1use crate::event::action::{self, AuthenticationControl, AuthenticationTap};
6use crate::event::{branch, Handler};
7use fidl::endpoints::{create_endpoints, create_proxy};
8use fidl_fuchsia_wlan_common::WlanMacRole;
9use fidl_fuchsia_wlan_tap::{WlanRxInfo, WlantapPhyConfig, WlantapPhyProxy};
10use fuchsia_component::client::connect_to_protocol_at;
11use ieee80211::{Bssid, MacAddr, Ssid};
12use lazy_static::lazy_static;
13use std::future::Future;
14use std::pin::pin;
15use wlan_common::bss::Protection;
16use wlan_common::channel::{Cbw, Channel};
17use wlan_common::ie::rsn::cipher::{Cipher, CIPHER_CCMP_128, CIPHER_TKIP};
18use wlan_common::ie::rsn::rsne;
19use wlan_common::ie::rsn::suite_filter::DEFAULT_GROUP_MGMT_CIPHER;
20use wlan_common::ie::wpa;
21use wlan_common::{data_writer, mac, mgmt_writer, TimeUnit};
22use wlan_frame_writer::write_frame_to_vec;
23use wlan_rsn::rsna::UpdateSink;
24use {
25 fidl_fuchsia_wlan_common as fidl_common, fidl_fuchsia_wlan_mlme as fidl_mlme,
26 fidl_fuchsia_wlan_policy as fidl_policy, fidl_fuchsia_wlan_softmac as fidl_wlan_softmac,
27};
28
29pub mod event;
30pub mod netdevice_helper;
31pub mod test_utils;
32
33pub use wlancfg_helper::*;
34
35mod config;
36mod wlancfg_helper;
37
38pub const PSK_STR_LEN: usize = 64;
39
40lazy_static! {
41 pub static ref CLIENT_MAC_ADDR: MacAddr = [0x67, 0x62, 0x6f, 0x6e, 0x69, 0x6b].into();
42 pub static ref AP_MAC_ADDR: Bssid = [0x70, 0xf1, 0x1c, 0x05, 0x2d, 0x7f].into();
43 pub static ref AP_SSID: Ssid = Ssid::try_from("ap_ssid").unwrap();
44 pub static ref ETH_DST_MAC: MacAddr = [0x65, 0x74, 0x68, 0x64, 0x73, 0x74].into();
45}
46
47pub const WLANCFG_DEFAULT_AP_CHANNEL: Channel = Channel { primary: 11, cbw: Cbw::Cbw20 };
48
49lazy_static! {
50 pub static ref ARTIFICIAL_SCAN_SLEEP: zx::MonotonicDuration = zx::MonotonicDuration::from_seconds(2);
54
55 pub static ref SCAN_RESPONSE_TEST_TIMEOUT: zx::MonotonicDuration = zx::MonotonicDuration::from_seconds(70);
59}
60
61pub struct Supplicant<'a> {
65 pub controller: &'a fidl_policy::ClientControllerProxy,
66 pub state_update_stream: &'a mut fidl_policy::ClientStateUpdatesRequestStream,
67 pub security_type: fidl_policy::SecurityType,
68 pub password: Option<&'a str>,
69}
70
71impl<'a> Supplicant<'a> {
72 pub fn reborrow(&mut self) -> Supplicant<'_> {
85 Supplicant {
86 controller: self.controller,
87 state_update_stream: &mut *self.state_update_stream,
88 security_type: self.security_type,
89 password: self.password,
90 }
91 }
92}
93
94pub fn default_wlantap_config_client() -> WlantapPhyConfig {
95 wlantap_config_client(format!("wlantap-client"), *CLIENT_MAC_ADDR)
96}
97
98pub fn wlantap_config_client(name: String, mac_addr: MacAddr) -> WlantapPhyConfig {
99 config::create_wlantap_config(name, mac_addr, WlanMacRole::Client)
100}
101
102pub fn default_wlantap_config_ap() -> WlantapPhyConfig {
103 wlantap_config_ap(format!("wlantap-ap"), (*AP_MAC_ADDR).into())
104}
105
106pub fn wlantap_config_ap(name: String, mac_addr: MacAddr) -> WlantapPhyConfig {
107 config::create_wlantap_config(name, mac_addr, WlanMacRole::Ap)
