123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401 |
- # Test cases for hostapd tracking unconnected stations
- # Copyright (c) 2015, Jouni Malinen <j@w1.fi>
- #
- # This software may be distributed under the terms of the BSD license.
- # See README for more details.
- import logging
- logger = logging.getLogger()
- import subprocess
- import time
- import hostapd
- from wpasupplicant import WpaSupplicant
- from utils import parse_ie
- def test_ap_track_sta(dev, apdev):
- """Dualband AP tracking unconnected stations"""
- try:
- _test_ap_track_sta(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta(dev, apdev):
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "track_sta_max_num": "2" }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "track_sta_max_num": "100",
- "track_sta_max_age": "1" }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- for i in range(2):
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
- dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[2].scan_for_bss(bssid2, freq=5200, force_scan=True)
- addr0 = dev[0].own_addr()
- addr1 = dev[1].own_addr()
- addr2 = dev[2].own_addr()
- track = hapd.request("TRACK_STA_LIST")
- if addr0 not in track or addr1 not in track:
- raise Exception("Station missing from 2.4 GHz tracking")
- if addr2 in track:
- raise Exception("Unexpected station included in 2.4 GHz tracking")
- track = hapd2.request("TRACK_STA_LIST")
- if addr0 not in track or addr2 not in track:
- raise Exception("Station missing from 5 GHz tracking")
- if addr1 in track:
- raise Exception("Unexpected station included in 5 GHz tracking")
- # Test expiration
- time.sleep(1.1)
- track = hapd.request("TRACK_STA_LIST")
- if addr0 not in track or addr1 not in track:
- raise Exception("Station missing from 2.4 GHz tracking (expiration)")
- track = hapd2.request("TRACK_STA_LIST")
- if addr0 in track or addr2 in track:
- raise Exception("Station not expired from 5 GHz tracking")
- # Test maximum list length
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[2].scan_for_bss(bssid, freq=2437, force_scan=True)
- track = hapd.request("TRACK_STA_LIST")
- if len(track.splitlines()) != 2:
- raise Exception("Unexpected number of entries: %d" % len(track.splitlines()))
- if addr1 not in track or addr2 not in track:
- raise Exception("Station missing from 2.4 GHz tracking (max limit)")
- def test_ap_track_sta_no_probe_resp(dev, apdev):
- """Dualband AP not replying to probes from dualband STA on 2.4 GHz"""
- try:
- _test_ap_track_sta_no_probe_resp(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta_no_probe_resp(dev, apdev):
- dev[0].flush_scan_cache()
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "beacon_int": "10000",
- "no_probe_resp_if_seen_on": apdev[1]['ifname'] }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "track_sta_max_num": "100" }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
- dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[0].scan(freq=2437, type="ONLY")
- dev[0].scan(freq=2437, type="ONLY")
- bss = dev[0].get_bss(bssid)
- if bss:
- ie = parse_ie(bss['ie'])
- # Check whether this is from a Beacon frame (TIM element included) since
- # it is possible that a Beacon frame was received during the active
- # scan. This test should fail only if a Probe Response frame was
- # received.
