wlan_sme/ap/
mod.rs

1// Copyright 2021 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5mod aid;
6mod authenticator;
7mod event;
8mod remote_client;
9#[cfg(test)]
10pub mod test_utils;
11
12use event::*;
13use remote_client::*;
14
15use crate::responder::Responder;
16use crate::{mlme_event_name, MlmeRequest, MlmeSink};
17use fidl_fuchsia_wlan_mlme::{self as fidl_mlme, DeviceInfo, MlmeEvent};
18use futures::channel::{mpsc, oneshot};
19use ieee80211::{MacAddr, MacAddrBytes, Ssid};
20use log::{debug, error, info, warn};
21use std::collections::HashMap;
22use wlan_common::capabilities::get_device_band_cap;
23use wlan_common::channel::{Cbw, Channel};
24use wlan_common::ie::rsn::rsne::{RsnCapabilities, Rsne};
25use wlan_common::ie::{parse_ht_capabilities, ChanWidthSet, SupportedRate};
26use wlan_common::timer::{self, EventHandle, Timer};
27use wlan_common::{mac, RadioConfig};
28use wlan_rsn::psk;
29use {
30    fidl_fuchsia_wlan_common as fidl_common, fidl_fuchsia_wlan_ieee80211 as fidl_ieee80211,
31    fidl_fuchsia_wlan_internal as fidl_internal, fidl_fuchsia_wlan_sme as fidl_sme,
32};
33
34const DEFAULT_BEACON_PERIOD: u16 = 100;
35const DEFAULT_DTIM_PERIOD: u8 = 2;
36
37#[derive(Clone, Debug, PartialEq)]
38pub struct Config {
39    pub ssid: Ssid,
40    pub password: Vec<u8>,
41    pub radio_cfg: RadioConfig,
42}
43
44// OpRadioConfig keeps admitted configuration and operation state
45#[derive(Clone, Debug, PartialEq)]
46pub struct OpRadioConfig {
47    phy: fidl_common::WlanPhyType,
48    channel: Channel,
49}
50
51#[allow(clippy::large_enum_variant)] // TODO(https://fxbug.dev/401087337)
52enum State {
53    Idle {
54        ctx: Context,
55    },
56    Starting {
57        ctx: Context,
58        ssid: Ssid,
59        rsn_cfg: Option<RsnCfg>,
60        capabilities: mac::CapabilityInfo,
61        rates: Vec<SupportedRate>,
62        start_responder: Responder<StartResult>,
63        stop_responders: Vec<Responder<fidl_sme::StopApResultCode>>,
64        start_timeout: EventHandle,
65        op_radio_cfg: OpRadioConfig,
66    },
67    Stopping {
68        ctx: Context,
69        stop_req: fidl_mlme::StopRequest,
70        responders: Vec<Responder<fidl_sme::StopApResultCode>>,
71        stop_timeout: Option<EventHandle>,
72    },
73    Started {
74        bss: InfraBss,
75    },
76}
77
78#[derive(Clone)]
79pub struct RsnCfg {
80    psk: psk::Psk,
81    rsne: Rsne,
82}
83
84struct InfraBss {
85    ssid: Ssid,
86    rsn_cfg: Option<RsnCfg>,
87    clients: HashMap<MacAddr, RemoteClient>,
88    aid_map: aid::Map,
89    op_radio_cfg: OpRadioConfig,
90    ctx: Context,
91}
92
93pub struct Context {
94    device_info: DeviceInfo,
95    mlme_sink: MlmeSink,
96    timer: Timer<Event>,
97}
98
99pub struct ApSme {
100    state: Option<State>,
101}
102
103#[derive(Debug, PartialEq)]
104pub enum StartResult {
105    Success,
106    Canceled,
107    TimedOut,
108    InvalidArguments(String),
109    PreviousStartInProgress,
110    AlreadyStarted,
111    InternalError,
112}
113
114impl ApSme {
115    pub fn new(
116        device_info: DeviceInfo,
117    ) -> (Self, crate::MlmeSink, crate::MlmeStream, timer::EventStream<Event>) {
118        let (mlme_sink, mlme_stream) = mpsc::unbounded();
119        let (timer, time_stream) = timer::create_timer();
120        let sme = ApSme {
121            state: Some(State::Idle {
122                ctx: Context { device_info, mlme_sink: MlmeSink::new(mlme_sink.clone()), timer },
123            }),
124        };
125        (sme, MlmeSink::new(mlme_sink), mlme_stream, time_stream)
126    }
127
128    pub fn on_start_command(&mut self, config: Config) -> oneshot::Receiver<StartResult> {
129        let (responder, receiver) = Responder::new();
130        self.state = self.state.take().map(|state| match state {
131            State::Idle { mut ctx } => {
132                let band_cap =
133                    match get_device_band_cap(&ctx.device_info, config.radio_cfg.channel.primary) {
134                        None => {
135                            responder.respond(StartResult::InvalidArguments(format!(
136                                "Device has not band capabilities for channel {}",
137                                config.radio_cfg.channel.primary,
138                            )));
139                            return State::Idle { ctx };
140                        }
141                        Some(bc) => bc,
142                    };
143
144                let op_radio_cfg = match validate_radio_cfg(band_cap, &config.radio_cfg) {
145                    Err(result) => {
146                        responder.respond(result);
147                        return State::Idle { ctx };
148                    }
149                    Ok(op_radio_cfg) => op_radio_cfg,
150                };
151
152                let rsn_cfg_result = create_rsn_cfg(&config.ssid, &config.password[..]);
153                let rsn_cfg = match rsn_cfg_result {
154                    Err(e) => {
155                        responder.respond(e);
156                        return State::Idle { ctx };
157                    }
158                    Ok(rsn_cfg) => rsn_cfg,
159                };
160
161                let capabilities =
162                    mac::CapabilityInfo(ctx.device_info.softmac_hardware_capability as u16)
163                        // IEEE Std 802.11-2016, 9.4.1.4: An AP sets the ESS subfield to 1 and the IBSS
164                        // subfield to 0 within transmitted Beacon or Probe Response frames.
165                        .with_ess(true)
166                        .with_ibss(false)
167                        // IEEE Std 802.11-2016, 9.4.1.4: An AP sets the Privacy subfield to 1 within
168                        // transmitted Beacon, Probe Response, (Re)Association Response frames if data
169                        // confidentiality is required for all Data frames exchanged within the BSS.
170                        .with_privacy(rsn_cfg.is_some());
171
172                let req = match create_start_request(
173                    &op_radio_cfg,
174                    &config.ssid,
175                    rsn_cfg.as_ref(),
176                    capabilities,
177                    // The max length of fuchsia.wlan.mlme/BandCapability.basic_rates is
178                    // less than fuchsia.wlan.mlme/StartRequest.rates.
179                    &band_cap.basic_rates,
180                ) {
181                    Ok(req) => req,
182                    Err(result) => {
183                        responder.respond(result);
184                        return State::Idle { ctx };
185                    }
186                };
187
188                // TODO(https://fxbug.dev/42103581): Select which rates are mandatory here.
