test_ap_wps.py 149 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705
  1. # WPS tests
  2. # Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import base64
  7. import os
  8. import time
  9. import stat
  10. import subprocess
  11. import logging
  12. logger = logging.getLogger()
  13. import re
  14. import socket
  15. import httplib
  16. import urlparse
  17. import urllib
  18. import xml.etree.ElementTree as ET
  19. import StringIO
  20. import SocketServer
  21. import hwsim_utils
  22. import hostapd
  23. from wpasupplicant import WpaSupplicant
  24. from utils import HwsimSkip, alloc_fail, fail_test, skip_with_fips
  25. def test_ap_wps_init(dev, apdev):
  26. """Initial AP configuration with first WPS Enrollee"""
  27. ssid = "test-wps"
  28. hostapd.add_ap(apdev[0]['ifname'],
  29. { "ssid": ssid, "eap_server": "1", "wps_state": "1" })
  30. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  31. logger.info("WPS provisioning step")
  32. hapd.request("WPS_PBC")
  33. if "PBC Status: Active" not in hapd.request("WPS_GET_STATUS"):
  34. raise Exception("PBC status not shown correctly")
  35. id = dev[0].add_network()
  36. dev[0].set_network_quoted(id, "ssid", "home")
  37. dev[0].set_network_quoted(id, "psk", "12345678")
  38. dev[0].request("ENABLE_NETWORK %s no-connect" % id)
  39. id = dev[0].add_network()
  40. dev[0].set_network_quoted(id, "ssid", "home2")
  41. dev[0].set_network(id, "bssid", "00:11:22:33:44:55")
  42. dev[0].set_network(id, "key_mgmt", "NONE")
  43. dev[0].request("ENABLE_NETWORK %s no-connect" % id)
  44. dev[0].request("WPS_PBC")
  45. dev[0].wait_connected(timeout=30)
  46. status = dev[0].get_status()
  47. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  48. raise Exception("Not fully connected")
  49. if status['ssid'] != ssid:
  50. raise Exception("Unexpected SSID")
  51. if status['pairwise_cipher'] != 'CCMP':
  52. raise Exception("Unexpected encryption configuration")
  53. if status['key_mgmt'] != 'WPA2-PSK':
  54. raise Exception("Unexpected key_mgmt")
  55. status = hapd.request("WPS_GET_STATUS")
  56. if "PBC Status: Disabled" not in status:
  57. raise Exception("PBC status not shown correctly")
  58. if "Last WPS result: Success" not in status:
  59. raise Exception("Last WPS result not shown correctly")
  60. if "Peer Address: " + dev[0].p2p_interface_addr() not in status:
  61. raise Exception("Peer address not shown correctly")
  62. conf = hapd.request("GET_CONFIG")
  63. if "wps_state=configured" not in conf:
  64. raise Exception("AP not in WPS configured state")
  65. if "wpa=3" not in conf:
  66. raise Exception("AP not in WPA+WPA2 configuration")
  67. if "rsn_pairwise_cipher=CCMP TKIP" not in conf:
  68. raise Exception("Unexpected rsn_pairwise_cipher")
  69. if "wpa_pairwise_cipher=CCMP TKIP" not in conf:
  70. raise Exception("Unexpected wpa_pairwise_cipher")
  71. if "group_cipher=TKIP" not in conf:
  72. raise Exception("Unexpected group_cipher")
  73. if len(dev[0].list_networks()) != 3:
  74. raise Exception("Unexpected number of network blocks")
  75. def test_ap_wps_init_2ap_pbc(dev, apdev):
  76. """Initial two-radio AP configuration with first WPS PBC Enrollee"""
  77. ssid = "test-wps"
  78. params = { "ssid": ssid, "eap_server": "1", "wps_state": "1" }
  79. hostapd.add_ap(apdev[0]['ifname'], params)
  80. hostapd.add_ap(apdev[1]['ifname'], params)
  81. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  82. logger.info("WPS provisioning step")
  83. hapd.request("WPS_PBC")
  84. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  85. dev[0].scan_for_bss(apdev[1]['bssid'], freq="2412")
  86. bss = dev[0].get_bss(apdev[0]['bssid'])
  87. if "[WPS-PBC]" not in bss['flags']:
  88. raise Exception("WPS-PBC flag missing from AP1")
  89. bss = dev[0].get_bss(apdev[1]['bssid'])
  90. if "[WPS-PBC]" not in bss['flags']:
  91. raise Exception("WPS-PBC flag missing from AP2")
  92. dev[0].dump_monitor()
  93. dev[0].request("SET wps_cred_processing 2")
  94. dev[0].request("WPS_PBC")
  95. ev = dev[0].wait_event(["WPS-CRED-RECEIVED"], timeout=30)
  96. dev[0].request("SET wps_cred_processing 0")
  97. if ev is None:
  98. raise Exception("WPS cred event not seen")
  99. if "100e" not in ev:
  100. raise Exception("WPS attributes not included in the cred event")
  101. dev[0].wait_connected(timeout=30)
  102. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  103. dev[1].scan_for_bss(apdev[1]['bssid'], freq="2412")
  104. bss = dev[1].get_bss(apdev[0]['bssid'])
  105. if "[WPS-PBC]" in bss['flags']:
  106. raise Exception("WPS-PBC flag not cleared from AP1")
  107. bss = dev[1].get_bss(apdev[1]['bssid'])
  108. if "[WPS-PBC]" in bss['flags']:
  109. raise Exception("WPS-PBC flag not cleared from AP2")
  110. def test_ap_wps_init_2ap_pin(dev, apdev):
  111. """Initial two-radio AP configuration with first WPS PIN Enrollee"""
  112. ssid = "test-wps"
  113. params = { "ssid": ssid, "eap_server": "1", "wps_state": "1" }
  114. hostapd.add_ap(apdev[0]['ifname'], params)
  115. hostapd.add_ap(apdev[1]['ifname'], params)
  116. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  117. logger.info("WPS provisioning step")
  118. pin = dev[0].wps_read_pin()
  119. hapd.request("WPS_PIN any " + pin)
  120. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  121. dev[0].scan_for_bss(apdev[1]['bssid'], freq="2412")
  122. bss = dev[0].get_bss(apdev[0]['bssid'])
  123. if "[WPS-AUTH]" not in bss['flags']:
  124. raise Exception("WPS-AUTH flag missing from AP1")
  125. bss = dev[0].get_bss(apdev[1]['bssid'])
  126. if "[WPS-AUTH]" not in bss['flags']:
  127. raise Exception("WPS-AUTH flag missing from AP2")
  128. dev[0].dump_monitor()
  129. dev[0].request("WPS_PIN any " + pin)
  130. dev[0].wait_connected(timeout=30)
  131. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  132. dev[1].scan_for_bss(apdev[1]['bssid'], freq="2412")
  133. bss = dev[1].get_bss(apdev[0]['bssid'])
  134. if "[WPS-AUTH]" in bss['flags']:
  135. raise Exception("WPS-AUTH flag not cleared from AP1")
  136. bss = dev[1].get_bss(apdev[1]['bssid'])
  137. if "[WPS-AUTH]" in bss['flags']:
  138. raise Exception("WPS-AUTH flag not cleared from AP2")
  139. def test_ap_wps_init_through_wps_config(dev, apdev):
  140. """Initial AP configuration using wps_config command"""
  141. ssid = "test-wps-init-config"
  142. hostapd.add_ap(apdev[0]['ifname'],
  143. { "ssid": ssid, "eap_server": "1", "wps_state": "1" })
  144. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  145. if "FAIL" in hapd.request("WPS_CONFIG " + ssid.encode("hex") + " WPA2PSK CCMP " + "12345678".encode("hex")):
  146. raise Exception("WPS_CONFIG command failed")
  147. ev = hapd.wait_event(["WPS-NEW-AP-SETTINGS"], timeout=5)
  148. if ev is None:
  149. raise Exception("Timeout on WPS-NEW-AP-SETTINGS events")
  150. # It takes some time for the AP to update Beacon and Probe Response frames,
  151. # so wait here before requesting the scan to be started to avoid adding
  152. # extra five second wait to the test due to fetching obsolete scan results.
