12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925 |
- # Radio measurement
- # Copyright(c) 2013 - 2016 Intel Mobile Communications GmbH.
- # Copyright(c) 2011 - 2016 Intel Corporation. All rights reserved.
- # Copyright (c) 2017, Jouni Malinen <j@w1.fi>
- #
- # This software may be distributed under the terms of the BSD license.
- # See README for more details.
- import binascii
- import re
- import logging
- logger = logging.getLogger()
- import struct
- import subprocess
- import time
- import hostapd
- from wpasupplicant import WpaSupplicant
- from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger
- from test_ap_ht import clear_scan_cache
- from remotehost import remote_compatible
- def check_rrm_support(dev):
- rrm = int(dev.get_driver_status_field("capa.rrm_flags"), 16)
- if rrm & 0x5 != 0x5 and rrm & 0x10 != 0x10:
- raise HwsimSkip("Required RRM capabilities are not supported")
- def check_tx_power_support(dev):
- rrm = int(dev.get_driver_status_field("capa.rrm_flags"), 16)
- if rrm & 0x8 != 0x8:
- raise HwsimSkip("Required RRM capabilities are not supported")
- nr="00112233445500000000510107"
- lci="01000800101298c0b512926666f6c2f1001c00004104050000c00012"
- civic="01000b0011223344556677889900998877665544332211aabbccddeeff"
- def check_nr_results(dev, bssids=None, lci=False, civic=False):
- if bssids is None:
- ev = dev.wait_event(["RRM-NEIGHBOR-REP-REQUEST-FAILED" ], timeout=10)
- if ev is None:
- raise Exception("RRM neighbor report failure not received")
- return
- received = []
- for bssid in bssids:
- ev = dev.wait_event(["RRM-NEIGHBOR-REP-RECEIVED"], timeout=10)
- if ev is None:
- raise Exception("RRM report result not indicated")
- received.append(ev)
- for bssid in bssids:
- found = False
- for r in received:
- if "RRM-NEIGHBOR-REP-RECEIVED bssid=" + bssid in r:
- if lci and "lci=" not in r:
- raise Exception("LCI data not reported for %s" % bssid)
- if civic and "civic=" not in r:
- raise Exception("civic data not reported for %s" % bssid)
- received.remove(r)
- found = True
- break
- if not found:
- raise Exception("RRM report result for %s not indicated" % bssid)
- def test_rrm_neighbor_db(dev, apdev):
- """hostapd ctrl_iface SET_NEIGHBOR"""
- params = { "ssid": "test", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- # Bad BSSID
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:gg ssid=\"test1\" nr=" + nr):
- raise Exception("Set neighbor succeeded unexpectedly")
- # Bad SSID
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=test1 nr=" + nr):
- raise Exception("Set neighbor succeeded unexpectedly")
- # No SSID
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 nr=" + nr):
- raise Exception("Set neighbor succeeded unexpectedly")
- # No NR
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
- raise Exception("Set neighbor succeeded unexpectedly")
- # Odd length of NR
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr[:-1]):
- raise Exception("Set neighbor succeeded unexpectedly")
- # Invalid lci
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=1"):
- raise Exception("Set neighbor succeeded unexpectedly")
- # Invalid civic
- if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " civic=1"):
- raise Exception("Set neighbor succeeded unexpectedly")
- # No entry yet in database
- if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
- raise Exception("Remove neighbor succeeded unexpectedly")
- # Add a neighbor entry
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- # Another BSSID with the same SSID
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- # Fewer parameters
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr):
- raise Exception("Set neighbor failed")
- # SSID in hex format
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=7465737431 nr=" + nr):
- raise Exception("Set neighbor failed")
- # With more parameters
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " civic=" + civic):
- raise Exception("Set neighbor failed")
- # With all parameters
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- # Another SSID on the same BSSID
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test2\" nr=" + nr + " lci=" + lci):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
- raise Exception("Remove neighbor failed")
- if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:56 ssid=\"test1\""):
- raise Exception("Remove neighbor failed")
- if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test2\""):
- raise Exception("Remove neighbor failed")
- # Double remove
- if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
- raise Exception("Remove neighbor succeeded unexpectedly")
- # Stationary AP
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\" nr=" + nr + " lci=" + lci + " civic=" + civic + " stat"):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\""):
- raise Exception("Remove neighbor failed")
- # Invalid remove - bad BSSID
- if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:5 ssid=\"test1\""):
- raise Exception("Remove neighbor succeeded unexpectedly")
- # Invalid remove - bad SSID
- if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1"):
- raise Exception("Remove neighbor succeeded unexpectedly")
- # Invalid remove - missing SSID
- if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55"):
- raise Exception("Remove neighbor succeeded unexpectedly")
- def test_rrm_neighbor_rep_req(dev, apdev):
- """wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST"""
- check_rrm_support(dev[0])
- nr1="00112233445500000000510107"
- nr2="00112233445600000000510107"
- nr3="dd112233445500000000510107"
- params = { "ssid": "test" }
- hostapd.add_ap(apdev[0]['ifname'], params)
- params = { "ssid": "test2", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[1]['ifname'], params)
- bssid1 = apdev[1]['bssid']
- dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request succeeded unexpectedly (AP without RRM)")
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"abcdef\""):
- raise Exception("Request succeeded unexpectedly (AP without RRM 2)")
- dev[0].request("DISCONNECT")
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- check_nr_results(dev[0], [bssid1])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST lci"):
- raise Exception("Request failed")
- check_nr_results(dev[0], [bssid1])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST lci civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], [bssid1])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\""):
- raise Exception("Request failed")
- check_nr_results(dev[0])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0])
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\" nr=" + nr1 + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test3\" nr=" + nr2 + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test4\" nr=" + nr2 + " lci=" + lci + " civic=" + civic):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("SET_NEIGHBOR dd:11:22:33:44:55 ssid=\"test5\" nr=" + nr3 + " lci=" + lci):