189                let rates = band_cap.basic_rates.iter().map(|r| SupportedRate(*r)).collect();
190
191                ctx.mlme_sink.send(MlmeRequest::Start(req));
192                let event = Event::Sme { event: SmeEvent::StartTimeout };
193                let start_timeout = ctx.timer.schedule(event);
194
195                State::Starting {
196                    ctx,
197                    ssid: config.ssid,
198                    rsn_cfg,
199                    capabilities,
200                    rates,
201                    start_responder: responder,
202                    stop_responders: vec![],
203                    start_timeout,
204                    op_radio_cfg,
205                }
206            }
207            s @ State::Starting { .. } => {
208                responder.respond(StartResult::PreviousStartInProgress);
209                s
210            }
211            s @ State::Stopping { .. } => {
212                responder.respond(StartResult::Canceled);
213                s
214            }
215            s @ State::Started { .. } => {
216                responder.respond(StartResult::AlreadyStarted);
217                s
218            }
219        });
220        receiver
221    }
222
223    pub fn on_stop_command(&mut self) -> oneshot::Receiver<fidl_sme::StopApResultCode> {
224        let (responder, receiver) = Responder::new();
225        self.state = self.state.take().map(|mut state| match state {
226            State::Idle { mut ctx } => {
227                // We don't have an SSID, so just do a best-effort StopAP request with no SSID
228                // filled in
229                let stop_req = fidl_mlme::StopRequest { ssid: Ssid::empty().into() };
230                let timeout = send_stop_req(&mut ctx, stop_req.clone());
231                State::Stopping {
232                    ctx,
233                    stop_req,
234                    responders: vec![responder],
235                    stop_timeout: Some(timeout),
236                }
237            }
238            State::Starting { ref mut stop_responders, .. } => {
239                stop_responders.push(responder);
240                state
241            }
242            State::Stopping { mut ctx, stop_req, mut responders, mut stop_timeout } => {
243                responders.push(responder);
244                // No stop request is ongoing, so forward this stop request.
245                // The previous stop request may have timed out or failed and we are in an
246                // unclean state where we don't know whether the AP has stopped or not.
247                stop_timeout =
248                    stop_timeout.or_else(|| Some(send_stop_req(&mut ctx, stop_req.clone())));
249                State::Stopping { ctx, stop_req, responders, stop_timeout }
250            }
251            State::Started { mut bss } => {
252                // IEEE Std 802.11-2016, 6.3.12.2.3: The SME should notify associated non-AP STAs of
253                // imminent infrastructure BSS termination before issuing the MLME-STOP.request
254                // primitive.
255                for client_addr in bss.clients.keys() {
256                    bss.ctx.mlme_sink.send(MlmeRequest::Deauthenticate(
257                        fidl_mlme::DeauthenticateRequest {
258                            peer_sta_address: client_addr.to_array(),
259                            // This seems to be the most appropriate reason code (IEEE Std
260                            // 802.11-2016, Table 9-45): Requesting STA is leaving the BSS (or
261                            // resetting). The spec doesn't seem to mandate a choice of reason code
262                            // here, so Fuchsia picks STA_LEAVING.
263                            reason_code: fidl_ieee80211::ReasonCode::StaLeaving,
264                        },
265                    ));
266                }
267
268                let stop_req = fidl_mlme::StopRequest { ssid: bss.ssid.to_vec() };
269                let timeout = send_stop_req(&mut bss.ctx, stop_req.clone());
270                State::Stopping {
271                    ctx: bss.ctx,
272                    stop_req,
273                    responders: vec![responder],
274                    stop_timeout: Some(timeout),
275                }
276            }
277        });
278        receiver
279    }
280
281    pub fn get_running_ap(&self) -> Option<fidl_sme::Ap> {
282        match self.state.as_ref() {
283            Some(State::Started { bss: InfraBss { ssid, op_radio_cfg, clients, .. }, .. }) => {
284                Some(fidl_sme::Ap {
285                    ssid: ssid.to_vec(),
286                    channel: op_radio_cfg.channel.primary,
287                    num_clients: clients.len() as u16,
288                })
289            }
290            _ => None,
291        }
292    }
293}
294
295fn send_stop_req(ctx: &mut Context, stop_req: fidl_mlme::StopRequest) -> EventHandle {
296    let event = Event::Sme { event: SmeEvent::StopTimeout };
297    let stop_timeout = ctx.timer.schedule(event);
298    ctx.mlme_sink.send(MlmeRequest::Stop(stop_req));
299    stop_timeout
300}
301
302impl super::Station for ApSme {
303    type Event = Event;
304
305    fn on_mlme_event(&mut self, event: MlmeEvent) {
306        debug!("received MLME event: {:?}", &event);
307        self.state = self.state.take().map(|state| match state {
308            State::Idle { .. } => {
309                warn!("received MlmeEvent while ApSme is idle {:?}", mlme_event_name(&event));
310                state
311            }
312            State::Starting {
313                ctx,
314                ssid,
315                rsn_cfg,
316                capabilities,
317                rates,
318                start_responder,
319                stop_responders,
320                start_timeout,
321                op_radio_cfg,
322            } => match event {
323                MlmeEvent::StartConf { resp } => handle_start_conf(
324                    resp,
325                    ctx,
326                    ssid,
327                    rsn_cfg,
328                    op_radio_cfg,
329                    start_responder,
330                    stop_responders,
331                ),
332                _ => {
333                    warn!(
334                        "received MlmeEvent while ApSme is starting {:?}",
335                        mlme_event_name(&event)
336                    );
337                    State::Starting {
338                        ctx,
339                        ssid,
340                        rsn_cfg,
341                        capabilities,
342                        rates,
343                        start_responder,
344                        stop_responders,
345                        start_timeout,
346                        op_radio_cfg,
347                    }
348                }
349            },
350            State::Stopping { ctx, stop_req, mut responders, stop_timeout } => match event {
351                MlmeEvent::StopConf { resp } => match resp.result_code {
352                    fidl_mlme::StopResultCode::Success
353                    | fidl_mlme::StopResultCode::BssAlreadyStopped => {
354                        for responder in responders.drain(..) {
355                            responder.respond(fidl_sme::StopApResultCode::Success);
356                        }
357                        State::Idle { ctx }
358                    }
359                    fidl_mlme::StopResultCode::InternalError => {
360                        for responder in responders.drain(..) {
361                            responder.respond(fidl_sme::StopApResultCode::InternalError);
362                        }
363                        State::Stopping { ctx, stop_req, responders, stop_timeout: None }
364                    }
365                },
366                _ => {
367                    warn!(
368                        "received MlmeEvent while ApSme is stopping {:?}",
369                        mlme_event_name(&event)
370                    );
371                    State::Stopping { ctx, stop_req, responders, stop_timeout }
372                }
373            },
374            State::Started { mut bss } => {
375                match event {
376                    MlmeEvent::OnChannelSwitched { info } => bss.handle_channel_switch(info),
377                    MlmeEvent::AuthenticateInd { ind } => bss.handle_auth_ind(ind),
378                    MlmeEvent::DeauthenticateInd { ind } => {
379                        bss.handle_deauth(&ind.peer_sta_address.into())
380                    }
381                    // TODO(https://fxbug.dev/42113580): This path should never be taken, as the MLME will never send
382                    // this. Make sure this is the case.
383                    MlmeEvent::DeauthenticateConf { resp } => {
384                        bss.handle_deauth(&resp.peer_sta_address.into())
385                    }
386                    MlmeEvent::AssociateInd { ind } => bss.handle_assoc_ind(ind),
387                    MlmeEvent::DisassociateInd { ind } => bss.handle_disassoc_ind(ind),
388                    MlmeEvent::EapolInd { ind } => bss.handle_eapol_ind(ind),
389                    MlmeEvent::EapolConf { resp } => bss.handle_eapol_conf(resp),
390                    _ => {
391                        warn!("unsupported MlmeEvent type {:?}; ignoring", mlme_event_name(&event))
392                    }
393                }
394                State::Started { bss }
395            }
396        });
397    }
398
399    fn on_timeout(&mut self, timed_event: timer::Event<Event>) {
400        self.state = self.state.take().map(|mut state| match state {
401            State::Idle { .. } => state,
402            State::Starting {
403                start_timeout,
404                mut ctx,
405                start_responder,
406                stop_responders,
407                capabilities,
408                rates,
409                ssid,
410                rsn_cfg,
411                op_radio_cfg,
412            } => match timed_event.event {
413                Event::Sme { event: SmeEvent::StartTimeout } => {
414                    warn!("Timed out waiting for MLME to start");
415                    start_responder.respond(StartResult::TimedOut);
416                    if stop_responders.is_empty() {
417                        State::Idle { ctx }
418                    } else {
419                        let stop_req = fidl_mlme::StopRequest { ssid: ssid.to_vec() };
420                        let timeout = send_stop_req(&mut ctx, stop_req.clone());
421                        State::Stopping {
422                            ctx,
423                            stop_req,
424                            responders: stop_responders,
425                            stop_timeout: Some(timeout),
426                        }
427                    }
428                }
429                _ => State::Starting {
430                    start_timeout,
431                    ctx,
432                    start_responder,
433                    stop_responders,
434                    capabilities,
435                    rates,
436                    ssid,
437                    rsn_cfg,
438                    op_radio_cfg,
439                },
440            },
441            State::Stopping { ctx, stop_req, mut responders, mut stop_timeout } => {
442                if let Event::Sme { event: SmeEvent::StopTimeout } = timed_event.event {
443                    for responder in responders.drain(..) {
444                        responder.respond(fidl_sme::StopApResultCode::TimedOut);
445                    }
446                    stop_timeout = None;
447                }
448                // If timeout triggered, then the responders and the timeout are cleared, and
449                // we are left in an unclean stopping state
450                State::Stopping { ctx, stop_req, responders, stop_timeout }
451            }
452            State::Started { ref mut bss } => {
453                bss.handle_timeout(timed_event);
454                state
455            }
456        });
457    }
458}
459
460/// Validate the channel, PHY type, bandwidth, and band capabilities, in that order.
