test_p2p_messages.py 86 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083
  1. # P2P protocol tests for various messages
  2. # Copyright (c) 2014-2015, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import binascii
  7. import struct
  8. import time
  9. import logging
  10. logger = logging.getLogger()
  11. import hostapd
  12. from p2p_utils import *
  13. from test_gas import anqp_adv_proto
  14. def ie_ssid(ssid):
  15. return struct.pack("<BB", WLAN_EID_SSID, len(ssid)) + ssid
  16. def ie_supp_rates():
  17. return struct.pack("<BBBBBBBBBB", WLAN_EID_SUPP_RATES, 8,
  18. 2*6, 2*9, 2*12, 2*18, 2*24, 2*36, 2*48, 2*54)
  19. def ie_p2p(attrs):
  20. return struct.pack("<BBBBBB", WLAN_EID_VENDOR_SPECIFIC, 4 + len(attrs),
  21. 0x50, 0x6f, 0x9a, 9) + attrs
  22. def ie_wsc(attrs):
  23. return struct.pack("<BBBBBB", WLAN_EID_VENDOR_SPECIFIC, 4 + len(attrs),
  24. 0x00, 0x50, 0xf2, 4) + attrs
  25. def wsc_attr_config_methods(methods=0):
  26. return struct.pack(">HHH", WSC_ATTR_CONFIG_METHODS, 2, methods)
  27. def p2p_attr_status(status=P2P_SC_SUCCESS):
  28. return struct.pack("<BHB", P2P_ATTR_STATUS, 1, status)
  29. def p2p_attr_minor_reason_code(code=0):
  30. return struct.pack("<BHB", P2P_ATTR_MINOR_REASON_CODE, 1, code)
  31. def p2p_attr_capability(dev_capab=0, group_capab=0):
  32. return struct.pack("<BHBB", P2P_ATTR_CAPABILITY, 2, dev_capab, group_capab)
  33. def p2p_attr_device_id(addr):
  34. val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
  35. t = (P2P_ATTR_DEVICE_ID, 6) + val
  36. return struct.pack('<BH6B', *t)
  37. def p2p_attr_go_intent(go_intent=0, tie_breaker=0):
  38. return struct.pack("<BHB", P2P_ATTR_GROUP_OWNER_INTENT, 1,
  39. (go_intent << 1) | (tie_breaker & 0x01))
  40. def p2p_attr_config_timeout(go_config_timeout=0, client_config_timeout=0):
  41. return struct.pack("<BHBB", P2P_ATTR_CONFIGURATION_TIMEOUT, 2,
  42. go_config_timeout, client_config_timeout)
  43. def p2p_attr_listen_channel(op_class=81, chan=1):
  44. return struct.pack("<BHBBBBB", P2P_ATTR_LISTEN_CHANNEL, 5,
  45. 0x58, 0x58, 0x04, op_class, chan)
  46. def p2p_attr_group_bssid(addr):
  47. val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
  48. t = (P2P_ATTR_GROUP_BSSID, 6) + val
  49. return struct.pack('<BH6B', *t)
  50. def p2p_attr_ext_listen_timing(period=0, interval=0):
  51. return struct.pack("<BHHH", P2P_ATTR_EXT_LISTEN_TIMING, 4, period, interval)
  52. def p2p_attr_intended_interface_addr(addr):
  53. val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
  54. t = (P2P_ATTR_INTENDED_INTERFACE_ADDR, 6) + val
  55. return struct.pack('<BH6B', *t)
  56. def p2p_attr_manageability(bitmap=0):
  57. return struct.pack("<BHB", P2P_ATTR_MANAGEABILITY, 1, bitmap)
  58. def p2p_attr_channel_list():
  59. return struct.pack("<BH3BBB11B", P2P_ATTR_CHANNEL_LIST, 16,
  60. 0x58, 0x58, 0x04,
  61. 81, 11, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
  62. def p2p_attr_device_info(addr, name="Test", config_methods=0, dev_type="00010050F2040001"):
  63. val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
  64. val2 = struct.unpack('8B', binascii.unhexlify(dev_type))
  65. t = (P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 4 + len(name)) + val
  66. t2 = val2 + (0,)
  67. return struct.pack("<BH6B", *t) + struct.pack(">H", config_methods) + struct.pack("8BB", *t2) + struct.pack('>HH', 0x1011, len(name)) +name
  68. def p2p_attr_group_id(addr, ssid):
  69. val = struct.unpack('6B', binascii.unhexlify(addr.replace(':','')))
  70. t = (P2P_ATTR_GROUP_ID, 6 + len(ssid)) + val
  71. return struct.pack('<BH6B', *t) + ssid
  72. def p2p_attr_operating_channel(op_class=81, chan=1):
  73. return struct.pack("<BHBBBBB", P2P_ATTR_OPERATING_CHANNEL, 5,
  74. 0x58, 0x58, 0x04, op_class, chan)
  75. def p2p_attr_invitation_flags(bitmap=0):
  76. return struct.pack("<BHB", P2P_ATTR_INVITATION_FLAGS, 1, bitmap)
  77. def p2p_hdr_helper(dst, src, type=None, dialog_token=1, req=True):
  78. msg = {}
  79. msg['fc'] = MGMT_SUBTYPE_ACTION << 4
  80. msg['da'] = dst
  81. msg['sa'] = src
  82. if req:
  83. msg['bssid'] = dst
  84. else:
  85. msg['bssid'] = src
  86. msg['payload'] = struct.pack("<BBBBBB",
  87. ACTION_CATEG_PUBLIC, 9, 0x50, 0x6f, 0x9a, 9)
  88. if type is not None:
  89. msg['payload'] += struct.pack("<B", type)
  90. if dialog_token:
  91. msg['payload'] += struct.pack("<B", dialog_token)
  92. return msg
  93. def p2p_hdr(dst, src, type=None, dialog_token=1):
  94. return p2p_hdr_helper(dst, src, type, dialog_token, True)
  95. def p2p_hdr_resp(dst, src, type=None, dialog_token=1):
  96. return p2p_hdr_helper(dst, src, type, dialog_token, False)
  97. def start_p2p(dev, apdev):
  98. addr0 = dev[0].p2p_dev_addr()
  99. dev[0].p2p_listen()
  100. dev[1].p2p_find(social=True)
  101. ev = dev[1].wait_global_event(["P2P-DEVICE-FOUND"], timeout=5)
  102. if ev is None:
  103. raise Exception("Device discovery timed out")
  104. dev[1].p2p_stop_find()
  105. peer = dev[1].get_peer(addr0)
  106. bssid = apdev[0]['bssid']
  107. params = { 'ssid': "test", 'beacon_int': "2000" }
  108. if peer['listen_freq'] == "2412":
  109. params['channel'] = '1'
  110. elif peer['listen_freq'] == "2437":
  111. params['channel'] = '6'
  112. elif peer['listen_freq'] == "2462":
  113. params['channel'] = '11'
  114. hapd = hostapd.add_ap(apdev[0], params)
  115. hapd.set("ext_mgmt_frame_handling", "1")
  116. return addr0, bssid, hapd, int(params['channel'])
  117. def p2p_probe(hapd, src, chan=1):
  118. msg = {}
  119. msg['fc'] = MGMT_SUBTYPE_PROBE_REQ << 4
  120. msg['da'] = "ff:ff:ff:ff:ff:ff"
  121. msg['sa'] = src
  122. msg['bssid'] = "ff:ff:ff:ff:ff:ff"
  123. attrs = p2p_attr_listen_channel(chan=chan)
  124. msg['payload'] = ie_ssid("DIRECT-") + ie_supp_rates() + ie_p2p(attrs)
  125. hapd.mgmt_tx(msg)
  126. def parse_p2p_public_action(payload):
  127. pos = payload
  128. (category, action) = struct.unpack('BB', pos[0:2])
  129. if category != ACTION_CATEG_PUBLIC:
  130. return None
  131. if action != 9:
  132. return None
  133. pos = pos[2:]
  134. (oui1,oui2,oui3,subtype) = struct.unpack('BBBB', pos[0:4])
  135. if oui1 != 0x50 or oui2 != 0x6f or oui3 != 0x9a or subtype != 9:
  136. return None
  137. pos = pos[4:]
  138. (subtype,dialog_token) = struct.unpack('BB', pos[0:2])
  139. p2p = {}
  140. p2p['subtype'] = subtype
  141. p2p['dialog_token'] = dialog_token
  142. pos = pos[2:]
  143. p2p['elements'] = pos
  144. while len(pos) > 2:
  145. (id,elen) = struct.unpack('BB', pos[0:2])
  146. pos = pos[2:]
  147. if elen > len(pos):
  148. raise Exception("Truncated IE in P2P Public Action frame (elen=%d left=%d)" % (elen, len(pos)))
  149. if id == WLAN_EID_VENDOR_SPECIFIC:
  150. if elen < 4:
  151. raise Exception("Too short vendor specific IE in P2P Public Action frame (elen=%d)" % elen)
  152. (oui1,oui2,oui3,subtype) = struct.unpack('BBBB', pos[0:4])
  153. if oui1 == 0x50 and oui2 == 0x6f and oui3 == 0x9a and subtype == 9:
  154. if 'p2p' in p2p:
  155. p2p['p2p'] += pos[4:elen]
  156. else:
  157. p2p['p2p'] = pos[4:elen]
  158. if oui1 == 0x00 and oui2 == 0x50 and oui3 == 0xf2 and subtype == 4:
  159. p2p['wsc'] = pos[4:elen]
  160. pos = pos[elen:]
  161. if len(pos) > 0:
  162. raise Exception("Invalid element in P2P Public Action frame")
  163. if 'p2p' in p2p:
  164. p2p['p2p_attrs'] = {}
  165. pos = p2p['p2p']
  166. while len(pos) >= 3:
  167. (id,alen) = struct.unpack('<BH', pos[0:3])
  168. pos = pos[3:]
  169. if alen > len(pos):
  170. logger.info("P2P payload: " + binascii.hexlify(p2p['p2p']))
  171. raise Exception("Truncated P2P attribute in P2P Public Action frame (alen=%d left=%d p2p-payload=%d)" % (alen, len(pos), len(p2p['p2p'])))
  172. p2p['p2p_attrs'][id] = pos[0:alen]
  173. pos = pos[alen:]
  174. if P2P_ATTR_STATUS in p2p['p2p_attrs']:
  175. p2p['p2p_status'] = struct.unpack('B', p2p['p2p_attrs'][P2P_ATTR_STATUS])[0]
  176. if 'wsc' in p2p:
  177. p2p['wsc_attrs'] = {}
  178. pos = p2p['wsc']
  179. while len(pos) >= 4:
  180. (id,alen) = struct.unpack('>HH', pos[0:4])
  181. pos = pos[4:]
  182. if alen > len(pos):
  183. logger.info("WSC payload: " + binascii.hexlify(p2p['wsc']))
  184. raise Exception("Truncated WSC attribute in P2P Public Action frame (alen=%d left=%d wsc-payload=%d)" % (alen, len(pos), len(p2p['wsc'])))
  185. p2p['wsc_attrs'][id] = pos[0:alen]
  186. pos = pos[alen:]
  187. return p2p
  188. def test_p2p_msg_empty(dev, apdev):
  189. """P2P protocol test: empty P2P Public Action frame"""
  190. dst, src, hapd, channel = start_p2p(dev, apdev)
  191. msg = p2p_hdr(dst, src)
  192. hapd.mgmt_tx(msg)
  193. def test_p2p_msg_long_ssid(dev, apdev):
  194. """P2P protocol test: Too long SSID in P2P Public Action frame"""
  195. dst, src, hapd, channel = start_p2p(dev, apdev)
  196. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=1)
  197. attrs = p2p_attr_config_timeout()
  198. attrs += p2p_attr_invitation_flags()
  199. attrs += p2p_attr_operating_channel()
  200. attrs += p2p_attr_group_bssid(src)
  201. attrs += p2p_attr_channel_list()
  202. attrs += p2p_attr_group_id(src, 'DIRECT-foo')
  203. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  204. msg['payload'] += ie_p2p(attrs)
  205. msg['payload'] += ie_ssid(255 * 'A')
  206. hapd.mgmt_tx(msg)
  207. ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=5)
  208. if ev is None:
  209. raise Exception("Timeout on device found event")
  210. def test_p2p_msg_long_dev_name(dev, apdev):
  211. """P2P protocol test: Too long Device Name in P2P Public Action frame"""
  212. dst, src, hapd, channel = start_p2p(dev, apdev)
  213. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=1)
  214. attrs = p2p_attr_config_timeout()
  215. attrs += p2p_attr_invitation_flags()
  216. attrs += p2p_attr_operating_channel()
  217. attrs += p2p_attr_group_bssid(src)
  218. attrs += p2p_attr_channel_list()
  219. attrs += p2p_attr_group_id(src, 'DIRECT-foo')
  220. attrs += p2p_attr_device_info(src, config_methods=0x0108,
  221. name="123456789012345678901234567890123")
  222. msg['payload'] += ie_p2p(attrs)
  223. hapd.mgmt_tx(msg)
  224. ev = dev[0].wait_event(["P2P-DEVICE-FOUND"], timeout=0.1)
  225. if ev is not None:
  226. raise Exception("Unexpected device found event")
  227. def test_p2p_msg_invitation_req(dev, apdev):
  228. """P2P protocol tests for invitation request processing"""
  229. dst, src, hapd, channel = start_p2p(dev, apdev)
  230. # Empty P2P Invitation Request (missing dialog token)
  231. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=None)
  232. hapd.mgmt_tx(msg)
  233. dialog_token = 0
  234. # Various p2p_parse() failure cases due to invalid attributes
  235. # Too short attribute header
  236. dialog_token += 1
  237. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  238. attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
