1mod aid;
6mod authenticator;
7mod event;
8mod remote_client;
9#[cfg(test)]
10pub mod test_utils;
11
12use event::*;
13use remote_client::*;
14
15use crate::responder::Responder;
16use crate::{mlme_event_name, MlmeRequest, MlmeSink};
17use fidl_fuchsia_wlan_mlme::{self as fidl_mlme, DeviceInfo, MlmeEvent};
18use futures::channel::{mpsc, oneshot};
19use ieee80211::{MacAddr, MacAddrBytes, Ssid};
20use log::{debug, error, info, warn};
21use std::collections::HashMap;
22use wlan_common::capabilities::get_device_band_cap;
23use wlan_common::channel::{Cbw, Channel};
24use wlan_common::ie::rsn::rsne::{RsnCapabilities, Rsne};
25use wlan_common::ie::{parse_ht_capabilities, ChanWidthSet, SupportedRate};
26use wlan_common::timer::{self, EventHandle, Timer};
27use wlan_common::{mac, RadioConfig};
28use wlan_rsn::psk;
29use {
30 fidl_fuchsia_wlan_common as fidl_common, fidl_fuchsia_wlan_ieee80211 as fidl_ieee80211,
31 fidl_fuchsia_wlan_internal as fidl_internal, fidl_fuchsia_wlan_sme as fidl_sme,
32};
33
34const DEFAULT_BEACON_PERIOD: u16 = 100;
35const DEFAULT_DTIM_PERIOD: u8 = 2;
36
37#[derive(Clone, Debug, PartialEq)]
38pub struct Config {
39 pub ssid: Ssid,
40 pub password: Vec<u8>,
41 pub radio_cfg: RadioConfig,
42}
43
44#[derive(Clone, Debug, PartialEq)]
46pub struct OpRadioConfig {
47 phy: fidl_common::WlanPhyType,
48 channel: Channel,
49}
50
51#[allow(clippy::large_enum_variant)] enum State {
53 Idle {
54 ctx: Context,
55 },
56 Starting {
57 ctx: Context,
58 ssid: Ssid,
59 rsn_cfg: Option<RsnCfg>,
60 capabilities: mac::CapabilityInfo,
61 rates: Vec<SupportedRate>,
62 start_responder: Responder<StartResult>,
63 stop_responders: Vec<Responder<fidl_sme::StopApResultCode>>,
64 start_timeout: EventHandle,
65 op_radio_cfg: OpRadioConfig,
66 },
67 Stopping {
68 ctx: Context,
69 stop_req: fidl_mlme::StopRequest,
70 responders: Vec<Responder<fidl_sme::StopApResultCode>>,
71 stop_timeout: Option<EventHandle>,
72 },
73 Started {
74 bss: InfraBss,
75 },
76}
77
78#[derive(Clone)]
79pub struct RsnCfg {
80 psk: psk::Psk,
81 rsne: Rsne,
82}
83
84struct InfraBss {
85 ssid: Ssid,
86 rsn_cfg: Option<RsnCfg>,
87 clients: HashMap<MacAddr, RemoteClient>,
88 aid_map: aid::Map,
89 op_radio_cfg: OpRadioConfig,
90 ctx: Context,
91}
92
93pub struct Context {
94 device_info: DeviceInfo,
95 mlme_sink: MlmeSink,
96 timer: Timer<Event>,
97}
98
99pub struct ApSme {
100 state: Option<State>,
101}
102
103#[derive(Debug, PartialEq)]
104pub enum StartResult {
105 Success,
106 Canceled,
107 TimedOut,
108 InvalidArguments(String),
109 PreviousStartInProgress,
110 AlreadyStarted,
111 InternalError,
112}
113
114impl ApSme {
115 pub fn new(
116 device_info: DeviceInfo,
117 ) -> (Self, crate::MlmeSink, crate::MlmeStream, timer::EventStream<Event>) {
118 let (mlme_sink, mlme_stream) = mpsc::unbounded();
119 let (timer, time_stream) = timer::create_timer();
120 let sme = ApSme {
121 state: Some(State::Idle {
122 ctx: Context { device_info, mlme_sink: MlmeSink::new(mlme_sink.clone()), timer },
123 }),
124 };
125 (sme, MlmeSink::new(mlme_sink), mlme_stream, time_stream)
126 }
127
128 pub fn on_start_command(&mut self, config: Config) -> oneshot::Receiver<StartResult> {
129 let (responder, receiver) = Responder::new();
130 self.state = self.state.take().map(|state| match state {
131 State::Idle { mut ctx } => {
132 let band_cap =
133 match get_device_band_cap(&ctx.device_info, config.radio_cfg.channel.primary) {
134 None => {
135 responder.respond(StartResult::InvalidArguments(format!(
136 "Device has not band capabilities for channel {}",
137 config.radio_cfg.channel.primary,
138 )));
139 return State::Idle { ctx };
140 }
141 Some(bc) => bc,
142 };
143
144 let op_radio_cfg = match validate_radio_cfg(band_cap, &config.radio_cfg) {
145 Err(result) => {
146 responder.respond(result);
147 return State::Idle { ctx };
148 }
149 Ok(op_radio_cfg) => op_radio_cfg,
150 };
151
152 let rsn_cfg_result = create_rsn_cfg(&config.ssid, &config.password[..]);
153 let rsn_cfg = match rsn_cfg_result {
154 Err(e) => {
155 responder.respond(e);
156 return State::Idle { ctx };
157 }
158 Ok(rsn_cfg) => rsn_cfg,
159 };
160
161 let capabilities =
162 mac::CapabilityInfo(ctx.device_info.softmac_hardware_capability as u16)
163 .with_ess(true)
166 .with_ibss(false)
167 .with_privacy(rsn_cfg.is_some());
171
172 let req = match create_start_request(
173 &op_radio_cfg,
174 &config.ssid,
175 rsn_cfg.as_ref(),
176 capabilities,
177 &band_cap.basic_rates,
180 ) {
181 Ok(req) => req,
182 Err(result) => {
183 responder.respond(result);
184 return State::Idle { ctx };
185 }
186 };
187
188 let rates = band_cap.basic_rates.iter().map(|r| SupportedRate(*r)).collect();
190
191 ctx.mlme_sink.send(MlmeRequest::Start(req));
192 let event = Event::Sme { event: SmeEvent::StartTimeout };
193 let start_timeout = ctx.timer.schedule(event);
194
195 State::Starting {
196 ctx,
197 ssid: config.ssid,
198 rsn_cfg,
199 capabilities,
200 rates,
201 start_responder: responder,
202 stop_responders: vec![],
203 start_timeout,
204 op_radio_cfg,
205 }
206 }
207 s @ State::Starting { .. } => {
208 responder.respond(StartResult::PreviousStartInProgress);
209 s
210 }
211 s @ State::Stopping { .. } => {
212 responder.respond(StartResult::Canceled);
213 s
214 }
215 s @ State::Started { .. } => {
216 responder.respond(StartResult::AlreadyStarted);
217 s
218 }
219 });
220 receiver
221 }
222
223 pub fn on_stop_command(&mut self) -> oneshot::Receiver<fidl_sme::StopApResultCode> {
224 let (responder, receiver) = Responder::new();
225 self.state = self.state.take().map(|mut state| match state {
226 State::Idle { mut ctx } => {
227 let stop_req = fidl_mlme::StopRequest { ssid: Ssid::empty().into() };
230 let timeout = send_stop_req(&mut ctx, stop_req.clone());
231 State::Stopping {
232 ctx,
233 stop_req,
234 responders: vec![responder],
235 stop_timeout: Some(timeout),
236 }
237 }
238 State::Starting { ref mut stop_responders, .. } => {
239 stop_responders.push(responder);
240 state
241 }
242 State::Stopping { mut ctx, stop_req, mut responders, mut stop_timeout } => {