461fn validate_radio_cfg(
462    band_cap: &fidl_mlme::BandCapability,
463    radio_cfg: &RadioConfig,
464) -> Result<OpRadioConfig, StartResult> {
465    let channel = radio_cfg.channel;
466    // TODO(https://fxbug.dev/42174927): We shouldn't expect to only start an AP in the US. The regulatory
467    // enforcement for the channel should apply at a lower layer.
468    if !channel.is_valid_in_us() {
469        return Err(StartResult::InvalidArguments(format!("Invalid US channel {}", channel)));
470    }
471    if channel.is_dfs() {
472        return Err(StartResult::InvalidArguments(format!(
473            "DFS channels not supported: {}",
474            channel
475        )));
476    }
477
478    let phy = radio_cfg.phy;
479    match phy {
480        fidl_common::WlanPhyType::Dsss
481        | fidl_common::WlanPhyType::Hr
482        | fidl_common::WlanPhyType::Ofdm
483        | fidl_common::WlanPhyType::Erp => match channel.cbw {
484            Cbw::Cbw20 => (),
485            _ => {
486                return Err(StartResult::InvalidArguments(format!(
487                    "PHY type {:?} not supported on channel {}",
488                    phy, channel
489                )))
490            }
491        },
492        fidl_common::WlanPhyType::Ht => {
493            match channel.cbw {
494                Cbw::Cbw20 | Cbw::Cbw40 | Cbw::Cbw40Below => (),
495                _ => {
496                    return Err(StartResult::InvalidArguments(format!(
497                        "HT-mode not supported for channel {}",
498                        channel
499                    )))
500                }
501            }
502
503            match band_cap.ht_cap.as_ref() {
504                None => {
505                    return Err(StartResult::InvalidArguments(format!(
506                        "No HT capabilities: {}",
507                        channel
508                    )))
509                }
510                Some(ht_cap) => {
511                    let ht_cap = parse_ht_capabilities(&ht_cap.bytes[..]).map_err(|e| {
512                        error!("failed to parse HT capability bytes: {:?}", e);
513                        StartResult::InternalError
514                    })?;
515                    let ht_cap_info = ht_cap.ht_cap_info;
516                    if ht_cap_info.chan_width_set() == ChanWidthSet::TWENTY_ONLY
517                        && channel.cbw != Cbw::Cbw20
518                    {
519                        return Err(StartResult::InvalidArguments(format!(
520                            "20 MHz band capabilities does not support channel {}",
521                            channel
522                        )));
523                    }
524                }
525            }
526        }
527        fidl_common::WlanPhyType::Vht => {
528            match channel.cbw {
529                Cbw::Cbw160 | Cbw::Cbw80P80 { .. } => {
530                    return Err(StartResult::InvalidArguments(format!(
531                        "Supported for channel {} in VHT mode not available",
532                        channel
533                    )))
534                }
535                _ => (),
536            }
537
538            if !channel.is_5ghz() {
539                return Err(StartResult::InvalidArguments(format!(
540                    "VHT only supported on 5 GHz channels: {}",
541                    channel
542                )));
543            }
544
545            if band_cap.vht_cap.is_none() {
546                return Err(StartResult::InvalidArguments(format!(
547                    "No VHT capabilities: {}",
548                    channel
549                )));
550            }
551        }
552        fidl_common::WlanPhyType::Dmg
553        | fidl_common::WlanPhyType::Tvht
554        | fidl_common::WlanPhyType::S1G
555        | fidl_common::WlanPhyType::Cdmg
556        | fidl_common::WlanPhyType::Cmmg
557        | fidl_common::WlanPhyType::He => {
558            return Err(StartResult::InvalidArguments(format!("Unsupported PHY type: {:?}", phy)))
559        }
560        fidl_common::WlanPhyTypeUnknown!() => {
561            return Err(StartResult::InvalidArguments(format!("Unknown PHY type: {:?}", phy)))
562        }
563    }
564
565    Ok(OpRadioConfig { phy, channel })
566}
567
568#[allow(clippy::too_many_arguments, reason = "mass allow for https://fxbug.dev/381896734")]
569fn handle_start_conf(
570    conf: fidl_mlme::StartConfirm,
571    mut ctx: Context,
572    ssid: Ssid,
573    rsn_cfg: Option<RsnCfg>,
574    op_radio_cfg: OpRadioConfig,
575    start_responder: Responder<StartResult>,
576    stop_responders: Vec<Responder<fidl_sme::StopApResultCode>>,
577) -> State {
578    if stop_responders.is_empty() {
579        match conf.result_code {
580            fidl_mlme::StartResultCode::Success => {
581                start_responder.respond(StartResult::Success);
582                State::Started {
583                    bss: InfraBss {
584                        ssid,
585                        rsn_cfg,
586                        clients: HashMap::new(),
587                        aid_map: aid::Map::default(),
588                        op_radio_cfg,
589                        ctx,
590                    },
591                }
592            }
593            result_code => {
594                error!("failed to start BSS: {:?}", result_code);
595                start_responder.respond(StartResult::InternalError);
596                State::Idle { ctx }
597            }
598        }
599    } else {
600        start_responder.respond(StartResult::Canceled);
601        let stop_req = fidl_mlme::StopRequest { ssid: ssid.to_vec() };
602        let timeout = send_stop_req(&mut ctx, stop_req.clone());
603        State::Stopping { ctx, stop_req, responders: stop_responders, stop_timeout: Some(timeout) }
604    }
605}
606
607impl InfraBss {
608    /// Removes a client from the map.
609    ///
610    /// A client may only be removed via |remove_client| if:
611    ///
612    /// - MLME-DEAUTHENTICATE.request has been issued for the client, or,
613    /// - MLME-DEAUTHENTICATE.indication or MLME-DEAUTHENTICATE.confirm has been received for the
614    ///   client, or,
615    /// - MLME-AUTHENTICATE.indication is being handled (see comment in |handle_auth_ind| for
616    ///   details).
617    ///
618    /// If the client has an AID, its AID will be released from the AID map.
619    ///
620    /// Returns true if a client was removed, otherwise false.
621    fn remove_client(&mut self, addr: &MacAddr) -> bool {
622        if let Some(client) = self.clients.remove(addr) {
623            if let Some(aid) = client.aid() {
624                self.aid_map.release_aid(aid);
625            }
626            true
627        } else {
628            false
629        }
630    }
631
632    fn handle_channel_switch(&mut self, info: fidl_internal::ChannelSwitchInfo) {
633        info!("Channel switch for AP {:?}", info);
634        self.op_radio_cfg.channel.primary = info.new_channel;
635    }
636
637    fn handle_auth_ind(&mut self, ind: fidl_mlme::AuthenticateIndication) {
638        let peer_addr: MacAddr = ind.peer_sta_address.into();
639        if self.remove_client(&peer_addr) {
640            // This may occur if an already authenticated client on the SME receives a fresh
641            // MLME-AUTHENTICATE.indication from the MLME.
