test_ibss.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. # IBSS test cases
  2. # Copyright (c) 2013, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import time
  9. import re
  10. import subprocess
  11. import hwsim_utils
  12. def connect_ibss_cmd(dev, id):
  13. dev.dump_monitor()
  14. dev.select_network(id, freq="2412")
  15. def wait_ibss_connection(dev):
  16. logger.info(dev.ifname + " waiting for IBSS start/join to complete")
  17. ev = dev.wait_connected(timeout=20,
  18. error="Connection to the IBSS timed out")
  19. exp = r'<.>(CTRL-EVENT-CONNECTED) - Connection to ([0-9a-f:]*) completed.*'
  20. s = re.split(exp, ev)
  21. if len(s) < 3:
  22. return None
  23. return s[2]
  24. def wait_4way_handshake(dev1, dev2):
  25. logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr())
  26. ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr()],
  27. timeout=20)
  28. if ev is None:
  29. raise Exception("4-way handshake in IBSS timed out")
  30. def wait_4way_handshake2(dev1, dev2, dev3):
  31. logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr() + " and " + dev3.p2p_interface_addr())
  32. ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
  33. "IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
  34. timeout=20)
  35. if ev is None:
  36. raise Exception("4-way handshake in IBSS timed out")
  37. ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
  38. "IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
  39. timeout=20)
  40. if ev is None:
  41. raise Exception("4-way handshake in IBSS timed out")
  42. def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None,
  43. group=None, beacon_int=None, bssid=None, scan_freq=None):
  44. id = dev.add_network()
  45. dev.set_network(id, "mode", "1")
  46. dev.set_network(id, "frequency", "2412")
  47. if scan_freq:
  48. dev.set_network(id, "scan_freq", str(scan_freq))
  49. dev.set_network_quoted(id, "ssid", ssid)
  50. if psk:
  51. dev.set_network_quoted(id, "psk", psk)
  52. if proto:
  53. dev.set_network(id, "proto", proto)
  54. if key_mgmt:
  55. dev.set_network(id, "key_mgmt", key_mgmt)
  56. if pairwise:
  57. dev.set_network(id, "pairwise", pairwise)
  58. if group:
  59. dev.set_network(id, "group", group)
  60. if beacon_int:
  61. dev.set_network(id, "beacon_int", beacon_int)
  62. if bssid:
  63. dev.set_network(id, "bssid", bssid)
  64. dev.request("ENABLE_NETWORK " + str(id) + " no-connect")
  65. return id
  66. def add_ibss_rsn(dev, ssid):
  67. return add_ibss(dev, ssid, "12345678", "RSN", "WPA-PSK", "CCMP", "CCMP")
  68. def add_ibss_wpa_none(dev, ssid):
  69. return add_ibss(dev, ssid, "12345678", "WPA", "WPA-NONE", "TKIP", "TKIP")
  70. def add_ibss_wpa_none_ccmp(dev, ssid):
  71. return add_ibss(dev, ssid, "12345678", "WPA", "WPA-NONE", "CCMP", "CCMP")
  72. def test_ibss_rsn(dev):
  73. """IBSS RSN"""
  74. ssid="ibss-rsn"
  75. logger.info("Start IBSS on the first STA")
  76. id = add_ibss_rsn(dev[0], ssid)
  77. connect_ibss_cmd(dev[0], id)
  78. bssid0 = wait_ibss_connection(dev[0])
  79. logger.info("Join two STAs to the IBSS")
  80. id = add_ibss_rsn(dev[1], ssid)
  81. connect_ibss_cmd(dev[1], id)
  82. bssid1 = wait_ibss_connection(dev[1])
  83. if bssid0 != bssid1:
  84. logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
  85. # try to merge with a scan
  86. dev[1].scan()
  87. wait_4way_handshake(dev[0], dev[1])
  88. wait_4way_handshake(dev[1], dev[0])
  89. id = add_ibss_rsn(dev[2], ssid)
  90. connect_ibss_cmd(dev[2], id)
  91. bssid2 = wait_ibss_connection(dev[2])
  92. if bssid0 != bssid2:
  93. logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
  94. # try to merge with a scan
  95. dev[2].scan()
  96. wait_4way_handshake(dev[0], dev[2])
  97. wait_4way_handshake2(dev[2], dev[0], dev[1])
