2013-04-01 00:01:24 +02:00
|
|
|
#!/usr/bin/python
|
|
|
|
#
|
|
|
|
# Hotspot 2.0 tests
|
|
|
|
# Copyright (c) 2013, Jouni Malinen <j@w1.fi>
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import time
|
|
|
|
import subprocess
|
|
|
|
import logging
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2013-10-20 12:41:23 +02:00
|
|
|
import os.path
|
|
|
|
import subprocess
|
2013-04-01 00:01:24 +02:00
|
|
|
|
|
|
|
import hostapd
|
2013-12-25 17:55:08 +01:00
|
|
|
from wlantest import Wlantest
|
2013-04-01 00:01:24 +02:00
|
|
|
|
|
|
|
def hs20_ap_params():
|
|
|
|
params = hostapd.wpa2_params(ssid="test-hs20")
|
|
|
|
params['wpa_key_mgmt'] = "WPA-EAP"
|
|
|
|
params['ieee80211w'] = "1"
|
|
|
|
params['ieee8021x'] = "1"
|
|
|
|
params['auth_server_addr'] = "127.0.0.1"
|
|
|
|
params['auth_server_port'] = "1812"
|
|
|
|
params['auth_server_shared_secret'] = "radius"
|
|
|
|
params['interworking'] = "1"
|
|
|
|
params['access_network_type'] = "14"
|
|
|
|
params['internet'] = "1"
|
|
|
|
params['asra'] = "0"
|
|
|
|
params['esr'] = "0"
|
|
|
|
params['uesa'] = "0"
|
|
|
|
params['venue_group'] = "7"
|
|
|
|
params['venue_type'] = "1"
|
|
|
|
params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
|
|
|
|
params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
|
|
|
|
"fedcba" ]
|
|
|
|
params['domain_name'] = "example.com,another.example.com"
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
|
|
|
|
"0,another.example.com" ]
|
|
|
|
params['hs20'] = "1"
|
|
|
|
params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
|
|
|
|
params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
|
|
|
|
params['hs20_operating_class'] = "5173"
|
|
|
|
params['anqp_3gpp_cell_net'] = "244,91"
|
|
|
|
return params
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def interworking_select(dev, bssid, type=None, no_match=False):
|
|
|
|
dev.dump_monitor()
|
|
|
|
dev.request("INTERWORKING_SELECT")
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
|
|
|
|
timeout=15)
|
2013-04-01 00:01:24 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
2013-10-29 13:20:29 +01:00
|
|
|
if no_match:
|
|
|
|
if "INTERWORKING-NO-MATCH" not in ev:
|
|
|
|
raise Exception("Unexpected network match")
|
|
|
|
return
|
2013-04-01 00:01:24 +02:00
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching network not found")
|
2013-12-25 19:49:02 +01:00
|
|
|
if bssid and bssid not in ev:
|
2013-04-01 00:01:24 +02:00
|
|
|
raise Exception("Unexpected BSSID in match")
|
2013-10-29 13:20:29 +01:00
|
|
|
if type and "type=" + type not in ev:
|
|
|
|
raise Exception("Network type not recognized correctly")
|
2013-04-01 00:01:24 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def check_sp_type(dev, sp_type):
|
|
|
|
type = dev.get_status_field("sp_type")
|
|
|
|
if type is None:
|
|
|
|
raise Exception("sp_type not available")
|
|
|
|
if type != sp_type:
|
|
|
|
raise Exception("sp_type did not indicate home network")
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def hlr_auc_gw_available():
|
2013-10-20 12:41:23 +02:00
|
|
|
if not os.path.exists("/tmp/hlr_auc_gw.sock"):
|
|
|
|
logger.info("No hlr_auc_gw available");
|
2013-10-29 13:20:29 +01:00
|
|
|
return False
|
2013-10-20 12:41:23 +02:00
|
|
|
if not os.path.exists("../../hostapd/hlr_auc_gw"):
|
|
|
|
logger.info("No hlr_auc_gw available");
|
2013-10-29 13:20:29 +01:00
|
|
|
return False
|
|
|
|
return True
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def interworking_ext_sim_connect(dev, bssid, method):
|
|
|
|
dev.request("INTERWORKING_CONNECT " + bssid)
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network connected timed out")
|
2013-10-29 13:20:29 +01:00
|
|
|
if "(" + method + ")" not in ev:
|
2013-10-20 12:41:23 +02:00
|
|
|
raise Exception("Unexpected EAP method selection")
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Wait for external SIM processing request timed out")
|
|
|
|
p = ev.split(':', 2)
|
|
|
|
if p[1] != "GSM-AUTH":
|
|
|
|
raise Exception("Unexpected CTRL-REQ-SIM type")
|
|
|
|
id = p[0].split('-')[3]
|
|
|
|
rand = p[2].split(' ')[0]
|
|
|
|
|
|
|
|
res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
|
|
|
|
"-m",
|
|
|
|
"auth_serv/hlr_auc_gw.milenage_db",
|
|
|
|
"GSM-AUTH-REQ 232010000000000 " + rand])
|
|
|
|
if "GSM-AUTH-RESP" not in res:
|
|
|
|
raise Exception("Unexpected hlr_auc_gw response")
|
|
|
|
resp = res.split(' ')[2].rstrip()
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
2013-10-29 12:57:33 +01:00
|
|
|
|
2013-10-29 13:38:31 +01:00
|
|
|
def interworking_connect(dev, bssid, method):
|
|
|
|
dev.request("INTERWORKING_CONNECT " + bssid)
|
|
|
|
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network connected timed out")
|
|
|
|
if "(" + method + ")" not in ev:
|
|
|
|
raise Exception("Unexpected EAP method selection")
|
|
|
|
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
|
2013-12-25 17:55:08 +01:00
|
|
|
def check_probe_resp(wt, bssid_unexpected, bssid_expected):
|
|
|
|
if bssid_unexpected:
|
|
|
|