642            //
643            // This is safe, as we will make a fresh the client state and return an appropriate
644            // MLME-AUTHENTICATE.response to the MLME, indicating whether it should deauthenticate
645            // the client or not.
646            warn!(
647                "client {} is trying to reauthenticate; removing client and starting again",
648                peer_addr
649            );
650        }
651        let mut client = RemoteClient::new(peer_addr);
652        client.handle_auth_ind(&mut self.ctx, ind.auth_type);
653        if !client.authenticated() {
654            info!("client {} was not authenticated", peer_addr);
655            return;
656        }
657
658        info!("client {} authenticated", peer_addr);
659        let _ = self.clients.insert(peer_addr, client);
660    }
661
662    fn handle_deauth(&mut self, peer_addr: &MacAddr) {
663        if !self.remove_client(peer_addr) {
664            warn!("client {} never authenticated, ignoring deauthentication request", peer_addr);
665            return;
666        }
667
668        info!("client {} deauthenticated", peer_addr);
669    }
670
671    fn handle_assoc_ind(&mut self, ind: fidl_mlme::AssociateIndication) {
672        let peer_addr: MacAddr = ind.peer_sta_address.into();
673
674        let client = match self.clients.get_mut(&peer_addr) {
675            None => {
676                warn!("client {} never authenticated, ignoring association indication", peer_addr);
677                return;
678            }
679            Some(client) => client,
680        };
681
682        client.handle_assoc_ind(
683            &mut self.ctx,
684            &mut self.aid_map,
685            ind.capability_info,
686            &ind.rates.into_iter().map(SupportedRate).collect::<Vec<_>>()[..],
687            &self.rsn_cfg,
688            ind.rsne,
689        );
690        if !client.authenticated() {
691            warn!("client {} failed to associate and was deauthenticated", peer_addr);
692            let _ = self.remove_client(&peer_addr);
693        } else if !client.associated() {
694            warn!("client {} failed to associate but did not deauthenticate", peer_addr);
695        } else {
696            info!("client {} associated", peer_addr);
697        }
698    }
699
700    fn handle_disassoc_ind(&mut self, ind: fidl_mlme::DisassociateIndication) {
701        let peer_addr: MacAddr = ind.peer_sta_address.into();
702
703        let client = match self.clients.get_mut(&peer_addr) {
704            None => {
705                warn!(
706                    "client {} never authenticated, ignoring disassociation indication",
707                    peer_addr
708                );
709                return;
710            }
711            Some(client) => client,
712        };
713
714        client.handle_disassoc_ind(&mut self.ctx, &mut self.aid_map);
715        if client.associated() {
716            panic!("client {} didn't disassociate? this should never happen!", peer_addr)
717        } else {
718            info!("client {} disassociated", peer_addr);
719        }
720    }
721
722    fn handle_timeout(&mut self, timed_event: timer::Event<Event>) {
723        match timed_event.event {
724            Event::Sme { .. } => (),
725            Event::Client { addr, event } => {
726                let client = match self.clients.get_mut(&addr) {
727                    None => {
728                        return;
729                    }
730                    Some(client) => client,
731                };
732
733                client.handle_timeout(&mut self.ctx, event);
734                if !client.authenticated() {
735                    if !self.remove_client(&addr) {
736                        error!("failed to remove client {} from AID map", addr);
737                    }
738                    info!("client {} lost authentication", addr);
739                }
740            }
741        }
742    }
743
744    fn handle_eapol_ind(&mut self, ind: fidl_mlme::EapolIndication) {
745        let peer_addr: MacAddr = ind.src_addr.into();
746        let client = match self.clients.get_mut(&peer_addr) {
747            None => {
748                warn!("client {} never authenticated, ignoring EAPoL indication", peer_addr);
749                return;
750            }
751            Some(client) => client,
752        };
753
754        client.handle_eapol_ind(&mut self.ctx, &ind.data[..]);
755    }
756
757    fn handle_eapol_conf(&mut self, resp: fidl_mlme::EapolConfirm) {
758        let dst_addr: MacAddr = resp.dst_addr.into();
759        let client = match self.clients.get_mut(&dst_addr) {
760            None => {
761                warn!("never sent EAPOL frame to client {}, ignoring confirm", dst_addr);
762                return;
763            }
764            Some(client) => client,
765        };
766
767        client.handle_eapol_conf(&mut self.ctx, resp.result_code);
768    }
769}
770
771fn create_rsn_cfg(ssid: &Ssid, password: &[u8]) -> Result<Option<RsnCfg>, StartResult> {
772    if password.is_empty() {
773        Ok(None)
774    } else {
775        let psk_result = psk::compute(password, ssid);
776        let psk = match psk_result {
777            Err(e) => {
778                return Err(StartResult::InvalidArguments(e.to_string()));
779            }
780            Ok(o) => o,
781        };
782
783        // Note: TKIP is legacy and considered insecure. Only allow CCMP usage
784        // for group and pairwise ciphers.
785        Ok(Some(RsnCfg { psk, rsne: Rsne::wpa2_rsne_with_caps(RsnCapabilities(0)) }))
786    }
787}
788
789fn create_start_request(
790    op_radio_cfg: &OpRadioConfig,
791    ssid: &Ssid,
792    ap_rsn: Option<&RsnCfg>,
793    capabilities: mac::CapabilityInfo,
794    basic_rates: &[u8],
795) -> Result<fidl_mlme::StartRequest, StartResult> {
796    let rsne_bytes = ap_rsn.as_ref().map(|RsnCfg { rsne, .. }| {
797        let mut buf = Vec::with_capacity(rsne.len());
798        if let Err(e) = rsne.write_into(&mut buf) {
799            error!("error writing RSNE into MLME-START.request: {}", e);
800        }
801        buf
802    });
803
804    let (channel_bandwidth, _secondary80) = op_radio_cfg.channel.cbw.to_fidl();
805
806    if basic_rates.len() > fidl_internal::MAX_ASSOC_BASIC_RATES as usize {
807        error!(
808            "Too many basic rates ({}). Max is {}.",
809            basic_rates.len(),
810            fidl_internal::MAX_ASSOC_BASIC_RATES
811        );
812        return Err(StartResult::InternalError);
813    }
814
815    Ok(fidl_mlme::StartRequest {
816        ssid: ssid.to_vec(),
817        bss_type: fidl_common::BssType::Infrastructure,
818        beacon_period: DEFAULT_BEACON_PERIOD,
819        dtim_period: DEFAULT_DTIM_PERIOD,
820        channel: op_radio_cfg.channel.primary,
821        capability_info: capabilities.raw(),
822        rates: basic_rates.to_vec(),
823        country: fidl_mlme::Country {
824            // TODO(https://fxbug.dev/42104247): Get config from wlancfg
825            alpha2: [b'U', b'S'],
826            suffix: fidl_mlme::COUNTRY_ENVIRON_ALL,
827        },
828        rsne: rsne_bytes,
829        mesh_id: vec![],
830        phy: op_radio_cfg.phy,
831        channel_bandwidth,
832    })
833}
834
835#[cfg(test)]
836mod tests {
837    use super::*;
838    use crate::test_utils::*;
839    use crate::{MlmeStream, Station};
840    use fidl_fuchsia_wlan_mlme as fidl_mlme;
841    use lazy_static::lazy_static;
842    use test_case::test_case;
843    use wlan_common::assert_variant;
844    use wlan_common::channel::Cbw;
845    use wlan_common::mac::Aid;
846    use wlan_common::test_utils::fake_capabilities::{
847        fake_2ghz_band_capability_vht, fake_5ghz_band_capability, fake_5ghz_band_capability_ht_cbw,
848    };
849
850    lazy_static! {
851        static ref AP_ADDR: MacAddr = [0x11, 0x22, 0x33, 0x44, 0x55, 0x66].into();
