2014-02-03 20:52:33 +01:00
|
|
|
# wpa_supplicant AP mode tests
|
|
|
|
# Copyright (c) 2014, Qualcomm Atheros, Inc.
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
2020-03-15 20:22:18 +01:00
|
|
|
import hostapd
|
2016-06-23 19:16:36 +02:00
|
|
|
from remotehost import remote_compatible
|
2014-02-03 20:52:33 +01:00
|
|
|
import time
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
|
|
|
|
|
|
|
import hwsim_utils
|
2020-04-18 10:05:49 +02:00
|
|
|
from utils import *
|
2016-06-19 21:00:20 +02:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2015-03-05 15:23:33 +01:00
|
|
|
from test_p2p_channel import set_country
|
2022-02-26 00:15:16 +01:00
|
|
|
from test_ap_psk import find_wpas_process, read_process_memory, verify_not_present, get_key_locations
|
2014-02-03 20:52:33 +01:00
|
|
|
|
2014-03-25 14:08:07 +01:00
|
|
|
def wait_ap_ready(dev):
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("AP failed to start")
|
|
|
|
|
2023-12-09 16:11:45 +01:00
|
|
|
def set_regdom(dev, country):
|
|
|
|
dev.set("country", country)
|
|
|
|
for i in range(5):
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
|
|
if not ev:
|
|
|
|
return
|
|
|
|
if "alpha2=" + country in ev:
|
|
|
|
return
|
|
|
|
logger.info("No regdom change event indicated")
|
|
|
|
|
2022-02-15 11:45:09 +01:00
|
|
|
def log_channel_info(dev):
|
|
|
|
gen = dev.get_status_field('wifi_generation')
|
|
|
|
if gen:
|
|
|
|
logger.info("Wi-Fi Generation: " + gen)
|
|
|
|
sig = dev.request("SIGNAL_POLL").splitlines()
|
|
|
|
logger.info(sig)
|
|
|
|
|
2014-02-03 20:52:33 +01:00
|
|
|
def test_wpas_ap_open(dev):
|
|
|
|
"""wpa_supplicant AP mode - open network"""
|
2014-12-14 01:20:50 +01:00
|
|
|
if "FAIL" not in dev[0].request("DEAUTHENTICATE 00:11:22:33:44:55"):
|
|
|
|
raise Exception("Unexpected DEAUTHENTICATE accepted")
|
|
|
|
if "FAIL" not in dev[0].request("DISASSOCIATE 00:11:22:33:44:55"):
|
|
|
|
raise Exception("Unexpected DISASSOCIATE accepted")
|
|
|
|
if "FAIL" not in dev[0].request("CHAN_SWITCH 0 2432"):
|
|
|
|
raise Exception("Unexpected CHAN_SWITCH accepted")
|
|
|
|
|
2014-02-03 20:52:33 +01:00
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
2014-03-25 14:08:07 +01:00
|
|
|
wait_ap_ready(dev[0])
|
2014-02-03 20:52:33 +01:00
|
|
|
|
2014-12-14 01:20:50 +01:00
|
|
|
if "FAIL" not in dev[0].request("DEAUTHENTICATE foo"):
|
|
|
|
raise Exception("Invalid DEAUTHENTICATE accepted")
|
|
|
|
if "FAIL" not in dev[0].request("DISASSOCIATE foo"):
|
|
|
|
raise Exception("Invalid DISASSOCIATE accepted")
|
|
|
|
|
2014-02-03 20:52:33 +01:00
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
dev[2].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
2014-02-03 20:52:33 +01:00
|
|
|
|
|
|
|
addr1 = dev[1].p2p_interface_addr()
|
|
|
|
addr2 = dev[2].p2p_interface_addr()
|
2019-03-15 11:10:37 +01:00
|
|
|
addrs = [addr1, addr2]
|
2014-02-03 20:52:33 +01:00
|
|
|
sta = dev[0].get_sta(None)
|
|
|
|
if sta['addr'] not in addrs:
|
|
|
|
raise Exception("Unexpected STA address")
|
|
|
|
sta1 = dev[0].get_sta(sta['addr'])
|
|
|
|
if sta1['addr'] not in addrs:
|
|
|
|
raise Exception("Unexpected STA address")
|
|
|
|
sta2 = dev[0].get_sta(sta['addr'], next=True)
|
|
|
|
if sta2['addr'] not in addrs:
|
|
|
|
raise Exception("Unexpected STA2 address")
|
|
|
|
sta3 = dev[0].get_sta(sta2['addr'], next=True)
|
|
|
|
if len(sta3) != 0:
|
|
|
|
raise Exception("Unexpected STA iteration result (did not stop)")
|
|
|
|
|
|
|
|
status = dev[0].get_status()
|
|
|
|
if status['mode'] != "AP":
|
|
|
|
raise Exception("Unexpected status mode")
|
|
|
|
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
dev[2].dump_monitor()
|
|
|
|
dev[0].request("DEAUTHENTICATE " + addr1)
|
|
|
|
dev[0].request("DISASSOCIATE " + addr2)
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[1].wait_disconnected(timeout=10)
|
|
|
|
dev[2].wait_disconnected(timeout=10)
|
|
|
|
dev[1].wait_connected(timeout=10, error="Reconnection timed out")
|
|
|
|
dev[2].wait_connected(timeout=10, error="Reconnection timed out")
|
2014-03-25 14:08:07 +01:00
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[2].request("DISCONNECT")
|
2014-02-03 20:52:33 +01:00
|
|
|
|
2018-02-17 16:57:45 +01:00
|
|
|
def test_wpas_ap_open_isolate(dev):
|
|
|
|
"""wpa_supplicant AP mode - open network with client isolation"""
|
|
|
|
try:
|
|
|
|
dev[0].set("ap_isolate", "1")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
dev[2].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
|
|
hwsim_utils.test_connectivity(dev[1], dev[2], success_expected=False,
|
|
|
|
timeout=1)
|
|
|
|
finally:
|
|
|
|
dev[0].set("ap_isolate", "0")
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-02-03 20:52:33 +01:00
|
|
|
def test_wpas_ap_wep(dev):
|
|
|
|
"""wpa_supplicant AP mode - WEP"""
|
2020-02-29 15:52:39 +01:00
|
|
|
check_wep_capa(dev[0])
|
2014-02-03 20:52:33 +01:00
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-wep")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network_quoted(id, "wep_key0", "hello")
|
|
|
|
dev[0].select_network(id)
|
2014-03-25 14:08:07 +01:00
|
|
|
wait_ap_ready(dev[0])
|
2014-02-03 20:52:33 +01:00
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-wep", key_mgmt="NONE", wep_key0='"hello"',
|
|
|
|
scan_freq="2412")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2014-03-25 14:08:07 +01:00
|
|
|
dev[1].request("DISCONNECT")
|
2014-02-03 20:52:33 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-02-03 20:52:33 +01:00
