2552 lines
		
	
	
	
		
			94 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			2552 lines
		
	
	
	
		
			94 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # wpa_supplicant mesh mode tests
 | |
| # Copyright (c) 2014, cozybit Inc.
 | |
| #
 | |
| # This software may be distributed under the terms of the BSD license.
 | |
| # See README for more details.
 | |
| 
 | |
| import logging
 | |
| logger = logging.getLogger()
 | |
| import os
 | |
| import struct
 | |
| import subprocess
 | |
| import time
 | |
| import json
 | |
| import binascii
 | |
| 
 | |
| import hwsim_utils
 | |
| import hostapd
 | |
| from wpasupplicant import WpaSupplicant
 | |
| from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger, \
 | |
|     radiotap_build, start_monitor, stop_monitor
 | |
| from tshark import run_tshark, run_tshark_json
 | |
| from test_ap_ht import set_world_reg
 | |
| from test_sae import build_sae_commit, sae_rx_commit_token_req
 | |
| from hwsim_utils import set_group_map
 | |
| 
 | |
| def check_mesh_support(dev, secure=False):
 | |
|     if "MESH" not in dev.get_capability("modes"):
 | |
|         raise HwsimSkip("Driver does not support mesh")
 | |
|     if secure and "SAE" not in dev.get_capability("auth_alg"):
 | |
|         raise HwsimSkip("SAE not supported")
 | |
| 
 | |
| def check_mesh_scan(dev, params, other_started=False, beacon_int=0):
 | |
|     if not other_started:
 | |
|         dev.dump_monitor()
 | |
|     id = dev.request("SCAN " + params)
 | |
|     if "FAIL" in id:
 | |
|         raise Exception("Failed to start scan")
 | |
|     id = int(id)
 | |
| 
 | |
|     if other_started:
 | |
|         ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
 | |
|         if ev is None:
 | |
|             raise Exception("Other scan did not start")
 | |
|         if "id=" + str(id) in ev:
 | |
|             raise Exception("Own scan id unexpectedly included in start event")
 | |
| 
 | |
|         ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
 | |
|         if ev is None:
 | |
|             raise Exception("Other scan did not complete")
 | |
|         if "id=" + str(id) in ev:
 | |
|             raise Exception(
 | |
|                 "Own scan id unexpectedly included in completed event")
 | |
| 
 | |
|     ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Scan did not start")
 | |
|     if "id=" + str(id) not in ev:
 | |
|         raise Exception("Scan id not included in start event")
 | |
| 
 | |
|     ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
 | |
|     if ev is None:
 | |
|         raise Exception("Scan did not complete")
 | |
|     if "id=" + str(id) not in ev:
 | |
|         raise Exception("Scan id not included in completed event")
 | |
| 
 | |
|     res = dev.request("SCAN_RESULTS")
 | |
| 
 | |
|     if res.find("[MESH]") < 0:
 | |
|         raise Exception("Scan did not contain a MESH network")
 | |
| 
 | |
|     bssid = res.splitlines()[1].split(' ')[0]
 | |
|     bss = dev.get_bss(bssid)
 | |
|     if bss is None:
 | |
|         raise Exception("Could not get BSS entry for mesh")
 | |
|     if 'mesh_capability' not in bss:
 | |
|         raise Exception("mesh_capability missing from BSS entry")
 | |
|     if beacon_int:
 | |
|         if 'beacon_int' not in bss:
 | |
|             raise Exception("beacon_int missing from BSS entry")
 | |
|         if str(beacon_int) != bss['beacon_int']:
 | |
|             raise Exception("Unexpected beacon_int in BSS entry: " + bss['beacon_int'])
 | |
|     if '[MESH]' not in bss['flags']:
 | |
|         raise Exception("BSS output did not include MESH flag")
 | |
| 
 | |
| def check_mesh_group_added(dev):
 | |
|     ev = dev.wait_event(["MESH-GROUP-STARTED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Test exception: Couldn't join mesh")
 | |
| 
 | |
| 
 | |
| def check_mesh_group_removed(dev):
 | |
|     ev = dev.wait_event(["MESH-GROUP-REMOVED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Test exception: Couldn't leave mesh")
 | |
| 
 | |
| 
 | |
| def check_mesh_peer_connected(dev, timeout=10):
 | |
|     ev = dev.wait_event(["MESH-PEER-CONNECTED"], timeout=timeout)
 | |
|     if ev is None:
 | |
|         raise Exception("Test exception: Remote peer did not connect.")
 | |
| 
 | |
| 
 | |
| def check_mesh_peer_disconnected(dev):
 | |
|     ev = dev.wait_event(["MESH-PEER-DISCONNECTED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Test exception: Peer disconnect event not detected.")
 | |
| 
 | |
| def check_mesh_joined2(dev):
 | |
|     check_mesh_group_added(dev[0])
 | |
|     check_mesh_group_added(dev[1])
 | |
| 
 | |
| def check_mesh_connected2(dev, timeout0=10, connectivity=False):
 | |
|     check_mesh_peer_connected(dev[0], timeout=timeout0)
 | |
|     check_mesh_peer_connected(dev[1])
 | |
|     if connectivity:
 | |
|         hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
| def check_mesh_joined_connected(dev, connectivity=False, timeout0=10):
 | |
|     check_mesh_joined2(dev)
 | |
|     check_mesh_connected2(dev, timeout0=timeout0, connectivity=connectivity)
 | |
| 
 | |
| def test_wpas_add_set_remove_support(dev):
 | |
|     """wpa_supplicant MESH add/set/remove network support"""
 | |
|     check_mesh_support(dev[0])
 | |
|     id = dev[0].add_network()
 | |
|     dev[0].set_network(id, "mode", "5")
 | |
|     dev[0].remove_network(id)
 | |
| 
 | |
| def add_open_mesh_network(dev, freq="2412", start=True, beacon_int=0,
 | |
|                           basic_rates=None, chwidth=-1, disable_vht=False,
 | |
|                           disable_ht40=False):
 | |
|     id = dev.add_network()
 | |
|     dev.set_network(id, "mode", "5")
 | |
|     dev.set_network_quoted(id, "ssid", "wpas-mesh-open")
 | |
|     dev.set_network(id, "key_mgmt", "NONE")
 | |
|     if freq:
 | |
|         dev.set_network(id, "frequency", freq)
 | |
|     if chwidth > -1:
 | |
|         dev.set_network(id, "max_oper_chwidth", str(chwidth))
 | |
|     if beacon_int:
 | |
|         dev.set_network(id, "beacon_int", str(beacon_int))
 | |
|     if basic_rates:
 | |
|         dev.set_network(id, "mesh_basic_rates", basic_rates)
 | |
|     if disable_vht:
 | |
|         dev.set_network(id, "disable_vht", "1")
 | |
|     if disable_ht40:
 | |
|         dev.set_network(id, "disable_ht40", "1")
 | |
|     if start:
 | |
|         dev.mesh_group_add(id)
 | |
|     return id
 | |
| 
 | |
| def test_wpas_mesh_group_added(dev):
 | |
|     """wpa_supplicant MESH group add"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
| 
 | |
|     # Check for MESH-GROUP-STARTED event
 | |
|     check_mesh_group_added(dev[0])
 | |
| 
 | |
| 
 | |
| def test_wpas_mesh_group_remove(dev):
 | |
|     """wpa_supplicant MESH group remove"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     # Check for MESH-GROUP-STARTED event
 | |
|     check_mesh_group_added(dev[0])
 | |
|     dev[0].mesh_group_remove()
 | |
|     # Check for MESH-GROUP-REMOVED event
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     dev[0].mesh_group_remove()
 | |
| 
 | |
| def test_wpas_mesh_peer_connected(dev):
 | |
|     """wpa_supplicant MESH peer connected"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0], beacon_int=160)
 | |
|     add_open_mesh_network(dev[1], beacon_int=160)
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
| def test_wpas_mesh_peer_disconnected(dev):
 | |
|     """wpa_supplicant MESH peer disconnected"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     add_open_mesh_network(dev[1])
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     # Remove group on dev 1
 | |
|     dev[1].mesh_group_remove()
 | |
|     # Device 0 should get a disconnection event
 | |
|     check_mesh_peer_disconnected(dev[0])
 | |
| 
 | |
| 
 | |
| def test_wpas_mesh_mode_scan(dev):
 | |
|     """wpa_supplicant MESH scan support"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     add_open_mesh_network(dev[1], beacon_int=175)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Check for Mesh scan
 | |
|     check_mesh_scan(dev[0], "use_id=1 freq=2412", beacon_int=175)
 | |
| 
 | |
| def test_wpas_mesh_open(dev, apdev):
 | |
|     """wpa_supplicant open MESH network connectivity"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0], freq="2462", basic_rates="60 120 240")
 | |
|     add_open_mesh_network(dev[1], freq="2462", basic_rates="60 120 240")
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     state = dev[0].get_status_field("wpa_state")
 | |
|     if state != "COMPLETED":
 | |
|         raise Exception("Unexpected wpa_state on dev0: " + state)
 | |
|     state = dev[1].get_status_field("wpa_state")
 | |
|     if state != "COMPLETED":
 | |
|         raise Exception("Unexpected wpa_state on dev1: " + state)
 | |
| 
 | |
|     mode = dev[0].get_status_field("mode")
 | |
|     if mode != "mesh":
 | |
|         raise Exception("Unexpected mode: " + mode)
 | |
| 
 | |
|     dev[0].scan(freq="2462")
 | |
|     bss = dev[0].get_bss(dev[1].own_addr())
 | |
|     if bss and 'ie' in bss and "ff0724" in bss['ie']:
 | |
|         sta = dev[0].request("STA " + dev[1].own_addr())
 | |
|         logger.info("STA info:\n" + sta.rstrip())
 | |
|         if "[HE]" not in sta:
 | |
|             raise Exception("Missing STA HE flag")
 | |
|         if "[VHT]" in sta:
 | |
|             raise Exception("Unexpected STA VHT flag")
 | |
| 
 | |
| def test_wpas_mesh_open_no_auto(dev, apdev):
 | |
|     """wpa_supplicant open MESH network connectivity"""
 | |
|     check_mesh_support(dev[0])
 | |
|     id = add_open_mesh_network(dev[0], start=False)
 | |
|     dev[0].set_network(id, "dot11MeshMaxRetries", "16")
 | |
|     dev[0].set_network(id, "dot11MeshRetryTimeout", "255")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     id = add_open_mesh_network(dev[1], start=False)
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True, timeout0=30)
 | |
| 
 | |
| def test_mesh_open_no_auto2(dev, apdev):
 | |
|     """Open mesh network connectivity, no_auto on both peers"""
 | |
|     check_mesh_support(dev[0])
 | |
|     id = add_open_mesh_network(dev[0], start=False)
 | |
|     dev[0].set_network(id, "no_auto_peer", "1")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     id = add_open_mesh_network(dev[1], start=False)
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message")
 | |
|     addr1 = dev[1].own_addr()
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed")
 | |
|     if "FAIL" not in dev[0].request("MESH_PEER_ADD ff:ff:ff:ff:ff:ff"):
 | |
|         raise Exception("MESH_PEER_ADD with unknown STA succeeded")
 | |
|     check_mesh_connected2(dev, timeout0=30)
 | |
|     if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD succeeded for connected STA")
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
| def test_mesh_open_rssi_threshold(dev, apdev):
 | |
|     """Open mesh network with RSSI threshold"""
 | |
|     check_mesh_support(dev[0])
 | |
| 
 | |
|     _test_mesh_open_rssi_threshold(dev, apdev, -255, -255)
 | |
|     _test_mesh_open_rssi_threshold(dev, apdev, 0, 0)
 | |
|     _test_mesh_open_rssi_threshold(dev, apdev, 1, 0)
 | |
| 
 | |
| def _test_mesh_open_rssi_threshold(dev, apdev, value, expected):
 | |
|     id = add_open_mesh_network(dev[0], start=False)
 | |
|     dev[0].set_network(id, "mesh_rssi_threshold", str(value))
 | |
|     dev[0].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[0])
 | |
| 
 | |
|     cmd = subprocess.Popen(["iw", "dev", dev[0].ifname, "get", "mesh_param",
 | |
|                             "mesh_rssi_threshold"], stdout=subprocess.PIPE)
 | |
|     mesh_rssi_threshold = int(cmd.stdout.read().decode().split(" ")[0])
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
| 
 | |
|     if mesh_rssi_threshold != expected:
 | |
|         raise Exception("mesh_rssi_threshold should be " + str(expected) +
 | |
|                         ": " + str(mesh_rssi_threshold))
 | |
| 
 | |
| def add_mesh_secure_net(dev, psk=True, pmf=False, pairwise=None, group=None,
 | |
|                         group_mgmt=None,
 | |
|                         sae_password=False, sae_password_id=None, ocv=False):
 | |
|     id = dev.add_network()
 | |
|     dev.set_network(id, "mode", "5")
 | |
|     dev.set_network_quoted(id, "ssid", "wpas-mesh-sec")
 | |
|     dev.set_network(id, "key_mgmt", "SAE")
 | |
|     dev.set_network(id, "frequency", "2412")
 | |
|     if sae_password:
 | |
|         dev.set_network_quoted(id, "sae_password", "thisismypassphrase!")