852        static ref CLIENT_ADDR: MacAddr = [0x7A, 0xE7, 0x76, 0xD9, 0xF2, 0x67].into();
853        static ref CLIENT_ADDR2: MacAddr = [0x22, 0x22, 0x22, 0x22, 0x22, 0x22].into();
854        static ref SSID: Ssid = Ssid::try_from([0x46, 0x55, 0x43, 0x48, 0x53, 0x49, 0x41]).unwrap();
855    }
856
857    const RSNE: &[u8] = &[
858        0x30, // element id
859        0x2A, // length
860        0x01, 0x00, // version
861        0x00, 0x0f, 0xac, 0x04, // group data cipher suite -- CCMP-128
862        0x01, 0x00, // pairwise cipher suite count
863        0x00, 0x0f, 0xac, 0x04, // pairwise cipher suite list -- CCMP-128
864        0x01, 0x00, // akm suite count
865        0x00, 0x0f, 0xac, 0x02, // akm suite list -- PSK
866        0xa8, 0x04, // rsn capabilities
867        0x01, 0x00, // pmk id count
868        // pmk id list
869        0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10,
870        0x11, 0x00, 0x0f, 0xac, 0x04, // group management cipher suite -- CCMP-128
871    ];
872
873    fn radio_cfg(primary_channel: u8) -> RadioConfig {
874        RadioConfig::new(fidl_common::WlanPhyType::Ht, Cbw::Cbw20, primary_channel)
875    }
876
877    fn unprotected_config() -> Config {
878        Config { ssid: SSID.clone(), password: vec![], radio_cfg: radio_cfg(11) }
879    }
880
881    fn protected_config() -> Config {
882        Config {
883            ssid: SSID.clone(),
884            password: vec![0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68],
885            radio_cfg: radio_cfg(11),
886        }
887    }
888
889    fn create_channel_switch_ind(channel: u8) -> MlmeEvent {
890        MlmeEvent::OnChannelSwitched {
891            info: fidl_internal::ChannelSwitchInfo { new_channel: channel },
892        }
893    }
894
895    #[test_case(false, None, fidl_common::WlanPhyType::Ht, 15, Cbw::Cbw20; "invalid US channel")]
896    #[test_case(false, None, fidl_common::WlanPhyType::Ht, 52, Cbw::Cbw20; "DFS channel")]
897    #[test_case(false, None, fidl_common::WlanPhyType::Dmg, 1, Cbw::Cbw20; "DMG not supported")]
898    #[test_case(false, None, fidl_common::WlanPhyType::Tvht, 1, Cbw::Cbw20; "TVHT not supported")]
899    #[test_case(false, None, fidl_common::WlanPhyType::S1G, 1, Cbw::Cbw20; "S1G not supported")]
900    #[test_case(false, None, fidl_common::WlanPhyType::Cdmg, 1, Cbw::Cbw20; "CDMG not supported")]
901    #[test_case(false, None, fidl_common::WlanPhyType::Cmmg, 1, Cbw::Cbw20; "CMMG not supported")]
902    #[test_case(false, None, fidl_common::WlanPhyType::He, 1, Cbw::Cbw20; "HE not supported")]
903    #[test_case(false, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw80; "invalid HT width")]
904    #[test_case(false, None, fidl_common::WlanPhyType::Erp, 1, Cbw::Cbw40; "non-HT greater than 20 MHz")]
905    #[test_case(false, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw80; "HT greater than 40 MHz")]
906    #[test_case(false, None, fidl_common::WlanPhyType::unknown(), 36, Cbw::Cbw40; "Unknown PHY type")]
907    #[test_case(false, Some(fake_5ghz_band_capability_ht_cbw(ChanWidthSet::TWENTY_ONLY)),
908                fidl_common::WlanPhyType::Ht, 44, Cbw::Cbw40; "HT 20 MHz only")]
909    #[test_case(false, Some(fidl_mlme::BandCapability {
910                    ht_cap: None, ..fake_5ghz_band_capability()
911                }),
912                fidl_common::WlanPhyType::Ht, 48, Cbw::Cbw40; "No HT capabilities")]
913    #[test_case(false, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw160; "160 MHz not supported")]
914    #[test_case(false, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw80P80 { secondary80: 106 }; "80+80 MHz not supported")]
915    #[test_case(false, None, fidl_common::WlanPhyType::Vht, 1, Cbw::Cbw20; "VHT 2.4 GHz not supported")]
916    #[test_case(false, Some(fidl_mlme::BandCapability {
917                    vht_cap: None,
918                    ..fake_5ghz_band_capability()
919                }),
920                fidl_common::WlanPhyType::Vht, 149, Cbw::Cbw40; "no VHT capabilities")]
921    #[test_case(true, None, fidl_common::WlanPhyType::Hr, 1, Cbw::Cbw20)]
922    #[test_case(true, None, fidl_common::WlanPhyType::Erp, 1, Cbw::Cbw20)]
923    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 1, Cbw::Cbw20)]
924    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 1, Cbw::Cbw40)]
925    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 11, Cbw::Cbw40Below)]
926    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw20)]
927    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 36, Cbw::Cbw40)]
928    #[test_case(true, None, fidl_common::WlanPhyType::Ht, 40, Cbw::Cbw40Below)]
929    #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw20)]
930    #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw40)]
931    #[test_case(true, None, fidl_common::WlanPhyType::Vht, 40, Cbw::Cbw40Below)]
932    #[test_case(true, None, fidl_common::WlanPhyType::Vht, 36, Cbw::Cbw80)]
933    fn test_validate_radio_cfg(
934        valid: bool,
935        band_cap: Option<fidl_mlme::BandCapability>,
936        phy: fidl_common::WlanPhyType,
937        primary: u8,
938        cbw: Cbw,
939    ) {
940        let channel = Channel::new(primary, cbw);
941        #[allow(
942            clippy::redundant_field_names,
943            reason = "mass allow for https://fxbug.dev/381896734"
944        )]
945        let radio_cfg = RadioConfig { phy: phy, channel: channel };
946        #[allow(
947            clippy::redundant_field_names,
948            reason = "mass allow for https://fxbug.dev/381896734"
949        )]
950        let expected_op_radio_cfg = OpRadioConfig { phy: phy, channel: channel };
951        let band_cap = match band_cap {
952            Some(band_cap) => band_cap,
953            None => fake_2ghz_band_capability_vht(),
954        };
955
956        match validate_radio_cfg(&band_cap, &radio_cfg) {
957            Ok(op_radio_cfg) => {
958                if valid {
959                    assert_eq!(op_radio_cfg, expected_op_radio_cfg);
960                } else {
961                    panic!("Unexpected successful validation");
962                }
963            }
964            Err(StartResult::InvalidArguments { .. }) => {
965                if valid {
966                    panic!("Unexpected failure to validate.");
967                }
968            }
969            Err(other) => {
970                panic!("Unexpected StartResult value: {:?}", other);
971            }
972        }
973    }
974
975    #[fuchsia::test(allow_stalls = false)]
976    async fn authenticate_while_sme_is_idle() {
977        let (mut sme, mut mlme_stream, _) = create_sme().await;
978        let client = Client::default();
979        sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
980
981        assert_variant!(mlme_stream.try_next(), Err(e) => {
982            assert_eq!(e.to_string(), "receiver channel is empty");
983        });
984    }
985
986    // Check status when sme is idle
987    #[fuchsia::test(allow_stalls = false)]
988    async fn status_when_sme_is_idle() {
989        let (sme, _, _) = create_sme().await;
990        assert_eq!(None, sme.get_running_ap());
991    }
992
993    #[fuchsia::test(allow_stalls = false)]
994    async fn ap_starts_success() {
995        let (mut sme, mut mlme_stream, _) = create_sme().await;
996        let mut receiver = sme.on_start_command(unprotected_config());
997
998        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(start_req))) => {
999            assert_eq!(start_req.ssid, SSID.to_vec());
1000            assert_eq!(
1001                start_req.capability_info,
1002                mac::CapabilityInfo(0).with_short_preamble(true).with_ess(true).raw(),
1003            );
1004            assert_eq!(start_req.bss_type, fidl_common::BssType::Infrastructure);
1005            assert_ne!(start_req.beacon_period, 0);