- raise Exception("Set neighbor failed")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\""):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
- lci=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
- civic=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
- lci=True, civic=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\""):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:56"])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" lci"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:56"], lci=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:56"], civic=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" lci civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["00:11:22:33:44:56"], lci=True, civic=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\""):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["dd:11:22:33:44:55"])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" lci"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["dd:11:22:33:44:55"], lci=True)
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["dd:11:22:33:44:55"])
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" lci civic"):
- raise Exception("Request failed")
- check_nr_results(dev[0], ["dd:11:22:33:44:55"], lci=True)
- def test_rrm_neighbor_rep_oom(dev, apdev):
- """hostapd neighbor report OOM"""
- check_rrm_support(dev[0])
- nr1="00112233445500000000510107"
- nr2="00112233445600000000510107"
- nr3="dd112233445500000000510107"
- params = { "ssid": "test", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
- with alloc_fail(hapd, 1, "hostapd_send_nei_report_resp"):
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- ev = dev[0].wait_event(["RRM-NEIGHBOR-REP-REQUEST-FAILED"], timeout=5)
- if ev is None:
- raise Exception("Neighbor report failure not reported")
- def test_rrm_lci_req(dev, apdev):
- """hostapd lci request"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- # station not specified
- if "FAIL" not in hapd.request("REQ_LCI "):
- raise Exception("REQ_LCI with no station succeeded unexpectedly")
- # station that is not connected specified
- if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI succeeded unexpectedly (station not connected)")
- dev[0].request("SET LCI ")
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- # station connected without LCI
- if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI succeeded unexpectedly (station without lci)")
- dev[0].request("DISCONNECT")
- dev[0].wait_disconnected(timeout=2)
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- # station connected with LCI
- if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI failed unexpectedly")
- def test_rrm_lci_req_timeout(dev, apdev):
- """hostapd lci request timeout"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hapd.set("ext_mgmt_frame_handling", "1")
- if "OK" not in hapd.request("REQ_LCI " + addr):
- raise Exception("REQ_LCI failed unexpectedly")
- ev = hapd.wait_event(["MGMT-RX"], timeout=5)
- if ev is None:
- raise Exception("No response seen at the AP")
- # Ignore response and wait for HOSTAPD_RRM_REQUEST_TIMEOUT
- time.sleep(5.1)
- # Process response after timeout
- if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % ev.split(' ')[1]):
- raise Exception("MGMT_RX_PROCESS failed")
- for i in range(257):
- if "OK" not in hapd.request("REQ_LCI " + addr):
- raise Exception("REQ_LCI failed unexpectedly")
- dev[0].dump_monitor()
- hapd.dump_monitor()
- hapd.set("ext_mgmt_frame_handling", "0")
- dev[0].request("DISCONNECT")
- dev[0].wait_disconnected()
- def test_rrm_lci_req_oom(dev, apdev):
- """LCI report generation OOM"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_build_lci_report"):
- if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI failed unexpectedly")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- dev[0].request("SET LCI ")
- # This in in wpas_rrm_build_lci_report(), but backtrace may not always work
- # for the "reject" label there.
- with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_handle_msr_req_element"):
- if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI failed unexpectedly")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- def test_rrm_lci_req_ap_oom(dev, apdev):
- """LCI report generation AP OOM and failure"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_lci_req"):
- if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI succeeded during OOM")
- with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_lci_req"):
- if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI succeeded during failure testing")
- def test_rrm_lci_req_get_reltime_failure(dev, apdev):
- """LCI report generation and os_get_reltime() failure"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- with fail_test(dev[0], 1, "os_get_reltime;wpas_rrm_build_lci_report"):
- if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
- raise Exception("REQ_LCI failed unexpectedly")
- wait_fail_trigger(dev[0], "GET_FAIL")
- def test_rrm_neighbor_rep_req_from_conf(dev, apdev):
- """wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST and hostapd config"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_neighbor_report": "1",
- "stationary_ap": "1", "lci": lci, "civic": civic }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = apdev[0]['bssid']
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- check_nr_results(dev[0], [bssid])
- def test_rrm_neighbor_rep_req_timeout(dev, apdev):
- """wpa_supplicant behavior on NEIGHBOR_REP_REQUEST response timeout"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_neighbor_report": "1",
- "stationary_ap": "1", "lci": lci, "civic": civic }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- hapd.set("ext_mgmt_frame_handling", "1")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- msg = hapd.mgmt_rx()
- if msg is None:
- raise Exception("Neighbor report request not seen")
- check_nr_results(dev[0])
- def test_rrm_neighbor_rep_req_oom(dev, apdev):
- """wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST OOM"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_neighbor_report": "1",
- "stationary_ap": "1", "lci": lci, "civic": civic }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- with alloc_fail(dev[0], 1, "wpabuf_alloc;wpas_rrm_process_neighbor_rep"):
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- with fail_test(dev[0], 1,
- "wpa_driver_nl80211_send_action;wpas_rrm_send_neighbor_rep_request"):
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request succeeded unexpectedly")
- with alloc_fail(dev[0], 1,
- "wpabuf_alloc;wpas_rrm_send_neighbor_rep_request"):
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request succeeded unexpectedly")
- def test_rrm_neighbor_rep_req_disconnect(dev, apdev):
- """wpa_supplicant behavior on disconnection during NEIGHBOR_REP_REQUEST"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_neighbor_report": "1",
