957 lines
		
	
	
	
		
			42 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			957 lines
		
	
	
	
		
			42 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # hostapd control interface
 | |
| # Copyright (c) 2014, Qualcomm Atheros, Inc.
 | |
| #
 | |
| # This software may be distributed under the terms of the BSD license.
 | |
| # See README for more details.
 | |
| 
 | |
| import logging
 | |
| logger = logging.getLogger()
 | |
| from remotehost import remote_compatible
 | |
| import hostapd
 | |
| import hwsim_utils
 | |
| from utils import skip_with_fips, alloc_fail, fail_test, HwsimSkip
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_status(dev, apdev):
 | |
|     """hostapd ctrl_iface STATUS commands"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     bssid = apdev[0]['bssid']
 | |
|     params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     status = hapd.get_status()
 | |
|     logger.info("STATUS: " + str(status))
 | |
|     driver = hapd.get_driver_status()
 | |
|     logger.info("STATUS-DRIVER: " + str(driver))
 | |
| 
 | |
|     if status['bss[0]'] != apdev[0]['ifname']:
 | |
|         raise Exception("Unexpected bss[0]")
 | |
|     if status['ssid[0]'] != ssid:
 | |
|         raise Exception("Unexpected ssid[0]")
 | |
|     if status['bssid[0]'] != bssid:
 | |
|         raise Exception("Unexpected bssid[0]")
 | |
|     if status['freq'] != "2412":
 | |
|         raise Exception("Unexpected freq")
 | |
|     if status['beacon_int'] != "100":
 | |
|         raise Exception("Unexpected beacon_int")
 | |
|     if status['dtim_period'] != "2":
 | |
|         raise Exception("Unexpected dtim_period")
 | |
|     if "max_txpower" not in status:
 | |
|         raise Exception("Missing max_txpower")
 | |
|     if "ht_caps_info" not in status:
 | |
|         raise Exception("Missing ht_caps_info")
 | |
| 
 | |
|     if driver['beacon_set'] != "1":
 | |
|         raise Exception("Unexpected beacon_set")
 | |
|     if driver['addr'] != bssid:
 | |
|         raise Exception("Unexpected addr")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_p2p_manager(dev, apdev):
 | |
|     """hostapd as P2P Device manager"""
 | |
|     ssid = "hapd-p2p-mgr"
 | |
|     passphrase = "12345678"
 | |
|     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
 | |
|     params['manage_p2p'] = '1'
 | |
|     params['allow_cross_connection'] = '0'
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
 | |
|     addr = dev[0].own_addr()
 | |
|     if "OK" not in hapd.request("DEAUTHENTICATE " + addr + " p2p=2"):
 | |
|         raise Exception("DEAUTHENTICATE command failed")
 | |
|     dev[0].wait_disconnected(timeout=5)
 | |
|     dev[0].wait_connected(timeout=10, error="Re-connection timed out")
 | |
| 
 | |
|     if "OK" not in hapd.request("DISASSOCIATE " + addr + " p2p=2"):
 | |
|         raise Exception("DISASSOCIATE command failed")
 | |
|     dev[0].wait_disconnected(timeout=5)
 | |
|     dev[0].wait_connected(timeout=10, error="Re-connection timed out")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_sta(dev, apdev):
 | |
|     """hostapd and STA ctrl_iface commands"""
 | |
|     try:
 | |
|         run_hapd_ctrl_sta(dev, apdev)
 | |
|     finally:
 | |
|         dev[0].request("VENDOR_ELEM_REMOVE 13 *")
 | |
| 
 | |
| def run_hapd_ctrl_sta(dev, apdev):
 | |
|     ssid = "hapd-ctrl-sta"
 | |
|     passphrase = "12345678"
 | |
|     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].request("VENDOR_ELEM_ADD 13 2102ff02")
 | |
|     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
 | |
|     addr = dev[0].own_addr()
 | |
|     if "FAIL" in hapd.request("STA " + addr):
 | |
|         raise Exception("Unexpected STA failure")
 | |
|     if "FAIL" not in hapd.request("STA " + addr + " eapol"):
 | |
|         raise Exception("Unexpected STA-eapol success")
 | |
|     if "FAIL" not in hapd.request("STA " + addr + " foo"):
 | |
|         raise Exception("Unexpected STA-foo success")
 | |
|     if "FAIL" not in hapd.request("STA 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected STA success")
 | |
|     if "FAIL" not in hapd.request("STA 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected STA success")
 | |
| 
 | |
|     if len(hapd.request("STA-NEXT " + addr).splitlines()) > 0:
 | |
|         raise Exception("Unexpected STA-NEXT result")
 | |
|     if "FAIL" not in hapd.request("STA-NEXT 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected STA-NEXT success")
 | |
| 
 | |
|     sta = hapd.get_sta(addr)
 | |
|     logger.info("STA: " + str(sta))
 | |
|     if "ext_capab" not in sta:
 | |
|         raise Exception("Missing ext_capab in STA output")
 | |
|     if 'ht_caps_info' not in sta:
 | |
|         raise Exception("Missing ht_caps_info in STA output")
 | |
|     if 'min_txpower' not in sta:
 | |
|         raise Exception("Missing min_txpower in STA output")
 | |
|     if 'max_txpower' not in sta:
 | |
|         raise Exception("Missing min_txpower in STA output")
 | |
|     if sta['min_txpower'] != '-1':
 | |
|         raise Exception("Unxpected min_txpower value: " + sta['min_txpower'])
 | |
|     if sta['max_txpower'] != '2':
 | |
|         raise Exception("Unxpected max_txpower value: " + sta['max_txpower'])
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_disconnect(dev, apdev):
 | |
|     """hostapd and disconnection ctrl_iface commands"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     passphrase = "12345678"
 | |
|     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
 | |
|     addr = dev[0].p2p_dev_addr()
 | |
| 
 | |