1006            assert_eq!(start_req.dtim_period, DEFAULT_DTIM_PERIOD);
1007            assert_eq!(
1008                start_req.channel,
1009                unprotected_config().radio_cfg.channel.primary,
1010            );
1011            assert!(start_req.rsne.is_none());
1012        });
1013
1014        assert_eq!(Ok(None), receiver.try_recv());
1015        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1016        assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1017    }
1018
1019    // Check status when Ap starting and started
1020    #[fuchsia::test(allow_stalls = false)]
1021    async fn ap_starts_success_get_running_ap() {
1022        let (mut sme, mut mlme_stream, _) = create_sme().await;
1023        let mut receiver = sme.on_start_command(unprotected_config());
1024        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_start_req))) => {});
1025        // status should be Starting
1026        assert_eq!(None, sme.get_running_ap());
1027        assert_eq!(Ok(None), receiver.try_recv());
1028        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1029        assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1030        assert_eq!(
1031            Some(fidl_sme::Ap {
1032                ssid: SSID.to_vec(),
1033                channel: unprotected_config().radio_cfg.channel.primary,
1034                num_clients: 0,
1035            }),
1036            sme.get_running_ap()
1037        );
1038    }
1039
1040    // Check status after channel change
1041    #[fuchsia::test(allow_stalls = false)]
1042    async fn ap_check_status_after_channel_change() {
1043        let (mut sme, _, _) = start_unprotected_ap().await;
1044        // Check status
1045        assert_eq!(
1046            Some(fidl_sme::Ap {
1047                ssid: SSID.to_vec(),
1048                channel: unprotected_config().radio_cfg.channel.primary,
1049                num_clients: 0,
1050            }),
1051            sme.get_running_ap()
1052        );
1053        sme.on_mlme_event(create_channel_switch_ind(6));
1054        // Check status
1055        assert_eq!(
1056            Some(fidl_sme::Ap { ssid: SSID.to_vec(), channel: 6, num_clients: 0 }),
1057            sme.get_running_ap()
1058        );
1059    }
1060
1061    #[fuchsia::test(allow_stalls = false)]
1062    async fn ap_starts_timeout() {
1063        let (mut sme, _, mut time_stream) = create_sme().await;
1064        let mut receiver = sme.on_start_command(unprotected_config());
1065
1066        let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1067        sme.on_timeout(event);
1068
1069        assert_eq!(Ok(Some(StartResult::TimedOut)), receiver.try_recv());
1070        // Check status
1071        assert_eq!(None, sme.get_running_ap());
1072    }
1073
1074    // Disable logging to prevent failure from emitted error logs.
1075    #[fuchsia::test(allow_stalls = false, logging = false)]
1076    async fn ap_starts_fails() {
1077        let (mut sme, _, _) = create_sme().await;
1078        let mut receiver = sme.on_start_command(unprotected_config());
1079
1080        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::NotSupported));
1081        assert_eq!(Ok(Some(StartResult::InternalError)), receiver.try_recv());
1082        // Check status
1083        assert_eq!(None, sme.get_running_ap());
1084    }
1085
1086    #[fuchsia::test(allow_stalls = false)]
1087    async fn start_req_while_ap_is_starting() {
1088        let (mut sme, _, _) = create_sme().await;
1089        let mut receiver_one = sme.on_start_command(unprotected_config());
1090
1091        // While SME is starting, any start request receives an error immediately
1092        let mut receiver_two = sme.on_start_command(unprotected_config());
1093        assert_eq!(Ok(Some(StartResult::PreviousStartInProgress)), receiver_two.try_recv());
1094
1095        // Start confirmation for first request should still have an affect
1096        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1097        assert_eq!(Ok(Some(StartResult::Success)), receiver_one.try_recv());
1098    }
1099
1100    #[fuchsia::test(allow_stalls = false)]
1101    async fn start_req_while_ap_is_stopping() {
1102        let (mut sme, _, _) = start_unprotected_ap().await;
1103        let mut stop_receiver = sme.on_stop_command();
1104        let mut start_receiver = sme.on_start_command(unprotected_config());
1105        assert_eq!(Ok(None), stop_receiver.try_recv());
1106        assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1107    }
1108
1109    #[fuchsia::test(allow_stalls = false)]
1110    async fn ap_stops_while_idle() {
1111        let (mut sme, mut mlme_stream, _) = create_sme().await;
1112        let mut receiver = sme.on_stop_command();
1113        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1114            assert!(stop_req.ssid.is_empty());
1115        });
1116
1117        // Respond with a successful stop result code
1118        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1119        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1120    }
1121
1122    #[fuchsia::test(allow_stalls = false)]
1123    async fn stop_req_while_ap_is_starting_then_succeeds() {
1124        let (mut sme, mut mlme_stream, _) = create_sme().await;
1125        let mut start_receiver = sme.on_start_command(unprotected_config());
1126        let mut stop_receiver = sme.on_stop_command();
1127        assert_eq!(Ok(None), start_receiver.try_recv());
1128        assert_eq!(Ok(None), stop_receiver.try_recv());
1129
1130        // Verify start request is sent to MLME but not stop request yet
1131        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_))));
1132        assert_variant!(mlme_stream.try_next(), Err(e) => {
1133            assert_eq!(e.to_string(), "receiver channel is empty");
1134        });
1135
1136        // Once start confirmation is finished, then stop request is sent out
1137        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1138        assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1139        assert_eq!(Ok(None), stop_receiver.try_recv());
1140        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1141            assert_eq!(stop_req.ssid, SSID.to_vec());
1142        });
1143
1144        // Respond with a successful stop result code
1145        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1146        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver.try_recv());
1147    }
1148
1149    #[fuchsia::test(allow_stalls = false)]
1150    async fn stop_req_while_ap_is_starting_then_times_out() {
1151        let (mut sme, mut mlme_stream, mut time_stream) = create_sme().await;
1152        let mut start_receiver = sme.on_start_command(unprotected_config());
1153        let mut stop_receiver = sme.on_stop_command();
1154        assert_eq!(Ok(None), start_receiver.try_recv());
1155        assert_eq!(Ok(None), stop_receiver.try_recv());
1156
1157        // Verify start request is sent to MLME but not stop request yet
1158        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(_))));
1159        assert_variant!(mlme_stream.try_next(), Err(e) => {
1160            assert_eq!(e.to_string(), "receiver channel is empty");
1161        });
1162
1163        // Time out the start request. Then stop request is sent out
1164        let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1165        sme.on_timeout(event);
1166        assert_eq!(Ok(Some(StartResult::TimedOut)), start_receiver.try_recv());
1167        assert_eq!(Ok(None), stop_receiver.try_recv());
1168        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1169            assert_eq!(stop_req.ssid, SSID.to_vec());
1170        });
1171
1172        // Respond with a successful stop result code
1173        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1174        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver.try_recv());
1175    }
1176
1177    #[fuchsia::test(allow_stalls = false)]