- "stationary_ap": "1", "lci": lci, "civic": civic }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request accepted while disconnected")
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- hapd.set("ext_mgmt_frame_handling", "1")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- msg = hapd.mgmt_rx()
- if msg is None:
- raise Exception("Neighbor report request not seen")
- dev[0].request("DISCONNECT")
- check_nr_results(dev[0])
- def test_rrm_neighbor_rep_req_not_supported(dev, apdev):
- """NEIGHBOR_REP_REQUEST for AP not supporting neighbor report"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request accepted unexpectedly")
- def test_rrm_neighbor_rep_req_busy(dev, apdev):
- """wpa_supplicant and concurrent NEIGHBOR_REP_REQUEST commands"""
- check_rrm_support(dev[0])
- params = { "ssid": "test2", "rrm_neighbor_report": "1",
- "stationary_ap": "1", "lci": lci, "civic": civic }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
- hapd.set("ext_mgmt_frame_handling", "1")
- if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request failed")
- msg = hapd.mgmt_rx()
- if msg is None:
- raise Exception("Neighbor report request not seen")
- if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
- raise Exception("Request accepted while disconnected")
- def test_rrm_ftm_range_req(dev, apdev):
- """hostapd FTM range request command"""
- check_rrm_support(dev[0])
- try:
- run_rrm_ftm_range_req(dev, apdev)
- finally:
- dev[1].request("VENDOR_ELEM_REMOVE 13 *")
- def run_rrm_ftm_range_req(dev, apdev):
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- # station not specified
- if "FAIL" not in hapd.request("REQ_RANGE "):
- raise Exception("REQ_RANGE with no station succeeded unexpectedly")
- # station that is not connected specified
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr()):
- raise Exception("REQ_RANGE succeeded unexpectedly (station not connected)")
- # No responders specified
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10"):
- raise Exception("REQ_RANGE succeeded unexpectedly (no responder)")
- # Bad responder address
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:"):
- raise Exception("REQ_RANGE succeeded unexpectedly (bad responder address)")
- # Bad responder address
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:55 00:11:22:33:44"):
- raise Exception("REQ_RANGE succeeded unexpectedly (bad responder address 2)")
- # Bad min_ap value
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 300 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (invalid min_ap value)")
- # Bad rand value
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " -1 10 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (invalid rand value)")
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 65536 10 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (invalid rand value)")
- # Missing min_ap value
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10"):
- raise Exception("REQ_RANGE succeeded unexpectedly (missing min_ap value)")
- # Too many responders
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10" + 20*" 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (too many responders)")
- # Wrong min AP count
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- # Override RM capabilities to include FTM range report
- dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
- dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- # Request range: Destination address is not connected
- if "FAIL" not in hapd.request("REQ_RANGE 11:22:33:44:55:66 10 1 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
- # Responder not in database
- # Note: this check would pass since the station does not support FTM range
- # request and not because the responder is not in the database.
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 1 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
- # Missing neighbor report for 00:11:22:33:44:55
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 00:11:22:33:44:55"):
- raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
- # Send request
- if "OK" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
- raise Exception("REQ_RANGE failed unexpectedly")
- # Too long range request
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1" + 16*(" " + bssid)):
- raise Exception("REQ_RANGE accepted for too long range request")
- time.sleep(0.1)
- dev[0].request("DISCONNECT")
- dev[1].request("DISCONNECT")
- dev[1].wait_disconnected()
- def test_rrm_ftm_range_req_timeout(dev, apdev):
- """hostapd FTM range request timeout"""
- check_rrm_support(dev[0])
- try:
- run_rrm_ftm_range_req_timeout(dev, apdev)
- finally:
- dev[1].request("VENDOR_ELEM_REMOVE 13 *")
- def run_rrm_ftm_range_req_timeout(dev, apdev):
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- # Override RM capabilities to include FTM range report
- dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
- dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[1].own_addr()
- hapd.set("ext_mgmt_frame_handling", "1")
- if "OK" not in hapd.request("REQ_RANGE " + addr + " 10 1 " + bssid):
- raise Exception("REQ_RANGE failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=5)
- if ev is None:
- raise Exception("No response seen at the AP")
- # Ignore response and wait for HOSTAPD_RRM_REQUEST_TIMEOUT
- time.sleep(5.1)
- # Process response after timeout
- if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % ev.split(' ')[1]):
- raise Exception("MGMT_RX_PROCESS failed")
- for i in range(257):
- if "OK" not in hapd.request("REQ_RANGE " + addr + " 10 1 " + bssid):
- raise Exception("REQ_RANGE failed")
- dev[1].dump_monitor()
- hapd.dump_monitor()
- hapd.set("ext_mgmt_frame_handling", "0")
- dev[1].request("DISCONNECT")
- dev[1].wait_disconnected()
- def test_rrm_ftm_range_req_failure(dev, apdev):
- """hostapd FTM range request failure"""
- check_rrm_support(dev[0])
- try:
- run_rrm_ftm_range_req_failure(dev, apdev)
- finally:
- dev[1].request("VENDOR_ELEM_REMOVE 13 *")
- def run_rrm_ftm_range_req_failure(dev, apdev):
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- # Override RM capabilities to include FTM range report
- dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
- dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_range_req"):
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
- raise Exception("REQ_RANGE succeeded during OOM")
- with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_range_req"):
- if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
- raise Exception("REQ_RANGE succeeded during failure testing")
- dev[1].request("DISCONNECT")
- dev[1].wait_disconnected()
- def test_rrm_ftm_capa_indication(dev, apdev):
- """FTM capability indication"""
- try:
- _test_rrm_ftm_capa_indication(dev, apdev)
- finally:
- dev[0].request("SET ftm_initiator 0")
- dev[0].request("SET ftm_responder 0")
- def _test_rrm_ftm_capa_indication(dev, apdev):
