wpasupplicant.py 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825
  1. # Python class for controlling wpa_supplicant
  2. # Copyright (c) 2013-2014, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import os
  7. import time
  8. import logging
  9. import binascii
  10. import re
  11. import struct
  12. import subprocess
  13. import wpaspy
  14. logger = logging.getLogger()
  15. wpas_ctrl = '/var/run/wpa_supplicant'
  16. class WpaSupplicant:
  17. def __init__(self, ifname=None, global_iface=None):
  18. self.group_ifname = None
  19. if ifname:
  20. self.set_ifname(ifname)
  21. else:
  22. self.ifname = None
  23. self.global_iface = global_iface
  24. if global_iface:
  25. self.global_ctrl = wpaspy.Ctrl(global_iface)
  26. self.global_mon = wpaspy.Ctrl(global_iface)
  27. self.global_mon.attach()
  28. def set_ifname(self, ifname):
  29. self.ifname = ifname
  30. self.ctrl = wpaspy.Ctrl(os.path.join(wpas_ctrl, ifname))
  31. self.mon = wpaspy.Ctrl(os.path.join(wpas_ctrl, ifname))
  32. self.mon.attach()
  33. def remove_ifname(self):
  34. if self.ifname:
  35. self.mon.detach()
  36. self.mon = None
  37. self.ctrl = None
  38. self.ifname = None
  39. def interface_add(self, ifname, driver="nl80211", drv_params=None):
  40. try:
  41. groups = subprocess.check_output(["id"])
  42. group = "admin" if "(admin)" in groups else "adm"
  43. except Exception, e:
  44. group = "admin"
  45. cmd = "INTERFACE_ADD " + ifname + "\t\t" + driver + "\tDIR=/var/run/wpa_supplicant GROUP=" + group
  46. if drv_params:
  47. cmd = cmd + '\t' + drv_params
  48. if "FAIL" in self.global_request(cmd):
  49. raise Exception("Failed to add a dynamic wpa_supplicant interface")
  50. self.set_ifname(ifname)
  51. def interface_remove(self, ifname):
  52. self.remove_ifname()
  53. self.global_request("INTERFACE_REMOVE " + ifname)
  54. def request(self, cmd):
  55. logger.debug(self.ifname + ": CTRL: " + cmd)
  56. return self.ctrl.request(cmd)
  57. def global_request(self, cmd):
  58. if self.global_iface is None:
  59. self.request(cmd)
  60. else:
  61. ifname = self.ifname or self.global_iface
  62. logger.debug(ifname + ": CTRL: " + cmd)
  63. return self.global_ctrl.request(cmd)
  64. def group_request(self, cmd):
  65. if self.group_ifname and self.group_ifname != self.ifname:
  66. logger.debug(self.group_ifname + ": CTRL: " + cmd)
  67. gctrl = wpaspy.Ctrl(os.path.join(wpas_ctrl, self.group_ifname))
  68. return gctrl.request(cmd)
  69. return self.request(cmd)
  70. def ping(self):
  71. return "PONG" in self.request("PING")
  72. def reset(self):
  73. res = self.request("FLUSH")
  74. if not "OK" in res:
  75. logger.info("FLUSH to " + self.ifname + " failed: " + res)
  76. self.request("WPS_ER_STOP")
  77. self.request("SET pmf 0")
  78. self.request("SET external_sim 0")
  79. self.request("SET hessid 00:00:00:00:00:00")
  80. self.request("SET access_network_type 15")
  81. self.request("SET p2p_add_cli_chan 0")
  82. self.request("SET p2p_no_go_freq ")
  83. self.request("SET p2p_pref_chan ")
  84. self.request("SET p2p_no_group_iface 1")
  85. self.request("SET p2p_go_intent 7")
  86. self.group_ifname = None
  87. self.dump_monitor()
  88. iter = 0
  89. while iter < 60:
  90. state = self.get_driver_status_field("scan_state")
  91. if "SCAN_STARTED" in state or "SCAN_REQUESTED" in state:
  92. logger.info(self.ifname + ": Waiting for scan operation to complete before continuing")
  93. time.sleep(1)
  94. else:
  95. break
  96. iter = iter + 1
  97. if iter == 60:
  98. logger.error(self.ifname + ": Driver scan state did not clear")
  99. print "Trying to clear cfg80211/mac80211 scan state"
  100. try:
  101. cmd = ["sudo", "ifconfig", self.ifname, "down"]
  102. subprocess.call(cmd)
  103. except subprocess.CalledProcessError, e:
  104. logger.info("ifconfig failed: " + str(e.returncode))
  105. logger.info(e.output)
  106. try:
  107. cmd = ["sudo", "ifconfig", self.ifname, "up"]
  108. subprocess.call(cmd)
  109. except subprocess.CalledProcessError, e:
  110. logger.info("ifconfig failed: " + str(e.returncode))
  111. logger.info(e.output)
  112. if iter > 0:
  113. # The ongoing scan could have discovered BSSes or P2P peers
  114. logger.info("Run FLUSH again since scan was in progress")
  115. self.request("FLUSH")
  116. self.dump_monitor()
  117. if not self.ping():
  118. logger.info("No PING response from " + self.ifname + " after reset")
  119. def add_network(self):
  120. id = self.request("ADD_NETWORK")
  121. if "FAIL" in id:
  122. raise Exception("ADD_NETWORK failed")
  123. return int(id)
  124. def remove_network(self, id):
  125. id = self.request("REMOVE_NETWORK " + str(id))
  126. if "FAIL" in id:
  127. raise Exception("REMOVE_NETWORK failed")
  128. return None
  129. def get_network(self, id, field):
  130. res = self.request("GET_NETWORK " + str(id) + " " + field)
  131. if res == "FAIL\n":
  132. return None
  133. return res
  134. def set_network(self, id, field, value):
  135. res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value)
  136. if "FAIL" in res:
  137. raise Exception("SET_NETWORK failed")
  138. return None
  139. def set_network_quoted(self, id, field, value):
  140. res = self.request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"')
  141. if "FAIL" in res:
  142. raise Exception("SET_NETWORK failed")
  143. return None
  144. def list_networks(self):
  145. res = self.request("LIST_NETWORKS")
  146. lines = res.splitlines()
  147. networks = []
  148. for l in lines:
  149. if "network id" in l:
  150. continue
  151. [id,ssid,bssid,flags] = l.split('\t')
  152. network = {}
  153. network['id'] = id
  154. network['ssid'] = ssid
  155. network['bssid'] = bssid
  156. network['flags'] = flags
  157. networks.append(network)
  158. return networks
  159. def hs20_enable(self):
  160. self.request("SET interworking 1")
  161. self.request("SET hs20 1")
  162. def add_cred(self):
  163. id = self.request("ADD_CRED")
  164. if "FAIL" in id:
  165. raise Exception("ADD_CRED failed")
  166. return int(id)
  167. def remove_cred(self, id):
  168. id = self.request("REMOVE_CRED " + str(id))
  169. if "FAIL" in id:
  170. raise Exception("REMOVE_CRED failed")
  171. return None
  172. def set_cred(self, id, field, value):
  173. res = self.request("SET_CRED " + str(id) + " " + field + " " + value)
  174. if "FAIL" in res:
  175. raise Exception("SET_CRED failed")
  176. return None
  177. def set_cred_quoted(self, id, field, value):
  178. res = self.request("SET_CRED " + str(id) + " " + field + ' "' + value + '"')
  179. if "FAIL" in res:
  180. raise Exception("SET_CRED failed")
  181. return None
  182. def get_cred(self, id, field):
  183. return self.request("GET_CRED " + str(id) + " " + field)