 | |
|     if sae_password_id:
 | |
|         dev.set_network_quoted(id, "sae_password_id", sae_password_id)
 | |
|     if psk:
 | |
|         dev.set_network_quoted(id, "psk", "thisismypassphrase!")
 | |
|     if pmf:
 | |
|         dev.set_network(id, "ieee80211w", "2")
 | |
|     if pairwise:
 | |
|         dev.set_network(id, "pairwise", pairwise)
 | |
|     if group:
 | |
|         dev.set_network(id, "group", group)
 | |
|     if group_mgmt:
 | |
|         dev.set_network(id, "group_mgmt", group_mgmt)
 | |
|     if ocv:
 | |
|         try:
 | |
|             dev.set_network(id, "ocv", "1")
 | |
|         except Exception as e:
 | |
|             if "SET_NETWORK failed" in str(e):
 | |
|                 raise HwsimSkip("OCV not supported")
 | |
|             raise
 | |
|     return id
 | |
| 
 | |
| def test_wpas_mesh_secure(dev, apdev):
 | |
|     """wpa_supplicant secure MESH network connectivity"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     state = dev[0].get_status_field("wpa_state")
 | |
|     if state != "COMPLETED":
 | |
|         raise Exception("Unexpected wpa_state on dev0: " + state)
 | |
|     state = dev[1].get_status_field("wpa_state")
 | |
|     if state != "COMPLETED":
 | |
|         raise Exception("Unexpected wpa_state on dev1: " + state)
 | |
| 
 | |
| def test_wpas_mesh_secure_sae_password(dev, apdev):
 | |
|     """wpa_supplicant secure mesh using sae_password"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], psk=False, sae_password=True)
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_pmf(dev, apdev):
 | |
|     """Secure mesh network connectivity with PMF enabled"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True)
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True)
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_ocv(dev, apdev):
 | |
|     """Secure mesh network connectivity with OCV enabled"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
 | |
|     dev[0].mesh_group_add(id)
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_ocv_compat(dev, apdev):
 | |
|     """Secure mesh network where only one peer has OCV enabled"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
 | |
|     dev[0].mesh_group_add(id)
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True, ocv=False)
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def set_reg(dev, country):
 | |
|     subprocess.call(['iw', 'reg', 'set', country])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=" + country in ev:
 | |
|                 break
 | |
| 
 | |
| def clear_reg_setting(dev):
 | |
|     dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|     dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|     subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|     dev[0].flush_scan_cache()
 | |
|     dev[1].flush_scan_cache()
 | |
| 
 | |
| def test_mesh_secure_ocv_mix_legacy(dev, apdev):
 | |
|     """Mesh network with a VHT STA and a legacy STA under OCV"""
 | |
|     try:
 | |
|         run_mesh_secure_ocv_mix_legacy(dev, apdev)
 | |
|     finally:
 | |
|         clear_reg_setting(dev)
 | |
| 
 | |
| def run_mesh_secure_ocv_mix_legacy(dev, apdev):
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     set_reg(dev, 'AZ')
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
 | |
|     dev[0].set_network(id, "frequency", "5200")
 | |
|     dev[0].set_network(id, "max_oper_chwidth", "2")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
 | |
|     dev[1].set_network(id, "frequency", "5200")
 | |
|     dev[1].set_network(id, "disable_vht", "1")
 | |
|     dev[1].set_network(id, "disable_ht40", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_ocv_mix_ht(dev, apdev):
 | |
|     """Mesh network with a VHT STA and a HT STA under OCV"""
 | |
|     try:
 | |
|         run_mesh_secure_ocv_mix_ht(dev, apdev)
 | |
|     finally:
 | |
|         clear_reg_setting(dev)
 | |
| 
 | |
| def run_mesh_secure_ocv_mix_ht(dev, apdev):
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     set_reg(dev, 'AZ')
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
 | |
|     dev[0].set_network(id, "frequency", "5200")
 | |
|     dev[0].set_network(id, "max_oper_chwidth", "2")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
 | |
|     dev[1].set_network(id, "frequency", "5200")
 | |
|     dev[1].set_network(id, "disable_vht", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def run_mesh_secure(dev, cipher, pmf=False, group_mgmt=None):
 | |
|     if cipher not in dev[0].get_capability("pairwise"):
 | |
|         raise HwsimSkip("Cipher %s not supported" % cipher)
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pairwise=cipher, group=cipher, pmf=pmf,
 | |
|                              group_mgmt=group_mgmt)
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pairwise=cipher, group=cipher, pmf=pmf,
 | |
|                              group_mgmt=group_mgmt)
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_ccmp(dev, apdev):
 | |
|     """Secure mesh with CCMP"""
 | |
|     run_mesh_secure(dev, "CCMP")
 | |
| 
 | |
| def test_mesh_secure_gcmp(dev, apdev):
 | |
|     """Secure mesh with GCMP"""
 | |
|     run_mesh_secure(dev, "GCMP")
 | |
| 
 | |
| def test_mesh_secure_gcmp_256(dev, apdev):
 | |
|     """Secure mesh with GCMP-256"""
 | |
|     run_mesh_secure(dev, "GCMP-256")
 | |
| 
 | |
| def test_mesh_secure_ccmp_256(dev, apdev):
 | |
|     """Secure mesh with CCMP-256"""
 | |
|     run_mesh_secure(dev, "CCMP-256")
 | |
| 
 | |
| def test_mesh_secure_ccmp_cmac(dev, apdev):
 | |
|     """Secure mesh with CCMP-128 and BIP-CMAC-128"""
 | |
|     run_mesh_secure(dev, "CCMP", pmf=True, group_mgmt="AES-128-CMAC")
 | |
| 
 | |
| def test_mesh_secure_gcmp_gmac(dev, apdev):
 | |
|     """Secure mesh with GCMP-128 and BIP-GMAC-128"""
 | |
|     run_mesh_secure(dev, "GCMP", pmf=True, group_mgmt="BIP-GMAC-128")
 | |
| 
 | |
| def test_mesh_secure_ccmp_256_cmac_256(dev, apdev):
 | |
|     """Secure mesh with CCMP-256 and BIP-CMAC-256"""
 | |
|     run_mesh_secure(dev, "CCMP-256", pmf=True, group_mgmt="BIP-CMAC-256")
 | |
| 
 | |
| def test_mesh_secure_gcmp_256_gmac_256(dev, apdev):
 | |
|     """Secure mesh with GCMP-256 and BIP-GMAC-256"""
 | |
|     run_mesh_secure(dev, "GCMP-256", pmf=True, group_mgmt="BIP-GMAC-256")
 | |
| 
 | |
| def test_mesh_secure_invalid_pairwise_cipher(dev, apdev):
 | |
|     """Secure mesh and invalid group cipher"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pairwise="TKIP", group="CCMP")
 | |
|     if dev[0].mesh_group_add(id) != None:
 | |
|         raise Exception("Unexpected group add success")
 | |
|     ev = dev[0].wait_event(["mesh: Invalid pairwise cipher"], timeout=1)
 | |
|     if ev is None:
 | |
|         raise Exception("Invalid pairwise cipher not reported")
 | |
| 
 | |
| def test_mesh_secure_invalid_group_cipher(dev, apdev):
 | |
|     """Secure mesh and invalid group cipher"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pairwise="CCMP", group="TKIP")
 | |
|     if dev[0].mesh_group_add(id) != None:
 | |
|         raise Exception("Unexpected group add success")
 | |
|     ev = dev[0].wait_event(["mesh: Invalid group cipher"], timeout=1)
 | |
|     if ev is None:
 | |
|         raise Exception("Invalid group cipher not reported")
 | |
| 
 | |
| def test_wpas_mesh_secure_sae_group_mismatch(dev, apdev):
 | |
|     """wpa_supplicant secure MESH and SAE group mismatch"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].p2p_interface_addr()
 | |
|     addr1 = dev[1].p2p_interface_addr()
 | |
|     addr2 = dev[2].p2p_interface_addr()
 | |
| 
 | |
|     dev[0].request("SET sae_groups 19 25")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups 19")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     dev[2].request("SET sae_groups 26")
 | |
|     id = add_mesh_secure_net(dev[2])
 | |
|     dev[2].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_group_added(dev[0])
 | |
|     check_mesh_group_added(dev[1])
 | |
|     check_mesh_group_added(dev[2])
 | |
| 
 | |
|     ev = dev[0].wait_event(["MESH-PEER-CONNECTED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Remote peer did not connect")
 | |
|     if addr1 not in ev:
 | |
|         raise Exception("Unexpected peer connected: " + ev)
 | |
| 
 | |
|     ev = dev[1].wait_event(["MESH-PEER-CONNECTED"])
 | |
|     if ev is None:
 | |
|         raise Exception("Remote peer did not connect")
 | |
|     if addr0 not in ev:
 | |
|         raise Exception("Unexpected peer connected: " + ev)
 | |
| 
 | |
|     ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected peer connection at dev[2]: " + ev)
 | |
| 
 | |
|     ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected peer connection: " + ev)
 | |
| 
 | |
|     ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected peer connection: " + ev)
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     dev[2].request("SET sae_groups ")
 | |
| 
 | |
| def test_wpas_mesh_secure_sae_group_negotiation(dev, apdev):
 | |
|     """wpa_supplicant secure MESH and SAE group negotiation"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
| 
 | |
|     #dev[0].request("SET sae_groups 21 20 25 26")
 | |
|     dev[0].request("SET sae_groups 26")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups 19 26")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     dev[1].request("SET sae_groups ")
 | |
| 
 | |
| def test_wpas_mesh_secure_sae_missing_password(dev, apdev):
 | |
|     """wpa_supplicant secure MESH and missing SAE password"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     id = add_mesh_secure_net(dev[0], psk=False)
 | |
|     dev[0].set_network(id, "psk", "8f20b381f9b84371d61b5080ad85cac3c61ab3ca9525be5b2d0f4da3d979187a")
 | |
|     dev[0].mesh_group_add(id)
 | |
|     ev = dev[0].wait_event(["MESH-GROUP-STARTED", "Could not join mesh"],
 | |
|                            timeout=5)
 | |
|     if ev is None:
 | |
|         raise Exception("Timeout on mesh start event")
 | |
|     if "MESH-GROUP-STARTED" in ev:
 | |
|         raise Exception("Unexpected mesh group start")
 | |
|     ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected mesh group start")
 | |
| 
 | |
| def test_wpas_mesh_secure_no_auto(dev, apdev):
 | |
|     """wpa_supplicant secure MESH network connectivity"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups 19")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups 19")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     dev[1].request("SET sae_groups ")
 | |
| 
 | |
| def test_wpas_mesh_secure_dropped_frame(dev, apdev):
 | |
|     """Secure mesh network connectivity when the first plink Open is dropped"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Drop the first Action frame (plink Open) to test unexpected order of
 | |
|     # Confirm/Open messages.