  239. msg['payload'] += ie_p2p(attrs)
  240. hapd.mgmt_tx(msg)
  241. # Minimal attribute underflow
  242. dialog_token += 1
  243. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  244. attrs = struct.pack("<BH", P2P_ATTR_CAPABILITY, 1)
  245. msg['payload'] += ie_p2p(attrs)
  246. hapd.mgmt_tx(msg)
  247. # Large attribute underflow
  248. dialog_token += 1
  249. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  250. attrs = struct.pack("<BHB", P2P_ATTR_CAPABILITY, 0xffff, 1)
  251. msg['payload'] += ie_p2p(attrs)
  252. hapd.mgmt_tx(msg)
  253. # Too short Capability attribute
  254. dialog_token += 1
  255. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  256. attrs = struct.pack("<BHB", P2P_ATTR_CAPABILITY, 1, 0)
  257. msg['payload'] += ie_p2p(attrs)
  258. hapd.mgmt_tx(msg)
  259. # Too short Device ID attribute
  260. dialog_token += 1
  261. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  262. val = struct.unpack('5B', binascii.unhexlify("1122334455"))
  263. t = (P2P_ATTR_DEVICE_ID, 5) + val
  264. attrs = struct.pack('<BH5B', *t)
  265. msg['payload'] += ie_p2p(attrs)
  266. hapd.mgmt_tx(msg)
  267. # Too short GO Intent attribute
  268. dialog_token += 1
  269. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  270. attrs = struct.pack("<BH", P2P_ATTR_GROUP_OWNER_INTENT, 0)
  271. msg['payload'] += ie_p2p(attrs)
  272. hapd.mgmt_tx(msg)
  273. # Too short Status attribute
  274. dialog_token += 1
  275. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  276. attrs = struct.pack("<BH", P2P_ATTR_STATUS, 0)
  277. msg['payload'] += ie_p2p(attrs)
  278. hapd.mgmt_tx(msg)
  279. # null Listen channel and too short Listen Channel attribute
  280. dialog_token += 1
  281. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  282. attrs = struct.pack("<BH", P2P_ATTR_LISTEN_CHANNEL, 0)
  283. attrs += struct.pack("<BHB", P2P_ATTR_LISTEN_CHANNEL, 1, 0)
  284. msg['payload'] += ie_p2p(attrs)
  285. hapd.mgmt_tx(msg)
  286. # null Operating channel and too short Operating Channel attribute
  287. dialog_token += 1
  288. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  289. attrs = struct.pack("<BH", P2P_ATTR_OPERATING_CHANNEL, 0)
  290. attrs += struct.pack("<BHB", P2P_ATTR_OPERATING_CHANNEL, 1, 0)
  291. msg['payload'] += ie_p2p(attrs)
  292. hapd.mgmt_tx(msg)
  293. # Too short Channel List attribute
  294. dialog_token += 1
  295. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  296. attrs = struct.pack("<BHBB", P2P_ATTR_CHANNEL_LIST, 2, 1, 2)
  297. msg['payload'] += ie_p2p(attrs)
  298. hapd.mgmt_tx(msg)
  299. # Too short Device Info attribute
  300. dialog_token += 1
  301. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  302. attrs = struct.pack("<BHBB", P2P_ATTR_DEVICE_INFO, 2, 1, 2)
  303. msg['payload'] += ie_p2p(attrs)
  304. hapd.mgmt_tx(msg)
  305. # Truncated Secondary Device Types in Device Info attribute
  306. dialog_token += 1
  307. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  308. attrs = struct.pack("<BH6BH8BB", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1,
  309. 0, 0, 0, 0, 0, 0,
  310. 0,
  311. 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x11, 0x22,
  312. 255)
  313. msg['payload'] += ie_p2p(attrs)
  314. hapd.mgmt_tx(msg)
  315. # Missing Device Name in Device Info attribute
  316. dialog_token += 1
  317. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  318. attrs = struct.pack("<BH6BH8BB8B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8,
  319. 0, 0, 0, 0, 0, 0,
  320. 0,
  321. 0, 0, 0, 0, 0, 0, 0, 0,
  322. 1,
  323. 1, 2, 3, 4, 5, 6, 7, 8)
  324. msg['payload'] += ie_p2p(attrs)
  325. hapd.mgmt_tx(msg)
  326. # Invalid Device Name header in Device Info attribute
  327. dialog_token += 1
  328. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  329. attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4,
  330. 0, 0, 0, 0, 0, 0,
  331. 0,
  332. 0, 0, 0, 0, 0, 0, 0, 0,
  333. 1,
  334. 1, 2, 3, 4, 5, 6, 7, 8,
  335. 0x11, 0x12, 0, 0)
  336. msg['payload'] += ie_p2p(attrs)
  337. hapd.mgmt_tx(msg)
  338. # Invalid Device Name header length in Device Info attribute
  339. dialog_token += 1
  340. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  341. attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4,
  342. 0, 0, 0, 0, 0, 0,
  343. 0,
  344. 0, 0, 0, 0, 0, 0, 0, 0,
  345. 1,
  346. 1, 2, 3, 4, 5, 6, 7, 8,
  347. 0x10, 0x11, 0xff, 0xff)
  348. msg['payload'] += ie_p2p(attrs)
  349. hapd.mgmt_tx(msg)
  350. # Invalid Device Name header length in Device Info attribute
  351. dialog_token += 1
  352. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  353. devname = 'A'
  354. attrs = struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + len(devname),
  355. 0, 0, 0, 0, 0, 0,
  356. 0,
  357. 0, 0, 0, 0, 0, 0, 0, 0,
  358. 1,
  359. 1, 2, 3, 4, 5, 6, 7, 8,
  360. 0x10, 0x11, 0, len(devname) + 1) + devname
  361. msg['payload'] += ie_p2p(attrs)
  362. hapd.mgmt_tx(msg)
  363. # Device Name filtering and too long Device Name in Device Info attribute
  364. dialog_token += 1
  365. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  366. attrs = struct.pack("<BH6BH8BB8B4B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + 4,
  367. 0, 0, 0, 0, 0, 0,
  368. 0,
  369. 0, 0, 0, 0, 0, 0, 0, 0,
  370. 1,
  371. 1, 2, 3, 4, 5, 6, 7, 8,
  372. 0x10, 0x11, 0, 4,
  373. 64, 9, 0, 64)
  374. devname = '123456789012345678901234567890123'
  375. attrs += struct.pack("<BH6BH8BB8B4B", P2P_ATTR_DEVICE_INFO, 6 + 2 + 8 + 1 + 8 + 4 + len(devname),
  376. 0, 0, 0, 0, 0, 0,
  377. 0,
  378. 0, 0, 0, 0, 0, 0, 0, 0,
  379. 1,
  380. 1, 2, 3, 4, 5, 6, 7, 8,
  381. 0x10, 0x11, 0, len(devname)) + devname
  382. msg['payload'] += ie_p2p(attrs)
  383. hapd.mgmt_tx(msg)
  384. # Too short Configuration Timeout attribute
  385. dialog_token += 1
  386. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  387. attrs = struct.pack("<BHB", P2P_ATTR_CONFIGURATION_TIMEOUT, 1, 1)
  388. msg['payload'] += ie_p2p(attrs)
  389. hapd.mgmt_tx(msg)
  390. # Too short Intended P2P Interface Address attribute
  391. dialog_token += 1
  392. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  393. attrs = struct.pack("<BHB", P2P_ATTR_INTENDED_INTERFACE_ADDR, 1, 1)
  394. msg['payload'] += ie_p2p(attrs)
  395. hapd.mgmt_tx(msg)
  396. # Too short P2P Group BSSID attribute
  397. dialog_token += 1
  398. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  399. attrs = struct.pack("<BHB", P2P_ATTR_GROUP_BSSID, 1, 1)
  400. msg['payload'] += ie_p2p(attrs)
  401. hapd.mgmt_tx(msg)
  402. # Too short P2P Group ID attribute
  403. dialog_token += 1
  404. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  405. attrs = struct.pack("<BHB", P2P_ATTR_GROUP_ID, 1, 1)
  406. msg['payload'] += ie_p2p(attrs)
  407. hapd.mgmt_tx(msg)
  408. # Too long P2P Group ID attribute
  409. dialog_token += 1
  410. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  411. attrs = struct.pack("<BH6B", P2P_ATTR_GROUP_ID, 6 + 33, 0, 0, 0, 0, 0, 0) + "123456789012345678901234567890123"
  412. msg['payload'] += ie_p2p(attrs)
  413. hapd.mgmt_tx(msg)
  414. # Too short Invitation Flags attribute
  415. dialog_token += 1
  416. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  417. attrs = struct.pack("<BH", P2P_ATTR_INVITATION_FLAGS, 0)
  418. msg['payload'] += ie_p2p(attrs)
  419. hapd.mgmt_tx(msg)
  420. # Valid and too short Manageability attribute
  421. dialog_token += 1
  422. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  423. attrs = p2p_attr_manageability()
  424. attrs += struct.pack("<BH", P2P_ATTR_MANAGEABILITY, 0)
  425. msg['payload'] += ie_p2p(attrs)
  426. hapd.mgmt_tx(msg)
  427. # Too short NoA attribute
  428. dialog_token += 1
  429. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  430. attrs = struct.pack("<BHB", P2P_ATTR_NOTICE_OF_ABSENCE, 1, 1)
  431. msg['payload'] += ie_p2p(attrs)
  432. hapd.mgmt_tx(msg)
  433. # Valid and too short Extended Listen Timing attributes
  434. dialog_token += 1
  435. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  436. attrs = p2p_attr_ext_listen_timing(period=100, interval=50)
  437. attrs += struct.pack("<BHBBB", P2P_ATTR_EXT_LISTEN_TIMING, 3, 0, 0, 0)
  438. msg['payload'] += ie_p2p(attrs)
  439. hapd.mgmt_tx(msg)
  440. # Valid and too short Minor Reason Code attributes
  441. dialog_token += 1
  442. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  443. attrs = p2p_attr_minor_reason_code(code=2)
  444. attrs += struct.pack("<BH", P2P_ATTR_MINOR_REASON_CODE, 0)
  445. msg['payload'] += ie_p2p(attrs)
  446. hapd.mgmt_tx(msg)
  447. # Unknown attribute and too short OOB GO Negotiation Channel attribute
  448. dialog_token += 1
  449. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  450. attrs = struct.pack("<BHB", 99, 1, 1)
  451. attrs += struct.pack("<BHB", P2P_ATTR_OOB_GO_NEG_CHANNEL, 1, 1)
  452. msg['payload'] += ie_p2p(attrs)
  453. hapd.mgmt_tx(msg)
  454. # Too short Service Hash attribute
  455. dialog_token += 1
  456. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  457. attrs = struct.pack("<BH5B", P2P_ATTR_SERVICE_HASH, 5, 1, 2, 3, 4, 5)
  458. msg['payload'] += ie_p2p(attrs)
  459. hapd.mgmt_tx(msg)
  460. # Too short Connection Capability attribute
  461. dialog_token += 1
  462. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  463. attrs = struct.pack("<BH", P2P_ATTR_CONNECTION_CAPABILITY, 0)
  464. msg['payload'] += ie_p2p(attrs)
  465. hapd.mgmt_tx(msg)
  466. # Too short Advertisement ID attribute
  467. dialog_token += 1
  468. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  469. attrs = struct.pack("<BH9B", P2P_ATTR_ADVERTISEMENT_ID, 9, 1, 2, 3, 4, 5,
  470. 6, 7, 8, 9)
  471. msg['payload'] += ie_p2p(attrs)
  472. hapd.mgmt_tx(msg)
  473. # Truncated and too short Service Instance attributes
  474. dialog_token += 1
  475. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  476. attrs = struct.pack("<BH8B", P2P_ATTR_ADVERTISED_SERVICE, 8, 1, 2, 3, 4, 5,
  477. 6, 2, 8)
  478. attrs += struct.pack("<BH7B", P2P_ATTR_ADVERTISED_SERVICE, 7, 1, 2, 3, 4, 5,
  479. 6, 7)
  480. msg['payload'] += ie_p2p(attrs)
  481. hapd.mgmt_tx(msg)
  482. # Too short Session ID attribute
  483. dialog_token += 1
  484. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  485. attrs = struct.pack("<BH4B", P2P_ATTR_SESSION_ID, 4, 1, 2, 3, 4)
  486. msg['payload'] += ie_p2p(attrs)
  487. hapd.mgmt_tx(msg)
  488. # Too short Feature Capability attribute
  489. dialog_token += 1
  490. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  491. attrs = struct.pack("<BH", P2P_ATTR_FEATURE_CAPABILITY, 0)
  492. msg['payload'] += ie_p2p(attrs)
  493. hapd.mgmt_tx(msg)
  494. # Too short Persistent Group attribute
  495. dialog_token += 1