  184. def add_cred_values(self, params):
  185. id = self.add_cred()
  186. quoted = [ "realm", "username", "password", "domain", "imsi",
  187. "excluded_ssid", "milenage", "ca_cert", "client_cert",
  188. "private_key", "domain_suffix_match", "provisioning_sp",
  189. "roaming_partner", "phase1", "phase2" ]
  190. for field in quoted:
  191. if field in params:
  192. self.set_cred_quoted(id, field, params[field])
  193. not_quoted = [ "eap", "roaming_consortium", "priority",
  194. "required_roaming_consortium", "sp_priority",
  195. "max_bss_load", "update_identifier", "req_conn_capab",
  196. "min_dl_bandwidth_home", "min_ul_bandwidth_home",
  197. "min_dl_bandwidth_roaming", "min_ul_bandwidth_roaming" ]
  198. for field in not_quoted:
  199. if field in params:
  200. self.set_cred(id, field, params[field])
  201. return id;
  202. def select_network(self, id, freq=None):
  203. if freq:
  204. extra = " freq=" + freq
  205. else:
  206. extra = ""
  207. id = self.request("SELECT_NETWORK " + str(id) + extra)
  208. if "FAIL" in id:
  209. raise Exception("SELECT_NETWORK failed")
  210. return None
  211. def connect_network(self, id, timeout=10):
  212. self.dump_monitor()
  213. self.select_network(id)
  214. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=timeout)
  215. if ev is None:
  216. raise Exception("Association with the AP timed out")
  217. self.dump_monitor()
  218. def get_status(self):
  219. res = self.request("STATUS")
  220. lines = res.splitlines()
  221. vals = dict()
  222. for l in lines:
  223. try:
  224. [name,value] = l.split('=', 1)
  225. vals[name] = value
  226. except ValueError, e:
  227. logger.info(self.ifname + ": Ignore unexpected STATUS line: " + l)
  228. return vals
  229. def get_status_field(self, field):
  230. vals = self.get_status()
  231. if field in vals:
  232. return vals[field]
  233. return None
  234. def get_group_status(self):
  235. res = self.group_request("STATUS")
  236. lines = res.splitlines()
  237. vals = dict()
  238. for l in lines:
  239. [name,value] = l.split('=', 1)
  240. vals[name] = value
  241. return vals
  242. def get_group_status_field(self, field):
  243. vals = self.get_group_status()
  244. if field in vals:
  245. return vals[field]
  246. return None
  247. def get_driver_status(self):
  248. res = self.request("STATUS-DRIVER")
  249. lines = res.splitlines()
  250. vals = dict()
  251. for l in lines:
  252. [name,value] = l.split('=', 1)
  253. vals[name] = value
  254. return vals
  255. def get_driver_status_field(self, field):
  256. vals = self.get_driver_status()
  257. if field in vals:
  258. return vals[field]
  259. return None
  260. def get_mib(self):
  261. res = self.request("MIB")
  262. lines = res.splitlines()
  263. vals = dict()
  264. for l in lines:
  265. try:
  266. [name,value] = l.split('=', 1)
  267. vals[name] = value
  268. except ValueError, e:
  269. logger.info(self.ifname + ": Ignore unexpected MIB line: " + l)
  270. return vals
  271. def p2p_dev_addr(self):
  272. return self.get_status_field("p2p_device_address")
  273. def p2p_interface_addr(self):
  274. return self.get_group_status_field("address")
  275. def p2p_listen(self):
  276. return self.global_request("P2P_LISTEN")
  277. def p2p_find(self, social=False, dev_id=None, dev_type=None):
  278. cmd = "P2P_FIND"
  279. if social:
  280. cmd = cmd + " type=social"
  281. if dev_id:
  282. cmd = cmd + " dev_id=" + dev_id
  283. if dev_type:
  284. cmd = cmd + " dev_type=" + dev_type
  285. return self.global_request(cmd)
  286. def p2p_stop_find(self):
  287. return self.global_request("P2P_STOP_FIND")
  288. def wps_read_pin(self):
  289. #TODO: make this random
  290. self.pin = "12345670"
  291. return self.pin
  292. def peer_known(self, peer, full=True):
  293. res = self.global_request("P2P_PEER " + peer)
  294. if peer.lower() not in res.lower():
  295. return False
  296. if not full:
  297. return True
  298. return "[PROBE_REQ_ONLY]" not in res
  299. def discover_peer(self, peer, full=True, timeout=15, social=True, force_find=False):
  300. logger.info(self.ifname + ": Trying to discover peer " + peer)
  301. if not force_find and self.peer_known(peer, full):
  302. return True
  303. self.p2p_find(social)
  304. count = 0
  305. while count < timeout:
  306. time.sleep(1)
  307. count = count + 1
  308. if self.peer_known(peer, full):
  309. return True
  310. return False
  311. def get_peer(self, peer):
  312. res = self.global_request("P2P_PEER " + peer)
  313. if peer.lower() not in res.lower():
  314. raise Exception("Peer information not available")
  315. lines = res.splitlines()
  316. vals = dict()
  317. for l in lines:
  318. if '=' in l:
  319. [name,value] = l.split('=', 1)
  320. vals[name] = value
  321. return vals
  322. def group_form_result(self, ev, expect_failure=False, go_neg_res=None):
  323. if expect_failure:
  324. if "P2P-GROUP-STARTED" in ev:
  325. raise Exception("Group formation succeeded when expecting failure")
  326. exp = r'<.>(P2P-GO-NEG-FAILURE) status=([0-9]*)'
  327. s = re.split(exp, ev)
  328. if len(s) < 3:
  329. return None
  330. res = {}
  331. res['result'] = 'go-neg-failed'
  332. res['status'] = int(s[2])
  333. return res
  334. if "P2P-GROUP-STARTED" not in ev:
  335. raise Exception("No P2P-GROUP-STARTED event seen")
  336. exp = r'<.>(P2P-GROUP-STARTED) ([^ ]*) ([^ ]*) ssid="(.*)" freq=([0-9]*) ((?:psk=.*)|(?:passphrase=".*")) go_dev_addr=([0-9a-f:]*) ip_addr=([0-9.]*) ip_mask=([0-9.]*) go_ip_addr=([0-9.]*)'
  337. s = re.split(exp, ev)
  338. if len(s) < 11:
  339. exp = r'<.>(P2P-GROUP-STARTED) ([^ ]*) ([^ ]*) ssid="(.*)" freq=([0-9]*) ((?:psk=.*)|(?:passphrase=".*")) go_dev_addr=([0-9a-f:]*)'
  340. s = re.split(exp, ev)
  341. if len(s) < 8:
  342. raise Exception("Could not parse P2P-GROUP-STARTED")
  343. res = {}
  344. res['result'] = 'success'
  345. res['ifname'] = s[2]
  346. self.group_ifname = s[2]
  347. res['role'] = s[3]
  348. res['ssid'] = s[4]
  349. res['freq'] = s[5]
  350. if "[PERSISTENT]" in ev:
  351. res['persistent'] = True
  352. else:
  353. res['persistent'] = False
  354. p = re.match(r'psk=([0-9a-f]*)', s[6])
  355. if p:
  356. res['psk'] = p.group(1)
  357. p = re.match(r'passphrase="(.*)"', s[6])
  358. if p:
  359. res['passphrase'] = p.group(1)
  360. res['go_dev_addr'] = s[7]
  361. if len(s) > 8 and len(s[8]) > 0:
  362. res['ip_addr'] = s[8]
  363. if len(s) > 9:
  364. res['ip_mask'] = s[9]
  365. if len(s) > 10:
  366. res['go_ip_addr'] = s[10]
  367. if go_neg_res:
  368. exp = r'<.>(P2P-GO-NEG-SUCCESS) role=(GO|client) freq=([0-9]*)'
  369. s = re.split(exp, go_neg_res)
  370. if len(s) < 4:
  371. raise Exception("Could not parse P2P-GO-NEG-SUCCESS")
  372. res['go_neg_role'] = s[2]
  373. res['go_neg_freq'] = s[3]