|
|
|
def test_wpas_ap_no_ssid(dev):
|
|
|
|
"""wpa_supplicant AP mode - invalid network configuration"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected AP start")
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-02-03 20:52:33 +01:00
|
|
|
def test_wpas_ap_default_frequency(dev):
|
|
|
|
"""wpa_supplicant AP mode - default frequency"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
2014-03-25 14:08:07 +01:00
|
|
|
wait_ap_ready(dev[0])
|
2014-02-03 20:52:33 +01:00
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2462")
|
2014-03-25 14:08:07 +01:00
|
|
|
dev[1].request("DISCONNECT")
|
2014-02-03 20:52:33 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-02-03 20:52:33 +01:00
|
|
|
def test_wpas_ap_invalid_frequency(dev):
|
|
|
|
"""wpa_supplicant AP mode - invalid frequency configuration"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2413")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected AP start")
|
|
|
|
|
|
|
|
def test_wpas_ap_wps(dev):
|
|
|
|
"""wpa_supplicant AP mode - WPS operations"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-wps")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "1234567890")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
2014-03-25 14:08:07 +01:00
|
|
|
wait_ap_ready(dev[0])
|
2014-02-03 20:52:33 +01:00
|
|
|
bssid = dev[0].p2p_interface_addr()
|
|
|
|
|
|
|
|
logger.info("Test PBC mode start/stop")
|
|
|
|
if "FAIL" not in dev[0].request("WPS_CANCEL"):
|
|
|
|
raise Exception("Unexpected WPS_CANCEL success")
|
|
|
|
dev[0].request("WPS_PBC")
|
|
|
|
ev = dev[0].wait_event(["WPS-PBC-ACTIVE"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PBC mode start timeout")
|
|
|
|
if "OK" not in dev[0].request("WPS_CANCEL"):
|
|
|
|
raise Exception("Unexpected WPS_CANCEL failure")
|
|
|
|
ev = dev[0].wait_event(["WPS-TIMEOUT"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PBC mode disabling timeout")
|
|
|
|
|
|
|
|
logger.info("Test PBC protocol run")
|
|
|
|
dev[0].request("WPS_PBC")
|
|
|
|
ev = dev[0].wait_event(["WPS-PBC-ACTIVE"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PBC mode start timeout")
|
|
|
|
dev[1].request("WPS_PBC")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[1].wait_connected(timeout=30, error="WPS PBC operation timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2014-02-03 20:52:33 +01:00
|
|
|
|
|
|
|
logger.info("Test AP PIN to learn configuration")
|
|
|
|
pin = dev[0].request("WPS_AP_PIN random")
|
|
|
|
if "FAIL" in pin:
|
|
|
|
raise Exception("Could not generate random AP PIN")
|
|
|
|
if pin not in dev[0].request("WPS_AP_PIN get"):
|
|
|
|
raise Exception("Could not fetch current AP PIN")
|
|
|
|
dev[2].wps_reg(bssid, pin)
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
2014-02-03 20:52:33 +01:00
|
|
|
|
|
|
|
dev[1].request("REMOVE_NETWORK all")
|
|
|
|
dev[2].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
logger.info("Test AP PIN operations")
|
|
|
|
dev[0].request("WPS_AP_PIN disable")
|
|
|
|
dev[0].request("WPS_AP_PIN set " + pin + " 1")
|
|
|
|
time.sleep(1.1)
|
|
|
|
if "FAIL" not in dev[0].request("WPS_AP_PIN get"):
|
|
|
|
raise Exception("AP PIN unexpectedly still enabled")
|
|
|
|
|
|
|
|
pin = dev[1].wps_read_pin()
|
|
|
|
dev[0].request("WPS_PIN any " + pin)
|
|
|
|
dev[1].request("WPS_PIN any " + pin)
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[1].wait_connected(timeout=30)
|
2014-04-11 22:04:18 +02:00
|
|
|
dev[1].request("REMOVE_NETWORK all")
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
|
|
|
dev[0].request("WPS_PIN any " + pin + " 100")
|
|
|
|
dev[1].request("WPS_PIN any " + pin)
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[1].wait_connected(timeout=30)
|
2014-02-03 20:52:33 +01:00
|
|
|
dev[1].request("REMOVE_NETWORK all")
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
|
|
|
dev[0].request("WPS_AP_PIN set 12345670")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
runs = ("88887777", "12340000", "00000000", "12345670")
|
|
|
|
for pin in runs:
|
|
|
|
logger.info("Try AP PIN " + pin)
|
|
|
|
dev[2].dump_monitor()
|
|
|
|
dev[2].request("WPS_REG " + bssid + " " + pin)
|
|
|
|
ev = dev[2].wait_event(["WPS-SUCCESS", "WPS-FAIL msg"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("WPS operation timed out")
|
|
|
|
if "WPS-SUCCESS" in ev:
|
|
|
|
raise Exception("WPS operation succeeded unexpectedly")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[2].wait_disconnected(timeout=10)
|
2014-02-03 20:52:33 +01:00
|
|
|
dev[2].request("WPS_CANCEL")
|
|
|
|
dev[2].request("REMOVE_NETWORK all")
|
|
|
|
ev = dev[0].wait_event(["WPS-AP-SETUP-LOCKED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("WPS AP PIN not locked")
|
2014-12-07 16:47:02 +01:00
|
|
|
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
logger.info("Test random AP PIN timeout")
|
|
|
|
pin = dev[0].request("WPS_AP_PIN random 1")
|
|
|
|
if "FAIL" in pin:
|
|
|
|
raise Exception("Could not generate random AP PIN")
|
|
|
|
res = dev[0].request("WPS_AP_PIN get")
|
|
|
|
if pin not in res:
|
|
|
|
raise Exception("Could not fetch current AP PIN")
|
|
|
|
for i in range(10):
|
|
|
|
time.sleep(0.2)
|
|
|
|
res = dev[0].request("WPS_AP_PIN get")
|
|
|
|
if "FAIL" in res:
|
|
|
|
break
|
|
|
|
if "FAIL" not in res:
|
|
|
|
raise Exception("WPS_AP_PIN random timeout did not work")
|
|
|
|
|
|
|
|
if "FAIL" not in dev[0].request("WPS_AP_PIN foo"):
|
|
|
|