|     if "FAIL" not in hapd.request("DEAUTHENTICATE 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected DEAUTHENTICATE success")
 | |
| 
 | |
|     if "OK" not in hapd.request("DEAUTHENTICATE ff:ff:ff:ff:ff:ff"):
 | |
|         raise Exception("Unexpected DEAUTHENTICATE failure")
 | |
|     dev[0].wait_disconnected(timeout=5)
 | |
|     dev[0].wait_connected(timeout=10, error="Re-connection timed out")
 | |
| 
 | |
|     if "FAIL" not in hapd.request("DISASSOCIATE 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected DISASSOCIATE success")
 | |
| 
 | |
|     if "OK" not in hapd.request("DISASSOCIATE ff:ff:ff:ff:ff:ff"):
 | |
|         raise Exception("Unexpected DISASSOCIATE failure")
 | |
|     dev[0].wait_disconnected(timeout=5)
 | |
|     dev[0].wait_connected(timeout=10, error="Re-connection timed out")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_chan_switch(dev, apdev):
 | |
|     """hostapd and CHAN_SWITCH ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("CHAN_SWITCH "):
 | |
|         raise Exception("Unexpected CHAN_SWITCH success")
 | |
|     if "FAIL" not in hapd.request("CHAN_SWITCH qwerty 2422"):
 | |
|         raise Exception("Unexpected CHAN_SWITCH success")
 | |
|     if "FAIL" not in hapd.request("CHAN_SWITCH 5 qwerty"):
 | |
|         raise Exception("Unexpected CHAN_SWITCH success")
 | |
|     if "FAIL" not in hapd.request("CHAN_SWITCH 0 2432 center_freq1=123 center_freq2=234 bandwidth=1000 sec_channel_offset=20 ht vht"):
 | |
|         raise Exception("Unexpected CHAN_SWITCH success")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_level(dev, apdev):
 | |
|     """hostapd and LEVEL ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("LEVEL 0"):
 | |
|         raise Exception("Unexpected LEVEL success on non-monitor interface")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_new_sta(dev, apdev):
 | |
|     """hostapd and NEW_STA ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("NEW_STA 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected NEW_STA success")
 | |
|     if "OK" not in hapd.request("NEW_STA 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected NEW_STA failure")
 | |
|     if "AUTHORIZED" not in hapd.request("STA 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected NEW_STA STA status")
 | |
|     if "OK" not in hapd.request("NEW_STA 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected NEW_STA failure")
 | |
|     with alloc_fail(hapd, 1, "ap_sta_add;hostapd_ctrl_iface_new_sta"):
 | |
|         if "FAIL" not in hapd.request("NEW_STA 00:11:22:33:44:66"):
 | |
|             raise Exception("Unexpected NEW_STA success during OOM")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_get(dev, apdev):
 | |
|     """hostapd and GET ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("GET foo"):
 | |
|         raise Exception("Unexpected GET success")
 | |
|     if "FAIL" in hapd.request("GET version"):
 | |
|         raise Exception("Unexpected GET version failure")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_unknown(dev, apdev):
 | |
|     """hostapd and unknown ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "UNKNOWN COMMAND" not in hapd.request("FOO"):
 | |
|         raise Exception("Unexpected response")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_hs20_wnm_notif(dev, apdev):
 | |
|     """hostapd and HS20_WNM_NOTIF ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("HS20_WNM_NOTIF 00:11:22:33:44 http://example.com/"):
 | |
|         raise Exception("Unexpected HS20_WNM_NOTIF success")
 | |
|     if "FAIL" not in hapd.request("HS20_WNM_NOTIF 00:11:22:33:44:55http://example.com/"):
 | |
|         raise Exception("Unexpected HS20_WNM_NOTIF success")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_hs20_deauth_req(dev, apdev):
 | |
|     """hostapd and HS20_DEAUTH_REQ ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("HS20_DEAUTH_REQ 00:11:22:33:44 1 120 http://example.com/"):
 | |
|         raise Exception("Unexpected HS20_DEAUTH_REQ success")
 | |
|     if "FAIL" not in hapd.request("HS20_DEAUTH_REQ 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected HS20_DEAUTH_REQ success")
 | |
|     if "FAIL" not in hapd.request("HS20_DEAUTH_REQ 00:11:22:33:44:55 1"):
 | |
|         raise Exception("Unexpected HS20_DEAUTH_REQ success")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_disassoc_imminent(dev, apdev):
 | |
|     """hostapd and DISASSOC_IMMINENT ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("DISASSOC_IMMINENT 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected DISASSOC_IMMINENT success")
 | |
|     if "FAIL" not in hapd.request("DISASSOC_IMMINENT 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected DISASSOC_IMMINENT success")
 | |
|     if "FAIL" not in hapd.request("DISASSOC_IMMINENT 00:11:22:33:44:55 2"):
 | |
|         raise Exception("Unexpected DISASSOC_IMMINENT success")
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     addr = dev[0].p2p_interface_addr()
 | |
|     if "OK" not in hapd.request("DISASSOC_IMMINENT " + addr + " 2"):
 | |
|         raise Exception("Unexpected DISASSOC_IMMINENT failure")
 | |
|     ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 15)
 | |
|     if ev is None:
 | |
|         raise Exception("Scan timed out")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_ess_disassoc(dev, apdev):
 | |
|     """hostapd and ESS_DISASSOC ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "FAIL" not in hapd.request("ESS_DISASSOC 00:11:22:33:44"):
 | |
|         raise Exception("Unexpected ESS_DISASSOCT success")
 | |
|     if "FAIL" not in hapd.request("ESS_DISASSOC 00:11:22:33:44:55"):
 | |