- params = { "ssid": "ftm",
- "ftm_responder": "1",
- "ftm_initiator": "1", }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- if "OK" not in dev[0].request("SET ftm_initiator 1"):
- raise Exception("could not set ftm_initiator")
- if "OK" not in dev[0].request("SET ftm_responder 1"):
- raise Exception("could not set ftm_responder")
- dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412, force_scan=True)
- class BeaconReport:
- def __init__(self, report):
- self.opclass, self.channel, self.start, self.duration, self.frame_info, self.rcpi, self.rsni = struct.unpack("<BBQHBBB", report[0:15])
- report = report[15:]
- self.bssid = report[0:6]
- self.bssid_str = "%02x:%02x:%02x:%02x:%02x:%02x" % (struct.unpack('6B', self.bssid))
- report = report[6:]
- self.antenna_id, self.parent_tsf = struct.unpack("<BI", report[0:5])
- report = report[5:]
- self.subelems = report
- self.frame_body = None
- while len(report) >= 2:
- eid,elen = struct.unpack('BB', report[0:2])
- report = report[2:]
- if len(report) < elen:
- raise Exception("Invalid subelement in beacon report")
- if eid == 1:
- # Reported Frame Body
- # Contents depends on the reporting detail request:
- # 0 = no Reported Frame Body subelement
- # 1 = all fixed fields and any elements identified in Request
- # element
- # 2 = all fixed fields and all elements
- # Fixed fields: Timestamp[8] BeaconInt[2] CapabInfo[2]
- self.frame_body = report[0:elen]
- report = report[elen:]
- def __str__(self):
- txt = "opclass={} channel={} start={} duration={} frame_info={} rcpi={} rsni={} bssid={} antenna_id={} parent_tsf={}".format(self.opclass, self.channel, self.start, self.duration, self.frame_info, self.rcpi, self.rsni, self.bssid_str, self.antenna_id, self.parent_tsf)
- if self.frame_body:
- txt += " frame_body=" + binascii.hexlify(self.frame_body)
- return txt
- def run_req_beacon(hapd, addr, request):
- token = hapd.request("REQ_BEACON " + addr + " " + request)
- if "FAIL" in token:
- raise Exception("REQ_BEACON failed")
- ev = hapd.wait_event(["BEACON-REQ-TX-STATUS"], timeout=5)
- if ev is None:
- raise Exception("No TX status event for beacon request received")
- fields = ev.split(' ')
- if fields[1] != addr:
- raise Exception("Unexpected STA address in TX status: " + fields[1])
- if fields[2] != token:
- raise Exception("Unexpected dialog token in TX status: " + fields[2] + " (expected " + token + ")")
- if fields[3] != "ack=1":
- raise Exception("Unexected ACK status in TX status: " + fields[3])
- return token
- @remote_compatible
- def test_rrm_beacon_req_table(dev, apdev):
- """Beacon request - beacon table mode"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
- tests = [ "REQ_BEACON ",
- "REQ_BEACON q",
- "REQ_BEACON 11:22:33:44:55:66 1",
- "REQ_BEACON 11:22:33:44:55:66 1q",
- "REQ_BEACON 11:22:33:44:55:66 11223344556677889900aabbccddeeff" ]
- for t in tests:
- if "FAIL" not in hapd.request(t):
- raise Exception("Invalid command accepted: " + t)
- dev[0].scan_for_bss(apdev[1]['bssid'], freq=2412)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff")
- for i in range(1, 3):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- if fields[1] != addr:
- raise Exception("Unexpected STA address in beacon report response: " + fields[1])
- if fields[2] != token:
- raise Exception("Unexpected dialog token in beacon report response: " + fields[2] + " (expected " + token + ")")
- if fields[3] != "00":
- raise Exception("Unexpected measurement report mode")
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- # Default reporting detail is 2, i.e., all fixed fields and elements.
- if not report.frame_body:
- raise Exception("Reported Frame Body subelement missing")
- if len(report.frame_body) <= 12:
- raise Exception("Too short Reported Frame Body subelement")
- @remote_compatible
- def test_rrm_beacon_req_table_detail(dev, apdev):
- """Beacon request - beacon table mode - reporting detail"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- logger.info("Reporting Detail 0")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020100")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.frame_body:
- raise Exception("Reported Frame Body subelement included with Reporting Detail 0")
- hapd.dump_monitor()
- logger.info("Reporting Detail 1")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if not report.frame_body:
- raise Exception("Reported Frame Body subelement missing")
- if len(report.frame_body) != 12:
- raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1")
- hapd.dump_monitor()
- logger.info("Reporting Detail 2")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020102")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if not report.frame_body:
- raise Exception("Reported Frame Body subelement missing")
- if len(report.frame_body) <= 12:
- raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 2")
- hapd.dump_monitor()
- logger.info("Reporting Detail 3 (invalid)")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020103")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response to invalid reporting detail 3")
- hapd.dump_monitor()
- logger.info("Reporting Detail (too short)")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0200")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response to invalid reporting detail")
- hapd.dump_monitor()
- @remote_compatible
- def test_rrm_beacon_req_table_request(dev, apdev):
- """Beacon request - beacon table mode - request element"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if not report.frame_body:
- raise Exception("Reported Frame Body subelement missing")
- if len(report.frame_body) != 12 + 5 + 10:
- raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1 and requested elements SSID + SuppRates")
- hapd.dump_monitor()
- logger.info("Incorrect reporting detail with request subelement")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020102" + "0a03000106")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (invalid reporting detail)")
- hapd.dump_monitor()
- logger.info("Invalid request subelement length")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a00")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (invalid request subelement length)")
- hapd.dump_monitor()
- logger.info("Multiple request subelements")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a0100" + "0a0101")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (multiple request subelements)")
- hapd.dump_monitor()
- @remote_compatible
- def test_rrm_beacon_req_table_request_oom(dev, apdev):
- """Beacon request - beacon table mode - request element OOM"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- with alloc_fail(dev[0], 1,
- "bitfield_alloc;wpas_rm_handle_beacon_req_subelem"):
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response received (OOM)")
- with alloc_fail(dev[0], 1,
- "wpabuf_alloc;wpas_rrm_send_msr_report_mpdu"):
