2013-12-31 09:49:26 +01:00
|
|
|
# Deprecated WEXT driver interface in wpa_supplicant
|
2015-01-07 13:19:30 +01:00
|
|
|
# Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
|
2013-12-31 09:49:26 +01:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
|
|
|
import os
|
|
|
|
|
|
|
|
import hostapd
|
|
|
|
import hwsim_utils
|
|
|
|
from wpasupplicant import WpaSupplicant
|
2015-08-01 21:54:07 +02:00
|
|
|
from utils import HwsimSkip, skip_with_fips
|
2015-01-08 14:59:16 +01:00
|
|
|
from test_rfkill import get_rfkill
|
2013-12-31 09:49:26 +01:00
|
|
|
|
2014-11-29 15:46:43 +01:00
|
|
|
def get_wext_interface():
|
2013-12-31 09:49:26 +01:00
|
|
|
if not os.path.exists("/proc/net/wireless"):
|
2015-01-07 13:19:30 +01:00
|
|
|
raise HwsimSkip("WEXT support not included in the kernel")
|
2013-12-31 09:49:26 +01:00
|
|
|
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
try:
|
|
|
|
wpas.interface_add("wlan5", driver="wext")
|
2019-01-24 08:45:41 +01:00
|
|
|
except Exception as e:
|
2015-01-18 16:13:55 +01:00
|
|
|
wpas.close_ctrl()
|
2015-01-07 13:19:30 +01:00
|
|
|
raise HwsimSkip("WEXT driver support not included in wpa_supplicant")
|
2014-11-29 15:46:43 +01:00
|
|
|
return wpas
|
|
|
|
|
|
|
|
def test_wext_open(dev, apdev):
|
|
|
|
"""WEXT driver interface with open network"""
|
|
|
|
wpas = get_wext_interface()
|
2013-12-31 09:49:26 +01:00
|
|
|
|
2019-03-15 11:10:37 +01:00
|
|
|
params = {"ssid": "wext-open"}
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2014-11-29 15:46:43 +01:00
|
|
|
|
2013-12-31 09:49:26 +01:00
|
|
|
wpas.connect("wext-open", key_mgmt="NONE")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
2013-12-31 09:49:26 +01:00
|
|
|
|
|
|
|
def test_wext_wpa2_psk(dev, apdev):
|
|
|
|
"""WEXT driver interface with WPA2-PSK"""
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas = get_wext_interface()
|
2013-12-31 09:49:26 +01:00
|
|
|
|
|
|
|
params = hostapd.wpa2_params(ssid="wext-wpa2-psk", passphrase="12345678")
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2013-12-31 09:49:26 +01:00
|
|
|
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.connect("wext-wpa2-psk", psk="12345678")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
|
|
|
if "RSSI=" not in wpas.request("SIGNAL_POLL"):
|
|
|
|
raise Exception("Missing RSSI from SIGNAL_POLL")
|
|
|
|
|
|
|
|
wpas.dump_monitor()
|
|
|
|
hapd.request("DEAUTHENTICATE " + wpas.p2p_interface_addr())
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_disconnected(timeout=15)
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
def test_wext_wpa_psk(dev, apdev):
|
|
|
|
"""WEXT driver interface with WPA-PSK"""
|
2015-08-01 21:54:07 +02:00
|
|
|
skip_with_fips(dev[0])
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas = get_wext_interface()
|
2013-12-31 09:49:26 +01:00
|
|
|
|
2014-11-29 15:46:43 +01:00
|
|
|
params = hostapd.wpa_params(ssid="wext-wpa-psk", passphrase="12345678")
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2014-11-29 15:46:43 +01:00
|
|
|
testfile = "/sys/kernel/debug/ieee80211/%s/netdev:%s/tkip_mic_test" % (hapd.get_driver_status_field("phyname"), apdev[0]['ifname'])
|
|
|
|
if not os.path.exists(testfile):
|
2015-01-18 16:13:55 +01:00
|
|
|
wpas.close_ctrl()
|
2015-01-07 13:19:30 +01:00
|
|
|
raise HwsimSkip("tkip_mic_test not supported in mac80211")
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
wpas.connect("wext-wpa-psk", psk="12345678")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
|
|
|
|
|
|
|
with open(testfile, "w") as f:
|
|
|
|
f.write(wpas.p2p_interface_addr())
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected disconnection on first Michael MIC failure")
|
|
|
|
|
|
|
|
with open(testfile, "w") as f:
|
|
|
|
f.write("ff:ff:ff:ff:ff:ff")
|
2014-12-20 10:51:30 +01:00
|
|
|
ev = wpas.wait_disconnected(timeout=10,
|
|
|
|