  153. hapd.ping()
  154. time.sleep(0.2)
  155. dev[0].connect(ssid, psk="12345678", scan_freq="2412", proto="WPA2",
  156. pairwise="CCMP", group="CCMP")
  157. def test_ap_wps_invalid_wps_config_passphrase(dev, apdev):
  158. """AP configuration using wps_config command with invalid passphrase"""
  159. ssid = "test-wps-init-config"
  160. hostapd.add_ap(apdev[0]['ifname'],
  161. { "ssid": ssid, "eap_server": "1", "wps_state": "1" })
  162. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  163. if "FAIL" not in hapd.request("WPS_CONFIG " + ssid.encode("hex") + " WPA2PSK CCMP " + "1234567".encode("hex")):
  164. raise Exception("Invalid WPS_CONFIG command accepted")
  165. def test_ap_wps_conf(dev, apdev):
  166. """WPS PBC provisioning with configured AP"""
  167. ssid = "test-wps-conf"
  168. hostapd.add_ap(apdev[0]['ifname'],
  169. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  170. "wpa_passphrase": "12345678", "wpa": "2",
  171. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  172. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  173. logger.info("WPS provisioning step")
  174. hapd.request("WPS_PBC")
  175. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  176. dev[0].dump_monitor()
  177. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  178. dev[0].wait_connected(timeout=30)
  179. status = dev[0].get_status()
  180. if status['wpa_state'] != 'COMPLETED':
  181. raise Exception("Not fully connected")
  182. if status['bssid'] != apdev[0]['bssid']:
  183. raise Exception("Unexpected BSSID")
  184. if status['ssid'] != ssid:
  185. raise Exception("Unexpected SSID")
  186. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'CCMP':
  187. raise Exception("Unexpected encryption configuration")
  188. if status['key_mgmt'] != 'WPA2-PSK':
  189. raise Exception("Unexpected key_mgmt")
  190. sta = hapd.get_sta(dev[0].p2p_interface_addr())
  191. if 'wpsDeviceName' not in sta or sta['wpsDeviceName'] != "Device A":
  192. raise Exception("Device name not available in STA command")
  193. def test_ap_wps_conf_5ghz(dev, apdev):
  194. """WPS PBC provisioning with configured AP on 5 GHz band"""
  195. try:
  196. hapd = None
  197. ssid = "test-wps-conf"
  198. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  199. "wpa_passphrase": "12345678", "wpa": "2",
  200. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  201. "country_code": "FI", "hw_mode": "a", "channel": "36" }
  202. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  203. logger.info("WPS provisioning step")
  204. hapd.request("WPS_PBC")
  205. dev[0].scan_for_bss(apdev[0]['bssid'], freq="5180")
  206. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  207. dev[0].wait_connected(timeout=30)
  208. sta = hapd.get_sta(dev[0].p2p_interface_addr())
  209. if 'wpsDeviceName' not in sta or sta['wpsDeviceName'] != "Device A":
  210. raise Exception("Device name not available in STA command")
  211. finally:
  212. dev[0].request("DISCONNECT")
  213. if hapd:
  214. hapd.request("DISABLE")
  215. subprocess.call(['iw', 'reg', 'set', '00'])
  216. dev[0].flush_scan_cache()
  217. def test_ap_wps_conf_chan14(dev, apdev):
  218. """WPS PBC provisioning with configured AP on channel 14"""
  219. try:
  220. hapd = None
  221. ssid = "test-wps-conf"
  222. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  223. "wpa_passphrase": "12345678", "wpa": "2",
  224. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  225. "country_code": "JP", "hw_mode": "b", "channel": "14" }
  226. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  227. logger.info("WPS provisioning step")
  228. hapd.request("WPS_PBC")
  229. dev[0].request("WPS_PBC")
  230. dev[0].wait_connected(timeout=30)
  231. sta = hapd.get_sta(dev[0].p2p_interface_addr())
  232. if 'wpsDeviceName' not in sta or sta['wpsDeviceName'] != "Device A":
  233. raise Exception("Device name not available in STA command")
  234. finally:
  235. dev[0].request("DISCONNECT")
  236. if hapd:
  237. hapd.request("DISABLE")
  238. subprocess.call(['iw', 'reg', 'set', '00'])
  239. dev[0].flush_scan_cache()
  240. def test_ap_wps_twice(dev, apdev):
  241. """WPS provisioning with twice to change passphrase"""
  242. ssid = "test-wps-twice"
  243. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  244. "wpa_passphrase": "12345678", "wpa": "2",
  245. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP" }
  246. hostapd.add_ap(apdev[0]['ifname'], params)
  247. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  248. logger.info("WPS provisioning step")
  249. hapd.request("WPS_PBC")
  250. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  251. dev[0].dump_monitor()
  252. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  253. dev[0].wait_connected(timeout=30)
  254. dev[0].request("DISCONNECT")
  255. logger.info("Restart AP with different passphrase and re-run WPS")
  256. hapd_global = hostapd.HostapdGlobal()
  257. hapd_global.remove(apdev[0]['ifname'])
  258. params['wpa_passphrase'] = 'another passphrase'
  259. hostapd.add_ap(apdev[0]['ifname'], params)
  260. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  261. logger.info("WPS provisioning step")
  262. hapd.request("WPS_PBC")
  263. dev[0].dump_monitor()
  264. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  265. dev[0].wait_connected(timeout=30)
  266. networks = dev[0].list_networks()
  267. if len(networks) > 1:
  268. raise Exception("Unexpected duplicated network block present")
  269. def test_ap_wps_incorrect_pin(dev, apdev):
  270. """WPS PIN provisioning with incorrect PIN"""
  271. ssid = "test-wps-incorrect-pin"
  272. hostapd.add_ap(apdev[0]['ifname'],
  273. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  274. "wpa_passphrase": "12345678", "wpa": "2",
  275. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  276. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  277. logger.info("WPS provisioning attempt 1")
  278. hapd.request("WPS_PIN any 12345670")
  279. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  280. dev[0].dump_monitor()
  281. dev[0].request("WPS_PIN %s 55554444" % apdev[0]['bssid'])
  282. ev = dev[0].wait_event(["WPS-FAIL"], timeout=30)
  283. if ev is None:
  284. raise Exception("WPS operation timed out")
  285. if "config_error=18" not in ev:
  286. raise Exception("Incorrect config_error reported")
  287. if "msg=8" not in ev:
  288. raise Exception("PIN error detected on incorrect message")
  289. dev[0].wait_disconnected(timeout=10)
  290. dev[0].request("WPS_CANCEL")
  291. # if a scan was in progress, wait for it to complete before trying WPS again
  292. ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 5)
  293. status = hapd.request("WPS_GET_STATUS")
  294. if "Last WPS result: Failed" not in status:
  295. raise Exception("WPS failure result not shown correctly")
  296. logger.info("WPS provisioning attempt 2")
  297. hapd.request("WPS_PIN any 12345670")
  298. dev[0].dump_monitor()
  299. dev[0].request("WPS_PIN %s 12344444" % apdev[0]['bssid'])
  300. ev = dev[0].wait_event(["WPS-FAIL"], timeout=30)
  301. if ev is None:
  302. raise Exception("WPS operation timed out")
  303. if "config_error=18" not in ev:
  304. raise Exception("Incorrect config_error reported")
  305. if "msg=10" not in ev:
  306. raise Exception("PIN error detected on incorrect message")
  307. dev[0].wait_disconnected(timeout=10)
  308. def test_ap_wps_conf_pin(dev, apdev):
  309. """WPS PIN provisioning with configured AP"""
  310. ssid = "test-wps-conf-pin"
  311. hostapd.add_ap(apdev[0]['ifname'],
  312. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  313. "wpa_passphrase": "12345678", "wpa": "2",
  314. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  315. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  316. logger.info("WPS provisioning step")
  317. pin = dev[0].wps_read_pin()
  318. hapd.request("WPS_PIN any " + pin)
  319. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  320. dev[0].dump_monitor()
  321. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  322. dev[0].wait_connected(timeout=30)
  323. status = dev[0].get_status()
  324. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  325. raise Exception("Not fully connected")
  326. if status['ssid'] != ssid:
  327. raise Exception("Unexpected SSID")
  328. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'CCMP':
  329. raise Exception("Unexpected encryption configuration")
  330. if status['key_mgmt'] != 'WPA2-PSK':
  331. raise Exception("Unexpected key_mgmt")
  332. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  333. bss = dev[1].get_bss(apdev[0]['bssid'])
  334. if "[WPS-AUTH]" in bss['flags']:
  335. raise Exception("WPS-AUTH flag not cleared")
  336. logger.info("Try to connect from another station using the same PIN")
  337. pin = dev[1].request("WPS_PIN " + apdev[0]['bssid'])
  338. ev = dev[1].wait_event(["WPS-M2D","CTRL-EVENT-CONNECTED"], timeout=30)
  339. if ev is None:
  340. raise Exception("Operation timed out")
  341. if "WPS-M2D" not in ev:
  342. raise Exception("Unexpected WPS operation started")
  343. hapd.request("WPS_PIN any " + pin)
  344. dev[1].wait_connected(timeout=30)
  345. def test_ap_wps_conf_pin_v1(dev, apdev):
  346. """WPS PIN provisioning with configured WPS v1.0 AP"""
  347. ssid = "test-wps-conf-pin-v1"
  348. hostapd.add_ap(apdev[0]['ifname'],
  349. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  350. "wpa_passphrase": "12345678", "wpa": "2",
  351. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  352. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  353. logger.info("WPS provisioning step")
  354. pin = dev[0].wps_read_pin()
  355. hapd.request("SET wps_version_number 0x10")