  496. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  497. attrs = struct.pack("<BH5B", P2P_ATTR_PERSISTENT_GROUP, 5, 1, 2, 3, 4, 5)
  498. msg['payload'] += ie_p2p(attrs)
  499. hapd.mgmt_tx(msg)
  500. # Too long Persistent Group attribute
  501. dialog_token += 1
  502. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  503. attrs = struct.pack("<BH9L3B", P2P_ATTR_PERSISTENT_GROUP, 6 + 32 + 1,
  504. 1, 2, 3, 4, 5, 6, 7, 8, 9, 1, 2, 3)
  505. msg['payload'] += ie_p2p(attrs)
  506. hapd.mgmt_tx(msg)
  507. if hapd.mgmt_rx(timeout=0.5) is not None:
  508. raise Exception("Unexpected management frame received")
  509. dev[0].dump_monitor()
  510. dialog_token += 1
  511. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  512. attrs = p2p_attr_config_timeout()
  513. attrs += p2p_attr_invitation_flags()
  514. attrs += p2p_attr_operating_channel()
  515. attrs += p2p_attr_group_bssid(src)
  516. attrs += p2p_attr_channel_list()
  517. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  518. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  519. msg['payload'] += ie_p2p(attrs)
  520. hapd.mgmt_tx(msg)
  521. ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=5)
  522. if ev is None:
  523. raise Exception("Timeout on device found event")
  524. ev = dev[0].wait_global_event(["P2P-INVITATION-RECEIVED"], timeout=5)
  525. if ev is None:
  526. raise Exception("Timeout on invitation event " + str(dialog_token))
  527. if hapd.mgmt_rx(timeout=1) is None:
  528. raise Exception("No invitation response " + str(dialog_token))
  529. time.sleep(0.1)
  530. dev[0].dump_monitor()
  531. dialog_token += 1
  532. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  533. attrs = p2p_attr_config_timeout()
  534. attrs += p2p_attr_invitation_flags()
  535. attrs += p2p_attr_operating_channel()
  536. attrs += p2p_attr_group_bssid(src)
  537. attrs += p2p_attr_channel_list()
  538. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  539. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  540. msg['payload'] += ie_p2p(attrs)
  541. hapd.mgmt_tx(msg)
  542. ev = dev[0].wait_global_event(["P2P-INVITATION-RECEIVED"], timeout=5)
  543. if ev is None:
  544. raise Exception("Timeout on invitation event " + str(dialog_token))
  545. if hapd.mgmt_rx(timeout=1) is None:
  546. raise Exception("No invitation response " + str(dialog_token))
  547. time.sleep(0.1)
  548. dev[0].dump_monitor()
  549. dialog_token += 1
  550. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  551. #attrs = p2p_attr_config_timeout()
  552. attrs = p2p_attr_invitation_flags()
  553. attrs += p2p_attr_operating_channel()
  554. attrs += p2p_attr_group_bssid(src)
  555. attrs += p2p_attr_channel_list()
  556. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  557. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  558. msg['payload'] += ie_p2p(attrs)
  559. hapd.mgmt_tx(msg)
  560. if hapd.mgmt_rx(timeout=1) is None:
  561. raise Exception("No invitation response " + str(dialog_token))
  562. time.sleep(0.1)
  563. dev[0].dump_monitor()
  564. dialog_token += 1
  565. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  566. attrs = p2p_attr_config_timeout()
  567. #attrs = p2p_attr_invitation_flags()
  568. attrs += p2p_attr_operating_channel()
  569. attrs += p2p_attr_group_bssid(src)
  570. attrs += p2p_attr_channel_list()
  571. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  572. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  573. msg['payload'] += ie_p2p(attrs)
  574. hapd.mgmt_tx(msg)
  575. if hapd.mgmt_rx(timeout=1) is None:
  576. raise Exception("No invitation response " + str(dialog_token))
  577. time.sleep(0.1)
  578. dev[0].dump_monitor()
  579. dialog_token += 1
  580. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  581. attrs = p2p_attr_config_timeout()
  582. attrs = p2p_attr_invitation_flags()
  583. #attrs += p2p_attr_operating_channel()
  584. attrs += p2p_attr_group_bssid(src)
  585. attrs += p2p_attr_channel_list()
  586. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  587. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  588. msg['payload'] += ie_p2p(attrs)
  589. hapd.mgmt_tx(msg)
  590. if hapd.mgmt_rx(timeout=1) is None:
  591. raise Exception("No invitation response " + str(dialog_token))
  592. time.sleep(0.1)
  593. dev[0].dump_monitor()
  594. dialog_token += 1
  595. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  596. attrs = p2p_attr_config_timeout()
  597. attrs = p2p_attr_invitation_flags()
  598. attrs += p2p_attr_operating_channel()
  599. #attrs += p2p_attr_group_bssid(src)
  600. attrs += p2p_attr_channel_list()
  601. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  602. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  603. msg['payload'] += ie_p2p(attrs)
  604. hapd.mgmt_tx(msg)
  605. if hapd.mgmt_rx(timeout=1) is None:
  606. raise Exception("No invitation response " + str(dialog_token))
  607. time.sleep(0.1)
  608. dev[0].dump_monitor()
  609. dialog_token += 1
  610. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  611. attrs = p2p_attr_config_timeout()
  612. attrs = p2p_attr_invitation_flags()
  613. attrs += p2p_attr_operating_channel()
  614. attrs += p2p_attr_group_bssid(src)
  615. #attrs += p2p_attr_channel_list()
  616. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  617. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  618. msg['payload'] += ie_p2p(attrs)
  619. hapd.mgmt_tx(msg)
  620. if hapd.mgmt_rx(timeout=1) is None:
  621. raise Exception("No invitation response " + str(dialog_token))
  622. time.sleep(0.1)
  623. dev[0].dump_monitor()
  624. dialog_token += 1
  625. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  626. attrs = p2p_attr_config_timeout()
  627. attrs = p2p_attr_invitation_flags()
  628. attrs += p2p_attr_operating_channel()
  629. attrs += p2p_attr_group_bssid(src)
  630. attrs += p2p_attr_channel_list()
  631. #attrs += p2p_attr_group_id(src, "DIRECT-foo")
  632. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  633. msg['payload'] += ie_p2p(attrs)
  634. hapd.mgmt_tx(msg)
  635. if hapd.mgmt_rx(timeout=1) is None:
  636. raise Exception("No invitation response " + str(dialog_token))
  637. time.sleep(0.1)
  638. dev[0].dump_monitor()
  639. dialog_token += 1
  640. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  641. attrs = p2p_attr_config_timeout()
  642. attrs = p2p_attr_invitation_flags()
  643. attrs += p2p_attr_operating_channel()
  644. attrs += p2p_attr_group_bssid(src)
  645. attrs += p2p_attr_channel_list()
  646. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  647. #attrs += p2p_attr_device_info(src, config_methods=0x0108)
  648. msg['payload'] += ie_p2p(attrs)
  649. hapd.mgmt_tx(msg)
  650. if hapd.mgmt_rx(timeout=1) is None:
  651. raise Exception("No invitation response " + str(dialog_token))
  652. time.sleep(0.1)
  653. dev[0].dump_monitor()
  654. dialog_token += 1
  655. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  656. hapd.mgmt_tx(msg)
  657. if hapd.mgmt_rx(timeout=1) is None:
  658. raise Exception("No invitation response " + str(dialog_token))
  659. # Unusable peer operating channel preference
  660. time.sleep(0.1)
  661. dev[0].dump_monitor()
  662. dialog_token += 1
  663. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  664. attrs = p2p_attr_config_timeout()
  665. attrs = p2p_attr_invitation_flags()
  666. attrs += p2p_attr_operating_channel(chan=15)
  667. attrs += p2p_attr_group_bssid(src)
  668. attrs += p2p_attr_channel_list()
  669. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  670. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  671. msg['payload'] += ie_p2p(attrs)
  672. hapd.mgmt_tx(msg)
  673. if hapd.mgmt_rx(timeout=1) is None:
  674. raise Exception("No invitation response " + str(dialog_token))
  675. def test_p2p_msg_invitation_req_to_go(dev, apdev):
  676. """P2P protocol tests for invitation request processing on GO device"""
  677. res = form(dev[0], dev[1])
  678. dev[0].dump_monitor()
  679. dev[1].dump_monitor()
  680. addr0 = dev[0].p2p_dev_addr()
  681. addr1 = dev[1].p2p_dev_addr()
  682. peer = dev[1].get_peer(addr0)
  683. listen_freq = peer['listen_freq']
  684. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 1"):
  685. raise Exception("Failed to enable external management frame handling")
  686. networks = dev[0].list_networks()
  687. if len(networks) != 1:
  688. raise Exception("Unexpected number of networks")
  689. if "[P2P-PERSISTENT]" not in networks[0]['flags']:
  690. raise Exception("Not the persistent group data")
  691. dev[0].p2p_start_go(persistent=networks[0]['id'], freq=listen_freq)
  692. dialog_token = 0
  693. # Unusable peer operating channel preference
  694. dialog_token += 1
  695. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_REQ,
  696. dialog_token=dialog_token)
  697. attrs = p2p_attr_config_timeout()
  698. attrs = p2p_attr_invitation_flags(bitmap=1)
  699. attrs += p2p_attr_operating_channel(chan=15)
  700. attrs += p2p_attr_channel_list()
  701. attrs += p2p_attr_group_id(res['go_dev_addr'], res['ssid'])
  702. attrs += p2p_attr_device_info(addr1, config_methods=0x0108)
  703. msg['payload'] += ie_p2p(attrs)
  704. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  705. rx_msg = dev[1].mgmt_rx()
  706. if rx_msg is None:
  707. raise Exception("MGMT-RX timeout")
  708. p2p = parse_p2p_public_action(rx_msg['payload'])
  709. if p2p is None:
  710. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  711. if p2p['subtype'] != P2P_INVITATION_RESP:
  712. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  713. if p2p['p2p_status'] != 0:
  714. raise Exception("Unexpected status %d" % p2p['p2p_status'])
  715. # Forced channel re-selection due to channel list
  716. dialog_token += 1
  717. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_REQ,
  718. dialog_token=dialog_token)
  719. attrs = p2p_attr_config_timeout()
  720. attrs = p2p_attr_invitation_flags(bitmap=1)
  721. attrs += struct.pack("<BH3BBBB", P2P_ATTR_CHANNEL_LIST, 6,
  722. 0x58, 0x58, 0x04,
  723. 81, 1, 3)
  724. attrs += p2p_attr_group_id(res['go_dev_addr'], res['ssid'])
  725. attrs += p2p_attr_device_info(addr1, config_methods=0x0108)
  726. msg['payload'] += ie_p2p(attrs)
  727. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  728. rx_msg = dev[1].mgmt_rx()
  729. if rx_msg is None:
  730. raise Exception("MGMT-RX timeout")
  731. p2p = parse_p2p_public_action(rx_msg['payload'])
  732. if p2p is None:
  733. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  734. if p2p['subtype'] != P2P_INVITATION_RESP:
  735. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  736. if p2p['p2p_status'] != 7 and dev[1].get_mcc() <= 1:
  737. raise Exception("Unexpected status %d" % p2p['p2p_status'])