- if 5 not in ie:
- raise Exception("2.4 GHz AP found unexpectedly")
- def test_ap_track_sta_no_auth(dev, apdev):
- """Dualband AP rejecting authentication from dualband STA on 2.4 GHz"""
- try:
- _test_ap_track_sta_no_auth(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta_no_auth(dev, apdev):
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "track_sta_max_num": "100",
- "no_auth_if_seen_on": apdev[1]['ifname'] }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "track_sta_max_num": "100" }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
- dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[1].connect("track", key_mgmt="NONE", scan_freq="2437")
- dev[0].connect("track", key_mgmt="NONE", scan_freq="2437",
- freq_list="2437", wait_connect=False)
- dev[1].request("DISCONNECT")
- ev = dev[0].wait_event([ "CTRL-EVENT-CONNECTED",
- "CTRL-EVENT-AUTH-REJECT" ], timeout=10)
- if ev is None:
- raise Exception("Unknown connection result")
- if "CTRL-EVENT-CONNECTED" in ev:
- raise Exception("Unexpected connection")
- if "status_code=82" not in ev:
- raise Exception("Unexpected rejection reason: " + ev)
- if "ie=34" not in ev:
- raise Exception("No Neighbor Report element: " + ev)
- dev[0].request("DISCONNECT")
- def test_ap_track_sta_no_auth_passive(dev, apdev):
- """AP rejecting authentication from dualband STA on 2.4 GHz (passive)"""
- try:
- _test_ap_track_sta_no_auth_passive(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta_no_auth_passive(dev, apdev):
- dev[0].flush_scan_cache()
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "no_auth_if_seen_on": apdev[1]['ifname'] }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "interworking": "1",
- "venue_name": "eng:Venue",
- "track_sta_max_num": "100" }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- for i in range(10):
- dev[0].request("SCAN freq=5200 passive=1")
- ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=5)
- if ev is None:
- raise Exception("Scan did not complete")
- if dev[0].get_bss(bssid2):
- break
- if i == 9:
- raise Exception("AP not found with passive scans")
- if "OK" not in dev[0].request("ANQP_GET " + bssid2 + " 258"):
- raise Exception("ANQP_GET command failed")
- ev = dev[0].wait_event(["RX-ANQP"], timeout=1)
- if ev is None or "Venue Name" not in ev:
- raise Exception("Did not receive Venue Name")
- dev[0].connect("track", key_mgmt="NONE", scan_freq="2437",
- freq_list="2437", wait_connect=False)
- ev = dev[0].wait_event([ "CTRL-EVENT-CONNECTED",
- "CTRL-EVENT-AUTH-REJECT" ], timeout=10)
- if ev is None:
- raise Exception("Unknown connection result")
- if "CTRL-EVENT-CONNECTED" in ev:
- raise Exception("Unexpected connection")
- if "status_code=82" not in ev:
- raise Exception("Unexpected rejection reason: " + ev)
- dev[0].request("DISCONNECT")
- def test_ap_track_sta_force_5ghz(dev, apdev):
- """Dualband AP forcing dualband STA to connect on 5 GHz"""
- try:
- _test_ap_track_sta_force_5ghz(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta_force_5ghz(dev, apdev):
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "no_probe_resp_if_seen_on": apdev[1]['ifname'],
- "no_auth_if_seen_on": apdev[1]['ifname'] }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "track_sta_max_num": "100" }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
- dev[0].connect("track", key_mgmt="NONE", scan_freq="2437 5200")
- freq = dev[0].get_status_field('freq')
- if freq != '5200':
- raise Exception("Unexpected operating channel")
- dev[0].request("DISCONNECT")
- def test_ap_track_sta_force_2ghz(dev, apdev):
- """Dualband AP forcing dualband STA to connect on 2.4 GHz"""
- try:
- _test_ap_track_sta_force_2ghz(dev, apdev)
- finally:
- subprocess.call(['iw', 'reg', 'set', '00'])
- def _test_ap_track_sta_force_2ghz(dev, apdev):
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "track_sta_max_num": "100" }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "a",
- "channel": "40",
- "no_probe_resp_if_seen_on": apdev[0]['ifname'],