 | |
|     count = 0
 | |
|     while True:
 | |
|         count += 1
 | |
|         if count > 10:
 | |
|             raise Exception("Did not see Action frames")
 | |
|         rx_msg = dev[0].mgmt_rx()
 | |
|         if rx_msg is None:
 | |
|             raise Exception("MGMT-RX timeout")
 | |
|         if rx_msg['subtype'] == 13:
 | |
|             logger.info("Drop the first Action frame")
 | |
|             break
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
 | |
|             rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 0")
 | |
| 
 | |
|     check_mesh_connected2(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_secure_fail(dev, apdev):
 | |
|     """Secure mesh network connectivity failure"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0], pmf=True)
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1], pmf=True)
 | |
| 
 | |
|     with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add;mesh_mpm_auth_peer"):
 | |
|         dev[1].mesh_group_add(id)
 | |
| 
 | |
|         check_mesh_joined_connected(dev)
 | |
| 
 | |
| def test_wpas_mesh_ctrl(dev):
 | |
|     """wpa_supplicant ctrl_iface mesh command error cases"""
 | |
|     check_mesh_support(dev[0])
 | |
|     if "FAIL" not in dev[0].request("MESH_GROUP_ADD 123"):
 | |
|         raise Exception("Unexpected MESH_GROUP_ADD success")
 | |
|     id = dev[0].add_network()
 | |
|     if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
 | |
|         raise Exception("Unexpected MESH_GROUP_ADD success")
 | |
|     dev[0].set_network(id, "mode", "5")
 | |
|     dev[0].set_network(id, "key_mgmt", "WPA-PSK")
 | |
|     if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
 | |
|         raise Exception("Unexpected MESH_GROUP_ADD success")
 | |
| 
 | |
|     if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE foo"):
 | |
|         raise Exception("Unexpected MESH_GROUP_REMOVE success")
 | |
| 
 | |
| def test_wpas_mesh_dynamic_interface(dev):
 | |
|     """wpa_supplicant mesh with dynamic interface"""
 | |
|     check_mesh_support(dev[0])
 | |
|     mesh0 = None
 | |
|     mesh1 = None
 | |
|     try:
 | |
|         mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
 | |
|         if "FAIL" in mesh0:
 | |
|             raise Exception("MESH_INTERFACE_ADD failed")
 | |
|         mesh1 = dev[1].request("MESH_INTERFACE_ADD")
 | |
|         if "FAIL" in mesh1:
 | |
|             raise Exception("MESH_INTERFACE_ADD failed")
 | |
| 
 | |
|         wpas0 = WpaSupplicant(ifname=mesh0)
 | |
|         wpas1 = WpaSupplicant(ifname=mesh1)
 | |
|         logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
 | |
|         logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
 | |
| 
 | |
|         add_open_mesh_network(wpas0)
 | |
|         add_open_mesh_network(wpas1)
 | |
|         check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
 | |
| 
 | |
|         # Must not allow MESH_GROUP_REMOVE on dynamic interface
 | |
|         if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh0):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
|         if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh1):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
| 
 | |
|         # Must not allow MESH_GROUP_REMOVE on another radio interface
 | |
|         if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh1):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
|         if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh0):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
| 
 | |
|         wpas0.remove_ifname()
 | |
|         wpas1.remove_ifname()
 | |
| 
 | |
|         if "OK" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
 | |
|             raise Exception("MESH_GROUP_REMOVE failed")
 | |
|         if "OK" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
 | |
|             raise Exception("MESH_GROUP_REMOVE failed")
 | |
| 
 | |
|         if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
|         if "FAIL" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
 | |
|             raise Exception("Invalid MESH_GROUP_REMOVE accepted")
 | |
| 
 | |
|         logger.info("Make sure another dynamic group can be added")
 | |
|         mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
 | |
|         if "FAIL" in mesh0:
 | |
|             raise Exception("MESH_INTERFACE_ADD failed")
 | |
|         mesh1 = dev[1].request("MESH_INTERFACE_ADD")
 | |
|         if "FAIL" in mesh1:
 | |
|             raise Exception("MESH_INTERFACE_ADD failed")
 | |
| 
 | |
|         wpas0 = WpaSupplicant(ifname=mesh0)
 | |
|         wpas1 = WpaSupplicant(ifname=mesh1)
 | |
|         logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
 | |
|         logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
 | |
| 
 | |
|         add_open_mesh_network(wpas0)
 | |
|         add_open_mesh_network(wpas1)
 | |
|         check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
 | |
|     finally:
 | |
|         if mesh0:
 | |
|             dev[0].request("MESH_GROUP_REMOVE " + mesh0)
 | |
|         if mesh1:
 | |
|             dev[1].request("MESH_GROUP_REMOVE " + mesh1)
 | |
| 
 | |
| def test_wpas_mesh_dynamic_interface_remove(dev):
 | |
|     """wpa_supplicant mesh with dynamic interface and removal"""
 | |
|     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
 | |
|     wpas.interface_add("wlan5")
 | |
|     check_mesh_support(wpas)
 | |
|     mesh5 = wpas.request("MESH_INTERFACE_ADD ifname=mesh5")
 | |
|     if "FAIL" in mesh5:
 | |
|         raise Exception("MESH_INTERFACE_ADD failed")
 | |
| 
 | |
|     wpas5 = WpaSupplicant(ifname=mesh5)
 | |
|     logger.info(mesh5 + " address " + wpas5.get_status_field("address"))
 | |
|     add_open_mesh_network(wpas5)
 | |
|     add_open_mesh_network(dev[0])
 | |
|     check_mesh_joined_connected([wpas5, dev[0]], connectivity=True)
 | |
| 
 | |
|     # Remove the main interface while mesh interface is in use
 | |
|     wpas.interface_remove("wlan5")
 | |
| 
 | |
| def test_wpas_mesh_max_peering(dev, apdev, params):
 | |
|     """Mesh max peering limit"""
 | |
|     check_mesh_support(dev[0])
 | |
|     try:
 | |
|         dev[0].request("SET max_peer_links 1")
 | |
| 
 | |
|         # first, connect dev[0] and dev[1]
 | |
|         add_open_mesh_network(dev[0])
 | |
|         add_open_mesh_network(dev[1])
 | |
|         for i in range(2):
 | |
|             ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
 | |
|             if ev is None:
 | |
|                 raise Exception("dev%d did not connect with any peer" % i)
 | |
| 
 | |
|         # add dev[2] which will try to connect with both dev[0] and dev[1],
 | |
|         # but can complete connection only with dev[1]
 | |
|         add_open_mesh_network(dev[2])
 | |
|         for i in range(1, 3):
 | |
|             ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
 | |
|             if ev is None:
 | |
|                 raise Exception("dev%d did not connect the second peer" % i)
 | |
| 
 | |
|         ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
 | |
|         if ev is not None:
 | |
|             raise Exception("dev0 connection beyond max peering limit")
 | |
| 
 | |
|         ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
 | |
|         if ev is not None:
 | |
|             raise Exception("dev2 reported unexpected peering: " + ev)
 | |
| 
 | |
|         for i in range(3):
 | |
|             dev[i].mesh_group_remove()
 | |
|             check_mesh_group_removed(dev[i])
 | |
|     finally:
 | |
|         dev[0].request("SET max_peer_links 99")
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     addr2 = dev[2].own_addr()
 | |
| 
 | |
|     capfile = os.path.join(params['logdir'], "hwsim0.pcapng")
 | |
|     filt = "wlan.fc.type_subtype == 8"
 | |
|     out = run_tshark(capfile, filt, ["wlan.sa", "wlan.mesh.config.cap"])
 | |
|     pkts = out.splitlines()
 | |
|     one = [0, 0, 0]
 | |
|     zero = [0, 0, 0]
 | |
|     all_cap_one = True
 | |
|     for pkt in pkts:
 | |
|         addr, cap = pkt.split('\t')
 | |
|         cap = int(cap, 16)
 | |
|         if cap != 1:
 | |
|             all_cap_one = False
 | |
|         if addr == addr0:
 | |
|             idx = 0
 | |
|         elif addr == addr1:
 | |
|             idx = 1
 | |
|         elif addr == addr2:
 | |
|             idx = 2
 | |
|         else:
 | |
|             continue
 | |
|         if cap & 0x01:
 | |
|             one[idx] += 1
 | |
|         else:
 | |
|             zero[idx] += 1
 | |
|     logger.info("one: " + str(one))
 | |
|     logger.info("zero: " + str(zero))
 | |
|     if all_cap_one:
 | |
|         # It looks like tshark parser was broken at some point for
 | |
|         # wlan.mesh.config.cap which is now (tshark 2.6.3) pointing to incorrect
 | |
|         # field (same as wlan.mesh.config.ps_protocol). This used to work with
 | |
|         # tshark 2.2.6.
 | |
|         #
 | |
|         # For now, assume the capability field ends up being the last octet of
 | |
|         # the frame.