raise Exception("Invalid WPS_AP_PIN command not rejected")
|
|
|
|
if "FAIL" not in dev[0].request("WPS_AP_PIN set"):
|
|
|
|
raise Exception("Invalid WPS_AP_PIN command not rejected")
|
2014-12-13 18:41:26 +01:00
|
|
|
|
2016-06-24 17:09:07 +02:00
|
|
|
def test_wpas_ap_wps_frag(dev):
|
|
|
|
"""wpa_supplicant AP mode - WPS operations with fragmentation"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-wps")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "1234567890")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "fragment_size", "300")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
bssid = dev[0].own_addr()
|
|
|
|
|
|
|
|
pin = dev[1].wps_read_pin()
|
|
|
|
dev[0].request("WPS_PIN any " + pin)
|
|
|
|
dev[1].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[1].request("WPS_PIN " + bssid + " " + pin)
|
|
|
|
dev[1].wait_connected(timeout=30)
|
|
|
|
|
2014-12-13 18:41:26 +01:00
|
|
|
def test_wpas_ap_wps_pbc_overlap(dev):
|
|
|
|
"""wpa_supplicant AP mode - WPS operations with PBC overlap"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-wps")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "1234567890")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
bssid = dev[0].p2p_interface_addr()
|
|
|
|
|
|
|
|
dev[1].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
dev[2].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[2].dump_monitor()
|
|
|
|
dev[0].request("WPS_PBC")
|
|
|
|
dev[1].request("WPS_PBC " + bssid)
|
|
|
|
dev[2].request("WPS_PBC " + bssid)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["WPS-M2D"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PBC session overlap not detected (dev1)")
|
|
|
|
if "config_error=12" not in ev:
|
|
|
|
raise Exception("PBC session overlap not correctly reported (dev1)")
|
|
|
|
|
|
|
|
ev = dev[2].wait_event(["WPS-M2D"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PBC session overlap not detected (dev2)")
|
|
|
|
if "config_error=12" not in ev:
|
|
|
|
raise Exception("PBC session overlap not correctly reported (dev2)")
|
|
|
|
|
|
|
|
if "FAIL-PBC-OVERLAP" not in dev[0].request("WPS_PBC"):
|
|
|
|
raise Exception("WPS_PBC(AP) accepted during overlap")
|
|
|
|
if "FAIL-PBC-OVERLAP" not in dev[0].request("WPS_PBC any"):
|
|
|
|
raise Exception("WPS_PBC(AP) accepted during overlap")
|
|
|
|
dev[0].request("WPS_CANCEL")
|
|
|
|
dev[1].request("WPS_CANCEL")
|
|
|
|
dev[2].request("WPS_CANCEL")
|
2015-03-05 15:23:33 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2016-05-14 18:43:13 +02:00
|
|
|
def test_wpas_ap_wps_disabled(dev):
|
|
|
|
"""wpa_supplicant AP mode - WPS disabled"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-no-wps")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "12345678")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "wps_disabled", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-no-wps", psk="12345678", scan_freq="2412")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
|
2015-03-05 15:23:33 +01:00
|
|
|
def test_wpas_ap_dfs(dev):
|
|
|
|
"""wpa_supplicant AP mode - DFS"""
|
2016-09-06 08:52:41 +02:00
|
|
|
if dev[0].get_mcc() > 1:
|
|
|
|
raise HwsimSkip("DFS is not supported with multi channel contexts")
|
|
|
|
|
2015-03-05 15:23:33 +01:00
|
|
|
try:
|
|
|
|
_test_wpas_ap_dfs(dev)
|
|
|
|
finally:
|
|
|
|
set_country("00")
|
|
|
|
dev[0].request("SET country 00")
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
|
|
|
|
def _test_wpas_ap_dfs(dev):
|
|
|
|
set_country("US")
|
|
|
|
dev[0].request("SET country US")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-dfs")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "5260")
|
|
|
|
dev[0].set_network(id, "scan_freq", "5260")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DFS-CAC-START"])
|
|
|
|
if ev is None:
|
|
|
|
# For now, assume DFS is not supported by all kernel builds.
|
|
|
|
raise HwsimSkip("CAC did not start - assume not supported")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DFS-CAC-COMPLETED"], timeout=70)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("CAC did not complete")
|
|
|
|
if "success=1" not in ev:
|
|
|
|
raise Exception("CAC failed")
|
|
|
|
if "freq=5260" not in ev:
|
|
|
|
raise Exception("Unexpected DFS freq result")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("AP failed to start")
|
|
|
|
|
2023-11-24 21:25:18 +01:00
|
|
|
dev[1].connect("wpas-ap-dfs", key_mgmt="NONE", timeout=30)
|
2018-12-22 14:55:19 +01:00
|
|
|
dev[1].wait_regdom(country_ie=True)
|
|
|
|
dev[0].request("DISCONNECT")
|
2019-03-17 16:55:43 +01:00
|
|
|
dev[1].disconnect_and_stop_scan()
|
2015-03-14 09:06:06 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2015-03-14 09:06:06 +01:00
|
|
|
def test_wpas_ap_disable(dev):
|
|
|
|
"""wpa_supplicant AP mode - DISABLE_NETWORK"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["AP-ENABLED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("AP-ENABLED event not seen")
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
dev[0].request("DISABLE_NETWORK %d" % id)
|
|
|
|
ev = dev[0].wait_event(["AP-DISABLED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("AP-DISABLED event not seen")
|
|
|
|
dev[0].wait_disconnected()
|
2015-12-24 21:12:32 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_acs(dev):
|
|
|
|
"""wpa_supplicant AP mode - ACS"""
|
|
|
|
res = dev[0].get_capability("acs")
|
|
|
|
if res is None or "ACS" not in res:
|
|
|
|
raise HwsimSkip("ACS not supported")