1178    async fn ap_stops_after_started() {
1179        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1180        let mut receiver = sme.on_stop_command();
1181
1182        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1183            assert_eq!(stop_req.ssid, SSID.to_vec());
1184        });
1185        assert_eq!(Ok(None), receiver.try_recv());
1186        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::BssAlreadyStopped));
1187        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1188    }
1189
1190    #[fuchsia::test(allow_stalls = false)]
1191    async fn ap_stops_after_started_and_deauths_all_clients() {
1192        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1193        let client = Client::default();
1194        sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1195        client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1196
1197        // Check status
1198        assert_eq!(
1199            Some(fidl_sme::Ap {
1200                ssid: SSID.to_vec(),
1201                channel: unprotected_config().radio_cfg.channel.primary,
1202                num_clients: 1,
1203            }),
1204            sme.get_running_ap()
1205        );
1206        let mut receiver = sme.on_stop_command();
1207        assert_variant!(
1208        mlme_stream.try_next(),
1209        Ok(Some(MlmeRequest::Deauthenticate(deauth_req))) => {
1210            assert_eq!(&deauth_req.peer_sta_address, client.addr.as_array());
1211            assert_eq!(deauth_req.reason_code, fidl_ieee80211::ReasonCode::StaLeaving);
1212        });
1213
1214        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1215            assert_eq!(stop_req.ssid, SSID.to_vec());
1216        });
1217        assert_eq!(Ok(None), receiver.try_recv());
1218        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1219        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver.try_recv());
1220
1221        // Check status
1222        assert_eq!(None, sme.get_running_ap());
1223    }
1224
1225    #[fuchsia::test(allow_stalls = false)]
1226    async fn ap_queues_concurrent_stop_requests() {
1227        let (mut sme, _, _) = start_unprotected_ap().await;
1228        let mut receiver1 = sme.on_stop_command();
1229        let mut receiver2 = sme.on_stop_command();
1230
1231        assert_eq!(Ok(None), receiver1.try_recv());
1232        assert_eq!(Ok(None), receiver2.try_recv());
1233
1234        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1235        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver1.try_recv());
1236        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), receiver2.try_recv());
1237    }
1238
1239    #[fuchsia::test(allow_stalls = false)]
1240    async fn uncleaned_stopping_state() {
1241        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1242        let mut stop_receiver1 = sme.on_stop_command();
1243        // Clear out the stop request
1244        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1245            assert_eq!(stop_req.ssid, SSID.to_vec());
1246        });
1247
1248        assert_eq!(Ok(None), stop_receiver1.try_recv());
1249        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::InternalError));
1250        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::InternalError)), stop_receiver1.try_recv());
1251
1252        // While in unclean stopping state, no start request can be made
1253        let mut start_receiver = sme.on_start_command(unprotected_config());
1254        assert_eq!(Ok(Some(StartResult::Canceled)), start_receiver.try_recv());
1255        assert_variant!(mlme_stream.try_next(), Err(e) => {
1256            assert_eq!(e.to_string(), "receiver channel is empty");
1257        });
1258
1259        // SME will forward another stop request to lower layer
1260        let mut stop_receiver2 = sme.on_stop_command();
1261        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Stop(stop_req))) => {
1262            assert_eq!(stop_req.ssid, SSID.to_vec());
1263        });
1264
1265        // Respond successful this time
1266        assert_eq!(Ok(None), stop_receiver2.try_recv());
1267        sme.on_mlme_event(create_stop_conf(fidl_mlme::StopResultCode::Success));
1268        assert_eq!(Ok(Some(fidl_sme::StopApResultCode::Success)), stop_receiver2.try_recv());
1269    }
1270
1271    #[fuchsia::test(allow_stalls = false)]
1272    async fn client_authenticates_supported_authentication_type() {
1273        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1274        let client = Client::default();
1275        sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1276        client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1277    }
1278
1279    // Disable logging to prevent failure from emitted error logs.
1280    #[fuchsia::test(allow_stalls = false, logging = false)]
1281    async fn client_authenticates_unsupported_authentication_type() {
1282        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1283        let client = Client::default();
1284        let auth_ind = client.create_auth_ind(fidl_mlme::AuthenticationTypes::FastBssTransition);
1285        sme.on_mlme_event(auth_ind);
1286        client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Refused);
1287    }
1288
1289    #[fuchsia::test(allow_stalls = false)]
1290    async fn client_associates_unprotected_network() {
1291        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1292        let client = Client::default();
1293        sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1294        client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1295
1296        sme.on_mlme_event(client.create_assoc_ind(None));
1297        client.verify_assoc_resp(
1298            &mut mlme_stream,
1299            1,
1300            fidl_mlme::AssociateResultCode::Success,
1301            false,
1302        );
1303    }
1304
1305    #[fuchsia::test(allow_stalls = false)]
1306    async fn client_associates_valid_rsne() {
1307        let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1308        let client = Client::default();
1309        client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1310
1311        sme.on_mlme_event(client.create_assoc_ind(Some(RSNE.to_vec())));
1312        client.verify_assoc_resp(
1313            &mut mlme_stream,
1314            1,
1315            fidl_mlme::AssociateResultCode::Success,
1316            true,
1317        );
1318        client.verify_eapol_req(&mut mlme_stream);
1319    }
1320
1321    // Disable logging to prevent failure from emitted error logs.
1322    #[fuchsia::test(allow_stalls = false, logging = false)]
1323    async fn client_associates_invalid_rsne() {
1324        let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1325        let client = Client::default();
1326        client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1327
1328        sme.on_mlme_event(client.create_assoc_ind(None));
1329        client.verify_refused_assoc_resp(
1330            &mut mlme_stream,
1331            fidl_mlme::AssociateResultCode::RefusedCapabilitiesMismatch,
1332        );
1333    }
1334
1335    #[fuchsia::test(allow_stalls = false)]
1336    async fn rsn_handshake_timeout() {
1337        let (mut sme, mut mlme_stream, mut time_stream) = start_protected_ap().await;
1338        let client = Client::default();
1339        client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1340
1341        // Drain the association timeout message.
1342        assert_variant!(time_stream.try_next(), Ok(Some(_)));
1343
1344        sme.on_mlme_event(client.create_assoc_ind(Some(RSNE.to_vec())));
1345        client.verify_assoc_resp(
1346            &mut mlme_stream,
1347            1,
1348            fidl_mlme::AssociateResultCode::Success,
1349            true,
1350        );
1351
1352        // Drain the RSNA negotiation timeout message.