 | |
|         one = [0, 0, 0]
 | |
|         zero = [0, 0, 0]
 | |
|         addrs = [addr0, addr1, addr2]
 | |
|         for idx in range(3):
 | |
|             addr = addrs[idx]
 | |
|             out = run_tshark_json(capfile, filt + " && wlan.sa == " + addr)
 | |
|             pkts = json.loads(out)
 | |
|             for pkt in pkts:
 | |
|                 wlan = pkt["_source"]["layers"]["wlan"]
 | |
|                 if "wlan.tagged.all" not in wlan:
 | |
|                     continue
 | |
| 
 | |
|                 tagged = wlan["wlan.tagged.all"]
 | |
|                 if "wlan.tag" not in tagged:
 | |
|                     continue
 | |
| 
 | |
|                 wlan_tag = tagged["wlan.tag"]
 | |
|                 if "wlan.mesh.config.ps_protocol_raw" not in wlan_tag:
 | |
|                     continue
 | |
| 
 | |
|                 frame = pkt["_source"]["layers"]["frame_raw"][0]
 | |
|                 cap_offset = wlan_tag["wlan.mesh.config.ps_protocol_raw"][1] + 6
 | |
|                 cap = int(frame[(cap_offset * 2):(cap_offset * 2 + 2)], 16)
 | |
|                 if cap & 0x01:
 | |
|                     one[idx] += 1
 | |
|                 else:
 | |
|                     zero[idx] += 1
 | |
|         logger.info("one: " + str(one))
 | |
|         logger.info("zero: " + str(zero))
 | |
|     if zero[0] == 0:
 | |
|         raise Exception("Accepting Additional Mesh Peerings not cleared")
 | |
|     if one[0] == 0:
 | |
|         raise Exception("Accepting Additional Mesh Peerings was not set in the first Beacon frame")
 | |
|     if zero[1] > 0 or zero[2] > 0 or one[1] == 0 or one[2] == 0:
 | |
|         raise Exception("Unexpected value in Accepting Additional Mesh Peerings from other STAs")
 | |
| 
 | |
| def test_wpas_mesh_open_5ghz(dev, apdev):
 | |
|     """wpa_supplicant open MESH network on 5 GHz band"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_5ghz(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_5ghz(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         add_open_mesh_network(dev[i], freq="5180")
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_open_5ghz_coex(dev, apdev):
 | |
|     """Mesh network on 5 GHz band and 20/40 coex change"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_5ghz_coex(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         set_world_reg(apdev0=apdev[0], dev0=dev[0])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_5ghz_coex(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
| 
 | |
|     # Start a 20 MHz BSS on channel 40 that would be the secondary channel of
 | |
|     # HT40+ mesh on channel 36.
 | |
|     params = {"ssid": "test-ht40",
 | |
|               "hw_mode": "a",
 | |
|               "channel": "40",
 | |
|               "country_code": "US"}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     bssid = hapd.own_addr()
 | |
| 
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         dev[i].scan_for_bss(bssid, freq=5200)
 | |
|         add_open_mesh_network(dev[i], freq="5180")
 | |
| 
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     freq = dev[0].get_status_field("freq")
 | |
|     if freq != "5200":
 | |
|         raise Exception("Unexpected STATUS freq=" + freq)
 | |
|     sig = dev[0].request("SIGNAL_POLL").splitlines()
 | |
|     if "FREQUENCY=5200" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL output: " + str(sig))
 | |
| 
 | |
|     hapd.disable()
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_open_ht40(dev, apdev):
 | |
|     """Mesh and HT40 support difference"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_ht40(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         dev[2].request("MESH_GROUP_REMOVE " + dev[2].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
|         dev[2].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_ht40(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
|     for i in range(3):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         add_open_mesh_network(dev[i], freq="5180", disable_vht=True,
 | |
|                               disable_ht40=(i == 2))
 | |
| 
 | |
|     check_mesh_group_added(dev[0])
 | |
|     check_mesh_group_added(dev[1])
 | |
|     check_mesh_group_added(dev[2])
 | |
| 
 | |
|     check_mesh_peer_connected(dev[0])
 | |
|     check_mesh_peer_connected(dev[1])
 | |
|     check_mesh_peer_connected(dev[2])
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[2])
 | |
|     hwsim_utils.test_connectivity(dev[1], dev[2])
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     dev[2].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     check_mesh_group_removed(dev[2])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     dev[2].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_open_vht40(dev, apdev):
 | |
|     """wpa_supplicant open MESH network on VHT 40 MHz channel"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_vht40(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_vht40(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         add_open_mesh_network(dev[i], freq="5180", chwidth=0)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     sig = dev[0].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=40 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
 | |
|     if "CENTER_FRQ1=5190" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
 | |
| 
 | |
|     sig = dev[1].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=40 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
 | |
|     if "CENTER_FRQ1=5190" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
 | |
| 
 | |
|     dev[0].scan(freq="5180")
 | |
|     bss = dev[0].get_bss(dev[1].own_addr())
 | |
|     if bss and 'ie' in bss and "ff0724" in bss['ie']:
 | |
|         sta = dev[0].request("STA " + dev[1].own_addr())
 | |
|         logger.info("STA info:\n" + sta.rstrip())
 | |
|         if "[HT][VHT][HE]" not in sta:
 | |
|             raise Exception("Missing STA flags")
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_open_vht20(dev, apdev):
 | |
|     """wpa_supplicant open MESH network on VHT 20 MHz channel"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_vht20(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_vht20(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         add_open_mesh_network(dev[i], freq="5180", chwidth=0, disable_ht40=True)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     sig = dev[0].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=20 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
 | |
|     if "CENTER_FRQ1=5180" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
 | |
| 
 | |
|     sig = dev[1].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=20 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
 | |
|     if "CENTER_FRQ1=5180" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_open_vht_80p80(dev, apdev):
 | |
|     """wpa_supplicant open MESH network on VHT 80+80 MHz channel"""
 | |
|     try:
 | |
|         _test_wpas_mesh_open_vht_80p80(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_wpas_mesh_open_vht_80p80(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'US'])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=US" in ev:
 | |
|                 break
 | |
|         add_open_mesh_network(dev[i], freq="5180", chwidth=3)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
|     sig = dev[0].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=80+80 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
 | |
|     if "CENTER_FRQ1=5210" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
 | |
|     if "CENTER_FRQ2=5775" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(4): " + str(sig))
 | |
| 
 | |
|     sig = dev[1].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=80+80 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
 | |
|     if "CENTER_FRQ1=5210" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
 | |
|     if "CENTER_FRQ2=5775" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(4b): " + str(sig))
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_mesh_open_vht_160(dev, apdev):
 | |
|     """Open mesh network on VHT 160 MHz channel"""
 | |
|     try:
 | |
|         _test_mesh_open_vht_160(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
 | |
|         dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
 | |
|         subprocess.call(['iw', 'reg', 'set', '00'])
 | |
|         dev[0].flush_scan_cache()
 | |
|         dev[1].flush_scan_cache()
 | |
| 
 | |
| def _test_mesh_open_vht_160(dev, apdev):
 | |
|     check_mesh_support(dev[0])
 | |
|     subprocess.call(['iw', 'reg', 'set', 'ZA'])
 | |
|     for i in range(2):
 | |
|         for j in range(5):
 | |
|             ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
 | |
|             if ev is None:
 | |
|                 raise Exception("No regdom change event")
 | |
|             if "alpha2=ZA" in ev:
 | |
|                 break
 | |
| 
 | |
|         cmd = subprocess.Popen(["iw", "reg", "get"], stdout=subprocess.PIPE)
 | |
|         reg = cmd.stdout.read()
 | |
|         found = False
 | |
|         for entry in reg.splitlines():
 | |
|             entry = entry.decode()
 | |
|             if "@ 160)" in entry and "DFS" not in entry:
 | |
|                 found = True
 | |
|                 break
 | |
|         if not found:
 | |
|             raise HwsimSkip("160 MHz channel without DFS not supported in regulatory information")
 | |
| 
 | |
|         add_open_mesh_network(dev[i], freq="5520", chwidth=2)
 | |
| 
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
|     sig = dev[0].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=160 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
 | |
|     if "FREQUENCY=5520" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
 | |
| 
 | |
|     sig = dev[1].request("SIGNAL_POLL").splitlines()
 | |
|     if "WIDTH=160 MHz" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
 | |
|     if "FREQUENCY=5520" not in sig:
 | |
|         raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
 | |
| 
 | |
|     dev[0].mesh_group_remove()
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[0])
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_password_mismatch(dev, apdev):
 | |
|     """Mesh network and one device with mismatching password"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     dev[2].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[2])
 | |
|     dev[2].set_network_quoted(id, "psk", "wrong password")
 | |
|     dev[2].mesh_group_add(id)
 | |
| 
 | |
|     # The two peers with matching password need to be able to connect
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
 | |
|     if ev is None:
 | |
|         raise Exception("dev2 did not report auth failure (1)")
 | |
|     ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
 | |
|     if ev is None:
 | |
|         raise Exception("dev2 did not report auth failure (2)")
 | |
|     dev[2].dump_monitor()
 | |
| 
 | |
|     count = 0
 | |
|     ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
 | |
|     if ev is None:
 | |
|         logger.info("dev0 did not report auth failure")
 | |
|     else:
 | |
|         if "addr=" + dev[2].own_addr() not in ev:
 | |
|             raise Exception("Unexpected peer address in dev0 event: " + ev)
 | |
|         count += 1
 | |
|     dev[0].dump_monitor()
 | |
| 
 | |
|     ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
 | |
|     if ev is None:
 | |
|         logger.info("dev1 did not report auth failure")
 | |
|     else:
 | |
|         if "addr=" + dev[2].own_addr() not in ev:
 | |
|             raise Exception("Unexpected peer address in dev1 event: " + ev)
 | |
|         count += 1
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
|     for i in range(2):
 | |
|         try:
 | |
|             hwsim_utils.test_connectivity(dev[i], dev[2], timeout=1)
 | |
|             raise Exception("Data connectivity test passed unexpectedly")
 | |
|         except Exception as e:
 | |
|             if "data delivery failed" not in str(e):
 | |
|                 raise
 | |
| 
 | |
|     if count == 0:
 | |
|         raise Exception("Neither dev0 nor dev1 reported auth failure")
 | |
| 
 | |
| def test_wpas_mesh_password_mismatch_retry(dev, apdev, params):
 | |
|     """Mesh password mismatch and retry [long]"""