|         raise Exception("Unexpected ESS_DISASSOC success")
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     addr = dev[0].p2p_interface_addr()
 | |
|     if "FAIL" not in hapd.request("ESS_DISASSOC " + addr):
 | |
|         raise Exception("Unexpected ESS_DISASSOC success")
 | |
|     if "FAIL" not in hapd.request("ESS_DISASSOC " + addr + " -1"):
 | |
|         raise Exception("Unexpected ESS_DISASSOC success")
 | |
|     if "FAIL" not in hapd.request("ESS_DISASSOC " + addr + " 1"):
 | |
|         raise Exception("Unexpected ESS_DISASSOC success")
 | |
|     if "OK" not in hapd.request("ESS_DISASSOC " + addr + " 20 http://example.com/"):
 | |
|         raise Exception("Unexpected ESS_DISASSOC failure")
 | |
|     ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 15)
 | |
|     if ev is None:
 | |
|         raise Exception("Scan timed out")
 | |
| 
 | |
| def test_hapd_ctrl_set_deny_mac_file(dev, apdev):
 | |
|     """hostapd and SET deny_mac_file ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     if "OK" not in hapd.request("SET deny_mac_file hostapd.macaddr"):
 | |
|         raise Exception("Unexpected SET failure")
 | |
|     dev[0].wait_disconnected(timeout=15)
 | |
|     ev = dev[1].wait_event(["CTRL-EVENT-DISCONNECTED"], 1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected disconnection")
 | |
| 
 | |
| def test_hapd_ctrl_set_accept_mac_file(dev, apdev):
 | |
|     """hostapd and SET accept_mac_file ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     hapd.request("SET macaddr_acl 1")
 | |
|     if "OK" not in hapd.request("SET accept_mac_file hostapd.macaddr"):
 | |
|         raise Exception("Unexpected SET failure")
 | |
|     dev[1].wait_disconnected(timeout=15)
 | |
|     ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], 1)
 | |
|     if ev is not None:
 | |
|         raise Exception("Unexpected disconnection")
 | |
| 
 | |
| def test_hapd_ctrl_set_accept_mac_file_vlan(dev, apdev):
 | |
|     """hostapd and SET accept_mac_file ctrl_iface command (VLAN ID)"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
|     hapd.request("SET macaddr_acl 1")
 | |
|     if "OK" not in hapd.request("SET accept_mac_file hostapd.accept"):
 | |
|         raise Exception("Unexpected SET failure")
 | |
|     dev[1].wait_disconnected(timeout=15)
 | |
|     dev[0].wait_disconnected(timeout=15)
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_set_error_cases(dev, apdev):
 | |
|     """hostapd and SET error cases"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     errors = ["wpa_key_mgmt FOO",
 | |
|               "wpa_key_mgmt WPA-PSK   \t  FOO",
 | |
|               "wpa_key_mgmt    \t  ",
 | |
|               "wpa_pairwise FOO",
 | |
|               "wpa_pairwise   \t   ",
 | |
|               'wep_key0 "',
 | |
|               'wep_key0 "abcde',
 | |
|               "wep_key0 1",
 | |
|               "wep_key0 12q3456789",
 | |
|               "wep_key_len_broadcast 20",
 | |
|               "wep_rekey_period -1",
 | |
|               "wep_default_key 4",
 | |
|               "r0kh 02:00:00:00:03:0q nas1.w1.fi 100102030405060708090a0b0c0d0e0f100102030405060708090a0b0c0d0e0f",
 | |
|               "r0kh 02:00:00:00:03:00 12345678901234567890123456789012345678901234567890.nas1.w1.fi 100102030405060708090a0b0c0d0e0f100102030405060708090a0b0c0d0e0f",
 | |
|               "r0kh 02:00:00:00:03:00 nas1.w1.fi 100q02030405060708090a0b0c0d0e0f100q02030405060708090a0b0c0d0e0f",
 | |
|               "r1kh 02:00:00:00:04:q0 00:01:02:03:04:06 200102030405060708090a0b0c0d0e0f200102030405060708090a0b0c0d0e0f",
 | |
|               "r1kh 02:00:00:00:04:00 00:01:02:03:04:q6 200102030405060708090a0b0c0d0e0f200102030405060708090a0b0c0d0e0f",
 | |
|               "r1kh 02:00:00:00:04:00 00:01:02:03:04:06 2q0102030405060708090a0b0c0d0e0f2q0102030405060708090a0b0c0d0e0f",
 | |
|               "roaming_consortium 1",
 | |
|               "roaming_consortium 12",
 | |
|               "roaming_consortium 112233445566778899aabbccddeeff00",
 | |
|               'venue_name P"engExample venue"',
 | |
|               'venue_name P"engExample venue',
 | |
|               "venue_name engExample venue",
 | |
|               "venue_name e:Example venue",
 | |
|               "venue_name eng1:Example venue",
 | |
|               "venue_name eng:Example venue 1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890",
 | |
|               "anqp_3gpp_cell_net abc",
 | |
|               "anqp_3gpp_cell_net ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;",
 | |
|               "anqp_3gpp_cell_net 244",
 | |
|               "anqp_3gpp_cell_net 24,123",
 | |
|               "anqp_3gpp_cell_net 244,1",
 | |
|               "anqp_3gpp_cell_net 244,1234",
 | |
|               "nai_realm 0",
 | |
|               "nai_realm 0,1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.nas1.w1.fi",
 | |
|               "nai_realm 0,example.org,1,2,3,4,5,6,7,8",
 | |
|               "nai_realm 0,example.org,1[1:1][2:2][3:3][4:4][5:5]",
 | |
|               "nai_realm 0,example.org,1[1]",
 | |
|               "nai_realm 0,example.org,1[1:1",
 | |
|               "nai_realm 0,a.example.org;b.example.org;c.example.org;d.example.org;e.example.org;f.example.org;g.example.org;h.example.org;i.example.org;j.example.org;k.example.org",
 | |
|               "qos_map_set 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60",
 | |
|               "qos_map_set 53,2,22,6,8,15,0,7,255,255,16,31,32,39,255,255,40,47,255,300",
 | |
|               "qos_map_set 53,2,22,6,8,15,0,7,255,255,16,31,32,39,255,255,40,47,255,-1",
 | |
