sleep(0.1)
|
|
|
+
|
|
|
+ # valid (with workarounds) GO Neg Req
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ #attrs = p2p_attr_capability()
|
|
|
+ #attrs += p2p_attr_go_intent()
|
|
|
+ #attrs += p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+ ev = dev[0].wait_event(["P2P-GO-NEG-REQUEST"], timeout=1)
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on GO Neg event " + str(dialog_token))
|
|
|
+
|
|
|
+ dev[0].request("P2P_CONNECT " + src + " 12345670 display auth")
|
|
|
+
|
|
|
+ # ready - missing attributes (with workarounds) GO Neg Req
|
|
|
+ time.sleep(0.1)
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ #attrs = p2p_attr_capability()
|
|
|
+ #attrs += p2p_attr_go_intent()
|
|
|
+ #attrs += p2p_attr_config_timeout()
|
|
|
+ attrs = p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+
|
|
|
+ # ready - invalid GO Intent GO Neg Req
|
|
|
+ time.sleep(0.1)
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ #attrs = p2p_attr_capability()
|
|
|
+ attrs = p2p_attr_go_intent(go_intent=16)
|
|
|
+ #attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|
|
|
+
|
|
|
+ # ready - invalid GO Neg Req (unsupported Device Password ID)
|
|
|
+ time.sleep(0.1)
|
|
|
+ dialog_token += 1
|
|
|
+ msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
|
|
|
+ attrs = p2p_attr_capability()
|
|
|
+ attrs += p2p_attr_go_intent()
|
|
|
+ attrs += p2p_attr_config_timeout()
|
|
|
+ attrs += p2p_attr_listen_channel()
|
|
|
+ attrs += p2p_attr_ext_listen_timing()
|
|
|
+ attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
|
|
|
+ attrs += p2p_attr_channel_list()
|
|
|
+ attrs += p2p_attr_device_info(src, config_methods=0x0108)
|
|
|
+ attrs += p2p_attr_operating_channel()
|
|
|
+ msg['payload'] += ie_p2p(attrs)
|
|
|
+ hapd.mgmt_tx(msg)
|
|
|
+ if hapd.mgmt_rx(timeout=1) is None:
|
|
|
+ raise Exception("No GO Neg Response " + str(dialog_token))
|