|
|
|
|
|
2016-12-11 23:58:00 +01:00
|
|
|
# For now, make sure the last operating channel was on 2.4 GHz band to get
|
|
|
|
# sufficient survey data from mac80211_hwsim.
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
|
2015-12-24 21:12:32 +01:00
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2417")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2417")
|
|
|
|
dev[0].set_network(id, "acs", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
# ACS prefers channels 1, 6, 11
|
|
|
|
freq = dev[0].get_status_field('freq')
|
|
|
|
if freq == "2417":
|
|
|
|
raise Exception("Unexpected operating channel selected")
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq=freq)
|
2016-01-01 16:14:46 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2016-01-01 16:14:46 +01:00
|
|
|
def test_wpas_ap_and_assoc_req_p2p_ie(dev):
|
|
|
|
"""wpa_supplicant AP mode - unexpected P2P IE in Association Request"""
|
|
|
|
try:
|
|
|
|
_test_wpas_ap_and_assoc_req_p2p_ie(dev)
|
|
|
|
finally:
|
|
|
|
dev[1].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
dev[0].request("P2P_SET disabled 0")
|
|
|
|
|
|
|
|
def _test_wpas_ap_and_assoc_req_p2p_ie(dev):
|
|
|
|
dev[0].request("P2P_SET disabled 1")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].request("VENDOR_ELEM_ADD 13 dd04506f9a09")
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
2016-03-18 15:18:32 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2016-03-18 15:18:32 +01:00
|
|
|
def test_wpas_ap_open_ht_disabled(dev):
|
|
|
|
"""wpa_supplicant AP mode - open network and HT disabled"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "disable_ht", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2016-06-19 21:00:20 +02:00
|
|
|
|
|
|
|
def test_wpas_ap_failures(dev):
|
|
|
|
"""wpa_supplicant AP mode - failures"""
|
|
|
|
# No SSID configured for AP mode
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
2019-03-15 11:10:37 +01:00
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=0.1)
|
2016-06-19 21:00:20 +02:00
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection event")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
# Invalid pbss value(2) for AP mode
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "pbss", "2")
|
|
|
|
dev[0].select_network(id)
|
2019-03-15 11:10:37 +01:00
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"CTRL-EVENT-DISCONNECTED"], timeout=0.1)
|
2016-06-19 21:00:20 +02:00
|
|
|
if ev is not None and "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
raise Exception("Unexpected connection event(2)")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
def test_wpas_ap_oom(dev):
|
|
|
|
"""wpa_supplicant AP mode - OOM"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "1234567890")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
with alloc_fail(dev[0], 1, "=wpa_supplicant_conf_ap"):
|
|
|
|
dev[0].select_network(id)
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap")
|
|
|
|
dev[0].set_network(id, "psk", "1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
with alloc_fail(dev[0], 1, "=wpa_supplicant_conf_ap"):
|
|
|
|
dev[0].select_network(id)
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
2020-02-29 15:52:39 +01:00
|
|
|
if "WEP40" in dev[0].get_capability("group"):
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network_quoted(id, "wep_key0", "hello")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
with alloc_fail(dev[0], 1, "=wpa_supplicant_conf_ap"):
|
|
|
|
dev[0].select_network(id)
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
2016-06-19 21:00:20 +02:00
|
|
|
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5")
|
|
|
|
wpas.request("SET manufacturer test")
|
|
|
|
wpas.request("SET model_name test")
|
|
|
|
wpas.request("SET model_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET ap_vendor_elements dd0411223301")
|
|
|
|
id = wpas.add_network()
|
|
|
|
wpas.set_network(id, "mode", "2")
|
|
|
|
wpas.set_network_quoted(id, "ssid", "wpas-ap")
|
|
|
|
wpas.set_network(id, "key_mgmt", "NONE")
|
|
|
|
wpas.set_network(id, "frequency", "2412")
|
|
|
|
wpas.set_network(id, "scan_freq", "2412")
|
|
|
|
|
|
|
|
for i in range(5):
|
|
|
|
with alloc_fail(wpas, i, "=wpa_supplicant_conf_ap"):
|
|
|
|
wpas.select_network(id)
|
2019-03-15 11:10:37 +01:00
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"CTRL-EVENT-DISCONNECTED"], timeout=1)
|
2016-06-19 21:00:20 +02:00
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
wpas.wait_disconnected()
|
|
|
|
|
|
|
|
def test_wpas_ap_params(dev):
|
|
|
|
"""wpa_supplicant AP mode - parameters"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5")
|
|
|
|
wpas.request("SET manufacturer test")
|
|
|
|
wpas.request("SET model_name test")
|
|
|
|
wpas.request("SET model_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET serial_number test")
|
|
|
|
wpas.request("SET ap_vendor_elements dd0411223301")
|
|
|
|
id = wpas.add_network()
|
|
|
|
wpas.set_network(id, "mode", "2")
|
|
|
|
wpas.set_network_quoted(id, "ssid", "wpas-ap")
|
|
|
|
wpas.set_network(id, "key_mgmt", "NONE")
|
|
|
|
wpas.set_network(id, "frequency", "2412")
