test_ap_open.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443
  1. # Open mode AP tests
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import struct
  9. import subprocess
  10. import time
  11. import os
  12. import hostapd
  13. import hwsim_utils
  14. from tshark import run_tshark
  15. from utils import alloc_fail
  16. from wpasupplicant import WpaSupplicant
  17. def test_ap_open(dev, apdev):
  18. """AP with open mode (no security) configuration"""
  19. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  20. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  21. bg_scan_period="0")
  22. ev = hapd.wait_event([ "AP-STA-CONNECTED" ], timeout=5)
  23. if ev is None:
  24. raise Exception("No connection event received from hostapd")
  25. hwsim_utils.test_connectivity(dev[0], hapd)
  26. dev[0].request("DISCONNECT")
  27. ev = hapd.wait_event([ "AP-STA-DISCONNECTED" ], timeout=5)
  28. if ev is None:
  29. raise Exception("No disconnection event received from hostapd")
  30. def test_ap_open_packet_loss(dev, apdev):
  31. """AP with open mode configuration and large packet loss"""
  32. params = { "ssid": "open",
  33. "ignore_probe_probability": "0.5",
  34. "ignore_auth_probability": "0.5",
  35. "ignore_assoc_probability": "0.5",
  36. "ignore_reassoc_probability": "0.5" }
  37. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  38. for i in range(0, 3):
  39. dev[i].connect("open", key_mgmt="NONE", scan_freq="2412",
  40. wait_connect=False)
  41. for i in range(0, 3):
  42. dev[i].wait_connected(timeout=20)
  43. def test_ap_open_unknown_action(dev, apdev):
  44. """AP with open mode configuration and unknown Action frame"""
  45. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  46. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  47. bssid = apdev[0]['bssid']
  48. cmd = "MGMT_TX {} {} freq=2412 action=765432".format(bssid, bssid)
  49. if "FAIL" in dev[0].request(cmd):
  50. raise Exception("Could not send test Action frame")
  51. ev = dev[0].wait_event(["MGMT-TX-STATUS"], timeout=10)
  52. if ev is None:
  53. raise Exception("Timeout on MGMT-TX-STATUS")
  54. if "result=SUCCESS" not in ev:
  55. raise Exception("AP did not ack Action frame")
  56. def test_ap_open_invalid_wmm_action(dev, apdev):
  57. """AP with open mode configuration and invalid WMM Action frame"""
  58. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  59. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  60. bssid = apdev[0]['bssid']
  61. cmd = "MGMT_TX {} {} freq=2412 action=1100".format(bssid, bssid)
  62. if "FAIL" in dev[0].request(cmd):
  63. raise Exception("Could not send test Action frame")
  64. ev = dev[0].wait_event(["MGMT-TX-STATUS"], timeout=10)
  65. if ev is None or "result=SUCCESS" not in ev:
  66. raise Exception("AP did not ack Action frame")
  67. def test_ap_open_reconnect_on_inactivity_disconnect(dev, apdev):
  68. """Reconnect to open mode AP after inactivity related disconnection"""
  69. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  70. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  71. hapd.request("DEAUTHENTICATE " + dev[0].p2p_interface_addr() + " reason=4")
  72. dev[0].wait_disconnected(timeout=5)
  73. dev[0].wait_connected(timeout=2, error="Timeout on reconnection")
  74. def test_ap_open_assoc_timeout(dev, apdev):
  75. """AP timing out association"""
  76. ssid = "test"
  77. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  78. dev[0].scan(freq="2412")
  79. hapd.set("ext_mgmt_frame_handling", "1")
  80. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  81. wait_connect=False)
  82. for i in range(0, 10):
  83. req = hapd.mgmt_rx()