  374. return res
  375. def p2p_go_neg_auth(self, peer, pin, method, go_intent=None, persistent=False, freq=None):
  376. if not self.discover_peer(peer):
  377. raise Exception("Peer " + peer + " not found")
  378. self.dump_monitor()
  379. cmd = "P2P_CONNECT " + peer + " " + pin + " " + method + " auth"
  380. if go_intent:
  381. cmd = cmd + ' go_intent=' + str(go_intent)
  382. if freq:
  383. cmd = cmd + ' freq=' + str(freq)
  384. if persistent:
  385. cmd = cmd + " persistent"
  386. if "OK" in self.global_request(cmd):
  387. return None
  388. raise Exception("P2P_CONNECT (auth) failed")
  389. def p2p_go_neg_auth_result(self, timeout=1, expect_failure=False):
  390. go_neg_res = None
  391. ev = self.wait_global_event(["P2P-GO-NEG-SUCCESS",
  392. "P2P-GO-NEG-FAILURE"], timeout);
  393. if ev is None:
  394. if expect_failure:
  395. return None
  396. raise Exception("Group formation timed out")
  397. if "P2P-GO-NEG-SUCCESS" in ev:
  398. go_neg_res = ev
  399. ev = self.wait_global_event(["P2P-GROUP-STARTED"], timeout);
  400. if ev is None:
  401. if expect_failure:
  402. return None
  403. raise Exception("Group formation timed out")
  404. self.dump_monitor()
  405. return self.group_form_result(ev, expect_failure, go_neg_res)
  406. def p2p_go_neg_init(self, peer, pin, method, timeout=0, go_intent=None, expect_failure=False, persistent=False, freq=None, provdisc=False):
  407. if not self.discover_peer(peer):
  408. raise Exception("Peer " + peer + " not found")
  409. self.dump_monitor()
  410. if pin:
  411. cmd = "P2P_CONNECT " + peer + " " + pin + " " + method
  412. else:
  413. cmd = "P2P_CONNECT " + peer + " " + method
  414. if go_intent:
  415. cmd = cmd + ' go_intent=' + str(go_intent)
  416. if freq:
  417. cmd = cmd + ' freq=' + str(freq)
  418. if persistent:
  419. cmd = cmd + " persistent"
  420. if provdisc:
  421. cmd = cmd + " provdisc"
  422. if "OK" in self.global_request(cmd):
  423. if timeout == 0:
  424. self.dump_monitor()
  425. return None
  426. go_neg_res = None
  427. ev = self.wait_global_event(["P2P-GO-NEG-SUCCESS",
  428. "P2P-GO-NEG-FAILURE"], timeout)
  429. if ev is None:
  430. if expect_failure:
  431. return None
  432. raise Exception("Group formation timed out")
  433. if "P2P-GO-NEG-SUCCESS" in ev:
  434. go_neg_res = ev
  435. ev = self.wait_global_event(["P2P-GROUP-STARTED"], timeout)
  436. if ev is None:
  437. if expect_failure:
  438. return None
  439. raise Exception("Group formation timed out")
  440. self.dump_monitor()
  441. return self.group_form_result(ev, expect_failure, go_neg_res)
  442. raise Exception("P2P_CONNECT failed")
  443. def wait_event(self, events, timeout=10):
  444. start = os.times()[4]
  445. while True:
  446. while self.mon.pending():
  447. ev = self.mon.recv()
  448. logger.debug(self.ifname + ": " + ev)
  449. for event in events:
  450. if event in ev:
  451. return ev
  452. now = os.times()[4]
  453. remaining = start + timeout - now
  454. if remaining <= 0:
  455. break
  456. if not self.mon.pending(timeout=remaining):
  457. break
  458. return None
  459. def wait_global_event(self, events, timeout):
  460. if self.global_iface is None:
  461. self.wait_event(events, timeout)
  462. else:
  463. start = os.times()[4]
  464. while True:
  465. while self.global_mon.pending():
  466. ev = self.global_mon.recv()
  467. logger.debug(self.ifname + "(global): " + ev)