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response received (OOM)")
- with fail_test(dev[0], 1,
- "wpa_driver_nl80211_send_action;wpas_rrm_send_msr_report_mpdu"):
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response received (OOM)")
- with alloc_fail(dev[0], 1,
- "wpabuf_resize;wpas_add_beacon_rep"):
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received (OOM -> empty report)")
- fields = ev.split(' ')
- if len(fields[4]) > 0:
- raise Exception("Unexpected beacon report received")
- @remote_compatible
- def test_rrm_beacon_req_table_bssid(dev, apdev):
- """Beacon request - beacon table mode - specific BSSID"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- bssid2 = hapd2.own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002" + bssid2.replace(':', ''))
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if "bssid=" + bssid2 not in str(report):
- raise Exception("Report for unexpect BSS")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response")
- @remote_compatible
- def test_rrm_beacon_req_table_ssid(dev, apdev):
- """Beacon request - beacon table mode - specific SSID"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- bssid2 = hapd2.own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0007" + "another".encode('hex'))
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if "bssid=" + bssid2 not in str(report):
- raise Exception("Report for unexpect BSS")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response")
- hapd.dump_monitor()
- logger.info("Wildcard SSID")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0000")
- for i in range(2):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- hapd.dump_monitor()
- logger.info("Too long SSID")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0021" + 33*"00")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (invalid SSID subelement in request)")
- hapd.dump_monitor()
- @remote_compatible
- def test_rrm_beacon_req_table_info(dev, apdev):
- """Beacon request - beacon table mode - Reporting Information subelement"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- logger.info("Unsupported reporting information 1")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "01020100")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response (incapable) is not received")
- fields = ev.split(' ')
- if fields[3] != "02":
- raise Exception("Beacon report response - unexpected mode (" + fields[3] + ")")
- hapd.dump_monitor()
- logger.info("Invalid reporting information length")
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "010100")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (invalid reporting information length)")
- hapd.dump_monitor()
- @remote_compatible
- def test_rrm_beacon_req_table_unknown_subelem(dev, apdev):
- """Beacon request - beacon table mode - unknown subelement"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "330101" + "fe00")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- @remote_compatible
- def test_rrm_beacon_req_table_truncated_subelem(dev, apdev):
- """Beacon request - beacon table mode - Truncated subelement"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0001")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response (truncated subelement)")
- hapd.dump_monitor()
- @remote_compatible
- def test_rrm_beacon_req_table_rsne(dev, apdev):
- """Beacon request - beacon table mode - RSNE truncation"""
- params = hostapd.wpa2_params(ssid="rrm-rsn", passphrase="12345678")
- params["rrm_beacon_report"] = "1"
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm-rsn", psk="12345678", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a0130")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if not report.frame_body:
- raise Exception("Reported Frame Body subelement missing")
- if len(report.frame_body) != 12 + 6:
- raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1 and requested element RSNE")
- if binascii.unhexlify("30040100000f") not in report.frame_body:
- raise Exception("Truncated RSNE not found")
- def test_rrm_beacon_req_table_vht(dev, apdev):
- """Beacon request - beacon table mode - VHT"""
- clear_scan_cache(apdev[0])
- try:
- hapd = None
- params = { "ssid": "rrm-vht",
- "country_code": "FI",
- "hw_mode": "a",
- "channel": "36",
- "ht_capab": "[HT40+]",
- "ieee80211n": "1",
- "ieee80211ac": "1",
- "vht_oper_chwidth": "1",
- "vht_oper_centr_freq_seg0_idx": "42",
- "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- params = { "ssid": "test-vht40",
- "country_code": "FI",
- "hw_mode": "a",
- "channel": "48",
- "ieee80211n": "1",
- "ieee80211ac": "1",
- "ht_capab": "[HT40-]",
- "vht_capab": "",
- "vht_oper_chwidth": "0",
- "vht_oper_centr_freq_seg0_idx": "0",
- }
- hapd2 = hostapd.add_ap(apdev[1], params)
- dev[0].scan_for_bss(apdev[1]['bssid'], freq=5240)
- dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5180")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "f0000000000002ffffffffffff")
- for i in range(2):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[0]['bssid']:
- if report.opclass != 128 or report.channel != 36:
- raise Exception("Incorrect opclass/channel for AP0")
- elif report.bssid_str == apdev[1]['bssid']:
- if report.opclass != 117 or report.channel != 48:
- raise Exception("Incorrect opclass/channel for AP1")
- except Exception, e:
- if isinstance(e, Exception) and str(e) == "AP startup failed":
- if not vht_supported():
- raise HwsimSkip("80 MHz channel not supported in regulatory information")
- raise
- finally:
- dev[0].request("DISCONNECT")
- if hapd:
- hapd.request("DISABLE")
- subprocess.call(['iw', 'reg', 'set', '00'])
- dev[0].flush_scan_cache()
- @remote_compatible
- def test_rrm_beacon_req_active(dev, apdev):
- """Beacon request - active scan mode"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000640001ffffffffffff")
- for i in range(1, 3):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[0]['bssid']:
- if report.opclass != 81 or report.channel != 1:
- raise Exception("Incorrect opclass/channel for AP0")
- elif report.bssid_str == apdev[1]['bssid']:
- if report.opclass != 81 or report.channel != 11:
- raise Exception("Incorrect opclass/channel for AP1")
- @remote_compatible
- def test_rrm_beacon_req_active_ignore_old_result(dev, apdev):
- """Beacon request - active scan mode and old scan result"""
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
- dev[0].scan_for_bss(apdev[1]['bssid'], freq=2412)
- hapd2.disable()
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51010000640001ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[1]['bssid']:
- raise Exception("Old BSS reported")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response")
- def start_ap(dev):
- id = dev.add_network()
- dev.set_network(id, "mode", "2")
- dev.set_network_quoted(id, "ssid", 32*'A')
- dev.set_network_quoted(id, "psk", "1234567890")
- dev.set_network(id, "frequency", "2412")
- dev.set_network(id, "scan_freq", "2412")
- dev.select_network(id)
