tests: OCI validation in SA Query frames (OCV)
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
This commit is contained in:
parent
5c7d35ba07
commit
870906d5cc
1 changed files with 66 additions and 1 deletions
|
@ -11,7 +11,7 @@ logger = logging.getLogger()
|
||||||
|
|
||||||
import hwsim_utils
|
import hwsim_utils
|
||||||
import hostapd
|
import hostapd
|
||||||
from utils import alloc_fail, fail_test, wait_fail_trigger
|
from utils import alloc_fail, fail_test, wait_fail_trigger, HwsimSkip
|
||||||
from wlantest import Wlantest
|
from wlantest import Wlantest
|
||||||
from wpasupplicant import WpaSupplicant
|
from wpasupplicant import WpaSupplicant
|
||||||
|
|
||||||
|
@ -57,6 +57,71 @@ def test_ap_pmf_required(dev, apdev):
|
||||||
dev[1].p2p_interface_addr()) < 1:
|
dev[1].p2p_interface_addr()) < 1:
|
||||||
raise Exception("STA did not reply to SA Query")
|
raise Exception("STA did not reply to SA Query")
|
||||||
|
|
||||||
|
@remote_compatible
|
||||||
|
def test_ocv_sa_query(dev, apdev):
|
||||||
|
"""Test SA Query with OCV"""
|
||||||
|
ssid = "test-pmf-required"
|
||||||
|
params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
|
||||||
|
params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
|
||||||
|
params["ieee80211w"] = "2"
|
||||||
|
params["ocv"] = "1"
|
||||||
|
try:
|
||||||
|
hapd = hostapd.add_ap(apdev[0], params)
|
||||||
|
except Exception, e:
|
||||||
|
if "Failed to set hostapd parameter ocv" in str(e):
|
||||||
|
raise HwsimSkip("OCV not supported")
|
||||||
|
raise
|
||||||
|
Wlantest.setup(hapd)
|
||||||
|
wt = Wlantest()
|
||||||
|
wt.flush()
|
||||||
|
wt.add_passphrase("12345678")
|
||||||
|
dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1",
|
||||||
|
key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
|
||||||
|
scan_freq="2412")
|
||||||
|
|
||||||
|
# Test that client can handle SA Query with OCI element
|
||||||
|
if "OK" not in hapd.request("SA_QUERY " + dev[0].own_addr()):
|
||||||
|
raise Exception("SA_QUERY failed")
|
||||||
|
time.sleep(0.1)
|
||||||
|
if wt.get_sta_counter("valid_saqueryresp_tx", apdev[0]['bssid'],
|
||||||
|
dev[0].own_addr()) < 1:
|
||||||
|
raise Exception("STA did not reply to SA Query")
|
||||||
|
|
||||||
|
# Test that AP can handle SA Query with OCI element
|
||||||
|
if "OK" not in dev[0].request("UNPROT_DEAUTH"):
|
||||||
|
raise Exception("Triggering SA Query from the STA failed")
|
||||||
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=3)
|
||||||
|
if ev is not None:
|
||||||
|
raise Exception("SA Query from the STA failed")
|
||||||
|
|
||||||
|
@remote_compatible
|
||||||
|
def test_ocv_sa_query_csa(dev, apdev):
|
||||||
|
"""Test SA Query with OCV after channel switch"""
|
||||||
|
ssid = "test-pmf-required"
|
||||||
|
params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
|
||||||
|
params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
|
||||||
|
params["ieee80211w"] = "2"
|
||||||
|
params["ocv"] = "1"
|
||||||
|
try:
|
||||||
|
hapd = hostapd.add_ap(apdev[0], params)
|
||||||
|
except Exception, e:
|
||||||
|
if "Failed to set hostapd parameter ocv" in str(e):
|
||||||
|
raise HwsimSkip("OCV not supported")
|
||||||
|
raise
|
||||||
|
Wlantest.setup(hapd)
|
||||||
|
wt = Wlantest()
|
||||||
|
wt.flush()
|
||||||
|
wt.add_passphrase("12345678")
|
||||||
|
dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1",
|
||||||
|
key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
|
||||||
|
scan_freq="2412")
|
||||||
|
|
||||||
|
hapd.request("CHAN_SWITCH 5 2437")
|
||||||
|
time.sleep(1)
|
||||||
|
if wt.get_sta_counter("valid_saqueryreq_tx", apdev[0]['bssid'],
|
||||||
|
dev[0].own_addr()) < 1:
|
||||||
|
raise Exception("STA did not start SA Query after channel switch")
|
||||||
|
|
||||||
@remote_compatible
|
@remote_compatible
|
||||||
def test_ap_pmf_optional(dev, apdev):
|
def test_ap_pmf_optional(dev, apdev):
|
||||||
"""WPA2-PSK AP with PMF optional"""
|
"""WPA2-PSK AP with PMF optional"""
|
||||||
|
|
Loading…
Reference in a new issue