  468. for event in events:
  469. if event in ev:
  470. return ev
  471. now = os.times()[4]
  472. remaining = start + timeout - now
  473. if remaining <= 0:
  474. break
  475. if not self.global_mon.pending(timeout=remaining):
  476. break
  477. return None
  478. def wait_go_ending_session(self):
  479. ev = self.wait_event(["P2P-GROUP-REMOVED"], timeout=3)
  480. if ev is None:
  481. raise Exception("Group removal event timed out")
  482. if "reason=GO_ENDING_SESSION" not in ev:
  483. raise Exception("Unexpected group removal reason")
  484. def dump_monitor(self):
  485. while self.mon.pending():
  486. ev = self.mon.recv()
  487. logger.debug(self.ifname + ": " + ev)
  488. while self.global_mon.pending():
  489. ev = self.global_mon.recv()
  490. logger.debug(self.ifname + "(global): " + ev)
  491. def remove_group(self, ifname=None):
  492. if ifname is None:
  493. ifname = self.group_ifname if self.group_ifname else self.ifname
  494. if "OK" not in self.global_request("P2P_GROUP_REMOVE " + ifname):
  495. raise Exception("Group could not be removed")
  496. self.group_ifname = None
  497. def p2p_start_go(self, persistent=None, freq=None):
  498. self.dump_monitor()
  499. cmd = "P2P_GROUP_ADD"
  500. if persistent is None:
  501. pass
  502. elif persistent is True:
  503. cmd = cmd + " persistent"
  504. else:
  505. cmd = cmd + " persistent=" + str(persistent)
  506. if freq:
  507. cmd = cmd + " freq=" + str(freq)
  508. if "OK" in self.global_request(cmd):
  509. ev = self.wait_global_event(["P2P-GROUP-STARTED"], timeout=5)
  510. if ev is None:
  511. raise Exception("GO start up timed out")
  512. self.dump_monitor()
  513. return self.group_form_result(ev)
  514. raise Exception("P2P_GROUP_ADD failed")
  515. def p2p_go_authorize_client(self, pin):
  516. cmd = "WPS_PIN any " + pin
  517. if "FAIL" in self.group_request(cmd):
  518. raise Exception("Failed to authorize client connection on GO")
  519. return None
  520. def p2p_go_authorize_client_pbc(self):
  521. cmd = "WPS_PBC"
  522. if "FAIL" in self.group_request(cmd):
  523. raise Exception("Failed to authorize client connection on GO")
  524. return None
  525. def p2p_connect_group(self, go_addr, pin, timeout=0, social=False):
  526. self.dump_monitor()
  527. if not self.discover_peer(go_addr, social=social):
  528. raise Exception("GO " + go_addr + " not found")
  529. self.dump_monitor()
  530. cmd = "P2P_CONNECT " + go_addr + " " + pin + " join"
  531. if "OK" in self.global_request(cmd):
  532. if timeout == 0:
  533. self.dump_monitor()
  534. return None
  535. ev = self.wait_global_event(["P2P-GROUP-STARTED"], timeout)
  536. if ev is None:
  537. raise Exception("Joining the group timed out")
  538. self.dump_monitor()
  539. return self.group_form_result(ev)
  540. raise Exception("P2P_CONNECT(join) failed")
  541. def tdls_setup(self, peer):
  542. cmd = "TDLS_SETUP " + peer
  543. if "FAIL" in self.group_request(cmd):
  544. raise Exception("Failed to request TDLS setup")
  545. return None
  546. def tdls_teardown(self, peer):
  547. cmd = "TDLS_TEARDOWN " + peer
  548. if "FAIL" in self.group_request(cmd):
  549. raise Exception("Failed to request TDLS teardown")
  550. return None
  551. def connect(self, ssid=None, ssid2=None, **kwargs):
  552. logger.info("Connect STA " + self.ifname + " to AP")
  553. id = self.add_network()
