2013-03-30 10:28:39 +01:00
|
|
|
# Roaming tests
|
|
|
|
# Copyright (c) 2013, Jouni Malinen <j@w1.fi>
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
from remotehost import remote_compatible
|
2013-03-30 10:28:39 +01:00
|
|
|
import time
|
|
|
|
import logging
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2013-03-30 10:28:39 +01:00
|
|
|
|
|
|
|
import hwsim_utils
|
|
|
|
import hostapd
|
2016-09-20 08:40:05 +02:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2013-03-30 10:28:39 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2013-03-31 15:16:37 +02:00
|
|
|
def test_ap_roam_open(dev, apdev):
|
2013-03-30 10:28:39 +01:00
|
|
|
"""Roam between two open APs"""
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd0 = hostapd.add_ap(apdev[0], { "ssid": "test-open" })
|
2013-03-30 10:28:39 +01:00
|
|
|
dev[0].connect("test-open", key_mgmt="NONE")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd1 = hostapd.add_ap(apdev[1], { "ssid": "test-open" })
|
2013-03-30 10:28:39 +01:00
|
|
|
dev[0].scan(type="ONLY")
|
2013-03-31 15:16:37 +02:00
|
|
|
dev[0].roam(apdev[1]['bssid'])
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd1)
|
2013-03-31 15:16:37 +02:00
|
|
|
dev[0].roam(apdev[0]['bssid'])
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
2013-03-30 10:28:39 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2016-04-07 12:31:55 +02:00
|
|
|
def test_ap_roam_open_failed(dev, apdev):
|
|
|
|
"""Roam failure due to rejected authentication"""
|
|
|
|
hapd0 = hostapd.add_ap(apdev[0], { "ssid": "test-open" })
|
|
|
|
dev[0].connect("test-open", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
params = { "ssid": "test-open", "max_num_sta" : "0" }
|
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
bssid = hapd1.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
if "OK" not in dev[0].request("ROAM " + bssid):
|
|
|
|
raise Exception("ROAM failed")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-AUTH-REJECT"], 1)
|
|
|
|
if not ev:
|
|
|
|
raise Exception("CTRL-EVENT-AUTH-REJECT was not seen")
|
|
|
|
|
|
|
|
dev[0].wait_connected(timeout=5)
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2013-03-31 15:16:37 +02:00
|
|
|
def test_ap_roam_wpa2_psk(dev, apdev):
|
2013-03-30 10:28:39 +01:00
|
|
|
"""Roam between two WPA2-PSK APs"""
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
2013-03-30 10:28:39 +01:00
|
|
|
dev[0].connect("test-wpa2-psk", psk="12345678")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
2013-03-30 10:28:39 +01:00
|
|
|
dev[0].scan(type="ONLY")
|
2013-03-31 15:16:37 +02:00
|
|
|
dev[0].roam(apdev[1]['bssid'])
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd1)
|
2013-03-31 15:16:37 +02:00
|
|
|
dev[0].roam(apdev[0]['bssid'])
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
2014-03-11 19:08:18 +01:00
|
|
|
|
2016-09-20 08:40:05 +02:00
|
|
|
def get_blacklist(dev):
|
|
|
|
return dev.request("BLACKLIST").splitlines()
|
|
|
|
|
2016-09-20 08:40:06 +02:00
|
|
|
def test_ap_reconnect_auth_timeout(dev, apdev, params):
|
|
|
|
"""Reconnect to 2nd AP and authentication times out"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5",
|
|
|
|
drv_params="force_connect_cmd=1,force_bss_selection=1")
|
|
|
|
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
|
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid0 = hapd0.own_addr()
|
|
|
|
|
|
|
|
wpas.scan_for_bss(bssid0, freq=2412)
|
|
|
|
id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd0)
|
|
|
|
|
2018-08-22 19:31:45 +02:00
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
bssid1 = hapd1.own_addr()
|
|
|
|
|
2016-09-20 08:40:06 +02:00
|
|
|
wpas.request("BLACKLIST " + bssid0)
|
|
|
|
|
|
|
|
wpas.scan_for_bss(bssid1, freq=2412)
|
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
if "OK" not in wpas.request("SET ignore_auth_resp 1"):
|
|
|
|
raise Exception("SET ignore_auth_resp failed")
|
|
|
|
if "OK" not in wpas.request("ENABLE_NETWORK " + str(id)):
|
|
|
|
raise Exception("ENABLE_NETWORK failed")
|
|
|
|
if "OK" not in wpas.request("SELECT_NETWORK " + str(id)):
|
|
|
|
raise Exception("SELECT_NETWORK failed")
|
|
|
|
|
|
|
|
logger.info("Wait ~10s for auth timeout...")