108}
109
110pub fn rx_info_with_default_ap() -> WlanRxInfo {
111 rx_info_with_valid_rssi(&WLANCFG_DEFAULT_AP_CHANNEL, 0)
112}
113
114fn rx_info_with_valid_rssi(channel: &Channel, rssi_dbm: i8) -> WlanRxInfo {
115 WlanRxInfo {
116 rx_flags: 0,
117 valid_fields: if rssi_dbm == 0 {
118 0
119 } else {
120 fidl_wlan_softmac::WlanRxInfoValid::RSSI.bits()
121 },
122 phy: fidl_common::WlanPhyType::Dsss,
123 data_rate: 0,
124 channel: fidl_common::WlanChannel::from(channel),
125 mcs: 0,
126 rssi_dbm,
127 snr_dbh: 0,
128 }
129}
130
131pub fn send_sae_authentication_frame(
132 sae_frame: &fidl_mlme::SaeFrame,
133 channel: &Channel,
134 bssid: &Bssid,
135 proxy: &WlantapPhyProxy,
136) -> Result<(), anyhow::Error> {
137 let buffer = write_frame_to_vec!({
138 headers: {
139 mac::MgmtHdr: &mgmt_writer::mgmt_hdr_from_ap(
140 mac::FrameControl(0)
141 .with_frame_type(mac::FrameType::MGMT)
142 .with_mgmt_subtype(mac::MgmtSubtype::AUTH),
143 *CLIENT_MAC_ADDR,
144 bssid.clone().into(),
145 mac::SequenceControl(0).with_seq_num(123),
146 ),
147 mac::AuthHdr: &mac::AuthHdr {
148 auth_alg_num: mac::AuthAlgorithmNumber::SAE,
149 auth_txn_seq_num: sae_frame.seq_num,
150 status_code: sae_frame.status_code.into(),
151 },
152 },
153 body: &sae_frame.sae_fields[..],
154 })?;
155 proxy.rx(&buffer, &rx_info_with_valid_rssi(channel, 0))?;
156 Ok(())
157}
158
159pub fn send_open_authentication(
160 channel: &Channel,
161 bssid: &Bssid,
162 status_code: impl Into<mac::StatusCode>,
163 proxy: &WlantapPhyProxy,
164) -> Result<(), anyhow::Error> {
165 let buffer = write_frame_to_vec!({
166 headers: {
167 mac::MgmtHdr: &mgmt_writer::mgmt_hdr_from_ap(
168 mac::FrameControl(0)
169 .with_frame_type(mac::FrameType::MGMT)
170 .with_mgmt_subtype(mac::MgmtSubtype::AUTH),
171 *CLIENT_MAC_ADDR,
172 bssid.clone().into(),
173 mac::SequenceControl(0).with_seq_num(123),
174 ),
175 mac::AuthHdr: &mac::AuthHdr {
176 auth_alg_num: mac::AuthAlgorithmNumber::OPEN,
177 auth_txn_seq_num: 2,
178 status_code: status_code.into(),
179 },
180 },
181 })?;
182 proxy.rx(&buffer, &rx_info_with_valid_rssi(channel, 0))?;
183 Ok(())
184}
185
186pub fn send_association_response(
187 channel: &Channel,
188 bssid: &Bssid,
189 status_code: impl Into<mac::StatusCode>,
190 proxy: &WlantapPhyProxy,
191) -> Result<(), anyhow::Error> {
192 let buffer = write_frame_to_vec!({
193 headers: {
194 mac::MgmtHdr: &mgmt_writer::mgmt_hdr_from_ap(
195 mac::FrameControl(0)
196 .with_frame_type(mac::FrameType::MGMT)
197 .with_mgmt_subtype(mac::MgmtSubtype::ASSOC_RESP),
198 *CLIENT_MAC_ADDR,
199 bssid.clone().into(),
200 mac::SequenceControl(0).with_seq_num(123),
201 ),
202 mac::AssocRespHdr: &mac::AssocRespHdr {
203 capabilities: mac::CapabilityInfo(0).with_ess(true).with_short_preamble(true),
204 status_code: status_code.into(),
205 aid: 2, },
207 },
208 ies: {
209 supported_rates: &[0x82, 0x84, 0x8b, 0x0c, 0x12, 0x96, 0x18, 0x24],
213 extended_supported_rates: &[48, 72, 128 + 96, 108],
215 },
216 })?;
217 proxy.rx(&buffer, &rx_info_with_valid_rssi(channel, 0))?;
