2013-04-01 00:01:24 +02:00
|
|
|
# Hotspot 2.0 tests
|
2014-01-05 11:26:20 +01:00
|
|
|
# Copyright (c) 2013-2014, Jouni Malinen <j@w1.fi>
|
2013-04-01 00:01:24 +02:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import time
|
|
|
|
import subprocess
|
|
|
|
import logging
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2014-03-01 16:45:39 +01:00
|
|
|
import os
|
2013-10-20 12:41:23 +02:00
|
|
|
import os.path
|
|
|
|
import subprocess
|
2013-04-01 00:01:24 +02:00
|
|
|
|
|
|
|
import hostapd
|
2013-12-25 17:55:08 +01:00
|
|
|
from wlantest import Wlantest
|
2014-03-25 16:56:55 +01:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2013-04-01 00:01:24 +02:00
|
|
|
|
2014-02-25 21:41:03 +01:00
|
|
|
def hs20_ap_params(ssid="test-hs20"):
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid)
|
2013-04-01 00:01:24 +02:00
|
|
|
params['wpa_key_mgmt'] = "WPA-EAP"
|
|
|
|
params['ieee80211w'] = "1"
|
|
|
|
params['ieee8021x'] = "1"
|
|
|
|
params['auth_server_addr'] = "127.0.0.1"
|
|
|
|
params['auth_server_port'] = "1812"
|
|
|
|
params['auth_server_shared_secret'] = "radius"
|
|
|
|
params['interworking'] = "1"
|
|
|
|
params['access_network_type'] = "14"
|
|
|
|
params['internet'] = "1"
|
|
|
|
params['asra'] = "0"
|
|
|
|
params['esr'] = "0"
|
|
|
|
params['uesa'] = "0"
|
|
|
|
params['venue_group'] = "7"
|
|
|
|
params['venue_type'] = "1"
|
|
|
|
params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
|
|
|
|
params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
|
|
|
|
"fedcba" ]
|
|
|
|
params['domain_name'] = "example.com,another.example.com"
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
|
|
|
|
"0,another.example.com" ]
|
|
|
|
params['hs20'] = "1"
|
|
|
|
params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
|
|
|
|
params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
|
|
|
|
params['hs20_operating_class'] = "5173"
|
|
|
|
params['anqp_3gpp_cell_net'] = "244,91"
|
|
|
|
return params
|
|
|
|
|
2014-03-01 09:10:53 +01:00
|
|
|
def check_auto_select(dev, bssid):
|
2014-05-14 12:35:32 +02:00
|
|
|
dev.scan_for_bss(bssid, freq="2412")
|
2014-03-01 09:10:53 +01:00
|
|
|
dev.request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Connected to incorrect network")
|
|
|
|
dev.request("REMOVE_NETWORK all")
|
|
|
|
|
2014-01-05 11:26:20 +01:00
|
|
|
def interworking_select(dev, bssid, type=None, no_match=False, freq=None):
|
2013-10-29 13:20:29 +01:00
|
|
|
dev.dump_monitor()
|
2014-05-14 12:35:32 +02:00
|
|
|
if bssid and freq and not no_match:
|
|
|
|
dev.scan_for_bss(bssid, freq=freq)
|
2014-01-05 11:26:20 +01:00
|
|
|
freq_extra = " freq=" + freq if freq else ""
|
|
|
|
dev.request("INTERWORKING_SELECT" + freq_extra)
|
2013-10-29 13:20:29 +01:00
|
|
|
ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
|
|
|
|
timeout=15)
|
2013-04-01 00:01:24 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
2013-10-29 13:20:29 +01:00
|
|
|
if no_match:
|
|
|
|
if "INTERWORKING-NO-MATCH" not in ev:
|
|
|
|
raise Exception("Unexpected network match")
|
|
|
|
return
|
2013-04-01 00:01:24 +02:00
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
2014-04-26 15:01:52 +02:00
|
|
|
logger.info("Matching network not found - try again")
|
|
|
|
dev.dump_monitor()
|
|
|
|
dev.request("INTERWORKING_SELECT" + freq_extra)
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
|
|
|
|
timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching network not found")
|
2013-12-25 19:49:02 +01:00
|
|
|
if bssid and bssid not in ev:
|
2013-04-01 00:01:24 +02:00
|
|
|
raise Exception("Unexpected BSSID in match")
|
2013-10-29 13:20:29 +01:00
|
|
|
if type and "type=" + type not in ev:
|
|
|
|
raise Exception("Network type not recognized correctly")
|
2013-04-01 00:01:24 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def check_sp_type(dev, sp_type):
|
|
|
|
type = dev.get_status_field("sp_type")
|
|
|
|
if type is None:
|
|
|
|
raise Exception("sp_type not available")
|
|
|
|
if type != sp_type:
|
|
|
|
raise Exception("sp_type did not indicate home network")
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def hlr_auc_gw_available():
|
2013-10-20 12:41:23 +02:00
|
|
|
if not os.path.exists("/tmp/hlr_auc_gw.sock"):
|
|
|
|
logger.info("No hlr_auc_gw available");
|
2013-10-29 13:20:29 +01:00
|
|
|
return False
|
2013-10-20 12:41:23 +02:00
|
|
|
if not os.path.exists("../../hostapd/hlr_auc_gw"):
|
|
|
|
logger.info("No hlr_auc_gw available");
|
2013-10-29 13:20:29 +01:00
|
|
|
return False
|
|
|
|
return True
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def interworking_ext_sim_connect(dev, bssid, method):
|
|
|
|
dev.request("INTERWORKING_CONNECT " + bssid)
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_ext_sim_auth(dev, method)
|
2013-10-20 12:41:23 +02:00
|
|
|
|
2013-10-29 18:46:38 +01:00
|
|
|
def interworking_ext_sim_auth(dev, method):
|
2013-10-29 13:20:29 +01:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network connected timed out")
|
2013-10-29 13:20:29 +01:00
|
|
|
if "(" + method + ")" not in ev:
|
2013-10-20 12:41:23 +02:00
|
|
|
raise Exception("Unexpected EAP method selection")
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Wait for external SIM processing request timed out")
|
|
|
|
p = ev.split(':', 2)
|
|
|
|
if p[1] != "GSM-AUTH":
|
|
|
|
raise Exception("Unexpected CTRL-REQ-SIM type")
|
|
|
|
id = p[0].split('-')[3]
|
|
|
|
rand = p[2].split(' ')[0]
|
|
|
|
|
|
|
|
res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
|
|
|
|
"-m",
|
|
|
|
"auth_serv/hlr_auc_gw.milenage_db",
|
|
|
|
"GSM-AUTH-REQ 232010000000000 " + rand])
|
|
|
|
if "GSM-AUTH-RESP" not in res:
|
|
|
|
raise Exception("Unexpected hlr_auc_gw response")
|
|
|
|
resp = res.split(' ')[2].rstrip()
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
2013-10-20 12:41:23 +02:00
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
2013-10-29 12:57:33 +01:00
|
|
|
|
2013-10-29 13:38:31 +01:00
|
|
|
def interworking_connect(dev, bssid, method):
|
|
|
|
dev.request("INTERWORKING_CONNECT " + bssid)
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_auth(dev, method)
|
2013-10-29 13:38:31 +01:00
|
|
|
|
2013-10-29 18:46:38 +01:00
|
|
|
def interworking_auth(dev, method):
|
2013-10-29 13:38:31 +01:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network connected timed out")
|
|
|
|
if "(" + method + ")" not in ev:
|
|
|
|
raise Exception("Unexpected EAP method selection")
|
|
|
|
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
|
2013-12-25 17:55:08 +01:00
|
|
|
def check_probe_resp(wt, bssid_unexpected, bssid_expected):
|
|
|
|
if bssid_unexpected:
|
|
|
|
count = wt.get_bss_counter("probe_response", bssid_unexpected)
|
|
|
|
if count > 0:
|
|
|
|
raise Exception("Unexpected Probe Response frame from AP")
|
|
|
|
|
|
|
|
if bssid_expected:
|
|
|
|
count = wt.get_bss_counter("probe_response", bssid_expected)
|
|
|
|
if count == 0:
|
|
|
|
raise Exception("No Probe Response frame from AP")
|
|
|
|
|
2013-12-25 19:49:02 +01:00
|
|
|
def test_ap_anqp_sharing(dev, apdev):
|
|
|
|
"""ANQP sharing within ESS and explicit unshare"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "example.com" })
|
|
|
|
logger.info("Normal network selection with shared ANQP results")
|
2014-05-14 12:35:32 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], None, "home", freq="2412")
|
2013-12-25 19:49:02 +01:00
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
res1 = dev[0].get_bss(bssid)
|
|
|
|
res2 = dev[0].get_bss(bssid2)
|
|
|
|
if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
|
|
|
|
raise Exception("ANQP results were not shared between BSSes")
|
|
|
|
|
|
|
|
logger.info("Explicit ANQP request to unshare ANQP results")
|
|
|
|
dev[0].request("ANQP_GET " + bssid + " 263")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
|
|
|
|
dev[0].request("ANQP_GET " + bssid2 + " 263")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
|
|
|
|
res1 = dev[0].get_bss(bssid)
|
|
|
|
res2 = dev[0].get_bss(bssid2)
|
|
|
|
if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
|
|
|
|
raise Exception("ANQP results were not unshared")
|
|
|
|
|
2014-01-31 22:00:07 +01:00
|
|
|
def test_ap_nai_home_realm_query(dev, apdev):
|
|
|
|
"""NAI Home Realm Query"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
|
|
|
|
"0,another.example.org" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].scan(freq="2412")
|
|
|
|
dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " realm=example.com")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
nai1 = dev[0].get_bss(bssid)['anqp_nai_realm']
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
dev[0].request("ANQP_GET " + bssid + " 263")
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("ANQP operation timed out")
|
|
|
|
nai2 = dev[0].get_bss(bssid)['anqp_nai_realm']
|
|
|
|
|
|
|
|
if len(nai1) >= len(nai2):