243 responders.push(responder);
244 stop_timeout =
248 stop_timeout.or_else(|| Some(send_stop_req(&mut ctx, stop_req.clone())));
249 State::Stopping { ctx, stop_req, responders, stop_timeout }
250 }
251 State::Started { mut bss } => {
252 for client_addr in bss.clients.keys() {
256 bss.ctx.mlme_sink.send(MlmeRequest::Deauthenticate(
257 fidl_mlme::DeauthenticateRequest {
258 peer_sta_address: client_addr.to_array(),
259 reason_code: fidl_ieee80211::ReasonCode::StaLeaving,
264 },
265 ));
266 }
267
268 let stop_req = fidl_mlme::StopRequest { ssid: bss.ssid.to_vec() };
269 let timeout = send_stop_req(&mut bss.ctx, stop_req.clone());
270 State::Stopping {
271 ctx: bss.ctx,
272 stop_req,
273 responders: vec![responder],
274 stop_timeout: Some(timeout),
275 }
276 }
277 });
278 receiver
279 }
280
281 pub fn get_running_ap(&self) -> Option<fidl_sme::Ap> {
282 match self.state.as_ref() {
283 Some(State::Started { bss: InfraBss { ssid, op_radio_cfg, clients, .. }, .. }) => {
284 Some(fidl_sme::Ap {
285 ssid: ssid.to_vec(),
286 channel: op_radio_cfg.channel.primary,
287 num_clients: clients.len() as u16,
288 })
289 }
290 _ => None,
291 }
292 }
293}
294
295fn send_stop_req(ctx: &mut Context, stop_req: fidl_mlme::StopRequest) -> EventHandle {
296 let event = Event::Sme { event: SmeEvent::StopTimeout };
297 let stop_timeout = ctx.timer.schedule(event);
298 ctx.mlme_sink.send(MlmeRequest::Stop(stop_req));
299 stop_timeout
300}
301
302impl super::Station for ApSme {
303 type Event = Event;
304
305 fn on_mlme_event(&mut self, event: MlmeEvent) {
306 debug!("received MLME event: {:?}", &event);
307 self.state = self.state.take().map(|state| match state {
308 State::Idle { .. } => {
309 warn!("received MlmeEvent while ApSme is idle {:?}", mlme_event_name(&event));
310 state
311 }
312 State::Starting {
313 ctx,
314 ssid,
315 rsn_cfg,
316 capabilities,
317 rates,
318 start_responder,
319 stop_responders,
320 start_timeout,
321 op_radio_cfg,
322 } => match event {
323 MlmeEvent::StartConf { resp } => handle_start_conf(
324 resp,
325 ctx,
326 ssid,
327 rsn_cfg,
328 op_radio_cfg,
329 start_responder,
330 stop_responders,
331 ),
332 _ => {
333 warn!(
334 "received MlmeEvent while ApSme is starting {:?}",
335 mlme_event_name(&event)
336 );
337 State::Starting {
338 ctx,
339 ssid,
340 rsn_cfg,
341 capabilities,
342 rates,
343 start_responder,
344 stop_responders,
345 start_timeout,
346 op_radio_cfg,
347 }
348 }
349 },
350 State::Stopping { ctx, stop_req, mut responders, stop_timeout } => match event {
351 MlmeEvent::StopConf { resp } => match resp.result_code {
352 fidl_mlme::StopResultCode::Success
353 | fidl_mlme::StopResultCode::BssAlreadyStopped => {
354 for responder in responders.drain(..) {
355 responder.respond(fidl_sme::StopApResultCode::Success);
356 }
357 State::Idle { ctx }
358 }
359 fidl_mlme::StopResultCode::InternalError => {
360 for responder in responders.drain(..) {
361 responder.respond(fidl_sme::StopApResultCode::InternalError);
362 }
363 State::Stopping { ctx, stop_req, responders, stop_timeout: None }
364 }
365 },
366 _ => {
367 warn!(
368 "received MlmeEvent while ApSme is stopping {:?}",
369 mlme_event_name(&event)
370 );
371 State::Stopping { ctx, stop_req, responders, stop_timeout }
372 }
373 },
374 State::Started { mut bss } => {
375 match event {
376 MlmeEvent::OnChannelSwitched { info } => bss.handle_channel_switch(info),
377 MlmeEvent::AuthenticateInd { ind } => bss.handle_auth_ind(ind),
378 MlmeEvent::DeauthenticateInd { ind } => {
379 bss.handle_deauth(&ind.peer_sta_address.into())
380 }
381 MlmeEvent::DeauthenticateConf { resp } => {
384 bss.handle_deauth(&resp.peer_sta_address.into())
385 }
386 MlmeEvent::AssociateInd { ind } => bss.handle_assoc_ind(ind),
387 MlmeEvent::DisassociateInd { ind } => bss.handle_disassoc_ind(ind),
388 MlmeEvent::EapolInd { ind } => bss.handle_eapol_ind(ind),
389 MlmeEvent::EapolConf { resp } => bss.handle_eapol_conf(resp),
390 _ => {
391 warn!("unsupported MlmeEvent type {:?}; ignoring", mlme_event_name(&event))
392 }
393 }
394 State::Started { bss }
395 }
396 });
397 }
398
399 fn on_timeout(&mut self, timed_event: timer::Event<Event>) {
400 self.state = self.state.take().map(|mut state| match state {
401 State::Idle { .. } => state,
402 State::Starting {
403 start_timeout,
404 mut ctx,
405 start_responder,
406 stop_responders,
407 capabilities,
408 rates,
409 ssid,
410 rsn_cfg,
411 op_radio_cfg,
412 } => match timed_event.event {
413 Event::Sme { event: SmeEvent::StartTimeout } => {
414 warn!("Timed out waiting for MLME to start");
415 start_responder.respond(StartResult::TimedOut);
416 if stop_responders.is_empty() {
417 State::Idle { ctx }
418 } else {
419 let stop_req = fidl_mlme::StopRequest { ssid: ssid.to_vec() };
420 let timeout = send_stop_req(&mut ctx, stop_req.clone());
421 State::Stopping {
422 ctx,
423 stop_req,
424 responders: stop_responders,
425 stop_timeout: Some(timeout),
426 }
427 }
428 }
429 _ => State::Starting {
430 start_timeout,
431 ctx,
432 start_responder,
433 stop_responders,
434 capabilities,
435 rates,
436 ssid,
437 rsn_cfg,
438 op_radio_cfg,
439 },
440 },
441 State::Stopping { ctx, stop_req, mut responders, mut stop_timeout } => {
442 if let Event::Sme { event: SmeEvent::StopTimeout } = timed_event.event {
443 for responder in responders.drain(..) {
444 responder.respond(fidl_sme::StopApResultCode::TimedOut);
445 }
446 stop_timeout = None;
447 }
448 State::Stopping { ctx, stop_req, responders, stop_timeout }
451 }
452 State::Started { ref mut bss } => {
453 bss.handle_timeout(timed_event);
454 state
455 }
456 });
457 }
458}
459
460fn validate_radio_cfg(
462 band_cap: &fidl_mlme::BandCapability,
463 radio_cfg: &RadioConfig,
464) -> Result<OpRadioConfig, StartResult> {
465 let channel = radio_cfg.channel;
466 if !channel.is_valid_in_us() {
469 return Err(StartResult::InvalidArguments(format!("Invalid US channel {}", channel)));
470 }
471 if channel.is_dfs() {
472 return Err(StartResult::InvalidArguments(format!(
473 "DFS channels not supported: {}",