count = wt.get_bss_counter("probe_response", bssid_unexpected)
|
|
|
|
if count > 0:
|
|
|
|
raise Exception("Unexpected Probe Response frame from AP")
|
|
|
|
|
|
|
|
if bssid_expected:
|
|
|
|
count = wt.get_bss_counter("probe_response", bssid_expected)
|
|
|
|
if count == 0:
|
|
|
|
raise Exception("No Probe Response frame from AP")
|
|
|
|
|
2013-12-25 19:49:02 +01:00
|
|
|
def test_ap_anqp_sharing(dev, apdev):
|
|
|
|
"""ANQP sharing within ESS and explicit unshare"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "example.com" })
|
|
|
|
logger.info("Normal network selection with shared ANQP results")
|
|
|
|
interworking_select(dev[0], None, "home")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
res1 = dev[0].get_bss(bssid)
|
|
|
|
res2 = dev[0].get_bss(bssid2)
|
|
|
|
if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
|
|
|
|
raise Exception("ANQP results were not shared between BSSes")
|
|
|
|
|
|
|
|
logger.info("Explicit ANQP request to unshare ANQP results")
|
|
|
|
dev[0].request("ANQP_GET " + bssid + " 263")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
|
|
|
|
dev[0].request("ANQP_GET " + bssid2 + " 263")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
|
|
|
|
res1 = dev[0].get_bss(bssid)
|
|
|
|
res2 = dev[0].get_bss(bssid2)
|
|
|
|
if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
|
|
|
|
raise Exception("ANQP results were not unshared")
|
|
|
|
|
2013-12-25 17:55:08 +01:00
|
|
|
def test_ap_interworking_scan_filtering(dev, apdev):
|
|
|
|
"""Interworking scan filtering with HESSID and access network type"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
ssid = "test-hs20-ap1"
|
|
|
|
params['ssid'] = ssid
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
ssid2 = "test-hs20-ap2"
|
|
|
|
params['ssid'] = ssid2
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['access_network_type'] = "1"
|
2013-12-25 19:29:04 +01:00
|
|
|
del params['venue_group']
|
|
|
|
del params['venue_type']
|
2013-12-25 17:55:08 +01:00
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
|
|
|
|
wt = Wlantest()
|
|
|
|
wt.flush()
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on HESSID")
|
|
|
|
|
|
|
|
dev[0].request("SET hessid " + bssid2)
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, bssid2)
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on access network type")
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid 00:00:00:00:00:00")
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid2, bssid)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid 00:00:00:00:00:00")
|
|
|
|
dev[0].request("SET access_network_type 1")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, bssid2)
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on HESSID and ANT")
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid)
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid2, bssid)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid2)
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, None)
|
|
|
|
check_probe_resp(wt, bssid2, None)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid)
|
|
|
|
dev[0].request("SET access_network_type 1")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, None)
|
|
|
|
check_probe_resp(wt, bssid2, None)
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def test_ap_hs20_select(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:20:29 +01:00
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "example.com" })
|
2013-10-29 13:20:29 +01:00
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "no.match.example.com" })
|
2013-10-29 13:20:29 +01:00
|
|
|
interworking_select(dev[0], bssid, "roaming")
|
|
|
|
|
|
|
|
dev[0].set_cred_quoted(id, "realm", "no.match.example.com");
|
|
|
|
interworking_select(dev[0], bssid, no_match=True)
|
|
|
|
|
2013-12-26 12:11:02 +01:00
|
|
|
def hs20_simulated_sim(dev, ap, method):
|
|
|
|
bssid = ap['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "555,444"
|
|
|
|
params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(ap['ifname'], params)
|
|
|
|
|
|
|
|
dev.request("SET ignore_old_scan_res 1")
|
|
|
|
dev.hs20_enable()
|
|
|
|
dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
|
|
|
|
'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
|
|
|
|
interworking_select(dev, "home")
|
|
|
|
interworking_connect(dev, bssid, method)
|
|
|
|
check_sp_type(dev, "home")
|
|
|
|
|
|
|
|
def test_ap_hs20_sim(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated SIM and EAP-SIM"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "SIM")
|
|
|
|
|
|
|
|
def test_ap_hs20_aka(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated USIM and EAP-AKA"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "AKA")
|
|
|
|
|
|
|
|
def test_ap_hs20_aka_prime(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated USIM and EAP-AKA'"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "AKA'")
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def test_ap_hs20_ext_sim(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with external SIM processing"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "232,01"