|
|
|
|
raise Exception("Unexpected NAI Realm list response lengths")
|
|
|
|
if "example.com".encode('hex') not in nai1:
|
|
|
|
raise Exception("Home realm not reported")
|
|
|
|
if "example.org".encode('hex') in nai1:
|
|
|
|
raise Exception("Non-home realm reported")
|
|
|
|
if "example.com".encode('hex') not in nai2:
|
|
|
|
raise Exception("Home realm not reported in wildcard query")
|
|
|
|
if "example.org".encode('hex') not in nai2:
|
|
|
|
raise Exception("Non-home realm not reported in wildcard query ")
|
|
|
|
|
2013-12-25 17:55:08 +01:00
|
|
|
def test_ap_interworking_scan_filtering(dev, apdev):
|
|
|
|
"""Interworking scan filtering with HESSID and access network type"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
ssid = "test-hs20-ap1"
|
|
|
|
params['ssid'] = ssid
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
ssid2 = "test-hs20-ap2"
|
|
|
|
params['ssid'] = ssid2
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['access_network_type'] = "1"
|
2013-12-25 19:29:04 +01:00
|
|
|
del params['venue_group']
|
|
|
|
del params['venue_type']
|
2013-12-25 17:55:08 +01:00
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
|
|
|
|
wt = Wlantest()
|
|
|
|
wt.flush()
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on HESSID")
|
|
|
|
|
|
|
|
dev[0].request("SET hessid " + bssid2)
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, bssid2)
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on access network type")
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid 00:00:00:00:00:00")
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid2, bssid)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid 00:00:00:00:00:00")
|
|
|
|
dev[0].request("SET access_network_type 1")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, bssid2)
|
|
|
|
|
|
|
|
logger.info("Check probe request filtering based on HESSID and ANT")
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid)
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid2, bssid)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid2)
|
|
|
|
dev[0].request("SET access_network_type 14")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, None)
|
|
|
|
check_probe_resp(wt, bssid2, None)
|
|
|
|
|
|
|
|
wt.clear_bss_counters(bssid)
|
|
|
|
wt.clear_bss_counters(bssid2)
|
|
|
|
dev[0].request("SET hessid " + bssid)
|
|
|
|
dev[0].request("SET access_network_type 1")
|
2013-12-25 19:17:32 +01:00
|
|
|
dev[0].scan(freq="2412")
|
2014-01-14 22:31:23 +01:00
|
|
|
time.sleep(0.03)
|
2013-12-25 17:55:08 +01:00
|
|
|
check_probe_resp(wt, bssid, None)
|
|
|
|
check_probe_resp(wt, bssid2, None)
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def test_ap_hs20_select(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "example.com" })
|
2013-10-29 13:20:29 +01:00
|
|
|
interworking_select(dev[0], bssid, "home")
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "no.match.example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "roaming", freq="2412")
|
2013-10-29 13:20:29 +01:00
|
|
|
|
|
|
|
dev[0].set_cred_quoted(id, "realm", "no.match.example.com");
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, no_match=True, freq="2412")
|
2013-10-29 13:20:29 +01:00
|
|
|
|
2014-02-25 22:16:54 +01:00
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.org,21" ]
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['domain_name'] = "example.org"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.org", 'username': "test",
|
|
|
|
'password': "secret",
|
|
|
|
'domain': "example.org" })
|
|
|
|
interworking_select(dev[0], bssid2, "home", freq="2412")
|
|
|
|
|
2013-12-26 12:11:02 +01:00
|
|
|
def hs20_simulated_sim(dev, ap, method):
|
|
|
|
bssid = ap['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "555,444"
|
|
|
|
params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(ap['ifname'], params)
|
|
|
|
|
|
|
|
dev.hs20_enable()
|
|
|
|
dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
|
|
|
|
'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev, "home", freq="2412")
|
2013-12-26 12:11:02 +01:00
|
|
|
interworking_connect(dev, bssid, method)
|
|
|
|
check_sp_type(dev, "home")
|
|
|
|
|
|
|
|
def test_ap_hs20_sim(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated SIM and EAP-SIM"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "SIM")
|
2014-03-01 10:48:09 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on already-connected event")
|
2013-12-26 12:11:02 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_aka(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated USIM and EAP-AKA"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "AKA")
|
|
|
|
|
|
|
|
def test_ap_hs20_aka_prime(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with simulated USIM and EAP-AKA'"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
hs20_simulated_sim(dev[0], apdev[0], "AKA'")
|
|
|
|
|
2013-10-29 13:20:29 +01:00
|
|
|
def test_ap_hs20_ext_sim(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with external SIM processing"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "232,01"
|
|
|
|
params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET external_sim 1")
|
2013-11-04 12:09:46 +01:00
|
|
|
dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], "home", freq="2412")
|
2013-10-29 13:20:29 +01:00
|
|
|
interworking_ext_sim_connect(dev[0], bssid, "SIM")
|
|
|
|
check_sp_type(dev[0], "home")
|
2013-10-29 13:23:31 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_ext_sim_roaming(dev, apdev):
|
|
|
|
"""Hotspot 2.0 with external SIM processing in roaming network"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
|
|
|
|
params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET external_sim 1")
|
2013-11-04 12:09:46 +01:00
|
|
|
dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], "roaming", freq="2412")
|
2013-10-29 13:23:31 +01:00
|
|
|
interworking_ext_sim_connect(dev[0], bssid, "SIM")
|
|
|
|
check_sp_type(dev[0], "roaming")
|
2013-10-29 13:38:31 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_username(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
2014-03-13 22:14:08 +01:00
|
|
|
params['disable_dgaf'] = '1'
|
2013-10-29 13:38:31 +01:00
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
2014-02-27 18:04:56 +01:00
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
2013-12-20 05:46:07 +01:00
|
|
|
'domain': "example.com",
|
|
|
|
'update_identifier': "1234" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "home")
|
2014-02-27 18:26:50 +01:00
|
|
|
status = dev[0].get_status()
|
|
|
|
if status['pairwise_cipher'] != "CCMP":
|
|
|
|
raise Exception("Unexpected pairwise cipher")
|
|
|
|
if status['hs20'] != "2":
|
|
|
|
raise Exception("Unexpected HS 2.0 support indication")
|
2013-10-29 13:38:31 +01:00
|
|
|
|
2014-02-27 18:04:56 +01:00
|
|
|
dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
|
|
|
|
identity="hs20-test", password="password",
|
|
|
|
ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
|
|
|
|
scan_freq="2412")
|
|
|
|
|
2014-04-12 22:01:58 +02:00
|
|
|
def test_ap_hs20_connect_api(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with connect API"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['disable_dgaf'] = '1'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
wpas.hs20_enable()
|
|
|
|
id = wpas.add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'domain': "example.com",
|
|
|
|
'update_identifier': "1234" })
|
|
|
|
interworking_select(wpas, bssid, "home", freq="2412")
|
|
|
|
interworking_connect(wpas, bssid, "TTLS")
|
|
|
|
check_sp_type(wpas, "home")
|
|
|
|
status = wpas.get_status()
|
|
|
|
if status['pairwise_cipher'] != "CCMP":
|
|
|
|
raise Exception("Unexpected pairwise cipher")
|
|
|
|
if status['hs20'] != "2":
|
|
|
|
raise Exception("Unexpected HS 2.0 support indication")
|
|
|
|
|
2014-04-12 17:47:48 +02:00
|
|
|
def test_ap_hs20_auto_interworking(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with auto_interworking=1"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['disable_dgaf'] = '1'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable(auto_interworking=True)
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'domain': "example.com",
|
|
|
|
'update_identifier': "1234" })
|
|
|
|
dev[0].request("REASSOCIATE")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
status = dev[0].get_status()
|
|
|
|
if status['pairwise_cipher'] != "CCMP":
|
|
|
|
raise Exception("Unexpected pairwise cipher")
|
|
|
|
if status['hs20'] != "2":
|
|
|
|
raise Exception("Unexpected HS 2.0 support indication")
|
|
|
|
|
2014-05-31 12:25:12 +02:00
|
|
|
def test_ap_hs20_auto_interworking_no_cred_match(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with auto_interworking=1 but no cred match"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = { "ssid": "test" }
