2013-07-21 15:01:54 +02:00
|
|
|
# IBSS test cases
|
2015-06-14 18:35:19 +02:00
|
|
|
# Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
|
2013-07-21 15:01:54 +02:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2013-07-21 15:01:54 +02:00
|
|
|
import time
|
2013-08-27 02:11:02 +02:00
|
|
|
import re
|
2014-12-20 18:36:41 +01:00
|
|
|
import subprocess
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
import hwsim_utils
|
2015-09-05 20:35:58 +02:00
|
|
|
from utils import alloc_fail
|
2013-07-21 15:01:54 +02:00
|
|
|
|
2015-06-14 18:35:19 +02:00
|
|
|
def connect_ibss_cmd(dev, id, freq=2412):
|
2013-07-21 15:01:54 +02:00
|
|
|
dev.dump_monitor()
|
2015-06-14 18:35:19 +02:00
|
|
|
dev.select_network(id, freq=str(freq))
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
def wait_ibss_connection(dev):
|
2013-08-25 22:10:37 +02:00
|
|
|
logger.info(dev.ifname + " waiting for IBSS start/join to complete")
|
2014-12-20 10:51:30 +01:00
|
|
|
ev = dev.wait_connected(timeout=20,
|
|
|
|
error="Connection to the IBSS timed out")
|
2013-08-27 02:11:02 +02:00
|
|
|
exp = r'<.>(CTRL-EVENT-CONNECTED) - Connection to ([0-9a-f:]*) completed.*'
|
|
|
|
s = re.split(exp, ev)
|
|
|
|
if len(s) < 3:
|
|
|
|
return None
|
|
|
|
return s[2]
|
2013-08-25 22:10:37 +02:00
|
|
|
|
|
|
|
def wait_4way_handshake(dev1, dev2):
|
|
|
|
logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr())
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
2013-07-21 15:01:54 +02:00
|
|
|
|
2013-08-27 01:00:39 +02:00
|
|
|
def wait_4way_handshake2(dev1, dev2, dev3):
|
|
|
|
logger.info(dev1.ifname + " waiting for 4-way handshake completion with " + dev2.ifname + " " + dev2.p2p_interface_addr() + " and " + dev3.p2p_interface_addr())
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
|
|
|
|
"IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
|
|
|
ev = dev1.wait_event(["IBSS-RSN-COMPLETED " + dev2.p2p_interface_addr(),
|
|
|
|
"IBSS-RSN-COMPLETED " + dev3.p2p_interface_addr()],
|
|
|
|
timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("4-way handshake in IBSS timed out")
|
|
|
|
|
2014-12-20 18:36:41 +01:00
|
|
|
def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None,
|
2015-02-06 20:43:50 +01:00
|
|
|
group=None, beacon_int=None, bssid=None, scan_freq=None,
|
2015-06-14 18:35:19 +02:00
|
|
|
wep_key0=None, freq=2412):
|
2013-07-21 15:01:54 +02:00
|
|
|
id = dev.add_network()
|
|
|
|
dev.set_network(id, "mode", "1")
|
2015-06-14 18:35:19 +02:00
|
|
|
dev.set_network(id, "frequency", str(freq))
|
2014-12-20 18:36:41 +01:00
|
|
|
if scan_freq:
|
|
|
|
dev.set_network(id, "scan_freq", str(scan_freq))
|
2013-07-21 15:01:54 +02:00
|
|
|
dev.set_network_quoted(id, "ssid", ssid)
|
|
|
|
if psk:
|
|
|
|
dev.set_network_quoted(id, "psk", psk)
|
|
|
|
if proto:
|
|
|
|
dev.set_network(id, "proto", proto)
|
|
|
|
if key_mgmt:
|
|
|
|
dev.set_network(id, "key_mgmt", key_mgmt)
|
|
|
|
if pairwise:
|
|
|
|
dev.set_network(id, "pairwise", pairwise)