|
|
|
|
params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:20:29 +01:00
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET external_sim 1")
|
2013-11-04 12:09:46 +01:00
|
|
|
dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
|
2013-10-29 13:20:29 +01:00
|
|
|
interworking_select(dev[0], "home")
|
|
|
|
interworking_ext_sim_connect(dev[0], bssid, "SIM")
|
|
|
|
check_sp_type(dev[0], "home")
|
2013-10-29 13:23:31 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_ext_sim_roaming(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with external SIM processing in roaming network"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
|
|
|
|
params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:23:31 +01:00
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET external_sim 1")
|
2013-11-04 12:09:46 +01:00
|
|
|
dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
|
2013-10-29 13:23:31 +01:00
|
|
|
interworking_select(dev[0], "roaming")
|
|
|
|
interworking_ext_sim_connect(dev[0], bssid, "SIM")
|
|
|
|
check_sp_type(dev[0], "roaming")
|
2013-10-29 13:38:31 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_username(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:38:31 +01:00
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
|
2013-12-26 13:08:42 +01:00
|
|
|
def eap_test(dev, ap, eap_params, method, user):
|
|
|
|
bssid = ap['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com," + eap_params ]
|
|
|
|
hostapd.add_ap(ap['ifname'], params)
|
|
|
|
|
|
|
|
dev.request("SET ignore_old_scan_res 1")
|
|
|
|
dev.hs20_enable()
|
|
|
|
dev.add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': user,
|
|
|
|
'password': "password" })
|
|
|
|
interworking_select(dev, bssid)
|
|
|
|
interworking_connect(dev, bssid, method)
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/MSCHAPV2"""
|
|
|
|
eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_peap_gtc(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/GTC"""
|
|
|
|
eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_chap(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/CHAP"""
|
|
|
|
eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_mschap(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/MSCHAP"""
|
|
|
|
eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
|
|
|
|
eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
|
|
|
|
eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_fast_gtc(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with FAST/EAP-GTC"""
|
|
|
|
eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_tls(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with EAP-TLS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "certificate-user",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'client_cert': "auth_serv/user.pem",
|
|
|
|
'private_key': "auth_serv/user.key"})
|
|
|
|
interworking_select(dev[0], bssid)
|
|
|
|
interworking_connect(dev[0], bssid, "TLS")
|
|
|
|
|
2013-12-26 12:44:27 +01:00
|
|
|
def test_ap_hs20_nai_realms(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "pap user",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
|
2013-12-26 12:18:46 +01:00
|
|
|
def test_ap_hs20_roaming_consortium(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection based on roaming consortium match"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "user",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'roaming_consortium': "fedcba",
|
|
|
|
'eap': "PEAP" })
|
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
interworking_connect(dev[0], bssid, "PEAP")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
|
2013-10-29 13:38:31 +01:00
|
|
|
def test_ap_hs20_username_roaming(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (roaming)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
|
|
|
|
"0,roaming.example.com,21[2:4][5:7]",
|
|
|
|
"0,another.example.com" ]
|
|
|
|
params['domain_name'] = "another.example.com"
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:38:31 +01:00
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_select(dev[0], bssid, "roaming")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "roaming")
|
|
|
|
|
|
|
|
def test_ap_hs20_username_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (no domain in cred)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:38:31 +01:00
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password" })
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_select(dev[0], bssid, "unknown")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
|
|
|
|
def test_ap_hs20_username_unknown2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (no domain advertized)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
del params['domain_name']
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-10-29 13:38:31 +01:00
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_select(dev[0], bssid, "unknown")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