  98. # Allow some time for all peers to complete key setup
  99. time.sleep(3)
  100. hwsim_utils.test_connectivity(dev[0], dev[1])
  101. hwsim_utils.test_connectivity(dev[0], dev[2])
  102. hwsim_utils.test_connectivity(dev[1], dev[2])
  103. dev[1].request("REMOVE_NETWORK all")
  104. time.sleep(1)
  105. id = add_ibss_rsn(dev[1], ssid)
  106. connect_ibss_cmd(dev[1], id)
  107. bssid1 = wait_ibss_connection(dev[1])
  108. if bssid0 != bssid1:
  109. logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
  110. # try to merge with a scan
  111. dev[1].scan()
  112. wait_4way_handshake(dev[0], dev[1])
  113. wait_4way_handshake(dev[1], dev[0])
  114. time.sleep(3)
  115. hwsim_utils.test_connectivity(dev[0], dev[1])
  116. if "OK" not in dev[0].request("IBSS_RSN " + dev[1].p2p_interface_addr()):
  117. raise Exception("IBSS_RSN command failed")
  118. def test_ibss_wpa_none(dev):
  119. """IBSS WPA-None"""
  120. ssid="ibss-wpa-none"
  121. logger.info("Start IBSS on the first STA")
  122. id = add_ibss_wpa_none(dev[0], ssid)
  123. connect_ibss_cmd(dev[0], id)
  124. bssid0 = wait_ibss_connection(dev[0])
  125. # This is a bit ugly, but no one really cares about WPA-None, so there may
  126. # not be enough justification to clean this up.. For now, wpa_supplicant
  127. # will show two connection events with mac80211_hwsim where the first one
  128. # comes with all zeros address.
  129. if bssid0 == "00:00:00:00:00:00":
  130. logger.info("Waiting for real BSSID on the first STA")
  131. bssid0 = wait_ibss_connection(dev[0])
  132. logger.info("Join two STAs to the IBSS")
  133. id = add_ibss_wpa_none(dev[1], ssid)
  134. connect_ibss_cmd(dev[1], id)
  135. id = add_ibss_wpa_none(dev[2], ssid)
  136. connect_ibss_cmd(dev[2], id)
  137. bssid1 = wait_ibss_connection(dev[1])
  138. if bssid0 != bssid1:
  139. logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
  140. bssid1 = wait_ibss_connection(dev[1])
  141. bssid2 = wait_ibss_connection(dev[2])
  142. if bssid0 != bssid2:
  143. logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
  144. bssid2 = wait_ibss_connection(dev[2])
  145. print bssid0
  146. print bssid1
  147. print bssid2
  148. bss = dev[0].get_bss(bssid0)
  149. if not bss:
  150. bss = dev[1].get_bss(bssid1)
  151. if not bss:
  152. raise Exception("Could not find BSS entry for IBSS")
  153. if 'flags' not in bss:
  154. raise Exception("Could not get BSS flags from BSS table")
  155. if "[WPA-None-TKIP]" not in bss['flags']:
  156. raise Exception("Unexpected BSS flags: " + bss['flags'])
  157. # Allow some time for all peers to complete key setup
  158. time.sleep(1)
  159. # This is supposed to work, but looks like WPA-None does not work with
  160. # mac80211 currently..
  161. try:
  162. hwsim_utils.test_connectivity(dev[0], dev[1])
  163. except Exception, e:
  164. logger.info("Ignoring known connectivity failure: " + str(e))
  165. try:
  166. hwsim_utils.test_connectivity(dev[0], dev[2])
  167. except Exception, e:
  168. logger.info("Ignoring known connectivity failure: " + str(e))
  169. try:
  170. hwsim_utils.test_connectivity(dev[1], dev[2])
  171. except Exception, e:
  172. logger.info("Ignoring known connectivity failure: " + str(e))
  173. def test_ibss_wpa_none_ccmp(dev):
  174. """IBSS WPA-None/CCMP"""
  175. ssid="ibss-wpa-none"
  176. logger.info("Start IBSS on the first STA")
  177. id = add_ibss_wpa_none(dev[0], ssid)
  178. connect_ibss_cmd(dev[0], id)
  179. bssid0 = wait_ibss_connection(dev[0])
  180. # This is a bit ugly, but no one really cares about WPA-None, so there may
  181. # not be enough justification to clean this up.. For now, wpa_supplicant
  182. # will show two connection events with mac80211_hwsim where the first one
  183. # comes with all zeros address.
