Test command for sending ML probe request

Add a control interface to trigger ML probes for testing purposes.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
This commit is contained in:
Andrei Otcheretianski 2023-06-12 22:59:49 +03:00 committed by Jouni Malinen
parent de5e01010c
commit 7ea2798c2c
2 changed files with 88 additions and 0 deletions

View file

@ -12037,6 +12037,80 @@ static int wpas_ctrl_iface_mlo_status(struct wpa_supplicant *wpa_s,
}
#ifdef CONFIG_TESTING_OPTIONS
static int wpas_ctrl_ml_probe(struct wpa_supplicant *wpa_s, char *cmd)
{
char *token, *context = NULL;
u8 bssid[ETH_ALEN];
int mld_id = -1, link_id = -1;
struct wpa_bss *bss;
int *freqs;
os_memset(bssid, 0, sizeof(bssid));
while ((token = str_token(cmd, " ", &context))) {
if (os_strncmp(token, "bssid=", 6) == 0) {
if (hwaddr_aton(token + 6, bssid))
return -1;
} else if (os_strncmp(token, "mld_id=", 7) == 0) {
mld_id = atoi(token + 7);
} else if (os_strncmp(token, "link_id=", 8) == 0) {
link_id = atoi(token + 8);
}
}
if (mld_id < 0 || is_zero_ether_addr(bssid)) {
wpa_printf(MSG_DEBUG,
"MLD: Failed parsing ML probe request arguments");
return -1;
}
bss = wpa_bss_get_bssid(wpa_s, bssid);
if (!bss) {
wpa_printf(MSG_DEBUG,
"MLD: Unknown BSS for " MACSTR, MAC2STR(bssid));
return -1;
}
if (wpa_s->sched_scanning || wpa_s->scanning ||
(wpa_s->wpa_state > WPA_SCANNING &&
wpa_s->wpa_state != WPA_COMPLETED)) {
wpa_printf(MSG_DEBUG,
"MLO: Ongoing scan: Reject ML probe request");
return -1;
}
freqs = os_malloc(sizeof(int) * 2);
if (!freqs)
return -1;
freqs[0] = bss->freq;
freqs[1] = 0;
wpa_s->manual_scan_passive = 0;
wpa_s->manual_scan_use_id = 0;
wpa_s->manual_scan_only_new = 0;
wpa_s->scan_id_count = 0;
wpa_s->scan_res_handler = scan_only_handler;
os_free(wpa_s->manual_scan_freqs);
wpa_s->manual_scan_freqs = freqs;
os_memcpy(wpa_s->ml_probe_bssid, bssid, ETH_ALEN);
wpa_s->ml_probe_mld_id = mld_id;
if (link_id >= 0)
wpa_s->ml_probe_links = BIT(link_id);
wpa_s->normal_scans = 0;
wpa_s->scan_req = MANUAL_SCAN_REQ;
wpa_s->after_wps = 0;
wpa_s->known_wps_freq = 0;
wpa_supplicant_req_scan(wpa_s, 0, 0);
return 0;
}
#endif /* CONFIG_TESTING_OPTIONS */
char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
char *buf, size_t *resp_len)
{
@ -12842,6 +12916,9 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
} else if (os_strcmp(buf, "TWT_TEARDOWN") == 0) {
if (wpas_ctrl_iface_send_twt_teardown(wpa_s, ""))
reply_len = -1;
} else if (os_strncmp(buf, "ML_PROBE_REQ ", 13) == 0) {
if (wpas_ctrl_ml_probe(wpa_s, buf + 13))
reply_len = -1;
#endif /* CONFIG_TESTING_OPTIONS */
} else if (os_strncmp(buf, "VENDOR_ELEM_ADD ", 16) == 0) {
if (wpas_ctrl_vendor_elem_add(wpa_s, buf + 16) < 0)

View file

@ -2091,10 +2091,19 @@ static int wpa_cli_cmd_resume(struct wpa_ctrl *ctrl, int argc, char *argv[])
#ifdef CONFIG_TESTING_OPTIONS
static int wpa_cli_cmd_drop_sa(struct wpa_ctrl *ctrl, int argc, char *argv[])
{
return wpa_ctrl_command(ctrl, "DROP_SA");
}
static int wpa_cli_cmd_ml_probe_req(struct wpa_ctrl *ctrl,
int argc, char *argv[])
{
return wpa_cli_cmd(ctrl, "ML_PROBE_REQ", 2, argc, argv);
}
#endif /* CONFIG_TESTING_OPTIONS */
@ -3673,6 +3682,8 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = {
#ifdef CONFIG_TESTING_OPTIONS
{ "drop_sa", wpa_cli_cmd_drop_sa, NULL, cli_cmd_flag_none,
"= drop SA without deauth/disassoc (test command)" },
{ "ml_probe_req", wpa_cli_cmd_ml_probe_req, NULL, cli_cmd_flag_none,
"= send Multi-Link Probe request <bssid=addr> <mld_id=id> [link_id=id] (test command)" },
#endif /* CONFIG_TESTING_OPTIONS */
{ "roam", wpa_cli_cmd_roam, wpa_cli_complete_bss,
cli_cmd_flag_none,