  84. if req is None:
  85. raise Exception("MGMT RX wait timed out")
  86. if req['subtype'] == 11:
  87. break
  88. req = None
  89. if not req:
  90. raise Exception("Authentication frame not received")
  91. resp = {}
  92. resp['fc'] = req['fc']
  93. resp['da'] = req['sa']
  94. resp['sa'] = req['da']
  95. resp['bssid'] = req['bssid']
  96. resp['payload'] = struct.pack('<HHH', 0, 2, 0)
  97. hapd.mgmt_tx(resp)
  98. assoc = 0
  99. for i in range(0, 10):
  100. req = hapd.mgmt_rx()
  101. if req is None:
  102. raise Exception("MGMT RX wait timed out")
  103. if req['subtype'] == 0:
  104. assoc += 1
  105. if assoc == 3:
  106. break
  107. if assoc != 3:
  108. raise Exception("Association Request frames not received: assoc=%d" % assoc)
  109. hapd.set("ext_mgmt_frame_handling", "0")
  110. dev[0].wait_connected(timeout=15)
  111. def test_ap_open_id_str(dev, apdev):
  112. """AP with open mode and id_str"""
  113. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  114. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412", id_str="foo",
  115. wait_connect=False)
  116. ev = dev[0].wait_connected(timeout=10)
  117. if "id_str=foo" not in ev:
  118. raise Exception("CTRL-EVENT-CONNECT did not have matching id_str: " + ev)
  119. if dev[0].get_status_field("id_str") != "foo":
  120. raise Exception("id_str mismatch")
  121. def test_ap_open_select_any(dev, apdev):
  122. """AP with open mode and select any network"""
  123. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  124. id = dev[0].connect("unknown", key_mgmt="NONE", scan_freq="2412",
  125. only_add_network=True)
  126. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  127. only_add_network=True)
  128. dev[0].select_network(id)
  129. ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  130. if ev is not None:
  131. raise Exception("Unexpected connection")
  132. dev[0].select_network("any")
  133. dev[0].wait_connected(timeout=10)
  134. def test_ap_open_unexpected_assoc_event(dev, apdev):
  135. """AP with open mode and unexpected association event"""
  136. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  137. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  138. dev[0].request("DISCONNECT")
  139. dev[0].wait_disconnected(timeout=15)
  140. dev[0].dump_monitor()
  141. # This will be accepted due to matching network
  142. subprocess.call(['iw', 'dev', dev[0].ifname, 'connect', 'open', "2412",
  143. apdev[0]['bssid']])
  144. dev[0].wait_connected(timeout=15)
  145. dev[0].dump_monitor()
  146. dev[0].request("REMOVE_NETWORK all")
  147. dev[0].wait_disconnected(timeout=5)
  148. dev[0].dump_monitor()
  149. # This will result in disconnection due to no matching network
  150. subprocess.call(['iw', 'dev', dev[0].ifname, 'connect', 'open', "2412",
  151. apdev[0]['bssid']])
  152. dev[0].wait_disconnected(timeout=15)
  153. def test_ap_bss_load(dev, apdev):
  154. """AP with open mode (no security) configuration"""
  155. hapd = hostapd.add_ap(apdev[0]['ifname'],
  156. { "ssid": "open",
  157. "bss_load_update_period": "10" })
  158. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  159. # this does not really get much useful output with mac80211_hwsim currently,
  160. # but run through the channel survey update couple of times
  161. for i in range(0, 10):
  162. hwsim_utils.test_connectivity(dev[0], hapd)
  163. hwsim_utils.test_connectivity(dev[0], hapd)
  164. hwsim_utils.test_connectivity(dev[0], hapd)
  165. time.sleep(0.15)
  166. def hapd_out_of_mem(hapd, apdev, count, func):
  167. with alloc_fail(hapd, count, func):
  168. started = False
  169. try:
  170. hostapd.add_ap(apdev['ifname'], { "ssid": "open" })