  738. def test_p2p_msg_invitation_req_unknown(dev, apdev):
  739. """P2P protocol tests for invitation request from unknown peer"""
  740. dst, src, hapd, channel = start_p2p(dev, apdev)
  741. dialog_token = 0
  742. dialog_token += 1
  743. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  744. attrs = p2p_attr_config_timeout()
  745. attrs += p2p_attr_invitation_flags()
  746. attrs += p2p_attr_operating_channel()
  747. attrs += p2p_attr_group_bssid(src)
  748. attrs += p2p_attr_channel_list()
  749. #attrs += p2p_attr_group_id(src, "DIRECT-foo")
  750. #attrs += p2p_attr_device_info(src, config_methods=0x0108)
  751. msg['payload'] += ie_p2p(attrs)
  752. hapd.mgmt_tx(msg)
  753. ev = dev[0].wait_global_event(["P2P-INVITATION-RECEIVED"], timeout=5)
  754. if ev is None:
  755. raise Exception("Timeout on invitation event " + str(dialog_token))
  756. if hapd.mgmt_rx(timeout=1) is None:
  757. raise Exception("No invitation response " + str(dialog_token))
  758. def test_p2p_msg_invitation_no_common_channels(dev, apdev):
  759. """P2P protocol tests for invitation request without common channels"""
  760. dst, src, hapd, channel = start_p2p(dev, apdev)
  761. dialog_token = 0
  762. dialog_token += 1
  763. msg = p2p_hdr(dst, src, type=P2P_INVITATION_REQ, dialog_token=dialog_token)
  764. attrs = p2p_attr_config_timeout()
  765. attrs += p2p_attr_invitation_flags()
  766. attrs += p2p_attr_operating_channel()
  767. attrs += p2p_attr_group_bssid(src)
  768. attrs += struct.pack("<BH3BBB", P2P_ATTR_CHANNEL_LIST, 5,
  769. 0x58, 0x58, 0x04,
  770. 81, 0)
  771. attrs += p2p_attr_group_id(src, "DIRECT-foo")
  772. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  773. msg['payload'] += ie_p2p(attrs)
  774. hapd.mgmt_tx(msg)
  775. if hapd.mgmt_rx(timeout=1) is None:
  776. raise Exception("No invitation response " + str(dialog_token))
  777. ev = dev[0].wait_event(["P2P-INVITATION-RECEIVED"], timeout=0.1)
  778. if ev is not None:
  779. raise Exception("Unexpected invitation event")
  780. def test_p2p_msg_invitation_resp(dev, apdev):
  781. """P2P protocol tests for invitation response processing"""
  782. form(dev[0], dev[1])
  783. dev[0].dump_monitor()
  784. dev[1].dump_monitor()
  785. dst, src, hapd, channel = start_p2p(dev, apdev)
  786. addr0 = dev[0].p2p_dev_addr()
  787. addr1 = dev[1].p2p_dev_addr()
  788. peer = dev[1].get_peer(addr0)
  789. # P2P Invitation Response from unknown peer
  790. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=1)
  791. hapd.mgmt_tx(msg)
  792. # P2P Invitation Response from peer that is not in invitation
  793. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=2)
  794. attrs = p2p_attr_status()
  795. msg['payload'] += ie_p2p(attrs)
  796. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  797. time.sleep(0.25)
  798. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 1"):
  799. raise Exception("Failed to enable external management frame handling")
  800. invite(dev[0], dev[1])
  801. rx_msg = dev[1].mgmt_rx()
  802. if rx_msg is None:
  803. raise Exception("MGMT-RX timeout")
  804. p2p = parse_p2p_public_action(rx_msg['payload'])
  805. if p2p is None:
  806. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  807. if p2p['subtype'] != P2P_INVITATION_REQ:
  808. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  809. # Invalid attribute to cause p2p_parse() failure
  810. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=p2p['dialog_token'])
  811. attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
  812. msg['payload'] += ie_p2p(attrs)
  813. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  814. invite(dev[0], dev[1])
  815. rx_msg = dev[1].mgmt_rx()
  816. if rx_msg is None:
  817. raise Exception("MGMT-RX timeout")
  818. p2p = parse_p2p_public_action(rx_msg['payload'])
  819. if p2p is None:
  820. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  821. if p2p['subtype'] != P2P_INVITATION_REQ:
  822. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  823. # missing mandatory Status attribute
  824. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=p2p['dialog_token'])
  825. attrs = p2p_attr_channel_list()
  826. msg['payload'] += ie_p2p(attrs)
  827. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  828. invite(dev[0], dev[1])
  829. rx_msg = dev[1].mgmt_rx()
  830. if rx_msg is None:
  831. raise Exception("MGMT-RX timeout")
  832. p2p = parse_p2p_public_action(rx_msg['payload'])
  833. if p2p is None:
  834. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  835. if p2p['subtype'] != P2P_INVITATION_REQ:
  836. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  837. # no channel match (no common channel found at all)
  838. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=p2p['dialog_token'])
  839. attrs = p2p_attr_status()
  840. attrs += struct.pack("<BH3BBBB", P2P_ATTR_CHANNEL_LIST, 6,
  841. 0x58, 0x58, 0x04,
  842. 81, 1, 15)
  843. msg['payload'] += ie_p2p(attrs)
  844. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  845. invite(dev[0], dev[1])
  846. rx_msg = dev[1].mgmt_rx()
  847. if rx_msg is None:
  848. raise Exception("MGMT-RX timeout")
  849. p2p = parse_p2p_public_action(rx_msg['payload'])
  850. if p2p is None:
  851. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  852. if p2p['subtype'] != P2P_INVITATION_REQ:
  853. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  854. # no channel match (no acceptable P2P channel)
  855. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=p2p['dialog_token'])
  856. attrs = p2p_attr_status()
  857. attrs += struct.pack("<BH3BBBB", P2P_ATTR_CHANNEL_LIST, 6,
  858. 0x58, 0x58, 0x04,
  859. 81, 1, 12)
  860. msg['payload'] += ie_p2p(attrs)
  861. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  862. invite(dev[0], dev[1])
  863. rx_msg = dev[1].mgmt_rx()
  864. if rx_msg is None:
  865. raise Exception("MGMT-RX timeout")
  866. p2p = parse_p2p_public_action(rx_msg['payload'])
  867. if p2p is None:
  868. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  869. if p2p['subtype'] != P2P_INVITATION_REQ:
  870. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  871. # missing mandatory Channel List attribute (ignored as a workaround)
  872. msg = p2p_hdr(dst, src, type=P2P_INVITATION_RESP, dialog_token=p2p['dialog_token'])
  873. attrs = p2p_attr_status()
  874. msg['payload'] += ie_p2p(attrs)
  875. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  876. ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15);
  877. if ev is None:
  878. raise Exception("Group was not started")
  879. def test_p2p_msg_invitation_resend(dev, apdev):
  880. """P2P protocol tests for invitation resending on no-common-channels"""
  881. form(dev[0], dev[1])
  882. dev[0].dump_monitor()
  883. dev[1].dump_monitor()
  884. addr0 = dev[0].p2p_dev_addr()
  885. addr1 = dev[1].p2p_dev_addr()
  886. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 1"):
  887. raise Exception("Failed to enable external management frame handling")
  888. logger.info("Forced channel in invitation")
  889. invite(dev[0], dev[1], extra="freq=2422")
  890. rx_msg = dev[1].mgmt_rx()
  891. if rx_msg is None:
  892. raise Exception("MGMT-RX timeout")
  893. p2p = parse_p2p_public_action(rx_msg['payload'])
  894. if p2p is None:
  895. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  896. if p2p['subtype'] != P2P_INVITATION_REQ:
  897. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  898. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_RESP,
  899. dialog_token=p2p['dialog_token'])
  900. attrs = p2p_attr_status(status=P2P_SC_FAIL_NO_COMMON_CHANNELS)
  901. msg['payload'] += ie_p2p(attrs)
  902. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  903. ev = dev[0].wait_global_event(["P2P-INVITATION-RESULT"], timeout=15)
  904. if ev is None:
  905. raise Exception("Timeout on invitation result");
  906. if "status=7" not in ev:
  907. raise Exception("Unexpected invitation result: " + ev)
  908. logger.info("Any channel allowed, only preference provided in invitation");
  909. invite(dev[0], dev[1], extra="pref=2422")
  910. rx_msg = dev[1].mgmt_rx()
  911. if rx_msg is None:
  912. raise Exception("MGMT-RX timeout")
  913. p2p = parse_p2p_public_action(rx_msg['payload'])
  914. if p2p is None:
  915. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  916. if p2p['subtype'] != P2P_INVITATION_REQ:
  917. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  918. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_RESP,
  919. dialog_token=p2p['dialog_token'])
  920. attrs = p2p_attr_status(status=P2P_SC_FAIL_NO_COMMON_CHANNELS)
  921. msg['payload'] += ie_p2p(attrs)
  922. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 0"):
  923. raise Exception("Failed to disable external management frame handling")
  924. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  925. ev = dev[0].wait_global_event(["P2P-INVITATION-RESULT"], timeout=15)
  926. if ev is None:
  927. raise Exception("Timeout on invitation result");
  928. if "status=0" not in ev:
  929. raise Exception("Unexpected invitation result: " + ev)
  930. ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15);
  931. if ev is None:
  932. raise Exception("Group was not started on dev0")
  933. ev = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=15);
  934. if ev is None:
  935. raise Exception("Group was not started on dev1")
  936. def test_p2p_msg_invitation_resend_duplicate(dev, apdev):
  937. """P2P protocol tests for invitation resending on no-common-channels and duplicated response"""
  938. form(dev[0], dev[1])
  939. dev[0].dump_monitor()
  940. dev[1].dump_monitor()
  941. addr0 = dev[0].p2p_dev_addr()
  942. addr1 = dev[1].p2p_dev_addr()
  943. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 1"):
  944. raise Exception("Failed to enable external management frame handling")
  945. logger.info("Any channel allowed, only preference provided in invitation");
  946. invite(dev[0], dev[1], extra="pref=2422")
  947. rx_msg = dev[1].mgmt_rx()
  948. if rx_msg is None:
  949. raise Exception("MGMT-RX timeout")
  950. p2p = parse_p2p_public_action(rx_msg['payload'])
  951. if p2p is None:
  952. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  953. if p2p['subtype'] != P2P_INVITATION_REQ:
  954. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  955. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_RESP,
  956. dialog_token=p2p['dialog_token'])
  957. attrs = p2p_attr_status(status=P2P_SC_FAIL_NO_COMMON_CHANNELS)
  958. msg['payload'] += ie_p2p(attrs)
  959. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  960. rx_msg = dev[1].mgmt_rx()
  961. if rx_msg is None:
  962. raise Exception("MGMT-RX timeout")
  963. p2p = parse_p2p_public_action(rx_msg['payload'])
  964. if p2p is None:
  965. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  966. if p2p['subtype'] != P2P_INVITATION_REQ:
  967. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  968. logger.info("Retransmit duplicate of previous response")
  969. mgmt_tx(dev[1], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload'])))
  970. logger.info("Transmit real response")
  971. msg = p2p_hdr(addr0, addr1, type=P2P_INVITATION_RESP,
  972. dialog_token=p2p['dialog_token'])
  973. attrs = p2p_attr_status(status=P2P_SC_SUCCESS)
  974. attrs += p2p_attr_channel_list()
  975. msg['payload'] += ie_p2p(attrs)
  976. if "FAIL" in dev[1].request("MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']))):
  977. raise Exception("Failed to transmit real response")
  978. dev[1].request("SET ext_mgmt_frame_handling 0")
  979. ev = dev[0].wait_global_event(["P2P-INVITATION-RESULT"], timeout=10)
  980. if ev is None:
  981. raise Exception("Timeout on invitation result");
  982. if "status=0" not in ev:
  983. raise Exception("Unexpected invitation result: " + ev)
  984. ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=10)
  985. if ev is None:
  986. raise Exception("Group formation timed out")
  987. dev[0].group_form_result(ev)
  988. dev[0].remove_group()
  989. def test_p2p_msg_pd_req(dev, apdev):
  990. """P2P protocol tests for provision discovery request processing"""
  991. dst, src, hapd, channel = start_p2p(dev, apdev)
  992. dialog_token = 0
  993. # Too short attribute header
  994. dialog_token += 1
  995. msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
  996. attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
  997. msg['payload'] += ie_p2p(attrs)
  998. hapd.mgmt_tx(msg)
  999. if hapd.mgmt_rx(timeout=0.5) is not None:
  1000. raise Exception("Unexpected management frame received")
  1001. # No attributes
  1002. dialog_token += 1
  1003. msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
  1004. attrs = ""
  1005. msg['payload'] += ie_p2p(attrs)
  1006. hapd.mgmt_tx(msg)
  1007. if hapd.mgmt_rx(timeout=1) is None:
  1008. raise Exception("No PD response " + str(dialog_token))
  1009. # Valid request
  1010. time.sleep(0.1)
  1011. dialog_token += 1
  1012. msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
  1013. attrs = wsc_attr_config_methods(methods=0x1008)
  1014. msg['payload'] += ie_wsc(attrs)
  1015. attrs = p2p_attr_capability()
  1016. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1017. msg['payload'] += ie_p2p(attrs)
  1018. hapd.mgmt_tx(msg)
  1019. ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=5)
  1020. if ev is None:
  1021. raise Exception("Timeout on device found event")
  1022. ev = dev[0].wait_global_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=5)
  1023. if ev is None:
  1024. raise Exception("Timeout on PD event")
  1025. if hapd.mgmt_rx(timeout=1) is None:
  1026. raise Exception("No PD response " + str(dialog_token))
  1027. # Unknown group
  1028. time.sleep(0.1)
  1029. dialog_token += 1
  1030. msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
  1031. attrs = wsc_attr_config_methods(methods=0x1008)
  1032. msg['payload'] += ie_wsc(attrs)
  1033. attrs = p2p_attr_capability()
  1034. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1035. attrs += p2p_attr_group_id("02:02:02:02:02:02", "DIRECT-foo")
  1036. msg['payload'] += ie_p2p(attrs)
  1037. hapd.mgmt_tx(msg)
  1038. if hapd.mgmt_rx(timeout=1) is None:
  1039. raise Exception("No PD response " + str(dialog_token))
  1040. ev = dev[0].wait_global_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=1)
  1041. if ev is not None:
  1042. raise Exception("Unexpected PD event")
  1043. # Listen channel is not yet known
  1044. if "FAIL" not in dev[0].global_request("P2P_PROV_DISC " + src + " display"):
  1045. raise Exception("Unexpected P2P_PROV_DISC success")
  1046. # Unknown peer
  1047. if "FAIL" not in dev[0].global_request("P2P_PROV_DISC 02:03:04:05:06:07 display"):
  1048. raise Exception("Unexpected P2P_PROV_DISC success (2)")
  1049. def test_p2p_msg_pd(dev, apdev):
  1050. """P2P protocol tests for provision discovery request processing (known)"""
  1051. dst, src, hapd, channel = start_p2p(dev, apdev)
  1052. dialog_token = 0
  1053. p2p_probe(hapd, src, chan=channel)
  1054. time.sleep(0.1)
  1055. # Valid request
  1056. dialog_token += 1
  1057. msg = p2p_hdr(dst, src, type=P2P_PROV_DISC_REQ, dialog_token=dialog_token)
  1058. attrs = wsc_attr_config_methods(methods=0x1008)
  1059. msg['payload'] += ie_wsc(attrs)
  1060. attrs = p2p_attr_capability()
  1061. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1062. msg['payload'] += ie_p2p(attrs)
  1063. hapd.mgmt_tx(msg)
  1064. ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=5)
  1065. if ev is None:
  1066. raise Exception("Timeout on device found event")
  1067. ev = dev[0].wait_global_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=5)
  1068. if ev is None:
  1069. raise Exception("Timeout on PD event")
  1070. if hapd.mgmt_rx(timeout=1) is None:
  1071. raise Exception("No PD response " + str(dialog_token))
  1072. if "FAIL" in dev[0].global_request("P2P_PROV_DISC " + src + " display"):
  1073. raise Exception("Unexpected P2P_PROV_DISC failure")
  1074. frame = hapd.mgmt_rx(timeout=1)
  1075. if frame is None:
  1076. raise Exception("No PD request " + str(dialog_token))
  1077. p2p = parse_p2p_public_action(frame['payload'])
  1078. if p2p is None:
  1079. raise Exception("Failed to parse PD request")
  1080. # invalid dialog token
  1081. msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
  1082. dialog_token=p2p['dialog_token'] + 1)
  1083. hapd.mgmt_tx(msg)
  1084. ev = dev[0].wait_global_event(["P2P-PROV-DISC-FAILURE"], timeout=0.1)
  1085. if ev is not None:
  1086. raise Exception("Unexpected PD result event")
  1087. # valid dialog token
  1088. msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
  1089. dialog_token=p2p['dialog_token'])
  1090. hapd.mgmt_tx(msg)
  1091. ev = dev[0].wait_global_event(["P2P-PROV-DISC-FAILURE"], timeout=5)
  1092. if ev is None:
  1093. raise Exception("Timeout on PD result event")
  1094. # valid dialog token
  1095. msg = p2p_hdr_resp(dst, src, type=P2P_PROV_DISC_RESP,
  1096. dialog_token=p2p['dialog_token'])
  1097. hapd.mgmt_tx(msg)
  1098. ev = dev[0].wait_global_event(["P2P-PROV-DISC-FAILURE"], timeout=0.1)
  1099. if ev is not None:
  1100. raise Exception("Unexpected PD result event")
  1101. def check_p2p_response(hapd, dialog_token, status):
  1102. resp = hapd.mgmt_rx(timeout=2)
  1103. if resp is None:
  1104. raise Exception("No GO Neg Response " + str(dialog_token))
  1105. p2p = parse_p2p_public_action(resp['payload'])
  1106. if p2p is None:
  1107. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  1108. if dialog_token != p2p['dialog_token']:
  1109. raise Exception("Unexpected dialog token in response")
  1110. if p2p['p2p_status'] != status:
  1111. raise Exception("Unexpected status code %s in response (expected %d)" % (p2p['p2p_status'], status))
  1112. def test_p2p_msg_go_neg_both_start(dev, apdev):
  1113. """P2P protocol test for simultaneous GO Neg initiation"""
  1114. addr0 = dev[0].p2p_dev_addr()
  1115. addr1 = dev[1].p2p_dev_addr()
  1116. dev[0].p2p_listen()
  1117. dev[1].discover_peer(addr0)
  1118. dev[1].p2p_listen()
  1119. dev[0].discover_peer(addr1)
  1120. dev[0].p2p_listen()
  1121. if "FAIL" in dev[0].request("SET ext_mgmt_frame_handling 1"):
  1122. raise Exception("Failed to enable external management frame handling")
  1123. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 1"):
  1124. raise Exception("Failed to enable external management frame handling")
  1125. dev[0].request("P2P_CONNECT {} pbc".format(addr1))
  1126. dev[1].request("P2P_CONNECT {} pbc".format(addr0))
  1127. msg = dev[0].mgmt_rx()
  1128. if msg is None:
  1129. raise Exception("MGMT-RX timeout")
  1130. msg = dev[1].mgmt_rx()
  1131. if msg is None:
  1132. raise Exception("MGMT-RX timeout(2)")
  1133. if "FAIL" in dev[0].request("SET ext_mgmt_frame_handling 0"):
  1134. raise Exception("Failed to disable external management frame handling")
  1135. ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=2)
  1136. if ev is not None:
  1137. raise Exception("Unexpected GO Neg success")
  1138. if "FAIL" in dev[1].request("SET ext_mgmt_frame_handling 0"):
  1139. raise Exception("Failed to disable external management frame handling")
  1140. ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=10)
  1141. if ev is None:
  1142. raise Exception("GO Neg did not succeed")
  1143. ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=5);
  1144. if ev is None:
  1145. raise Exception("Group formation not succeed")
  1146. ev = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=5);
  1147. if ev is None:
  1148. raise Exception("Group formation not succeed")
  1149. def test_p2p_msg_go_neg_req(dev, apdev):
  1150. """P2P protocol tests for invitation request from unknown peer"""
  1151. dst, src, hapd, channel = start_p2p(dev, apdev)
  1152. dialog_token = 0
  1153. # invalid attribute
  1154. dialog_token += 1
  1155. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1156. attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
  1157. msg['payload'] += ie_p2p(attrs)
  1158. hapd.mgmt_tx(msg)
  1159. frame = hapd.mgmt_rx(timeout=0.1)
  1160. if frame is not None:
  1161. print frame
  1162. raise Exception("Unexpected GO Neg Response")
  1163. # missing atributes
  1164. dialog_token += 1
  1165. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1166. attrs = p2p_attr_capability()
  1167. attrs += p2p_attr_go_intent()
  1168. attrs += p2p_attr_config_timeout()
  1169. #attrs += p2p_attr_listen_channel()
  1170. attrs += p2p_attr_ext_listen_timing()
  1171. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1172. attrs += p2p_attr_channel_list()
  1173. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1174. attrs += p2p_attr_operating_channel()
  1175. msg['payload'] += ie_p2p(attrs)
  1176. hapd.mgmt_tx(msg)
  1177. if hapd.mgmt_rx(timeout=2) is None:
  1178. raise Exception("No GO Neg Response " + str(dialog_token))
  1179. time.sleep(0.1)
  1180. dialog_token += 1
  1181. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1182. attrs = p2p_attr_capability()
  1183. attrs += p2p_attr_go_intent()
  1184. attrs += p2p_attr_config_timeout()
  1185. attrs += p2p_attr_listen_channel()
  1186. attrs += p2p_attr_ext_listen_timing()
  1187. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1188. attrs += p2p_attr_channel_list()
  1189. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1190. #attrs += p2p_attr_operating_channel()
  1191. msg['payload'] += ie_p2p(attrs)
  1192. hapd.mgmt_tx(msg)
  1193. if hapd.mgmt_rx(timeout=2) is None:
  1194. raise Exception("No GO Neg Response " + str(dialog_token))
  1195. time.sleep(0.1)