|               "qos_map_set 53,2,22,6,8,15,0,7,255,255,16,31,32,39,255,255,40,47,255,255,1",
 | |
|               "qos_map_set 1",
 | |
|               "qos_map_set 1,2",
 | |
|               "hs20_conn_capab 1",
 | |
|               "hs20_conn_capab 6:22",
 | |
|               "hs20_wan_metrics 0q:8000:1000:80:240:3000",
 | |
|               "hs20_wan_metrics 01",
 | |
|               "hs20_wan_metrics 01:8000",
 | |
|               "hs20_wan_metrics 01:8000:1000",
 | |
|               "hs20_wan_metrics 01:8000:1000:80",
 | |
|               "hs20_wan_metrics 01:8000:1000:80:240",
 | |
|               "hs20_oper_friendly_name eng1:Example",
 | |
|               "hs20_icon 32",
 | |
|               "hs20_icon 32:32",
 | |
|               "hs20_icon 32:32:eng",
 | |
|               "hs20_icon 32:32:eng:image/png",
 | |
|               "hs20_icon 32:32:eng:image/png:icon32",
 | |
|               "hs20_icon 32:32:eng:image/png:123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890:/tmp/icon32.png",
 | |
|               "hs20_icon 32:32:eng:image/png:name:/tmp/123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.png",
 | |
|               "osu_ssid ",
 | |
|               "osu_ssid P",
 | |
|               'osu_ssid P"abc',
 | |
|               'osu_ssid "1234567890123456789012345678901234567890"',
 | |
|               "osu_friendly_name eng:Example",
 | |
|               "osu_nai anonymous@example.com",
 | |
|               "osu_nai2 anonymous@example.com",
 | |
|               "osu_method_list 1 0",
 | |
|               "osu_icon foo",
 | |
|               "osu_service_desc eng:Example services",
 | |
|               "ssid 1234567890123456789012345678901234567890",
 | |
|               "pac_opaque_encr_key 123456",
 | |
|               "eap_fast_a_id 12345",
 | |
|               "eap_fast_a_id 12345q",
 | |
|               "own_ip_addr foo",
 | |
|               "auth_server_addr foo2",
 | |
|               "auth_server_shared_secret ",
 | |
|               "acct_server_addr foo3",
 | |
|               "acct_server_shared_secret ",
 | |
|               "radius_auth_req_attr 123::",
 | |
|               "radius_acct_req_attr 123::",
 | |
|               "radius_das_client 192.168.1.123",
 | |
|               "radius_das_client 192.168.1.1a foo",
 | |
|               "auth_algs 0",
 | |
|               "max_num_sta -1",
 | |
|               "max_num_sta 1000000",
 | |
|               "wpa_passphrase 1234567",
 | |
|               "wpa_passphrase 1234567890123456789012345678901234567890123456789012345678901234",
 | |
|               "wpa_psk 1234567890123456789012345678901234567890123456789012345678901234a",
 | |
|               "wpa_psk 12345678901234567890123456789012345678901234567890123456789012",
 | |
|               "wpa_psk_radius 123",
 | |
|               "wpa_pairwise NONE",
 | |
|               "wpa_pairwise WEP40",
 | |
|               "wpa_pairwise WEP104",
 | |
|               "rsn_pairwise NONE",
 | |
|               "rsn_pairwise WEP40",
 | |
|               "rsn_pairwise WEP104",
 | |
|               "mobility_domain 01",
 | |
|               "r1_key_holder 0011223344",
 | |
|               "ctrl_interface_group nosuchgrouphere",
 | |
|               "hw_mode foo",
 | |
|               "wps_rf_bands foo",
 | |
|               "beacon_int 0",
 | |
|               "beacon_int 65536",
 | |
|               "acs_num_scans 0",
 | |
|               "acs_num_scans 101",
 | |
|               "rts_threshold -2",
 | |
|               "rts_threshold 65536",
 | |
|               "fragm_threshold -2",
 | |
|               "fragm_threshold 2347",
 | |
|               "send_probe_response -1",
 | |
|               "send_probe_response 2",
 | |
|               "vlan_naming -1",
 | |
|               "vlan_naming 10000000",
 | |
|               "group_mgmt_cipher FOO",
 | |
|               "assoc_sa_query_max_timeout 0",
 | |
|               "assoc_sa_query_retry_timeout 0",
 | |
|               "wps_state -1",
 | |
|               "wps_state 3",
 | |
|               "uuid FOO",
 | |
|               "device_name 1234567890123456789012345678901234567890",
 | |
|               "manufacturer 1234567890123456789012345678901234567890123456789012345678901234567890",
 | |
|               "model_name 1234567890123456789012345678901234567890",
 | |
|               "model_number 1234567890123456789012345678901234567890",
 | |
|               "serial_number 1234567890123456789012345678901234567890",
 | |
|               "device_type FOO",
 | |
|               "os_version 1",
 | |
|               "ap_settings /tmp/does/not/exist/ap-settings.foo",
 | |
|               "wps_nfc_dev_pw_id 4",
 | |
|               "wps_nfc_dev_pw_id 100000",
 | |
|               "time_zone A",
 | |
|               "access_network_type -1",
 | |
|               "access_network_type 16",
 | |
|               "hessid 00:11:22:33:44",
 | |
|               "network_auth_type 0q",
 | |
|               "ipaddr_type_availability 1q",
 | |
|               "hs20_operating_class 0",
 | |
|               "hs20_operating_class 0q",
 | |
|               "bss_load_test ",
 | |
|               "bss_load_test 12",
 | |
|               "bss_load_test 12:80",
 | |
|               "vendor_elements 0",
 | |
|               "vendor_elements 0q",
 | |
|               "assocresp_elements 0",
 | |
|               "assocresp_elements 0q",
 | |
|               "local_pwr_constraint -1",
 | |
|               "local_pwr_constraint 256",
 | |
|               "wmm_ac_bk_cwmin -1",
 | |
|               "wmm_ac_be_cwmin 16",
 | |
|               "wmm_ac_vi_cwmax -1",
 | |
|               "wmm_ac_vo_cwmax 16",
 | |