- dev.wait_connected()
- def test_rrm_beacon_req_active_many(dev, apdev):
- """Beacon request - active scan mode and many BSSs"""
- for i in range(1, 7):
- ifname = apdev[0]['ifname'] if i == 1 else apdev[0]['ifname'] + "-%d" % i
- hapd1 = hostapd.add_bss(apdev[0], ifname, 'bss-%i.conf' % i)
- hapd1.set('vendor_elements', "dd50" + 80*'bb')
- hapd1.request("UPDATE_BEACON")
- wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
- wpas.interface_add("wlan5")
- wpas.request("SET device_name " + 20*'a')
- start_ap(wpas)
- start_ap(dev[1])
- start_ap(dev[2])
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- params['vendor_elements'] = "dd50" + 80*'aa'
- hapd = hostapd.add_ap(apdev[1]['ifname'], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- ok = False
- for j in range(3):
- token = run_req_beacon(hapd, addr, "51010000640001ffffffffffff")
- for i in range(10):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- if len(fields[4]) == 0:
- break
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if i == 9:
- ok = True
- if ok:
- break
- @remote_compatible
- def test_rrm_beacon_req_active_ap_channels(dev, apdev):
- """Beacon request - active scan mode with AP Channel Report subelement"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "dd0111" + "330351010b" + "dd0111")
- for i in range(1, 3):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[0]['bssid']:
- if report.opclass != 81 or report.channel != 1:
- raise Exception("Incorrect opclass/channel for AP0")
- elif report.bssid_str == apdev[1]['bssid']:
- if report.opclass != 81 or report.channel != 11:
- raise Exception("Incorrect opclass/channel for AP1")
- @remote_compatible
- def test_rrm_beacon_req_passive_ap_channels(dev, apdev):
- """Beacon request - passive scan mode with AP Channel Report subelement"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51ff0000640000ffffffffffff" + "330351010b" + "3300" + "dd00")
- for i in range(1, 3):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[0]['bssid']:
- if report.opclass != 81 or report.channel != 1:
- raise Exception("Incorrect opclass/channel for AP0")
- elif report.bssid_str == apdev[1]['bssid']:
- if report.opclass != 81 or report.channel != 11:
- raise Exception("Incorrect opclass/channel for AP1")
- @remote_compatible
- def test_rrm_beacon_req_active_single_channel(dev, apdev):
- """Beacon request - active scan mode with single channel"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "510b0000640001ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- @remote_compatible
- def test_rrm_beacon_req_active_ap_channels_unknown_opclass(dev, apdev):
- """Beacon request - active scan mode with AP Channel Report subelement and unknown opclass"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "3303ff010b")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response (refused) not received")
- fields = ev.split(' ')
- if fields[3] != "04":
- raise Exception("Unexpected beacon report mode: " + fields[3])
- @remote_compatible
- def test_rrm_beacon_req_active_ap_channel_oom(dev, apdev):
- """Beacon request - AP Channel Report subelement and OOM"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- with alloc_fail(dev[0], 1, "wpas_add_channels"):
- token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "330351010b")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- # allow either not to respond or send refused response
- if ev is not None:
- fields = ev.split(' ')
- if fields[3] != "04":
- raise Exception("Unexpected Beacon report during OOM with mode: " + fields[3])
- @remote_compatible
- def test_rrm_beacon_req_active_scan_fail(dev, apdev):
- """Beacon request - Active scan failure"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- with alloc_fail(dev[0], 1, "wpa_supplicant_trigger_scan"):
- token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "330351010b")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("No Beacon report")
- fields = ev.split(' ')
- if fields[3] != "04":
- raise Exception("Unexpected Beacon report contents: " + ev)
- @remote_compatible
- def test_rrm_beacon_req_active_zero_duration(dev, apdev):
- """Beacon request - Action scan and zero duration"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000000001ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected Beacon report")
- @remote_compatible
- def test_rrm_beacon_req_active_fail_random(dev, apdev):
- """Beacon request - active scan mode os_get_random failure"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- with fail_test(dev[0], 1, "os_get_random;wpas_rm_handle_beacon_req"):
- token = run_req_beacon(hapd, addr, "51000000640001ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- @remote_compatible
- def test_rrm_beacon_req_passive(dev, apdev):
- """Beacon request - passive scan mode"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51000000640000ffffffffffff")
- for i in range(1, 3):
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.bssid_str == apdev[0]['bssid']:
- if report.opclass != 81 or report.channel != 1:
- raise Exception("Incorrect opclass/channel for AP0")
- elif report.bssid_str == apdev[1]['bssid']:
- if report.opclass != 81 or report.channel != 11:
- raise Exception("Incorrect opclass/channel for AP1")
- @remote_compatible
- def test_rrm_beacon_req_passive_no_match(dev, apdev):
- """Beacon request - passive scan mode and no matching BSS"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "51010000640000021122334455")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- if len(fields[4]) > 0:
- raise Exception("Unexpected beacon report BSS")
- @remote_compatible
- def test_rrm_beacon_req_passive_no_match_oom(dev, apdev):
- """Beacon request - passive scan mode and no matching BSS (OOM)"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_beacon_rep_scan_process"):
- token = run_req_beacon(hapd, addr, "51010000640000021122334455")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected Beacon report response during OOM")
- # verify reporting is still functional
- token = run_req_beacon(hapd, addr, "51010000640000021122334455")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report %d response not received" % i)
- fields = ev.split(' ')
- if len(fields[4]) > 0:
- raise Exception("Unexpected beacon report BSS")
- @remote_compatible
- def test_rrm_beacon_req_active_duration_mandatory(dev, apdev):
- """Beacon request - Action scan and duration mandatory"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "req_mode=10 51000000640001ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("No Beacon report response")
- fields = ev.split(' ')
- rrm = int(dev[0].get_driver_status_field("capa.rrm_flags"), 16)
- if rrm & 0x20 == 0x20:
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- else:
- # Driver does not support scan dwell time setting, so wpa_supplicant
- # rejects the measurement request due to the mandatory duration using
- # Measurement Report Mode field Incapable=1.