  184. if bssid0 == "00:00:00:00:00:00":
  185. logger.info("Waiting for real BSSID on the first STA")
  186. bssid0 = wait_ibss_connection(dev[0])
  187. logger.info("Join a STA to the IBSS")
  188. id = add_ibss_wpa_none(dev[1], ssid)
  189. connect_ibss_cmd(dev[1], id)
  190. bssid1 = wait_ibss_connection(dev[1])
  191. if bssid0 != bssid1:
  192. logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
  193. bssid1 = wait_ibss_connection(dev[1])
  194. print bssid0
  195. print bssid1
  196. # Allow some time for all peers to complete key setup
  197. time.sleep(1)
  198. # This is supposed to work, but looks like WPA-None does not work with
  199. # mac80211 currently..
  200. try:
  201. hwsim_utils.test_connectivity(dev[0], dev[1])
  202. except Exception, e:
  203. logger.info("Ignoring known connectivity failure: " + str(e))
  204. def test_ibss_open(dev):
  205. """IBSS open (no security)"""
  206. ssid="ibss"
  207. id = add_ibss(dev[0], ssid, key_mgmt="NONE", beacon_int="150")
  208. connect_ibss_cmd(dev[0], id)
  209. bssid0 = wait_ibss_connection(dev[0])
  210. id = add_ibss(dev[1], ssid, key_mgmt="NONE", beacon_int="200")
  211. connect_ibss_cmd(dev[1], id)
  212. bssid1 = wait_ibss_connection(dev[1])
  213. if bssid0 != bssid1:
  214. logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
  215. res = dev[0].request("SCAN_RESULTS")
  216. if "[IBSS]" not in res:
  217. res = dev[1].request("SCAN_RESULTS")
  218. if "[IBSS]" not in res:
  219. raise Exception("IBSS flag missing from scan results: " + res)
  220. bss = dev[0].get_bss(bssid0)
  221. if not bss:
  222. bss = dev[1].get_bss(bssid1)
  223. if not bss:
  224. raise Exception("Could not find BSS entry for IBSS")
  225. if 'flags' not in bss:
  226. raise Exception("Could not get BSS flags from BSS table")
  227. if "[IBSS]" not in bss['flags']:
  228. raise Exception("Unexpected BSS flags: " + bss['flags'])
  229. def test_ibss_open_fixed_bssid(dev):
  230. """IBSS open (no security) and fixed BSSID"""
  231. ssid="ibss"
  232. bssid="02:11:22:33:44:55"
  233. try:
  234. dev[0].request("AP_SCAN 2")
  235. add_ibss(dev[0], ssid, key_mgmt="NONE", bssid=bssid, beacon_int="150")
  236. dev[0].request("REASSOCIATE")
  237. dev[1].request("AP_SCAN 2")
  238. add_ibss(dev[1], ssid, key_mgmt="NONE", bssid=bssid, beacon_int="200")
  239. dev[1].request("REASSOCIATE")
  240. bssid0 = wait_ibss_connection(dev[0])
  241. bssid1 = wait_ibss_connection(dev[1])
  242. if bssid0 != bssid:
  243. raise Exception("STA0 BSSID " + bssid0 + " differs from fixed BSSID " + bssid)
  244. if bssid1 != bssid:
  245. raise Exception("STA0 BSSID " + bssid0 + " differs from fixed BSSID " + bssid)
  246. finally:
  247. dev[0].request("AP_SCAN 1")
  248. dev[1].request("AP_SCAN 1")
  249. def test_ibss_open_retry(dev):
  250. """IBSS open (no security) with cfg80211 retry workaround"""
  251. subprocess.check_call(['iw', 'dev', dev[0].ifname, 'set', 'type', 'adhoc'])
  252. subprocess.check_call(['iw', 'dev', dev[0].ifname, 'ibss', 'join',
  253. 'ibss-test', '2412', 'HT20', 'fixed-freq',
  254. '02:22:33:44:55:66'])
  255. ssid="ibss"
  256. try:
  257. dev[0].request("AP_SCAN 2")
  258. id = add_ibss(dev[0], ssid, key_mgmt="NONE", beacon_int="150",
  259. bssid="02:33:44:55:66:77", scan_freq=2412)
  260. #connect_ibss_cmd(dev[0], id)
  261. dev[0].request("REASSOCIATE")
  262. bssid0 = wait_ibss_connection(dev[0])
  263. subprocess.check_call(['iw', 'dev', dev[0].ifname, 'ibss', 'leave'])
  264. time.sleep(1)
  265. dev[0].request("DISCONNECT")
  266. finally:
  267. dev[0].request("AP_SCAN 1")