  171. started = True
  172. except:
  173. pass
  174. if started:
  175. raise Exception("hostapd interface started even with memory allocation failure: " + arg)
  176. def test_ap_open_out_of_memory(dev, apdev):
  177. """hostapd failing to setup interface due to allocation failure"""
  178. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  179. hapd_out_of_mem(hapd, apdev[1], 1, "hostapd_alloc_bss_data")
  180. for i in range(1, 3):
  181. hapd_out_of_mem(hapd, apdev[1], i, "hostapd_iface_alloc")
  182. for i in range(1, 5):
  183. hapd_out_of_mem(hapd, apdev[1], i, "hostapd_config_defaults;hostapd_config_alloc")
  184. hapd_out_of_mem(hapd, apdev[1], 1, "hostapd_config_alloc")
  185. hapd_out_of_mem(hapd, apdev[1], 1, "hostapd_driver_init")
  186. for i in range(1, 4):
  187. hapd_out_of_mem(hapd, apdev[1], i, "=wpa_driver_nl80211_drv_init")
  188. # eloop_register_read_sock() call from i802_init()
  189. hapd_out_of_mem(hapd, apdev[1], 1, "eloop_sock_table_add_sock;eloop_register_sock;?eloop_register_read_sock;=i802_init")
  190. # verify that a new interface can still be added when memory allocation does
  191. # not fail
  192. hostapd.add_ap(apdev[1]['ifname'], { "ssid": "open" })
  193. def test_bssid_black_white_list(dev, apdev):
  194. """BSSID black/white list"""
  195. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  196. hapd2 = hostapd.add_ap(apdev[1]['ifname'], { "ssid": "open" })
  197. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  198. bssid_whitelist=apdev[1]['bssid'])
  199. dev[1].connect("open", key_mgmt="NONE", scan_freq="2412",
  200. bssid_blacklist=apdev[1]['bssid'])
  201. dev[2].connect("open", key_mgmt="NONE", scan_freq="2412",
  202. bssid_whitelist="00:00:00:00:00:00/00:00:00:00:00:00",
  203. bssid_blacklist=apdev[1]['bssid'])
  204. if dev[0].get_status_field('bssid') != apdev[1]['bssid']:
  205. raise Exception("dev[0] connected to unexpected AP")
  206. if dev[1].get_status_field('bssid') != apdev[0]['bssid']:
  207. raise Exception("dev[1] connected to unexpected AP")
  208. if dev[2].get_status_field('bssid') != apdev[0]['bssid']:
  209. raise Exception("dev[2] connected to unexpected AP")
  210. dev[0].request("REMOVE_NETWORK all")
  211. dev[1].request("REMOVE_NETWORK all")
  212. dev[2].request("REMOVE_NETWORK all")
  213. dev[2].connect("open", key_mgmt="NONE", scan_freq="2412",
  214. bssid_whitelist="00:00:00:00:00:00", wait_connect=False)
  215. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  216. bssid_whitelist="11:22:33:44:55:66/ff:00:00:00:00:00 " + apdev[1]['bssid'] + " aa:bb:cc:dd:ee:ff")
  217. dev[1].connect("open", key_mgmt="NONE", scan_freq="2412",
  218. bssid_blacklist="11:22:33:44:55:66/ff:00:00:00:00:00 " + apdev[1]['bssid'] + " aa:bb:cc:dd:ee:ff")
  219. if dev[0].get_status_field('bssid') != apdev[1]['bssid']:
  220. raise Exception("dev[0] connected to unexpected AP")
  221. if dev[1].get_status_field('bssid') != apdev[0]['bssid']:
  222. raise Exception("dev[1] connected to unexpected AP")
  223. dev[0].request("REMOVE_NETWORK all")
  224. dev[1].request("REMOVE_NETWORK all")
  225. ev = dev[2].wait_event(["CTRL-EVENT-CONNECTED"], timeout=0.1)
  226. if ev is not None:
  227. raise Exception("Unexpected dev[2] connectin")
  228. dev[2].request("REMOVE_NETWORK all")
  229. def test_ap_open_wpas_in_bridge(dev, apdev):
  230. """Open mode AP and wpas interface in a bridge"""
  231. br_ifname='sta-br0'
  232. ifname='wlan5'
  233. try:
  234. _test_ap_open_wpas_in_bridge(dev, apdev)
  235. finally:
  236. subprocess.call(['ip', 'link', 'set', 'dev', br_ifname, 'down'])
  237. subprocess.call(['brctl', 'delif', br_ifname, ifname])