|               "wmm_ac_foo_cwmax 6",
 | |
|               "wmm_ac_bk_aifs 0",
 | |
|               "wmm_ac_bk_aifs 256",
 | |
|               "wmm_ac_bk_txop_limit -1",
 | |
|               "wmm_ac_bk_txop_limit 65536",
 | |
|               "wmm_ac_bk_acm -1",
 | |
|               "wmm_ac_bk_acm 2",
 | |
|               "wmm_ac_bk_foo 2",
 | |
|               "tx_queue_foo_aifs 3",
 | |
|               "tx_queue_data3_cwmin 4",
 | |
|               "tx_queue_data3_cwmax 4",
 | |
|               "tx_queue_data3_aifs -4",
 | |
|               "tx_queue_data3_foo 1"]
 | |
|     for e in errors:
 | |
|         if "FAIL" not in hapd.request("SET " + e):
 | |
|             raise Exception("Unexpected SET success: '%s'" % e)
 | |
| 
 | |
|     if "OK" not in hapd.request("SET osu_server_uri https://example.com/"):
 | |
|         raise Exception("Unexpected SET osu_server_uri failure")
 | |
|     if "OK" not in hapd.request("SET osu_friendly_name eng:Example"):
 | |
|         raise Exception("Unexpected SET osu_friendly_name failure")
 | |
| 
 | |
|     errors = ["osu_friendly_name eng1:Example",
 | |
|               "osu_service_desc eng1:Example services"]
 | |
|     for e in errors:
 | |
|         if "FAIL" not in hapd.request("SET " + e):
 | |
|             raise Exception("Unexpected SET success: '%s'" % e)
 | |
| 
 | |
|     no_err = ["wps_nfc_dh_pubkey 0",
 | |
|               "wps_nfc_dh_privkey 0q",
 | |
|               "wps_nfc_dev_pw 012",
 | |
|               "manage_p2p 0",
 | |
|               "disassoc_low_ack 0",
 | |
|               "network_auth_type 01",
 | |
|               "tdls_prohibit 0",
 | |
|               "tdls_prohibit_chan_switch 0"]
 | |
|     for e in no_err:
 | |
|         if "OK" not in hapd.request("SET " + e):
 | |
|             raise Exception("Unexpected SET failure: '%s'" % e)
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_global(dev, apdev):
 | |
|     """hostapd and GET ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     ifname = apdev[0]['ifname']
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     hapd_global = hostapd.HostapdGlobal(apdev[0])
 | |
|     res = hapd_global.request("IFNAME=" + ifname + " PING")
 | |
|     if "PONG" not in res:
 | |
|             raise Exception("Could not ping hostapd interface " + ifname + " via global control interface")
 | |
|     res = hapd_global.request("IFNAME=" + ifname + " GET version")
 | |
|     if "FAIL" in res:
 | |
|            raise Exception("Could not get hostapd version for " + ifname + " via global control interface")
 | |
|     res = hapd_global.request("IFNAME=no-such-ifname GET version")
 | |
|     if "FAIL-NO-IFNAME-MATCH" not in res:
 | |
|            raise Exception("Invalid ifname not reported")
 | |
|     res = hapd_global.request("INTERFACES")
 | |
|     if "FAIL" in res:
 | |
|         raise Exception("INTERFACES command failed")
 | |
|     if apdev[0]['ifname'] not in res.splitlines():
 | |
|         raise Exception("AP interface missing from INTERFACES")
 | |
|     res = hapd_global.request("INTERFACES ctrl")
 | |
|     if "FAIL" in res:
 | |
|         raise Exception("INTERFACES ctrl command failed")
 | |
|     if apdev[0]['ifname'] + " ctrl_iface=" not in res:
 | |
|         raise Exception("AP interface missing from INTERFACES ctrl")
 | |
| 
 | |
|     if "FAIL" not in hapd_global.request("DETACH"):
 | |
|         raise Exception("DETACH succeeded unexpectedly")
 | |
| 
 | |
| def dup_network(hapd_global, src, dst, param):
 | |
|     res = hapd_global.request("DUP_NETWORK %s %s %s" % (src, dst, param))
 | |
|     if "OK" not in res:
 | |
|         raise Exception("Could not dup %s param from %s to %s" % (param, src,
 | |
|                                                                   dst))
 | |
| 
 | |
| def test_hapd_dup_network_global_wpa2(dev, apdev):
 | |
|     """hostapd and DUP_NETWORK command (WPA2)"""
 | |
|     passphrase = "12345678"
 | |
|     src_ssid = "hapd-ctrl-src"
 | |
|     dst_ssid = "hapd-ctrl-dst"
 | |
| 
 | |
|     src_params = hostapd.wpa2_params(ssid=src_ssid, passphrase=passphrase)
 | |
|     src_ifname = apdev[0]['ifname']
 | |
|     src_hapd = hostapd.add_ap(apdev[0], src_params)
 | |
| 
 | |
|     dst_params = {"ssid": dst_ssid}
 | |
|     dst_ifname = apdev[1]['ifname']
 | |
|     dst_hapd = hostapd.add_ap(apdev[1], dst_params, no_enable=True)
 | |
| 
 | |
|     hapd_global = hostapd.HostapdGlobal()
 | |
| 
 | |
|     for param in ["wpa", "wpa_passphrase", "wpa_key_mgmt", "rsn_pairwise"]:
 | |
|         dup_network(hapd_global, src_ifname, dst_ifname, param)
 | |
| 
 | |
|     dst_hapd.enable()
 | |
| 
 | |
|     dev[0].connect(dst_ssid, psk=passphrase, proto="RSN", pairwise="CCMP",
 | |
|                    scan_freq="2412")
 | |
|     addr = dev[0].own_addr()
 | |
|     if "FAIL" in dst_hapd.request("STA " + addr):
 | |
|             raise Exception("Could not connect using duplicated wpa params")
 | |
| 
 | |
|     tests = ["a",
 | |
|              "no-such-ifname no-such-ifname",
 | |
|              src_ifname + " no-such-ifname",
 | |
|              src_ifname + " no-such-ifname no-such-param",
 | |
|              src_ifname + " " + dst_ifname + " no-such-param"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd_global.request("DUP_NETWORK " + t):
 | |
|             raise Exception("Invalid DUP_NETWORK accepted: " + t)
 | |
|     with alloc_fail(src_hapd, 1, "hostapd_ctrl_iface_dup_param"):
 | |
|         if "FAIL" not in hapd_global.request("DUP_NETWORK %s %s wpa" % (src_ifname, dst_ifname)):
 | |
|             raise Exception("DUP_NETWORK accepted during OOM")
 | |
| 
 | |