  1196. dialog_token += 1
  1197. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1198. attrs = p2p_attr_capability()
  1199. attrs += p2p_attr_go_intent()
  1200. attrs += p2p_attr_config_timeout()
  1201. attrs += p2p_attr_listen_channel()
  1202. attrs += p2p_attr_ext_listen_timing()
  1203. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1204. #attrs += p2p_attr_channel_list()
  1205. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1206. attrs += p2p_attr_operating_channel()
  1207. msg['payload'] += ie_p2p(attrs)
  1208. hapd.mgmt_tx(msg)
  1209. if hapd.mgmt_rx(timeout=2) is None:
  1210. raise Exception("No GO Neg Response " + str(dialog_token))
  1211. time.sleep(0.1)
  1212. dialog_token += 1
  1213. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1214. attrs = p2p_attr_capability()
  1215. attrs += p2p_attr_go_intent()
  1216. attrs += p2p_attr_config_timeout()
  1217. attrs += p2p_attr_listen_channel()
  1218. attrs += p2p_attr_ext_listen_timing()
  1219. #attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1220. attrs += p2p_attr_channel_list()
  1221. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1222. attrs += p2p_attr_operating_channel()
  1223. msg['payload'] += ie_p2p(attrs)
  1224. hapd.mgmt_tx(msg)
  1225. if hapd.mgmt_rx(timeout=2) is None:
  1226. raise Exception("No GO Neg Response " + str(dialog_token))
  1227. time.sleep(0.1)
  1228. dialog_token += 1
  1229. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1230. attrs = p2p_attr_capability()
  1231. attrs += p2p_attr_go_intent()
  1232. attrs += p2p_attr_config_timeout()
  1233. attrs += p2p_attr_listen_channel()
  1234. attrs += p2p_attr_ext_listen_timing()
  1235. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1236. attrs += p2p_attr_channel_list()
  1237. #attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1238. attrs += p2p_attr_operating_channel()
  1239. msg['payload'] += ie_p2p(attrs)
  1240. hapd.mgmt_tx(msg)
  1241. if hapd.mgmt_rx(timeout=2) is None:
  1242. raise Exception("No GO Neg Response " + str(dialog_token))
  1243. time.sleep(0.1)
  1244. # SA != P2P Device address
  1245. dialog_token += 1
  1246. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1247. attrs = p2p_attr_capability()
  1248. attrs += p2p_attr_go_intent()
  1249. attrs += p2p_attr_config_timeout()
  1250. attrs += p2p_attr_listen_channel()
  1251. attrs += p2p_attr_ext_listen_timing()
  1252. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1253. attrs += p2p_attr_channel_list()
  1254. attrs += p2p_attr_device_info("02:02:02:02:02:02", config_methods=0x0108)
  1255. attrs += p2p_attr_operating_channel()
  1256. msg['payload'] += ie_p2p(attrs)
  1257. hapd.mgmt_tx(msg)
  1258. if hapd.mgmt_rx(timeout=2) is None:
  1259. raise Exception("No GO Neg Response " + str(dialog_token))
  1260. time.sleep(0.1)
  1261. # unexpected Status attribute
  1262. dialog_token += 1
  1263. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1264. attrs = p2p_attr_capability()
  1265. attrs += p2p_attr_go_intent()
  1266. attrs += p2p_attr_config_timeout()
  1267. attrs += p2p_attr_listen_channel()
  1268. attrs += p2p_attr_ext_listen_timing()
  1269. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1270. attrs += p2p_attr_channel_list()
  1271. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1272. attrs += p2p_attr_operating_channel()
  1273. attrs += p2p_attr_status(status=P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
  1274. msg['payload'] += ie_p2p(attrs)
  1275. hapd.mgmt_tx(msg)
  1276. if hapd.mgmt_rx(timeout=2) is None:
  1277. raise Exception("No GO Neg Response(1) " + str(dialog_token))
  1278. time.sleep(0.1)
  1279. # valid (with workarounds) GO Neg Req
  1280. dialog_token += 1
  1281. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1282. #attrs = p2p_attr_capability()
  1283. #attrs += p2p_attr_go_intent()
  1284. #attrs += p2p_attr_config_timeout()
  1285. attrs = p2p_attr_listen_channel()
  1286. attrs += p2p_attr_ext_listen_timing()
  1287. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1288. attrs += p2p_attr_channel_list()
  1289. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1290. attrs += p2p_attr_operating_channel()
  1291. msg['payload'] += ie_p2p(attrs)
  1292. hapd.mgmt_tx(msg)
  1293. check_p2p_response(hapd, dialog_token,
  1294. P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
  1295. ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=2)
  1296. if ev is None:
  1297. raise Exception("Timeout on GO Neg event " + str(dialog_token))
  1298. dev[0].request("P2P_CONNECT " + src + " 12345670 display auth")
  1299. # ready - missing attributes (with workarounds) GO Neg Req
  1300. time.sleep(0.1)
  1301. dialog_token += 1
  1302. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1303. #attrs = p2p_attr_capability()
  1304. #attrs += p2p_attr_go_intent()
  1305. #attrs += p2p_attr_config_timeout()
  1306. attrs = p2p_attr_listen_channel()
  1307. attrs += p2p_attr_ext_listen_timing()
  1308. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1309. attrs += p2p_attr_channel_list()
  1310. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1311. attrs += p2p_attr_operating_channel()
  1312. msg['payload'] += ie_p2p(attrs)
  1313. hapd.mgmt_tx(msg)
  1314. if hapd.mgmt_rx(timeout=2) is None:
  1315. raise Exception("No GO Neg Response " + str(dialog_token))
  1316. # ready - invalid GO Intent GO Neg Req
  1317. time.sleep(0.1)
  1318. dialog_token += 1
  1319. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1320. #attrs = p2p_attr_capability()
  1321. attrs = p2p_attr_go_intent(go_intent=16)
  1322. #attrs += p2p_attr_config_timeout()
  1323. attrs += p2p_attr_listen_channel()
  1324. attrs += p2p_attr_ext_listen_timing()
  1325. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1326. attrs += p2p_attr_channel_list()
  1327. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1328. attrs += p2p_attr_operating_channel()
  1329. msg['payload'] += ie_p2p(attrs)
  1330. hapd.mgmt_tx(msg)
  1331. check_p2p_response(hapd, dialog_token, P2P_SC_FAIL_INVALID_PARAMS)
  1332. # ready - invalid Channel List
  1333. time.sleep(0.1)
  1334. dialog_token += 1
  1335. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1336. attrs = p2p_attr_capability()
  1337. attrs += p2p_attr_go_intent()
  1338. attrs += p2p_attr_config_timeout()
  1339. attrs += p2p_attr_listen_channel()
  1340. attrs += p2p_attr_ext_listen_timing()
  1341. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1342. attrs += struct.pack("<BH3BBB11B", P2P_ATTR_CHANNEL_LIST, 16,
  1343. 0x58, 0x58, 0x04,
  1344. 81, 12, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
  1345. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1346. attrs += p2p_attr_operating_channel()
  1347. msg['payload'] += ie_p2p(attrs)
  1348. hapd.mgmt_tx(msg)
  1349. check_p2p_response(hapd, dialog_token, P2P_SC_FAIL_NO_COMMON_CHANNELS)
  1350. # ready - invalid GO Neg Req (unsupported Device Password ID)
  1351. time.sleep(0.1)
  1352. dialog_token += 1
  1353. msg = p2p_hdr(dst, src, type=P2P_GO_NEG_REQ, dialog_token=dialog_token)
  1354. attrs = p2p_attr_capability()
  1355. attrs += p2p_attr_go_intent()
  1356. attrs += p2p_attr_config_timeout()
  1357. attrs += p2p_attr_listen_channel()
  1358. attrs += p2p_attr_ext_listen_timing()
  1359. attrs += p2p_attr_intended_interface_addr("02:02:02:02:02:02")
  1360. # very long channel list
  1361. attrs += struct.pack("<BH3BBB11B30B", P2P_ATTR_CHANNEL_LIST, 46,
  1362. 0x58, 0x58, 0x04,
  1363. 81, 11, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11,
  1364. 1, 1, 1, 2, 1, 2, 3, 1, 3, 4, 1, 4, 5, 1, 5,
  1365. 6, 1, 6, 7, 1, 7, 8, 1, 8, 9, 1, 9, 10, 1, 10)
  1366. attrs += p2p_attr_device_info(src, config_methods=0x0108)
  1367. attrs += p2p_attr_operating_channel()
  1368. msg['payload'] += ie_p2p(attrs)
  1369. hapd.mgmt_tx(msg)
  1370. check_p2p_response(hapd, dialog_token, P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD)
  1371. def mgmt_tx(dev, msg):
  1372. for i in range(0, 20):
  1373. if "FAIL" in dev.request(msg):
  1374. raise Exception("Failed to send Action frame")
  1375. ev = dev.wait_event(["MGMT-TX-STATUS"], timeout=10)
  1376. if ev is None:
  1377. raise Exception("Timeout on MGMT-TX-STATUS")
  1378. if "result=SUCCESS" in ev:
  1379. break
  1380. time.sleep(0.01)
  1381. if "result=SUCCESS" not in ev:
  1382. raise Exception("Peer did not ack Action frame")
  1383. def rx_go_neg_req(dev):
  1384. msg = dev.mgmt_rx()
  1385. if msg is None:
  1386. raise Exception("MGMT-RX timeout")
  1387. p2p = parse_p2p_public_action(msg['payload'])
  1388. if p2p is None:
  1389. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  1390. if p2p['subtype'] != P2P_GO_NEG_REQ:
  1391. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  1392. p2p['freq'] = msg['freq']
  1393. return p2p
  1394. def rx_go_neg_conf(dev, status=None, dialog_token=None):
  1395. msg = dev.mgmt_rx()
  1396. if msg is None:
  1397. raise Exception("MGMT-RX timeout")
  1398. p2p = parse_p2p_public_action(msg['payload'])
  1399. if p2p is None:
  1400. raise Exception("Not a P2P Public Action frame " + str(dialog_token))
  1401. if p2p['subtype'] != P2P_GO_NEG_CONF:
  1402. raise Exception("Unexpected subtype %d" % p2p['subtype'])
  1403. if dialog_token is not None and dialog_token != p2p['dialog_token']:
  1404. raise Exception("Unexpected dialog token")
  1405. if status is not None and p2p['p2p_status'] != status:
  1406. raise Exception("Unexpected status %d" % p2p['p2p_status'])
  1407. def check_p2p_go_neg_fail_event(dev, status):
  1408. ev = dev.wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=5)
  1409. if ev is None:
  1410. raise Exception("GO Negotiation failure not reported")
  1411. if "status=%d" % status not in ev:
  1412. raise Exception("Unexpected failure reason: " + ev)
  1413. def test_p2p_msg_go_neg_req_reject(dev, apdev):
  1414. """P2P protocol tests for user reject incorrectly in GO Neg Req"""
  1415. addr0 = dev[0].p2p_dev_addr()
  1416. addr1 = dev[1].p2p_dev_addr()
  1417. dev[0].p2p_listen()
  1418. dev[1].discover_peer(addr0)
  1419. dev[1].group_request("P2P_CONNECT " + addr0 + " pbc")
  1420. ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=10)
  1421. if ev is None:
  1422. raise Exception("Timeout on GO Neg Req")
  1423. peer = dev[0].get_peer(addr1)
  1424. dev[0].p2p_stop_find()
  1425. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_REQ, dialog_token=123)
  1426. attrs = p2p_attr_capability()
  1427. attrs += p2p_attr_status(status=P2P_SC_FAIL_REJECTED_BY_USER)
  1428. attrs += p2p_attr_go_intent()
  1429. attrs += p2p_attr_config_timeout()
  1430. attrs += p2p_attr_listen_channel()
  1431. attrs += p2p_attr_ext_listen_timing()
  1432. attrs += p2p_attr_intended_interface_addr(addr0)
