2013-12-26 17:18:10 +01:00
|
|
|
# Scanning tests
|
2015-01-04 22:05:47 +01:00
|
|
|
# Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
|
2013-12-26 17:18:10 +01:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import time
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
2014-04-12 18:48:57 +02:00
|
|
|
import os
|
2014-01-04 09:35:01 +01:00
|
|
|
import subprocess
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
import hostapd
|
2014-10-27 23:24:11 +01:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2015-01-07 12:41:31 +01:00
|
|
|
from utils import HwsimSkip
|
2013-12-26 17:18:10 +01:00
|
|
|
|
2014-12-12 00:13:35 +01:00
|
|
|
def check_scan(dev, params, other_started=False, test_busy=False):
|
2014-01-04 09:35:01 +01:00
|
|
|
if not other_started:
|
|
|
|
dev.dump_monitor()
|
2013-12-26 17:18:10 +01:00
|
|
|
id = dev.request("SCAN " + params)
|
|
|
|
if "FAIL" in id:
|
|
|
|
raise Exception("Failed to start scan")
|
|
|
|
id = int(id)
|
|
|
|
|
2014-12-12 00:13:35 +01:00
|
|
|
if test_busy:
|
|
|
|
if "FAIL-BUSY" not in dev.request("SCAN"):
|
|
|
|
raise Exception("SCAN command while already scanning not rejected")
|
|
|
|
|
2014-01-04 09:35:01 +01:00
|
|
|
if other_started:
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Other scan did not start")
|
|
|
|
if "id=" + str(id) in ev:
|
|
|
|
raise Exception("Own scan id unexpectedly included in start event")
|
|
|
|
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Other scan did not complete")
|
|
|
|
if "id=" + str(id) in ev:
|
|
|
|
raise Exception("Own scan id unexpectedly included in completed event")
|
|
|
|
|
2013-12-26 17:18:10 +01:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan did not start")
|
|
|
|
if "id=" + str(id) not in ev:
|
|
|
|
raise Exception("Scan id not included in start event")
|
2014-12-12 00:13:35 +01:00
|
|
|
if test_busy:
|
|
|
|
if "FAIL-BUSY" not in dev.request("SCAN"):
|
|
|
|
raise Exception("SCAN command while already scanning not rejected")
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan did not complete")
|
|
|
|
if "id=" + str(id) not in ev:
|
|
|
|
raise Exception("Scan id not included in completed event")
|
|
|
|
|
2014-05-14 11:54:13 +02:00
|
|
|
def check_scan_retry(dev, params, bssid):
|
|
|
|
for i in range(0, 5):
|
|
|
|
check_scan(dev, "freq=2412-2462,5180 use_id=1")
|
|
|
|
if int(dev.get_bss(bssid)['age']) <= 1:
|
|
|
|
return
|
|
|
|
raise Exception("Unexpectedly old BSS entry")
|
|
|
|
|
2013-12-26 17:18:10 +01:00
|
|
|
def test_scan(dev, apdev):
|
|
|
|
"""Control interface behavior on scan parameters"""
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
logger.info("Full scan")
|
2014-12-12 00:13:35 +01:00
|
|
|
check_scan(dev[0], "use_id=1", test_busy=True)
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
logger.info("Limited channel scan")
|
2014-05-14 11:54:13 +02:00
|
|
|
check_scan_retry(dev[0], "freq=2412-2462,5180 use_id=1", bssid)
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
# wait long enough to allow next scans to be verified not to find the AP
|
|
|
|
time.sleep(2)
|
|
|
|
|
|
|
|
logger.info("Passive single-channel scan")
|
|
|
|
check_scan(dev[0], "freq=2457 passive=1 use_id=1")
|
|
|
|
logger.info("Active single-channel scan")
|
|
|
|
check_scan(dev[0], "freq=2452 passive=0 use_id=1")
|
|
|
|
if int(dev[0].get_bss(bssid)['age']) < 2:
|
|
|
|
raise Exception("Unexpectedly updated BSS entry")
|
|
|
|
|
|
|
|
logger.info("Active single-channel scan on AP's operating channel")
|
2014-05-14 11:54:13 +02:00
|
|
|
check_scan_retry(dev[0], "freq=2412 passive=0 use_id=1", bssid)
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
def test_scan_only(dev, apdev):
|
|
|
|
"""Control interface behavior on scan parameters with type=only"""
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
logger.info("Full scan")
|
|
|
|
check_scan(dev[0], "type=only use_id=1")
|
|
|
|
|
|
|
|
logger.info("Limited channel scan")
|
2014-05-14 11:54:13 +02:00