2013-11-04 12:11:31 +01:00
|
|
|
|
2013-11-07 23:26:16 +01:00
|
|
|
def test_ap_hs20_gas_while_associated(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with GAS query while associated"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Verifying GAS query while associated")
|
|
|
|
dev[0].request("FETCH_ANQP")
|
|
|
|
for i in range(0, 6):
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Operation timed out")
|
|
|
|
|
|
|
|
def test_ap_hs20_gas_frag_while_associated(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with fragmented GAS query while associated"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
hapd = hostapd.Hostapd(apdev[0]['ifname'])
|
|
|
|
hapd.set("gas_frag_limit", "50")
|
|
|
|
|
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Verifying GAS query while associated")
|
|
|
|
dev[0].request("FETCH_ANQP")
|
|
|
|
for i in range(0, 6):
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Operation timed out")
|
|
|
|
|
2013-11-06 22:35:19 +01:00
|
|
|
def test_ap_hs20_multiple_connects(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection through multiple network selections"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-11-06 22:35:19 +01:00
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
|
|
|
for i in range(0, 3):
|
|
|
|
logger.info("Starting Interworking network selection")
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto")
|
|
|
|
while True:
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching AP not found")
|
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
break
|
|
|
|
if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
break
|
|
|
|
if i == 0:
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
networks = dev[0].list_networks()
|
|
|
|
if len(networks) > 1:
|
|
|
|
raise Exception("Duplicated network block detected")
|
|
|
|
|
2013-11-06 23:09:57 +01:00
|
|
|
def test_ap_hs20_disallow_aps(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and disallow_aps"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2013-11-07 22:54:13 +01:00
|
|
|
dev[0].request("SET ignore_old_scan_res 1")
|
2013-11-06 23:09:57 +01:00
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
|
|
|
logger.info("Verify disallow_aps bssid")
|
|
|
|
dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
logger.info("Verify disallow_aps ssid")
|
|
|
|
dev[0].request("SET disallow_aps ssid 746573742d68733230")
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
logger.info("Verify disallow_aps clear")
|
|
|
|
dev[0].request("SET disallow_aps ")
|
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
|
|
|
|
dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
|
|
|
|
ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
|
|
|
|
if "FAIL" not in ret:
|
|
|
|
raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
|
|
|
|
|
2013-11-04 12:11:31 +01:00
|
|
|
def policy_test(dev, ap, values, only_one=True):
|
|
|
|
dev.dump_monitor()
|
|
|
|
logger.info("Verify network selection to AP " + ap['ifname'])
|
|
|
|
bssid = ap['bssid']
|
2013-11-07 22:54:13 +01:00
|
|
|
dev.request("SET ignore_old_scan_res 1")
|
2013-11-04 12:11:31 +01:00
|
|
|
dev.hs20_enable()
|
|
|
|
id = dev.add_cred_values(values)
|
|
|
|
dev.request("INTERWORKING_SELECT auto")
|
|
|
|
while True:
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching AP not found")
|
|
|
|
if only_one and "INTERWORKING-AP" in ev and bssid not in ev:
|
|
|
|
raise Exception("Unexpected AP claimed acceptable")
|
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Connected to incorrect BSS")
|
|
|
|
break
|
|
|
|
|
|
|
|
conn_bssid = dev.get_status_field("bssid")
|
|
|
|
if conn_bssid != bssid:
|
|
|
|
raise Exception("bssid information points to incorrect BSS")
|
|
|
|
|
|
|
|
dev.remove_cred(id)
|
|
|
|
dev.dump_monitor()
|
|
|
|
|
2013-11-04 12:22:55 +01:00
|
|
|
def default_cred():
|
|
|
|
return { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password" }
|
|
|
|
|
2013-11-04 12:11:31 +01:00
|
|
|
def test_ap_hs20_req_roaming_consortium(dev, apdev):
|
|
|
|
"""Hotspot 2.0 required roaming consortium"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['roaming_consortium'] = [ "223344" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
2013-11-04 12:22:55 +01:00
|
|
|
values = default_cred()
|
|
|
|
values['required_roaming_consortium'] = "223344"
|
2013-11-04 12:11:31 +01:00
|
|
|
policy_test(dev[0], apdev[1], values)
|
|
|
|
values['required_roaming_consortium'] = "112233"
|
|
|
|
policy_test(dev[0], apdev[0], values)
|
2013-11-04 12:22:55 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_excluded_ssid(dev, apdev):
|
|
|
|
"""Hotspot 2.0 exclusion based on SSID"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['roaming_consortium'] = [ "223344" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
values = default_cred()
|
|
|
|
values['excluded_ssid'] = "test-hs20"
|
|
|
|
policy_test(dev[0], apdev[1], values)
|
|
|
|
values['excluded_ssid'] = "test-hs20-other"
|
|
|
|
policy_test(dev[0], apdev[0], values)
|