- if fields[3] != '02':
- raise Exception("Unexpected Measurement Report Mode: " + fields[3])
- if len(fields[4]) > 0:
- raise Exception("Unexpected beacon report received")
- def test_rrm_beacon_req_passive_scan_vht(dev, apdev):
- """Beacon request - passive scan mode - VHT"""
- clear_scan_cache(apdev[0])
- try:
- hapd = None
- params = { "ssid": "rrm-vht",
- "country_code": "FI",
- 'ieee80211d': '1',
- "hw_mode": "a",
- "channel": "36",
- "ht_capab": "[HT40+]",
- "ieee80211n": "1",
- "ieee80211ac": "1",
- "vht_oper_chwidth": "1",
- "vht_oper_centr_freq_seg0_idx": "42",
- "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].scan_for_bss(apdev[0]['bssid'], freq=5180)
- dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5180")
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "80000000640000ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.opclass != 128 or report.channel != 36:
- raise Exception("Incorrect opclass/channel for AP")
- token = run_req_beacon(hapd, addr, "82000000640000ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.opclass != 128 or report.channel != 36:
- raise Exception("Incorrect opclass/channel for AP")
- except Exception, e:
- if isinstance(e, Exception) and str(e) == "AP startup failed":
- if not vht_supported():
- raise HwsimSkip("80 MHz channel not supported in regulatory information")
- raise
- finally:
- dev[0].request("DISCONNECT")
- if hapd:
- hapd.request("DISABLE")
- subprocess.call(['iw', 'reg', 'set', '00'])
- dev[0].flush_scan_cache()
- def test_rrm_beacon_req_passive_scan_vht160(dev, apdev):
- """Beacon request - passive scan mode - VHT160"""
- clear_scan_cache(apdev[0])
- try:
- hapd = None
- params = { "ssid": "rrm-vht",
- "country_code": "ZA",
- 'ieee80211d': '1',
- "hw_mode": "a",
- "channel": "104",
- "ht_capab": "[HT40-]",
- "ieee80211n": "1",
- "ieee80211ac": "1",
- "vht_oper_chwidth": "2",
- "vht_oper_centr_freq_seg0_idx": "114",
- "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- dev[0].scan_for_bss(apdev[0]['bssid'], freq=5520)
- dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5520")
- sig = dev[0].request("SIGNAL_POLL").splitlines()
- if "WIDTH=160 MHz" not in sig:
- raise Exception("Unexpected SIGNAL_POLL value: " + str(sig))
- addr = dev[0].own_addr()
- token = run_req_beacon(hapd, addr, "81000000640000ffffffffffff")
- ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
- if ev is None:
- raise Exception("Beacon report response not received")
- fields = ev.split(' ')
- report = BeaconReport(binascii.unhexlify(fields[4]))
- logger.info("Received beacon report: " + str(report))
- if report.opclass != 129 or report.channel != 104:
- raise Exception("Incorrect opclass/channel for AP")
- except Exception, e:
- if isinstance(e, Exception) and str(e) == "AP startup failed":
- raise HwsimSkip("ZA regulatory rule likely did not have DFS requirement removed")
- raise
- finally:
- dev[0].request("DISCONNECT")
- if hapd:
- hapd.request("DISABLE")
- subprocess.call(['iw', 'reg', 'set', '00'])
- dev[0].flush_scan_cache()
- def test_rrm_beacon_req_ap_errors(dev, apdev):
- """Beacon request - AP error cases"""
- try:
- run_rrm_beacon_req_ap_errors(dev, apdev)
- finally:
- dev[1].request("VENDOR_ELEM_REMOVE 13 *")
- def run_rrm_beacon_req_ap_errors(dev, apdev):
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].scan_for_bss(bssid, freq=2412)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- # Override RM capabilities (remove all)
- dev[1].request("VENDOR_ELEM_ADD 13 46050000000000")
- dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr1 = dev[1].own_addr()
- # Beacon request: Too short request data
- if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 11"):
- raise Exception("Invalid REQ_BEACON accepted")
- # Beacon request: 02:00:00:00:01:00 does not support table beacon report
- if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 51000000000002ffffffffffff"):
- raise Exception("Invalid REQ_BEACON accepted")
- # Beacon request: 02:00:00:00:01:00 does not support active beacon report
- if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 51000000640001ffffffffffff"):
- raise Exception("Invalid REQ_BEACON accepted")
- # Beacon request: 02:00:00:00:01:00 does not support passive beacon report
- if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 510b0000640000ffffffffffff"):
- raise Exception("Invalid REQ_BEACON accepted")
- # Beacon request: Unknown measurement mode 3
- if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 510b0000640003ffffffffffff"):
- raise Exception("Invalid REQ_BEACON accepted")
- for i in range(257):
- if "FAIL" in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
- raise Exception("REQ_BEACON failed")
- dev[0].dump_monitor()
- hapd.dump_monitor()
- with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_beacon_req"):
- if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
- raise Exception("REQ_BEACON accepted during OOM")
- with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_beacon_req"):
- if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
- raise Exception("REQ_BEACON accepted during failure testing")
- def test_rrm_req_reject_oom(dev, apdev):
- """Radio measurement request - OOM while rejecting a request"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- dev[0].request("SET ext_mgmt_frame_handling 1")
- with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_handle_msr_req_element"):
- # "RRM: Parallel measurements are not supported, reject"
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "05000100002603010105"):
- raise Exception("MGMT_RX_PROCESS failed")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response during OOM")
- def test_rrm_req_when_rrm_not_used(dev, apdev):
- """Radio/link measurement request for non-RRM association"""
- params = { "ssid": "rrm" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- dev[0].request("SET ext_mgmt_frame_handling 1")
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "050001000026030100fe"):
- raise Exception("MGMT_RX_PROCESS failed")
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected beacon report response when RRM is disabled")
- dev[0].request("REMOVE_NETWORK all")
- dev[0].wait_disconnected()
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "050001000026030100fe"):
- raise Exception("MGMT_RX_PROCESS failed")