218 Ok(())
219}
220
221pub fn send_disassociate(
222 channel: &Channel,
223 bssid: &Bssid,
224 reason_code: impl Into<mac::ReasonCode>,
225 proxy: &WlantapPhyProxy,
226) -> Result<(), anyhow::Error> {
227 let buffer = write_frame_to_vec!({
228 headers: {
229 mac::MgmtHdr: &mgmt_writer::mgmt_hdr_from_ap(
230 mac::FrameControl(0)
231 .with_frame_type(mac::FrameType::MGMT)
232 .with_mgmt_subtype(mac::MgmtSubtype::DISASSOC),
233 *CLIENT_MAC_ADDR,
234 bssid.clone().into(),
235 mac::SequenceControl(0).with_seq_num(123),
236 ),
237 mac::DisassocHdr: &mac::DisassocHdr {
238 reason_code: reason_code.into(),
239 },
240 },
241 })?;
242 proxy.rx(&buffer, &rx_info_with_valid_rssi(channel, 0))?;
243 Ok(())
244}
245
246pub fn password_or_psk_to_policy_credential<S: ToString>(
247 password_or_psk: Option<S>,
248) -> fidl_policy::Credential {
249 return match password_or_psk {
250 None => fidl_policy::Credential::None(fidl_policy::Empty),
251 Some(p) => {
252 let p = p.to_string().as_bytes().to_vec();
253 if p.len() == PSK_STR_LEN {
254 let psk = hex::decode(p).expect("Failed to decode psk");
256 fidl_policy::Credential::Psk(psk)
257 } else {
258 fidl_policy::Credential::Password(p)
259 }
260 }
261 };
262}
263
264pub fn create_authenticator(
265 bssid: &Bssid,
266 ssid: &Ssid,
267 password_or_psk: &str,
268 gtk_cipher: Cipher,
270 advertised_protection: Protection,
272 supplicant_protection: Protection,
274) -> wlan_rsn::Authenticator {
275 let nonce_rdr =
276 wlan_rsn::nonce::NonceReader::new(&bssid.clone().into()).expect("creating nonce reader");
277 let gtk_provider = wlan_rsn::GtkProvider::new(gtk_cipher, 1, 0).expect("creating gtk provider");
278
279 let advertised_protection_info = match advertised_protection {
280 Protection::Wpa3Personal => wlan_rsn::ProtectionInfo::Rsne(rsne::Rsne::wpa3_rsne()),
281 Protection::Wpa2Wpa3Personal => {
282 wlan_rsn::ProtectionInfo::Rsne(rsne::Rsne::wpa2_wpa3_rsne())
283 }
284 Protection::Wpa2Personal | Protection::Wpa1Wpa2Personal => wlan_rsn::ProtectionInfo::Rsne(
285 rsne::Rsne::wpa2_rsne_with_caps(rsne::RsnCapabilities(0)),
286 ),
287 Protection::Wpa2PersonalTkipOnly | Protection::Wpa1Wpa2PersonalTkipOnly => {
288 panic!("need tkip support")
289 }
290 Protection::Wpa1 => {
291 wlan_rsn::ProtectionInfo::LegacyWpa(wpa::fake_wpa_ies::fake_deprecated_wpa1_vendor_ie())
292 }
293 _ => {
294 panic!("{} not implemented", advertised_protection)
295 }
296 };
297
298 match supplicant_protection {
299 Protection::Wpa1 | Protection::Wpa2Personal => {
300 let psk = match password_or_psk.len() {
301 PSK_STR_LEN => {
302 hex::decode(password_or_psk).expect("Failed to decode psk").into_boxed_slice()
304 }
305 _ => {
306 wlan_rsn::psk::compute(password_or_psk.as_bytes(), ssid).expect("computing PSK")
307 }
308 };
309 let supplicant_protection_info = match supplicant_protection {
310 Protection::Wpa1 => wlan_rsn::ProtectionInfo::LegacyWpa(
311 wpa::fake_wpa_ies::fake_deprecated_wpa1_vendor_ie(),
312 ),
313 Protection::Wpa2Personal => wlan_rsn::ProtectionInfo::Rsne(