 | |
|     if not params['long']:
 | |
|         raise HwsimSkip("Skip test case with long duration due to --long not specified")
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network_quoted(id, "psk", "wrong password")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     for i in range(4):
 | |
|         ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
 | |
|         if ev is None:
 | |
|             raise Exception("dev0 did not report auth failure (%d)" % i)
 | |
|         ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
 | |
|         if ev is None:
 | |
|             raise Exception("dev1 did not report auth failure (%d)" % i)
 | |
| 
 | |
|     ev = dev[0].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("dev0 did not report auth blocked")
 | |
|     ev = dev[1].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("dev1 did not report auth blocked")
 | |
| 
 | |
| def test_mesh_wpa_auth_init_oom(dev, apdev):
 | |
|     """Secure mesh network setup failing due to wpa_init() OOM"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     with alloc_fail(dev[0], 1, "wpa_init"):
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.2)
 | |
|         if ev is not None:
 | |
|             raise Exception("Unexpected mesh group start during OOM")
 | |
| 
 | |
| def test_mesh_wpa_init_fail(dev, apdev):
 | |
|     """Secure mesh network setup local failure"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     check_mesh_support(dev[1], secure=True)
 | |
|     check_mesh_support(dev[2], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
| 
 | |
|     with fail_test(dev[0], 1, "os_get_random;=__mesh_rsn_auth_init"):
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         wait_fail_trigger(dev[0], "GET_FAIL")
 | |
| 
 | |
|     dev[0].dump_monitor()
 | |
|     with alloc_fail(dev[0], 1, "mesh_rsn_auth_init"):
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
 | |
| 
 | |
|     dev[0].dump_monitor()
 | |
|     with fail_test(dev[0], 1, "os_get_random;mesh_rsn_init_ampe_sta"):
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         dev[1].request("SET sae_groups ")
 | |
|         id = add_mesh_secure_net(dev[1])
 | |
|         dev[1].mesh_group_add(id)
 | |
|         wait_fail_trigger(dev[0], "GET_FAIL")
 | |
| 
 | |
|     with fail_test(dev[0], 2, "=omac1_aes_vector;aes_siv_encrypt"):
 | |
|         id = add_mesh_secure_net(dev[2])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         dev[2].request("SET sae_groups ")
 | |
|         id = add_mesh_secure_net(dev[2])
 | |
|         dev[2].mesh_group_add(id)
 | |
|         wait_fail_trigger(dev[0], "GET_FAIL")
 | |
| 
 | |
| def test_wpas_mesh_reconnect(dev, apdev):
 | |
|     """Secure mesh network plink counting during reconnection"""
 | |
|     check_mesh_support(dev[0])
 | |
|     try:
 | |
|         _test_wpas_mesh_reconnect(dev)
 | |
|     finally:
 | |
|         dev[0].request("SET max_peer_links 99")
 | |
| 
 | |
| def _test_wpas_mesh_reconnect(dev):
 | |
|     dev[0].request("SET max_peer_links 2")
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].set_network(id, "beacon_int", "100")
 | |
|     dev[0].mesh_group_add(id)
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     for i in range(3):
 | |
|         # Drop incoming management frames to avoid handling link close
 | |
|         dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|         dev[1].mesh_group_remove()
 | |
|         check_mesh_group_removed(dev[1])
 | |
|         dev[1].request("FLUSH")
 | |
|         dev[0].request("SET ext_mgmt_frame_handling 0")
 | |
|         id = add_mesh_secure_net(dev[1])
 | |
|         dev[1].mesh_group_add(id)
 | |
|         check_mesh_group_added(dev[1])
 | |
|         check_mesh_peer_connected(dev[1])
 | |
|         dev[0].dump_monitor()
 | |
|         dev[1].dump_monitor()
 | |
| 
 | |
| def test_wpas_mesh_gate_forwarding(dev, apdev, p):
 | |
|     """Mesh forwards traffic to unknown sta to mesh gates"""
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     addr2 = dev[2].own_addr()
 | |
|     external_sta = '02:11:22:33:44:55'
 | |
| 
 | |
|     # start 3 node connected mesh
 | |
|     check_mesh_support(dev[0])
 | |
|     for i in range(3):
 | |
|         add_open_mesh_network(dev[i])
 | |
|         check_mesh_group_added(dev[i])
 | |
|     for i in range(3):
 | |
|         check_mesh_peer_connected(dev[i])
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
|     hwsim_utils.test_connectivity(dev[1], dev[2])
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[2])
 | |
| 
 | |
|     # dev0 and dev1 are mesh gates
 | |
|     subprocess.call(['iw', 'dev', dev[0].ifname, 'set', 'mesh_param',
 | |
|                      'mesh_gate_announcements=1'])
 | |
|     subprocess.call(['iw', 'dev', dev[1].ifname, 'set', 'mesh_param',
 | |
|                      'mesh_gate_announcements=1'])
 | |
| 
 | |
|     # wait for gate announcement frames
 | |
|     time.sleep(1)
 | |
| 
 | |
|     # data frame from dev2 -> external sta should be sent to both gates
 | |
|     dev[2].request("DATA_TEST_CONFIG 1")
 | |
|     dev[2].request("DATA_TEST_TX {} {} 0".format(external_sta, addr2))
 | |
|     dev[2].request("DATA_TEST_CONFIG 0")
 | |
| 
 | |
|     capfile = os.path.join(p['logdir'], "hwsim0.pcapng")
 | |
|     filt = "wlan.sa==%s && wlan_mgt.fixed.mesh_addr5==%s" % (addr2,
 | |
|                                                              external_sta)
 | |
|     time.sleep(4)
 | |
|     for i in range(5):
 | |
|         da = run_tshark(capfile, filt, ["wlan.da"])
 | |
|         if addr0 in da and addr1 in da:
 | |
|             logger.debug("Frames seen in tshark iteration %d" % i)
 | |
|             break
 | |
|         time.sleep(0.5)
 | |
| 
 | |
|     if addr0 not in da and addr1 not in da:
 | |
|         filt = "wlan.sa==%s" % addr2
 | |
|         mesh = run_tshark(capfile, filt, ["wlan.mesh.control_field"])
 | |
|         if "1" not in mesh:
 | |
|             # Wireshark regression in mesh control field parsing:
 | |
|             # https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15521
 | |
|             raise HwsimSkip("tshark bug 15521")
 | |
|     if addr0 not in da:
 | |
|         raise Exception("Frame to gate %s not observed" % addr0)
 | |
|     if addr1 not in da:
 | |
|         raise Exception("Frame to gate %s not observed" % addr1)
 | |
| 
 | |
| def test_wpas_mesh_pmksa_caching(dev, apdev):
 | |
|     """Secure mesh network and PMKSA caching"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     pmksa0 = dev[0].get_pmksa(addr1)
 | |
|     pmksa1 = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0 is None or pmksa1 is None:
 | |
|         raise Exception("No PMKSA cache entry created")
 | |
|     if pmksa0['pmkid'] != pmksa1['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
|     pmksa0b = dev[0].get_pmksa(addr1)
 | |
|     if pmksa0b is None:
 | |
|         raise Exception("PMKSA cache entry not maintained")
 | |
|     time.sleep(0.1)
 | |
| 
 | |
|     if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD unexpectedly succeeded in no_auto_peer=0 case")
 | |
| 
 | |
| def test_wpas_mesh_pmksa_caching2(dev, apdev):
 | |
|     """Secure mesh network and PMKSA caching with no_auto_peer=1"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].set_network(id, "no_auto_peer", "1")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Check for peer connected
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     pmksa0 = dev[0].get_pmksa(addr1)
 | |
|     pmksa1 = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0 is None or pmksa1 is None:
 | |
|         raise Exception("No PMKSA cache entry created")
 | |
|     if pmksa0['pmkid'] != pmksa1['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
|     pmksa0b = dev[0].get_pmksa(addr1)
 | |
|     if pmksa0b is None:
 | |
|         raise Exception("PMKSA cache entry not maintained")
 | |
| 
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message (2)")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed (2)")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     pmksa0c = dev[0].get_pmksa(addr1)
 | |
|     pmksa1c = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0c is None or pmksa1c is None:
 | |
|         raise Exception("No PMKSA cache entry created (2)")
 | |
|     if pmksa0c['pmkid'] != pmksa1c['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
|     if pmksa0['pmkid'] != pmksa0c['pmkid']:
 | |
|         raise Exception("PMKID changed")
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
| def test_wpas_mesh_pmksa_caching_no_match(dev, apdev):
 | |
|     """Secure mesh network and PMKSA caching with no PMKID match"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].set_network(id, "no_auto_peer", "1")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Check for peer connected
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     pmksa0 = dev[0].get_pmksa(addr1)
 | |
|     pmksa1 = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0 is None or pmksa1 is None:
 | |
|         raise Exception("No PMKSA cache entry created")
 | |
|     if pmksa0['pmkid'] != pmksa1['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
| 
 | |
|     if "OK" not in dev[1].request("PMKSA_FLUSH"):
 | |
|         raise Exception("Failed to flush PMKSA cache")
 | |
| 
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message (2)")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed (2)")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     pmksa0c = dev[0].get_pmksa(addr1)
 | |
|     pmksa1c = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0c is None or pmksa1c is None:
 | |
|         raise Exception("No PMKSA cache entry created (2)")
 | |
|     if pmksa0c['pmkid'] != pmksa1c['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
|     if pmksa0['pmkid'] == pmksa0c['pmkid']:
 | |
|         raise Exception("PMKID did not change")
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
| def test_mesh_pmksa_caching_oom(dev, apdev):
 | |
|     """Secure mesh network and PMKSA caching failing due to OOM"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].set_network(id, "no_auto_peer", "1")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Check for peer connected
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
|     pmksa0b = dev[0].get_pmksa(addr1)
 | |
|     if pmksa0b is None:
 | |
|         raise Exception("PMKSA cache entry not maintained")
 | |
| 
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message (2)")
 | |
| 
 | |
|     with alloc_fail(dev[0], 1, "wpa_auth_sta_init;mesh_rsn_auth_sae_sta"):
 | |
|         if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|             raise Exception("MESH_PEER_ADD failed (2)")
 | |
|         wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
 | |
| 
 | |
| def test_wpas_mesh_pmksa_caching_ext(dev, apdev):
 | |
|     """Secure mesh network and PMKSA caching and external storage"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined_connected(dev)
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     pmksa0 = dev[0].get_pmksa(addr1)
 | |
|     pmksa1 = dev[1].get_pmksa(addr0)
 | |
|     if pmksa0 is None or pmksa1 is None:
 | |
|         raise Exception("No PMKSA cache entry created")
 | |
|     if pmksa0['pmkid'] != pmksa1['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries")
 | |
| 
 | |
|     res1 = dev[1].request("MESH_PMKSA_GET any")
 | |
|     res2 = dev[1].request("MESH_PMKSA_GET " + addr0)
 | |
|     logger.info("MESH_PMKSA_GET: " + res1)
 | |
|     if "UNKNOWN COMMAND" in res1:
 | |
|         raise HwsimSkip("MESH_PMKSA_GET not supported in the build")
 | |
|     logger.info("MESH_PMKSA_GET: " + res2)
 | |
|     if pmksa0['pmkid'] not in res1:
 | |
|         raise Exception("PMKID not included in PMKSA entry")
 | |
|     if res1 != res2:
 | |
|         raise Exception("Unexpected difference in MESH_PMKSA_GET output")
 | |
| 
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     check_mesh_peer_disconnected(dev[0])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     res = dev[1].get_pmksa(addr0)
 | |
|     if res is not None:
 | |
|         raise Exception("Unexpected PMKSA cache entry remaining")
 | |
| 
 | |
|     time.sleep(0.1)
 | |
|     if "OK" not in dev[1].request("MESH_PMKSA_ADD " + res2):
 | |
|         raise Exception("MESH_PMKSA_ADD failed")
 | |