|
|
|
|
if group:
|
|
|
|
dev.set_network(id, "group", group)
|
2014-03-06 22:10:48 +01:00
|
|
|
if beacon_int:
|
|
|
|
dev.set_network(id, "beacon_int", beacon_int)
|
2014-04-12 22:11:02 +02:00
|
|
|
if bssid:
|
|
|
|
dev.set_network(id, "bssid", bssid)
|
2015-02-06 20:43:50 +01:00
|
|
|
if wep_key0:
|
|
|
|
dev.set_network(id, "wep_key0", wep_key0)
|
2014-04-12 22:11:02 +02:00
|
|
|
dev.request("ENABLE_NETWORK " + str(id) + " no-connect")
|
2013-07-21 15:01:54 +02:00
|
|
|
return id
|
|
|
|
|
|
|
|
def add_ibss_rsn(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "RSN", "WPA-PSK", "CCMP", "CCMP")
|
|
|
|
|
2015-02-06 20:43:50 +01:00
|
|
|
def add_ibss_rsn_tkip(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "RSN", "WPA-PSK", "TKIP", "TKIP")
|
|
|
|
|
2013-12-28 11:22:43 +01:00
|
|
|
def add_ibss_wpa_none(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "WPA", "WPA-NONE", "TKIP", "TKIP")
|
|
|
|
|
2014-04-12 21:30:48 +02:00
|
|
|
def add_ibss_wpa_none_ccmp(dev, ssid):
|
|
|
|
return add_ibss(dev, ssid, "12345678", "WPA", "WPA-NONE", "CCMP", "CCMP")
|
|
|
|
|
2013-07-21 15:01:54 +02:00
|
|
|
def test_ibss_rsn(dev):
|
|
|
|
"""IBSS RSN"""
|
|
|
|
ssid="ibss-rsn"
|
|
|
|
|
|
|
|
logger.info("Start IBSS on the first STA")
|
|
|
|
id = add_ibss_rsn(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
logger.info("Join two STAs to the IBSS")
|
|
|
|
|
|
|
|
id = add_ibss_rsn(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[1].scan()
|
2013-08-25 22:10:37 +02:00
|
|
|
wait_4way_handshake(dev[0], dev[1])
|
|
|
|
wait_4way_handshake(dev[1], dev[0])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
id = add_ibss_rsn(dev[2], ssid)
|
|
|
|
connect_ibss_cmd(dev[2], id)
|
2013-08-27 02:11:02 +02:00
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
if bssid0 != bssid2:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[2].scan()
|
2013-08-25 22:10:37 +02:00
|
|
|
wait_4way_handshake(dev[0], dev[2])
|
2013-08-27 01:00:39 +02:00
|
|
|
wait_4way_handshake2(dev[2], dev[0], dev[1])
|
2013-07-21 15:01:54 +02:00
|
|
|
|
|
|
|
# Allow some time for all peers to complete key setup
|
|
|
|
time.sleep(3)
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
2013-12-28 11:22:43 +01:00
|
|
|
|
2014-04-12 15:17:04 +02:00
|
|
|
dev[1].request("REMOVE_NETWORK all")
|
|
|
|
time.sleep(1)
|
|
|
|
id = add_ibss_rsn(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[1].scan()
|
|
|
|
wait_4way_handshake(dev[0], dev[1])
|
|
|
|
wait_4way_handshake(dev[1], dev[0])
|
|
|
|
time.sleep(3)
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2014-04-12 15:17:04 +02:00
|
|
|
|
2014-12-07 16:57:28 +01:00
|
|
|
if "OK" not in dev[0].request("IBSS_RSN " + dev[1].p2p_interface_addr()):
|
|
|
|
raise Exception("IBSS_RSN command failed")
|
|
|
|
|
2013-12-28 11:22:43 +01:00
|
|
|
def test_ibss_wpa_none(dev):
|
|
|
|
"""IBSS WPA-None"""
|
|
|
|
ssid="ibss-wpa-none"
|
|
|
|
|
|
|
|
logger.info("Start IBSS on the first STA")