  1433. attrs += p2p_attr_channel_list()
  1434. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1435. attrs += p2p_attr_operating_channel()
  1436. msg['payload'] += ie_p2p(attrs)
  1437. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=10 no_cck=1 action={}".format(addr1, addr1, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  1438. ev = dev[1].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=5)
  1439. if ev is None:
  1440. raise Exception("GO Negotiation failure not reported")
  1441. if "status=%d" % P2P_SC_FAIL_REJECTED_BY_USER not in ev:
  1442. raise Exception("Unexpected failure reason: " + ev)
  1443. def test_p2p_msg_unexpected_go_neg_resp(dev, apdev):
  1444. """P2P protocol tests for unexpected GO Neg Resp"""
  1445. addr0 = dev[0].p2p_dev_addr()
  1446. addr1 = dev[1].p2p_dev_addr()
  1447. dev[1].p2p_listen()
  1448. dev[0].discover_peer(addr1)
  1449. dev[0].p2p_stop_find()
  1450. peer = dev[0].get_peer(addr1)
  1451. logger.debug("GO Neg Resp without GO Neg session")
  1452. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=123)
  1453. attrs = p2p_attr_status()
  1454. attrs += p2p_attr_capability()
  1455. attrs += p2p_attr_go_intent()
  1456. attrs += p2p_attr_config_timeout()
  1457. attrs += p2p_attr_intended_interface_addr(addr0)
  1458. attrs += p2p_attr_channel_list()
  1459. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1460. attrs += p2p_attr_operating_channel()
  1461. msg['payload'] += ie_p2p(attrs)
  1462. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=10 no_cck=1 action={}".format(addr1, addr1, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  1463. dev[0].p2p_listen()
  1464. dev[1].discover_peer(addr0)
  1465. logger.debug("Unexpected GO Neg Resp while waiting for new GO Neg session")
  1466. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1467. raise Exception("P2P_CONNECT failed")
  1468. ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=10)
  1469. if ev is None:
  1470. raise Exception("Timeout on GO Neg Req")
  1471. dev[0].p2p_stop_find()
  1472. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=10 no_cck=1 action={}".format(addr1, addr1, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  1473. logger.debug("Invalid attribute in GO Neg Response")
  1474. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=197)
  1475. attrs = struct.pack("<BB", P2P_ATTR_CAPABILITY, 0)
  1476. msg['payload'] += ie_p2p(attrs)
  1477. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=10 no_cck=1 action={}".format(addr1, addr1, peer['listen_freq'], binascii.hexlify(msg['payload'])))
  1478. frame = dev[0].mgmt_rx(timeout=0.1)
  1479. if frame is not None:
  1480. raise Exception("Unexpected GO Neg Confirm")
  1481. logger.debug("GO Neg Resp with unexpected dialog token")
  1482. dev[1].p2p_stop_find()
  1483. if "FAIL" in dev[0].request("SET ext_mgmt_frame_handling 1"):
  1484. raise Exception("Failed to enable external management frame handling")
  1485. dev[0].p2p_listen()
  1486. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1487. raise Exception("P2P_CONNECT failed(2)")
  1488. p2p = rx_go_neg_req(dev[0])
  1489. dev[0].p2p_stop_find()
  1490. dialog_token = p2p['dialog_token']
  1491. if dialog_token < 255:
  1492. dialog_token += 1
  1493. else:
  1494. dialog_token = 1
  1495. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1496. attrs = p2p_attr_status()
  1497. attrs += p2p_attr_capability()
  1498. attrs += p2p_attr_go_intent()
  1499. attrs += p2p_attr_config_timeout()
  1500. attrs += p2p_attr_intended_interface_addr(addr0)
  1501. attrs += p2p_attr_channel_list()
  1502. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1503. attrs += p2p_attr_operating_channel()
  1504. msg['payload'] += ie_p2p(attrs)
  1505. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1506. logger.debug("GO Neg Resp without Status")
  1507. dev[1].p2p_stop_find()
  1508. dev[0].p2p_listen()
  1509. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1510. raise Exception("P2P_CONNECT failed(2)")
  1511. p2p = rx_go_neg_req(dev[0])
  1512. dev[0].p2p_stop_find()
  1513. dialog_token = p2p['dialog_token']
  1514. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1515. #attrs = p2p_attr_status()
  1516. attrs = p2p_attr_capability()
  1517. attrs += p2p_attr_go_intent()
  1518. attrs += p2p_attr_config_timeout()
  1519. attrs += p2p_attr_intended_interface_addr(addr0)
  1520. attrs += p2p_attr_channel_list()
  1521. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1522. attrs += p2p_attr_operating_channel()
  1523. msg['payload'] += ie_p2p(attrs)
  1524. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1525. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1526. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1527. logger.debug("GO Neg Resp without Intended Address")
  1528. dev[1].p2p_stop_find()
  1529. dev[0].p2p_listen()
  1530. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1531. raise Exception("P2P_CONNECT failed(2)")
  1532. p2p = rx_go_neg_req(dev[0])
  1533. dev[0].p2p_stop_find()
  1534. dialog_token = p2p['dialog_token']
  1535. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1536. attrs = p2p_attr_status()
  1537. #attrs += p2p_attr_capability()
  1538. attrs += p2p_attr_go_intent()
  1539. attrs += p2p_attr_config_timeout()
  1540. #attrs += p2p_attr_intended_interface_addr(addr0)
  1541. attrs += p2p_attr_channel_list()
  1542. #attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1543. attrs += p2p_attr_operating_channel()
  1544. msg['payload'] += ie_p2p(attrs)
  1545. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1546. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1547. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1548. logger.debug("GO Neg Resp without GO Intent")
  1549. dev[1].p2p_stop_find()
  1550. dev[0].p2p_listen()
  1551. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1552. raise Exception("P2P_CONNECT failed(2)")
  1553. p2p = rx_go_neg_req(dev[0])
  1554. dev[0].p2p_stop_find()
  1555. dialog_token = p2p['dialog_token']
  1556. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1557. attrs = p2p_attr_status()
  1558. attrs += p2p_attr_capability()
  1559. #attrs += p2p_attr_go_intent()
  1560. attrs += p2p_attr_config_timeout()
  1561. attrs += p2p_attr_intended_interface_addr(addr0)
  1562. attrs += p2p_attr_channel_list()
  1563. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1564. attrs += p2p_attr_operating_channel()
  1565. msg['payload'] += ie_p2p(attrs)
  1566. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1567. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1568. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1569. logger.debug("GO Neg Resp with invalid GO Intent")
  1570. dev[1].p2p_stop_find()
  1571. dev[0].p2p_listen()
  1572. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc"):
  1573. raise Exception("P2P_CONNECT failed(2)")
  1574. p2p = rx_go_neg_req(dev[0])
  1575. dev[0].p2p_stop_find()
  1576. dialog_token = p2p['dialog_token']
  1577. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1578. attrs = p2p_attr_status()
  1579. attrs += p2p_attr_capability()
  1580. attrs += p2p_attr_go_intent(go_intent=16)
  1581. attrs += p2p_attr_config_timeout()
  1582. attrs += p2p_attr_intended_interface_addr(addr0)
  1583. attrs += p2p_attr_channel_list()
  1584. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1585. attrs += p2p_attr_operating_channel()
  1586. msg['payload'] += ie_p2p(attrs)
  1587. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1588. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1589. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1590. logger.debug("GO Neg Resp with incompatible GO Intent")
  1591. dev[1].p2p_stop_find()
  1592. dev[0].p2p_listen()
  1593. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=15"):
  1594. raise Exception("P2P_CONNECT failed(2)")
  1595. p2p = rx_go_neg_req(dev[0])
  1596. dev[0].p2p_stop_find()
  1597. dialog_token = p2p['dialog_token']
  1598. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1599. attrs = p2p_attr_status()
  1600. attrs += p2p_attr_capability()
  1601. attrs += p2p_attr_go_intent(go_intent=15)
  1602. attrs += p2p_attr_config_timeout()
  1603. attrs += p2p_attr_intended_interface_addr(addr0)
  1604. attrs += p2p_attr_channel_list()
  1605. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1606. attrs += p2p_attr_operating_channel()
  1607. msg['payload'] += ie_p2p(attrs)
  1608. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1609. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INCOMPATIBLE_PARAMS)
  1610. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INCOMPATIBLE_PARAMS, dialog_token)
  1611. logger.debug("GO Neg Resp without P2P Group ID")
  1612. dev[1].p2p_stop_find()
  1613. dev[0].p2p_listen()
  1614. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=0"):
  1615. raise Exception("P2P_CONNECT failed(2)")
  1616. p2p = rx_go_neg_req(dev[0])
  1617. dev[0].p2p_stop_find()
  1618. dialog_token = p2p['dialog_token']
  1619. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1620. attrs = p2p_attr_status()
  1621. attrs += p2p_attr_capability()
  1622. attrs += p2p_attr_go_intent(go_intent=15)
  1623. attrs += p2p_attr_config_timeout()
  1624. attrs += p2p_attr_intended_interface_addr(addr0)
  1625. attrs += p2p_attr_channel_list()
  1626. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1627. attrs += p2p_attr_operating_channel()
  1628. #attrs += p2p_attr_group_id(src, "DIRECT-foo")
  1629. msg['payload'] += ie_p2p(attrs)
  1630. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1631. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1632. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1633. logger.debug("GO Neg Resp without Operating Channel")
  1634. dev[1].p2p_stop_find()
  1635. dev[0].p2p_listen()
  1636. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=0"):
  1637. raise Exception("P2P_CONNECT failed(2)")
  1638. p2p = rx_go_neg_req(dev[0])
  1639. dev[0].p2p_stop_find()
  1640. dialog_token = p2p['dialog_token']
  1641. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1642. attrs = p2p_attr_status()
  1643. attrs += p2p_attr_capability()
  1644. attrs += p2p_attr_go_intent(go_intent=15)
  1645. #attrs += p2p_attr_config_timeout()
  1646. attrs += p2p_attr_intended_interface_addr(addr0)
  1647. attrs += p2p_attr_channel_list()
  1648. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1649. #attrs += p2p_attr_operating_channel()
  1650. attrs += p2p_attr_group_id(addr0, "DIRECT-foo")
  1651. msg['payload'] += ie_p2p(attrs)
  1652. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1653. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1654. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1655. logger.debug("GO Neg Resp without Channel List")