474 channel
475 )));
476 }
477
478 let phy = radio_cfg.phy;
479 match phy {
480 fidl_common::WlanPhyType::Dsss
481 | fidl_common::WlanPhyType::Hr
482 | fidl_common::WlanPhyType::Ofdm
483 | fidl_common::WlanPhyType::Erp => match channel.cbw {
484 Cbw::Cbw20 => (),
485 _ => {
486 return Err(StartResult::InvalidArguments(format!(
487 "PHY type {:?} not supported on channel {}",
488 phy, channel
489 )))
490 }
491 },
492 fidl_common::WlanPhyType::Ht => {
493 match channel.cbw {
494 Cbw::Cbw20 | Cbw::Cbw40 | Cbw::Cbw40Below => (),
495 _ => {
496 return Err(StartResult::InvalidArguments(format!(
497 "HT-mode not supported for channel {}",
498 channel
499 )))
500 }
501 }
502
503 match band_cap.ht_cap.as_ref() {
504 None => {
505 return Err(StartResult::InvalidArguments(format!(
506 "No HT capabilities: {}",
507 channel
508 )))
509 }
510 Some(ht_cap) => {
511 let ht_cap = parse_ht_capabilities(&ht_cap.bytes[..]).map_err(|e| {
512 error!("failed to parse HT capability bytes: {:?}", e);
513 StartResult::InternalError
514 })?;
515 let ht_cap_info = ht_cap.ht_cap_info;
516 if ht_cap_info.chan_width_set() == ChanWidthSet::TWENTY_ONLY
517 && channel.cbw != Cbw::Cbw20
518 {
519 return Err(StartResult::InvalidArguments(format!(
520 "20 MHz band capabilities does not support channel {}",
521 channel
522 )));
523 }
524 }
525 }
526 }
527 fidl_common::WlanPhyType::Vht => {
528 match channel.cbw {
529 Cbw::Cbw160 | Cbw::Cbw80P80 { .. } => {
530 return Err(StartResult::InvalidArguments(format!(
531 "Supported for channel {} in VHT mode not available",
532 channel
533 )))
534 }
535 _ => (),
536 }
537
538 if !channel.is_5ghz() {
539 return Err(StartResult::InvalidArguments(format!(
540 "VHT only supported on 5 GHz channels: {}",
541 channel
542 )));
543 }
544
545 if band_cap.vht_cap.is_none() {
546 return Err(StartResult::InvalidArguments(format!(
547 "No VHT capabilities: {}",
548 channel
549 )));
550 }
551 }
552 fidl_common::WlanPhyType::Dmg
553 | fidl_common::WlanPhyType::Tvht
554 | fidl_common::WlanPhyType::S1G
555 | fidl_common::WlanPhyType::Cdmg
556 | fidl_common::WlanPhyType::Cmmg
557 | fidl_common::WlanPhyType::He => {
558 return Err(StartResult::InvalidArguments(format!("Unsupported PHY type: {:?}", phy)))
559 }
560 fidl_common::WlanPhyTypeUnknown!() => {
561 return Err(StartResult::InvalidArguments(format!("Unknown PHY type: {:?}", phy)))
562 }
563 }
564
565 Ok(OpRadioConfig { phy, channel })
566}
567
568#[allow(clippy::too_many_arguments, reason = "mass allow for https://fxbug.dev/381896734")]
569fn handle_start_conf(
570 conf: fidl_mlme::StartConfirm,
571 mut ctx: Context,
572 ssid: Ssid,
573 rsn_cfg: Option<RsnCfg>,
574 op_radio_cfg: OpRadioConfig,
575 start_responder: Responder<StartResult>,
576 stop_responders: Vec<Responder<fidl_sme::StopApResultCode>>,
577) -> State {
578 if stop_responders.is_empty() {
579 match conf.result_code {
580 fidl_mlme::StartResultCode::Success => {
581 start_responder.respond(StartResult::Success);
582 State::Started {
583 bss: InfraBss {
584 ssid,
585 rsn_cfg,
586 clients: HashMap::new(),
587 aid_map: aid::Map::default(),
588 op_radio_cfg,
589 ctx,
590 },
591 }
592 }
593 result_code => {
594 error!("failed to start BSS: {:?}", result_code);
595 start_responder.respond(StartResult::InternalError);
596 State::Idle { ctx }
597 }
598 }
599 } else {
600 start_responder.respond(StartResult::Canceled);
601 let stop_req = fidl_mlme::StopRequest { ssid: ssid.to_vec() };
602 let timeout = send_stop_req(&mut ctx, stop_req.clone());
603 State::Stopping { ctx, stop_req, responders: stop_responders, stop_timeout: Some(timeout) }
604 }
605}
606
607impl InfraBss {
608 fn remove_client(&mut self, addr: &MacAddr) -> bool {
622 if let Some(client) = self.clients.remove(addr) {
623 if let Some(aid) = client.aid() {
624 self.aid_map.release_aid(aid);
625 }
626 true
627 } else {
628 false
629 }
630 }
631
632 fn handle_channel_switch(&mut self, info: fidl_internal::ChannelSwitchInfo) {
633 info!("Channel switch for AP {:?}", info);
634 self.op_radio_cfg.channel.primary = info.new_channel;
635 }
636
637 fn handle_auth_ind(&mut self, ind: fidl_mlme::AuthenticateIndication) {
638 let peer_addr: MacAddr = ind.peer_sta_address.into();
639 if self.remove_client(&peer_addr) {
640 warn!(
647 "client {} is trying to reauthenticate; removing client and starting again",
648 peer_addr
649 );
650 }
651 let mut client = RemoteClient::new(peer_addr);
652 client.handle_auth_ind(&mut self.ctx, ind.auth_type);
653 if !client.authenticated() {
654 info!("client {} was not authenticated", peer_addr);
655 return;
656 }
657
658 info!("client {} authenticated", peer_addr);
659 let _ = self.clients.insert(peer_addr, client);
660 }
661
662 fn handle_deauth(&mut self, peer_addr: &MacAddr) {
663 if !self.remove_client(peer_addr) {
664 warn!("client {} never authenticated, ignoring deauthentication request", peer_addr);
665 return;
666 }
667
668 info!("client {} deauthenticated", peer_addr);
669 }
670
671 fn handle_assoc_ind(&mut self, ind: fidl_mlme::AssociateIndication) {
672 let peer_addr: MacAddr = ind.peer_sta_address.into();
673
674 let client = match self.clients.get_mut(&peer_addr) {
675 None => {
676 warn!("client {} never authenticated, ignoring association indication", peer_addr);
677 return;
678 }
679 Some(client) => client,
680 };
681
682 client.handle_assoc_ind(
683 &mut self.ctx,
684 &mut self.aid_map,
685 ind.capability_info,
686 &ind.rates.into_iter().map(SupportedRate).collect::<Vec<_>>()[..],
687 &self.rsn_cfg,
688 ind.rsne,
689 );
690 if !client.authenticated() {
691 warn!("client {} failed to associate and was deauthenticated", peer_addr);
692 let _ = self.remove_client(&peer_addr);
693 } else if !client.associated() {
694 warn!("client {} failed to associate but did not deauthenticate", peer_addr);
695 } else {
696 info!("client {} associated", peer_addr);
697 }
698 }
699
700 fn handle_disassoc_ind(&mut self, ind: fidl_mlme::DisassociateIndication) {
701 let peer_addr: MacAddr = ind.peer_sta_address.into();
702
