# cfg80211 connect command (SME in the driver/firmware) # Copyright (c) 2013, Jouni Malinen # # This software may be distributed under the terms of the BSD license. # See README for more details. import logging logger = logging.getLogger() import time import hwsim_utils import hostapd from wpasupplicant import WpaSupplicant from p2p_utils import * from utils import * def test_connect_cmd_open(dev, apdev): """Open connection using cfg80211 connect command""" params = {"ssid": "sta-connect", "manage_p2p": "1", "allow_cross_connection": "1"} hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", bg_scan_period="1") wpas.dump_monitor() wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_wep(dev, apdev): """WEP Open System using cfg80211 connect command""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") check_wep_capa(wpas) params = {"ssid": "sta-connect-wep", "wep_key0": '"hello"'} hapd = hostapd.add_ap(apdev[0], params) wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412", wep_key0='"hello"') wpas.dump_monitor() hwsim_utils.test_connectivity(wpas, hapd) wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_wep_shared(dev, apdev): """WEP Shared key using cfg80211 connect command""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") check_wep_capa(wpas) params = {"ssid": "sta-connect-wep", "wep_key0": '"hello"', "auth_algs": "2"} hapd = hostapd.add_ap(apdev[0], params) id = wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412", auth_alg="SHARED", wep_key0='"hello"') wpas.dump_monitor() hwsim_utils.test_connectivity(wpas, hapd) wpas.request("DISCONNECT") wpas.remove_network(id) wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412", auth_alg="OPEN SHARED", wep_key0='"hello"') wpas.dump_monitor() hwsim_utils.test_connectivity(wpas, hapd) wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_p2p_management(dev, apdev): """Open connection using cfg80211 connect command and AP using P2P management""" params = {"ssid": "sta-connect", "manage_p2p": "1", "allow_cross_connection": "0"} hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412") wpas.dump_monitor() wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_wpa2_psk(dev, apdev): """WPA2-PSK connection using cfg80211 connect command""" params = hostapd.wpa2_params(ssid="sta-connect", passphrase="12345678") hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", psk="12345678", scan_freq="2412") wpas.dump_monitor() wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_concurrent_grpform_while_connecting(dev, apdev): """Concurrent P2P group formation while connecting to an AP using cfg80211 connect command""" logger.info("Start connection to an infrastructure AP") hapd = hostapd.add_ap(apdev[0], {"ssid": "test-open"}) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("test-open", key_mgmt="NONE", wait_connect=False) wpas.dump_monitor() logger.info("Form a P2P group while connecting to an AP") wpas.request("SET p2p_no_group_iface 0") [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_freq=2412, r_dev=wpas, r_freq=2412) check_grpform_results(i_res, r_res) remove_group(dev[0], wpas) wpas.dump_monitor() logger.info("Confirm AP connection after P2P group removal") hapd.wait_sta() hwsim_utils.test_connectivity(wpas, hapd) wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_reject_assoc(dev, apdev): """Connection using cfg80211 connect command getting rejected""" params = {"ssid": "sta-connect", "require_ht": "1"} hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", disable_ht="1", wait_connect=False) ev = wpas.wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=15) if ev is None: raise Exception("Association rejection timed out") if "status_code=27" not in ev: raise Exception("Unexpected rejection status code") wpas.request("DISCONNECT") wpas.dump_monitor() def test_connect_cmd_disconnect_event(dev, apdev): """Connection using cfg80211 connect command getting disconnected by the AP""" params = {"ssid": "sta-connect"} hapd = hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412") if "OK" not in hapd.request("DEAUTHENTICATE " + wpas.p2p_interface_addr()): raise Exception("DEAUTHENTICATE command failed") ev = wpas.wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5) if ev is None: raise Exception("Disconnection event timed out") # This event was actually based on deauthenticate event since we force # connect command to be used with a driver that supports auth+assoc for # testing purposes. Anyway, wait some time to allow the debug log to capture # the following NL80211_CMD_DISCONNECT event. time.sleep(0.1) wpas.dump_monitor() # Clean up to avoid causing issue for following test cases wpas.request("REMOVE_NETWORK all") wpas.wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=2) wpas.flush_scan_cache() wpas.dump_monitor() wpas.interface_remove("wlan5") del wpas def test_connect_cmd_roam(dev, apdev): """cfg80211 connect command to trigger roam""" params = {"ssid": "sta-connect"} hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412") wpas.dump_monitor() hostapd.add_ap(apdev[1], params) wpas.scan_for_bss(apdev[1]['bssid'], freq=2412, force_scan=True) wpas.roam(apdev[1]['bssid']) time.sleep(0.1) wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_wpa_psk_roam(dev, apdev): """WPA2/WPA-PSK connection using cfg80211 connect command to trigger roam""" params = hostapd.wpa2_params(ssid="sta-connect", passphrase="12345678") hostapd.add_ap(apdev[0], params) wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", psk="12345678", scan_freq="2412") wpas.dump_monitor() params = hostapd.wpa_params(ssid="sta-connect", passphrase="12345678") hostapd.add_ap(apdev[1], params) wpas.scan_for_bss(apdev[1]['bssid'], freq=2412, force_scan=True) wpas.roam(apdev[1]['bssid']) time.sleep(0.1) wpas.request("DISCONNECT") wpas.wait_disconnected() wpas.dump_monitor() def test_connect_cmd_bssid_hint(dev, apdev): """cfg80211 connect command with bssid_hint""" params = {"ssid": "sta-connect"} hostapd.add_ap(apdev[0], params) hostapd.add_ap(apdev[1], params) # This does not really give full coverage with mac80211_hwsim since the # driver does not end up claiming support for driver-based BSS selection. # Anyway, some test coverage can be achieved for setting the parameter and # checking that it does not prevent connection with another BSSID. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", bssid_hint=apdev[0]['bssid']) wpas.request("REMOVE_NETWORK all") wpas.wait_disconnected() wpas.dump_monitor() wpas.request("BSS_FLUSH 0") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", bssid_hint='22:33:44:55:66:77') wpas.request("REMOVE_NETWORK all") wpas.wait_disconnected() wpas.dump_monitor() # Additional coverage using ap_scan=2 to prevent scan entry -based selection # within wpa_supplicant from overriding bssid_hint. try: if "OK" not in wpas.request("AP_SCAN 2"): raise Exception("Failed to set AP_SCAN 2") wpas.request("BSS_FLUSH 0") wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", bssid_hint='22:33:44:55:66:77') wpas.request("REMOVE_NETWORK all") wpas.wait_disconnected() wpas.dump_monitor() finally: wpas.request("AP_SCAN 1") wpas.flush_scan_cache()