|
|
|
check_scan_retry(dev[0], "type=only freq=2412-2462,5180 use_id=1", bssid)
|
2013-12-26 17:18:10 +01:00
|
|
|
|
|
|
|
# wait long enough to allow next scans to be verified not to find the AP
|
|
|
|
time.sleep(2)
|
|
|
|
|
|
|
|
logger.info("Passive single-channel scan")
|
|
|
|
check_scan(dev[0], "type=only freq=2457 passive=1 use_id=1")
|
|
|
|
logger.info("Active single-channel scan")
|
|
|
|
check_scan(dev[0], "type=only freq=2452 passive=0 use_id=1")
|
|
|
|
if int(dev[0].get_bss(bssid)['age']) < 2:
|
|
|
|
raise Exception("Unexpectedly updated BSS entry")
|
|
|
|
|
|
|
|
logger.info("Active single-channel scan on AP's operating channel")
|
2014-05-14 11:54:13 +02:00
|
|
|
check_scan_retry(dev[0], "type=only freq=2412 passive=0 use_id=1", bssid)
|
2014-01-04 09:35:01 +01:00
|
|
|
|
|
|
|
def test_scan_external_trigger(dev, apdev):
|
|
|
|
"""Avoid operations during externally triggered scan"""
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
subprocess.call(['sudo', 'iw', dev[0].ifname, 'scan', 'trigger'])
|
|
|
|
check_scan(dev[0], "use_id=1", other_started=True)
|
2014-04-12 16:16:07 +02:00
|
|
|
|
|
|
|
def test_scan_bss_expiration_count(dev, apdev):
|
|
|
|
"""BSS entry expiration based on scan results without match"""
|
|
|
|
if "FAIL" not in dev[0].request("BSS_EXPIRE_COUNT 0"):
|
|
|
|
raise Exception("Invalid BSS_EXPIRE_COUNT accepted")
|
|
|
|
if "OK" not in dev[0].request("BSS_EXPIRE_COUNT 2"):
|
|
|
|
raise Exception("BSS_EXPIRE_COUNT failed")
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
dev[0].scan(freq="2412", only_new=True)
|
|
|
|
if bssid not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS not found in initial scan")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
dev[0].scan(freq="2412", only_new=True)
|
|
|
|
if bssid not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS not found in first scan without match")
|
|
|
|
dev[0].scan(freq="2412", only_new=True)
|
|
|
|
if bssid in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS found after two scans without match")
|
|
|
|
|
|
|
|
def test_scan_bss_expiration_age(dev, apdev):
|
|
|
|
"""BSS entry expiration based on age"""
|
|
|
|
try:
|
|
|
|
if "FAIL" not in dev[0].request("BSS_EXPIRE_AGE COUNT 9"):
|
|
|
|
raise Exception("Invalid BSS_EXPIRE_AGE accepted")
|
|
|
|
if "OK" not in dev[0].request("BSS_EXPIRE_AGE 10"):
|
|
|
|
raise Exception("BSS_EXPIRE_AGE failed")
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
if bssid not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS not found in initial scan")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
logger.info("Waiting for BSS entry to expire")
|
|
|
|
time.sleep(7)
|
|
|
|
if bssid not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS expired too quickly")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-BSS-REMOVED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("BSS entry expiration timed out")
|
|
|
|
if bssid in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS not removed after expiration time")
|
|
|
|
finally:
|
|
|
|
dev[0].request("BSS_EXPIRE_AGE 180")
|
2014-04-12 18:43:24 +02:00
|
|
|
|
|
|
|
def test_scan_filter(dev, apdev):
|
|
|
|
"""Filter scan results based on SSID"""
|
|
|
|
try:
|
|
|
|
if "OK" not in dev[0].request("SET filter_ssids 1"):
|
|
|
|
raise Exception("SET failed")
|
2014-12-19 19:26:07 +01:00
|
|
|
id = dev[0].connect("test-scan", key_mgmt="NONE", only_add_network=True)
|
2014-04-12 18:43:24 +02:00
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], { "ssid": "test-scan2" })
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
dev[0].scan(freq="2412", only_new=True)
|
|
|
|
if bssid not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS not found in scan results")
|
|
|
|
if bssid2 in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("Unexpected BSS found in scan results")
|
2014-12-19 19:26:07 +01:00
|
|
|
dev[0].set_network_quoted(id, "ssid", "")
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