  356. hapd.request("WPS_PIN any " + pin)
  357. found = False
  358. for i in range(0, 10):
  359. dev[0].scan(freq="2412")
  360. if "[WPS-PIN]" in dev[0].request("SCAN_RESULTS"):
  361. found = True
  362. break
  363. if not found:
  364. hapd.request("SET wps_version_number 0x20")
  365. raise Exception("WPS-PIN flag not seen in scan results")
  366. dev[0].dump_monitor()
  367. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  368. dev[0].wait_connected(timeout=30)
  369. hapd.request("SET wps_version_number 0x20")
  370. def test_ap_wps_conf_pin_2sta(dev, apdev):
  371. """Two stations trying to use WPS PIN at the same time"""
  372. ssid = "test-wps-conf-pin2"
  373. hostapd.add_ap(apdev[0]['ifname'],
  374. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  375. "wpa_passphrase": "12345678", "wpa": "2",
  376. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  377. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  378. logger.info("WPS provisioning step")
  379. pin = "12345670"
  380. pin2 = "55554444"
  381. hapd.request("WPS_PIN " + dev[0].get_status_field("uuid") + " " + pin)
  382. hapd.request("WPS_PIN " + dev[1].get_status_field("uuid") + " " + pin)
  383. dev[0].dump_monitor()
  384. dev[1].dump_monitor()
  385. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  386. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  387. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  388. dev[1].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  389. dev[0].wait_connected(timeout=30)
  390. dev[1].wait_connected(timeout=30)
  391. def test_ap_wps_conf_pin_timeout(dev, apdev):
  392. """WPS PIN provisioning with configured AP timing out PIN"""
  393. ssid = "test-wps-conf-pin"
  394. hostapd.add_ap(apdev[0]['ifname'],
  395. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  396. "wpa_passphrase": "12345678", "wpa": "2",
  397. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  398. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  399. addr = dev[0].p2p_interface_addr()
  400. pin = dev[0].wps_read_pin()
  401. if "FAIL" not in hapd.request("WPS_PIN "):
  402. raise Exception("Unexpected success on invalid WPS_PIN")
  403. hapd.request("WPS_PIN any " + pin + " 1")
  404. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  405. time.sleep(1.1)
  406. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  407. ev = hapd.wait_event(["WPS-PIN-NEEDED"], timeout=20)
  408. if ev is None:
  409. raise Exception("WPS-PIN-NEEDED event timed out")
  410. ev = dev[0].wait_event(["WPS-M2D"])
  411. if ev is None:
  412. raise Exception("M2D not reported")
  413. dev[0].request("WPS_CANCEL")
  414. hapd.request("WPS_PIN any " + pin + " 20 " + addr)
  415. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  416. dev[0].wait_connected(timeout=30)
  417. def test_ap_wps_reg_connect(dev, apdev):
  418. """WPS registrar using AP PIN to connect"""
  419. ssid = "test-wps-reg-ap-pin"
  420. appin = "12345670"
  421. hostapd.add_ap(apdev[0]['ifname'],
  422. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  423. "wpa_passphrase": "12345678", "wpa": "2",
  424. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  425. "ap_pin": appin})
  426. logger.info("WPS provisioning step")
  427. dev[0].dump_monitor()
  428. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  429. dev[0].wps_reg(apdev[0]['bssid'], appin)
  430. status = dev[0].get_status()
  431. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  432. raise Exception("Not fully connected")
  433. if status['ssid'] != ssid:
  434. raise Exception("Unexpected SSID")
  435. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'CCMP':
  436. raise Exception("Unexpected encryption configuration")
  437. if status['key_mgmt'] != 'WPA2-PSK':
  438. raise Exception("Unexpected key_mgmt")
  439. def test_ap_wps_reg_connect_mixed_mode(dev, apdev):
  440. """WPS registrar using AP PIN to connect (WPA+WPA2)"""
  441. ssid = "test-wps-reg-ap-pin"
  442. appin = "12345670"
  443. hostapd.add_ap(apdev[0]['ifname'],
  444. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  445. "wpa_passphrase": "12345678", "wpa": "3",
  446. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  447. "wpa_pairwise": "TKIP", "ap_pin": appin})
  448. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  449. dev[0].wps_reg(apdev[0]['bssid'], appin)
  450. status = dev[0].get_status()
  451. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  452. raise Exception("Not fully connected")
  453. if status['ssid'] != ssid:
  454. raise Exception("Unexpected SSID")
  455. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'TKIP':
  456. raise Exception("Unexpected encryption configuration")
  457. if status['key_mgmt'] != 'WPA2-PSK':
  458. raise Exception("Unexpected key_mgmt")
  459. def check_wps_reg_failure(dev, ap, appin):
  460. dev.request("WPS_REG " + ap['bssid'] + " " + appin)
  461. ev = dev.wait_event(["WPS-SUCCESS", "WPS-FAIL"], timeout=15)
  462. if ev is None:
  463. raise Exception("WPS operation timed out")
  464. if "WPS-SUCCESS" in ev:
  465. raise Exception("WPS operation succeeded unexpectedly")
  466. if "config_error=15" not in ev:
  467. raise Exception("WPS setup locked state was not reported correctly")
  468. def test_ap_wps_random_ap_pin(dev, apdev):
  469. """WPS registrar using random AP PIN"""
  470. ssid = "test-wps-reg-random-ap-pin"
  471. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  472. hostapd.add_ap(apdev[0]['ifname'],
  473. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  474. "wpa_passphrase": "12345678", "wpa": "2",
  475. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  476. "device_name": "Wireless AP", "manufacturer": "Company",
  477. "model_name": "WAP", "model_number": "123",
  478. "serial_number": "12345", "device_type": "6-0050F204-1",
  479. "os_version": "01020300",
  480. "config_methods": "label push_button",
  481. "uuid": ap_uuid, "upnp_iface": "lo" })
  482. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  483. appin = hapd.request("WPS_AP_PIN random")
  484. if "FAIL" in appin:
  485. raise Exception("Could not generate random AP PIN")
  486. if appin not in hapd.request("WPS_AP_PIN get"):
  487. raise Exception("Could not fetch current AP PIN")
  488. logger.info("WPS provisioning step")
  489. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  490. dev[0].wps_reg(apdev[0]['bssid'], appin)
  491. hapd.request("WPS_AP_PIN disable")
  492. logger.info("WPS provisioning step with AP PIN disabled")
  493. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  494. check_wps_reg_failure(dev[1], apdev[0], appin)
  495. logger.info("WPS provisioning step with AP PIN reset")
  496. appin = "12345670"
  497. hapd.request("WPS_AP_PIN set " + appin)
  498. dev[1].wps_reg(apdev[0]['bssid'], appin)
  499. dev[0].request("REMOVE_NETWORK all")
  500. dev[1].request("REMOVE_NETWORK all")
  501. dev[0].wait_disconnected(timeout=10)
  502. dev[1].wait_disconnected(timeout=10)
  503. logger.info("WPS provisioning step after AP PIN timeout")
  504. hapd.request("WPS_AP_PIN disable")
  505. appin = hapd.request("WPS_AP_PIN random 1")
  506. time.sleep(1.1)
  507. if "FAIL" not in hapd.request("WPS_AP_PIN get"):
  508. raise Exception("AP PIN unexpectedly still enabled")
  509. check_wps_reg_failure(dev[0], apdev[0], appin)
  510. logger.info("WPS provisioning step after AP PIN timeout(2)")
  511. hapd.request("WPS_AP_PIN disable")
  512. appin = "12345670"
  513. hapd.request("WPS_AP_PIN set " + appin + " 1")
  514. time.sleep(1.1)
  515. if "FAIL" not in hapd.request("WPS_AP_PIN get"):
  516. raise Exception("AP PIN unexpectedly still enabled")
  517. check_wps_reg_failure(dev[1], apdev[0], appin)
  518. def test_ap_wps_reg_config(dev, apdev):
  519. """WPS registrar configuring an AP using AP PIN"""
  520. ssid = "test-wps-init-ap-pin"
  521. appin = "12345670"
  522. hostapd.add_ap(apdev[0]['ifname'],
  523. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  524. "ap_pin": appin})
  525. logger.info("WPS configuration step")
  526. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  527. dev[0].dump_monitor()
  528. new_ssid = "wps-new-ssid"
  529. new_passphrase = "1234567890"
  530. dev[0].wps_reg(apdev[0]['bssid'], appin, new_ssid, "WPA2PSK", "CCMP",
  531. new_passphrase)
  532. status = dev[0].get_status()
  533. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  534. raise Exception("Not fully connected")
  535. if status['ssid'] != new_ssid:
  536. raise Exception("Unexpected SSID")
  537. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'CCMP':
  538. raise Exception("Unexpected encryption configuration")
  539. if status['key_mgmt'] != 'WPA2-PSK':
  540. raise Exception("Unexpected key_mgmt")
  541. logger.info("Re-configure back to open")
  542. dev[0].request("REMOVE_NETWORK all")
  543. dev[0].flush_scan_cache()
  544. dev[0].dump_monitor()
  545. dev[0].wps_reg(apdev[0]['bssid'], appin, "wps-open", "OPEN", "NONE", "")
  546. status = dev[0].get_status()
  547. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  548. raise Exception("Not fully connected")
  549. if status['ssid'] != "wps-open":
  550. raise Exception("Unexpected SSID")
  551. if status['key_mgmt'] != 'NONE':
  552. raise Exception("Unexpected key_mgmt")
  553. def test_ap_wps_reg_config_ext_processing(dev, apdev):
  554. """WPS registrar configuring an AP with external config processing"""
  555. ssid = "test-wps-init-ap-pin"
  556. appin = "12345670"
  557. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  558. "wps_cred_processing": "1", "ap_pin": appin}
  559. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  560. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  561. new_ssid = "wps-new-ssid"