|
|
|
|
wpas.set_network(id, "scan_freq", "2412")
|
|
|
|
wpas.select_network(id)
|
|
|
|
wpas.wait_connected()
|
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
wpas.wait_disconnected()
|
|
|
|
|
|
|
|
wpas.request("SET beacon_int 200 3")
|
|
|
|
wpas.request("SET dtim_period 3")
|
|
|
|
wpas.select_network(id)
|
|
|
|
wpas.wait_connected()
|
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
wpas.wait_disconnected()
|
|
|
|
|
|
|
|
wpas.set_network(id, "beacon_int", "300")
|
|
|
|
wpas.set_network(id, "dtim_period", "2")
|
|
|
|
wpas.select_network(id)
|
|
|
|
wpas.wait_connected()
|
|
|
|
if "---- AP ----" not in wpas.request("PMKSA"):
|
|
|
|
raise Exception("AP section missing from PMKSA output")
|
|
|
|
if "OK" not in wpas.request("PMKSA_FLUSH"):
|
|
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
wpas.wait_disconnected()
|
2017-01-30 00:13:13 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_global_sta(dev):
|
|
|
|
"""wpa_supplicant AP mode - STA commands on global control interface"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
|
|
|
|
addr1 = dev[1].own_addr()
|
|
|
|
res = dev[0].global_request("STA " + addr1)
|
|
|
|
if "UNKNOWN COMMAND" in res:
|
|
|
|
raise Exception("STA command not known on global control interface")
|
|
|
|
res = dev[0].global_request("STA-FIRST")
|
|
|
|
if "UNKNOWN COMMAND" in res:
|
|
|
|
raise Exception("STA-FIRST command not known on global control interface")
|
|
|
|
res = dev[0].global_request("STA-NEXT " + addr1)
|
|
|
|
if "UNKNOWN COMMAND" in res:
|
|
|
|
raise Exception("STA-NEXT command not known on global control interface")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
2017-02-07 10:22:29 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_5ghz(dev):
|
|
|
|
"""wpa_supplicant AP mode - 5 GHz"""
|
|
|
|
try:
|
|
|
|
_test_wpas_ap_5ghz(dev)
|
|
|
|
finally:
|
|
|
|
set_country("00")
|
|
|
|
dev[0].request("SET country 00")
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
|
|
|
|
def _test_wpas_ap_5ghz(dev):
|
|
|
|
set_country("US")
|
|
|
|
dev[0].request("SET country US")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-5ghz")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "5180")
|
|
|
|
dev[0].set_network(id, "scan_freq", "5180")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-5ghz", key_mgmt="NONE", scan_freq="5180")
|
2022-02-15 11:45:09 +01:00
|
|
|
log_channel_info(dev[1])
|
2017-02-07 10:22:29 +01:00
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
2017-03-07 17:20:58 +01:00
|
|
|
|
2022-02-15 11:45:09 +01:00
|
|
|
def test_wpas_ap_open_ht40(dev):
|
|
|
|
"""wpa_supplicant AP mode - HT 40 MHz"""
|
|
|
|
id = dev[0].add_network()
|
2023-12-09 16:11:45 +01:00
|
|
|
set_regdom(dev[0], "FI")
|
2022-02-15 11:45:09 +01:00
|
|
|
try:
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "5180")
|
|
|
|
dev[0].set_network(id, "scan_freq", "5180")
|
|
|
|
dev[0].set_network(id, "ht40", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="5180")
|
|
|
|
log_channel_info(dev[1])
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
if "FREQUENCY=5180" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig))
|
|
|
|
if "WIDTH=40 MHz" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
|
|
finally:
|
|
|
|
set_country("00")
|
|
|
|
dev[0].set("country", "00")
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
|
2017-03-07 17:20:58 +01:00
|
|
|
def test_wpas_ap_open_vht80(dev):
|
|
|
|
"""wpa_supplicant AP mode - VHT 80 MHz"""
|
|
|
|
id = dev[0].add_network()
|
2023-12-09 16:11:45 +01:00
|
|
|
set_regdom(dev[0], "FI")
|
2017-03-07 17:20:58 +01:00
|
|
|
try:
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "5180")
|
|
|
|
dev[0].set_network(id, "scan_freq", "5180")
|
|
|
|
dev[0].set_network(id, "vht", "1")
|
|
|
|
dev[0].set_network(id, "vht_center_freq1", "5210")
|
|
|
|
dev[0].set_network(id, "max_oper_chwidth", "1")
|
|
|
|
dev[0].set_network(id, "ht40", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="5180")
|
2022-02-15 11:45:09 +01:00
|
|
|
log_channel_info(dev[1])
|
2017-03-07 17:20:58 +01:00
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
if "FREQUENCY=5180" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig))
|
|
|
|
if "WIDTH=80 MHz" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
|
|
finally:
|
|
|
|
set_country("00")
|
|
|
|
dev[0].set("country", "00")
|
|
|
|
dev[1].flush_scan_cache()
|
2017-03-11 10:20:17 +01:00
|
|
|
|
2022-02-15 11:45:09 +01:00
|
|
|
def test_wpas_ap_open_vht80_us(dev):
|
2023-10-27 12:49:48 +02:00
|
|
|
"""wpa_supplicant AP mode - VHT 80 MHz (US) channel 149"""
|
|
|
|
run_wpas_ap_open_vht80_us(dev, 5745, 5775, 1)
|
|
|
|
|
|
|
|
def test_wpas_ap_open_vht80_us_153(dev):
|
|
|
|
"""wpa_supplicant AP mode - VHT 80 MHz (US) channel 153"""
|
|
|
|
run_wpas_ap_open_vht80_us(dev, 5765, 5775, -1)
|
|
|
|
|
|
|
|
def test_wpas_ap_open_vht80_us_157(dev):
|
|
|
|
"""wpa_supplicant AP mode - VHT 80 MHz (US) channel 157"""
|
|
|
|
run_wpas_ap_open_vht80_us(dev, 5785, 5775, 1)
|
|
|
|
|
|
|
|
def test_wpas_ap_open_vht80_us_161(dev):
|
|
|
|