id2 = dev[0].connect("test", key_mgmt="NONE", only_add_network=True)
|
|
|
|
dev[0].scan(freq="2412")
|
2014-04-12 18:43:24 +02:00
|
|
|
finally:
|
|
|
|
dev[0].request("SET filter_ssids 0")
|
2014-04-12 18:48:57 +02:00
|
|
|
|
|
|
|
def test_scan_int(dev, apdev):
|
|
|
|
"""scan interval configuration"""
|
|
|
|
try:
|
|
|
|
if "FAIL" not in dev[0].request("SCAN_INTERVAL -1"):
|
|
|
|
raise Exception("Accepted invalid scan interval")
|
|
|
|
if "OK" not in dev[0].request("SCAN_INTERVAL 1"):
|
|
|
|
raise Exception("Failed to set scan interval")
|
|
|
|
dev[0].connect("not-used", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
times = {}
|
|
|
|
for i in range(0, 3):
|
|
|
|
logger.info("Waiting for scan to start")
|
|
|
|
start = os.times()[4]
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("did not start a scan")
|
|
|
|
stop = os.times()[4]
|
|
|
|
times[i] = stop - start
|
|
|
|
logger.info("Waiting for scan to complete")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("did not complete a scan")
|
2014-12-24 12:06:25 +01:00
|
|
|
logger.info("times=" + str(times))
|
2014-04-12 18:48:57 +02:00
|
|
|
if times[0] > 1 or times[1] < 0.5 or times[1] > 1.5 or times[2] < 0.5 or times[2] > 1.5:
|
|
|
|
raise Exception("Unexpected scan timing: " + str(times))
|
|
|
|
finally:
|
|
|
|
dev[0].request("SCAN_INTERVAL 5")
|
2014-04-26 21:01:55 +02:00
|
|
|
|
|
|
|
def test_scan_bss_operations(dev, apdev):
|
|
|
|
"""Control interface behavior on BSS parameters"""
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], { "ssid": "test2-scan" })
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
|
2014-05-11 17:18:58 +02:00
|
|
|
id1 = dev[0].request("BSS FIRST MASK=0x1").splitlines()[0].split('=')[1]
|
|
|
|
id2 = dev[0].request("BSS LAST MASK=0x1").splitlines()[0].split('=')[1]
|
|
|
|
|
2014-04-26 21:01:55 +02:00
|
|
|
res = dev[0].request("BSS RANGE=ALL MASK=0x20001")
|
2014-05-11 17:18:58 +02:00
|
|
|
if "id=" + id1 not in res:
|
|
|
|
raise Exception("Missing BSS " + id1)
|
|
|
|
if "id=" + id2 not in res:
|
|
|
|
raise Exception("Missing BSS " + id2)
|
2014-04-26 21:01:55 +02:00
|
|
|
if "====" not in res:
|
|
|
|
raise Exception("Missing delim")
|
|
|
|
if "####" not in res:
|
|
|
|
raise Exception("Missing end")
|
|
|
|
|
2014-12-08 16:47:06 +01:00
|
|
|
res = dev[0].request("BSS RANGE=ALL MASK=0")
|
|
|
|
if "id=" + id1 not in res:
|
|
|
|
raise Exception("Missing BSS " + id1)
|
|
|
|
if "id=" + id2 not in res:
|
|
|
|
raise Exception("Missing BSS " + id2)
|
|
|
|
if "====" in res:
|
|
|
|
raise Exception("Unexpected delim")
|
|
|
|
if "####" in res:
|
|
|
|
raise Exception("Unexpected end delim")
|
|
|
|
|
2014-04-26 21:01:55 +02:00
|
|
|
res = dev[0].request("BSS RANGE=ALL MASK=0x1").splitlines()
|
|
|
|
if len(res) != 2:
|
2014-12-23 15:15:11 +01:00
|
|
|
raise Exception("Unexpected result: " + str(res))
|
2014-04-26 21:01:55 +02:00
|
|
|
res = dev[0].request("BSS FIRST MASK=0x1")
|
2014-05-11 17:18:58 +02:00
|
|
|
if "id=" + id1 not in res:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected result: " + res)
|
|
|
|
res = dev[0].request("BSS LAST MASK=0x1")
|
2014-05-11 17:18:58 +02:00
|
|
|
if "id=" + id2 not in res:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected result: " + res)
|
2014-05-11 17:18:58 +02:00
|
|
|
res = dev[0].request("BSS ID-" + id1 + " MASK=0x1")
|
|
|
|
if "id=" + id1 not in res:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected result: " + res)
|
2014-05-11 17:18:58 +02:00
|
|
|
res = dev[0].request("BSS NEXT-" + id1 + " MASK=0x1")
|
|
|
|
if "id=" + id2 not in res:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected result: " + res)
|
2014-12-08 16:47:06 +01:00
|
|
|
res = dev[0].request("BSS NEXT-" + id2 + " MASK=0x1")
|
|
|
|
if "id=" in res:
|
|
|
|
raise Exception("Unexpected result: " + res)
|
2014-04-26 21:01:55 +02:00
|
|
|