703 let client = match self.clients.get_mut(&peer_addr) {
704 None => {
705 warn!(
706 "client {} never authenticated, ignoring disassociation indication",
707 peer_addr
708 );
709 return;
710 }
711 Some(client) => client,
712 };
713
714 client.handle_disassoc_ind(&mut self.ctx, &mut self.aid_map);
715 if client.associated() {
716 panic!("client {} didn't disassociate? this should never happen!", peer_addr)
717 } else {
718 info!("client {} disassociated", peer_addr);
719 }
720 }
721
722 fn handle_timeout(&mut self, timed_event: timer::Event<Event>) {
723 match timed_event.event {
724 Event::Sme { .. } => (),
725 Event::Client { addr, event } => {
726 let client = match self.clients.get_mut(&addr) {
727 None => {
728 return;
729 }
730 Some(client) => client,
731 };
732
733 client.handle_timeout(&mut self.ctx, event);
734 if !client.authenticated() {
735 if !self.remove_client(&addr) {
736 error!("failed to remove client {} from AID map", addr);
737 }
738 info!("client {} lost authentication", addr);
739 }
740 }
741 }
742 }
743
744 fn handle_eapol_ind(&mut self, ind: fidl_mlme::EapolIndication) {
745 let peer_addr: MacAddr = ind.src_addr.into();
746 let client = match self.clients.get_mut(&peer_addr) {
747 None => {
748 warn!("client {} never authenticated, ignoring EAPoL indication", peer_addr);
749 return;
750 }
751 Some(client) => client,
752 };
753
754 client.handle_eapol_ind(&mut self.ctx, &ind.data[..]);
755 }
756
757 fn handle_eapol_conf(&mut self, resp: fidl_mlme::EapolConfirm) {
758 let dst_addr: MacAddr = resp.dst_addr.into();
759 let client = match self.clients.get_mut(&dst_addr) {
760 None => {
761 warn!("never sent EAPOL frame to client {}, ignoring confirm", dst_addr);
762 return;
763 }
764 Some(client) => client,
765 };
766
767 client.handle_eapol_conf(&mut self.ctx, resp.result_code);
768 }
769}
770
771fn create_rsn_cfg(ssid: &Ssid, password: &[u8]) -> Result<Option<RsnCfg>, StartResult> {
772 if password.is_empty() {
773 Ok(None)
774 } else {
775 let psk_result = psk::compute(password, ssid);
776 let psk = match psk_result {
777 Err(e) => {
778 return Err(StartResult::InvalidArguments(e.to_string()));
779 }
780 Ok(o) => o,
781 };
782
783 Ok(Some(RsnCfg { psk, rsne: Rsne::wpa2_rsne_with_caps(RsnCapabilities(0)) }))
786 }
787}
788
789fn create_start_request(
790 op_radio_cfg: &OpRadioConfig,
791 ssid: &Ssid,
792 ap_rsn: Option<&RsnCfg>,
793 capabilities: mac::CapabilityInfo,
794 basic_rates: &[u8],
795) -> Result<fidl_mlme::StartRequest, StartResult> {
796 let rsne_bytes = ap_rsn.as_ref().map(|RsnCfg { rsne, .. }| {
797 let mut buf = Vec::with_capacity(rsne.len());
798 if let Err(e) = rsne.write_into(&mut buf) {
799 error!("error writing RSNE into MLME-START.request: {}", e);
800 }
801 buf
802 });
803
804 let (channel_bandwidth, _secondary80) = op_radio_cfg.channel.cbw.to_fidl();
805
806 if basic_rates.len() > fidl_internal::MAX_ASSOC_BASIC_RATES as usize {
807 error!(
808 "Too many basic rates ({}). Max is {}.",
809 basic_rates.len(),
810 fidl_internal::MAX_ASSOC_BASIC_RATES
811 );
812 return Err(StartResult::InternalError);
813 }
814
815 Ok(fidl_mlme::StartRequest {
816 ssid: ssid.to_vec(),
817 bss_type: fidl_common::BssType::Infrastructure,
818 beacon_period: DEFAULT_BEACON_PERIOD,
819 dtim_period: DEFAULT_DTIM_PERIOD,
820 channel: op_radio_cfg.channel.primary,
821 capability_info: capabilities.raw(),
822 rates: basic_rates.to_vec(),
823 country: fidl_mlme::Country {
824 alpha2: [b'U', b'S'],
826 suffix: fidl_mlme::COUNTRY_ENVIRON_ALL,
827 },
828 rsne: rsne_bytes,
829 mesh_id: vec![],
830 phy: op_radio_cfg.phy,
831 channel_bandwidth,
832 })
833}
834
835#[cfg(test)]
836mod tests {
837 use super::*;
838 use crate::test_utils::*;
839 use crate::{MlmeStream, Station};
840 use fidl_fuchsia_wlan_mlme as fidl_mlme;
841 use lazy_static::lazy_static;
842 use test_case::test_case;
843 use wlan_common::assert_variant;
844 use wlan_common::channel::Cbw;
845 use wlan_common::mac::Aid;
846 use wlan_common::test_utils::fake_capabilities::{
847 fake_2ghz_band_capability_vht, fake_5ghz_band_capability, fake_5ghz_band_capability_ht_cbw,
848 };
849
850 lazy_static! {
851 static ref AP_ADDR: MacAddr = [0x11, 0x22, 0x33, 0x44, 0x55, 0x66].into();
852 static ref CLIENT_ADDR: MacAddr = [0x7A, 0xE7, 0x76, 0xD9, 0xF2, 0x67].into();
853 static ref CLIENT_ADDR2: MacAddr = [0x22, 0x22, 0x22, 0x22, 0x22, 0x22].into();
854 static ref SSID: Ssid = Ssid::try_from([0x46, 0x55, 0x43, 0x48, 0x53, 0x49, 0x41]).unwrap();
855 }
856
857 const RSNE: &[u8] = &[
858 0x30, 0x2A, 0x01, 0x00, 0x00, 0x0f, 0xac, 0x04, 0x01, 0x00, 0x00, 0x0f, 0xac, 0x04, 0x01, 0x00, 0x00, 0x0f, 0xac, 0x02, 0xa8, 0x04, 0x01, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10,
870 0x11, 0x00, 0x0f, 0xac, 0x04, ];
872
873 fn radio_cfg(primary_channel: u8) -> RadioConfig {
874 RadioConfig::new(fidl_common::WlanPhyType::Ht, Cbw::Cbw20, primary_channel)
875 }
876
877 fn unprotected_config() -> Config {
878 Config { ssid: SSID.clone(), password: vec![], radio_cfg: radio_cfg(11) }
879 }
880
881 fn protected_config() -> Config {
882 Config {
883 ssid: SSID.clone(),
884 password: vec![0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68],
885 radio_cfg: radio_cfg(11),
886 }
887 }
888
889 fn create_channel_switch_ind(channel: u8) -> MlmeEvent {
890 MlmeEvent::OnChannelSwitched {
891 info: fidl_internal::ChannelSwitchInfo { new_channel: channel },
892 }
893 }
894
895 #[test_case(false, None, fidl_common::WlanPhyType::Ht, 15, Cbw::Cbw20; "invalid US channel")]
896 #[test_case(false, None, fidl_common::WlanPhyType::Ht, 52, Cbw::Cbw20; "DFS channel")]
897 #[test_case(false, None, fidl_common::WlanPhyType::Dmg, 1, Cbw::Cbw20; "DMG not supported")]
898 #[test_case(false, None, fidl_common::WlanPhyType::Tvht, 1, Cbw::Cbw20; "TVHT not supported")]
899 #[test_case(false, None, fidl_common::WlanPhyType::S1G, 1, Cbw::Cbw20; "S1G not supported")]
900 #[test_case(false, None, fidl_common::WlanPhyType::Cdmg, 1, Cbw::Cbw20; "CDMG not supported")]
901 #[test_case(false, None, fidl_common::WlanPhyType::Cmmg, 1, Cbw::Cbw20; "CMMG not supported")]