"""wpa_supplicant AP mode - VHT 80 MHz (US) channel 161"""
|
|
|
|
run_wpas_ap_open_vht80_us(dev, 5805, 5775, -1)
|
|
|
|
|
|
|
|
def run_wpas_ap_open_vht80_us(dev, freq, center_freq, ht40):
|
2022-02-15 11:45:09 +01:00
|
|
|
id = dev[0].add_network()
|
2023-12-09 16:11:45 +01:00
|
|
|
set_regdom(dev[0], "US")
|
2022-02-15 11:45:09 +01:00
|
|
|
try:
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
2023-10-27 12:49:48 +02:00
|
|
|
dev[0].set_network(id, "frequency", str(freq))
|
|
|
|
dev[0].set_network(id, "scan_freq", str(freq))
|
2022-02-15 11:45:09 +01:00
|
|
|
dev[0].set_network(id, "vht", "1")
|
2023-10-27 12:49:48 +02:00
|
|
|
dev[0].set_network(id, "vht_center_freq1", str(center_freq))
|
2022-02-15 11:45:09 +01:00
|
|
|
dev[0].set_network(id, "max_oper_chwidth", "1")
|
2023-10-27 12:49:48 +02:00
|
|
|
dev[0].set_network(id, "ht40", str(ht40))
|
2022-02-15 11:45:09 +01:00
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
2023-10-27 12:49:48 +02:00
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq=str(freq))
|
2022-02-15 11:45:09 +01:00
|
|
|
log_channel_info(dev[1])
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
2023-10-27 12:49:48 +02:00
|
|
|
if "FREQUENCY=" + str(freq) not in sig:
|
2022-02-15 11:45:09 +01:00
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig))
|
|
|
|
if "WIDTH=80 MHz" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
|
|
finally:
|
|
|
|
set_country("00")
|
|
|
|
dev[0].set("country", "00")
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
|
2017-03-11 10:20:17 +01:00
|
|
|
def test_wpas_ap_no_ht(dev):
|
|
|
|
"""wpa_supplicant AP mode - HT disabled"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "ht", "0")
|
|
|
|
dev[0].set_network(id, "wps_disabled", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "wps_disabled", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
sig2 = dev[1].request("SIGNAL_POLL").splitlines()
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
|
|
|
|
if "WIDTH=20 MHz (no HT)" not in sig:
|
|
|
|
raise Exception("HT was not disabled: " + str(sig))
|
|
|
|
if "WIDTH=20 MHz" not in sig2:
|
|
|
|
raise Exception("HT was not enabled: " + str(sig2))
|
2017-08-21 18:42:20 +02:00
|
|
|
|
|
|
|
def test_wpas_ap_async_fail(dev):
|
|
|
|
"""wpa_supplicant AP mode - Async failure"""
|
|
|
|
id = dev[0].add_network()
|
2023-12-09 16:11:45 +01:00
|
|
|
set_regdom(dev[0], "FI")
|
2017-08-21 18:42:20 +02:00
|
|
|
try:
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "5180")
|
|
|
|
dev[0].set_network(id, "scan_freq", "5180")
|
|
|
|
dev[0].set_network(id, "vht", "1")
|
|
|
|
dev[0].set_network(id, "vht_center_freq1", "5210")
|
|
|
|
dev[0].set_network(id, "max_oper_chwidth", "1")
|
|
|
|
dev[0].set_network(id, "ht40", "1")
|
|
|
|
|
|
|
|
with alloc_fail(dev[0], 1,
|
|
|
|
"nl80211_get_scan_results;ieee80211n_check_scan"):
|
|
|
|
dev[0].select_network(id)
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
finally:
|
2022-03-13 17:26:08 +01:00
|
|
|
dev[0].set("country", "00")
|
2019-05-30 10:05:55 +02:00
|
|
|
clear_regdom_dev(dev)
|
2019-09-19 20:27:40 +02:00
|
|
|
|
|
|
|
def test_wpas_ap_sae(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using psk"""
|
|
|
|
run_wpas_ap_sae(dev, False)
|
|
|
|
|
2022-10-10 11:34:04 +02:00
|
|
|
def test_wpas_ap_sae_pmf1(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using psk and pmf=1"""
|
|
|
|
try:
|
|
|
|
dev[0].set("pmf", "1")
|
|
|
|
run_wpas_ap_sae(dev, False, pmf=2)
|
|
|
|
finally:
|
|
|
|
dev[0].set("pmf", "0")
|
|
|
|
|
|
|
|
def test_wpas_ap_sae_pmf2(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using psk and pmf=2"""
|
|
|
|
try:
|
|
|
|
dev[0].set("pmf", "2")
|
|
|
|
run_wpas_ap_sae(dev, False, pmf=1)
|
|
|
|
finally:
|
|
|
|
dev[0].set("pmf", "0")
|
|
|
|
|
2019-09-19 20:27:40 +02:00
|
|
|
def test_wpas_ap_sae_password(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using sae_password"""
|
|
|
|
run_wpas_ap_sae(dev, True)
|
|
|
|
|
2019-09-05 11:34:48 +02:00
|
|
|
def test_wpas_ap_sae_pwe_1(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using sae_password and sae_pwe=1"""
|
|
|
|
try:
|
|
|
|
dev[0].set("sae_pwe", "1")
|
|
|
|
dev[1].set("sae_pwe", "1")
|
|
|
|
run_wpas_ap_sae(dev, True, sae_password_id=True)
|
|
|
|
finally:
|
|
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
dev[1].set("sae_pwe", "0")
|
|
|
|
|
2022-10-10 11:34:04 +02:00
|
|
|
def run_wpas_ap_sae(dev, sae_password, sae_password_id=False, pmf=0):
|
2022-02-01 17:16:35 +01:00
|
|
|
check_sae_capab(dev[0])
|
|
|
|
check_sae_capab(dev[1])
|
2019-09-19 20:27:40 +02:00
|
|
|
dev[0].request("SET sae_groups ")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-sae")
|
|
|
|
dev[0].set_network(id, "proto", "WPA2")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "SAE")
|
|
|
|
dev[0].set_network(id, "pairwise", "CCMP")
|
|
|
|
dev[0].set_network(id, "group", "CCMP")
|
|
|
|
if sae_password:
|
|
|
|
dev[0].set_network_quoted(id, "sae_password", "12345678")
|
|
|
|
else:
|
|
|
|
dev[0].set_network_quoted(id, "psk", "12345678")
|
2019-09-05 11:34:48 +02:00
|
|
|
if sae_password_id:
|
|
|
|
pw_id = "pw id"
|
|