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=" + id2 + " MASK=0x1").splitlines()) != 0:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=1 result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=" + id1 + "- MASK=0x1").splitlines()) != 2:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=0- result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=-" + id2 + " MASK=0x1").splitlines()) != 2:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=-1 result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=" + id1 + "-" + id2 + " MASK=0x1").splitlines()) != 2:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=0-1 result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=" + id2 + "-" + id2 + " MASK=0x1").splitlines()) != 1:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=1-1 result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=" + str(int(id2) + 1) + "-" + str(int(id2) + 10) + " MASK=0x1").splitlines()) != 0:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=2-10 result")
|
2014-05-11 17:18:58 +02:00
|
|
|
if len(dev[0].request("BSS RANGE=0-" + str(int(id2) + 10) + " MASK=0x1").splitlines()) != 2:
|
2014-04-26 21:01:55 +02:00
|
|
|
raise Exception("Unexpected RANGE=0-10 result")
|
2014-12-08 16:47:06 +01:00
|
|
|
if len(dev[0].request("BSS RANGE=" + id1 + "-" + id1 + " MASK=0x1").splitlines()) != 1:
|
|
|
|
raise Exception("Unexpected RANGE=0-0 result")
|
|
|
|
|
|
|
|
res = dev[0].request("BSS p2p_dev_addr=FOO")
|
|
|
|
if "FAIL" in res or "id=" in res:
|
|
|
|
raise Exception("Unexpected result: " + res)
|
|
|
|
res = dev[0].request("BSS p2p_dev_addr=00:11:22:33:44:55")
|
|
|
|
if "FAIL" in res or "id=" in res:
|
|
|
|
raise Exception("Unexpected result: " + res)
|
|
|
|
|
|
|
|
dev[0].request("BSS_FLUSH 1000")
|
|
|
|
res = dev[0].request("BSS RANGE=ALL MASK=0x1").splitlines()
|
|
|
|
if len(res) != 2:
|
|
|
|
raise Exception("Unexpected result after BSS_FLUSH 1000")
|
|
|
|
dev[0].request("BSS_FLUSH 0")
|
|
|
|
res = dev[0].request("BSS RANGE=ALL MASK=0x1").splitlines()
|
|
|
|
if len(res) != 0:
|
|
|
|
raise Exception("Unexpected result after BSS_FLUSH 0")
|
2014-05-15 20:10:52 +02:00
|
|
|
|
|
|
|
def test_scan_and_interface_disabled(dev, apdev):
|
|
|
|
"""Scan operation when interface gets disabled"""
|
|
|
|
try:
|
|
|
|
dev[0].request("SCAN")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan did not start")
|
|
|
|
dev[0].request("DRIVER_EVENT INTERFACE_DISABLED")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=7)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Scan completed unexpectedly")
|
|
|
|
|
|
|
|
# verify that scan is rejected
|
|
|
|
if "FAIL" not in dev[0].request("SCAN"):
|
|
|
|
raise Exception("New scan request was accepted unexpectedly")
|
|
|
|
|
|
|
|
dev[0].request("DRIVER_EVENT INTERFACE_ENABLED")
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
finally:
|
|
|
|
dev[0].request("DRIVER_EVENT INTERFACE_ENABLED")
|
2014-06-01 23:26:23 +02:00
|
|
|
|
|
|
|
def test_scan_for_auth(dev, apdev):
|
|
|
|
"""cfg80211 workaround with scan-for-auth"""
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
|
|
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
|
|
|
|
# Block sme-connect radio work with an external radio work item, so that
|
|
|
|
# SELECT_NETWORK can decide to use fast associate without a new scan while
|
|
|
|
# cfg80211 still has the matching BSS entry, but the actual connection is
|
|
|
|
# not yet started.
|
|
|
|
id = dev[0].request("RADIO_WORK add block-work")
|
|
|
|
ev = dev[0].wait_event(["EXT-RADIO-WORK-START"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout while waiting radio work to start")
|
|
|
|
dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
2014-12-01 16:50:58 +01:00
|
|
|
dev[0].dump_monitor()
|
2014-06-01 23:26:23 +02:00
|
|
|
# Clear cfg80211 BSS table.
|
2014-12-01 16:50:58 +01:00
|
|
|
subprocess.call(['iw', dev[0].ifname, 'scan', 'trigger',
|
|
|
|
'freq', '2457', 'flush'])
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("External flush scan timed out")