902 #[test_case(false, None, fidl_common::WlanPhyType::He, 1, Cbw::Cbw20; "HE not supported")]
903 #[test_case(false, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw80; "invalid HT width")]
904 #[test_case(false, None, fidl_common::WlanPhyType::Erp, 1, Cbw::Cbw40; "non-HT greater than 20 MHz")]
905 #[test_case(false, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw80; "HT greater than 40 MHz")]
906 #[test_case(false, None, fidl_common::WlanPhyType::unknown(), 36, Cbw::Cbw40; "Unknown PHY type")]
907 #[test_case(false, Some(fake_5ghz_band_capability_ht_cbw(ChanWidthSet::TWENTY_ONLY)),
908 fidl_common::WlanPhyType::Ht, 44, Cbw::Cbw40; "HT 20 MHz only")]
909 #[test_case(false, Some(fidl_mlme::BandCapability {
910 ht_cap: None, ..fake_5ghz_band_capability()
911 }),
912 fidl_common::WlanPhyType::Ht, 48, Cbw::Cbw40; "No HT capabilities")]
913 #[test_case(false, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw160; "160 MHz not supported")]
914 #[test_case(false, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw80P80 { secondary80: 106 }; "80+80 MHz not supported")]
915 #[test_case(false, None, fidl_common::WlanPhyType::Vht, 1, Cbw::Cbw20; "VHT 2.4 GHz not supported")]
916 #[test_case(false, Some(fidl_mlme::BandCapability {
917 vht_cap: None,
918 ..fake_5ghz_band_capability()
919 }),
920 fidl_common::WlanPhyType::Vht, 149, Cbw::Cbw40; "no VHT capabilities")]
921 #[test_case(true, None, fidl_common::WlanPhyType::Hr, 1, Cbw::Cbw20)]
922 #[test_case(true, None, fidl_common::WlanPhyType::Erp, 1, Cbw::Cbw20)]
923 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 1, Cbw::Cbw20)]
924 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 1, Cbw::Cbw40)]
925 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 11, Cbw::Cbw40Below)]
926 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw20)]
927 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw40)]
928 #[test_case(true, None, fidl_common::WlanPhyType::Ht, 40, Cbw::Cbw40Below)]
929 #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw20)]
930 #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw40)]
931 #[test_case(true, None, fidl_common::WlanPhyType::Vht, 40, Cbw::Cbw40Below)]
932 #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw80)]
933 fn test_validate_radio_cfg(
934 valid: bool,
935 band_cap: Option<fidl_mlme::BandCapability>,
936 phy: fidl_common::WlanPhyType,
937 primary: u8,
938 cbw: Cbw,
939 ) {
940 let channel = Channel::new(primary, cbw);
941 #[allow(
942 clippy::redundant_field_names,
943 reason = "mass allow for https://fxbug.dev/381896734"
944 )]
945 let radio_cfg = RadioConfig { phy: phy, channel: channel };
946 #[allow(
947 clippy::redundant_field_names,
948 reason = "mass allow for https://fxbug.dev/381896734"
949 )]
950 let expected_op_radio_cfg = OpRadioConfig { phy: phy, channel: channel };
951 let band_cap = match band_cap {
952 Some(band_cap) => band_cap,
953 None => fake_2ghz_band_capability_vht(),
954 };
955
956 match validate_radio_cfg(&band_cap, &radio_cfg) {
957 Ok(op_radio_cfg) => {
958 if valid {
959 assert_eq!(op_radio_cfg, expected_op_radio_cfg);
960 } else {
961 panic!("Unexpected successful validation");
962 }
963 }
964 Err(StartResult::InvalidArguments { .. }) => {
965 if valid {
966 panic!("Unexpected failure to validate.");
967 }
968 }
969 Err(other) => {
970 panic!("Unexpected StartResult value: {:?}", other);
971 }
972 }
973 }
974
975 #[fuchsia::test(allow_stalls = false)]
976 async fn authenticate_while_sme_is_idle() {
977 let (mut sme, mut mlme_stream, _) = create_sme().await;
978 let client = Client::default();
979 sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
980
981 assert_variant!(mlme_stream.try_next(), Err(e) => {
982 assert_eq!(e.to_string(), "receiver channel is empty");
983 });
984 }
985
986 #[fuchsia::test(allow_stalls = false)]
988 async fn status_when_sme_is_idle() {
989 let (sme, _, _) = create_sme().await;
990 assert_eq!(None, sme.get_running_ap());
991 }
992
993 #[fuchsia::test(allow_stalls = false)]
994 async fn ap_starts_success() {
995 let (mut sme, mut mlme_stream, _) = create_sme().await;
996 let mut receiver = sme.on_start_command(unprotected_config());
997
998 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(start_req))) => {
999 assert_eq!(start_req.ssid, SSID.to_vec());
1000 assert_eq!(
1001 start_req.capability_info,
1002 mac::CapabilityInfo(0).with_short_preamble(true).with_ess(true).raw(),
1003 );
1004 assert_eq!(start_req.bss_type, fidl_common::BssType::Infrastructure);
1005 assert_ne!(start_req.beacon_period, 0);
1006 assert_eq!(start_req.dtim_period, DEFAULT_DTIM_PERIOD);
1007 assert_eq!(
1008 start_req.channel,
1009 unprotected_config().radio_cfg.channel.primary,
1010 );
1011 assert!(start_req.rsne.is_none());
1012 });
1013
1014 assert_eq!(Ok(None), receiver.try_recv());
1015 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1016 assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1017 }
1018
1019 #[fuchsia::test(allow_stalls = false)]
1021 async fn ap_starts_success_get_running_ap() {
1022 let (mut sme, mut mlme_stream, _) = create_sme().await;
1023 let mut receiver = sme.on_start_command(unprotected_config());
1024 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_start_req))) => {});
1025 assert_eq!(None, sme.get_running_ap());
1027 assert_eq!(Ok(None), receiver.try_recv());
1028 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1029 assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1030 assert_eq!(
1031 Some(fidl_sme::Ap {
1032 ssid: SSID.to_vec(),
1033 channel: unprotected_config().radio_cfg.channel.primary,
1034 num_clients: 0,
1035 }),
1036 sme.get_running_ap()
1037 );
1038 }
1039
1040 #[fuchsia::test(allow_stalls = false)]
1042 async fn ap_check_status_after_channel_change() {
1043 let (mut sme, _, _) = start_unprotected_ap().await;
1044 assert_eq!(
1046 Some(fidl_sme::Ap {
1047 ssid: SSID.to_vec(),
1048 channel: unprotected_config().radio_cfg.channel.primary,
1049 num_clients: 0,
1050 }),
1051 sme.get_running_ap()
1052 );