  238. subprocess.call(['brctl', 'delbr', br_ifname])
  239. subprocess.call(['iw', ifname, 'set', '4addr', 'off'])
  240. def _test_ap_open_wpas_in_bridge(dev, apdev):
  241. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  242. br_ifname='sta-br0'
  243. ifname='wlan5'
  244. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  245. # First, try a failure case of adding an interface
  246. try:
  247. wpas.interface_add(ifname, br_ifname=br_ifname)
  248. raise Exception("Interface addition succeeded unexpectedly")
  249. except Exception, e:
  250. if "Failed to add" in str(e):
  251. logger.info("Ignore expected interface_add failure due to missing bridge interface: " + str(e))
  252. else:
  253. raise
  254. # Next, add the bridge interface and add the interface again
  255. subprocess.call(['brctl', 'addbr', br_ifname])
  256. subprocess.call(['brctl', 'setfd', br_ifname, '0'])
  257. subprocess.call(['ip', 'link', 'set', 'dev', br_ifname, 'up'])
  258. subprocess.call(['iw', ifname, 'set', '4addr', 'on'])
  259. subprocess.check_call(['brctl', 'addif', br_ifname, ifname])
  260. wpas.interface_add(ifname, br_ifname=br_ifname)
  261. wpas.connect("open", key_mgmt="NONE", scan_freq="2412")
  262. def test_ap_open_start_disabled(dev, apdev):
  263. """AP with open mode and beaconing disabled"""
  264. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open",
  265. "start_disabled": "1" })
  266. bssid = apdev[0]['bssid']
  267. dev[0].flush_scan_cache()
  268. dev[0].scan(freq=2412, only_new=True)
  269. if dev[0].get_bss(bssid) is not None:
  270. raise Exception("AP was seen beaconing")
  271. if "OK" not in hapd.request("RELOAD"):
  272. raise Exception("RELOAD failed")
  273. dev[0].scan_for_bss(bssid, freq=2412)
  274. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  275. def test_ap_open_start_disabled2(dev, apdev):
  276. """AP with open mode and beaconing disabled (2)"""
  277. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open",
  278. "start_disabled": "1" })
  279. bssid = apdev[0]['bssid']
  280. dev[0].flush_scan_cache()
  281. dev[0].scan(freq=2412, only_new=True)
  282. if dev[0].get_bss(bssid) is not None:
  283. raise Exception("AP was seen beaconing")
  284. if "OK" not in hapd.request("UPDATE_BEACON"):
  285. raise Exception("UPDATE_BEACON failed")
  286. dev[0].scan_for_bss(bssid, freq=2412)
  287. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  288. if "OK" not in hapd.request("UPDATE_BEACON"):
  289. raise Exception("UPDATE_BEACON failed")
  290. dev[0].request("DISCONNECT")
  291. dev[0].wait_disconnected()
  292. dev[0].request("RECONNECT")
  293. dev[0].wait_connected()
  294. def test_ap_open_ifdown(dev, apdev):
  295. """AP with open mode and external ifconfig down"""
  296. params = { "ssid": "open",
  297. "ap_max_inactivity": "1" }
  298. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  299. bssid = apdev[0]['bssid']
  300. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  301. dev[1].connect("open", key_mgmt="NONE", scan_freq="2412")
  302. subprocess.call(['ip', 'link', 'set', 'dev', apdev[0]['ifname'], 'down'])
  303. ev = hapd.wait_event(["AP-STA-DISCONNECTED"], timeout=10)
  304. if ev is None:
  305. raise Exception("Timeout on AP-STA-DISCONNECTED (1)")
  306. ev = hapd.wait_event(["AP-STA-DISCONNECTED"], timeout=5)
  307. if ev is None:
  308. raise Exception("Timeout on AP-STA-DISCONNECTED (2)")
  309. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  310. if ev is None:
  311. raise Exception("No INTERFACE-DISABLED event")
  312. # The following wait tests beacon loss detection in mac80211 on dev0.