314 rsne::Rsne::wpa2_rsne_with_caps(rsne::RsnCapabilities(0)),
315 ),
316 _ => unreachable!("impossible combination in this nested match"),
317 };
318 wlan_rsn::Authenticator::new_wpa2psk_ccmp128(
319 nonce_rdr,
320 std::sync::Arc::new(std::sync::Mutex::new(gtk_provider)),
321 psk,
322 *CLIENT_MAC_ADDR,
323 supplicant_protection_info,
324 bssid.clone().into(),
325 advertised_protection_info,
326 )
327 .expect("creating authenticator")
328 }
329 Protection::Wpa3Personal => {
330 let igtk_provider = wlan_rsn::IgtkProvider::new(DEFAULT_GROUP_MGMT_CIPHER)
331 .expect("creating igtk provider");
332 let supplicant_protection_info =
333 wlan_rsn::ProtectionInfo::Rsne(rsne::Rsne::wpa3_rsne());
334 wlan_rsn::Authenticator::new_wpa3(
335 nonce_rdr,
336 std::sync::Arc::new(std::sync::Mutex::new(gtk_provider)),
337 std::sync::Arc::new(std::sync::Mutex::new(igtk_provider)),
338 ssid.clone(),
339 password_or_psk.as_bytes().to_vec(),
340 *CLIENT_MAC_ADDR,
341 supplicant_protection_info,
342 bssid.clone().into(),
343 advertised_protection_info,
344 )
345 .expect("creating authenticator")
346 }
347 _ => {
348 panic!("Cannot create an authenticator for {}", supplicant_protection)
349 }
350 }
351}
352
353pub enum ApAdvertisementMode {
354 Beacon,
355 ProbeResponse,
356}
357
358pub trait ApAdvertisement {
359 fn mode(&self) -> ApAdvertisementMode;
360 fn channel(&self) -> &Channel;
361 fn bssid(&self) -> &Bssid;
362 fn ssid(&self) -> &Ssid;
363 fn protection(&self) -> &Protection;
364 fn rssi_dbm(&self) -> i8;
365 fn wsc_ie(&self) -> Option<&Vec<u8>>;
366
367 fn beacon_interval(&self) -> TimeUnit {
368 TimeUnit::DEFAULT_BEACON_INTERVAL * 20u16
369 }
370
371 fn capabilities(&self) -> mac::CapabilityInfo {
372 mac::CapabilityInfo(0)
373 .with_ess(true)
376 .with_ibss(false)
377 .with_privacy(*self.protection() != Protection::Open)
381 }
382
383 fn send(&self, phy: &WlantapPhyProxy) -> Result<(), anyhow::Error> {
384 let buffer = self.generate_frame()?;
385 phy.rx(&buffer, &rx_info_with_valid_rssi(&self.channel(), self.rssi_dbm()))?;
386 Ok(())
387 }
388
389 fn generate_frame(&self) -> Result<Vec<u8>, anyhow::Error> {
390 let mode = self.mode();
391 let protection = self.protection();
392 let beacon_header = match mode {
393 ApAdvertisementMode::Beacon => {
394 Some(mac::BeaconHdr::new(self.beacon_interval(), self.capabilities()))
395 }
396 _ => None,
397 };
398 let probe_response_header = match mode {
399 ApAdvertisementMode::ProbeResponse => {
400 Some(mac::ProbeRespHdr::new(self.beacon_interval(), self.capabilities()))
401 }
402 _ => None,
403 };
404
405 let buffer = write_frame_to_vec!({
406 headers: {
407 mac::MgmtHdr: &mgmt_writer::mgmt_hdr_from_ap(
408 mac::FrameControl(0)
409 .with_frame_type(mac::FrameType::MGMT)
410 .with_mgmt_subtype(match mode {
411 ApAdvertisementMode::Beacon => mac::MgmtSubtype::BEACON,
412 ApAdvertisementMode::ProbeResponse{..} => mac::MgmtSubtype::PROBE_RESP
413 }),
414 match mode {
415 ApAdvertisementMode::Beacon => ieee80211::BROADCAST_ADDR,
416 ApAdvertisementMode::ProbeResponse{..} => *CLIENT_MAC_ADDR