  562. new_passphrase = "1234567890"
  563. dev[0].wps_reg(apdev[0]['bssid'], appin, new_ssid, "WPA2PSK", "CCMP",
  564. new_passphrase, no_wait=True)
  565. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  566. if ev is None:
  567. raise Exception("WPS registrar operation timed out")
  568. ev = hapd.wait_event(["WPS-NEW-AP-SETTINGS"], timeout=15)
  569. if ev is None:
  570. raise Exception("WPS configuration timed out")
  571. if "1026" not in ev:
  572. raise Exception("AP Settings missing from event")
  573. hapd.request("SET wps_cred_processing 0")
  574. if "FAIL" in hapd.request("WPS_CONFIG " + new_ssid.encode("hex") + " WPA2PSK CCMP " + new_passphrase.encode("hex")):
  575. raise Exception("WPS_CONFIG command failed")
  576. dev[0].wait_connected(timeout=15)
  577. def test_ap_wps_reg_config_tkip(dev, apdev):
  578. """WPS registrar configuring AP to use TKIP and AP upgrading to TKIP+CCMP"""
  579. skip_with_fips(dev[0])
  580. ssid = "test-wps-init-ap"
  581. appin = "12345670"
  582. hostapd.add_ap(apdev[0]['ifname'],
  583. { "ssid": ssid, "eap_server": "1", "wps_state": "1",
  584. "ap_pin": appin})
  585. logger.info("WPS configuration step")
  586. dev[0].request("SET wps_version_number 0x10")
  587. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  588. dev[0].dump_monitor()
  589. new_ssid = "wps-new-ssid-with-tkip"
  590. new_passphrase = "1234567890"
  591. dev[0].wps_reg(apdev[0]['bssid'], appin, new_ssid, "WPAPSK", "TKIP",
  592. new_passphrase)
  593. logger.info("Re-connect to verify WPA2 mixed mode")
  594. dev[0].request("DISCONNECT")
  595. id = 0
  596. dev[0].set_network(id, "pairwise", "CCMP")
  597. dev[0].set_network(id, "proto", "RSN")
  598. dev[0].connect_network(id)
  599. status = dev[0].get_status()
  600. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  601. raise Exception("Not fully connected: wpa_state={} bssid={}".format(status['wpa_state'], status['bssid']))
  602. if status['ssid'] != new_ssid:
  603. raise Exception("Unexpected SSID")
  604. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'TKIP':
  605. raise Exception("Unexpected encryption configuration")
  606. if status['key_mgmt'] != 'WPA2-PSK':
  607. raise Exception("Unexpected key_mgmt")
  608. def test_ap_wps_setup_locked(dev, apdev):
  609. """WPS registrar locking up AP setup on AP PIN failures"""
  610. ssid = "test-wps-incorrect-ap-pin"
  611. appin = "12345670"
  612. hostapd.add_ap(apdev[0]['ifname'],
  613. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  614. "wpa_passphrase": "12345678", "wpa": "2",
  615. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  616. "ap_pin": appin})
  617. new_ssid = "wps-new-ssid-test"
  618. new_passphrase = "1234567890"
  619. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  620. ap_setup_locked=False
  621. for pin in ["55554444", "1234", "12345678", "00000000", "11111111"]:
  622. dev[0].dump_monitor()
  623. logger.info("Try incorrect AP PIN - attempt " + pin)
  624. dev[0].wps_reg(apdev[0]['bssid'], pin, new_ssid, "WPA2PSK",
  625. "CCMP", new_passphrase, no_wait=True)
  626. ev = dev[0].wait_event(["WPS-FAIL", "CTRL-EVENT-CONNECTED"])
  627. if ev is None:
  628. raise Exception("Timeout on receiving WPS operation failure event")
  629. if "CTRL-EVENT-CONNECTED" in ev:
  630. raise Exception("Unexpected connection")
  631. if "config_error=15" in ev:
  632. logger.info("AP Setup Locked")
  633. ap_setup_locked=True
  634. elif "config_error=18" not in ev:
  635. raise Exception("config_error=18 not reported")
  636. dev[0].wait_disconnected(timeout=10)
  637. time.sleep(0.1)
  638. if not ap_setup_locked:
  639. raise Exception("AP setup was not locked")
  640. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  641. status = hapd.request("WPS_GET_STATUS")
  642. if "Last WPS result: Failed" not in status:
  643. raise Exception("WPS failure result not shown correctly")
  644. if "Peer Address: " + dev[0].p2p_interface_addr() not in status:
  645. raise Exception("Peer address not shown correctly")
  646. time.sleep(0.5)
  647. dev[0].dump_monitor()
  648. logger.info("WPS provisioning step")
  649. pin = dev[0].wps_read_pin()
  650. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  651. hapd.request("WPS_PIN any " + pin)
  652. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  653. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=30)
  654. if ev is None:
  655. raise Exception("WPS success was not reported")
  656. dev[0].wait_connected(timeout=30)
  657. appin = hapd.request("WPS_AP_PIN random")
  658. if "FAIL" in appin:
  659. raise Exception("Could not generate random AP PIN")
  660. ev = hapd.wait_event(["WPS-AP-SETUP-UNLOCKED"], timeout=10)
  661. if ev is None:
  662. raise Exception("Failed to unlock AP PIN")
  663. def test_ap_wps_setup_locked_timeout(dev, apdev):
  664. """WPS re-enabling AP PIN after timeout"""
  665. ssid = "test-wps-incorrect-ap-pin"
  666. appin = "12345670"
  667. hostapd.add_ap(apdev[0]['ifname'],
  668. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  669. "wpa_passphrase": "12345678", "wpa": "2",
  670. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  671. "ap_pin": appin})
  672. new_ssid = "wps-new-ssid-test"
  673. new_passphrase = "1234567890"
  674. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  675. ap_setup_locked=False
  676. for pin in ["55554444", "1234", "12345678", "00000000", "11111111"]:
  677. dev[0].dump_monitor()
  678. logger.info("Try incorrect AP PIN - attempt " + pin)
  679. dev[0].wps_reg(apdev[0]['bssid'], pin, new_ssid, "WPA2PSK",
  680. "CCMP", new_passphrase, no_wait=True)
  681. ev = dev[0].wait_event(["WPS-FAIL", "CTRL-EVENT-CONNECTED"], timeout=15)
  682. if ev is None:
  683. raise Exception("Timeout on receiving WPS operation failure event")
  684. if "CTRL-EVENT-CONNECTED" in ev:
  685. raise Exception("Unexpected connection")
  686. if "config_error=15" in ev:
  687. logger.info("AP Setup Locked")
  688. ap_setup_locked=True
  689. break
  690. elif "config_error=18" not in ev:
  691. raise Exception("config_error=18 not reported")
  692. dev[0].wait_disconnected(timeout=10)
  693. time.sleep(0.1)
  694. if not ap_setup_locked:
  695. raise Exception("AP setup was not locked")
  696. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  697. ev = hapd.wait_event(["WPS-AP-SETUP-UNLOCKED"], timeout=80)
  698. if ev is None:
  699. raise Exception("AP PIN did not get unlocked on 60 second timeout")
  700. def test_ap_wps_pbc_overlap_2ap(dev, apdev):
  701. """WPS PBC session overlap with two active APs"""
  702. hostapd.add_ap(apdev[0]['ifname'],
  703. { "ssid": "wps1", "eap_server": "1", "wps_state": "2",
  704. "wpa_passphrase": "12345678", "wpa": "2",
  705. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  706. "wps_independent": "1"})
  707. hostapd.add_ap(apdev[1]['ifname'],
  708. { "ssid": "wps2", "eap_server": "1", "wps_state": "2",
  709. "wpa_passphrase": "123456789", "wpa": "2",
  710. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  711. "wps_independent": "1"})
  712. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  713. hapd.request("WPS_PBC")
  714. hapd2 = hostapd.Hostapd(apdev[1]['ifname'])
  715. hapd2.request("WPS_PBC")
  716. logger.info("WPS provisioning step")
  717. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412", force_scan=True)
  718. dev[0].scan_for_bss(apdev[1]['bssid'], freq="2412")
  719. dev[0].request("WPS_PBC")
  720. ev = dev[0].wait_event(["WPS-OVERLAP-DETECTED"], timeout=15)
  721. if ev is None:
  722. raise Exception("PBC session overlap not detected")
  723. hapd.request("DISABLE")
  724. hapd2.request("DISABLE")
  725. dev[0].flush_scan_cache()
  726. def test_ap_wps_pbc_overlap_2sta(dev, apdev):
  727. """WPS PBC session overlap with two active STAs"""
  728. ssid = "test-wps-pbc-overlap"
  729. hostapd.add_ap(apdev[0]['ifname'],
  730. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  731. "wpa_passphrase": "12345678", "wpa": "2",
  732. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  733. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  734. logger.info("WPS provisioning step")
  735. hapd.request("WPS_PBC")
  736. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  737. dev[0].dump_monitor()
  738. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  739. dev[1].dump_monitor()
  740. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  741. dev[1].request("WPS_PBC " + apdev[0]['bssid'])
  742. ev = dev[0].wait_event(["WPS-M2D"], timeout=15)
  743. if ev is None:
  744. raise Exception("PBC session overlap not detected (dev0)")
  745. if "config_error=12" not in ev:
  746. raise Exception("PBC session overlap not correctly reported (dev0)")
  747. dev[0].request("WPS_CANCEL")
  748. dev[0].request("DISCONNECT")
  749. ev = dev[1].wait_event(["WPS-M2D"], timeout=15)
  750. if ev is None:
  751. raise Exception("PBC session overlap not detected (dev1)")
  752. if "config_error=12" not in ev:
  753. raise Exception("PBC session overlap not correctly reported (dev1)")
  754. dev[1].request("WPS_CANCEL")
  755. dev[1].request("DISCONNECT")
  756. hapd.request("WPS_CANCEL")
  757. ret = hapd.request("WPS_PBC")
  758. if "FAIL" not in ret:
  759. raise Exception("PBC mode allowed to be started while PBC overlap still active")
  760. hapd.request("DISABLE")
  761. dev[0].flush_scan_cache()
  762. dev[1].flush_scan_cache()
  763. def test_ap_wps_cancel(dev, apdev):
  764. """WPS AP cancelling enabled config method"""
  765. ssid = "test-wps-ap-cancel"
  766. hostapd.add_ap(apdev[0]['ifname'],
  767. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  768. "wpa_passphrase": "12345678", "wpa": "2",
  769. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP" })