  313. # dev1 is used to test stopping of AP side functionality on client polling.
  314. dev[1].request("REMOVE_NETWORK all")
  315. subprocess.call(['ip', 'link', 'set', 'dev', apdev[0]['ifname'], 'up'])
  316. dev[0].wait_disconnected()
  317. dev[1].wait_disconnected()
  318. ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=10)
  319. if ev is None:
  320. raise Exception("No INTERFACE-ENABLED event")
  321. dev[0].wait_connected()
  322. hwsim_utils.test_connectivity(dev[0], hapd)
  323. def test_ap_open_disconnect_in_ps(dev, apdev, params):
  324. """Disconnect with the client in PS to regression-test a kernel bug"""
  325. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  326. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  327. bg_scan_period="0")
  328. ev = hapd.wait_event([ "AP-STA-CONNECTED" ], timeout=5)
  329. if ev is None:
  330. raise Exception("No connection event received from hostapd")
  331. time.sleep(0.2)
  332. hwsim_utils.set_powersave(dev[0], hwsim_utils.PS_MANUAL_POLL)
  333. try:
  334. # inject some traffic
  335. sa = hapd.own_addr()
  336. da = dev[0].own_addr()
  337. hapd.request('DATA_TEST_CONFIG 1')
  338. hapd.request('DATA_TEST_TX {} {} 0'.format(da, sa))
  339. hapd.request('DATA_TEST_CONFIG 0')
  340. # let the AP send couple of Beacon frames
  341. time.sleep(0.3)
  342. # disconnect - with traffic pending - shouldn't cause kernel warnings
  343. dev[0].request("DISCONNECT")
  344. finally:
  345. hwsim_utils.set_powersave(dev[0], hwsim_utils.PS_DISABLED)
  346. time.sleep(0.2)
  347. out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
  348. "wlan_mgt.tim.partial_virtual_bitmap",
  349. ["wlan_mgt.tim.partial_virtual_bitmap"])
  350. if out is not None:
  351. state = 0
  352. for l in out.splitlines():
  353. pvb = int(l, 16)
  354. if pvb > 0 and state == 0:
  355. state = 1
  356. elif pvb == 0 and state == 1:
  357. state = 2
  358. if state != 2:
  359. raise Exception("Didn't observe TIM bit getting set and unset (state=%d)" % state)
  360. def test_ap_open_select_network(dev, apdev):
  361. """Open mode connection and SELECT_NETWORK to change network"""
  362. hapd1 = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  363. bssid1 = apdev[0]['bssid']
  364. hapd2 = hostapd.add_ap(apdev[1]['ifname'], { "ssid": "open2" })
  365. bssid2 = apdev[1]['bssid']
  366. id1 = dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  367. only_add_network=True)
  368. id2 = dev[0].connect("open2", key_mgmt="NONE", scan_freq="2412")
  369. hwsim_utils.test_connectivity(dev[0], hapd2)
  370. dev[0].select_network(id1)
  371. dev[0].wait_connected()
  372. res = dev[0].request("BLACKLIST")
  373. if bssid1 in res or bssid2 in res:
  374. raise Exception("Unexpected blacklist entry")
  375. hwsim_utils.test_connectivity(dev[0], hapd1)
  376. dev[0].select_network(id2)
  377. dev[0].wait_connected()
  378. hwsim_utils.test_connectivity(dev[0], hapd2)
  379. res = dev[0].request("BLACKLIST")
  380. if bssid1 in res or bssid2 in res:
  381. raise Exception("Unexpected blacklist entry(2)")
  382. def test_ap_open_disable_enable(dev, apdev):
  383. """AP with open mode getting disabled and re-enabled"""
  384. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  385. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
  386. bg_scan_period="0")
  387. for i in range(2):
  388. hapd.request("DISABLE")
  389. dev[0].wait_disconnected()
  390. hapd.request("ENABLE")
  391. dev[0].wait_connected()
  392. hwsim_utils.test_connectivity(dev[0], hapd)