| def test_hapd_dup_network_global_wpa(dev, apdev):
 | |
|     """hostapd and DUP_NETWORK command (WPA)"""
 | |
|     skip_with_fips(dev[0])
 | |
|     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
 | |
|     src_ssid = "hapd-ctrl-src"
 | |
|     dst_ssid = "hapd-ctrl-dst"
 | |
| 
 | |
|     src_params = hostapd.wpa_params(ssid=src_ssid)
 | |
|     src_params['wpa_psk'] = psk
 | |
|     src_ifname = apdev[0]['ifname']
 | |
|     src_hapd = hostapd.add_ap(apdev[0], src_params)
 | |
| 
 | |
|     dst_params = {"ssid": dst_ssid}
 | |
|     dst_ifname = apdev[1]['ifname']
 | |
|     dst_hapd = hostapd.add_ap(apdev[1], dst_params, no_enable=True)
 | |
| 
 | |
|     hapd_global = hostapd.HostapdGlobal()
 | |
| 
 | |
|     for param in ["wpa", "wpa_psk", "wpa_key_mgmt", "wpa_pairwise"]:
 | |
|         dup_network(hapd_global, src_ifname, dst_ifname, param)
 | |
| 
 | |
|     dst_hapd.enable()
 | |
| 
 | |
|     dev[0].connect(dst_ssid, raw_psk=psk, proto="WPA", pairwise="TKIP",
 | |
|                    scan_freq="2412")
 | |
|     addr = dev[0].own_addr()
 | |
|     if "FAIL" in dst_hapd.request("STA " + addr):
 | |
|             raise Exception("Could not connect using duplicated wpa params")
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_log_level(dev, apdev):
 | |
|     """hostapd ctrl_iface LOG_LEVEL"""
 | |
|     hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
 | |
|     level = hapd.request("LOG_LEVEL")
 | |
|     if "Current level: MSGDUMP" not in level:
 | |
|         raise Exception("Unexpected debug level(1): " + level)
 | |
|     if "Timestamp: 1" not in level:
 | |
|         raise Exception("Unexpected timestamp(1): " + level)
 | |
| 
 | |
|     if "OK" not in hapd.request("LOG_LEVEL  MSGDUMP  0"):
 | |
|         raise Exception("LOG_LEVEL failed")
 | |
|     level = hapd.request("LOG_LEVEL")
 | |
|     if "Current level: MSGDUMP" not in level:
 | |
|         raise Exception("Unexpected debug level(2): " + level)
 | |
|     if "Timestamp: 0" not in level:
 | |
|         raise Exception("Unexpected timestamp(2): " + level)
 | |
| 
 | |
|     if "OK" not in hapd.request("LOG_LEVEL  MSGDUMP  1"):
 | |
|         raise Exception("LOG_LEVEL failed")
 | |
|     level = hapd.request("LOG_LEVEL")
 | |
|     if "Current level: MSGDUMP" not in level:
 | |
|         raise Exception("Unexpected debug level(3): " + level)
 | |
|     if "Timestamp: 1" not in level:
 | |
|         raise Exception("Unexpected timestamp(3): " + level)
 | |
| 
 | |
|     if "FAIL" not in hapd.request("LOG_LEVEL FOO"):
 | |
|         raise Exception("Invalid LOG_LEVEL accepted")
 | |
| 
 | |
|     for lev in ["EXCESSIVE", "MSGDUMP", "DEBUG", "INFO", "WARNING", "ERROR"]:
 | |
|         if "OK" not in hapd.request("LOG_LEVEL " + lev):
 | |
|             raise Exception("LOG_LEVEL failed for " + lev)
 | |
|         level = hapd.request("LOG_LEVEL")
 | |
|         if "Current level: " + lev not in level:
 | |
|             raise Exception("Unexpected debug level: " + level)
 | |
| 
 | |
|     if "OK" not in hapd.request("LOG_LEVEL  MSGDUMP  1"):
 | |
|         raise Exception("LOG_LEVEL failed")
 | |
|     level = hapd.request("LOG_LEVEL")
 | |
|     if "Current level: MSGDUMP" not in level:
 | |
|         raise Exception("Unexpected debug level(3): " + level)
 | |
|     if "Timestamp: 1" not in level:
 | |
|         raise Exception("Unexpected timestamp(3): " + level)
 | |
| 
 | |
| @remote_compatible
 | |
| def test_hapd_ctrl_disconnect_no_tx(dev, apdev):
 | |
|     """hostapd disconnecting STA without transmitting Deauth/Disassoc"""
 | |
|     ssid = "hapd-test"
 | |
|     passphrase = "12345678"
 | |
|     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     bssid = apdev[0]['bssid']
 | |
|     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
 | |
|     addr0 = dev[0].own_addr()
 | |
|     dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
 | |
|     addr1 = dev[1].own_addr()
 | |
| 
 | |
|     # Disconnect the STA without sending out Deauthentication frame
 | |
|     if "OK" not in hapd.request("DEAUTHENTICATE " + addr0 + " tx=0"):
 | |
|         raise Exception("DEAUTHENTICATE command failed")
 | |
|     # Force disconnection due to AP receiving a frame from not-asssociated STA
 | |
|     dev[0].request("DATA_TEST_CONFIG 1")
 | |
|     dev[0].request("DATA_TEST_TX " + bssid + " " + addr0)
 | |
|     ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
 | |
|     dev[0].request("DATA_TEST_CONFIG 0")
 | |
|     if ev is None:
 | |
|         raise Exception("Disconnection event not seen after TX attempt")
 | |
|     if "reason=7" not in ev:
 | |
|         raise Exception("Unexpected disconnection reason: " + ev)
 | |
| 
 | |
|     # Disconnect the STA without sending out Disassociation frame
 | |
|     if "OK" not in hapd.request("DISASSOCIATE " + addr1 + " tx=0"):
 | |
|         raise Exception("DISASSOCIATE command failed")
 | |
|     # Force disconnection due to AP receiving a frame from not-asssociated STA
 | |
|     dev[1].request("DATA_TEST_CONFIG 1")
 | |
|     dev[1].request("DATA_TEST_TX " + bssid + " " + addr1)
 | |
|     ev = dev[1].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
 | |
|     dev[1].request("DATA_TEST_CONFIG 0")
 | |
|     if ev is None:
 | |
|         raise Exception("Disconnection event not seen after TX attempt")
 | |
|     if "reason=7" not in ev:
 | |
|         raise Exception("Unexpected disconnection reason: " + ev)
 | |
| 
 | |
| def test_hapd_ctrl_mib(dev, apdev):
 | |
|     """hostapd and MIB ctrl_iface command with open network"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
| 
 | |