|
|
|
|
time.sleep(10)
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], 12)
|
|
|
|
if not ev:
|
|
|
|
raise Exception("CTRL-EVENT-SCAN-STARTED not seen");
|
|
|
|
|
|
|
|
b = get_blacklist(wpas)
|
|
|
|
if '00:00:00:00:00:00' in b:
|
|
|
|
raise Exception("Unexpected blacklist contents: " + str(b))
|
|
|
|
if bssid1 not in b:
|
|
|
|
raise Exception("Unexpected blacklist contents: " + str(b))
|
|
|
|
|
2016-09-20 08:40:05 +02:00
|
|
|
def test_ap_roam_with_reassoc_auth_timeout(dev, apdev, params):
|
|
|
|
"""Roam using reassoc between two APs and authentication times out"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5",
|
|
|
|
drv_params="force_connect_cmd=1,force_bss_selection=1")
|
|
|
|
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
|
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid0 = hapd0.own_addr()
|
|
|
|
|
|
|
|
id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd0)
|
|
|
|
|
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
bssid1 = hapd1.own_addr()
|
|
|
|
wpas.scan_for_bss(bssid1, freq=2412)
|
|
|
|
|
|
|
|
if "OK" not in wpas.request("SET_NETWORK " + str(id) + " bssid " + bssid1):
|
|
|
|
raise Exception("SET_NETWORK failed")
|
|
|
|
if "OK" not in wpas.request("SET ignore_auth_resp 1"):
|
|
|
|
raise Exception("SET ignore_auth_resp failed")
|
|
|
|
if "OK" not in wpas.request("REASSOCIATE"):
|
|
|
|
raise Exception("REASSOCIATE failed")
|
|
|
|
|
|
|
|
logger.info("Wait ~10s for auth timeout...")
|
|
|
|
time.sleep(10)
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], 12)
|
|
|
|
if not ev:
|
|
|
|
raise Exception("CTRL-EVENT-SCAN-STARTED not seen");
|
|
|
|
|
|
|
|
b = get_blacklist(wpas)
|
|
|
|
if bssid0 in b:
|
|
|
|
raise Exception("Unexpected blacklist contents: " + str(b))
|
|
|
|
|
2016-04-07 12:31:55 +02:00
|
|
|
def test_ap_roam_wpa2_psk_failed(dev, apdev, params):
|
|
|
|
"""Roam failure with WPA2-PSK AP due to wrong passphrase"""
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
|
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
id = dev[0].connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
params['wpa_passphrase'] = "22345678"
|
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
bssid = hapd1.own_addr()
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
|
|
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
if "OK" not in dev[0].request("ROAM " + bssid):
|
|
|
|
raise Exception("ROAM failed")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SSID-TEMP-DISABLED",
|
2016-04-24 23:19:40 +02:00
|
|
|
"CTRL-EVENT-CONNECTED"], 5)
|
2016-04-07 12:31:55 +02:00
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
raise Exception("Got unexpected CTRL-EVENT-CONNECTED")
|
|
|
|
if "CTRL-EVENT-SSID-TEMP-DISABLED" not in ev:
|
|
|
|
raise Exception("CTRL-EVENT-SSID-TEMP-DISABLED not seen")
|
|
|
|
|
|
|
|
if "OK" not in dev[0].request("SELECT_NETWORK id=" + str(id)):
|
|
|
|
raise Exception("SELECT_NETWORK failed")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SSID-REENABLED"], 3)
|
|
|
|
if not ev:
|
2016-07-03 18:37:50 +02:00