- "no_auth_if_seen_on": apdev[0]['ifname'] }
- hapd2 = hostapd.add_ap(apdev[1], params)
- bssid2 = apdev[1]['bssid']
- dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- dev[0].connect("track", key_mgmt="NONE", scan_freq="2437 5200")
- freq = dev[0].get_status_field('freq')
- if freq != '2437':
- raise Exception("Unexpected operating channel")
- dev[0].request("DISCONNECT")
- def test_ap_track_taxonomy(dev, apdev):
- """AP tracking STA taxonomy"""
- try:
- _test_ap_track_taxonomy(dev, apdev)
- finally:
- dev[1].request("SET p2p_disabled 0")
- subprocess.call(['iw', 'reg', 'set', '00'])
- dev[0].flush_scan_cache()
- dev[1].flush_scan_cache()
- dev[2].flush_scan_cache()
- def _test_ap_track_taxonomy(dev, apdev):
- params = { "ssid": "track",
- "country_code": "US",
- "hw_mode": "g",
- "channel": "6",
- "track_sta_max_num": "2" }
- hapd = hostapd.add_ap(apdev[0], params)
- bssid = apdev[0]['bssid']
- dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
- addr0 = dev[0].own_addr()
- dev[0].connect("track", key_mgmt="NONE", scan_freq="2437")
- dev[1].request("SET p2p_disabled 1")
- dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
- addr1 = dev[1].own_addr()
- dev[1].connect("track", key_mgmt="NONE", scan_freq="2437")
- wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
- wpas.interface_add("wlan5")
- wpas.request("SET model_name track test")
- wpas.scan_for_bss(bssid, freq=2437, force_scan=True)
- addr = wpas.own_addr()
- wpas.connect("track", key_mgmt="NONE", scan_freq="2437")
- if "FAIL" not in hapd.request("SIGNATURE abc"):
- raise Exception("SIGNATURE failure not reported (1)")
- if "FAIL" not in hapd.request("SIGNATURE 22:33:44:55:66:77"):
- raise Exception("SIGNATURE failure not reported (2)")
- res = hapd.request("SIGNATURE " + addr0)
- logger.info("sta0: " + res)
- if not res.startswith("wifi4|probe:"):
- raise Exception("Unexpected SIGNATURE prefix")
- if "|assoc:" not in res:
- raise Exception("Missing assoc info in SIGNATURE")
- if "wps:track_test" in res:
- raise Exception("Unexpected WPS model name")
- res = hapd.request("SIGNATURE " + addr1)
- logger.info("sta1: " + res)
- if not res.startswith("wifi4|probe:"):
- raise Exception("Unexpected SIGNATURE prefix")
- if "|assoc:" not in res:
- raise Exception("Missing assoc info in SIGNATURE")
- if "wps:" in res:
- raise Exception("Unexpected WPS info");
- if ",221(0050f2,4)," in res:
- raise Exception("Unexpected WPS IE info");
- if ",221(506f9a,9)," in res:
- raise Exception("Unexpected P2P IE info");
- res = hapd.request("SIGNATURE " + addr)
- logger.info("sta: " + res)
- if not res.startswith("wifi4|probe:"):
- raise Exception("Unexpected SIGNATURE prefix")
- if "|assoc:" not in res:
- raise Exception("Missing assoc info in SIGNATURE")
- if "wps:track_test" not in res:
- raise Exception("Missing WPS model name")
- if ",221(0050f2,4)," not in res:
- raise Exception("Missing WPS IE info");
- if ",221(506f9a,9)," not in res:
- raise Exception("Missing P2P IE info");
- addr2 = dev[2].own_addr()
- res = hapd.request("SIGNATURE " + addr2)
- if "FAIL" not in res:
- raise Exception("Unexpected SIGNATURE success for sta2 (1)")
- for i in range(10):
- dev[2].request("SCAN freq=2437 passive=1")
- ev = dev[2].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
- if ev is None:
- raise Exception("Scan did not complete")
- if dev[2].get_bss(bssid):
- break
- res = hapd.request("SIGNATURE " + addr2)
- if "FAIL" not in res:
- raise Exception("Unexpected SIGNATURE success for sta2 (2)")
- dev[2].connect("track", key_mgmt="NONE", scan_freq="2437")
- res = hapd.request("SIGNATURE " + addr2)
- if "FAIL" not in res and len(res) > 0:
- raise Exception("Unexpected SIGNATURE success for sta2 (3)")
- dev[2].scan_for_bss(bssid, freq=2437, force_scan=True)
- res = hapd.request("SIGNATURE " + addr2)
- logger.info("sta2: " + res)
- if not res.startswith("wifi4|probe:"):
- raise Exception("Unexpected SIGNATURE prefix")
- if "|assoc:" not in res:
- raise Exception("Missing assoc info in SIGNATURE")
|