|
|
|
|
id = add_ibss_wpa_none(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
# This is a bit ugly, but no one really cares about WPA-None, so there may
|
|
|
|
# not be enough justification to clean this up.. For now, wpa_supplicant
|
|
|
|
# will show two connection events with mac80211_hwsim where the first one
|
|
|
|
# comes with all zeros address.
|
|
|
|
if bssid0 == "00:00:00:00:00:00":
|
|
|
|
logger.info("Waiting for real BSSID on the first STA")
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
2014-04-12 21:30:48 +02:00
|
|
|
logger.info("Join two STAs to the IBSS")
|
|
|
|
|
|
|
|
id = add_ibss_wpa_none(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
id = add_ibss_wpa_none(dev[2], ssid)
|
|
|
|
connect_ibss_cmd(dev[2], id)
|
|
|
|
|
2013-12-28 11:22:43 +01:00
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
|
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
if bssid0 != bssid2:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA2 BSSID " + bssid2)
|
|
|
|
bssid2 = wait_ibss_connection(dev[2])
|
|
|
|
|
2014-12-24 12:06:25 +01:00
|
|
|
logger.info("bssid0=%s bssid1=%s bssid2=%s" % (bssid0, bssid1, bssid2))
|
2013-12-28 11:22:43 +01:00
|
|
|
|
2014-12-07 22:27:45 +01:00
|
|
|
bss = dev[0].get_bss(bssid0)
|
|
|
|
if not bss:
|
|
|
|
bss = dev[1].get_bss(bssid1)
|
|
|
|
if not bss:
|
|
|
|
raise Exception("Could not find BSS entry for IBSS")
|
|
|
|
if 'flags' not in bss:
|
|
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
|
|
if "[WPA-None-TKIP]" not in bss['flags']:
|
|
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
|
2013-12-28 11:22:43 +01:00
|
|
|
# Allow some time for all peers to complete key setup
|
|
|
|
time.sleep(1)
|
|
|
|
|
|
|
|
# This is supposed to work, but looks like WPA-None does not work with
|
|
|
|
# mac80211 currently..
|
|
|
|
try:
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2013-12-28 11:22:43 +01:00
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
|
|
|
try:
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
2013-12-28 11:22:43 +01:00
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
|
|
|
try:
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
2013-12-28 11:22:43 +01:00
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
2014-03-06 22:10:48 +01:00
|
|
|
|
2014-04-12 21:30:48 +02:00
|
|
|
def test_ibss_wpa_none_ccmp(dev):
|
|
|
|
"""IBSS WPA-None/CCMP"""
|
|
|
|
ssid="ibss-wpa-none"
|
|
|
|
|
|
|
|
logger.info("Start IBSS on the first STA")
|
|
|
|
id = add_ibss_wpa_none(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
# This is a bit ugly, but no one really cares about WPA-None, so there may
|
|
|
|
# not be enough justification to clean this up.. For now, wpa_supplicant
|
|
|
|
# will show two connection events with mac80211_hwsim where the first one
|
|
|
|
# comes with all zeros address.
|
|
|
|
if bssid0 == "00:00:00:00:00:00":
|
|
|
|
logger.info("Waiting for real BSSID on the first STA")
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
|
|
|
|
logger.info("Join a STA to the IBSS")
|
|
|
|
id = add_ibss_wpa_none(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
|
2014-12-24 12:06:25 +01:00
|
|
|
logger.info("bssid0=%s bssid1=%s" % (bssid0, bssid1))
|
2014-04-12 21:30:48 +02:00
|
|
|
|
|
|
|
# Allow some time for all peers to complete key setup
|
|
|
|
time.sleep(1)