417 },
418 *self.bssid(),
419 mac::SequenceControl(0).with_seq_num(123),
420 ),
421 mac::BeaconHdr?: beacon_header,
422 mac::ProbeRespHdr?: probe_response_header,
423 },
424 ies: {
425 ssid: &self.ssid(),
426 supported_rates: &[0x82, 0x84, 0x8b, 0x0c, 0x12, 0x96, 0x18, 0x24, 0x30, 0x48, 0xe0, 0x6c],
427 extended_supported_rates: { },
428 dsss_param_set: &ie::DsssParamSet { current_channel: self.channel().primary },
429 rsne?: match protection {
430 Protection::Unknown => panic!("Cannot send beacon with unknown protection"),
431 Protection::Open | Protection::Wep | Protection::Wpa1 => None,
432 Protection::Wpa1Wpa2Personal | Protection::Wpa2Personal =>
433 Some(rsne::Rsne::wpa2_rsne_with_caps(rsne::RsnCapabilities(0))),
434 Protection::Wpa2Wpa3Personal => Some(rsne::Rsne::wpa2_wpa3_rsne()),
435 Protection::Wpa3Personal => Some(rsne::Rsne::wpa3_rsne()),
436 _ => panic!("unsupported fake beacon: {:?}", protection),
437 },
438 wpa1?: match protection {
439 Protection::Unknown => panic!("Cannot send beacon with unknown protection"),
440 Protection::Open | Protection::Wep => None,
441 Protection::Wpa1 | Protection::Wpa1Wpa2Personal => Some(wpa::fake_wpa_ies::fake_deprecated_wpa1_vendor_ie()),
442 Protection::Wpa2Personal | Protection::Wpa2Wpa3Personal | Protection::Wpa3Personal => None,
443 _ => panic!("unsupported fake beacon: {:?}", protection),
444 },
445 wsc?: self.wsc_ie()
446 },
447 })?;
448 Ok(buffer.into())
449 }
450}
451
452pub struct Beacon {
453 pub channel: Channel,
454 pub bssid: Bssid,
455 pub ssid: Ssid,
456 pub protection: Protection,
457 pub rssi_dbm: i8,
458}
459
460impl ApAdvertisement for Beacon {
461 fn mode(&self) -> ApAdvertisementMode {
462 ApAdvertisementMode::Beacon
463 }
464 fn channel(&self) -> &Channel {
465 &self.channel
466 }
467 fn bssid(&self) -> &Bssid {
468 &self.bssid
469 }
470 fn ssid(&self) -> &Ssid {
471 &self.ssid
472 }
473 fn protection(&self) -> &Protection {
474 &self.protection
475 }
476 fn rssi_dbm(&self) -> i8 {
477 self.rssi_dbm
478 }
479 fn wsc_ie(&self) -> Option<&Vec<u8>> {
480 None
481 }
482}
483
484pub struct ProbeResponse {
485 pub channel: Channel,
486 pub bssid: Bssid,
487 pub ssid: Ssid,
488 pub protection: Protection,
489 pub rssi_dbm: i8,
490 pub wsc_ie: Option<Vec<u8>>,
491}
492
493impl ApAdvertisement for ProbeResponse {
494 fn mode(&self) -> ApAdvertisementMode {
495 ApAdvertisementMode::ProbeResponse
496 }
497 fn channel(&self) -> &Channel {
498 &self.channel
499 }
500 fn bssid(&self) -> &Bssid {
501 &self.bssid
502 }
503 fn ssid(&self) -> &Ssid {
504 &self.ssid
505 }
506 fn protection(&self) -> &Protection {
507 &self.protection
508 }
509 fn rssi_dbm(&self) -> i8 {
510 self.rssi_dbm
511 }
512 fn wsc_ie(&self) -> Option<&Vec<u8>> {
513 self.wsc_ie.as_ref()
514 }
515}
516
517pub async fn save_network_and_wait_until_connected(
518 test_ns_prefix: &str,
519 ssid: &Ssid,
520 security_type: fidl_policy::SecurityType,
521 credential: fidl_policy::Credential,
522) -> (fidl_policy::ClientControllerProxy, fidl_policy::ClientStateUpdatesRequestStream) {