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
- raise Exception("MGMT_RX_PROCESS failed")
- @remote_compatible
- def test_rrm_req_proto(dev, apdev):
- """Radio measurement request - protocol testing"""
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = hapd.own_addr()
- dev[0].request("SET LCI ")
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- dev[0].request("SET ext_mgmt_frame_handling 1")
- tests = []
- # "RRM: Ignoring too short radio measurement request"
- tests += [ "0500", "050001", "05000100" ]
- # No measurement request element at all
- tests += [ "0500010000" ]
- # "RRM: Truncated element"
- tests += [ "050001000026" ]
- # "RRM: Element length too short"
- tests += [ "05000100002600", "0500010000260111", "050001000026021122" ]
- # "RRM: Element length too long"
- tests += [ "05000100002603", "0500010000260311", "050001000026031122" ]
- # "RRM: Enable bit not supported, ignore"
- tests += [ "05000100002603010200" ]
- # "RRM: Measurement report failed. TX power insertion not supported"
- # OR
- # "RRM: Link measurement report failed. Request too short"
- tests += [ "0502" ]
- # Too short LCI request
- tests += [ "05000100002603010008" ]
- # Too short neighbor report response
- tests += [ "0505" ]
- # Unexpected neighbor report response
- tests += [ "050500", "050501", "050502", "050503", "050504", "050505" ]
- # Too short beacon request
- tests += [ "05000100002603010005",
- "0500010000260f010005112233445566778899aabbcc" ]
- # Unknown beacon report mode
- tests += [ "05000100002610010005112233445566778899aabbccdd" ]
- # "RRM: Expected Measurement Request element, but EID is 0"
- tests += [ "05000100000000" ]
- for t in tests:
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected response seen at the AP: " + ev)
- tests = []
- # "RRM: Parallel measurements are not supported, reject"
- tests += [ "05000100002603010105" ]
- # "RRM: Unsupported radio measurement type 254"
- tests += [ "050001000026030100fe" ]
- # Reject LCI request
- tests += [ "0500010000260701000811223344" ]
- # Beacon report info subelement; no valid channels
- tests += [ "05000100002614010005112233445566008899aabbccdd01020000" ]
- for t in tests:
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=5)
- if ev is None:
- raise Exception("No response seen at the AP")
- hapd.dump_monitor()
- dev[0].request("SET LCI " + lci)
- tests = []
- # "Not building LCI report - bad location subject"
- tests += [ "0500010000260701000811223344" ]
- for t in tests:
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
- if ev is not None:
- raise Exception("Unexpected response seen at the AP: " + ev)
- tests = []
- # LCI report or reject
- tests += [ "0500010000260701000801223344",
- "05000100002607010008010402ff",
- "05000100002608010008010402ffff" ]
- for t in tests:
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=5)
- if ev is None:
- raise Exception("No response seen at the AP")
- hapd.dump_monitor()
- # Verify rejection of a group-addressed request frame
- hdr = "d0003a01" + "ffffffffffff" + 2*bssid.replace(':', '') + "1000"
- # "RRM: Parallel measurements are not supported, reject"
- t = "05000100002603010105"
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected response seen at the AP (broadcast request rejected)")
- hapd.dump_monitor()
- hapd.set("ext_mgmt_frame_handling", "0")
- dev[0].request("SET ext_mgmt_frame_handling 0")
- dev[0].request("SET LCI ")
- def test_rrm_link_measurement(dev, apdev):
- """Radio measurement request - link measurement"""
- check_tx_power_support(dev[0])
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- dev[0].request("SET ext_mgmt_frame_handling 1")
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
- raise Exception("MGMT_RX_PROCESS failed")
- ev = hapd.wait_event(["MGMT-RX"], timeout=5)
- if ev is None:
- raise Exception("No link measurement report seen")
- def test_rrm_link_measurement_oom(dev, apdev):
- """Radio measurement request - link measurement OOM"""
- check_tx_power_support(dev[0])
- params = { "ssid": "rrm", "rrm_beacon_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- dev[0].request("SET ext_mgmt_frame_handling 1")
- with alloc_fail(dev[0], 1, "wpabuf_alloc;wpas_rrm_handle_link_measurement_request"):
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
- raise Exception("MGMT_RX_PROCESS failed")
- wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
- with fail_test(dev[0], 1, "wpas_rrm_handle_link_measurement_request"):
- if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
- raise Exception("MGMT_RX_PROCESS failed")
- wait_fail_trigger(dev[0], "GET_FAIL")
- ev = hapd.wait_event(["MGMT-RX"], timeout=0.1)
- if ev is not None:
- raise Exception("Unexpected beacon report response during OOM")
- def test_rrm_rep_parse_proto(dev, apdev):
- """hostapd rrm report parsing protocol testing"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].request("SET LCI " + lci)
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + bssid.replace(':', '') + addr.replace(':', '') + bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- tests = [ "0501",
- "05ff01",
- "0501012703fffffe2700",
- "0501012703ffff05",
- "05010127ffffff05" + 252*"00",
- "0504012603ffffff2600",
- "0504012603ffff08",
- "0504012608ffff08ffffffffff",
- "0504012608ffff08ff04021234",
- "0504012608ffff08ff04020100",
- "0504012608ffff08ff0402ffff" ]
- for t in tests:
- if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed for " + t)
- if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"rrm\" nr=" + nr + " lci=" + lci):
- raise Exception("Set neighbor failed")
- if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0504012608ffff08ff04021000"):
- raise Exception("MGMT_RX_PROCESS failed")
- def test_rrm_unexpected(dev, apdev):
- """hostapd unexpected rrm"""
- check_rrm_support(dev[0])
- params = { "ssid": "rrm", "rrm_neighbor_report": "0" }
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- bssid = hapd.own_addr()
- dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
- addr = dev[0].own_addr()
- hdr = "d0003a01" + bssid.replace(':', '') + addr.replace(':', '') + bssid.replace(':', '') + "1000"
- hapd.set("ext_mgmt_frame_handling", "1")
- tests = [ "050401" ]
- for t in tests:
- if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
- raise Exception("MGMT_RX_PROCESS failed for " + t)
|