  554. if ssid:
  555. self.set_network_quoted(id, "ssid", ssid)
  556. elif ssid2:
  557. self.set_network(id, "ssid", ssid2)
  558. quoted = [ "psk", "identity", "anonymous_identity", "password",
  559. "ca_cert", "client_cert", "private_key",
  560. "private_key_passwd", "ca_cert2", "client_cert2",
  561. "private_key2", "phase1", "phase2", "domain_suffix_match",
  562. "altsubject_match", "subject_match", "pac_file", "dh_file" ]
  563. for field in quoted:
  564. if field in kwargs and kwargs[field]:
  565. self.set_network_quoted(id, field, kwargs[field])
  566. not_quoted = [ "proto", "key_mgmt", "ieee80211w", "pairwise",
  567. "group", "wep_key0", "scan_freq", "eap",
  568. "eapol_flags", "fragment_size", "scan_ssid", "auth_alg",
  569. "wpa_ptk_rekey", "disable_ht", "disable_vht", "bssid" ]
  570. for field in not_quoted:
  571. if field in kwargs and kwargs[field]:
  572. self.set_network(id, field, kwargs[field])
  573. if "raw_psk" in kwargs and kwargs['raw_psk']:
  574. self.set_network(id, "psk", kwargs['raw_psk'])
  575. if "password_hex" in kwargs and kwargs['password_hex']:
  576. self.set_network(id, "password", kwargs['password_hex'])
  577. if "peerkey" in kwargs and kwargs['peerkey']:
  578. self.set_network(id, "peerkey", "1")
  579. if "okc" in kwargs and kwargs['okc']:
  580. self.set_network(id, "proactive_key_caching", "1")
  581. if "ocsp" in kwargs and kwargs['ocsp']:
  582. self.set_network(id, "ocsp", str(kwargs['ocsp']))
  583. if "only_add_network" in kwargs and kwargs['only_add_network']:
  584. return id
  585. if "wait_connect" not in kwargs or kwargs['wait_connect']:
  586. if "eap" in kwargs:
  587. self.connect_network(id, timeout=20)
  588. else:
  589. self.connect_network(id)
  590. else:
  591. self.dump_monitor()
  592. self.select_network(id)
  593. return id
  594. def scan(self, type=None, freq=None, no_wait=False):
  595. if type:
  596. cmd = "SCAN TYPE=" + type
  597. else:
  598. cmd = "SCAN"
  599. if freq:
  600. cmd = cmd + " freq=" + freq
  601. if not no_wait:
  602. self.dump_monitor()
  603. if not "OK" in self.request(cmd):
  604. raise Exception("Failed to trigger scan")
  605. if no_wait:
  606. return
  607. ev = self.wait_event(["CTRL-EVENT-SCAN-RESULTS"], 15)
  608. if ev is None:
  609. raise Exception("Scan timed out")
  610. def roam(self, bssid, fail_test=False):
  611. self.dump_monitor()
  612. self.request("ROAM " + bssid)
  613. if fail_test:
  614. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  615. if ev is not None:
  616. raise Exception("Unexpected connection")
  617. self.dump_monitor()
  618. return
  619. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=10)
  620. if ev is None:
  621. raise Exception("Roaming with the AP timed out")
  622. self.dump_monitor()
  623. def roam_over_ds(self, bssid, fail_test=False):
  624. self.dump_monitor()
  625. self.request("FT_DS " + bssid)
  626. if fail_test:
  627. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  628. if ev is not None:
  629. raise Exception("Unexpected connection")
  630. self.dump_monitor()
  631. return
  632. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=10)
  633. if ev is None:
  634. raise Exception("Roaming with the AP timed out")
  635. self.dump_monitor()
  636. def wps_reg(self, bssid, pin, new_ssid=None, key_mgmt=None, cipher=None,
  637. new_passphrase=None, no_wait=False):