523 let (client_controller, mut client_state_update_stream) =
525 wlancfg_helper::init_client_controller(test_ns_prefix).await;
526
527 save_network(&client_controller, ssid, security_type, credential).await;
528
529 let id = fidl_policy::NetworkIdentifier { ssid: ssid.to_vec(), type_: security_type.clone() };
531 wait_until_client_state(&mut client_state_update_stream, |update| {
532 has_id_and_state(update, &id, fidl_policy::ConnectionState::Connected)
533 })
534 .await;
535
536 (client_controller, client_state_update_stream)
537}
538
539pub async fn connect_or_timeout_with<F>(
542 helper: &mut test_utils::TestHelper,
543 timeout: zx::MonotonicDuration,
544 ssid: &Ssid,
545 bssid: &Bssid,
546 protection: &Protection,
547 authenticator: Option<wlan_rsn::Authenticator>,
548 future: F,
549) -> F::Output
550where
551 F: Future + Unpin,
552{
553 let phy = helper.proxy();
554 let channel = Channel::new(1, Cbw::Cbw20);
555 let beacons = [Beacon {
556 channel,
557 bssid: bssid.clone(),
558 ssid: ssid.clone(),
559 protection: protection.clone(),
560 rssi_dbm: -30,
561 }];
562 let mut control = authenticator
563 .map(|authenticator| AuthenticationControl { updates: UpdateSink::new(), authenticator });
564 let connect = if let Some(ref mut control) = control {
565 let tap = AuthenticationTap { control, handler: action::authenticate_with_control_state() };
566 event::boxed(action::connect_with_authentication_tap(
567 &phy, ssid, bssid, &channel, protection, tap,
568 ))
569 } else {
570 event::boxed(action::connect_with_open_authentication(
571 &phy, ssid, bssid, &channel, protection,
572 ))
573 };
574 helper
575 .run_until_complete_or_timeout(
576 timeout,
577 format!(
578 "connecting to {} ({:02X?}) with {:?} protection",
579 ssid.to_string_not_redactable(),
580 bssid,
581 protection,
582 ),
583 branch::or((
584 event::on_scan(action::send_advertisements_and_scan_completion(&phy, beacons)),
585 event::on_transmit(connect),
586 ))
587 .expect("failed to connect client"),
588 future,
589 )
590 .await
591}
592
593pub async fn connect_or_timeout(
596 helper: &mut test_utils::TestHelper,
597 timeout: zx::MonotonicDuration,
598 ssid: &Ssid,
599 bssid: &Bssid,
600 bss_protection: &Protection,
601 password_or_psk: Option<&str>,
602 security_type: fidl_policy::SecurityType,
603) {
604 let authenticator = match bss_protection {
605 Protection::Wpa3Personal | Protection::Wpa2Wpa3Personal => {
606 password_or_psk.map(|password_or_psk| {
607 create_authenticator(
608 bssid,
609 ssid,
610 password_or_psk,
611 CIPHER_CCMP_128,
612 *bss_protection,
613 Protection::Wpa3Personal,
614 )
615 })
616 }
617 Protection::Wpa2Personal | Protection::Wpa1Wpa2Personal => {
618 password_or_psk.map(|password_or_psk| {
619 create_authenticator(
620 bssid,
621 ssid,
622 password_or_psk,
623 CIPHER_CCMP_128,
624 *bss_protection,
625 Protection::Wpa2Personal,
626 )
627 })
628 }
629 Protection::Wpa2PersonalTkipOnly | Protection::Wpa1Wpa2PersonalTkipOnly => {
630 panic!("Hardware simulator does not support WPA2-TKIP.")