1053 sme.on_mlme_event(create_channel_switch_ind(6));
1054 assert_eq!(
1056 Some(fidl_sme::Ap { ssid: SSID.to_vec(), channel: 6, num_clients: 0 }),
1057 sme.get_running_ap()
1058 );
1059 }
1060
1061 #[fuchsia::test(allow_stalls = false)]
1062 async fn ap_starts_timeout() {
1063 let (mut sme, _, mut time_stream) = create_sme().await;
1064 let mut receiver = sme.on_start_command(unprotected_config());
1065
1066 let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1067 sme.on_timeout(event);
1068
1069 assert_eq!(Ok(Some(StartResult::TimedOut)), receiver.try_recv());
1070 assert_eq!(None, sme.get_running_ap());
1072 }
1073
1074 #[fuchsia::test(allow_stalls = false, logging = false)]
1076 async fn ap_starts_fails() {
1077 let (mut sme, _, _) = create_sme().await;
1078 let mut receiver = sme.on_start_command(unprotected_config());
1079
1080 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::NotSupported));
1081 assert_eq!(Ok(Some(StartResult::InternalError)), receiver.try_recv());
1082 assert_eq!(None, sme.get_running_ap());
1084 }
1085
1086 #[fuchsia::test(allow_stalls = false)]
1087 async fn start_req_while_ap_is_starting() {
1088 let (mut sme, _, _) = create_sme().await;
1089 let mut receiver_one = sme.on_start_command(unprotected_config());
1090
1091 let mut receiver_two = sme.on_start_command(unprotected_config());
1093 assert_eq!(Ok(Some(StartResult::PreviousStartInProgress)), receiver_two.try_recv());
1094
1095 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1097 assert_eq!(Ok(Some(StartResult::Success)), receiver_one.try_recv());
1098 }
1099
1100 #[fuchsia::test(allow_stalls = false)]
1101 async fn start_req_while_ap_is_stopping() {
1102 let (mut sme, _, _) = start_unprotected_ap().await;
1103 let mut stop_receiver = sme.on_stop_command();
1104 let mut start_receiver = sme.on_start_command(unprotected_config());
1105 assert_eq!(Ok(None), stop_receiver.try_recv());
1106 assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1107 }
1108
1109 #[fuchsia::test(allow_stalls = false)]
1110 async fn ap_stops_while_idle() {
1111 let (mut sme, mut mlme_stream, _) = create_sme().await;
1112 let mut receiver = sme.on_stop_command();
1113 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1114 assert!(stop_req.ssid.is_empty());
1115 });
1116
1117 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1119 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1120 }
1121
1122 #[fuchsia::test(allow_stalls = false)]
1123 async fn stop_req_while_ap_is_starting_then_succeeds() {
1124 let (mut sme, mut mlme_stream, _) = create_sme().await;
1125 let mut start_receiver = sme.on_start_command(unprotected_config());
1126 let mut stop_receiver = sme.on_stop_command();
1127 assert_eq!(Ok(None), start_receiver.try_recv());
1128 assert_eq!(Ok(None), stop_receiver.try_recv());
1129
1130 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_))));
1132 assert_variant!(mlme_stream.try_next(), Err(e) => {
1133 assert_eq!(e.to_string(), "receiver channel is empty");
1134 });
1135
1136 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1138 assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1139 assert_eq!(Ok(None), stop_receiver.try_recv());
1140 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1141 assert_eq!(stop_req.ssid, SSID.to_vec());
1142 });
1143
1144 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1146 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver.try_recv());
1147 }
1148
1149 #[fuchsia::test(allow_stalls = false)]
1150 async fn stop_req_while_ap_is_starting_then_times_out() {
1151 let (mut sme, mut mlme_stream, mut time_stream) = create_sme().await;
1152 let mut start_receiver = sme.on_start_command(unprotected_config());
1153 let mut stop_receiver = sme.on_stop_command();
1154 assert_eq!(Ok(None), start_receiver.try_recv());
1155 assert_eq!(Ok(None), stop_receiver.try_recv());
1156
1157 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_))));
1159 assert_variant!(mlme_stream.try_next(), Err(e) => {
1160 assert_eq!(e.to_string(), "receiver channel is empty");
1161 });
1162
1163 let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1165 sme.on_timeout(event);
1166 assert_eq!(Ok(Some(StartResult::TimedOut)), start_receiver.try_recv());
1167 assert_eq!(Ok(None), stop_receiver.try_recv());
1168 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1169 assert_eq!(stop_req.ssid, SSID.to_vec());
1170 });
1171
1172 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1174 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver.try_recv());
1175 }
1176
1177 #[fuchsia::test(allow_stalls = false)]
1178 async fn ap_stops_after_started() {
1179 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1180 let mut receiver = sme.on_stop_command();
1181
1182 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1183 assert_eq!(stop_req.ssid, SSID.to_vec());
1184 });
1185 assert_eq!(Ok(None), receiver.try_recv());
1186 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::BssAlreadyStopped));
1187 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1188 }
1189
1190 #[fuchsia::test(allow_stalls = false)]
1191 async fn ap_stops_after_started_and_deauths_all_clients() {
1192 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1193 let client = Client::default();
1194 sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1195 client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1196
1197 assert_eq!(
1199 Some(fidl_sme::Ap {
1200 ssid: SSID.to_vec(),
1201 channel: unprotected_config().radio_cfg.channel.primary,
1202 num_clients: 1,
1203 }),
1204 sme.get_running_ap()
1205 );
1206 let mut receiver = sme.on_stop_command();
1207 assert_variant!(
1208 mlme_stream.try_next(),
1209 Ok(Some(MlmeRequest::Deauthenticate(deauth_req))) => {
1210 assert_eq!(&deauth_req.peer_sta_address, client.addr.as_array());
1211 assert_eq!(deauth_req.reason_code, fidl_ieee80211::ReasonCode::StaLeaving);
1212 });
1213
1214 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1215 assert_eq!(stop_req.ssid, SSID.to_vec());
1216 });