  1656. dev[1].p2p_stop_find()
  1657. dev[0].p2p_listen()
  1658. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=0"):
  1659. raise Exception("P2P_CONNECT failed(2)")
  1660. p2p = rx_go_neg_req(dev[0])
  1661. dev[0].p2p_stop_find()
  1662. dialog_token = p2p['dialog_token']
  1663. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1664. attrs = p2p_attr_status()
  1665. attrs += p2p_attr_capability()
  1666. attrs += p2p_attr_go_intent(go_intent=15)
  1667. attrs += p2p_attr_config_timeout()
  1668. attrs += p2p_attr_intended_interface_addr(addr0)
  1669. #attrs += p2p_attr_channel_list()
  1670. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1671. attrs += p2p_attr_operating_channel()
  1672. attrs += p2p_attr_group_id(addr0, "DIRECT-foo")
  1673. msg['payload'] += ie_p2p(attrs)
  1674. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1675. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_INVALID_PARAMS)
  1676. rx_go_neg_conf(dev[0], P2P_SC_FAIL_INVALID_PARAMS, dialog_token)
  1677. logger.debug("GO Neg Resp without common channels")
  1678. dev[1].p2p_stop_find()
  1679. dev[0].p2p_listen()
  1680. if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=0"):
  1681. raise Exception("P2P_CONNECT failed(2)")
  1682. p2p = rx_go_neg_req(dev[0])
  1683. dev[0].p2p_stop_find()
  1684. dialog_token = p2p['dialog_token']
  1685. msg = p2p_hdr(addr1, addr0, type=P2P_GO_NEG_RESP, dialog_token=dialog_token)
  1686. attrs = p2p_attr_status()
  1687. attrs += p2p_attr_capability()
  1688. attrs += p2p_attr_go_intent(go_intent=15)
  1689. attrs += p2p_attr_config_timeout()
  1690. attrs += p2p_attr_intended_interface_addr(addr0)
  1691. attrs += struct.pack("<BH3BBB", P2P_ATTR_CHANNEL_LIST, 5,
  1692. 0x58, 0x58, 0x04,
  1693. 81, 0)
  1694. attrs += p2p_attr_device_info(addr0, config_methods=0x0108)
  1695. attrs += p2p_attr_operating_channel()
  1696. attrs += p2p_attr_group_id(addr0, "DIRECT-foo")
  1697. msg['payload'] += ie_p2p(attrs)
  1698. mgmt_tx(dev[0], "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr1, addr1, p2p['freq'], binascii.hexlify(msg['payload'])))
  1699. check_p2p_go_neg_fail_event(dev[1], P2P_SC_FAIL_NO_COMMON_CHANNELS)
  1700. rx_go_neg_conf(dev[0], P2P_SC_FAIL_NO_COMMON_CHANNELS, dialog_token)
  1701. def test_p2p_msg_group_info(dev):
  1702. """P2P protocol tests for Group Info parsing"""
  1703. try:
  1704. _test_p2p_msg_group_info(dev)
  1705. finally:
  1706. dev[0].request("VENDOR_ELEM_REMOVE 2 *")
  1707. def _test_p2p_msg_group_info(dev):
  1708. tests = [ "dd08506f9a090e010001",
  1709. "dd08506f9a090e010000",
  1710. "dd20506f9a090e190018" + "112233445566" + "aabbccddeeff" + "00" + "0000" + "0000000000000000" + "ff",
  1711. "dd20506f9a090e190018" + "112233445566" + "aabbccddeeff" + "00" + "0000" + "0000000000000000" + "00",
  1712. "dd24506f9a090e1d001c" + "112233445566" + "aabbccddeeff" + "00" + "0000" + "0000000000000000" + "00" + "00000000",
  1713. "dd24506f9a090e1d001c" + "112233445566" + "aabbccddeeff" + "00" + "0000" + "0000000000000000" + "00" + "10110001",
  1714. "dd24506f9a090e1d001c" + "112233445566" + "aabbccddeeff" + "00" + "0000" + "0000000000000000" + "00" + "1011ffff" ]
  1715. for t in tests:
  1716. dev[0].request("VENDOR_ELEM_REMOVE 2 *")
  1717. if "OK" not in dev[0].request("VENDOR_ELEM_ADD 2 " + t):
  1718. raise Exception("VENDOR_ELEM_ADD failed")
  1719. dev[0].p2p_start_go(freq=2412)
  1720. bssid = dev[0].get_group_status_field('bssid')
  1721. dev[2].request("BSS_FLUSH 0")
  1722. dev[2].scan_for_bss(bssid, freq=2412, force_scan=True)
  1723. bss = dev[2].request("BSS " + bssid)
  1724. if 'p2p_group_client' in bss:
  1725. raise Exception("Unexpected p2p_group_client")
  1726. dev[0].remove_group()
  1727. MGMT_SUBTYPE_ACTION = 13
  1728. ACTION_CATEG_PUBLIC = 4
  1729. GAS_INITIAL_REQUEST = 10
  1730. GAS_INITIAL_RESPONSE = 11
  1731. GAS_COMEBACK_REQUEST = 12
  1732. GAS_COMEBACK_RESPONSE = 13
  1733. def gas_hdr(dst, src, type, req=True, dialog_token=0):
  1734. msg = {}
  1735. msg['fc'] = MGMT_SUBTYPE_ACTION << 4
  1736. msg['da'] = dst
  1737. msg['sa'] = src
  1738. if req:
  1739. msg['bssid'] = dst
  1740. else:
  1741. msg['bssid'] = src
  1742. if dialog_token is None:
  1743. msg['payload'] = struct.pack("<BB", ACTION_CATEG_PUBLIC, type)
  1744. else:
  1745. msg['payload'] = struct.pack("<BBB", ACTION_CATEG_PUBLIC, type,
  1746. dialog_token)
  1747. return msg
  1748. def test_p2p_msg_sd(dev, apdev):
  1749. """P2P protocol tests for service discovery messages"""
  1750. dst, src, hapd, channel = start_p2p(dev, apdev)
  1751. logger.debug("Truncated GAS Initial Request - no Dialog Token field")
  1752. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST, dialog_token=None)
  1753. hapd.mgmt_tx(msg)
  1754. logger.debug("Truncated GAS Initial Request - no Advertisement Protocol element")
  1755. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1756. hapd.mgmt_tx(msg)
  1757. logger.debug("Truncated GAS Initial Request - no Advertisement Protocol element length")
  1758. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1759. msg['payload'] += struct.pack('B', 108)
  1760. hapd.mgmt_tx(msg)
  1761. logger.debug("Invalid GAS Initial Request - unexpected IE")
  1762. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1763. msg['payload'] += struct.pack('BB', 0, 0)
  1764. hapd.mgmt_tx(msg)
  1765. logger.debug("Truncated GAS Initial Request - too short Advertisement Protocol element")
  1766. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1767. msg['payload'] += struct.pack('BB', 108, 0)
  1768. hapd.mgmt_tx(msg)
  1769. logger.debug("Truncated GAS Initial Request - too short Advertisement Protocol element 2")
  1770. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1771. msg['payload'] += struct.pack('BBB', 108, 1, 127)
  1772. hapd.mgmt_tx(msg)
  1773. logger.debug("Invalid GAS Initial Request - unsupported GAS advertisement protocol id 255")
  1774. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1775. msg['payload'] += struct.pack('BBBB', 108, 2, 127, 255)
  1776. hapd.mgmt_tx(msg)
  1777. logger.debug("Truncated GAS Initial Request - no Query Request length field")
  1778. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1779. msg['payload'] += anqp_adv_proto()
  1780. hapd.mgmt_tx(msg)
  1781. logger.debug("Truncated GAS Initial Request - too short Query Request length field")
  1782. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1783. msg['payload'] += anqp_adv_proto()
  1784. msg['payload'] += struct.pack('<B', 0)
  1785. hapd.mgmt_tx(msg)
  1786. logger.debug("Truncated GAS Initial Request - too short Query Request field (minimum underflow)")
  1787. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1788. msg['payload'] += anqp_adv_proto()
  1789. msg['payload'] += struct.pack('<H', 1)
  1790. hapd.mgmt_tx(msg)
  1791. logger.debug("Truncated GAS Initial Request - too short Query Request field (maximum underflow)")
  1792. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1793. msg['payload'] += anqp_adv_proto()
  1794. msg['payload'] += struct.pack('<H', 65535)
  1795. hapd.mgmt_tx(msg)
  1796. logger.debug("Truncated GAS Initial Request - too short Query Request field")
  1797. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1798. msg['payload'] += anqp_adv_proto()
  1799. msg['payload'] += struct.pack('<H', 0)
  1800. hapd.mgmt_tx(msg)
  1801. logger.debug("Invalid GAS Initial Request - unsupported ANQP Info ID 65535")
  1802. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1803. msg['payload'] += anqp_adv_proto()
  1804. msg['payload'] += struct.pack('<HHH', 4, 65535, 0)
  1805. hapd.mgmt_tx(msg)
  1806. logger.debug("Invalid GAS Initial Request - invalid ANQP Query Request length (truncated frame)")
  1807. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1808. msg['payload'] += anqp_adv_proto()
  1809. msg['payload'] += struct.pack('<HHH', 4, 56797, 65535)
  1810. hapd.mgmt_tx(msg)
  1811. logger.debug("Invalid GAS Initial Request - invalid ANQP Query Request length (too short Query Request to contain OUI + OUI-type)")
  1812. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1813. msg['payload'] += anqp_adv_proto()
  1814. msg['payload'] += struct.pack('<HHH', 4, 56797, 0)
  1815. hapd.mgmt_tx(msg)
  1816. logger.debug("Invalid GAS Initial Request - unsupported ANQP vendor OUI-type")
  1817. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1818. msg['payload'] += anqp_adv_proto()
  1819. req = struct.pack('<HH', 56797, 4) + struct.pack('>L', 0x506f9a00)
  1820. msg['payload'] += struct.pack('<H', len(req)) + req
  1821. hapd.mgmt_tx(msg)
  1822. logger.debug("Truncated GAS Initial Request - no Service Update Indicator")
  1823. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1824. msg['payload'] += anqp_adv_proto()
  1825. req = struct.pack('<HH', 56797, 4) + struct.pack('>L', 0x506f9a09)
  1826. msg['payload'] += struct.pack('<H', len(req)) + req
  1827. hapd.mgmt_tx(msg)
  1828. logger.debug("Truncated GAS Initial Request - truncated Service Update Indicator")
  1829. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1830. msg['payload'] += anqp_adv_proto()
  1831. req = struct.pack('<HH', 56797, 4) + struct.pack('>L', 0x506f9a09)
  1832. req += struct.pack('<B', 0)
  1833. msg['payload'] += struct.pack('<H', len(req)) + req
  1834. hapd.mgmt_tx(msg)
  1835. logger.debug("Unexpected GAS Initial Response")
  1836. hapd.dump_monitor()
  1837. msg = gas_hdr(dst, src, GAS_INITIAL_RESPONSE)
  1838. msg['payload'] += struct.pack('<HH', 0, 0)
  1839. msg['payload'] += anqp_adv_proto()
  1840. msg['payload'] += struct.pack('<H', 0)
  1841. hapd.mgmt_tx(msg)
  1842. logger.debug("Truncated GAS Comeback Request - no Dialog Token field")
  1843. msg = gas_hdr(dst, src, GAS_COMEBACK_REQUEST, dialog_token=None)
  1844. hapd.mgmt_tx(msg)
  1845. logger.debug("GAS Comeback Request - no pending SD response fragment available")
  1846. msg = gas_hdr(dst, src, GAS_COMEBACK_REQUEST)
  1847. hapd.mgmt_tx(msg)
  1848. logger.debug("Unexpected GAS Comeback Response")
  1849. hapd.dump_monitor()
  1850. msg = gas_hdr(dst, src, GAS_COMEBACK_RESPONSE)
  1851. msg['payload'] += struct.pack('<HBH', 0, 0, 0)
  1852. msg['payload'] += anqp_adv_proto()
  1853. msg['payload'] += struct.pack('<H', 0)
  1854. hapd.mgmt_tx(msg)
  1855. logger.debug("Minimal GAS Initial Request")
  1856. hapd.dump_monitor()
  1857. msg = gas_hdr(dst, src, GAS_INITIAL_REQUEST)
  1858. msg['payload'] += anqp_adv_proto()
  1859. req = struct.pack('<HH', 56797, 4) + struct.pack('>L', 0x506f9a09)
  1860. req += struct.pack('<H', 0)
  1861. msg['payload'] += struct.pack('<H', len(req)) + req
  1862. hapd.mgmt_tx(msg)
  1863. resp = hapd.mgmt_rx()
  1864. if resp is None:
  1865. raise Exception("No response to minimal GAS Initial Request")