error="No disconnection after two Michael MIC failures")
|
2014-11-29 15:46:43 +01:00
|
|
|
if "reason=14 locally_generated=1" not in ev:
|
|
|
|
raise Exception("Unexpected disconnection reason: " + ev)
|
|
|
|
|
|
|
|
def test_wext_pmksa_cache(dev, apdev):
|
|
|
|
"""PMKSA caching with WEXT"""
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
|
|
|
params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
|
2016-03-30 10:55:56 +02:00
|
|
|
hostapd.add_ap(apdev[0], params)
|
2014-11-29 15:46:43 +01:00
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
wpas.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
|
|
|
|
eap="GPSK", identity="gpsk user",
|
|
|
|
password="abcdefghijklmnop0123456789abcdef",
|
|
|
|
scan_freq="2412")
|
|
|
|
pmksa = wpas.get_pmksa(bssid)
|
|
|
|
if pmksa is None:
|
|
|
|
raise Exception("No PMKSA cache entry created")
|
|
|
|
if pmksa['opportunistic'] != '0':
|
|
|
|
raise Exception("Unexpected opportunistic PMKSA cache entry")
|
|
|
|
|
2016-03-30 10:55:56 +02:00
|
|
|
hostapd.add_ap(apdev[1], params)
|
2014-11-29 15:46:43 +01:00
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
|
|
|
|
wpas.dump_monitor()
|
|
|
|
logger.info("Roam to AP2")
|
|
|
|
# It can take some time for the second AP to become ready to reply to Probe
|
|
|
|
# Request frames especially under heavy CPU load, so allow couple of rounds
|
|
|
|
# of scanning to avoid reporting errors incorrectly just because of scans
|
|
|
|
# not having seen the target AP.
|
|
|
|
for i in range(3):
|
|
|
|
wpas.scan()
|
|
|
|
if wpas.get_bss(bssid2) is not None:
|
|
|
|
break
|
|
|
|
logger.info("Scan again to find target AP")
|
|
|
|
wpas.request("ROAM " + bssid2)
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("EAP success timed out")
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_connected(timeout=10, error="Roaming timed out")
|
2014-11-29 15:46:43 +01:00
|
|
|
pmksa2 = wpas.get_pmksa(bssid2)
|
|
|
|
if pmksa2 is None:
|
|
|
|
raise Exception("No PMKSA cache entry found")
|
|
|
|
if pmksa2['opportunistic'] != '0':
|
|
|
|
raise Exception("Unexpected opportunistic PMKSA cache entry")
|
|
|
|
|
|
|
|
wpas.dump_monitor()
|
|
|
|
logger.info("Roam back to AP1")
|
|
|
|
wpas.scan()
|
|
|
|
wpas.request("ROAM " + bssid)
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Roaming with the AP timed out")
|
|
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
|
|
raise Exception("Unexpected EAP exchange")
|
|
|
|
pmksa1b = wpas.get_pmksa(bssid)
|
|
|
|
if pmksa1b is None:
|
|
|
|
raise Exception("No PMKSA cache entry found")
|
|
|
|
if pmksa['pmkid'] != pmksa1b['pmkid']:
|
|
|
|
raise Exception("Unexpected PMKID change for AP1")
|
|
|
|
|
|
|
|
wpas.dump_monitor()
|
|
|
|
if "FAIL" in wpas.request("PMKSA_FLUSH"):
|
|
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
if wpas.get_pmksa(bssid) is not None or wpas.get_pmksa(bssid2) is not None:
|
|
|
|
raise Exception("PMKSA_FLUSH did not remove PMKSA entries")
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_disconnected(timeout=5)
|
|
|
|
wpas.wait_connected(timeout=15, error="Reconnection timed out")
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
def test_wext_wep_open_auth(dev, apdev):
|
|
|
|
"""WEP Open System authentication"""
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0],
|
2019-03-15 11:10:37 +01:00
|
|
|
{"ssid": "wep-open",
|
|
|
|
"wep_key0": '"hello"'})
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.connect("wep-open", key_mgmt="NONE", wep_key0='"hello"',
|
|
|
|
scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
|
|
|
if "[WEP]" not in wpas.request("SCAN_RESULTS"):
|
|
|
|
raise Exception("WEP flag not indicated in scan results")
|
|
|
|
|
|
|
|
def test_wext_wep_shared_key_auth(dev, apdev):
|
|
|
|
"""WEP Shared Key authentication"""
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0],
|