|     mib = hapd.request("MIB")
 | |
|     if len(mib) != 0:
 | |
|         raise Exception("Unexpected MIB response: " + mib)
 | |
| 
 | |
|     mib = hapd.request("MIB radius_server")
 | |
|     if len(mib) != 0:
 | |
|         raise Exception("Unexpected 'MIB radius_server' response: " + mib)
 | |
| 
 | |
|     if "FAIL" not in hapd.request("MIB foo"):
 | |
|         raise Exception("'MIB foo' succeeded")
 | |
| 
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
| 
 | |
|     mib = hapd.request("MIB")
 | |
|     if "FAIL" in mib:
 | |
|         raise Exception("Unexpected MIB response: " + mib)
 | |
| 
 | |
|     mib = hapd.request("MIB radius_server")
 | |
|     if len(mib) != 0:
 | |
|         raise Exception("Unexpected 'MIB radius_server' response: " + mib)
 | |
| 
 | |
|     if "FAIL" not in hapd.request("MIB foo"):
 | |
|         raise Exception("'MIB foo' succeeded")
 | |
| 
 | |
| def test_hapd_ctrl_not_yet_fully_enabled(dev, apdev):
 | |
|     """hostapd and ctrl_iface commands when BSS not yet fully enabled"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
 | |
| 
 | |
|     if not hapd.ping():
 | |
|         raise Exception("PING failed")
 | |
|     if "FAIL" in hapd.request("MIB"):
 | |
|         raise Exception("MIB failed")
 | |
|     if len(hapd.request("MIB radius_server")) != 0:
 | |
|         raise Exception("Unexpected 'MIB radius_server' response")
 | |
|     if "state=UNINITIALIZED" not in hapd.request("STATUS"):
 | |
|         raise Exception("Unexpected STATUS response")
 | |
|     if "FAIL" not in hapd.request("STATUS-DRIVER"):
 | |
|         raise Exception("Unexpected response to STATUS-DRIVER")
 | |
|     if len(hapd.request("STA-FIRST")) != 0:
 | |
|         raise Exception("Unexpected response to STA-FIRST")
 | |
|     if "FAIL" not in hapd.request("STA ff:ff:ff:ff:ff:ff"):
 | |
|         raise Exception("Unexpected response to STA")
 | |
|     cmds = ["NEW_STA 02:ff:ff:ff:ff:ff",
 | |
|             "DEAUTHENTICATE 02:ff:ff:ff:ff:ff",
 | |
|             "DEAUTHENTICATE 02:ff:ff:ff:ff:ff test=0",
 | |
|             "DEAUTHENTICATE 02:ff:ff:ff:ff:ff p2p=0",
 | |
|             "DEAUTHENTICATE 02:ff:ff:ff:ff:ff tx=0",
 | |
|             "DISASSOCIATE 02:ff:ff:ff:ff:ff",
 | |
|             "DISASSOCIATE 02:ff:ff:ff:ff:ff test=0",
 | |
|             "DISASSOCIATE 02:ff:ff:ff:ff:ff p2p=0",
 | |
|             "DISASSOCIATE 02:ff:ff:ff:ff:ff tx=0",
 | |
|             "SA_QUERY 02:ff:ff:ff:ff:ff",
 | |
|             "WPS_PIN any 12345670",
 | |
|             "WPS_PBC",
 | |
|             "WPS_CANCEL",
 | |
|             "WPS_AP_PIN random",
 | |
|             "WPS_AP_PIN disable",
 | |
|             "WPS_CHECK_PIN 123456789",
 | |
|             "WPS_GET_STATUS",
 | |
|             "WPS_NFC_TAG_READ 00",
 | |
|             "WPS_NFC_CONFIG_TOKEN NDEF",
 | |
|             "WPS_NFC_TOKEN WPS",
 | |
|             "NFC_GET_HANDOVER_SEL NDEF WPS-CR",
 | |
|             "NFC_REPORT_HANDOVER RESP WPS 00 00",
 | |
|             "SET_QOS_MAP_SET 22,6,8,15,0,7,255,255,16,31,32,39,255,255,40,47,48,55",
 | |
|             "SEND_QOS_MAP_CONF 02:ff:ff:ff:ff:ff",
 | |
|             "HS20_WNM_NOTIF 02:ff:ff:ff:ff:ff https://example.com/",
 | |
|             "HS20_DEAUTH_REQ 02:ff:ff:ff:ff:ff 1 120 https://example.com/",
 | |
|             "DISASSOC_IMMINENT 02:ff:ff:ff:ff:ff 10",
 | |
|             "ESS_DISASSOC 02:ff:ff:ff:ff:ff 10 https://example.com/",
 | |
|             "BSS_TM_REQ 02:ff:ff:ff:ff:ff",
 | |
|             "GET_CONFIG",
 | |
|             "RADAR DETECTED freq=5260 ht_enabled=1 chan_width=1",
 | |
|             "CHAN_SWITCH 5 5200 ht sec_channel_offset=-1 bandwidth=40",
 | |
|             "TRACK_STA_LIST",
 | |
|             "PMKSA",
 | |
|             "PMKSA_FLUSH",
 | |
|             "SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\"",
 | |
|             "REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\"",
 | |
|             "REQ_LCI 00:11:22:33:44:55",
 | |
|             "REQ_RANGE 00:11:22:33:44:55",
 | |
|             "DRIVER_FLAGS",
 | |
|             "STOP_AP"]
 | |
|     for cmd in cmds:
 | |
|         hapd.request(cmd)
 | |
| 
 | |
| def test_hapd_ctrl_set(dev, apdev):
 | |
|     """hostapd and SET ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     tests = ["foo",
 | |
|              "wps_version_number 300",
 | |
|              "gas_frag_limit 0",
 | |
|              "mbo_assoc_disallow 0"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request("SET " + t):
 | |
|             raise Exception("Invalid SET command accepted: " + t)
 | |
| 
 | |
| def test_hapd_ctrl_radar(dev, apdev):
 | |
|     """hostapd and RADAR ctrl_iface command"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
| 
 | |
|     tests = ["foo", "foo bar"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request("RADAR " + t):
 | |
|             raise Exception("Invalid RADAR command accepted: " + t)
 | |
| 
 | |
|     tests = ["DETECTED freq=2412 chan_offset=12 cf1=1234 cf2=2345",
 | |
|              "CAC-FINISHED freq=2412",
 | |
|              "CAC-ABORTED freq=2412",
 | |
|              "NOP-FINISHED freq=2412"]
 | |
|     for t in tests:
 | |
|         hapd.request("RADAR " + t)
 | |
| 
 | |
| def test_hapd_ctrl_ext_io_errors(dev, apdev):
 | |
|     """hostapd and external I/O errors"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     tests = ["MGMT_TX 1",
 | |
|              "MGMT_TX 1q",
 | |
|              "MGMT_RX_PROCESS freq=2412",
 | |
|              "EAPOL_RX foo",
 | |
|              "EAPOL_RX 00:11:22:33:44:55 1",
 | |
|              "EAPOL_RX 00:11:22:33:44:55 1q"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request(t):