  770. bssid = apdev[0]['bssid']
  771. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  772. logger.info("Verify PBC enable/cancel")
  773. hapd.request("WPS_PBC")
  774. dev[0].scan(freq="2412")
  775. dev[0].scan(freq="2412")
  776. bss = dev[0].get_bss(apdev[0]['bssid'])
  777. if "[WPS-PBC]" not in bss['flags']:
  778. raise Exception("WPS-PBC flag missing")
  779. if "FAIL" in hapd.request("WPS_CANCEL"):
  780. raise Exception("WPS_CANCEL failed")
  781. dev[0].scan(freq="2412")
  782. dev[0].scan(freq="2412")
  783. bss = dev[0].get_bss(apdev[0]['bssid'])
  784. if "[WPS-PBC]" in bss['flags']:
  785. raise Exception("WPS-PBC flag not cleared")
  786. logger.info("Verify PIN enable/cancel")
  787. hapd.request("WPS_PIN any 12345670")
  788. dev[0].scan(freq="2412")
  789. dev[0].scan(freq="2412")
  790. bss = dev[0].get_bss(apdev[0]['bssid'])
  791. if "[WPS-AUTH]" not in bss['flags']:
  792. raise Exception("WPS-AUTH flag missing")
  793. if "FAIL" in hapd.request("WPS_CANCEL"):
  794. raise Exception("WPS_CANCEL failed")
  795. dev[0].scan(freq="2412")
  796. dev[0].scan(freq="2412")
  797. bss = dev[0].get_bss(apdev[0]['bssid'])
  798. if "[WPS-AUTH]" in bss['flags']:
  799. raise Exception("WPS-AUTH flag not cleared")
  800. def test_ap_wps_er_add_enrollee(dev, apdev):
  801. """WPS ER configuring AP and adding a new enrollee using PIN"""
  802. try:
  803. _test_ap_wps_er_add_enrollee(dev, apdev)
  804. finally:
  805. dev[0].request("WPS_ER_STOP")
  806. def _test_ap_wps_er_add_enrollee(dev, apdev):
  807. ssid = "wps-er-add-enrollee"
  808. ap_pin = "12345670"
  809. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  810. hostapd.add_ap(apdev[0]['ifname'],
  811. { "ssid": ssid, "eap_server": "1", "wps_state": "1",
  812. "device_name": "Wireless AP", "manufacturer": "Company",
  813. "model_name": "WAP", "model_number": "123",
  814. "serial_number": "12345", "device_type": "6-0050F204-1",
  815. "os_version": "01020300",
  816. "config_methods": "label push_button",
  817. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  818. logger.info("WPS configuration step")
  819. new_passphrase = "1234567890"
  820. dev[0].dump_monitor()
  821. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  822. dev[0].wps_reg(apdev[0]['bssid'], ap_pin, ssid, "WPA2PSK", "CCMP",
  823. new_passphrase)
  824. status = dev[0].get_status()
  825. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  826. raise Exception("Not fully connected")
  827. if status['ssid'] != ssid:
  828. raise Exception("Unexpected SSID")
  829. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'CCMP':
  830. raise Exception("Unexpected encryption configuration")
  831. if status['key_mgmt'] != 'WPA2-PSK':
  832. raise Exception("Unexpected key_mgmt")
  833. logger.info("Start ER")
  834. dev[0].request("WPS_ER_START ifname=lo")
  835. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  836. if ev is None:
  837. raise Exception("AP discovery timed out")
  838. if ap_uuid not in ev:
  839. raise Exception("Expected AP UUID not found")
  840. logger.info("Learn AP configuration through UPnP")
  841. dev[0].dump_monitor()
  842. dev[0].request("WPS_ER_LEARN " + ap_uuid + " " + ap_pin)
  843. ev = dev[0].wait_event(["WPS-ER-AP-SETTINGS"], timeout=15)
  844. if ev is None:
  845. raise Exception("AP learn timed out")
  846. if ap_uuid not in ev:
  847. raise Exception("Expected AP UUID not in settings")
  848. if "ssid=" + ssid not in ev:
  849. raise Exception("Expected SSID not in settings")
  850. if "key=" + new_passphrase not in ev:
  851. raise Exception("Expected passphrase not in settings")
  852. ev = dev[0].wait_event(["WPS-FAIL"], timeout=15)
  853. if ev is None:
  854. raise Exception("WPS-FAIL after AP learn timed out")
  855. time.sleep(0.1)
  856. logger.info("Add Enrollee using ER")
  857. pin = dev[1].wps_read_pin()
  858. dev[0].dump_monitor()
  859. dev[0].request("WPS_ER_PIN any " + pin + " " + dev[1].p2p_interface_addr())
  860. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  861. dev[1].dump_monitor()
  862. dev[1].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  863. ev = dev[1].wait_event(["WPS-SUCCESS"], timeout=30)
  864. if ev is None:
  865. raise Exception("Enrollee did not report success")
  866. dev[1].wait_connected(timeout=15)
  867. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  868. if ev is None:
  869. raise Exception("WPS ER did not report success")
  870. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  871. logger.info("Add a specific Enrollee using ER")
  872. pin = dev[2].wps_read_pin()
  873. addr2 = dev[2].p2p_interface_addr()
  874. dev[0].dump_monitor()
  875. dev[2].scan_for_bss(apdev[0]['bssid'], freq=2412)
  876. dev[2].dump_monitor()
  877. dev[2].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  878. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=10)
  879. if ev is None:
  880. raise Exception("Enrollee not seen")
  881. if addr2 not in ev:
  882. raise Exception("Unexpected Enrollee MAC address")
  883. dev[0].request("WPS_ER_PIN " + addr2 + " " + pin + " " + addr2)
  884. dev[2].wait_connected(timeout=30)
  885. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  886. if ev is None:
  887. raise Exception("WPS ER did not report success")
  888. logger.info("Verify registrar selection behavior")
  889. dev[0].request("WPS_ER_PIN any " + pin + " " + dev[1].p2p_interface_addr())
  890. dev[1].request("DISCONNECT")
  891. dev[1].wait_disconnected(timeout=10)
  892. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  893. dev[1].scan(freq="2412")
  894. bss = dev[1].get_bss(apdev[0]['bssid'])
  895. if "[WPS-AUTH]" not in bss['flags']:
  896. # It is possible for scan to miss an update especially when running
  897. # tests under load with multiple VMs, so allow another attempt.
  898. dev[1].scan(freq="2412")
  899. bss = dev[1].get_bss(apdev[0]['bssid'])
  900. if "[WPS-AUTH]" not in bss['flags']:
  901. raise Exception("WPS-AUTH flag missing")
  902. logger.info("Stop ER")
  903. dev[0].dump_monitor()
  904. dev[0].request("WPS_ER_STOP")
  905. ev = dev[0].wait_event(["WPS-ER-AP-REMOVE"])
  906. if ev is None:
  907. raise Exception("WPS ER unsubscription timed out")
  908. # It takes some time for the UPnP UNSUBSCRIBE command to go through, so wait
  909. # a bit before verifying that the scan results have changed.
  910. time.sleep(0.2)
  911. for i in range(0, 10):
  912. dev[1].request("BSS_FLUSH 0")
  913. dev[1].scan(freq="2412", only_new=True)
  914. bss = dev[1].get_bss(apdev[0]['bssid'])
  915. if bss and 'flags' in bss and "[WPS-AUTH]" not in bss['flags']:
  916. break
  917. logger.debug("WPS-AUTH flag was still in place - wait a bit longer")
  918. time.sleep(0.1)
  919. if "[WPS-AUTH]" in bss['flags']:
  920. raise Exception("WPS-AUTH flag not removed")
  921. def test_ap_wps_er_add_enrollee_uuid(dev, apdev):
  922. """WPS ER adding a new enrollee identified by UUID"""
  923. try:
  924. _test_ap_wps_er_add_enrollee_uuid(dev, apdev)
  925. finally:
  926. dev[0].request("WPS_ER_STOP")
  927. def _test_ap_wps_er_add_enrollee_uuid(dev, apdev):
  928. ssid = "wps-er-add-enrollee"
  929. ap_pin = "12345670"
  930. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  931. hostapd.add_ap(apdev[0]['ifname'],
  932. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  933. "wpa_passphrase": "12345678", "wpa": "2",
  934. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  935. "device_name": "Wireless AP", "manufacturer": "Company",
  936. "model_name": "WAP", "model_number": "123",
  937. "serial_number": "12345", "device_type": "6-0050F204-1",
  938. "os_version": "01020300",
  939. "config_methods": "label push_button",
  940. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  941. logger.info("WPS configuration step")
  942. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  943. dev[0].wps_reg(apdev[0]['bssid'], ap_pin)
  944. logger.info("Start ER")
  945. dev[0].request("WPS_ER_START ifname=lo")
  946. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  947. if ev is None:
  948. raise Exception("AP discovery timed out")
  949. if ap_uuid not in ev:
  950. raise Exception("Expected AP UUID not found")
  951. logger.info("Learn AP configuration through UPnP")
  952. dev[0].dump_monitor()
  953. dev[0].request("WPS_ER_LEARN " + ap_uuid + " " + ap_pin)
  954. ev = dev[0].wait_event(["WPS-ER-AP-SETTINGS"], timeout=15)
  955. if ev is None:
  956. raise Exception("AP learn timed out")
  957. if ap_uuid not in ev:
  958. raise Exception("Expected AP UUID not in settings")
  959. ev = dev[0].wait_event(["WPS-FAIL"], timeout=15)
  960. if ev is None:
  961. raise Exception("WPS-FAIL after AP learn timed out")
  962. time.sleep(0.1)
  963. logger.info("Add a specific Enrollee using ER (PBC/UUID)")
  964. addr1 = dev[1].p2p_interface_addr()
  965. dev[0].dump_monitor()
  966. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  967. dev[1].dump_monitor()
  968. dev[1].request("WPS_PBC %s" % apdev[0]['bssid'])
  969. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=10)
  970. if ev is None:
  971. raise Exception("Enrollee not seen")
  972. if addr1 not in ev:
  973. raise Exception("Unexpected Enrollee MAC address")
  974. uuid = ev.split(' ')[1]
  975. dev[0].request("WPS_ER_PBC " + uuid)
  976. dev[1].wait_connected(timeout=30)
  977. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  978. if ev is None:
  979. raise Exception("WPS ER did not report success")
  980. logger.info("Add a specific Enrollee using ER (PIN/UUID)")
  981. pin = dev[2].wps_read_pin()
  982. addr2 = dev[2].p2p_interface_addr()
  983. dev[0].dump_monitor()
  984. dev[2].scan_for_bss(apdev[0]['bssid'], freq=2412)