  638. self.dump_monitor()
  639. if new_ssid:
  640. self.request("WPS_REG " + bssid + " " + pin + " " +
  641. new_ssid.encode("hex") + " " + key_mgmt + " " +
  642. cipher + " " + new_passphrase.encode("hex"))
  643. if no_wait:
  644. return
  645. ev = self.wait_event(["WPS-SUCCESS"], timeout=15)
  646. else:
  647. self.request("WPS_REG " + bssid + " " + pin)
  648. if no_wait:
  649. return
  650. ev = self.wait_event(["WPS-CRED-RECEIVED"], timeout=15)
  651. if ev is None:
  652. raise Exception("WPS cred timed out")
  653. ev = self.wait_event(["WPS-FAIL"], timeout=15)
  654. if ev is None:
  655. raise Exception("WPS timed out")
  656. ev = self.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
  657. if ev is None:
  658. raise Exception("Association with the AP timed out")
  659. def relog(self):
  660. self.request("RELOG")
  661. def wait_completed(self, timeout=10):
  662. for i in range(0, timeout * 2):
  663. if self.get_status_field("wpa_state") == "COMPLETED":
  664. return
  665. time.sleep(0.5)
  666. raise Exception("Timeout while waiting for COMPLETED state")
  667. def get_capability(self, field):
  668. res = self.request("GET_CAPABILITY " + field)
  669. if "FAIL" in res:
  670. return None
  671. return res.split(' ')
  672. def get_bss(self, bssid):
  673. res = self.request("BSS " + bssid)
  674. lines = res.splitlines()
  675. vals = dict()
  676. for l in lines:
  677. [name,value] = l.split('=', 1)
  678. vals[name] = value
  679. return vals
  680. def get_pmksa(self, bssid):
  681. res = self.request("PMKSA")
  682. lines = res.splitlines()
  683. for l in lines:
  684. if bssid not in l:
  685. continue
  686. vals = dict()
  687. [index,aa,pmkid,expiration,opportunistic] = l.split(' ')
  688. vals['index'] = index
  689. vals['pmkid'] = pmkid
  690. vals['expiration'] = expiration
  691. vals['opportunistic'] = opportunistic
  692. return vals
  693. return None
  694. def get_sta(self, addr, info=None, next=False):
  695. cmd = "STA-NEXT " if next else "STA "
  696. if addr is None:
  697. res = self.request("STA-FIRST")
  698. elif info:
  699. res = self.request(cmd + addr + " " + info)
  700. else:
  701. res = self.request(cmd + addr)
  702. lines = res.splitlines()
  703. vals = dict()
  704. first = True
  705. for l in lines:
  706. if first:
  707. vals['addr'] = l
  708. first = False
  709. else:
  710. [name,value] = l.split('=', 1)
  711. vals[name] = value
  712. return vals
  713. def mgmt_rx(self, timeout=5):
  714. ev = self.wait_event(["MGMT-RX"], timeout=timeout)
  715. if ev is None:
  716. return None
  717. msg = {}
  718. items = ev.split(' ')
  719. field,val = items[1].split('=')
  720. if field != "freq":
  721. raise Exception("Unexpected MGMT-RX event format: " + ev)
  722. msg['freq'] = val
  723. frame = binascii.unhexlify(items[4])
  724. msg['frame'] = frame
  725. hdr = struct.unpack('<HH6B6B6BH', frame[0:24])
  726. msg['fc'] = hdr[0]
  727. msg['subtype'] = (hdr[0] >> 4) & 0xf
  728. hdr = hdr[1:]
  729. msg['duration'] = hdr[0]
  730. hdr = hdr[1:]
  731. msg['da'] = "%02x:%02x:%02x:%02x:%02x:%02x" % hdr[0:6]
  732. hdr = hdr[6:]
  733. msg['sa'] = "%02x:%02x:%02x:%02x:%02x:%02x" % hdr[0:6]
  734. hdr = hdr[6:]
  735. msg['bssid'] = "%02x:%02x:%02x:%02x:%02x:%02x" % hdr[0:6]
  736. hdr = hdr[6:]
  737. msg['seq_ctrl'] = hdr[0]
  738. msg['payload'] = frame[24:]
  739. return msg