631 }
632 Protection::Wpa1 => password_or_psk.map(|password_or_psk| {
633 create_authenticator(
634 bssid,
635 ssid,
636 password_or_psk,
637 CIPHER_TKIP,
638 *bss_protection,
639 Protection::Wpa1,
640 )
641 }),
642 Protection::Open => None,
643 _ => {
644 panic!("Unsupported WLAN protection: {}", bss_protection)
645 }
646 };
647
648 let credential = password_or_psk_to_policy_credential(password_or_psk);
649 let test_ns_prefix = helper.test_ns_prefix().to_string();
650 let connect = pin!(save_network_and_wait_until_connected(
651 &test_ns_prefix,
652 ssid,
653 security_type,
654 credential
655 ));
656 connect_or_timeout_with(helper, timeout, ssid, bssid, bss_protection, authenticator, connect)
657 .await;
658}
659
660pub fn rx_wlan_data_frame(
661 channel: &Channel,
662 addr1: &MacAddr,
663 addr2: &MacAddr,
664 addr3: &MacAddr,
665 payload: &[u8],
666 ether_type: u16,
667 phy: &WlantapPhyProxy,
668) -> Result<(), anyhow::Error> {
669 let buffer = write_frame_to_vec!({
670 headers: {
671 mac::FixedDataHdrFields: &mac::FixedDataHdrFields {
672 frame_ctrl: mac::FrameControl(0)
673 .with_frame_type(mac::FrameType::DATA)
674 .with_data_subtype(mac::DataSubtype(0))
675 .with_from_ds(true),
676 duration: 0,
677 addr1: *addr1,
678 addr2: *addr2,
679 addr3: *addr3,
680 seq_ctrl: mac::SequenceControl(0).with_seq_num(3),
681 },
682 mac::LlcHdr: &data_writer::make_snap_llc_hdr(ether_type),
683 },
684 payload: payload,
685 })?;
686
687 phy.rx(&buffer, &rx_info_with_valid_rssi(channel, 0))?;
688 Ok(())
689}
690
691pub async fn loop_until_iface_is_found(helper: &mut test_utils::TestHelper) {
692 let policy_provider =
694 connect_to_protocol_at::<fidl_policy::ClientProviderMarker>(helper.test_ns_prefix())
695 .expect("connecting to wlan policy");
696 let (client_controller, server_end) = create_proxy();
697 let (update_client_end, _update_server_end) = create_endpoints();
698 let () =
699 policy_provider.get_controller(server_end, update_client_end).expect("getting controller");
700
701 let mut retry = test_utils::RetryWithBackoff::infinite_with_max_interval(
706 zx::MonotonicDuration::from_seconds(10),
707 );
708 loop {
709 let (scan_proxy, server_end) = create_proxy();
710 client_controller.scan_for_networks(server_end).expect("requesting scan");
711
712 let fut = pin!(async move { scan_proxy.get_next().await.expect("getting scan results") });
713
714 let phy = helper.proxy();
715 match helper
716 .run_until_complete_or_timeout(
717 *SCAN_RESPONSE_TEST_TIMEOUT,
718 "receive a scan response",
719 event::on_scan(action::send_advertisements_and_scan_completion(
720 &phy,
721 [] as [Beacon; 0],
722 )),
723 fut,
724 )
725 .await
726 {
727 Err(_) => {
728 retry.sleep_unless_after_deadline().await.unwrap_or_else(|_| {
729 panic!("Wlanstack did not recognize the interface in time")
730 });
731 }
732 Ok(_) => return,
733 }
734 }
735}