2014-01-31 15:59:41 +01:00
|
|
|
# Test various AP mode parameters
|
|
|
|
# Copyright (c) 2014, Qualcomm Atheros, Inc.
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
2014-03-10 09:49:49 +01:00
|
|
|
import subprocess
|
2014-01-31 15:59:41 +01:00
|
|
|
|
|
|
|
import hwsim_utils
|
|
|
|
import hostapd
|
|
|
|
|
|
|
|
def test_ap_fragmentation_rts_set_high(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with fragmentation and RTS thresholds larger than frame length"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['rts_threshold'] = "1000"
|
|
|
|
params['fragm_threshold'] = "2000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
|
|
|
|
|
|
|
|
def test_ap_fragmentation_open(dev, apdev):
|
|
|
|
"""Open AP with fragmentation threshold"""
|
|
|
|
ssid = "fragmentation"
|
|
|
|
params = {}
|
|
|
|
params['ssid'] = ssid
|
|
|
|
params['fragm_threshold'] = "1000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
|
|
|
|
|
|
|
|
def test_ap_fragmentation_wpa2(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with fragmentation threshold"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['fragm_threshold'] = "1000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
2014-02-24 16:15:16 +01:00
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
|
2014-03-10 09:42:41 +01:00
|
|
|
|
|
|
|
def test_ap_vendor_elements(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with vendor elements added"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['vendor_elements'] = "dd0411223301"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
bss = dev[0].get_bss(bssid)
|
|
|
|
if "dd0411223301" not in bss['ie']:
|
|
|
|
raise Exception("Vendor element not shown in scan results")
|
2014-03-10 09:49:49 +01:00
|
|
|
|
|
|
|
def test_ap_country(dev, apdev):
|
|
|
|
"""WPA2-PSK AP setting country code and using 5 GHz band"""
|
|
|
|
try:
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['country_code'] = 'FI'
|
|
|
|
params['ieee80211d'] = '1'
|
|
|
|
params['hw_mode'] = 'a'
|
|
|
|
params['channel'] = '36'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="5180")
|
|
|
|
hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
|
|
|
|
finally:
|
|
|
|
subprocess.call(['sudo', 'iw', 'reg', 'set', '00'])
|