|
2014-06-01 23:26:23 +02:00
|
|
|
# Release blocking radio work to allow connection to go through with the
|
|
|
|
# cfg80211 BSS entry missing.
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_connected(timeout=15)
|
2014-07-01 22:57:57 +02:00
|
|
|
|
2014-12-20 16:22:18 +01:00
|
|
|
def test_scan_for_auth_fail(dev, apdev):
|
|
|
|
"""cfg80211 workaround with scan-for-auth failing"""
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
|
|
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
|
|
|
|
# Block sme-connect radio work with an external radio work item, so that
|
|
|
|
# SELECT_NETWORK can decide to use fast associate without a new scan while
|
|
|
|
# cfg80211 still has the matching BSS entry, but the actual connection is
|
|
|
|
# not yet started.
|
|
|
|
id = dev[0].request("RADIO_WORK add block-work")
|
|
|
|
ev = dev[0].wait_event(["EXT-RADIO-WORK-START"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout while waiting radio work to start")
|
|
|
|
dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
hapd.disable()
|
|
|
|
# Clear cfg80211 BSS table.
|
|
|
|
subprocess.call(['iw', dev[0].ifname, 'scan', 'trigger',
|
|
|
|
'freq', '2457', 'flush'])
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("External flush scan timed out")
|
|
|
|
# Release blocking radio work to allow connection to go through with the
|
|
|
|
# cfg80211 BSS entry missing.
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS",
|
|
|
|
"CTRL-EVENT-CONNECTED"], 15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan event missing")
|
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
raise Exception("Unexpected connection")
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
|
2014-12-20 16:28:53 +01:00
|
|
|
def test_scan_for_auth_wep(dev, apdev):
|
|
|
|
"""cfg80211 scan-for-auth workaround with WEP keys"""
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'],
|
|
|
|
{ "ssid": "wep", "wep_key0": '"abcde"',
|
|
|
|
"auth_algs": "2" })
|
|
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
|
|
|
|
# Block sme-connect radio work with an external radio work item, so that
|
|
|
|
# SELECT_NETWORK can decide to use fast associate without a new scan while
|
|
|
|
# cfg80211 still has the matching BSS entry, but the actual connection is
|
|
|
|
# not yet started.
|
|
|
|
id = dev[0].request("RADIO_WORK add block-work")
|
|
|
|
ev = dev[0].wait_event(["EXT-RADIO-WORK-START"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout while waiting radio work to start")
|
|
|
|
dev[0].connect("wep", key_mgmt="NONE", wep_key0='"abcde"',
|
|
|
|
auth_alg="SHARED", scan_freq="2412", wait_connect=False)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
# Clear cfg80211 BSS table.
|
|
|
|
subprocess.call(['iw', dev[0].ifname, 'scan', 'trigger',
|
|
|
|
'freq', '2457', 'flush'])
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("External flush scan timed out")
|
|
|
|
# Release blocking radio work to allow connection to go through with the
|
|
|
|
# cfg80211 BSS entry missing.
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
|
|
|
|
dev[0].wait_connected(timeout=15)
|
|
|
|
|
2014-07-01 22:57:57 +02:00
|
|
|
def test_scan_hidden(dev, apdev):
|
|
|
|
"""Control interface behavior on scan parameters"""
|
2014-12-21 20:58:47 +01:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan",
|
|
|
|
"ignore_broadcast_ssid": "1" })
|
2014-07-01 22:57:57 +02:00
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
check_scan(dev[0], "freq=2412 use_id=1")
|
|
|
|
if "test-scan" in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS unexpectedly found in initial scan")
|
|
|
|
|
|
|
|
id1 = dev[0].connect("foo", key_mgmt="NONE", scan_ssid="1",
|
|
|
|
only_add_network=True)
|
|
|
|
id2 = dev[0].connect("test-scan", key_mgmt="NONE", scan_ssid="1",
|
|
|
|
only_add_network=True)
|
|
|
|
id3 = dev[0].connect("bar", key_mgmt="NONE", only_add_network=True)
|
|
|
|
|
|
|
|
check_scan(dev[0], "freq=2412 use_id=1")
|
|
|
|
if "test-scan" in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("BSS unexpectedly found in scan")
