12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 |
- # Test various AP mode parameters
- # Copyright (c) 2014, Qualcomm Atheros, Inc.
- #
- # This software may be distributed under the terms of the BSD license.
- # See README for more details.
- import logging
- logger = logging.getLogger()
- import hwsim_utils
- import hostapd
- def test_ap_fragmentation_rts_set_high(dev, apdev):
- """WPA2-PSK AP with fragmentation and RTS thresholds larger than frame length"""
- ssid = "test-wpa2-psk"
- passphrase = 'qwertyuiop'
- params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
- params['rts_threshold'] = "1000"
- params['fragm_threshold'] = "2000"
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
- hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
- def test_ap_fragmentation_open(dev, apdev):
- """Open AP with fragmentation threshold"""
- ssid = "fragmentation"
- params = {}
- params['ssid'] = ssid
- params['fragm_threshold'] = "1000"
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
- hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
- def test_ap_fragmentation_wpa2(dev, apdev):
- """WPA2-PSK AP with fragmentation threshold"""
- ssid = "test-wpa2-psk"
- passphrase = 'qwertyuiop'
- params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
- params['fragm_threshold'] = "1000"
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
- hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
- def test_ap_vendor_elements(dev, apdev):
- """WPA2-PSK AP with vendor elements added"""
- bssid = apdev[0]['bssid']
- ssid = "test-wpa2-psk"
- passphrase = 'qwertyuiop'
- params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
- params['vendor_elements'] = "dd0411223301"
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
- bss = dev[0].get_bss(bssid)
- if "dd0411223301" not in bss['ie']:
- raise Exception("Vendor element not shown in scan results")
|