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable(auto_interworking=True)
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'domain': "example.com" })
|
|
|
|
|
|
|
|
id = dev[0].connect("test", psk="12345678", only_add_network=True)
|
|
|
|
dev[0].request("ENABLE_NETWORK %s" % id)
|
|
|
|
logger.info("Verify that scanning continues when there is partial network block match")
|
|
|
|
for i in range(0, 2):
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan timed out")
|
|
|
|
logger.info("Scan completed")
|
|
|
|
|
2013-12-26 13:08:42 +01:00
|
|
|
def eap_test(dev, ap, eap_params, method, user):
|
|
|
|
bssid = ap['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com," + eap_params ]
|
|
|
|
hostapd.add_ap(ap['ifname'], params)
|
|
|
|
|
|
|
|
dev.hs20_enable()
|
|
|
|
dev.add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': user,
|
|
|
|
'password': "password" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev, bssid, freq="2412")
|
2013-12-26 13:08:42 +01:00
|
|
|
interworking_connect(dev, bssid, method)
|
|
|
|
|
2014-03-01 18:06:45 +01:00
|
|
|
def test_ap_hs20_eap_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with unknown EAP method"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = "0,example.com,99"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
2013-12-26 13:08:42 +01:00
|
|
|
def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/MSCHAPV2"""
|
|
|
|
eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
|
|
|
|
|
2014-03-01 18:06:45 +01:00
|
|
|
def test_ap_hs20_eap_peap_default(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/MSCHAPV2 (as default)"""
|
|
|
|
eap_test(dev[0], apdev[0], "25", "PEAP", "user")
|
|
|
|
|
2013-12-26 13:08:42 +01:00
|
|
|
def test_ap_hs20_eap_peap_gtc(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/GTC"""
|
|
|
|
eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
|
|
|
|
|
2014-03-01 18:06:45 +01:00
|
|
|
def test_ap_hs20_eap_peap_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with PEAP/unknown"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = "0,example.com,25[3:99]"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
2013-12-26 13:08:42 +01:00
|
|
|
def test_ap_hs20_eap_ttls_chap(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/CHAP"""
|
|
|
|
eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_mschap(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/MSCHAP"""
|
|
|
|
eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
|
2014-03-01 18:06:45 +01:00
|
|
|
eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_eap_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/EAP-unknown"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = "0,example.com,21[3:99]"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_eap_unsupported(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/EAP-OTP(unsupported)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = "0,example.com,21[3:5]"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_ttls_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with TTLS/unknown"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = "0,example.com,21[2:5]"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
2013-12-26 13:08:42 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
|
|
|
|
eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_fast_gtc(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with FAST/EAP-GTC"""
|
|
|
|
eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_tls(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with EAP-TLS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "certificate-user",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'client_cert': "auth_serv/user.pem",
|
|
|
|
'private_key': "auth_serv/user.key"})
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
2013-12-26 13:08:42 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TLS")
|
|
|
|
|
2014-03-01 18:06:45 +01:00
|
|
|
def test_ap_hs20_eap_cert_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with certificate, but unknown EAP method"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,99[5:6]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "certificate-user",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'client_cert': "auth_serv/user.pem",
|
|
|
|
'private_key': "auth_serv/user.key"})
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_cert_unsupported(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with certificate, but unsupported TTLS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,21[5:6]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "certificate-user",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'client_cert': "auth_serv/user.pem",
|
|
|
|
'private_key': "auth_serv/user.key"})
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
|
|
|
def test_ap_hs20_eap_invalid_cred(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with invalid cred configuration"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "certificate-user",
|
|
|
|
'client_cert': "auth_serv/user.pem" })
|
|
|
|
interworking_select(dev[0], None, no_match=True, freq="2412")
|
|
|
|
|
2013-12-26 12:44:27 +01:00
|
|
|
def test_ap_hs20_nai_realms(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "pap user",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
2013-12-26 12:44:27 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
|
2013-12-26 12:18:46 +01:00
|
|
|
def test_ap_hs20_roaming_consortium(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection based on roaming consortium match"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-03-01 17:46:49 +01:00
|
|
|
for consortium in [ "112233", "1020304050", "010203040506", "fedcba" ]:
|
|
|
|
id = dev[0].add_cred_values({ 'username': "user",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'roaming_consortium': consortium,
|
|
|
|
'eap': "PEAP" })
|
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "PEAP")
|
|
|
|
check_sp_type(dev[0], "home")
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on already-connected event")
|
|
|
|
dev[0].remove_cred(id)
|
2013-12-26 12:18:46 +01:00
|
|
|
|
2013-10-29 13:38:31 +01:00
|
|
|
def test_ap_hs20_username_roaming(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (roaming)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
|
|
|
|
"0,roaming.example.com,21[2:4][5:7]",
|
|
|
|
"0,another.example.com" ]
|
|
|
|
params['domain_name'] = "another.example.com"
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "roaming", freq="2412")
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "roaming")
|
|
|
|
|
|
|
|
def test_ap_hs20_username_unknown(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (no domain in cred)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "unknown", freq="2412")
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
|
|
|
|
def test_ap_hs20_username_unknown2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection in username/password credential (no domain advertized)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
del params['domain_name']
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2013-11-04 12:09:46 +01:00
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "unknown", freq="2412")
|
2013-10-29 13:38:31 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
2013-11-04 12:11:31 +01:00
|
|
|
|
2013-11-07 23:26:16 +01:00
|
|
|
def test_ap_hs20_gas_while_associated(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with GAS query while associated"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
2013-11-07 23:26:16 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Verifying GAS query while associated")
|
|
|
|
dev[0].request("FETCH_ANQP")
|
|
|
|
for i in range(0, 6):
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Operation timed out")
|
|
|
|
|
2014-01-23 09:28:04 +01:00
|
|
|
def test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with GAS query while associated and using PMF"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET pmf 2")
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Verifying GAS query while associated")
|
|
|
|
dev[0].request("FETCH_ANQP")
|
|
|
|
for i in range(0, 2 * 6):
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Operation timed out")
|
|
|
|
|
2013-11-07 23:26:16 +01:00
|
|
|
def test_ap_hs20_gas_frag_while_associated(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with fragmented GAS query while associated"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
hapd = hostapd.Hostapd(apdev[0]['ifname'])
|
|
|
|
hapd.set("gas_frag_limit", "50")
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
2013-11-07 23:26:16 +01:00
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Verifying GAS query while associated")
|
|
|
|
dev[0].request("FETCH_ANQP")
|
|
|
|
for i in range(0, 6):
|
|
|
|
ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Operation timed out")
|
|
|
|
|
2013-11-06 22:35:19 +01:00
|
|
|
def test_ap_hs20_multiple_connects(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection through multiple network selections"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
2014-05-14 12:35:32 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
|
2013-11-06 22:35:19 +01:00
|
|
|
for i in range(0, 3):
|
|
|
|
logger.info("Starting Interworking network selection")
|
2014-01-05 11:26:20 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-11-06 22:35:19 +01:00
|
|
|
while True:
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching AP not found")
|
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
break
|
|
|
|
if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
break
|
|
|
|
if i == 0:
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
networks = dev[0].list_networks()
|
|
|
|
if len(networks) > 1:
|
|
|
|
raise Exception("Duplicated network block detected")
|
|
|
|
|
2013-11-06 23:09:57 +01:00
|
|
|
def test_ap_hs20_disallow_aps(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and disallow_aps"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
2014-05-14 12:35:32 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
|
2013-11-06 23:09:57 +01:00
|
|
|
logger.info("Verify disallow_aps bssid")
|
|
|
|
dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
logger.info("Verify disallow_aps ssid")
|
|
|
|
dev[0].request("SET disallow_aps ssid 746573742d68733230")
|
2014-01-05 11:26:20 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-11-06 23:09:57 +01:00
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
logger.info("Verify disallow_aps clear")
|
|
|
|
dev[0].request("SET disallow_aps ")
|
2014-01-05 11:26:20 +01:00
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
2013-11-06 23:09:57 +01:00
|
|
|
|
|
|
|
dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
|
|
|
|
ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
|
|
|
|
if "FAIL" not in ret:
|
|
|
|
raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
|
|
|
|
|
2013-11-04 12:11:31 +01:00
|
|
|
def policy_test(dev, ap, values, only_one=True):
|
|
|
|
dev.dump_monitor()
|
2013-11-04 15:32:00 +01:00
|
|
|
if ap:
|
|
|
|
logger.info("Verify network selection to AP " + ap['ifname'])
|
|
|
|
bssid = ap['bssid']
|
2014-05-14 12:35:32 +02:00
|
|
|
dev.scan_for_bss(bssid, freq="2412")
|
2013-11-04 15:32:00 +01:00
|
|
|
else:
|
|
|
|
logger.info("Verify network selection")
|
|
|
|
bssid = None
|
2013-11-04 12:11:31 +01:00
|
|
|
dev.hs20_enable()
|
|
|
|
id = dev.add_cred_values(values)
|
2014-01-05 11:26:20 +01:00
|
|
|
dev.request("INTERWORKING_SELECT auto freq=2412")
|
2013-11-04 15:32:00 +01:00
|
|
|
events = []
|
2013-11-04 12:11:31 +01:00
|
|
|
while True:
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
|
2013-11-04 15:36:19 +01:00
|
|
|
"INTERWORKING-BLACKLISTED",
|
2013-11-04 13:45:41 +01:00
|
|
|
"INTERWORKING-SELECTED"], timeout=15)
|
2013-11-04 12:11:31 +01:00
|
|
|
if ev is None:
|
2013-11-04 13:45:41 +01:00
|
|
|
raise Exception("Network selection timed out")
|
2013-11-04 15:32:00 +01:00
|
|
|
events.append(ev)
|
2013-11-04 12:11:31 +01:00
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching AP not found")
|
2013-11-04 15:32:00 +01:00
|
|
|
if bssid and only_one and "INTERWORKING-AP" in ev and bssid not in ev:
|
2013-11-04 12:11:31 +01:00
|
|
|
raise Exception("Unexpected AP claimed acceptable")
|
2013-11-04 13:45:41 +01:00
|
|
|
if "INTERWORKING-SELECTED" in ev:
|
2013-11-04 15:32:00 +01:00
|
|
|
if bssid and bssid not in ev:
|
2013-11-04 13:45:41 +01:00
|
|
|
raise Exception("Selected incorrect BSS")
|
2013-11-04 12:11:31 +01:00
|
|
|
break
|
|
|
|
|
2013-11-04 13:45:41 +01:00
|
|
|
ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
2013-11-04 15:32:00 +01:00
|
|
|
if bssid and bssid not in ev:
|
2013-11-04 13:45:41 +01:00
|
|
|
raise Exception("Connected to incorrect BSS")
|
|
|
|
|
2013-11-04 12:11:31 +01:00
|
|
|
conn_bssid = dev.get_status_field("bssid")
|
2013-11-04 15:32:00 +01:00
|
|
|
if bssid and conn_bssid != bssid:
|
2013-11-04 12:11:31 +01:00
|
|
|
raise Exception("bssid information points to incorrect BSS")
|
|
|
|
|
|
|
|
dev.remove_cred(id)
|
|
|
|
dev.dump_monitor()
|
2013-11-04 15:32:00 +01:00
|
|
|
return events
|
2013-11-04 12:11:31 +01:00
|
|
|
|
2014-03-01 09:10:53 +01:00
|
|
|
def default_cred(domain=None):
|
|
|
|
cred = { 'realm': "example.com",
|
2013-11-04 12:22:55 +01:00
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password" }
|
2014-03-01 09:10:53 +01:00
|
|
|
if domain:
|
|
|
|
cred['domain'] = domain
|
|
|
|
return cred
|
2013-11-04 12:22:55 +01:00
|
|
|
|
2014-02-27 18:34:34 +01:00
|
|
|
def test_ap_hs20_prefer_home(dev, apdev):
|
|
|
|
"""Hotspot 2.0 required roaming consortium"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['domain_name'] = "example.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['domain_name'] = "example.com"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
values = default_cred()
|
|
|
|
values['domain'] = "example.com"
|
|
|
|
policy_test(dev[0], apdev[1], values, only_one=False)
|
|
|
|
values['domain'] = "example.org"
|
|
|
|
policy_test(dev[0], apdev[0], values, only_one=False)
|
|
|
|
|
2013-11-04 12:11:31 +01:00
|
|
|
def test_ap_hs20_req_roaming_consortium(dev, apdev):
|
|
|
|
"""Hotspot 2.0 required roaming consortium"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['roaming_consortium'] = [ "223344" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
2013-11-04 12:22:55 +01:00
|
|
|
values = default_cred()
|
|
|
|
values['required_roaming_consortium'] = "223344"
|
2013-11-04 12:11:31 +01:00
|
|
|
policy_test(dev[0], apdev[1], values)
|
|
|
|
values['required_roaming_consortium'] = "112233"
|
|
|
|
policy_test(dev[0], apdev[0], values)
|
2013-11-04 12:22:55 +01:00
|
|
|
|
2014-02-26 17:35:13 +01:00
|
|
|
id = dev[0].add_cred()
|
|
|
|
dev[0].set_cred(id, "required_roaming_consortium", "112233")
|
|
|
|
dev[0].set_cred(id, "required_roaming_consortium", "112233445566778899aabbccddeeff")
|
|
|
|
|
|
|
|
for val in [ "", "1", "11", "1122", "1122334", "112233445566778899aabbccddeeff00" ]:
|
|
|
|
if "FAIL" not in dev[0].request('SET_CRED {} required_roaming_consortium {}'.format(id, val)):
|
|
|
|
raise Exception("Invalid roaming consortium value accepted: " + val)
|
|
|
|
|
2013-11-04 12:22:55 +01:00
|
|
|
def test_ap_hs20_excluded_ssid(dev, apdev):
|
|
|
|
"""Hotspot 2.0 exclusion based on SSID"""
|
|
|
|
params = hs20_ap_params()
|
2014-03-01 10:44:25 +01:00
|
|
|
params['roaming_consortium'] = [ "223344" ]
|
|
|
|
params['anqp_3gpp_cell_net'] = "555,444"
|
2013-11-04 12:22:55 +01:00
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['roaming_consortium'] = [ "223344" ]
|
2014-03-01 10:44:25 +01:00
|
|
|
params['anqp_3gpp_cell_net'] = "555,444"
|
2013-11-04 12:22:55 +01:00
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
values = default_cred()
|
|
|
|
values['excluded_ssid'] = "test-hs20"
|
2013-11-04 15:36:19 +01:00
|
|
|
events = policy_test(dev[0], apdev[1], values)
|
|
|
|
ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1:
|
|
|
|
raise Exception("Excluded network not reported")
|
2013-11-04 12:22:55 +01:00
|
|
|
values['excluded_ssid'] = "test-hs20-other"
|
2013-11-04 15:36:19 +01:00
|
|
|
events = policy_test(dev[0], apdev[0], values)
|
|
|
|
ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[1]['bssid'] in e]
|
|
|
|
if len(ev) != 1:
|
|
|
|
raise Exception("Excluded network not reported")
|
2014-02-25 21:41:03 +01:00
|
|
|
|
2014-03-01 10:44:25 +01:00
|
|
|
values = default_cred()
|
|
|
|
values['roaming_consortium'] = "223344"
|
|
|
|
values['eap'] = "TTLS"
|
|
|
|
values['phase2'] = "auth=MSCHAPV2"
|
|
|
|
values['excluded_ssid'] = "test-hs20"
|
|
|
|
events = policy_test(dev[0], apdev[1], values)
|
|
|
|
ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1:
|
|
|
|
raise Exception("Excluded network not reported")
|
|
|
|
|
|
|
|
values = { 'imsi': "555444-333222111", 'eap': "SIM",
|
|
|
|
'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
|
|
|
|
'excluded_ssid': "test-hs20" }
|
|
|
|
events = policy_test(dev[0], apdev[1], values)
|
|
|
|
ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1:
|
|
|
|
raise Exception("Excluded network not reported")
|
|
|
|
|
2014-02-25 21:41:03 +01:00
|
|
|
def test_ap_hs20_roam_to_higher_prio(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and roaming from current to higher priority network"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-visited")
|
|
|
|
params['domain_name'] = "visited.example.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" })
|
|
|
|
logger.info("Connect to the only network option")
|
|
|
|
interworking_select(dev[0], bssid, "roaming", freq="2412")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