2019-03-15 11:10:37 +01:00
|
|
|
{"ssid": "wep-shared-key",
|
|
|
|
"wep_key0": '"hello12345678"',
|
|
|
|
"auth_algs": "2"})
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.connect("wep-shared-key", key_mgmt="NONE", auth_alg="SHARED",
|
|
|
|
wep_key0='"hello12345678"', scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
|
|
|
wpas.request("REMOVE_NETWORK all")
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_disconnected(timeout=5)
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.connect("wep-shared-key", key_mgmt="NONE", auth_alg="OPEN SHARED",
|
|
|
|
wep_key0='"hello12345678"', scan_freq="2412")
|
|
|
|
|
|
|
|
def test_wext_pmf(dev, apdev):
|
|
|
|
"""WEXT driver interface with WPA2-PSK and PMF"""
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
|
|
|
params = hostapd.wpa2_params(ssid="wext-wpa2-psk", passphrase="12345678")
|
2016-07-03 18:37:50 +02:00
|
|
|
params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
|
|
|
|
params["ieee80211w"] = "2"
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
wpas.connect("wext-wpa2-psk", psk="12345678", ieee80211w="1",
|
|
|
|
key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
|
|
|
|
scan_freq="2412")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
addr = wpas.p2p_interface_addr()
|
|
|
|
hapd.request("DEAUTHENTICATE " + addr)
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_disconnected(timeout=5)
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
def test_wext_scan_hidden(dev, apdev):
|
|
|
|
"""WEXT with hidden SSID"""
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
2019-03-15 11:10:37 +01:00
|
|
|
hapd = hostapd.add_ap(apdev[0], {"ssid": "test-scan",
|
|
|
|
"ignore_broadcast_ssid": "1"})
|
|
|
|
hapd2 = hostapd.add_ap(apdev[1], {"ssid": "test-scan2",
|
|
|
|
"ignore_broadcast_ssid": "1"})
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
id1 = wpas.connect("test-scan", key_mgmt="NONE", scan_ssid="1",
|
|
|
|
only_add_network=True)
|
|
|
|
|
|
|
|
wpas.request("SCAN scan_id=%d" % id1)
|
|
|
|
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan did not complete")
|
|
|
|
|
|
|
|
if "test-scan" not in wpas.request("SCAN_RESULTS"):
|
|
|
|
raise Exception("Did not find hidden SSID in scan")
|
|
|
|
|
|
|
|
id = wpas.connect("test-scan2", key_mgmt="NONE", scan_ssid="1",
|
|
|
|
only_add_network=True)
|
|
|
|
wpas.connect_network(id, timeout=30)
|
2014-12-20 12:36:01 +01:00
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
hapd2.disable()
|
|
|
|
hapd.disable()
|
|
|
|
wpas.interface_remove("wlan5")
|
|
|
|
wpas.interface_add("wlan5")
|
|
|
|
wpas.flush_scan_cache(freq=2412)
|
|
|
|
wpas.flush_scan_cache()
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
def test_wext_rfkill(dev, apdev):
|
|
|
|
"""WEXT and rfkill block/unblock"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5")
|
2015-01-08 14:59:16 +01:00
|
|
|
rfk = get_rfkill(wpas)
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.interface_remove("wlan5")
|
|
|
|
|
|
|
|
wpas = get_wext_interface()
|
|
|
|
|
2019-03-15 11:10:37 +01:00
|
|
|
hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
|
2014-11-29 15:46:43 +01:00
|
|
|
wpas.connect("open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
try:
|
|
|
|
logger.info("rfkill block")
|
2015-01-08 14:59:16 +01:00
|
|
|
rfk.block()
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_disconnected(timeout=10,
|
|
|
|
error="Missing disconnection event on rfkill block")
|
2014-11-29 15:46:43 +01:00
|
|
|
|
|
|
|
logger.info("rfkill unblock")
|
2015-01-08 14:59:16 +01:00
|
|
|
rfk.unblock()
|
2014-12-20 10:51:30 +01:00
|
|
|
wpas.wait_connected(timeout=20,
|
|
|
|
error="Missing connection event on rfkill unblock")
|
2014-11-29 15:46:43 +01:00
|
|
|
hwsim_utils.test_connectivity(wpas, hapd)
|
|
|
|
finally:
|
2015-01-08 14:59:16 +01:00
|
|
|
rfk.unblock()
|