|
|
|
raise Exception("CTRL-EVENT-SSID-REENABLED not seen")
|
2016-04-07 12:31:55 +02:00
|
|
|
|
|
|
|
dev[0].wait_connected(timeout=5)
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-03-11 19:08:18 +01:00
|
|
|
def test_ap_reassociation_to_same_bss(dev, apdev):
|
|
|
|
"""Reassociate to the same BSS"""
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "test-open" })
|
2014-03-11 19:08:18 +01:00
|
|
|
dev[0].connect("test-open", key_mgmt="NONE")
|
|
|
|
|
|
|
|
dev[0].request("REASSOCIATE")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_connected(timeout=10, error="Reassociation timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-03-11 19:08:18 +01:00
|
|
|
|
|
|
|
dev[0].request("REATTACH")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_connected(timeout=10, error="Reattach timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-09-11 14:56:37 +02:00
|
|
|
|
2016-05-28 22:28:15 +02:00
|
|
|
# Wait for previous scan results to expire to trigger new scan
|
|
|
|
time.sleep(5)
|
|
|
|
dev[0].request("REATTACH")
|
|
|
|
dev[0].wait_connected(timeout=10, error="Reattach timed out")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2014-09-11 14:56:37 +02:00
|
|
|
def test_ap_roam_set_bssid(dev, apdev):
|
|
|
|
"""Roam control"""
|
2016-03-30 10:55:56 +02:00
|
|
|
hostapd.add_ap(apdev[0], { "ssid": "test-open" })
|
|
|
|
hostapd.add_ap(apdev[1], { "ssid": "test-open" })
|
2014-09-11 14:56:37 +02:00
|
|
|
id = dev[0].connect("test-open", key_mgmt="NONE", bssid=apdev[1]['bssid'],
|
|
|
|
scan_freq="2412")
|
|
|
|
if dev[0].get_status_field('bssid') != apdev[1]['bssid']:
|
|
|
|
raise Exception("Unexpected BSS")
|
|
|
|
# for now, these are just verifying that the code path to indicate
|
|
|
|
# within-ESS roaming changes can be executed; the actual results of those
|
|
|
|
# operations are not currently verified (that would require a test driver
|
|
|
|
# that does BSS selection)
|
|
|
|
dev[0].set_network(id, "bssid", "")
|
|
|
|
dev[0].set_network(id, "bssid", apdev[0]['bssid'])
|
|
|
|
dev[0].set_network(id, "bssid", apdev[1]['bssid'])
|
2016-01-15 18:16:07 +01:00
|
|
|
|
2016-06-23 19:16:36 +02:00
|
|
|
@remote_compatible
|
2016-01-15 18:16:07 +01:00
|
|
|
def test_ap_roam_wpa2_psk_race(dev, apdev):
|
|
|
|
"""Roam between two WPA2-PSK APs and try to hit a disconnection race"""
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
2016-01-15 18:16:07 +01:00
|
|
|
dev[0].connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
|
|
|
|
params['channel'] = '2'
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
2016-01-15 18:16:07 +01:00
|
|
|
dev[0].scan_for_bss(apdev[1]['bssid'], freq=2417)
|
|
|
|
dev[0].roam(apdev[1]['bssid'])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd1)
|
|
|
|
dev[0].roam(apdev[0]['bssid'])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|
|
|
|
# Wait at least two seconds to trigger the previous issue with the
|
|
|
|
# disconnection callback.
|
|
|
|
for i in range(3):
|
|
|
|
time.sleep(0.8)
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd0)
|