logger.info("Start another AP (home operator) and reconnect")
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-home")
|
|
|
|
params['domain_name'] = "example.com"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
2014-05-14 12:35:32 +02:00
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412", force_scan=True)
|
2014-02-25 21:41:03 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-NO-MATCH" in ev:
|
|
|
|
raise Exception("Matching AP not found")
|
|
|
|
if "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
raise Exception("Unexpected AP selected")
|
|
|
|
if bssid2 not in ev:
|
|
|
|
raise Exception("Unexpected BSSID after reconnection")
|
2014-02-25 22:40:29 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_domain_suffix_match(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and domain_suffix_match"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'domain_suffix_match': "w1.fi" })
|
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
dev[0].set_cred_quoted(id, "domain_suffix_match", "no-match.example.com")
|
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("INTERWORKING_CONNECT " + bssid)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("TLS certificate error not reported")
|
|
|
|
if "Domain suffix mismatch" not in ev:
|
|
|
|
raise Exception("Domain suffix mismatch not reported")
|
2013-10-29 18:46:38 +01:00
|
|
|
|
2013-11-04 13:39:25 +01:00
|
|
|
def test_ap_hs20_roaming_partner_preference(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and roaming partner preference"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['domain_name'] = "roaming.example.org"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['domain_name'] = "roaming.example.net"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
logger.info("Verify default vs. specified preference")
|
|
|
|
values = default_cred()
|
|
|
|
values['roaming_partner'] = "roaming.example.net,1,127,*"
|
|
|
|
policy_test(dev[0], apdev[1], values, only_one=False)
|
|
|
|
values['roaming_partner'] = "roaming.example.net,1,129,*"
|
|
|
|
policy_test(dev[0], apdev[0], values, only_one=False)
|
|
|
|
|
|
|
|
logger.info("Verify partial FQDN match")
|
|
|
|
values['roaming_partner'] = "example.net,0,0,*"
|
|
|
|
policy_test(dev[0], apdev[1], values, only_one=False)
|
|
|
|
values['roaming_partner'] = "example.net,0,255,*"
|
|
|
|
policy_test(dev[0], apdev[0], values, only_one=False)
|
|
|
|
|
2013-11-04 15:32:00 +01:00
|
|
|
def test_ap_hs20_max_bss_load(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and maximum BSS load"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['bss_load_test'] = "12:200:20000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['bss_load_test'] = "5:20:10000"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
logger.info("Verify maximum BSS load constraint")
|
|
|
|
values = default_cred()
|
|
|
|
values['domain'] = "example.com"
|
|
|
|
values['max_bss_load'] = "100"
|
|
|
|
events = policy_test(dev[0], apdev[1], values, only_one=False)
|
|
|
|
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case not noticed")
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case reported incorrectly")
|
|
|
|
|
|
|
|
logger.info("Verify maximum BSS load does not prevent connection")
|
|
|
|
values['max_bss_load'] = "1"
|
|
|
|
events = policy_test(dev[0], None, values)
|
|
|
|
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case not noticed")
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case not noticed")
|
|
|
|
|
|
|
|
def test_ap_hs20_max_bss_load2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and maximum BSS load with one AP not advertising"""
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['bss_load_test'] = "12:200:20000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
logger.info("Verify maximum BSS load constraint with AP advertisement")
|
|
|
|
values = default_cred()
|
|
|
|
values['domain'] = "example.com"
|
|
|
|
values['max_bss_load'] = "100"
|
|
|
|
events = policy_test(dev[0], apdev[1], values, only_one=False)
|
|
|
|
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case not noticed")
|
|
|
|
ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
|
|
|
|
if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
|
|
|
|
raise Exception("Maximum BSS Load case reported incorrectly")
|
|
|
|
|
2013-10-29 18:46:38 +01:00
|
|
|
def test_ap_hs20_multi_cred_sp_prio(dev, apdev):
|
|
|
|
"""Hotspot 2.0 multi-cred sp_priority"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
del params['domain_name']
|
|
|
|
params['anqp_3gpp_cell_net'] = "232,01"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2013-10-29 18:46:38 +01:00
|
|
|
dev[0].request("SET external_sim 1")
|
|
|
|
id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
|
|
|
|
'provisioning_sp': "example.com",
|
|
|
|
'sp_priority' :"1" })
|
|
|
|
id2 = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'provisioning_sp': "example.com",
|
|
|
|
'sp_priority': "2" })
|
|
|
|
dev[0].dump_monitor()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-03-01 09:35:30 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_ext_sim_auth(dev[0], "SIM")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
dev[0].set_cred(id1, "sp_priority", "2")
|
|
|
|
dev[0].set_cred(id2, "sp_priority", "1")
|
|
|
|
dev[0].dump_monitor()
|
2014-03-01 09:35:30 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_auth(dev[0], "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
|
|
|
|
def test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 multi-cred sp_priority with two BSSes"""
|
|
|
|
if not hlr_auc_gw_available():
|
|
|
|
return "skip"
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
del params['nai_realm']
|
|
|
|
del params['domain_name']
|
|
|
|
params['anqp_3gpp_cell_net'] = "232,01"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['ssid'] = "test-hs20-other"
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
del params['domain_name']
|
|
|
|
del params['anqp_3gpp_cell_net']
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].request("SET external_sim 1")
|
|
|
|
id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
|
|
|
|
'provisioning_sp': "example.com",
|
|
|
|
'sp_priority': "1" })
|
|
|
|
id2 = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'provisioning_sp': "example.com",
|
|
|
|
'sp_priority': "2" })
|
|
|
|
dev[0].dump_monitor()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-03-01 09:35:30 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_ext_sim_auth(dev[0], "SIM")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
conn_bssid = dev[0].get_status_field("bssid")
|
|
|
|
if conn_bssid != bssid:
|
|
|
|
raise Exception("Connected to incorrect BSS")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
|
|
|
|
dev[0].set_cred(id1, "sp_priority", "2")
|
|
|
|
dev[0].set_cred(id2, "sp_priority", "1")
|
|
|
|
dev[0].dump_monitor()
|
2014-03-01 09:35:30 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
2013-10-29 18:46:38 +01:00
|
|
|
interworking_auth(dev[0], "TTLS")
|
|
|
|
check_sp_type(dev[0], "unknown")
|
|
|
|
conn_bssid = dev[0].get_status_field("bssid")
|
|
|
|
if conn_bssid != bssid2:
|
|
|
|
raise Exception("Connected to incorrect BSS")
|
2014-02-18 11:08:47 +01:00
|
|
|
|
2014-03-01 08:19:05 +01:00
|
|
|
def check_conn_capab_selection(dev, type, missing):
|
|
|
|
dev.request("INTERWORKING_SELECT freq=2412")
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
|
|
|
if "type=" + type not in ev:
|
|
|
|
raise Exception("Unexpected network type")
|
|
|
|
if missing and "conn_capab_missing=1" not in ev:
|
|
|
|
raise Exception("conn_capab_missing not reported")
|
|
|
|
if not missing and "conn_capab_missing=1" in ev:
|
|
|
|
raise Exception("conn_capab_missing reported unexpectedly")
|
|
|
|
|
|
|
|
def conn_capab_cred(domain=None, req_conn_capab=None):
|
|
|
|
cred = default_cred(domain=domain)
|
|
|
|
if req_conn_capab:
|
|
|
|
cred['req_conn_capab'] = req_conn_capab
|
|
|
|
return cred
|
|
|
|
|
2014-02-26 23:49:52 +01:00
|
|
|
def test_ap_hs20_req_conn_capab(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with req_conn_capab"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-02-26 23:49:52 +01:00
|
|
|
logger.info("Not used in home network")
|
2014-03-01 08:19:05 +01:00
|
|
|
values = conn_capab_cred(domain="example.com", req_conn_capab="6:1234")
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_conn_capab_selection(dev[0], "home", False)
|
2014-02-26 23:49:52 +01:00
|
|
|
|
|
|
|
logger.info("Used in roaming network")
|
|
|
|
dev[0].remove_cred(id)
|
2014-03-01 08:19:05 +01:00
|
|
|
values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_conn_capab_selection(dev[0], "roaming", True)
|
2014-02-26 23:49:52 +01:00
|
|
|
|
|
|
|