  985. dev[2].dump_monitor()
  986. dev[2].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  987. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=10)
  988. if ev is None:
  989. raise Exception("Enrollee not seen")
  990. if addr2 not in ev:
  991. raise Exception("Unexpected Enrollee MAC address")
  992. uuid = ev.split(' ')[1]
  993. dev[0].request("WPS_ER_PIN " + uuid + " " + pin)
  994. dev[2].wait_connected(timeout=30)
  995. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  996. if ev is None:
  997. raise Exception("WPS ER did not report success")
  998. logger.info("Stop ER")
  999. dev[0].dump_monitor()
  1000. dev[0].request("WPS_ER_STOP")
  1001. def test_ap_wps_er_add_enrollee_pbc(dev, apdev):
  1002. """WPS ER connected to AP and adding a new enrollee using PBC"""
  1003. try:
  1004. _test_ap_wps_er_add_enrollee_pbc(dev, apdev)
  1005. finally:
  1006. dev[0].request("WPS_ER_STOP")
  1007. def _test_ap_wps_er_add_enrollee_pbc(dev, apdev):
  1008. ssid = "wps-er-add-enrollee-pbc"
  1009. ap_pin = "12345670"
  1010. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1011. hostapd.add_ap(apdev[0]['ifname'],
  1012. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1013. "wpa_passphrase": "12345678", "wpa": "2",
  1014. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1015. "device_name": "Wireless AP", "manufacturer": "Company",
  1016. "model_name": "WAP", "model_number": "123",
  1017. "serial_number": "12345", "device_type": "6-0050F204-1",
  1018. "os_version": "01020300",
  1019. "config_methods": "label push_button",
  1020. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  1021. logger.info("Learn AP configuration")
  1022. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1023. dev[0].dump_monitor()
  1024. dev[0].wps_reg(apdev[0]['bssid'], ap_pin)
  1025. status = dev[0].get_status()
  1026. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  1027. raise Exception("Not fully connected")
  1028. logger.info("Start ER")
  1029. dev[0].request("WPS_ER_START ifname=lo")
  1030. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1031. if ev is None:
  1032. raise Exception("AP discovery timed out")
  1033. if ap_uuid not in ev:
  1034. raise Exception("Expected AP UUID not found")
  1035. enrollee = dev[1].p2p_interface_addr()
  1036. if "FAIL-UNKNOWN-UUID" not in dev[0].request("WPS_ER_PBC " + enrollee):
  1037. raise Exception("Unknown UUID not reported")
  1038. logger.info("Add Enrollee using ER and PBC")
  1039. dev[0].dump_monitor()
  1040. dev[1].dump_monitor()
  1041. dev[1].request("WPS_PBC")
  1042. for i in range(0, 2):
  1043. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=15)
  1044. if ev is None:
  1045. raise Exception("Enrollee discovery timed out")
  1046. if enrollee in ev:
  1047. break
  1048. if i == 1:
  1049. raise Exception("Expected Enrollee not found")
  1050. if "FAIL-NO-AP-SETTINGS" not in dev[0].request("WPS_ER_PBC " + enrollee):
  1051. raise Exception("Unknown UUID not reported")
  1052. logger.info("Use learned network configuration on ER")
  1053. dev[0].request("WPS_ER_SET_CONFIG " + ap_uuid + " 0")
  1054. if "OK" not in dev[0].request("WPS_ER_PBC " + enrollee):
  1055. raise Exception("WPS_ER_PBC failed")
  1056. ev = dev[1].wait_event(["WPS-SUCCESS"], timeout=15)
  1057. if ev is None:
  1058. raise Exception("Enrollee did not report success")
  1059. dev[1].wait_connected(timeout=15)
  1060. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  1061. if ev is None:
  1062. raise Exception("WPS ER did not report success")
  1063. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  1064. def test_ap_wps_er_pbc_overlap(dev, apdev):
  1065. """WPS ER connected to AP and PBC session overlap"""
  1066. try:
  1067. _test_ap_wps_er_pbc_overlap(dev, apdev)
  1068. finally:
  1069. dev[0].request("WPS_ER_STOP")
  1070. def _test_ap_wps_er_pbc_overlap(dev, apdev):
  1071. ssid = "wps-er-add-enrollee-pbc"
  1072. ap_pin = "12345670"
  1073. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1074. hostapd.add_ap(apdev[0]['ifname'],
  1075. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1076. "wpa_passphrase": "12345678", "wpa": "2",
  1077. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1078. "device_name": "Wireless AP", "manufacturer": "Company",
  1079. "model_name": "WAP", "model_number": "123",
  1080. "serial_number": "12345", "device_type": "6-0050F204-1",
  1081. "os_version": "01020300",
  1082. "config_methods": "label push_button",
  1083. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  1084. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1085. dev[0].dump_monitor()
  1086. dev[0].wps_reg(apdev[0]['bssid'], ap_pin)
  1087. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1088. dev[2].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1089. # avoid leaving dev 1 or 2 as the last Probe Request to the AP
  1090. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412, force_scan=True)
  1091. dev[0].dump_monitor()
  1092. dev[0].request("WPS_ER_START ifname=lo")
  1093. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1094. if ev is None:
  1095. raise Exception("AP discovery timed out")
  1096. if ap_uuid not in ev:
  1097. raise Exception("Expected AP UUID not found")
  1098. # verify BSSID selection of the AP instead of UUID
  1099. if "FAIL" in dev[0].request("WPS_ER_SET_CONFIG " + apdev[0]['bssid'] + " 0"):
  1100. raise Exception("Could not select AP based on BSSID")
  1101. dev[0].dump_monitor()
  1102. dev[1].request("WPS_PBC " + apdev[0]['bssid'])
  1103. dev[2].request("WPS_PBC " + apdev[0]['bssid'])
  1104. ev = dev[1].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
  1105. if ev is None:
  1106. raise Exception("PBC scan failed")
  1107. ev = dev[2].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
  1108. if ev is None:
  1109. raise Exception("PBC scan failed")
  1110. found1 = False
  1111. found2 = False
  1112. addr1 = dev[1].own_addr()
  1113. addr2 = dev[2].own_addr()
  1114. for i in range(3):
  1115. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=15)
  1116. if ev is None:
  1117. raise Exception("Enrollee discovery timed out")
  1118. if addr1 in ev:
  1119. found1 = True
  1120. if found2:
  1121. break
  1122. if addr2 in ev:
  1123. found2 = True
  1124. if found1:
  1125. break
  1126. if dev[0].request("WPS_ER_PBC " + ap_uuid) != "FAIL-PBC-OVERLAP\n":
  1127. raise Exception("PBC overlap not reported")
  1128. dev[1].request("WPS_CANCEL")
  1129. dev[2].request("WPS_CANCEL")
  1130. if dev[0].request("WPS_ER_PBC foo") != "FAIL\n":
  1131. raise Exception("Invalid WPS_ER_PBC accepted")
  1132. def test_ap_wps_er_v10_add_enrollee_pin(dev, apdev):
  1133. """WPS v1.0 ER connected to AP and adding a new enrollee using PIN"""
  1134. try:
  1135. _test_ap_wps_er_v10_add_enrollee_pin(dev, apdev)
  1136. finally:
  1137. dev[0].request("WPS_ER_STOP")
  1138. def _test_ap_wps_er_v10_add_enrollee_pin(dev, apdev):
  1139. ssid = "wps-er-add-enrollee-pbc"
  1140. ap_pin = "12345670"
  1141. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1142. hostapd.add_ap(apdev[0]['ifname'],
  1143. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1144. "wpa_passphrase": "12345678", "wpa": "2",
  1145. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1146. "device_name": "Wireless AP", "manufacturer": "Company",
  1147. "model_name": "WAP", "model_number": "123",
  1148. "serial_number": "12345", "device_type": "6-0050F204-1",
  1149. "os_version": "01020300",
  1150. "config_methods": "label push_button",
  1151. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  1152. logger.info("Learn AP configuration")
  1153. dev[0].request("SET wps_version_number 0x10")
  1154. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1155. dev[0].dump_monitor()
  1156. dev[0].wps_reg(apdev[0]['bssid'], ap_pin)
  1157. status = dev[0].get_status()
  1158. if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
  1159. raise Exception("Not fully connected")
  1160. logger.info("Start ER")
  1161. dev[0].request("WPS_ER_START ifname=lo")
  1162. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1163. if ev is None:
  1164. raise Exception("AP discovery timed out")
  1165. if ap_uuid not in ev:
  1166. raise Exception("Expected AP UUID not found")
  1167. logger.info("Use learned network configuration on ER")
  1168. dev[0].request("WPS_ER_SET_CONFIG " + ap_uuid + " 0")
  1169. logger.info("Add Enrollee using ER and PIN")
  1170. enrollee = dev[1].p2p_interface_addr()
  1171. pin = dev[1].wps_read_pin()
  1172. dev[0].dump_monitor()
  1173. dev[0].request("WPS_ER_PIN any " + pin + " " + enrollee)
  1174. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1175. dev[1].dump_monitor()
  1176. dev[1].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  1177. dev[1].wait_connected(timeout=30)
  1178. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  1179. if ev is None:
  1180. raise Exception("WPS ER did not report success")
  1181. def test_ap_wps_er_config_ap(dev, apdev):
  1182. """WPS ER configuring AP over UPnP"""
  1183. try:
  1184. _test_ap_wps_er_config_ap(dev, apdev)
  1185. finally:
  1186. dev[0].request("WPS_ER_STOP")
  1187. def _test_ap_wps_er_config_ap(dev, apdev):
  1188. ssid = "wps-er-ap-config"
  1189. ap_pin = "12345670"
  1190. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1191. hostapd.add_ap(apdev[0]['ifname'],
  1192. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1193. "wpa_passphrase": "12345678", "wpa": "2",
  1194. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1195. "device_name": "Wireless AP", "manufacturer": "Company",
  1196. "model_name": "WAP", "model_number": "123",
  1197. "serial_number": "12345", "device_type": "6-0050F204-1",