1217 assert_eq!(Ok(None), receiver.try_recv());
1218 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1219 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1220
1221 assert_eq!(None, sme.get_running_ap());
1223 }
1224
1225 #[fuchsia::test(allow_stalls = false)]
1226 async fn ap_queues_concurrent_stop_requests() {
1227 let (mut sme, _, _) = start_unprotected_ap().await;
1228 let mut receiver1 = sme.on_stop_command();
1229 let mut receiver2 = sme.on_stop_command();
1230
1231 assert_eq!(Ok(None), receiver1.try_recv());
1232 assert_eq!(Ok(None), receiver2.try_recv());
1233
1234 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1235 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver1.try_recv());
1236 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver2.try_recv());
1237 }
1238
1239 #[fuchsia::test(allow_stalls = false)]
1240 async fn uncleaned_stopping_state() {
1241 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1242 let mut stop_receiver1 = sme.on_stop_command();
1243 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1245 assert_eq!(stop_req.ssid, SSID.to_vec());
1246 });
1247
1248 assert_eq!(Ok(None), stop_receiver1.try_recv());
1249 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::InternalError));
1250 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::InternalError)), stop_receiver1.try_recv());
1251
1252 let mut start_receiver = sme.on_start_command(unprotected_config());
1254 assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1255 assert_variant!(mlme_stream.try_next(), Err(e) => {
1256 assert_eq!(e.to_string(), "receiver channel is empty");
1257 });
1258
1259 let mut stop_receiver2 = sme.on_stop_command();
1261 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1262 assert_eq!(stop_req.ssid, SSID.to_vec());
1263 });
1264
1265 assert_eq!(Ok(None), stop_receiver2.try_recv());
1267 sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1268 assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver2.try_recv());
1269 }
1270
1271 #[fuchsia::test(allow_stalls = false)]
1272 async fn client_authenticates_supported_authentication_type() {
1273 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1274 let client = Client::default();
1275 sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1276 client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1277 }
1278
1279 #[fuchsia::test(allow_stalls = false, logging = false)]
1281 async fn client_authenticates_unsupported_authentication_type() {
1282 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1283 let client = Client::default();
1284 let auth_ind = client.create_auth_ind(fidl_mlme::AuthenticationTypes::FastBssTransition);
1285 sme.on_mlme_event(auth_ind);
1286 client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Refused);
1287 }
1288
1289 #[fuchsia::test(allow_stalls = false)]
1290 async fn client_associates_unprotected_network() {
1291 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1292 let client = Client::default();
1293 sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1294 client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1295
1296 sme.on_mlme_event(client.create_assoc_ind(None));
1297 client.verify_assoc_resp(
1298 &mut mlme_stream,
1299 1,
1300 fidl_mlme::AssociateResultCode::Success,
1301 false,
1302 );
1303 }
1304
1305 #[fuchsia::test(allow_stalls = false)]
1306 async fn client_associates_valid_rsne() {
1307 let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1308 let client = Client::default();
1309 client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1310
1311 sme.on_mlme_event(client.create_assoc_ind(Some(RSNE.to_vec())));
1312 client.verify_assoc_resp(
1313 &mut mlme_stream,
1314 1,
1315 fidl_mlme::AssociateResultCode::Success,
1316 true,
1317 );
1318 client.verify_eapol_req(&mut mlme_stream);
1319 }
1320
1321 #[fuchsia::test(allow_stalls = false, logging = false)]
1323 async fn client_associates_invalid_rsne() {
1324 let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1325 let client = Client::default();
1326 client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1327
1328 sme.on_mlme_event(client.create_assoc_ind(None));
1329 client.verify_refused_assoc_resp(
1330 &mut mlme_stream,
1331 fidl_mlme::AssociateResultCode::RefusedCapabilitiesMismatch,
1332 );
1333 }
1334
1335 #[fuchsia::test(allow_stalls = false)]
1336 async fn rsn_handshake_timeout() {
1337 let (mut sme, mut mlme_stream, mut time_stream) = start_protected_ap().await;
1338 let client = Client::default();
1339 client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1340
1341 assert_variant!(time_stream.try_next(), Ok(Some(_)));
1343
1344 sme.on_mlme_event(client.create_assoc_ind(Some(RSNE.to_vec())));
1345 client.verify_assoc_resp(
1346 &mut mlme_stream,
1347 1,
1348 fidl_mlme::AssociateResultCode::Success,
1349 true,
1350 );
1351
1352 assert_variant!(time_stream.try_next(), Ok(Some(_)));
1354
1355 for _i in 0..4 {
1356 client.verify_eapol_req(&mut mlme_stream);
1357 let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1358 sme.on_timeout(event);
1359 }
1360
1361 client.verify_deauth_req(
1362 &mut mlme_stream,
1363 fidl_ieee80211::ReasonCode::FourwayHandshakeTimeout,
1364 );
1365 }
1366
1367 #[fuchsia::test(allow_stalls = false)]
1368 async fn client_restarts_authentication_flow() {
1369 let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1370 let client = Client::default();
1371 client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1372 client.associate_and_drain_mlme(&mut sme, &mut mlme_stream, None);
1373
1374 sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1375 client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1376
1377 sme.on_mlme_event(client.create_assoc_ind(None));
1378 client.verify_assoc_resp(
1379 &mut mlme_stream,
1380 1,
1381 fidl_mlme::AssociateResultCode::Success,
1382 false,
1383 );
1384 }
1385
1386 #[fuchsia::test(allow_stalls = false)]
1387 async fn multiple_clients_associate() {
1388 let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1389 let client1 = Client::default();