logger.info("Verify that req_conn_capab does not prevent connection if no other network is available")
|
2014-03-01 08:19:05 +01:00
|
|
|
check_auto_select(dev[0], bssid)
|
|
|
|
|
|
|
|
logger.info("Additional req_conn_capab checks")
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
values = conn_capab_cred(domain="example.org", req_conn_capab="1:0")
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_conn_capab_selection(dev[0], "roaming", True)
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
values = conn_capab_cred(domain="example.org", req_conn_capab="17:5060")
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_conn_capab_selection(dev[0], "roaming", True)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20b")
|
|
|
|
params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
values = conn_capab_cred(domain="example.org", req_conn_capab="50")
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
dev[0].set_cred(id, "req_conn_capab", "6:22")
|
2014-05-14 12:35:32 +02:00
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-03-01 08:19:05 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT freq=2412")
|
|
|
|
for i in range(0, 2):
|
|
|
|
ev = dev[0].wait_event(["INTERWORKING-AP"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
|
|
|
if bssid in ev and "conn_capab_missing=1" not in ev:
|
|
|
|
raise Exception("Missing protocol connection capability not reported")
|
|
|
|
if bssid2 in ev and "conn_capab_missing=1" in ev:
|
|
|
|
raise Exception("Protocol connection capability not reported correctly")
|
|
|
|
|
|
|
|
def test_ap_hs20_req_conn_capab_and_roaming_partner_preference(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and req_conn_capab with roaming partner preference"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['domain_name'] = "roaming.example.org"
|
|
|
|
params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-b")
|
|
|
|
params['domain_name'] = "roaming.example.net"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
values = default_cred()
|
|
|
|
values['roaming_partner'] = "roaming.example.net,1,127,*"
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_auto_select(dev[0], bssid2)
|
|
|
|
|
|
|
|
dev[0].set_cred(id, "req_conn_capab", "50")
|
|
|
|
check_auto_select(dev[0], bssid)
|
|
|
|
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
dev[0].set_cred(id, "req_conn_capab", "51")
|
|
|
|
check_auto_select(dev[0], bssid2)
|
2014-02-26 23:49:52 +01:00
|
|
|
|
2014-03-01 09:10:53 +01:00
|
|
|
def check_bandwidth_selection(dev, type, below):
|
|
|
|
dev.request("INTERWORKING_SELECT freq=2412")
|
|
|
|
ev = dev.wait_event(["INTERWORKING-AP"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Network selection timed out");
|
|
|
|
if "type=" + type not in ev:
|
|
|
|
raise Exception("Unexpected network type")
|
|
|
|
if below and "below_min_backhaul=1" not in ev:
|
|
|
|
raise Exception("below_min_backhaul not reported")
|
|
|
|
if not below and "below_min_backhaul=1" in ev:
|
|
|
|
raise Exception("below_min_backhaul reported unexpectedly")
|
|
|
|
|
|
|
|
def bw_cred(domain=None, dl_home=None, ul_home=None, dl_roaming=None, ul_roaming=None):
|
|
|
|
cred = default_cred(domain=domain)
|
|
|
|
if dl_home:
|
|
|
|
cred['min_dl_bandwidth_home'] = str(dl_home)
|
|
|
|
if ul_home:
|
|
|
|
cred['min_ul_bandwidth_home'] = str(ul_home)
|
|
|
|
if dl_roaming:
|
|
|
|
cred['min_dl_bandwidth_roaming'] = str(dl_roaming)
|
|
|
|
if ul_roaming:
|
|
|
|
cred['min_ul_bandwidth_roaming'] = str(ul_roaming)
|
|
|
|
return cred
|
|
|
|
|
|
|
|
def test_ap_hs20_min_bandwidth_home(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with min bandwidth (home)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-03-01 09:10:53 +01:00
|
|
|
values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "home", False)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "home", True)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "home", True)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "home", True)
|
|
|
|
check_auto_select(dev[0], bssid)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-b")
|
|
|
|
params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
check_auto_select(dev[0], bssid2)
|
|
|
|
|
|
|
|
def test_ap_hs20_min_bandwidth_roaming(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with min bandwidth (roaming)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-03-01 09:10:53 +01:00
|
|
|
values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=58)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "roaming", False)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=58)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "roaming", True)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=59)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "roaming", True)
|
|
|
|
dev[0].remove_cred(id)
|
|
|
|
|
|
|
|
values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=59)
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "roaming", True)
|
|
|
|
check_auto_select(dev[0], bssid)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-b")
|
|
|
|
params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
check_auto_select(dev[0], bssid2)
|
|
|
|
|
|
|
|
def test_ap_hs20_min_bandwidth_and_roaming_partner_preference(dev, apdev):
|
|
|
|
"""Hotspot 2.0 and minimum bandwidth with roaming partner preference"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['domain_name'] = "roaming.example.org"
|
|
|
|
params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20-b")
|
|
|
|
params['domain_name'] = "roaming.example.net"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
values = default_cred()
|
|
|
|
values['roaming_partner'] = "roaming.example.net,1,127,*"
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
check_auto_select(dev[0], bssid2)
|
|
|
|
|
|
|
|
dev[0].set_cred(id, "min_dl_bandwidth_roaming", "6000")
|
|
|
|
check_auto_select(dev[0], bssid)
|
|
|
|
|
|
|
|
dev[0].set_cred(id, "min_dl_bandwidth_roaming", "10000")
|
|
|
|
check_auto_select(dev[0], bssid2)
|
|
|
|
|
|
|
|
def test_ap_hs20_min_bandwidth_no_wan_metrics(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with min bandwidth but no WAN Metrics"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
del params['hs20_wan_metrics']
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-03-01 09:10:53 +01:00
|
|
|
values = bw_cred(domain="example.com", dl_home=10000, ul_home=10000,
|
|
|
|
dl_roaming=10000, ul_roaming=10000)
|
|
|
|
dev[0].add_cred_values(values)
|
|
|
|
check_bandwidth_selection(dev[0], "home", False)
|
|
|
|
|
2014-02-18 11:08:47 +01:00
|
|
|
def test_ap_hs20_deauth_req_ess(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and deauthentication request for ESS"""
|
|
|
|
dev[0].request("SET pmf 2")
|
|
|
|
eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
addr = dev[0].p2p_interface_addr()
|
|
|
|
hapd = hostapd.Hostapd(apdev[0]['ifname'])
|
|
|
|
hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
|
|
|
|
ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on deauth imminent notice")
|
|
|
|
if "1 120 http://example.com/" not in ev:
|
|
|
|
raise Exception("Unexpected deauth imminent notice: " + ev)
|
|
|
|
hapd.request("DEAUTHENTICATE " + addr)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on disconnection")
|
2014-03-01 10:57:07 +01:00
|
|
|
if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
|
|
|
|
raise Exception("Network not marked temporarily disabled")
|
2014-02-18 11:08:47 +01:00
|
|
|
ev = dev[0].wait_event(["SME: Trying to authenticate",
|
|
|
|
"Trying to associate",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=5)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection attempt")
|
|
|
|
|
|
|
|
def test_ap_hs20_deauth_req_bss(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and deauthentication request for BSS"""
|
|
|
|
dev[0].request("SET pmf 2")
|
|
|
|
eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
addr = dev[0].p2p_interface_addr()
|
|
|
|
hapd = hostapd.Hostapd(apdev[0]['ifname'])
|
|
|
|
hapd.request("HS20_DEAUTH_REQ " + addr + " 0 120 http://example.com/")
|
|
|
|
ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on deauth imminent notice")
|
|
|
|
if "0 120 http://example.com/" not in ev:
|
|
|
|
raise Exception("Unexpected deauth imminent notice: " + ev)
|
|
|
|
hapd.request("DEAUTHENTICATE " + addr + " reason=4")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on disconnection")
|
|
|
|
if "reason=4" not in ev:
|
|
|
|
raise Exception("Unexpected disconnection reason")
|
2014-03-01 10:57:07 +01:00
|
|
|
if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
|
|
|
|
raise Exception("Network not marked temporarily disabled")
|
2014-02-18 11:08:47 +01:00
|
|
|
ev = dev[0].wait_event(["SME: Trying to authenticate",
|
|
|
|