|
|
|
|
|
2015-01-02 17:21:25 +01:00
|
|
|
# Allow multiple attempts to be more robust under heavy CPU load that can
|
|
|
|
# result in Probe Response frames getting sent only after the station has
|
|
|
|
# already stopped waiting for the response on the channel.
|
|
|
|
found = False
|
|
|
|
for i in range(10):
|
|
|
|
check_scan(dev[0], "scan_id=%d,%d,%d freq=2412 use_id=1" % (id1, id2, id3))
|
|
|
|
if "test-scan" in dev[0].request("SCAN_RESULTS"):
|
|
|
|
found = True
|
|
|
|
break
|
|
|
|
if not found:
|
2014-07-01 22:57:57 +02:00
|
|
|
raise Exception("BSS not found in scan")
|
2014-10-27 23:24:11 +01:00
|
|
|
|
2014-12-12 00:13:35 +01:00
|
|
|
if "FAIL" not in dev[0].request("SCAN scan_id=1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17"):
|
|
|
|
raise Exception("Too many scan_id values accepted")
|
|
|
|
|
2014-12-21 20:58:47 +01:00
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
2014-12-23 15:15:11 +01:00
|
|
|
hapd.disable()
|
2014-12-21 20:58:47 +01:00
|
|
|
dev[0].flush_scan_cache(freq=2432)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
|
2014-10-27 23:24:11 +01:00
|
|
|
def test_scan_and_bss_entry_removed(dev, apdev):
|
|
|
|
"""Last scan result and connect work processing on BSS entry update"""
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open",
|
|
|
|
"eap_server": "1",
|
|
|
|
"wps_state": "2" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
|
|
|
|
# Add a BSS entry
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
wpas.scan_for_bss(bssid, freq="2412")
|
|
|
|
|
|
|
|
# Start a connect radio work with a blocking entry preventing this from
|
|
|
|
# proceeding; this stores a pointer to the selected BSS entry.
|
|
|
|
id = dev[0].request("RADIO_WORK add block-work")
|
|
|
|
w_id = wpas.request("RADIO_WORK add block-work")
|
|
|
|
dev[0].wait_event(["EXT-RADIO-WORK-START"], timeout=1)
|
|
|
|
wpas.wait_event(["EXT-RADIO-WORK-START"], timeout=1)
|
|
|
|
nid = dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
w_nid = wpas.connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
|
|
|
# Remove the BSS entry
|
|
|
|
dev[0].request("BSS_FLUSH 0")
|
|
|
|
wpas.request("BSS_FLUSH 0")
|
|
|
|
|
|
|
|
# Allow the connect radio work to continue. The bss entry stored in the
|
|
|
|
# pending connect work is now stale. This will result in the connection
|
|
|
|
# attempt failing since the BSS entry does not exist.
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
wpas.request("RADIO_WORK done " + w_id)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection")
|
|
|
|
dev[0].remove_network(nid)
|
|
|
|
ev = wpas.wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection")
|
|
|
|
wpas.remove_network(w_nid)
|
|
|
|
time.sleep(0.5)
|
|
|
|
dev[0].request("BSS_FLUSH 0")
|
|
|
|
wpas.request("BSS_FLUSH 0")
|
|
|
|
|
|
|
|
# Add a BSS entry
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
wpas.scan_for_bss(bssid, freq="2412")
|
|
|
|
|
|
|
|
# Start a connect radio work with a blocking entry preventing this from
|
|
|
|
# proceeding; this stores a pointer to the selected BSS entry.
|
|
|
|
id = dev[0].request("RADIO_WORK add block-work")
|
|
|
|
w_id = wpas.request("RADIO_WORK add block-work")
|
|
|
|
dev[0].wait_event(["EXT-RADIO-WORK-START"], timeout=1)
|
|
|
|
wpas.wait_event(["EXT-RADIO-WORK-START"], timeout=1)
|
|
|
|
|
|
|
|
# Schedule a connection based on the current BSS entry.
|
|
|
|
dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
wpas.connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
|
|
|
|
# Update scan results with results that have longer set of IEs so that new
|
|
|
|
# memory needs to be allocated for the BSS entry.
|
|
|
|
hapd.request("WPS_PBC")
|
|
|
|
time.sleep(0.1)
|
|
|
|
subprocess.call(['iw', dev[0].ifname, 'scan', 'trigger', 'freq', '2412'])
|
|
|
|
subprocess.call(['iw', wpas.ifname, 'scan', 'trigger', 'freq', '2412'])