  1198. "os_version": "01020300",
  1199. "config_methods": "label push_button",
  1200. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  1201. logger.info("Connect ER to the AP")
  1202. dev[0].connect(ssid, psk="12345678", scan_freq="2412")
  1203. logger.info("WPS configuration step")
  1204. dev[0].request("WPS_ER_START ifname=lo")
  1205. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1206. if ev is None:
  1207. raise Exception("AP discovery timed out")
  1208. if ap_uuid not in ev:
  1209. raise Exception("Expected AP UUID not found")
  1210. new_passphrase = "1234567890"
  1211. dev[0].request("WPS_ER_CONFIG " + apdev[0]['bssid'] + " " + ap_pin + " " +
  1212. ssid.encode("hex") + " WPA2PSK CCMP " +
  1213. new_passphrase.encode("hex"))
  1214. ev = dev[0].wait_event(["WPS-SUCCESS"])
  1215. if ev is None:
  1216. raise Exception("WPS ER configuration operation timed out")
  1217. dev[0].wait_disconnected(timeout=10)
  1218. dev[0].connect(ssid, psk="1234567890", scan_freq="2412")
  1219. logger.info("WPS ER restart")
  1220. dev[0].request("WPS_ER_START")
  1221. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1222. if ev is None:
  1223. raise Exception("AP discovery timed out on ER restart")
  1224. if ap_uuid not in ev:
  1225. raise Exception("Expected AP UUID not found on ER restart")
  1226. if "OK" not in dev[0].request("WPS_ER_STOP"):
  1227. raise Exception("WPS_ER_STOP failed")
  1228. if "OK" not in dev[0].request("WPS_ER_STOP"):
  1229. raise Exception("WPS_ER_STOP failed")
  1230. def test_ap_wps_er_cache_ap_settings(dev, apdev):
  1231. """WPS ER caching AP settings"""
  1232. try:
  1233. _test_ap_wps_er_cache_ap_settings(dev, apdev)
  1234. finally:
  1235. dev[0].request("WPS_ER_STOP")
  1236. def _test_ap_wps_er_cache_ap_settings(dev, apdev):
  1237. ssid = "wps-er-add-enrollee"
  1238. ap_pin = "12345670"
  1239. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1240. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1241. "wpa_passphrase": "12345678", "wpa": "2",
  1242. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1243. "device_name": "Wireless AP", "manufacturer": "Company",
  1244. "model_name": "WAP", "model_number": "123",
  1245. "serial_number": "12345", "device_type": "6-0050F204-1",
  1246. "os_version": "01020300",
  1247. "config_methods": "label push_button",
  1248. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo" }
  1249. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  1250. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1251. dev[0].wps_reg(apdev[0]['bssid'], ap_pin)
  1252. id = int(dev[0].list_networks()[0]['id'])
  1253. dev[0].set_network(id, "scan_freq", "2412")
  1254. dev[0].request("WPS_ER_START ifname=lo")
  1255. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=15)
  1256. if ev is None:
  1257. raise Exception("AP discovery timed out")
  1258. if ap_uuid not in ev:
  1259. raise Exception("Expected AP UUID not found")
  1260. dev[0].dump_monitor()
  1261. dev[0].request("WPS_ER_LEARN " + ap_uuid + " " + ap_pin)
  1262. ev = dev[0].wait_event(["WPS-ER-AP-SETTINGS"], timeout=15)
  1263. if ev is None:
  1264. raise Exception("AP learn timed out")
  1265. ev = dev[0].wait_event(["WPS-FAIL"], timeout=15)
  1266. if ev is None:
  1267. raise Exception("WPS-FAIL after AP learn timed out")
  1268. time.sleep(0.1)
  1269. hapd.disable()
  1270. for i in range(2):
  1271. ev = dev[0].wait_event([ "WPS-ER-AP-REMOVE",
  1272. "CTRL-EVENT-DISCONNECTED" ],
  1273. timeout=15)
  1274. if ev is None:
  1275. raise Exception("AP removal or disconnection timed out")
  1276. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  1277. for i in range(2):
  1278. ev = dev[0].wait_event([ "WPS-ER-AP-ADD", "CTRL-EVENT-CONNECTED" ],
  1279. timeout=15)
  1280. if ev is None:
  1281. raise Exception("AP discovery or connection timed out")
  1282. pin = dev[1].wps_read_pin()
  1283. dev[0].dump_monitor()
  1284. dev[0].request("WPS_ER_PIN any " + pin + " " + dev[1].p2p_interface_addr())
  1285. time.sleep(0.2)
  1286. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1287. dev[1].dump_monitor()
  1288. dev[1].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  1289. ev = dev[1].wait_event(["WPS-SUCCESS"], timeout=30)
  1290. if ev is None:
  1291. raise Exception("Enrollee did not report success")
  1292. dev[1].wait_connected(timeout=15)
  1293. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=15)
  1294. if ev is None:
  1295. raise Exception("WPS ER did not report success")
  1296. dev[0].dump_monitor()
  1297. dev[0].request("WPS_ER_STOP")
  1298. def test_ap_wps_fragmentation(dev, apdev):
  1299. """WPS with fragmentation in EAP-WSC and mixed mode WPA+WPA2"""
  1300. ssid = "test-wps-fragmentation"
  1301. appin = "12345670"
  1302. hostapd.add_ap(apdev[0]['ifname'],
  1303. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1304. "wpa_passphrase": "12345678", "wpa": "3",
  1305. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1306. "wpa_pairwise": "TKIP", "ap_pin": appin,
  1307. "fragment_size": "50" })
  1308. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1309. logger.info("WPS provisioning step (PBC)")
  1310. hapd.request("WPS_PBC")
  1311. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1312. dev[0].dump_monitor()
  1313. dev[0].request("SET wps_fragment_size 50")
  1314. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1315. dev[0].wait_connected(timeout=30)
  1316. status = dev[0].get_status()
  1317. if status['wpa_state'] != 'COMPLETED':
  1318. raise Exception("Not fully connected")
  1319. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'TKIP':
  1320. raise Exception("Unexpected encryption configuration")
  1321. if status['key_mgmt'] != 'WPA2-PSK':
  1322. raise Exception("Unexpected key_mgmt")
  1323. logger.info("WPS provisioning step (PIN)")
  1324. pin = dev[1].wps_read_pin()
  1325. hapd.request("WPS_PIN any " + pin)
  1326. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1327. dev[1].request("SET wps_fragment_size 50")
  1328. dev[1].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  1329. dev[1].wait_connected(timeout=30)
  1330. status = dev[1].get_status()
  1331. if status['wpa_state'] != 'COMPLETED':
  1332. raise Exception("Not fully connected")
  1333. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'TKIP':
  1334. raise Exception("Unexpected encryption configuration")
  1335. if status['key_mgmt'] != 'WPA2-PSK':
  1336. raise Exception("Unexpected key_mgmt")
  1337. logger.info("WPS connection as registrar")
  1338. dev[2].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1339. dev[2].request("SET wps_fragment_size 50")
  1340. dev[2].wps_reg(apdev[0]['bssid'], appin)
  1341. status = dev[2].get_status()
  1342. if status['wpa_state'] != 'COMPLETED':
  1343. raise Exception("Not fully connected")
  1344. if status['pairwise_cipher'] != 'CCMP' or status['group_cipher'] != 'TKIP':
  1345. raise Exception("Unexpected encryption configuration")
  1346. if status['key_mgmt'] != 'WPA2-PSK':
  1347. raise Exception("Unexpected key_mgmt")
  1348. def test_ap_wps_new_version_sta(dev, apdev):
  1349. """WPS compatibility with new version number on the station"""
  1350. ssid = "test-wps-ver"
  1351. hostapd.add_ap(apdev[0]['ifname'],
  1352. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1353. "wpa_passphrase": "12345678", "wpa": "2",
  1354. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP" })
  1355. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1356. logger.info("WPS provisioning step")
  1357. hapd.request("WPS_PBC")
  1358. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1359. dev[0].dump_monitor()
  1360. dev[0].request("SET wps_version_number 0x43")
  1361. dev[0].request("SET wps_vendor_ext_m1 000137100100020001")
  1362. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1363. dev[0].wait_connected(timeout=30)
  1364. def test_ap_wps_new_version_ap(dev, apdev):
  1365. """WPS compatibility with new version number on the AP"""
  1366. ssid = "test-wps-ver"
  1367. hostapd.add_ap(apdev[0]['ifname'],
  1368. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1369. "wpa_passphrase": "12345678", "wpa": "2",
  1370. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP" })
  1371. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1372. logger.info("WPS provisioning step")
  1373. if "FAIL" in hapd.request("SET wps_version_number 0x43"):
  1374. raise Exception("Failed to enable test functionality")
  1375. hapd.request("WPS_PBC")
  1376. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1377. dev[0].dump_monitor()
  1378. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1379. dev[0].wait_connected(timeout=30)
  1380. hapd.request("SET wps_version_number 0x20")
  1381. def test_ap_wps_check_pin(dev, apdev):
  1382. """Verify PIN checking through control interface"""
  1383. hostapd.add_ap(apdev[0]['ifname'],
  1384. { "ssid": "wps", "eap_server": "1", "wps_state": "2",
  1385. "wpa_passphrase": "12345678", "wpa": "2",
  1386. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP" })
  1387. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1388. for t in [ ("12345670", "12345670"),
  1389. ("12345678", "FAIL-CHECKSUM"),
  1390. ("12345", "FAIL"),
  1391. ("123456789", "FAIL"),
  1392. ("1234-5670", "12345670"),
  1393. ("1234 5670", "12345670"),
  1394. ("1-2.3:4 5670", "12345670") ]:
  1395. res = hapd.request("WPS_CHECK_PIN " + t[0]).rstrip('\n')
  1396. res2 = dev[0].request("WPS_CHECK_PIN " + t[0]).rstrip('\n')
  1397. if res != res2:
  1398. raise Exception("Unexpected difference in WPS_CHECK_PIN responses")
  1399. if res != t[1]:
  1400. raise Exception("Incorrect WPS_CHECK_PIN response {} (expected {})".format(res, t[1]))