 | |
|             raise Exception("Invalid command accepted: " + t)
 | |
|     with alloc_fail(hapd, 1, "=hostapd_ctrl_iface_mgmt_tx"):
 | |
|         if "FAIL" not in hapd.request("MGMT_TX 12"):
 | |
|             raise Exception("MGMT_TX accepted during OOM")
 | |
|     with alloc_fail(hapd, 1, "=hostapd_ctrl_iface_eapol_rx"):
 | |
|         if "FAIL" not in hapd.request("EAPOL_RX 00:11:22:33:44:55 11"):
 | |
|             raise Exception("EAPOL_RX accepted during OOM")
 | |
| 
 | |
|     hapd.set("ext_mgmt_frame_handling", "1")
 | |
|     tests = ["MGMT_RX_PROCESS freq=2412",
 | |
|              "MGMT_RX_PROCESS freq=2412 ssi_signal=0",
 | |
|              "MGMT_RX_PROCESS freq=2412 frame=1",
 | |
|              "MGMT_RX_PROCESS freq=2412 frame=1q"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request(t):
 | |
|             raise Exception("Invalid command accepted: " + t)
 | |
|     with alloc_fail(hapd, 1, "=hostapd_ctrl_iface_mgmt_rx_process"):
 | |
|         if "FAIL" not in hapd.request("MGMT_RX_PROCESS freq=2412 frame=11"):
 | |
|             raise Exception("MGMT_RX_PROCESS accepted during OOM")
 | |
|     hapd.set("ext_mgmt_frame_handling", "0")
 | |
| 
 | |
|     if "OK" not in hapd.request("DATA_TEST_CONFIG 1"):
 | |
|         raise Exception("Failed to enable l2_test")
 | |
|     if "OK" not in hapd.request("DATA_TEST_CONFIG 1"):
 | |
|         raise Exception("Failed to enable l2_test(2)")
 | |
|     tests = ["DATA_TEST_TX foo",
 | |
|              "DATA_TEST_TX 00:11:22:33:44:55 foo",
 | |
|              "DATA_TEST_TX 00:11:22:33:44:55 00:11:22:33:44:55 -1",
 | |
|              "DATA_TEST_TX 00:11:22:33:44:55 00:11:22:33:44:55 256"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request(t):
 | |
|             raise Exception("Invalid command accepted: " + t)
 | |
|     if "OK" not in hapd.request("DATA_TEST_CONFIG 0"):
 | |
|         raise Exception("Failed to disable l2_test")
 | |
|     tests = ["DATA_TEST_TX 00:11:22:33:44:55 00:11:22:33:44:55 0",
 | |
|              "DATA_TEST_FRAME ifname=foo",
 | |
|              "DATA_TEST_FRAME 1",
 | |
|              "DATA_TEST_FRAME 11",
 | |
|              "DATA_TEST_FRAME 112233445566778899aabbccddeefq"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request(t):
 | |
|             raise Exception("Invalid command accepted: " + t)
 | |
|     with alloc_fail(hapd, 1, "=hostapd_ctrl_iface_data_test_frame"):
 | |
|         if "FAIL" not in hapd.request("DATA_TEST_FRAME 112233445566778899aabbccddeeff"):
 | |
|             raise Exception("DATA_TEST_FRAME accepted during OOM")
 | |
| 
 | |
| def test_hapd_ctrl_vendor_errors(dev, apdev):
 | |
|     """hostapd and VENDOR errors"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     tests = ["q",
 | |
|              "10q",
 | |
|              "10 10q",
 | |
|              "10 10 123q",
 | |
|              "10 10"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request("VENDOR " + t):
 | |
|             raise Exception("Invalid VENDOR command accepted: " + t)
 | |
|     with alloc_fail(hapd, 1, "=hostapd_ctrl_iface_vendor"):
 | |
|         if "FAIL" not in hapd.request("VENDOR 10 10 10"):
 | |
|             raise Exception("VENDOR accepted during OOM")
 | |
|     with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_ctrl_iface_vendor"):
 | |
|         if "FAIL" not in hapd.request("VENDOR 10 10"):
 | |
|             raise Exception("VENDOR accepted during OOM")
 | |
| 
 | |
| def test_hapd_ctrl_eapol_reauth_errors(dev, apdev):
 | |
|     """hostapd and EAPOL_REAUTH errors"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     tests = ["foo",
 | |
|              "11:22:33:44:55:66"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request("EAPOL_REAUTH " + t):
 | |
|             raise Exception("Invalid EAPOL_REAUTH command accepted: " + t)
 | |
| 
 | |
| def test_hapd_ctrl_eapol_relog(dev, apdev):
 | |
|     """hostapd and RELOG"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "OK" not in hapd.request("RELOG"):
 | |
|         raise Exception("RELOG failed")
 | |
| 
 | |
| def test_hapd_ctrl_poll_sta_errors(dev, apdev):
 | |
|     """hostapd and POLL_STA errors"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     tests = ["foo",
 | |
|              "11:22:33:44:55:66"]
 | |
|     for t in tests:
 | |
|         if "FAIL" not in hapd.request("POLL_STA " + t):
 | |
|             raise Exception("Invalid POLL_STA command accepted: " + t)
 | |
| 
 | |
| def test_hapd_ctrl_update_beacon(dev, apdev):
 | |
|     """hostapd and UPDATE_BEACON"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "OK" not in hapd.request("UPDATE_BEACON"):
 | |
|         raise Exception("UPDATE_BEACON failed")
 | |
|     with fail_test(hapd, 1, "ieee802_11_set_beacon"):
 | |
|         if "FAIL" not in hapd.request("UPDATE_BEACON"):
 | |
|             raise Exception("UPDATE_BEACON succeeded unexpectedly")
 | |
|     dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
 | |
| 
 | |
| def test_hapd_ctrl_test_fail(dev, apdev):
 | |
|     """hostapd and TEST_ALLOC_FAIL/TEST_FAIL"""
 | |
|     ssid = "hapd-ctrl"
 | |
|     params = {"ssid": ssid}
 | |
|     hapd = hostapd.add_ap(apdev[0], params)
 | |
|     if "OK" not in hapd.request("TEST_ALLOC_FAIL 1:unknownfunc"):
 | |
|             raise HwsimSkip("TEST_ALLOC_FAIL not supported")
 | |
|     if "OK" not in hapd.request("TEST_ALLOC_FAIL "):
 | |
|         raise Exception("TEST_ALLOC_FAIL clearing failed")
 | |
|     if "OK" not in hapd.request("TEST_FAIL "):
 | |
|         raise Exception("TEST_FAIL clearing failed")
 | 