|
|
|
|
|
|
|
|
# This is supposed to work, but looks like WPA-None does not work with
|
|
|
|
# mac80211 currently..
|
|
|
|
try:
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
2014-04-12 21:30:48 +02:00
|
|
|
except Exception, e:
|
|
|
|
logger.info("Ignoring known connectivity failure: " + str(e))
|
|
|
|
|
2014-03-06 22:10:48 +01:00
|
|
|
def test_ibss_open(dev):
|
|
|
|
"""IBSS open (no security)"""
|
|
|
|
ssid="ibss"
|
|
|
|
id = add_ibss(dev[0], ssid, key_mgmt="NONE", beacon_int="150")
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
id = add_ibss(dev[1], ssid, key_mgmt="NONE", beacon_int="200")
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
2014-04-12 22:11:02 +02:00
|
|
|
|
2014-12-07 22:27:45 +01:00
|
|
|
res = dev[0].request("SCAN_RESULTS")
|
|
|
|
if "[IBSS]" not in res:
|
|
|
|
res = dev[1].request("SCAN_RESULTS")
|
|
|
|
if "[IBSS]" not in res:
|
|
|
|
raise Exception("IBSS flag missing from scan results: " + res)
|
|
|
|
bss = dev[0].get_bss(bssid0)
|
|
|
|
if not bss:
|
|
|
|
bss = dev[1].get_bss(bssid1)
|
|
|
|
if not bss:
|
|
|
|
raise Exception("Could not find BSS entry for IBSS")
|
|
|
|
if 'flags' not in bss:
|
|
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
|
|
if "[IBSS]" not in bss['flags']:
|
|
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
|
2014-04-12 22:11:02 +02:00
|
|
|
def test_ibss_open_fixed_bssid(dev):
|
|
|
|
"""IBSS open (no security) and fixed BSSID"""
|
|
|
|
ssid="ibss"
|
|
|
|
bssid="02:11:22:33:44:55"
|
|
|
|
try:
|
|
|
|
dev[0].request("AP_SCAN 2")
|
|
|
|
add_ibss(dev[0], ssid, key_mgmt="NONE", bssid=bssid, beacon_int="150")
|
|
|
|
dev[0].request("REASSOCIATE")
|
|
|
|
|
|
|
|
dev[1].request("AP_SCAN 2")
|
|
|
|
add_ibss(dev[1], ssid, key_mgmt="NONE", bssid=bssid, beacon_int="200")
|
|
|
|
dev[1].request("REASSOCIATE")
|
|
|
|
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid:
|
|
|
|
raise Exception("STA0 BSSID " + bssid0 + " differs from fixed BSSID " + bssid)
|
|
|
|
if bssid1 != bssid:
|
|
|
|
raise Exception("STA0 BSSID " + bssid0 + " differs from fixed BSSID " + bssid)
|
|
|
|
finally:
|
|
|
|
dev[0].request("AP_SCAN 1")
|
|
|
|
dev[1].request("AP_SCAN 1")
|
2014-12-20 18:36:41 +01:00
|
|
|
|
|
|
|
def test_ibss_open_retry(dev):
|
|
|
|
"""IBSS open (no security) with cfg80211 retry workaround"""
|
|
|
|
subprocess.check_call(['iw', 'dev', dev[0].ifname, 'set', 'type', 'adhoc'])
|
|
|
|
subprocess.check_call(['iw', 'dev', dev[0].ifname, 'ibss', 'join',
|
|
|
|
'ibss-test', '2412', 'HT20', 'fixed-freq',
|
|
|
|
'02:22:33:44:55:66'])
|
|
|
|
ssid="ibss"
|
|
|
|
try:
|
|
|
|
dev[0].request("AP_SCAN 2")
|
|
|
|
id = add_ibss(dev[0], ssid, key_mgmt="NONE", beacon_int="150",
|
|
|
|
bssid="02:33:44:55:66:77", scan_freq=2412)
|
|
|
|
#connect_ibss_cmd(dev[0], id)
|
|
|
|
dev[0].request("REASSOCIATE")