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
|
|
|
# Allow the connect radio work to continue. The bss entry stored in the
|
|
|
|
# pending connect work becomes stale during the scan and it must have been
|
|
|
|
# updated for the connection to work.
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
wpas.request("RADIO_WORK done " + w_id)
|
|
|
|
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_connected(timeout=15, error="No connection (sme-connect)")
|
|
|
|
wpas.wait_connected(timeout=15, error="No connection (connect)")
|
2014-12-12 11:07:09 +01:00
|
|
|
|
|
|
|
def test_scan_reqs_with_non_scan_radio_work(dev, apdev):
|
|
|
|
"""SCAN commands while non-scan radio_work is in progress"""
|
|
|
|
id = dev[0].request("RADIO_WORK add test-work-a")
|
|
|
|
ev = dev[0].wait_event(["EXT-RADIO-WORK-START"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout while waiting radio work to start")
|
|
|
|
|
|
|
|
if "OK" not in dev[0].request("SCAN"):
|
|
|
|
raise Exception("SCAN failed")
|
|
|
|
if "FAIL-BUSY" not in dev[0].request("SCAN"):
|
|
|
|
raise Exception("SCAN accepted while one is already pending")
|
|
|
|
if "FAIL-BUSY" not in dev[0].request("SCAN"):
|
|
|
|
raise Exception("SCAN accepted while one is already pending")
|
|
|
|
|
|
|
|
res = dev[0].request("RADIO_WORK show").splitlines()
|
|
|
|
count = 0
|
|
|
|
for l in res:
|
|
|
|
if "scan" in l:
|
|
|
|
count += 1
|
|
|
|
if count != 1:
|
|
|
|
logger.info(res)
|
|
|
|
raise Exception("Unexpected number of scan radio work items")
|
|
|
|
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("RADIO_WORK done " + id)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan did not start")
|
|
|
|
if "FAIL-BUSY" not in dev[0].request("SCAN"):
|
|
|
|
raise Exception("SCAN accepted while one is already in progress")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
print "Scan did not complete"
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=0.2)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected scan started")
|
2014-12-19 22:08:10 +01:00
|
|
|
|
|
|
|
def test_scan_setband(dev, apdev):
|
|
|
|
"""Band selection for scan operations"""
|
|
|
|
try:
|
|
|
|
hapd = None
|
|
|
|
hapd2 = None
|
|
|
|
params = { "ssid": "test-setband",
|
|
|
|
"hw_mode": "a",
|
|
|
|
"channel": "36",
|
|
|
|
"country_code": "US" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
params = { "ssid": "test-setband",
|
|
|
|
"hw_mode": "g",
|
|
|
|
"channel": "1" }
|
|
|
|
hapd2 = hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
|
|
|
|
if "FAIL" not in dev[0].request("SET setband FOO"):
|
|
|
|
raise Exception("Invalid set setband accepted")
|
|
|
|
if "OK" not in dev[0].request("SET setband AUTO"):
|
|
|
|
raise Exception("Failed to set setband")
|
|
|
|
if "OK" not in dev[1].request("SET setband 5G"):
|
|
|
|
raise Exception("Failed to set setband")
|
|
|
|
if "OK" not in dev[2].request("SET setband 2G"):
|
|
|
|
raise Exception("Failed to set setband")
|
|
|
|
|
|
|
|
for i in range(3):
|
|
|
|
dev[i].request("SCAN only_new=1")
|
|
|
|
|
|
|
|
for i in range(3):
|
|
|
|
ev = dev[i].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan timed out")
|
|
|
|
|
|
|
|
res = dev[0].request("SCAN_RESULTS")
|
|
|
|
if bssid not in res or bssid2 not in res:
|
|
|
|
raise Exception("Missing scan result(0)")
|
|
|
|
|
|
|
|
res = dev[1].request("SCAN_RESULTS")
|
|
|
|
if bssid not in res:
|
|
|
|
raise Exception("Missing scan result(1)")
|
|
|
|
if bssid2 in res:
|
|
|
|
raise Exception("Unexpected scan result(1)")
|
|
|
|
|
|
|
|
res = dev[2].request("SCAN_RESULTS")
|
|
|
|
if bssid2 not in res:
|
|
|
|
raise Exception("Missing scan result(2)")
|
|
|
|
if bssid in res:
|
|
|
|
raise Exception("Unexpected scan result(2)")
|
|
|
|
finally:
|
|
|
|
if hapd:
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
if hapd2:
|
|
|
|
hapd2.request("DISABLE")
|
|
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
|
|
for i in range(3):
|
|
|
|
dev[i].request("SET setband AUTO")
|
|
|
|
dev[i].flush_scan_cache()
|
2014-12-19 22:30:58 +01:00
|
|
|
|
|
|
|
def test_scan_hidden_many(dev, apdev):
|
|
|
|
"""scan_ssid=1 with large number of profile with hidden SSID"""
|
|
|
|
try:
|
|
|
|
_test_scan_hidden_many(dev, apdev)
|
|
|
|
finally:
|