|
|
dev[0].set_network_quoted(id, "sae_password_id", pw_id)
|
|
|
|
else:
|
|
|
|
pw_id = None
|
2019-09-19 20:27:40 +02:00
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "wps_disabled", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].request("SET sae_groups ")
|
2019-09-05 11:34:48 +02:00
|
|
|
dev[1].connect("wpas-ap-sae", key_mgmt="SAE", sae_password="12345678",
|
2022-10-10 11:34:04 +02:00
|
|
|
sae_password_id=pw_id, scan_freq="2412", ieee80211w=str(pmf))
|
2020-03-15 20:22:18 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_scan(dev, apdev):
|
|
|
|
"""wpa_supplicant AP mode and scanning"""
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
|
|
|
|
hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
if "OK" not in dev[0].request("SCAN freq=2412"):
|
|
|
|
raise Exception("SCAN command not accepted")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS",
|
|
|
|
"CTRL-EVENT-SCAN-FAILED"], 15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan result timed out")
|
|
|
|
if "CTRL-EVENT-SCAN-FAILED ret=-95" in ev:
|
|
|
|
# Scanning in AP mode not supported
|
|
|
|
return
|
|
|
|
if "CTRL-EVENT-SCAN-FAILED" in ev:
|
|
|
|
raise Exception("Unexpected scan failure reason: " + ev)
|
|
|
|
if "CTRL-EVENT-SCAN-RESULTS" in ev:
|
|
|
|
bss = dev[0].get_bss(bssid)
|
|
|
|
if not bss:
|
|
|
|
raise Exception("AP not found in scan")
|
2020-03-25 23:11:35 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_sae(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE using psk"""
|
|
|
|
run_wpas_ap_sae(dev, False)
|
|
|
|
|
|
|
|
def test_wpas_ap_sae_and_psk_transition_disable(dev):
|
|
|
|
"""wpa_supplicant AP mode - SAE+PSK transition disable indication"""
|
2022-02-01 17:16:35 +01:00
|
|
|
check_sae_capab(dev[0])
|
|
|
|
check_sae_capab(dev[1])
|
2020-03-25 23:11:35 +01:00
|
|
|
dev[0].set("sae_groups", "")
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-sae")
|
|
|
|
dev[0].set_network(id, "proto", "WPA2")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "SAE")
|
|
|
|
dev[0].set_network(id, "transition_disable", "1")
|
|
|
|
dev[0].set_network(id, "ieee80211w", "1")
|
|
|
|
dev[0].set_network(id, "pairwise", "CCMP")
|
|
|
|
dev[0].set_network(id, "group", "CCMP")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "12345678")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "wps_disabled", "1")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
dev[1].set("sae_groups", "")
|
|
|
|
dev[1].connect("wpas-ap-sae", key_mgmt="SAE WPA-PSK",
|
|
|
|
psk="12345678", ieee80211w="1",
|
2023-11-02 14:57:39 +01:00
|
|
|
scan_freq="2412", wait_connect=False)
|
|
|
|
ev = dev[1].wait_event(["TRANSITION-DISABLE"], timeout=15)
|
2020-03-25 23:11:35 +01:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Transition disable not indicated")
|
|
|
|
if ev.split(' ')[1] != "01":
|
|
|
|
raise Exception("Unexpected transition disable bitmap: " + ev)
|
|
|
|
|
|
|
|
val = dev[1].get_network(id, "ieee80211w")
|
|
|
|
if val != "2":
|
|
|
|
raise Exception("Unexpected ieee80211w value: " + val)
|
|
|
|
val = dev[1].get_network(id, "key_mgmt")
|
|
|
|
if val != "SAE":
|
|
|
|
raise Exception("Unexpected key_mgmt value: " + val)
|
|
|
|
val = dev[1].get_network(id, "group")
|
|
|
|
if val != "CCMP":
|
|
|
|
raise Exception("Unexpected group value: " + val)
|
|
|
|
val = dev[1].get_network(id, "proto")
|
|
|
|
if val != "RSN":
|
|
|
|
raise Exception("Unexpected proto value: " + val)
|
|
|
|
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
dev[1].request("RECONNECT")
|
|
|
|
dev[1].wait_connected()
|
2021-09-30 17:20:49 +02:00
|
|
|
|
|
|
|
def test_wpas_ap_vendor_elems(dev):
|
|
|
|
"""wpa_supplicant AP mode - vendor elements"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
2022-10-04 23:21:12 +02:00
|
|
|
try:
|
|
|
|
beacon_elems = "dd0411223301"
|
|
|
|
dev[0].set("ap_vendor_elements", beacon_elems)
|
|
|
|
dev[0].set("ap_assocresp_elements", "dd0411223302")
|
|
|
|
if "OK" not in dev[0].request("UPDATE_BEACON"):
|
|
|
|
raise Exception("UPDATE_BEACON failed")
|
2021-09-30 17:20:49 +02:00
|
|
|
|
2022-10-04 23:21:12 +02:00
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
bss = dev[1].get_bss(dev[0].own_addr())
|
|
|
|
if beacon_elems not in bss['ie']:
|
|
|
|
raise Exception("Vendor element not visible in scan results")
|
|
|
|
finally:
|
|
|
|
dev[0].set("ap_vendor_elements", "")
|
|
|
|
dev[0].set("ap_assocresp_elements", "")
|
2022-02-26 00:15:16 +01:00
|
|
|
|
|
|
|
def test_wpas_ap_lifetime_in_memory(dev, apdev, params):
|
|
|
|
"""wpa_supplicant AP mode and PSK/PTK lifetime in memory"""
|
|
|
|
run_wpas_ap_lifetime_in_memory(dev, apdev, params, False)
|
|
|
|
|
|
|
|
def test_wpas_ap_lifetime_in_memory2(dev, apdev, params):
|
|
|
|
"""wpa_supplicant AP mode and PSK/PTK lifetime in memory (raw PSK)"""
|
|
|
|
run_wpas_ap_lifetime_in_memory(dev, apdev, params, True)
|
|
|
|
|
|
|
|
def run_wpas_ap_lifetime_in_memory(dev, apdev, params, raw):
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
|
|
pmk = binascii.unhexlify(psk)
|
|
|
|
|
|
|
|
pid = find_wpas_process(dev[0])
