2013-07-21 15:01:54 +02:00
|
|
|
# IBSS test cases
|
|
|
|
# Copyright (c) 2013, Jouni Malinen <j@w1.fi>
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2013-07-21 15:01:54 +02:00
|
|
|
import time
|
2013-08-27 02:11:02 +02:00
|
|
|
import re
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
import hwsim_utils
|
|
|
|
|
|
|
|
def connect_ibss_cmd(dev, id):
|
|
|
|
dev.dump_monitor()
|
|
|
|
dev.select_network(id)
|
|
|
|
|
|
|
|
def wait_ibss_connection(dev):
|
2013-08-25 22:10:37 +02:00
|
|
|
logger.info(dev.ifname + " waiting for IBSS start/join to complete")
|
2013-07-21 15:01:54 +02:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection to the IBSS timed out")
|
2013-08-27 02:11:02 +02:00
|
|
|
exp = r'<.>(CTRL-EVENT-CONNECTED) - Connection to ([0-9a-f:]*) completed.*'
|
|
|
|
s = re.split(exp, ev)
|
|
|
|
if len(s) < 3:
|
|
|
|
return None
|
|
|
|
return s[2]
|
2013-08-25 22:10:37 +02:00
|
|
|
|
|
|
|
def wait_4way_handshake(dev1, dev2):
|
|
|
|
logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr())
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
2013-07-21 15:01:54 +02:00
|
|
|
|
2013-08-27 01:00:39 +02:00
|
|
|
def wait_4way_handshake2(dev1, dev2, dev3):
|
|
|
|
logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr() + " and " + dev3.p2p_interface_addr())
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
|
|
|
|
"IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
|
|
|
|
"IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
|
|
|
|
2013-07-21 15:01:54 +02:00
|
|
|
def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None, group=None):
|
|
|
|
id = dev.add_network()
|
|
|
|
dev.set_network(id, "mode", "1")
|
|
|
|
dev.set_network(id, "frequency", "2412")
|
|
|
|
dev.set_network_quoted(id, "ssid", ssid)
|
|
|
|
if psk:
|
|
|
|
dev.set_network_quoted(id, "psk", psk)
|
|
|
|
if proto:
|
|
|
|
dev.set_network(id, "proto", proto)
|
|
|
|
if key_mgmt:
|
|
|
|
dev.set_network(id, "key_mgmt", key_mgmt)
|
|
|
|
if pairwise:
|
|
|
|
dev.set_network(id, "pairwise", pairwise)
|
|
|
|
if group:
|
|
|
|
dev.set_network(id, "group", group)
|
|
|
|
return id
|
|
|
|
|
|
|
|
def add_ibss_rsn(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "RSN", "WPA-PSK", "CCMP", "CCMP")
|
|
|
|
|
2013-12-28 11:22:43 +01:00
|
|
|
def add_ibss_wpa_none(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "WPA", "WPA-NONE", "TKIP", "TKIP")
|
|
|
|
|
2013-07-21 15:01:54 +02:00
|
|
|
def test_ibss_rsn(dev):
|
|
|
|
"""IBSS RSN"""
|
|
|
|
ssid="ibss-rsn"
|
|
|
|
|
|
|
|
logger.info("Start IBSS on the first STA")
|
|
|
|
id = add_ibss_rsn(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
logger.info("Join two STAs to the IBSS")
|
|
|
|
|
|
|
|
id = add_ibss_rsn(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[1].scan()
|
2013-08-25 22:10:37 +02:00
|
|
|
wait_4way_handshake(dev[0], dev[1])
|
|
|
|
wait_4way_handshake(dev[1], dev[0])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
id = add_ibss_rsn(dev[2], ssid)
|
|
|
|
connect_ibss_cmd(dev[2], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
if bssid0 != bssid2:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[2].scan()
|
2013-08-25 22:10:37 +02:00
|
|
|
wait_4way_handshake(dev[0], dev[2])
|
2013-08-27 01:00:39 +02:00
|
|
|
wait_4way_handshake2(dev[2], dev[0], dev[1])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
# Allow some time for all peers to complete key setup
|
|
|
|
time.sleep(3)
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, dev[1].ifname)
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, dev[2].ifname)
|
|
|
|
hwsim_utils.test_connectivity(dev[1].ifname, dev[2].ifname)
|
2013-12-28 11:22:43 +01:00
|
|
|
|
|
|
|
def test_ibss_wpa_none(dev):
|
|
|
|
"""IBSS WPA-None"""
|
|
|
|
ssid="ibss-wpa-none"
|
|
|
|
|
|
|
|
logger.info("Start IBSS on the first STA")
|
|
|
|
id = add_ibss_wpa_none(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
logger.info("Join two STAs to the IBSS")
|
|
|
|
|
|
|
|
id = add_ibss_wpa_none(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
id = add_ibss_wpa_none(dev[2], ssid)
|
|
|
|
connect_ibss_cmd(dev[2], id)
|
|
|
|
|
|
|
|
# This is a bit ugly, but no one really cares about WPA-None, so there may
|
|
|
|
# not be enough justification to clean this up.. For now, wpa_supplicant
|
|
|
|
# will show two connection events with mac80211_hwsim where the first one
|
|
|
|
# comes with all zeros address.
|
|
|
|
if bssid0 == "00:00:00:00:00:00":
|
|
|
|
logger.info("Waiting for real BSSID on the first STA")
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
|
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
if bssid0 != bssid2:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
|
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
|
|
|
|
print bssid0
|
|
|
|
print bssid1
|
|
|
|
print bssid2
|
|
|
|
|
|
|
|
# Allow some time for all peers to complete key setup
|
|
|
|
time.sleep(1)
|
|
|
|
|
|
|
|
# This is supposed to work, but looks like WPA-None does not work with
|
|
|
|
# mac80211 currently..
|
|
|
|
try:
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, dev[1].ifname)
|
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
|
|
|
try:
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, dev[2].ifname)
|
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
|
|
|
try:
|
|
|
|
hwsim_utils.test_connectivity(dev[1].ifname, dev[2].ifname)
|
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|