1390 let client2 = Client { addr: *CLIENT_ADDR2 };
1391
1392 sme.on_mlme_event(client1.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1393 client1.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1394
1395 sme.on_mlme_event(client2.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1396 client2.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1397
1398 sme.on_mlme_event(client1.create_assoc_ind(Some(RSNE.to_vec())));
1399 client1.verify_assoc_resp(
1400 &mut mlme_stream,
1401 1,
1402 fidl_mlme::AssociateResultCode::Success,
1403 true,
1404 );
1405 client1.verify_eapol_req(&mut mlme_stream);
1406
1407 sme.on_mlme_event(client2.create_assoc_ind(Some(RSNE.to_vec())));
1408 client2.verify_assoc_resp(
1409 &mut mlme_stream,
1410 2,
1411 fidl_mlme::AssociateResultCode::Success,
1412 true,
1413 );
1414 client2.verify_eapol_req(&mut mlme_stream);
1415 }
1416
1417 fn create_start_conf(result_code: fidl_mlme::StartResultCode) -> MlmeEvent {
1418 MlmeEvent::StartConf { resp: fidl_mlme::StartConfirm { result_code } }
1419 }
1420
1421 fn create_stop_conf(result_code: fidl_mlme::StopResultCode) -> MlmeEvent {
1422 MlmeEvent::StopConf { resp: fidl_mlme::StopConfirm { result_code } }
1423 }
1424
1425 struct Client {
1426 addr: MacAddr,
1427 }
1428
1429 impl Client {
1430 fn default() -> Self {
1431 Client { addr: *CLIENT_ADDR }
1432 }
1433
1434 fn authenticate_and_drain_mlme(
1435 &self,
1436 sme: &mut ApSme,
1437 mlme_stream: &mut crate::MlmeStream,
1438 ) {
1439 sme.on_mlme_event(self.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1440 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::AuthResponse(..))));
1441 }
1442
1443 fn associate_and_drain_mlme(
1444 &self,
1445 sme: &mut ApSme,
1446 mlme_stream: &mut crate::MlmeStream,
1447 rsne: Option<Vec<u8>>,
1448 ) {
1449 sme.on_mlme_event(self.create_assoc_ind(rsne));
1450 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::AssocResponse(..))));
1451 }
1452
1453 fn create_auth_ind(&self, auth_type: fidl_mlme::AuthenticationTypes) -> MlmeEvent {
1454 MlmeEvent::AuthenticateInd {
1455 ind: fidl_mlme::AuthenticateIndication {
1456 peer_sta_address: self.addr.to_array(),
1457 auth_type,
1458 },
1459 }
1460 }
1461
1462 fn create_assoc_ind(&self, rsne: Option<Vec<u8>>) -> MlmeEvent {
1463 MlmeEvent::AssociateInd {
1464 ind: fidl_mlme::AssociateIndication {
1465 peer_sta_address: self.addr.to_array(),
1466 listen_interval: 100,
1467 ssid: Some(SSID.to_vec()),
1468 rsne,
1469 capability_info: mac::CapabilityInfo(0).with_short_preamble(true).raw(),
1470 rates: vec![
1471 0x82, 0x84, 0x8b, 0x96, 0x0c, 0x12, 0x18, 0x24, 0x30, 0x48, 0x60, 0x6c,
1472 ],
1473 },
1474 }
1475 }
1476
1477 fn verify_auth_resp(
1478 &self,
1479 mlme_stream: &mut MlmeStream,
1480 result_code: fidl_mlme::AuthenticateResultCode,
1481 ) {
1482 let msg = mlme_stream.try_next();
1483 assert_variant!(msg, Ok(Some(MlmeRequest::AuthResponse(auth_resp))) => {
1484 assert_eq!(&auth_resp.peer_sta_address, self.addr.as_array());
1485 assert_eq!(auth_resp.result_code, result_code);
1486 });
1487 }
1488
1489 fn verify_assoc_resp(
1490 &self,
1491 mlme_stream: &mut MlmeStream,
1492 aid: Aid,
1493 result_code: fidl_mlme::AssociateResultCode,
1494 privacy: bool,
1495 ) {
1496 let msg = mlme_stream.try_next();
1497 assert_variant!(msg, Ok(Some(MlmeRequest::AssocResponse(assoc_resp))) => {
1498 assert_eq!(&assoc_resp.peer_sta_address, self.addr.as_array());
1499 assert_eq!(assoc_resp.association_id, aid);
1500 assert_eq!(assoc_resp.result_code, result_code);
1501 assert_eq!(
1502 assoc_resp.capability_info,
1503 mac::CapabilityInfo(0).with_short_preamble(true).with_privacy(privacy).raw(),
1504 );
1505 });
1506 }
1507
1508 fn verify_refused_assoc_resp(
1509 &self,
1510 mlme_stream: &mut MlmeStream,
1511 result_code: fidl_mlme::AssociateResultCode,
1512 ) {
1513 let msg = mlme_stream.try_next();
1514 assert_variant!(msg, Ok(Some(MlmeRequest::AssocResponse(assoc_resp))) => {
1515 assert_eq!(&assoc_resp.peer_sta_address, self.addr.as_array());
1516 assert_eq!(assoc_resp.association_id, 0);
1517 assert_eq!(assoc_resp.result_code, result_code);
1518 assert_eq!(assoc_resp.capability_info, 0);
1519 });
1520 }
1521
1522 fn verify_eapol_req(&self, mlme_stream: &mut MlmeStream) {
1523 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Eapol(eapol_req))) => {
1524 assert_eq!(&eapol_req.src_addr, AP_ADDR.as_array());
1525 assert_eq!(&eapol_req.dst_addr, self.addr.as_array());
1526 assert!(!eapol_req.data.is_empty());
1527 });
1528 }
1529
1530 fn verify_deauth_req(
1531 &self,
1532 mlme_stream: &mut MlmeStream,
1533 reason_code: fidl_ieee80211::ReasonCode,
1534 ) {
1535 let msg = mlme_stream.try_next();
1536 assert_variant!(msg, Ok(Some(MlmeRequest::Deauthenticate(deauth_req))) => {
1537 assert_eq!(&deauth_req.peer_sta_address, self.addr.as_array());
1538 assert_eq!(deauth_req.reason_code, reason_code);
1539 });
1540 }
1541 }
1542
1543 async fn start_protected_ap() -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1547 start_ap(true).await
1548 }
1549
1550 async fn start_unprotected_ap() -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1554 start_ap(false).await
1555 }
1556
1557 async fn start_ap(protected: bool) -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1561 let (mut sme, mut mlme_stream, mut time_stream) = create_sme().await;
1562 let config = if protected { protected_config() } else { unprotected_config() };
1563 let mut receiver = sme.on_start_command(config);
1564 assert_eq!(Ok(None), receiver.try_recv());
1565 assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(..))));
1566 while time_stream.try_next().is_ok() {}
1568 sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1569
1570 assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1571 (sme, mlme_stream, time_stream)
1572 }
1573
1574 async fn create_sme() -> (ApSme, MlmeStream, timer::EventStream<Event>) {
1578 let (ap_sme, _mlme_sink, mlme_stream, time_stream) = ApSme::new(fake_device_info(*AP_ADDR));
1579 (ap_sme, mlme_stream, time_stream)
1580 }
1581}