|     dev[1].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[1])
 | |
|     check_mesh_peer_connected(dev[1])
 | |
|     check_mesh_peer_connected(dev[0])
 | |
|     time.sleep(0.1)
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     pmksa1b = dev[1].get_pmksa(addr0)
 | |
|     if pmksa1b is None:
 | |
|         raise Exception("No PMKSA cache entry created after external storage restore")
 | |
|     if pmksa1['pmkid'] != pmksa1b['pmkid']:
 | |
|         raise Exception("PMKID mismatch in PMKSA cache entries after external storage restore")
 | |
| 
 | |
|     hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
| 
 | |
|     res = dev[1].request("MESH_PMKSA_GET foo")
 | |
|     if "FAIL" not in res:
 | |
|         raise Exception("Invalid MESH_PMKSA_GET accepted")
 | |
| 
 | |
|     dev[1].mesh_group_remove()
 | |
|     check_mesh_group_removed(dev[1])
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     dev[1].request("REMOVE_NETWORK all")
 | |
|     res = dev[1].request("MESH_PMKSA_GET any")
 | |
|     if "FAIL" not in res:
 | |
|         raise Exception("MESH_PMKSA_GET accepted when not in mesh")
 | |
| 
 | |
|     tests = ["foo",
 | |
|              "02:02:02:02:02:02",
 | |
|              "02:02:02:02:02:02 q",
 | |
|              "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b",
 | |
|              "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b q",
 | |
|              "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f",
 | |
|              "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f q"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in dev[1].request("MESH_PMKSA_ADD " + t):
 | |
|             raise Exception("Invalid MESH_PMKSA_ADD accepted")
 | |
| 
 | |
| def test_mesh_oom(dev, apdev):
 | |
|     """Mesh network setup failing due to OOM"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
| 
 | |
|     with alloc_fail(dev[0], 1, "mesh_config_create"):
 | |
|         add_open_mesh_network(dev[0])
 | |
|         ev = dev[0].wait_event(["Failed to init mesh"])
 | |
|         if ev is None:
 | |
|             raise Exception("Init failure not reported")
 | |
| 
 | |
|     with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
 | |
|         add_open_mesh_network(dev[0], basic_rates="60 120 240")
 | |
|         ev = dev[0].wait_event(["Failed to init mesh"])
 | |
|         if ev is None:
 | |
|             raise Exception("Init failure not reported")
 | |
| 
 | |
|     for i in range(1, 66):
 | |
|         dev[0].dump_monitor()
 | |
|         logger.info("Test instance %d" % i)
 | |
|         try:
 | |
|             with alloc_fail(dev[0], i, "wpa_supplicant_mesh_init"):
 | |
|                 add_open_mesh_network(dev[0])
 | |
|                 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
 | |
|                 ev = dev[0].wait_event(["Failed to init mesh",
 | |
|                                         "MESH-GROUP-STARTED"])
 | |
|                 if ev is None:
 | |
|                     raise Exception("Init failure not reported")
 | |
|         except Exception as e:
 | |
|             if i < 15:
 | |
|                 raise
 | |
|             logger.info("Ignore no-oom for i=%d" % i)
 | |
| 
 | |
|     with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
|         ev = dev[0].wait_event(["Failed to init mesh"])
 | |
|         if ev is None:
 | |
|             raise Exception("Init failure not reported")
 | |
| 
 | |
| def test_mesh_add_interface_oom(dev):
 | |
|     """wpa_supplicant mesh with dynamic interface addition failing"""
 | |
|     check_mesh_support(dev[0])
 | |
|     for i in range(1, 3):
 | |
|         mesh = None
 | |
|         try:
 | |
|             with alloc_fail(dev[0], i, "wpas_mesh_add_interface"):
 | |
|                 mesh = dev[0].request("MESH_INTERFACE_ADD").strip()
 | |
|         finally:
 | |
|             if mesh and mesh != "FAIL":
 | |
|                 dev[0].request("MESH_GROUP_REMOVE " + mesh)
 | |
| 
 | |
| def test_mesh_scan_oom(dev):
 | |
|     """wpa_supplicant mesh scan results and OOM"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     check_mesh_group_added(dev[0])
 | |
|     for i in range(5):
 | |
|         dev[1].scan(freq="2412")
 | |
|         res = dev[1].request("SCAN_RESULTS")
 | |
|         if "[MESH]" in res:
 | |
|             break
 | |
|     for r in res.splitlines():
 | |
|         if "[MESH]" in r:
 | |
|             break
 | |
|     bssid = r.split('\t')[0]
 | |
| 
 | |
|     bss = dev[1].get_bss(bssid)
 | |
|     if bss is None:
 | |
|         raise Exception("Could not get BSS entry for mesh")
 | |
| 
 | |
|     for i in range(1, 3):
 | |
|         with alloc_fail(dev[1], i, "mesh_attr_text"):
 | |
|             bss = dev[1].get_bss(bssid)
 | |
|             if bss and "mesh_id" in bss:
 | |
|                 raise Exception("Unexpected BSS result during OOM")
 | |
| 
 | |
| def test_mesh_drv_fail(dev, apdev):
 | |
|     """Mesh network setup failing due to driver command failure"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     dev[0].request("SET sae_groups ")
 | |
| 
 | |
|     with fail_test(dev[0], 1, "nl80211_join_mesh"):
 | |
|         add_open_mesh_network(dev[0])
 | |
|         ev = dev[0].wait_event(["mesh join error"])
 | |
|         if ev is None:
 | |
|             raise Exception("Join failure not reported")
 | |
| 
 | |
|     dev[0].dump_monitor()
 | |
|     with fail_test(dev[0], 1, "wpa_driver_nl80211_if_add"):
 | |
|         if "FAIL" not in dev[0].request("MESH_INTERFACE_ADD").strip():
 | |
|             raise Exception("Interface added unexpectedly")
 | |
| 
 | |
|     dev[0].dump_monitor()
 | |
|     with fail_test(dev[0], 1, "wpa_driver_nl80211_init_mesh"):
 | |
|         add_open_mesh_network(dev[0])
 | |
|         ev = dev[0].wait_event(["Could not join mesh"])
 | |
|         if ev is None:
 | |
|             raise Exception("Join failure not reported")
 | |
| 
 | |
| def test_mesh_sae_groups_invalid(dev, apdev):
 | |
|     """Mesh with invalid SAE group configuration"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
| 
 | |
|     dev[0].request("SET sae_groups 26")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups 123 122 121")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     ev = dev[0].wait_event(["new peer notification"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("dev[0] did not see peer")
 | |
|     ev = dev[1].wait_event(["new peer notification"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("dev[1] did not see peer")
 | |
| 
 | |
|     ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected connection(0)")
 | |
| 
 | |
|     ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected connection(1)")
 | |
| 
 | |
|     # Additional coverage in mesh_rsn_sae_group() with non-zero
 | |
|     # wpa_s->mesh_rsn->sae_group_index.
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     dev[2].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[2])
 | |
|     dev[2].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[2])
 | |
|     check_mesh_peer_connected(dev[0])
 | |
|     check_mesh_peer_connected(dev[2])
 | |
|     ev = dev[1].wait_event(["new peer notification"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("dev[1] did not see peer(2)")
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     dev[2].dump_monitor()
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     dev[2].request("SET sae_groups ")
 | |
| 
 | |
| def test_mesh_sae_failure(dev, apdev):
 | |
|     """Mesh and local SAE failures"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
| 
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     dev[1].request("SET sae_groups ")
 | |
| 
 | |
|     funcs = [(1, "=mesh_rsn_auth_sae_sta", True),
 | |
|              (1, "mesh_rsn_build_sae_commit;mesh_rsn_auth_sae_sta", False),
 | |
|              (1, "auth_sae_init_committed;mesh_rsn_auth_sae_sta", True),
 | |
|              (1, "=mesh_rsn_protect_frame", True),
 | |
|              (2, "=mesh_rsn_protect_frame", True),
 | |
|              (1, "aes_siv_encrypt;mesh_rsn_protect_frame", True),
 | |
|              (1, "=mesh_rsn_process_ampe", True),
 | |
|              (1, "aes_siv_decrypt;mesh_rsn_process_ampe", True)]
 | |
|     for count, func, success in funcs:
 | |
|         id = add_mesh_secure_net(dev[0])
 | |
|         dev[0].mesh_group_add(id)
 | |
| 
 | |
|         with alloc_fail(dev[1], count, func):
 | |
|             id = add_mesh_secure_net(dev[1])
 | |
|             dev[1].mesh_group_add(id)
 | |
|             check_mesh_joined2(dev)
 | |
|             if success:
 | |
|                 # retry is expected to work
 | |
|                 check_mesh_connected2(dev)
 | |
|             else:
 | |
|                 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
 | |
|         dev[0].mesh_group_remove()
 | |
|         dev[1].mesh_group_remove()
 | |
|         check_mesh_group_removed(dev[0])
 | |
|         check_mesh_group_removed(dev[1])
 | |
| 
 | |
| def test_mesh_failure(dev, apdev):
 | |
|     """Mesh and local failures"""
 | |
|     check_mesh_support(dev[0])
 | |
| 
 | |
|     funcs = [(1, "ap_sta_add;mesh_mpm_add_peer", True),
 | |
|              (1, "wpabuf_alloc;mesh_mpm_send_plink_action", True)]
 | |
|     for count, func, success in funcs:
 | |
|         add_open_mesh_network(dev[0])
 | |
| 
 | |
|         with alloc_fail(dev[1], count, func):
 | |
|             add_open_mesh_network(dev[1])
 | |
|             check_mesh_joined2(dev)
 | |
|             if success:
 | |
|                 # retry is expected to work
 | |
|                 check_mesh_connected2(dev)
 | |
|             else:
 | |
|                 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
 | |
|         dev[0].mesh_group_remove()
 | |
|         dev[1].mesh_group_remove()
 | |
|         check_mesh_group_removed(dev[0])
 | |
|         check_mesh_group_removed(dev[1])
 | |
| 
 | |
|     funcs = [(1, "mesh_mpm_init_link", True)]
 | |
|     for count, func, success in funcs:
 | |
|         add_open_mesh_network(dev[0])
 | |
| 
 | |
|         with fail_test(dev[1], count, func):
 | |
|             add_open_mesh_network(dev[1])
 | |
|             check_mesh_joined2(dev)
 | |
|             if success:
 | |
|                 # retry is expected to work
 | |
|                 check_mesh_connected2(dev)
 | |
|             else:
 | |
|                 wait_fail_trigger(dev[1], "GET_FAIL")
 | |
|         dev[0].mesh_group_remove()
 | |
|         dev[1].mesh_group_remove()
 | |
|         check_mesh_group_removed(dev[0])
 | |
|         check_mesh_group_removed(dev[1])
 | |
| 
 | |
| def test_mesh_invalid_frequency(dev, apdev):
 | |
|     """Mesh and invalid frequency configuration"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0], freq=None)
 | |
|     ev = dev[0].wait_event(["MESH-GROUP-STARTED",
 | |
|                             "Could not join mesh"])
 | |
|     if ev is None or "Could not join mesh" not in ev:
 | |
|         raise Exception("Mesh join failure not reported")
 | |
|     dev[0].request("REMOVE_NETWORK all")
 | |
| 
 | |
|     add_open_mesh_network(dev[0], freq="2413")
 | |
|     ev = dev[0].wait_event(["MESH-GROUP-STARTED",
 | |
|                             "Could not join mesh"])
 | |
|     if ev is None or "Could not join mesh" not in ev:
 | |
|         raise Exception("Mesh join failure not reported")
 | |
| 
 | |
| def test_mesh_default_beacon_int(dev, apdev):
 | |
|     """Mesh and default beacon interval"""
 | |
|     check_mesh_support(dev[0])
 | |
|     try:
 | |
|         dev[0].request("SET beacon_int 200")
 | |
|         add_open_mesh_network(dev[0])
 | |
|         check_mesh_group_added(dev[0])
 | |
|     finally:
 | |
|         dev[0].request("SET beacon_int 0")
 | |
| 
 | |
| def test_mesh_scan_parse_error(dev, apdev):
 | |
|     """Mesh scan element parse error"""
 | |
|     check_mesh_support(dev[0])
 | |
|     params = {"ssid": "open",
 | |
|               "beacon_int": "2000"}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     bssid = apdev[0]['bssid']
 | |
|     hapd.set('vendor_elements', 'dd0201')
 | |
|     for i in range(10):
 | |
|         dev[0].scan(freq=2412)
 | |
|         if bssid in dev[0].request("SCAN_RESULTS"):
 | |
|             break
 | |
|     # This will fail in IE parsing due to the truncated IE in the Probe
 | |
|     # Response frame.