1353        assert_variant!(time_stream.try_next(), Ok(Some(_)));
1354
1355        for _i in 0..4 {
1356            client.verify_eapol_req(&mut mlme_stream);
1357            let (_, event, _) = time_stream.try_next().unwrap().expect("expect timer message");
1358            sme.on_timeout(event);
1359        }
1360
1361        client.verify_deauth_req(
1362            &mut mlme_stream,
1363            fidl_ieee80211::ReasonCode::FourwayHandshakeTimeout,
1364        );
1365    }
1366
1367    #[fuchsia::test(allow_stalls = false)]
1368    async fn client_restarts_authentication_flow() {
1369        let (mut sme, mut mlme_stream, _) = start_unprotected_ap().await;
1370        let client = Client::default();
1371        client.authenticate_and_drain_mlme(&mut sme, &mut mlme_stream);
1372        client.associate_and_drain_mlme(&mut sme, &mut mlme_stream, None);
1373
1374        sme.on_mlme_event(client.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1375        client.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1376
1377        sme.on_mlme_event(client.create_assoc_ind(None));
1378        client.verify_assoc_resp(
1379            &mut mlme_stream,
1380            1,
1381            fidl_mlme::AssociateResultCode::Success,
1382            false,
1383        );
1384    }
1385
1386    #[fuchsia::test(allow_stalls = false)]
1387    async fn multiple_clients_associate() {
1388        let (mut sme, mut mlme_stream, _) = start_protected_ap().await;
1389        let client1 = Client::default();
1390        let client2 = Client { addr: *CLIENT_ADDR2 };
1391
1392        sme.on_mlme_event(client1.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1393        client1.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1394
1395        sme.on_mlme_event(client2.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1396        client2.verify_auth_resp(&mut mlme_stream, fidl_mlme::AuthenticateResultCode::Success);
1397
1398        sme.on_mlme_event(client1.create_assoc_ind(Some(RSNE.to_vec())));
1399        client1.verify_assoc_resp(
1400            &mut mlme_stream,
1401            1,
1402            fidl_mlme::AssociateResultCode::Success,
1403            true,
1404        );
1405        client1.verify_eapol_req(&mut mlme_stream);
1406
1407        sme.on_mlme_event(client2.create_assoc_ind(Some(RSNE.to_vec())));
1408        client2.verify_assoc_resp(
1409            &mut mlme_stream,
1410            2,
1411            fidl_mlme::AssociateResultCode::Success,
1412            true,
1413        );
1414        client2.verify_eapol_req(&mut mlme_stream);
1415    }
1416
1417    fn create_start_conf(result_code: fidl_mlme::StartResultCode) -> MlmeEvent {
1418        MlmeEvent::StartConf { resp: fidl_mlme::StartConfirm { result_code } }
1419    }
1420
1421    fn create_stop_conf(result_code: fidl_mlme::StopResultCode) -> MlmeEvent {
1422        MlmeEvent::StopConf { resp: fidl_mlme::StopConfirm { result_code } }
1423    }
1424
1425    struct Client {
1426        addr: MacAddr,
1427    }
1428
1429    impl Client {
1430        fn default() -> Self {
1431            Client { addr: *CLIENT_ADDR }
1432        }
1433
1434        fn authenticate_and_drain_mlme(
1435            &self,
1436            sme: &mut ApSme,
1437            mlme_stream: &mut crate::MlmeStream,
1438        ) {
1439            sme.on_mlme_event(self.create_auth_ind(fidl_mlme::AuthenticationTypes::OpenSystem));
1440            assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::AuthResponse(..))));
1441        }
1442
1443        fn associate_and_drain_mlme(
1444            &self,
1445            sme: &mut ApSme,
1446            mlme_stream: &mut crate::MlmeStream,
1447            rsne: Option<Vec<u8>>,
1448        ) {
1449            sme.on_mlme_event(self.create_assoc_ind(rsne));
1450            assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::AssocResponse(..))));
1451        }
1452
1453        fn create_auth_ind(&self, auth_type: fidl_mlme::AuthenticationTypes) -> MlmeEvent {
1454            MlmeEvent::AuthenticateInd {
1455                ind: fidl_mlme::AuthenticateIndication {
1456                    peer_sta_address: self.addr.to_array(),
1457                    auth_type,
1458                },
1459            }
1460        }
1461
1462        fn create_assoc_ind(&self, rsne: Option<Vec<u8>>) -> MlmeEvent {
1463            MlmeEvent::AssociateInd {
1464                ind: fidl_mlme::AssociateIndication {
1465                    peer_sta_address: self.addr.to_array(),
1466                    listen_interval: 100,
1467                    ssid: Some(SSID.to_vec()),
1468                    rsne,
1469                    capability_info: mac::CapabilityInfo(0).with_short_preamble(true).raw(),
1470                    rates: vec![
1471                        0x82, 0x84, 0x8b, 0x96, 0x0c, 0x12, 0x18, 0x24, 0x30, 0x48, 0x60, 0x6c,
1472                    ],
1473                },
1474            }
1475        }
1476
1477        fn verify_auth_resp(
1478            &self,
1479            mlme_stream: &mut MlmeStream,
1480            result_code: fidl_mlme::AuthenticateResultCode,
1481        ) {
1482            let msg = mlme_stream.try_next();
1483            assert_variant!(msg, Ok(Some(MlmeRequest::AuthResponse(auth_resp))) => {
1484                assert_eq!(&auth_resp.peer_sta_address, self.addr.as_array());
1485                assert_eq!(auth_resp.result_code, result_code);
1486            });
1487        }
1488
1489        fn verify_assoc_resp(
1490            &self,
1491            mlme_stream: &mut MlmeStream,
1492            aid: Aid,
1493            result_code: fidl_mlme::AssociateResultCode,
1494            privacy: bool,
1495        ) {
1496            let msg = mlme_stream.try_next();
1497            assert_variant!(msg, Ok(Some(MlmeRequest::AssocResponse(assoc_resp))) => {
1498                assert_eq!(&assoc_resp.peer_sta_address, self.addr.as_array());
1499                assert_eq!(assoc_resp.association_id, aid);
1500                assert_eq!(assoc_resp.result_code, result_code);
1501                assert_eq!(
1502                    assoc_resp.capability_info,
1503                    mac::CapabilityInfo(0).with_short_preamble(true).with_privacy(privacy).raw(),
1504                );
1505            });
1506        }
1507
1508        fn verify_refused_assoc_resp(
1509            &self,
1510            mlme_stream: &mut MlmeStream,
1511            result_code: fidl_mlme::AssociateResultCode,
1512        ) {
1513            let msg = mlme_stream.try_next();
1514            assert_variant!(msg, Ok(Some(MlmeRequest::AssocResponse(assoc_resp))) => {
1515                assert_eq!(&assoc_resp.peer_sta_address, self.addr.as_array());
1516                assert_eq!(assoc_resp.association_id, 0);
1517                assert_eq!(assoc_resp.result_code, result_code);
1518                assert_eq!(assoc_resp.capability_info, 0);
1519            });
1520        }
1521
1522        fn verify_eapol_req(&self, mlme_stream: &mut MlmeStream) {
1523            assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Eapol(eapol_req))) => {
1524                assert_eq!(&eapol_req.src_addr, AP_ADDR.as_array());
1525                assert_eq!(&eapol_req.dst_addr, self.addr.as_array());
1526                assert!(!eapol_req.data.is_empty());
1527            });
1528        }
1529
1530        fn verify_deauth_req(
1531            &self,
1532            mlme_stream: &mut MlmeStream,
1533            reason_code: fidl_ieee80211::ReasonCode,
1534        ) {
1535            let msg = mlme_stream.try_next();
1536            assert_variant!(msg, Ok(Some(MlmeRequest::Deauthenticate(deauth_req))) => {
1537                assert_eq!(&deauth_req.peer_sta_address, self.addr.as_array());
1538                assert_eq!(deauth_req.reason_code, reason_code);
1539            });
1540        }
1541    }
1542
1543    // TODO(https://fxbug.dev/327499461): This function is async to ensure SME functions will
1544    // run in an async context and not call `wlan_common::timer::Timer::now` without an
1545    // executor.
1546    async fn start_protected_ap() -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1547        start_ap(true).await
1548    }
1549
1550    // TODO(https://fxbug.dev/327499461): This function is async to ensure SME functions will
1551    // run in an async context and not call `wlan_common::timer::Timer::now` without an
1552    // executor.
1553    async fn start_unprotected_ap() -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1554        start_ap(false).await
1555    }
1556
1557    // TODO(https://fxbug.dev/327499461): This function is async to ensure SME functions will
1558    // run in an async context and not call `wlan_common::timer::Timer::now` without an
1559    // executor.
1560    async fn start_ap(protected: bool) -> (ApSme, crate::MlmeStream, timer::EventStream<Event>) {
1561        let (mut sme, mut mlme_stream, mut time_stream) = create_sme().await;
1562        let config = if protected { protected_config() } else { unprotected_config() };
1563        let mut receiver = sme.on_start_command(config);
1564        assert_eq!(Ok(None), receiver.try_recv());
1565        assert_variant!(mlme_stream.try_next(), Ok(Some(MlmeRequest::Start(..))));
1566        // drain time stream
1567        while time_stream.try_next().is_ok() {}
1568        sme.on_mlme_event(create_start_conf(fidl_mlme::StartResultCode::Success));
1569
1570        assert_eq!(Ok(Some(StartResult::Success)), receiver.try_recv());
1571        (sme, mlme_stream, time_stream)
1572    }
1573
1574    // TODO(https://fxbug.dev/327499461): This function is async to ensure SME functions will
1575    // run in an async context and not call `wlan_common::timer::Timer::now` without an
1576    // executor.
1577    async fn create_sme() -> (ApSme, MlmeStream, timer::EventStream<Event>) {
1578        let (ap_sme, _mlme_sink, mlme_stream, time_stream) = ApSme::new(fake_device_info(*AP_ADDR));
1579        (ap_sme, mlme_stream, time_stream)
1580    }
1581}