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", ssid)
|
|
|
|
dev[0].set_network(id, "proto", "WPA2")
|
|
|
|
dev[0].set_network(id, "pairwise", "CCMP")
|
|
|
|
dev[0].set_network(id, "group", "CCMP")
|
|
|
|
if raw:
|
|
|
|
dev[0].set_network(id, "psk", psk)
|
|
|
|
else:
|
|
|
|
dev[0].set_network_quoted(id, "psk", passphrase)
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
|
|
|
|
logger.info("Checking keys in memory after network profile configuration")
|
|
|
|
buf = read_process_memory(pid, pmk)
|
|
|
|
get_key_locations(buf, pmk, "PMK")
|
|
|
|
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
logger.info("Checking keys in memory after AP start")
|
|
|
|
buf = read_process_memory(pid, pmk)
|
|
|
|
get_key_locations(buf, pmk, "PMK")
|
|
|
|
|
|
|
|
dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
|
|
|
|
buf = read_process_memory(pid, pmk)
|
|
|
|
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
|
|
|
|
buf2 = read_process_memory(pid, pmk)
|
|
|
|
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
|
|
|
|
buf3 = read_process_memory(pid, pmk)
|
|
|
|
|
|
|
|
dev[1].relog()
|
|
|
|
ptk = None
|
|
|
|
gtk = None
|
|
|
|
with open(os.path.join(params['logdir'], 'log1'), 'r') as f:
|
|
|
|
for l in f.readlines():
|
|
|
|
if "WPA: PTK - hexdump" in l:
|
|
|
|
val = l.strip().split(':')[3].replace(' ', '')
|
|
|
|
ptk = binascii.unhexlify(val)
|
|
|
|
if "WPA: Group Key - hexdump" in l:
|
|
|
|
val = l.strip().split(':')[3].replace(' ', '')
|
|
|
|
gtk = binascii.unhexlify(val)
|
|
|
|
if not pmk or not ptk or not gtk:
|
|
|
|
raise Exception("Could not find keys from debug log")
|
|
|
|
if len(gtk) != 16:
|
|
|
|
raise Exception("Unexpected GTK length")
|
|
|
|
|
|
|
|
kck = ptk[0:16]
|
|
|
|
kek = ptk[16:32]
|
|
|
|
tk = ptk[32:48]
|
|
|
|
|
|
|
|
logger.info("Checking keys in memory while associated")
|
|
|
|
get_key_locations(buf, pmk, "PMK")
|
|
|
|
if pmk not in buf:
|
|
|
|
raise HwsimSkip("PMK not found while associated")
|
|
|
|
if kck not in buf:
|
|
|
|
raise Exception("KCK not found while associated")
|
|
|
|
if kek not in buf:
|
|
|
|
raise Exception("KEK not found while associated")
|
|
|
|
#if tk in buf:
|
|
|
|
# raise Exception("TK found from memory")
|
|
|
|
|
|
|
|
logger.info("Checking keys in memory after disassociation")
|
|
|
|
get_key_locations(buf2, pmk, "PMK")
|
|
|
|
|
|
|
|
# Note: PMK/PSK is still present in network configuration and GTK is still
|
|
|
|
# in use.
|
|
|
|
|
|
|
|
fname = params['prefix'] + '.memctx-'
|
|
|
|
verify_not_present(buf2, kck, fname, "KCK")
|
|
|
|
verify_not_present(buf2, kek, fname, "KEK")
|
|
|
|
verify_not_present(buf2, tk, fname, "TK")
|
|
|
|
get_key_locations(buf2, gtk, "GTK")
|
|
|
|
|
|
|
|
logger.info("Checking keys in memory after network profile removal")
|
|
|
|
get_key_locations(buf3, pmk, "PMK")
|
|
|
|
|
|
|
|
verify_not_present(buf3, pmk, fname, "PMK")
|
|
|
|
verify_not_present(buf3, kck, fname, "KCK")
|
|
|
|
verify_not_present(buf3, kek, fname, "KEK")
|
|
|
|
verify_not_present(buf3, tk, fname, "TK")
|
|
|
|
get_key_locations(buf3, gtk, "GTK")
|
|
|
|
verify_not_present(buf3, gtk, fname, "GTK")
|
2022-03-24 22:22:42 +01:00
|
|
|
|
|
|
|
def check_acl(dev, num_accept, num_deny):
|
|
|
|
accept = dev.request("ACCEPT_ACL SHOW").splitlines()
|
|
|
|
logger.info("accept entries: " + str(accept))
|
|
|
|
if len(accept) != num_accept:
|
|
|
|
raise Exception("Unexpected number of accept entries")
|
|
|
|
deny = dev.request("DENY_ACL SHOW").splitlines()
|
|
|
|
logger.info("deny entries: " + str(deny))
|
|
|
|
if len(deny) != num_deny:
|
|
|
|
raise Exception("Unexpected number of deny entries")
|
|
|
|
|
|
|
|
def test_wpas_ap_acl_mgmt(dev):
|
|
|
|
"""wpa_supplicant AP mode - ACL management"""
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network(id, "mode", "2")
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "frequency", "2412")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].select_network(id)
|
|
|
|
wait_ap_ready(dev[0])
|
|
|
|
|
|
|
|
addr1 = dev[1].own_addr()
|
|
|
|
addr2 = dev[2].own_addr()
|
|
|
|
|
|
|
|
check_acl(dev[0], 0, 0)
|
|
|
|
if "OK" not in dev[0].request("ACCEPT_ACL ADD_MAC " + addr1):
|
|
|
|
raise Exception("ACCEPT_ACL ADD_MAC failed")
|
|
|
|
check_acl(dev[0], 1, 0)
|
|
|
|
|
|
|
|
dev[2].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
dev[1].connect("wpas-ap-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
ev = dev[2].wait_event(["CTRL-EVENT-CONNECTED"], timeout=2)
|
|
|
|
if ev:
|
|
|
|
raise Exception("Unexpected connection")
|
|
|
|
dev[2].request("DISCONNECT")
|
|
|
|
|
|
|
|
if "OK" not in dev[0].request("DENY_ACL ADD_MAC " + addr1):
|
|
|
|
raise Exception("DENY_ACL ADD_MAC failed")
|
|
|
|
dev[1].wait_disconnected()
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
|
|
|
|
check_acl(dev[0], 1, 1)
|
|
|
|
if "OK" not in dev[0].request("ACCEPT_ACL CLEAR"):
|
|
|
|
raise Exception("Failed to clear accept ACL")
|
|
|
|
check_acl(dev[0], 0, 1)
|
|
|
|
if "OK" not in dev[0].request("DENY_ACL CLEAR"):
|
|
|
|
raise Exception("Failed to clear deny ACL")
|
|
|
|
check_acl(dev[0], 0, 0)
|