 | |
|     bss = dev[0].request("BSS " + bssid)
 | |
| 
 | |
| def test_mesh_missing_mic(dev, apdev):
 | |
|     """Secure mesh network and missing MIC"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     count = 0
 | |
|     remove_mic = True
 | |
|     while True:
 | |
|         count += 1
 | |
|         if count > 15:
 | |
|             raise Exception("Did not see Action frames")
 | |
|         rx_msg = dev[0].mgmt_rx()
 | |
|         if rx_msg is None:
 | |
|             ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|             if ev:
 | |
|                 break
 | |
|             raise Exception("MGMT-RX timeout")
 | |
|         if rx_msg['subtype'] == 13:
 | |
|             payload = rx_msg['payload']
 | |
|             frame = rx_msg['frame']
 | |
|             (categ, action) = struct.unpack('BB', payload[0:2])
 | |
|             if categ == 15 and action == 1 and remove_mic:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x8c\x10')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find MIC element")
 | |
|                 logger.info("Found MIC at %d" % pos)
 | |
|                 # Remove MIC
 | |
|                 rx_msg['frame'] = frame[0:pos]
 | |
|                 remove_mic = False
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
 | |
|             rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
|         ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|         if ev:
 | |
|             break
 | |
| 
 | |
| def test_mesh_pmkid_mismatch(dev, apdev):
 | |
|     """Secure mesh network and PMKID mismatch"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     dev[0].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].set_network(id, "no_auto_peer", "1")
 | |
|     dev[0].mesh_group_add(id)
 | |
| 
 | |
|     dev[1].request("SET sae_groups ")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].set_network(id, "no_auto_peer", "1")
 | |
|     dev[1].mesh_group_add(id)
 | |
| 
 | |
|     check_mesh_joined2(dev)
 | |
| 
 | |
|     # Check for peer connected
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed")
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
| 
 | |
|     ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
 | |
|     if ev is None:
 | |
|         raise Exception("Missing no-initiate message (2)")
 | |
|     dev[0].dump_monitor()
 | |
|     dev[1].dump_monitor()
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
 | |
|         raise Exception("MESH_PEER_ADD failed (2)")
 | |
| 
 | |
|     count = 0
 | |
|     break_pmkid = True
 | |
|     while True:
 | |
|         count += 1
 | |
|         if count > 50:
 | |
|             raise Exception("Did not see Action frames")
 | |
|         rx_msg = dev[0].mgmt_rx()
 | |
|         if rx_msg is None:
 | |
|             ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
 | |
|             if ev:
 | |
|                 break
 | |
|             raise Exception("MGMT-RX timeout")
 | |
|         if rx_msg['subtype'] == 13:
 | |
|             payload = rx_msg['payload']
 | |
|             frame = rx_msg['frame']
 | |
|             (categ, action) = struct.unpack('BB', payload[0:2])
 | |
|             if categ == 15 and action == 1 and break_pmkid:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x75\x14')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find Mesh Peering Management element")
 | |
|                 logger.info("Found Mesh Peering Management element at %d" % pos)
 | |
|                 # Break PMKID to hit "Mesh RSN: Invalid PMKID (Chosen PMK did
 | |
|                 # not match calculated PMKID)"
 | |
|                 rx_msg['frame'] = frame[0:pos + 6] + b'\x00\x00\x00\x00' + frame[pos + 10:]
 | |
|                 break_pmkid = False
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
 | |
|             rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
|         ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|         if ev:
 | |
|             break
 | |
| 
 | |
| def test_mesh_peering_proto(dev, apdev):
 | |
|     """Mesh peering management protocol testing"""
 | |
|     check_mesh_support(dev[0])
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     add_open_mesh_network(dev[0], beacon_int=160)
 | |
|     add_open_mesh_network(dev[1], beacon_int=160)
 | |
| 
 | |
|     count = 0
 | |
|     test = 1
 | |
|     while True:
 | |
|         count += 1
 | |
|         if count > 50:
 | |
|             raise Exception("Did not see Action frames")
 | |
|         rx_msg = dev[0].mgmt_rx()
 | |
|         if rx_msg is None:
 | |
|             ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|             if ev:
 | |
|                 break
 | |
|             raise Exception("MGMT-RX timeout")
 | |
|         if rx_msg['subtype'] == 13:
 | |
|             payload = rx_msg['payload']
 | |
|             frame = rx_msg['frame']
 | |
|             (categ, action) = struct.unpack('BB', payload[0:2])
 | |
|             if categ == 15 and action == 1 and test == 1:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x75\x04')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find Mesh Peering Management element")
 | |
|                 logger.info("Found Mesh Peering Management element at %d" % pos)
 | |
|                 # Remove the element to hit
 | |
|                 # "MPM: No Mesh Peering Management element"
 | |
|                 rx_msg['frame'] = frame[0:pos]
 | |
|                 test += 1
 | |
|             elif categ == 15 and action == 1 and test == 2:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x72\x0e')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find Mesh ID element")
 | |
|                 logger.info("Found Mesh ID element at %d" % pos)
 | |
|                 # Remove the element to hit
 | |
|                 # "MPM: No Mesh ID or Mesh Configuration element"
 | |
|                 rx_msg['frame'] = frame[0:pos] + frame[pos + 16:]
 | |
|                 test += 1
 | |
|             elif categ == 15 and action == 1 and test == 3:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x72\x0e')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find Mesh ID element")
 | |
|                 logger.info("Found Mesh ID element at %d" % pos)
 | |
|                 # Replace Mesh ID to hit "MPM: Mesh ID or Mesh Configuration
 | |
|                 # element do not match local MBSS"
 | |
|                 rx_msg['frame'] = frame[0:pos] + b'\x72\x0etest-test-test' + frame[pos + 16:]
 | |
|                 test += 1
 | |
|             elif categ == 15 and action == 1 and test == 4:
 | |
|                 # Mesh Peering Open
 | |
|                 # Remove IEs to hit
 | |
|                 # "MPM: Ignore too short action frame 1 ie_len 0"
 | |
|                 rx_msg['frame'] = frame[0:26]
 | |
|                 test += 1
 | |
|             elif categ == 15 and action == 1 and test == 5:
 | |
|                 # Mesh Peering Open
 | |
|                 # Truncate IEs to hit
 | |
|                 # "MPM: Failed to parse PLINK IEs"
 | |
|                 rx_msg['frame'] = frame[0:30]
 | |
|                 test += 1
 | |
|             elif categ == 15 and action == 1 and test == 6:
 | |
|                 # Mesh Peering Open
 | |
|                 pos = frame.find(b'\x75\x04')
 | |
|                 if not pos:
 | |
|                     raise Exception("Could not find Mesh Peering Management element")
 | |
|                 logger.info("Found Mesh Peering Management element at %d" % pos)
 | |
|                 # Truncate the element to hit
 | |
|                 # "MPM: Invalid peer mgmt ie" and
 | |
|                 # "MPM: Mesh parsing rejected frame"
 | |
|                 rx_msg['frame'] = frame[0:pos] + b'\x75\x00\x00\x00' + frame[pos + 6:]
 | |
|                 test += 1
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
 | |
|             rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
|         ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
 | |
|         if ev:
 | |
|             break
 | |
| 
 | |
|     if test != 7:
 | |
|         raise Exception("Not all test frames completed")
 | |
| 
 | |
| def test_mesh_mpm_init_proto(dev, apdev):
 | |
|     """Mesh peering management protocol testing for peer addition"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     check_mesh_group_added(dev[0])
 | |
|     dev[0].dump_monitor()
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
| 
 | |
|     addr = "020000000100"
 | |
|     hdr = "d000ac00020000000000" + addr + addr + "1000"
 | |
|     fixed = "0f010000"
 | |
|     supp_rates = "010802040b168c129824"
 | |
|     ext_supp_rates = "3204b048606c"
 | |
|     mesh_id = "720e777061732d6d6573682d6f70656e"
 | |
|     mesh_conf = "710701010001000009"
 | |
|     mpm = "75040000079d"
 | |
|     ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
 | |
|     ht_oper = "3d160b000000000000000000000000000000000000000000"
 | |
| 
 | |
|     dev[0].request("NOTE no supported rates")
 | |
|     frame = hdr + fixed + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE Invalid supported rates element length 33+0")
 | |
|     long_supp_rates = "012100112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00"
 | |
|     frame = hdr + fixed + long_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE Too short mesh config")
 | |
|     short_mesh_conf = "710401010001"
 | |
|     frame = hdr + fixed + supp_rates + mesh_id + short_mesh_conf + mpm + ht_capab + ht_oper
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE Add STA failure")
 | |
|     frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add"):
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE Send Action failure")
 | |
|     with fail_test(dev[0], 1, "driver_nl80211_send_action"):
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE Set STA failure")
 | |
|     addr = "020000000101"
 | |
|     hdr = "d000ac00020000000000" + addr + addr + "1000"
 | |
|     frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     with fail_test(dev[0], 2, "wpa_driver_nl80211_sta_add"):
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE ap_sta_add OOM")
 | |
|     addr = "020000000102"
 | |
|     hdr = "d000ac00020000000000" + addr + addr + "1000"
 | |
|     frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     with alloc_fail(dev[0], 1, "ap_sta_add"):
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     dev[0].request("NOTE hostapd_get_aid() failure")
 | |
|     addr = "020000000103"
 | |
|     hdr = "d000ac00020000000000" + addr + addr + "1000"
 | |
|     frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     with fail_test(dev[0], 1, "hostapd_get_aid"):
 | |
|         if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|             raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:00"):
 | |
|         raise Exception("Failed to remove peer")
 | |
|     if "FAIL" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
 | |
|         raise Exception("Unexpected MESH_PEER_REMOVE success")
 | |
|     if "FAIL" not in dev[1].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
 | |
|         raise Exception("Unexpected MESH_PEER_REMOVE success(2)")
 | |
|     if "FAIL" not in dev[1].request("MESH_PEER_ADD 02:00:00:00:01:02"):
 | |
|         raise Exception("Unexpected MESH_PEER_ADD success")
 | |
| 
 | |
| def test_mesh_holding(dev, apdev):
 | |
|     """Mesh MPM FSM and HOLDING state event OPN_ACPT"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     add_open_mesh_network(dev[1])
 | |
|     check_mesh_joined_connected(dev)
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
 | |
|         raise Exception("Failed to remove peer")
 | |
| 
 | |
|     rx_msg = dev[0].mgmt_rx()
 | |
|     if rx_msg is None:
 | |
|         raise Exception("MGMT-RX timeout")
 | |
|     if rx_msg['subtype'] != 13:
 | |
|         raise Exception("Unexpected management frame")
 | |
|     payload = rx_msg['payload']
 | |
|     (categ, action) = struct.unpack('BB', payload[0:2])
 | |
|     if categ != 0x0f or action != 0x03:
 | |
|         raise Exception("Did not see Mesh Peering Close")
 | |
| 
 | |
|     peer_lid = binascii.hexlify(payload[-6:-4]).decode()
 | |
|     my_lid = binascii.hexlify(payload[-4:-2]).decode()
 | |
| 
 | |
|     # Drop Mesh Peering Close and instead, process an unexpected Mesh Peering
 | |
|     # Open to trigger transmission of another Mesh Peering Close in the HOLDING
 | |
|     # state based on an OPN_ACPT event.