"Trying to associate",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=5)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection attempt")
|
2014-02-26 17:10:08 +01:00
|
|
|
|
2014-03-07 22:21:17 +01:00
|
|
|
def test_ap_hs20_deauth_req_from_radius(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and deauthentication request from RADIUS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,21[2:4]" ]
|
|
|
|
params['hs20_deauth_req_timeout'] = "2"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET pmf 2")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-deauth-test",
|
|
|
|
'password': "password" })
|
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on deauth imminent notice")
|
|
|
|
if " 1 100" not in ev:
|
|
|
|
raise Exception("Unexpected deauth imminent contents")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=3)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on disconnection")
|
|
|
|
|
2014-03-08 10:49:23 +01:00
|
|
|
def test_ap_hs20_remediation_required(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and remediation required from RADIUS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,21[2:4]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET pmf 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-subrem-test",
|
|
|
|
'password': "password" })
|
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on subscription remediation notice")
|
|
|
|
if " 1 https://example.com/" not in ev:
|
|
|
|
raise Exception("Unexpected subscription remediation event contents")
|
|
|
|
|
2014-03-13 18:36:36 +01:00
|
|
|
def test_ap_hs20_remediation_required_ctrl(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and subrem from ctrl_iface"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
addr = dev[0].p2p_dev_addr()
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,21[2:4]" ]
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET pmf 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values(default_cred())
|
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
|
|
|
|
hapd.request("HS20_WNM_NOTIF " + addr + " https://example.com/")
|
|
|
|
ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on subscription remediation notice")
|
|
|
|
if " 1 https://example.com/" not in ev:
|
|
|
|
raise Exception("Unexpected subscription remediation event contents")
|
|
|
|
|
|
|
|
hapd.request("HS20_WNM_NOTIF " + addr)
|
|
|
|
ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on subscription remediation notice")
|
|
|
|
if not ev.endswith("HS20-SUBSCRIPTION-REMEDIATION "):
|
|
|
|
raise Exception("Unexpected subscription remediation event contents: " + ev)
|
|
|
|
|
|
|
|
if "FAIL" not in hapd.request("HS20_WNM_NOTIF "):
|
|
|
|
raise Exception("Unexpected HS20_WNM_NOTIF success")
|
|
|
|
if "FAIL" not in hapd.request("HS20_WNM_NOTIF foo"):
|
|
|
|
raise Exception("Unexpected HS20_WNM_NOTIF success")
|
|
|
|
if "FAIL" not in hapd.request("HS20_WNM_NOTIF " + addr + " https://12345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678927.very.long.example.com/"):
|
|
|
|
raise Exception("Unexpected HS20_WNM_NOTIF success")
|
|
|
|
|
2014-03-10 10:34:31 +01:00
|
|
|
def test_ap_hs20_session_info(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection and session information from RADIUS"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['nai_realm'] = [ "0,example.com,21[2:4]" ]
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET pmf 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-session-info-test",
|
|
|
|
'password': "password" })
|
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
ev = dev[0].wait_event(["ESS-DISASSOC-IMMINENT"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on ESS disassociation imminent notice")
|
|
|
|
if " 1 59904 https://example.com/" not in ev:
|
|
|
|
raise Exception("Unexpected ESS disassociation imminent event contents")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan not started")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Scan not completed")
|
|
|
|
|
2014-02-26 17:10:08 +01:00
|
|
|
def test_ap_hs20_osen(dev, apdev):
|
|
|
|
"""Hotspot 2.0 OSEN connection"""
|
|
|
|
params = { 'ssid': "osen",
|
|
|
|
'osen': "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "1812",
|
|
|
|
'auth_server_shared_secret': "radius" }
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2014-03-29 15:51:44 +01:00
|
|
|
dev[1].connect("osen", key_mgmt="NONE", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
dev[2].connect("osen", key_mgmt="NONE", wep_key0='"hello"',
|
|
|
|
scan_freq="2412", wait_connect=False)
|
2014-02-26 17:10:08 +01:00
|
|
|
dev[0].connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
|
|
|
|
group="GTK_NOT_USED",
|
|
|
|
eap="WFA-UNAUTH-TLS", identity="osen@example.com",
|
|
|
|
ca_cert="auth_serv/ca.pem",
|
|
|
|
scan_freq="2412")
|
2014-02-27 13:17:31 +01:00
|
|
|
|
2014-03-25 16:56:55 +01:00
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
|
|
|
|
group="GTK_NOT_USED",
|
|
|
|
eap="WFA-UNAUTH-TLS", identity="osen@example.com",
|
|
|
|
ca_cert="auth_serv/ca.pem",
|
|
|
|
scan_freq="2412")
|
|
|
|
wpas.request("DISCONNECT")
|
|
|
|
|
2014-02-27 13:17:31 +01:00
|
|
|
def test_ap_hs20_network_preference(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with preferred home network"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com" }
|
|
|
|
dev[0].add_cred_values(values)
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "home")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "12345678")
|
|
|
|
dev[0].set_network(id, "priority", "1")
|
|
|
|
dev[0].request("ENABLE_NETWORK %s no-connect" % id)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-02-27 13:17:31 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-02-27 13:17:31 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
raise Exception("No roam to higher priority network")
|
|
|
|
if bssid2 not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
|
|
|
|
|
|
|
def test_ap_hs20_network_preference2(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with preferred credential"""
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'domain': "example.com",
|
|
|
|
'priority': "1" }
|
|
|
|
dev[0].add_cred_values(values)
|
|
|
|
|
|
|
|
id = dev[0].add_network()
|
|
|
|
dev[0].set_network_quoted(id, "ssid", "home")
|
|
|
|
dev[0].set_network_quoted(id, "psk", "12345678")
|
|
|
|
dev[0].request("ENABLE_NETWORK %s no-connect" % id)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-02-27 13:17:31 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if bssid2 not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
|
|
|
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
2014-02-27 13:17:31 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
raise Exception("No roam to higher priority network")
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
2014-02-27 18:23:14 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_network_preference3(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with two credential (one preferred)"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20b")
|
|
|
|
params['nai_realm'] = "0,example.org,13[5:6],21[2:4][5:7]"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'priority': "1" }
|
|
|
|
dev[0].add_cred_values(values)
|
|
|
|
values = { 'realm': "example.org",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-02-27 18:23:14 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
|
|
|
|
|
|
|
dev[0].set_cred(id, "priority", "2")
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
raise Exception("No roam to higher priority network")
|
|
|
|
if bssid2 not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
2014-02-28 23:31:32 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_network_preference4(dev, apdev):
|
|
|
|
"""Hotspot 2.0 network selection with username vs. SIM credential"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20b")
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['anqp_3gpp_cell_net'] = "555,444"
|
|
|
|
params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
values = { 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'priority': "1" }
|
|
|
|
dev[0].add_cred_values(values)
|
|
|
|
values = { 'imsi': "555444-333222111",
|
|
|
|
'eap': "SIM",
|
|
|
|
'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
|
|
|
|
id = dev[0].add_cred_values(values)
|
|
|
|
|
2014-09-27 11:08:21 +02:00
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
2014-02-28 23:31:32 +01:00
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if bssid not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
|
|
|
|
|
|
|
dev[0].set_cred(id, "priority", "2")
|
|
|
|
dev[0].request("INTERWORKING_SELECT auto freq=2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
|
|
|
|
"INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connection timed out")
|
|
|
|
if "INTERWORKING-ALREADY-CONNECTED" in ev:
|
|
|
|
raise Exception("No roam to higher priority network")
|
|
|
|
if bssid2 not in ev:
|
|
|
|
raise Exception("Unexpected network selected")
|
2014-03-01 16:45:39 +01:00
|
|
|
|
|
|
|
def test_ap_hs20_fetch_osu(dev, apdev):
|
|
|
|
"""Hotspot 2.0 OSU provider and icon fetch"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
|
|
|
|
params['osu_ssid'] = '"HS 2.0 OSU open"'
|
|
|
|
params['osu_method_list'] = "1"
|
|
|
|
params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
|
|
|
|
params['osu_icon'] = "w1fi_logo"
|
|
|
|
params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
|
|
|
|
params['osu_server_uri'] = "https://example.com/osu/"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
bssid2 = apdev[1]['bssid']
|
|
|
|
params = hs20_ap_params(ssid="test-hs20b")
|
|
|
|
params['hessid'] = bssid2
|
|
|
|
params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
|
|
|
|
params['osu_ssid'] = '"HS 2.0 OSU OSEN"'
|
|
|
|
params['osu_method_list'] = "0"
|
2014-03-30 11:42:16 +02:00
|
|
|
params['osu_nai'] = "osen@example.com"
|
2014-03-01 16:45:39 +01:00
|
|
|
params['osu_friendly_name'] = [ "eng:Test2 OSU", "fin:Testi2-OSU" ]
|
|
|
|
params['osu_icon'] = "w1fi_logo"
|
|
|
|
params['osu_service_desc'] = [ "eng:Example services2", "fin:Esimerkkipalveluja2" ]
|
|
|
|
params['osu_server_uri'] = "https://example.org/osu/"
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
with open("w1fi_logo.png", "r") as f:
|
|
|
|
orig_logo = f.read()
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dir = "/tmp/osu-fetch"
|
|
|
|
if os.path.isdir(dir):
|
|
|
|
files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
|
|
|
|
for f in files:
|
|
|
|
os.remove(dir + "/" + f)
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
os.makedirs(dir)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
try:
|
2014-04-11 23:27:20 +02:00
|
|
|
dev[1].scan(freq="2412")
|
2014-03-01 16:45:39 +01:00
|
|
|
dev[0].request("SET osu_dir " + dir)
|
|
|
|
dev[0].request("FETCH_OSU")
|
2014-04-11 23:27:20 +02:00
|
|
|
if "OK" not in dev[1].request("HS20_ICON_REQUEST " + bssid + " w1fi_logo"):
|
|
|
|
raise Exception("HS20_ICON_REQUEST failed")
|
2014-03-01 16:45:39 +01:00
|
|
|
icons = 0
|
|
|
|
while True:
|
|
|
|
ev = dev[0].wait_event(["OSU provider fetch completed",
|
|
|
|
"RX-HS20-ANQP-ICON"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on OSU fetch")
|
|
|
|
if "OSU provider fetch completed" in ev:
|
|
|
|
break
|
|
|
|
if "RX-HS20-ANQP-ICON" in ev:
|
|
|
|
with open(ev.split(' ')[1], "r") as f:
|
|
|
|
logo = f.read()
|
|
|
|
if logo == orig_logo:
|
|
|
|
icons += 1
|
|
|
|
|
|
|
|
with open(dir + "/osu-providers.txt", "r") as f:
|
|
|
|
prov = f.read()
|
|
|
|
if "OSU-PROVIDER " + bssid not in prov:
|
|
|
|
raise Exception("Missing OSU_PROVIDER")
|
|
|
|
if "OSU-PROVIDER " + bssid2 not in prov:
|
|
|
|
raise Exception("Missing OSU_PROVIDER")
|
|
|
|
finally:
|
|
|
|
files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
|
|
|
|
for f in files:
|
|
|
|
os.remove(dir + "/" + f)
|
|
|
|
os.rmdir(dir)
|
|
|
|
|
|
|
|
if icons != 2:
|
|
|
|
raise Exception("Unexpected number of icons fetched")
|
2014-04-11 23:27:20 +02:00
|
|
|
|
|
|
|
ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on GAS-QUERY-DONE")
|
|
|
|
ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on GAS-QUERY-DONE")
|
|
|
|
if "freq=2412 status_code=0 result=SUCCESS" not in ev:
|
|
|
|
raise Exception("Unexpected GAS-QUERY-DONE: " + ev)
|
|
|
|
ev = dev[1].wait_event(["RX-HS20-ANQP"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on icon fetch")
|
|
|
|
if "Icon Binary File" not in ev:
|
|
|
|
raise Exception("Unexpected ANQP element")
|
2014-05-10 15:17:41 +02:00
|
|
|
|
|
|
|
def test_ap_hs20_ft(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with FT"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['wpa_key_mgmt'] = "FT-EAP"
|
|
|
|
params['nas_identifier'] = "nas1.w1.fi"
|
|
|
|
params['r1_key_holder'] = "000102030405"
|
|
|
|
params["mobility_domain"] = "a1b2"
|
|
|
|
params["reassociation_deadline"] = "1000"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'domain': "example.com",
|
|
|
|
'update_identifier': "1234" })
|
|
|
|
interworking_select(dev[0], bssid, "home", freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
2014-05-27 23:48:05 +02:00
|
|
|
|
|
|
|
def test_ap_hs20_remediation_sql(dev, apdev, params):
|
|
|
|
"""Hotspot 2.0 connection and remediation required using SQLite for user DB"""
|
|
|
|
try:
|
|
|
|
import sqlite3
|
|
|
|
except ImportError:
|
|
|
|
return "skip"
|
|
|
|
dbfile = os.path.join(params['logdir'], "eap-user.db")
|
|
|
|
try:
|
|
|
|
os.remove(dbfile)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
con = sqlite3.connect(dbfile)
|
|
|
|
with con:
|
|
|
|
cur = con.cursor()
|
|
|
|
cur.execute("CREATE TABLE users(identity TEXT PRIMARY KEY, methods TEXT, password TEXT, remediation TEXT, phase2 INTEGER)")
|
|
|
|
cur.execute("CREATE TABLE wildcards(identity TEXT PRIMARY KEY, methods TEXT)")
|
|
|
|
cur.execute("INSERT INTO users(identity,methods,password,phase2,remediation) VALUES ('user-mschapv2','TTLS-MSCHAPV2','password',1,'user')")
|
|
|
|
cur.execute("INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS')")
|
|
|
|
cur.execute("CREATE TABLE authlog(timestamp TEXT, session TEXT, nas_ip TEXT, username TEXT, note TEXT)")
|
|
|
|
|
|
|
|
try:
|
|
|
|
params = { "ssid": "as", "beacon_int": "2000",
|
|
|
|
"radius_server_clients": "auth_serv/radius_clients.conf",
|
|
|
|
"radius_server_auth_port": '18128',
|
|
|
|
"eap_server": "1",
|
|
|
|
"eap_user_file": "sqlite:" + dbfile,
|
|
|
|
"ca_cert": "auth_serv/ca.pem",
|
|
|
|
"server_cert": "auth_serv/server.pem",
|
|
|
|
"private_key": "auth_serv/server.key",
|
|
|
|
"subscr_remediation_url": "https://example.org/",
|
|
|
|
"subscr_remediation_method": "1" }
|
|
|
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['auth_server_port'] = "18128"
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].request("SET pmf 1")
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
id = dev[0].add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "user-mschapv2",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem" })
|
|
|
|
interworking_select(dev[0], bssid, freq="2412")
|
|
|
|
interworking_connect(dev[0], bssid, "TTLS")
|
|
|
|
ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on subscription remediation notice")
|
|
|
|
if " 1 https://example.org/" not in ev:
|
|
|
|
raise Exception("Unexpected subscription remediation event contents")
|
|
|
|
|
|
|
|
with con:
|
|
|
|
cur = con.cursor()
|
|
|
|
cur.execute("SELECT * from authlog")
|
|
|
|
rows = cur.fetchall()
|
|
|
|
if len(rows) < 1:
|
|
|
|
raise Exception("No authlog entries")
|
|
|
|
|
|
|
|
finally:
|
|
|
|
os.remove(dbfile)
|
2014-07-02 14:51:20 +02:00
|
|
|
|
|
|
|
def test_ap_hs20_external_selection(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection using external network selection and creation"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['disable_dgaf'] = '1'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
dev[0].hs20_enable()
|
|
|
|
dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS",
|
|
|
|
identity="hs20-test", password="password",
|
|
|
|
ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
|
|
|
|
scan_freq="2412", update_identifier="54321")
|
|
|
|
if dev[0].get_status_field("hs20") != "2":
|
|
|
|
raise Exception("Unexpected hs20 indication")
|
2014-09-27 18:12:32 +02:00
|
|
|
|
|
|
|
def test_ap_hs20_random_mac_addr(dev, apdev):
|
|
|
|
"""Hotspot 2.0 connection with random MAC address"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
params = hs20_ap_params()
|
|
|
|
params['hessid'] = bssid
|
|
|
|
params['disable_dgaf'] = '1'
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5")
|
|
|
|
addr = wpas.p2p_interface_addr()
|
|
|
|
wpas.request("SET mac_addr 1")
|
|
|
|
wpas.request("SET preassoc_mac_addr 1")
|
|
|
|
wpas.request("SET rand_addr_lifetime 60")
|
|
|
|
wpas.hs20_enable()
|
|
|
|
id = wpas.add_cred_values({ 'realm': "example.com",
|
|
|
|
'username': "hs20-test",
|
|
|
|
'password': "password",
|
|
|
|
'ca_cert': "auth_serv/ca.pem",
|
|
|
|
'domain': "example.com",
|
|
|
|
'update_identifier': "1234" })
|
|
|
|
interworking_select(wpas, bssid, "home", freq="2412")
|
|
|
|
interworking_connect(wpas, bssid, "TTLS")
|
|
|
|
check_sp_type(wpas, "home")
|
|
|
|
addr1 = wpas.get_driver_status_field("addr")
|
|
|
|
if addr == addr1:
|
|
|
|
raise Exception("Did not use random MAC address")
|
|
|
|
|
|
|
|
sta = hapd.get_sta(addr)
|
|
|
|
if sta['addr'] != "FAIL":
|
|
|
|
raise Exception("Unexpected STA association with permanent address")
|
|
|
|
sta = hapd.get_sta(addr1)
|
|
|
|
if sta['addr'] != addr1:
|
|
|
|
raise Exception("STA association with random address not found")
|