2014-12-23 15:15:11 +01:00
|
|
|
dev[0].flush_scan_cache(freq=2432)
|
2014-12-19 22:30:58 +01:00
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
dev[0].request("SCAN_INTERVAL 5")
|
|
|
|
|
|
|
|
def _test_scan_hidden_many(dev, apdev):
|
2014-12-23 15:15:11 +01:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan-ssid",
|
|
|
|
"ignore_broadcast_ssid": "1" })
|
2014-12-19 22:30:58 +01:00
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
dev[0].request("SCAN_INTERVAL 1")
|
|
|
|
|
|
|
|
for i in range(5):
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "foo")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "disabled", "0")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "scan_ssid", "1")
|
|
|
|
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "test-scan-ssid")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "disabled", "0")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "scan_ssid", "1")
|
|
|
|
|
|
|
|
for i in range(5):
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "foo")
|
|
|
|
dev[0].set_network(id, "key_mgmt", "NONE")
|
|
|
|
dev[0].set_network(id, "disabled", "0")
|
|
|
|
dev[0].set_network(id, "scan_freq", "2412")
|
|
|
|
dev[0].set_network(id, "scan_ssid", "1")
|
|
|
|
|
|
|
|
dev[0].request("REASSOCIATE")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_connected(timeout=30)
|
2014-12-23 15:15:11 +01:00
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
hapd.disable()
|
2015-01-04 22:05:47 +01:00
|
|
|
|
|
|
|
def test_scan_random_mac(dev, apdev, params):
|
|
|
|
"""Random MAC address in scans"""
|
|
|
|
try:
|
|
|
|
_test_scan_random_mac(dev, apdev, params)
|
|
|
|
finally:
|
|
|
|
dev[0].request("MAC_RAND_SCAN all enable=0")
|
|
|
|
|
|
|
|
def _test_scan_random_mac(dev, apdev, params):
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-scan" })
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
|
|
|
|
tests = [ "",
|
|
|
|
"addr=foo",
|
|
|
|
"mask=foo",
|
|
|
|
"enable=1",
|
|
|
|
"all enable=1 mask=00:11:22:33:44:55",
|
|
|
|
"all enable=1 addr=00:11:22:33:44:55",
|
|
|
|
"all enable=1 addr=01:11:22:33:44:55 mask=ff:ff:ff:ff:ff:ff",
|
|
|
|
"all enable=1 addr=00:11:22:33:44:55 mask=fe:ff:ff:ff:ff:ff",
|
|
|
|
"enable=2 scan sched pno all",
|
|
|
|
"pno enable=1",
|
|
|
|
"all enable=2",
|
|
|
|
"foo" ]
|
|
|
|
for args in tests:
|
|
|
|
if "FAIL" not in dev[0].request("MAC_RAND_SCAN " + args):
|
|
|
|
raise Exception("Invalid MAC_RAND_SCAN accepted: " + args)
|
|
|
|
|
|
|
|
if dev[0].get_driver_status_field('capa.mac_addr_rand_scan_supported') != '1':
|
2015-01-07 12:41:31 +01:00
|
|
|
raise HwsimSkip("Driver does not support random MAC address for scanning")
|
2015-01-04 22:05:47 +01:00
|
|
|
|
|
|
|
tests = [ "all enable=1",
|
|
|
|
"all enable=1 addr=f2:11:22:33:44:55 mask=ff:ff:ff:ff:ff:ff",
|
|
|
|
"all enable=1 addr=f2:11:33:00:00:00 mask=ff:ff:ff:00:00:00" ]
|
|
|
|
for args in tests:
|
|
|
|
dev[0].request("MAC_RAND_SCAN " + args)
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412, force_scan=True)
|
|
|
|
|
|
|
|
try:
|
|
|
|
arg = [ "tshark",
|
|
|
|
"-r", os.path.join(params['logdir'], "hwsim0.pcapng"),
|
|
|
|
"-Y", "wlan.fc.type_subtype == 4",
|
|
|
|
"-Tfields", "-e", "wlan.ta" ]
|
|
|
|
cmd = subprocess.Popen(arg, stdout=subprocess.PIPE,
|
|
|
|
stderr=open('/dev/null', 'w'))
|
|
|
|
except Exception, e:
|
|
|
|
logger.info("Could run run tshark check: " + str(e))
|
|
|
|
cmd = None
|
|
|
|
pass
|
|
|
|
|
|
|
|
if cmd:
|
|
|
|
(out,err) = cmd.communicate()
|
|
|
|
res = cmd.wait()
|
|
|
|
if res == 1:
|
|
|
|
arg[3] = '-R'
|
|
|
|
cmd = subprocess.Popen(arg, stdout=subprocess.PIPE,
|
|
|
|
stderr=open('/dev/null', 'w'))
|
|
|
|
(out,err) = cmd.communicate()
|
|
|
|
res = cmd.wait()
|
|
|
|
|
|
|
|
addr = out.splitlines()
|
|
|
|
logger.info("Probe Request frames seen from: " + str(addr))
|
|
|
|
if dev[0].own_addr() in addr:
|
|
|
|
raise Exception("Real address used to transmit Probe Request frame")
|
|
|
|
if "f2:11:22:33:44:55" not in addr:
|
|
|
|
raise Exception("Fully configured random address not seen")
|
|
|
|
found = False
|
|
|
|
for a in addr:
|
|
|
|
if a.startswith('f2:11:33'):
|
|
|
|
found = True
|
|
|
|
break
|
|
|
|
if not found:
|
|
|
|
raise Exception("Fixed OUI random address not seen")
|