 | |
| 
 | |
|     dst = addr0.replace(':', '')
 | |
|     src = addr1.replace(':', '')
 | |
|     hdr = "d000ac00" + dst + src + src + "1000"
 | |
|     fixed = "0f010000"
 | |
|     supp_rates = "010802040b168c129824"
 | |
|     ext_supp_rates = "3204b048606c"
 | |
|     mesh_id = "720e777061732d6d6573682d6f70656e"
 | |
|     mesh_conf = "710701010001000009"
 | |
|     mpm = "7504" + my_lid + peer_lid
 | |
|     ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
 | |
|     ht_oper = "3d160b000000000000000000000000000000000000000000"
 | |
| 
 | |
|     frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
|     time.sleep(0.1)
 | |
| 
 | |
| def test_mesh_cnf_rcvd_event_cls_acpt(dev, apdev):
 | |
|     """Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     check_mesh_group_added(dev[0])
 | |
|     dev[0].dump_monitor()
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     add_open_mesh_network(dev[1])
 | |
|     check_mesh_group_added(dev[1])
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
| 
 | |
|     rx_msg = dev[0].mgmt_rx()
 | |
|     # Drop Mesh Peering Open
 | |
| 
 | |
|     rx_msg = dev[0].mgmt_rx()
 | |
|     # Allow Mesh Peering Confirm to go through
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
 | |
|         rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
|     payload = rx_msg['payload']
 | |
|     peer_lid = binascii.hexlify(payload[51:53]).decode()
 | |
|     my_lid = binascii.hexlify(payload[53:55]).decode()
 | |
| 
 | |
|     dst = addr0.replace(':', '')
 | |
|     src = addr1.replace(':', '')
 | |
|     hdr = "d000ac00" + dst + src + src + "1000"
 | |
|     fixed = "0f03"
 | |
|     mesh_id = "720e777061732d6d6573682d6f70656e"
 | |
|     mpm = "75080000" + peer_lid + my_lid + "3700"
 | |
|     frame = hdr + fixed + mesh_id + mpm
 | |
| 
 | |
|     # Inject Mesh Peering Close to hit "state CNF_RCVD event CLS_ACPT" to
 | |
|     # HOLDING transition.
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
| def test_mesh_opn_snt_event_cls_acpt(dev, apdev):
 | |
|     """Mesh peering management protocol testing - CLS_ACPT event in OPN_SNT"""
 | |
|     check_mesh_support(dev[0])
 | |
|     add_open_mesh_network(dev[0])
 | |
|     check_mesh_group_added(dev[0])
 | |
|     dev[0].dump_monitor()
 | |
| 
 | |
|     dev[0].request("SET ext_mgmt_frame_handling 1")
 | |
|     add_open_mesh_network(dev[1])
 | |
|     check_mesh_group_added(dev[1])
 | |
| 
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
| 
 | |
|     rx_msg = dev[0].mgmt_rx()
 | |
|     # Drop Mesh Peering Open
 | |
| 
 | |
|     rx_msg = dev[0].mgmt_rx()
 | |
|     # Drop Mesh Peering Confirm
 | |
| 
 | |
|     payload = rx_msg['payload']
 | |
|     peer_lid = "0000"
 | |
|     my_lid = binascii.hexlify(payload[53:55]).decode()
 | |
| 
 | |
|     dst = addr0.replace(':', '')
 | |
|     src = addr1.replace(':', '')
 | |
|     hdr = "d000ac00" + dst + src + src + "1000"
 | |
|     fixed = "0f03"
 | |
|     mesh_id = "720e777061732d6d6573682d6f70656e"
 | |
|     mpm = "75080000" + peer_lid + my_lid + "3700"
 | |
|     frame = hdr + fixed + mesh_id + mpm
 | |
| 
 | |
|     # Inject Mesh Peering Close to hit "state OPN_SNTevent CLS_ACPT" to
 | |
|     # HOLDING transition.
 | |
|     if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
 | |
|         raise Exception("MGMT_RX_PROCESS failed")
 | |
| 
 | |
| def test_mesh_select_network(dev):
 | |
|     """Mesh network and SELECT_NETWORK"""
 | |
|     check_mesh_support(dev[0])
 | |
|     id0 = add_open_mesh_network(dev[0], start=False)
 | |
|     id1 = add_open_mesh_network(dev[1], start=False)
 | |
|     dev[0].select_network(id0)
 | |
|     dev[1].select_network(id1)
 | |
|     check_mesh_joined_connected(dev, connectivity=True)
 | |
| 
 | |
| def test_mesh_forwarding(dev):
 | |
|     """Mesh with two stations that can't reach each other directly"""
 | |
|     try:
 | |
|         set_group_map(dev[0], 1)
 | |
|         set_group_map(dev[1], 3)
 | |
|         set_group_map(dev[2], 2)
 | |
|         check_mesh_support(dev[0])
 | |
|         for i in range(3):
 | |
|             add_open_mesh_network(dev[i])
 | |
|             check_mesh_group_added(dev[i])
 | |
|         for i in range(3):
 | |
|             check_mesh_peer_connected(dev[i])
 | |
| 
 | |
|         hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
|         hwsim_utils.test_connectivity(dev[1], dev[2])
 | |
|         hwsim_utils.test_connectivity(dev[0], dev[2])
 | |
|     finally:
 | |
|         # reset groups
 | |
|         set_group_map(dev[0], 1)
 | |
|         set_group_map(dev[1], 1)
 | |
|         set_group_map(dev[2], 1)
 | |
| 
 | |
| def test_mesh_forwarding_secure(dev):
 | |
|     """Mesh with two stations that can't reach each other directly (RSN)"""
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     try:
 | |
|         set_group_map(dev[0], 1)
 | |
|         set_group_map(dev[1], 3)
 | |
|         set_group_map(dev[2], 2)
 | |
|         for i in range(3):
 | |
|             dev[i].request("SET sae_groups ")
 | |
|             id = add_mesh_secure_net(dev[i])
 | |
|             dev[i].mesh_group_add(id)
 | |
|             check_mesh_group_added(dev[i])
 | |
|         for i in range(3):
 | |
|             check_mesh_peer_connected(dev[i])
 | |
| 
 | |
|         hwsim_utils.test_connectivity(dev[0], dev[1])
 | |
|         hwsim_utils.test_connectivity(dev[1], dev[2])
 | |
|         hwsim_utils.test_connectivity(dev[0], dev[2])
 | |
|     finally:
 | |
|         # reset groups
 | |
|         set_group_map(dev[0], 1)
 | |
|         set_group_map(dev[1], 1)
 | |
|         set_group_map(dev[2], 1)
 | |
| 
 | |
| def test_mesh_sae_anti_clogging(dev, apdev):
 | |
|     """Mesh using SAE and anti-clogging"""
 | |
|     try:
 | |
|         run_mesh_sae_anti_clogging(dev, apdev)
 | |
|     finally:
 | |
|         stop_monitor(apdev[1]["ifname"])
 | |
| 
 | |
| def run_mesh_sae_anti_clogging(dev, apdev):
 | |
|     check_mesh_support(dev[0], secure=True)
 | |
|     check_mesh_support(dev[1], secure=True)
 | |
|     check_mesh_support(dev[2], secure=True)
 | |
| 
 | |
|     sock = start_monitor(apdev[1]["ifname"])
 | |
|     radiotap = radiotap_build()
 | |
| 
 | |
|     dev[0].request("SET sae_groups 21")
 | |
|     id = add_mesh_secure_net(dev[0])
 | |
|     dev[0].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[0])
 | |
| 
 | |
|     # This flood of SAE authentication frames is from not yet known mesh STAs,
 | |
|     # so the messages get dropped.
 | |
|     addr0 = binascii.unhexlify(dev[0].own_addr().replace(':', ''))
 | |
|     for i in range(16):
 | |
|         addr = binascii.unhexlify("f2%010x" % i)
 | |
|         frame = build_sae_commit(addr0, addr)
 | |
|         sock.send(radiotap + frame)
 | |
| 
 | |
|     dev[1].request("SET sae_groups 21")
 | |
|     id = add_mesh_secure_net(dev[1])
 | |
|     dev[1].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[1])
 | |
|     check_mesh_connected2(dev)
 | |
| 
 | |
|     # Inject Beacon frames to make the sources of the second flood known to the
 | |
|     # target.
 | |
|     bcn1 = binascii.unhexlify("80000000" + "ffffffffffff")
 | |
|     bcn2 = binascii.unhexlify("0000dd20c44015840500e80310000000010882848b968c1298240301010504000200003204b048606c30140100000fac040100000fac040100000fac0800002d1afe131bffff0000000000000000000001000000000000000000003d16010000000000ffff0000000000000000000000000000720d777061732d6d6573682d736563710701010001010009")
 | |
|     for i in range(16):
 | |
|         addr = binascii.unhexlify("f4%010x" % i)
 | |
|         frame = bcn1 + addr + addr + bcn2
 | |
|         sock.send(radiotap + frame)
 | |
| 
 | |
|     # This flood of SAE authentication frames is from known mesh STAs, so the
 | |
|     # target will need to process these.
 | |
|     for i in range(16):
 | |
|         addr = binascii.unhexlify("f4%010x" % i)
 | |
|         frame = build_sae_commit(addr0, addr)
 | |
|         sock.send(radiotap + frame)
 | |
| 
 | |
|     dev[2].request("SET sae_groups 21")
 | |
|     id = add_mesh_secure_net(dev[2])
 | |
|     dev[2].mesh_group_add(id)
 | |
|     check_mesh_group_added(dev[2])
 | |
|     check_mesh_peer_connected(dev[2])
 | |
|     check_mesh_peer_connected(dev[0])
 | |
| 
 | |
| def test_mesh_link_probe(dev, apdev, params):
 | |
|     """Mesh link probing"""
 | |
|     addr0 = dev[0].own_addr()
 | |
|     addr1 = dev[1].own_addr()
 | |
|     addr2 = dev[2].own_addr()
 | |
| 
 | |
|     check_mesh_support(dev[0])
 | |
|     for i in range(3):
 | |
|         add_open_mesh_network(dev[i])
 | |
|         check_mesh_group_added(dev[i])
 | |
|     for i in range(3):
 | |
|         check_mesh_peer_connected(dev[i])
 | |
| 
 | |
|     res = dev[0].request("MESH_LINK_PROBE " + addr1)
 | |
|     if "FAIL" in res:
 | |
|         raise HwsimSkip("MESH_LINK_PROBE kernel side support missing")
 | |
|     dev[0].request("MESH_LINK_PROBE " + addr2 + " payload=aabbccdd")
 | |
|     dev[1].request("MESH_LINK_PROBE " + addr0 + " payload=bbccddee")
 | |
|     dev[1].request("MESH_LINK_PROBE " + addr2 + " payload=ccddeeff")
 | |
|     dev[2].request("MESH_LINK_PROBE " + addr0 + " payload=aaaa")
 | |
|     dev[2].request("MESH_LINK_PROBE " + addr1 + " payload=000102030405060708090a0b0c0d0e0f")
 | |
| 
 | |
|     capfile = os.path.join(params['logdir'], "hwsim0.pcapng")
 | |
|     filt = "wlan.fc == 0x8803"
 | |
|     for i in range(10):
 | |
|         out = run_tshark(capfile, filt, ["wlan.sa", "wlan.da"])
 | |
|         if len(out.splitlines()) >= 6:
 | |
|             break
 | |
|         time.sleep(0.5)
 | |
|     for i in [addr0, addr1, addr2]:
 | |
|         for j in [addr0, addr1, addr2]:
 | |
|             if i == j:
 | |
|                 continue
 | |
|             if i + "\t" + j not in out:
 | |
|                 raise Exception("Did not see probe %s --> %s" % (i, j))
 | 