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
subprocess.check_call(['iw', 'dev', dev[0].ifname, 'ibss', 'leave'])
|
|
|
|
time.sleep(1)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
finally:
|
|
|
|
dev[0].request("AP_SCAN 1")
|
2015-02-06 20:43:50 +01:00
|
|
|
|
|
|
|
def test_ibss_rsn_tkip(dev):
|
|
|
|
"""IBSS RSN with TKIP as the cipher"""
|
|
|
|
ssid="ibss-rsn-tkip"
|
|
|
|
|
|
|
|
id = add_ibss_rsn_tkip(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
id = add_ibss_rsn_tkip(dev[1], ssid)
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
# try to merge with a scan
|
|
|
|
dev[1].scan()
|
|
|
|
wait_4way_handshake(dev[0], dev[1])
|
|
|
|
wait_4way_handshake(dev[1], dev[0])
|
|
|
|
|
|
|
|
def test_ibss_wep(dev):
|
|
|
|
"""IBSS with WEP"""
|
|
|
|
ssid="ibss-wep"
|
|
|
|
|
|
|
|
id = add_ibss(dev[0], ssid, key_mgmt="NONE", wep_key0='"hello"')
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
id = add_ibss(dev[1], ssid, key_mgmt="NONE", wep_key0='"hello"')
|
|
|
|
connect_ibss_cmd(dev[1], id)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
2015-05-03 16:15:45 +02:00
|
|
|
|
|
|
|
def test_ibss_rsn_error_case(dev):
|
|
|
|
"""IBSS RSN regression test for IBSS_RSN prior IBSS setup"""
|
|
|
|
if "FAIL" not in dev[0].request("IBSS_RSN 02:03:04:05:06:07"):
|
|
|
|
raise Exception("Unexpected IBSS_RSN result")
|
2015-06-14 18:35:19 +02:00
|
|
|
|
|
|
|
def test_ibss_5ghz(dev):
|
|
|
|
"""IBSS on 5 GHz band"""
|
|
|
|
try:
|
|
|
|
_test_ibss_5ghz(dev)
|
|
|
|
finally:
|
|
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
dev[1].flush_scan_cache()
|
|
|
|
|
|
|
|
def _test_ibss_5ghz(dev):
|
|
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
|
|
for i in range(2):
|
|
|
|
for j in range(5):
|
|
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("No regdom change event")
|
|
|
|
if "alpha2=US" in ev:
|
|
|
|
break
|
|
|
|
dev[i].dump_monitor()
|
|
|
|
|
|
|
|
ssid="ibss"
|
|
|
|
id = add_ibss(dev[0], ssid, key_mgmt="NONE", beacon_int="150", freq=5180)
|
|
|
|
connect_ibss_cmd(dev[0], id, freq=5180)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|
|
|
|
|
|
|
|
dev[1].scan_for_bss(bssid0, freq=5180)
|
|
|
|
id = add_ibss(dev[1], ssid, key_mgmt="NONE", beacon_int="200", freq=5180)
|
|
|
|
connect_ibss_cmd(dev[1], id, freq=5180)
|
|
|
|
bssid1 = wait_ibss_connection(dev[1])
|
|
|
|
if bssid0 != bssid1:
|
|
|
|
logger.info("STA0 BSSID " + bssid0 + " differs from STA1 BSSID " + bssid1)
|
|
|
|
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
2015-09-05 20:35:58 +02:00
|
|
|
|
|
|
|
def test_ibss_rsn_oom(dev):
|
|
|
|
"""IBSS RSN OOM during wpa_init"""
|
|
|
|
with alloc_fail(dev[0], 1, "wpa_init"):
|
|
|
|
ssid="ibss-rsn"
|
|
|
|
id = add_ibss_rsn(dev[0], ssid)
|
|
|
|
connect_ibss_cmd(dev[0], id)
|
|
|
|
bssid0 = wait_ibss_connection(dev[0])
|