  1401. if "FAIL" not in hapd.request("WPS_CHECK_PIN 12345"):
  1402. raise Exception("Unexpected WPS_CHECK_PIN success")
  1403. if "FAIL" not in hapd.request("WPS_CHECK_PIN 123456789"):
  1404. raise Exception("Unexpected WPS_CHECK_PIN success")
  1405. for i in range(0, 10):
  1406. pin = dev[0].request("WPS_PIN get")
  1407. rpin = dev[0].request("WPS_CHECK_PIN " + pin).rstrip('\n')
  1408. if pin != rpin:
  1409. raise Exception("Random PIN validation failed for " + pin)
  1410. def test_ap_wps_wep_config(dev, apdev):
  1411. """WPS 2.0 AP rejecting WEP configuration"""
  1412. ssid = "test-wps-config"
  1413. appin = "12345670"
  1414. hostapd.add_ap(apdev[0]['ifname'],
  1415. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1416. "ap_pin": appin})
  1417. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1418. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1419. dev[0].wps_reg(apdev[0]['bssid'], appin, "wps-new-ssid-wep", "OPEN", "WEP",
  1420. "hello", no_wait=True)
  1421. ev = hapd.wait_event(["WPS-FAIL"], timeout=15)
  1422. if ev is None:
  1423. raise Exception("WPS-FAIL timed out")
  1424. if "reason=2" not in ev:
  1425. raise Exception("Unexpected reason code in WPS-FAIL")
  1426. status = hapd.request("WPS_GET_STATUS")
  1427. if "Last WPS result: Failed" not in status:
  1428. raise Exception("WPS failure result not shown correctly")
  1429. if "Failure Reason: WEP Prohibited" not in status:
  1430. raise Exception("Failure reason not reported correctly")
  1431. if "Peer Address: " + dev[0].p2p_interface_addr() not in status:
  1432. raise Exception("Peer address not shown correctly")
  1433. def test_ap_wps_wep_enroll(dev, apdev):
  1434. """WPS 2.0 STA rejecting WEP configuration"""
  1435. ssid = "test-wps-wep"
  1436. hostapd.add_ap(apdev[0]['ifname'],
  1437. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1438. "skip_cred_build": "1", "extra_cred": "wps-wep-cred" })
  1439. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1440. hapd.request("WPS_PBC")
  1441. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1442. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1443. ev = dev[0].wait_event(["WPS-FAIL"], timeout=15)
  1444. if ev is None:
  1445. raise Exception("WPS-FAIL event timed out")
  1446. if "msg=12" not in ev or "reason=2 (WEP Prohibited)" not in ev:
  1447. raise Exception("Unexpected WPS-FAIL event: " + ev)
  1448. def test_ap_wps_ie_fragmentation(dev, apdev):
  1449. """WPS AP using fragmented WPS IE"""
  1450. ssid = "test-wps-ie-fragmentation"
  1451. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1452. "wpa_passphrase": "12345678", "wpa": "2",
  1453. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1454. "device_name": "1234567890abcdef1234567890abcdef",
  1455. "manufacturer": "1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef",
  1456. "model_name": "1234567890abcdef1234567890abcdef",
  1457. "model_number": "1234567890abcdef1234567890abcdef",
  1458. "serial_number": "1234567890abcdef1234567890abcdef" }
  1459. hostapd.add_ap(apdev[0]['ifname'], params)
  1460. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1461. hapd.request("WPS_PBC")
  1462. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1463. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1464. dev[0].wait_connected(timeout=30)
  1465. bss = dev[0].get_bss(apdev[0]['bssid'])
  1466. if "wps_device_name" not in bss or bss['wps_device_name'] != "1234567890abcdef1234567890abcdef":
  1467. logger.info("Device Name not received correctly")
  1468. logger.info(bss)
  1469. # This can fail if Probe Response frame is missed and Beacon frame was
  1470. # used to fill in the BSS entry. This can happen, e.g., during heavy
  1471. # load every now and then and is not really an error, so try to
  1472. # workaround by runnign another scan.
  1473. dev[0].scan(freq="2412", only_new=True)
  1474. bss = dev[0].get_bss(apdev[0]['bssid'])
  1475. if not bss or "wps_device_name" not in bss or bss['wps_device_name'] != "1234567890abcdef1234567890abcdef":
  1476. logger.info(bss)
  1477. raise Exception("Device Name not received correctly")
  1478. if len(re.findall("dd..0050f204", bss['ie'])) != 2:
  1479. raise Exception("Unexpected number of WPS IEs")
  1480. def get_psk(pskfile):
  1481. psks = {}
  1482. with open(pskfile, "r") as f:
  1483. lines = f.read().splitlines()
  1484. for l in lines:
  1485. if l == "# WPA PSKs":
  1486. continue
  1487. (addr,psk) = l.split(' ')
  1488. psks[addr] = psk
  1489. return psks
  1490. def test_ap_wps_per_station_psk(dev, apdev):
  1491. """WPS PBC provisioning with per-station PSK"""
  1492. addr0 = dev[0].own_addr()
  1493. addr1 = dev[1].own_addr()
  1494. addr2 = dev[2].own_addr()
  1495. ssid = "wps"
  1496. appin = "12345670"
  1497. pskfile = "/tmp/ap_wps_per_enrollee_psk.psk_file"
  1498. try:
  1499. os.remove(pskfile)
  1500. except:
  1501. pass
  1502. try:
  1503. with open(pskfile, "w") as f:
  1504. f.write("# WPA PSKs\n")
  1505. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1506. "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
  1507. "rsn_pairwise": "CCMP", "ap_pin": appin,
  1508. "wpa_psk_file": pskfile }
  1509. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  1510. logger.info("First enrollee")
  1511. hapd.request("WPS_PBC")
  1512. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1513. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1514. dev[0].wait_connected(timeout=30)
  1515. logger.info("Second enrollee")
  1516. hapd.request("WPS_PBC")
  1517. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1518. dev[1].request("WPS_PBC " + apdev[0]['bssid'])
  1519. dev[1].wait_connected(timeout=30)
  1520. logger.info("External registrar")
  1521. dev[2].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1522. dev[2].wps_reg(apdev[0]['bssid'], appin)
  1523. logger.info("Verifying PSK results")
  1524. psks = get_psk(pskfile)
  1525. if addr0 not in psks:
  1526. raise Exception("No PSK recorded for sta0")
  1527. if addr1 not in psks:
  1528. raise Exception("No PSK recorded for sta1")
  1529. if addr2 not in psks:
  1530. raise Exception("No PSK recorded for sta2")
  1531. if psks[addr0] == psks[addr1]:
  1532. raise Exception("Same PSK recorded for sta0 and sta1")
  1533. if psks[addr0] == psks[addr2]:
  1534. raise Exception("Same PSK recorded for sta0 and sta2")
  1535. if psks[addr1] == psks[addr2]:
  1536. raise Exception("Same PSK recorded for sta1 and sta2")
  1537. dev[0].request("REMOVE_NETWORK all")
  1538. logger.info("Second external registrar")
  1539. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1540. dev[0].wps_reg(apdev[0]['bssid'], appin)
  1541. psks2 = get_psk(pskfile)
  1542. if addr0 not in psks2:
  1543. raise Exception("No PSK recorded for sta0(reg)")
  1544. if psks[addr0] == psks2[addr0]:
  1545. raise Exception("Same PSK recorded for sta0(enrollee) and sta0(reg)")
  1546. finally:
  1547. os.remove(pskfile)
  1548. def test_ap_wps_per_station_psk_failure(dev, apdev):
  1549. """WPS PBC provisioning with per-station PSK (file not writable)"""
  1550. addr0 = dev[0].p2p_dev_addr()
  1551. addr1 = dev[1].p2p_dev_addr()
  1552. addr2 = dev[2].p2p_dev_addr()
  1553. ssid = "wps"
  1554. appin = "12345670"
  1555. pskfile = "/tmp/ap_wps_per_enrollee_psk.psk_file"
  1556. try:
  1557. os.remove(pskfile)
  1558. except:
  1559. pass
  1560. try:
  1561. with open(pskfile, "w") as f:
  1562. f.write("# WPA PSKs\n")
  1563. params = { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1564. "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
  1565. "rsn_pairwise": "CCMP", "ap_pin": appin,
  1566. "wpa_psk_file": pskfile }
  1567. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  1568. if "FAIL" in hapd.request("SET wpa_psk_file /tmp/does/not/exists/ap_wps_per_enrollee_psk_failure.psk_file"):
  1569. raise Exception("Failed to set wpa_psk_file")
  1570. logger.info("First enrollee")
  1571. hapd.request("WPS_PBC")
  1572. dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1573. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1574. dev[0].wait_connected(timeout=30)
  1575. logger.info("Second enrollee")
  1576. hapd.request("WPS_PBC")
  1577. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1578. dev[1].request("WPS_PBC " + apdev[0]['bssid'])
  1579. dev[1].wait_connected(timeout=30)
  1580. logger.info("External registrar")
  1581. dev[2].scan_for_bss(apdev[0]['bssid'], freq=2412)
  1582. dev[2].wps_reg(apdev[0]['bssid'], appin)
  1583. logger.info("Verifying PSK results")
  1584. psks = get_psk(pskfile)
  1585. if len(psks) > 0:
  1586. raise Exception("PSK recorded unexpectedly")
  1587. finally:
  1588. os.remove(pskfile)
  1589. def test_ap_wps_pin_request_file(dev, apdev):
  1590. """WPS PIN provisioning with configured AP"""
  1591. ssid = "wps"
  1592. pinfile = "/tmp/ap_wps_pin_request_file.log"
  1593. if os.path.exists(pinfile):
  1594. os.remove(pinfile)
  1595. hostapd.add_ap(apdev[0]['ifname'],
  1596. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1597. "wps_pin_requests": pinfile,
  1598. "wpa_passphrase": "12345678", "wpa": "2",
  1599. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  1600. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1601. uuid = dev[0].get_status_field("uuid")
  1602. pin = dev[0].wps_read_pin()
  1603. try:
  1604. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1605. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  1606. ev = hapd.wait_event(["WPS-PIN-NEEDED"], timeout=15)
  1607. if ev is None:
  1608. raise Exception("PIN needed event not shown")
  1609. if uuid not in ev:
  1610. raise Exception("UUID mismatch")
  1611. dev[0].request("WPS_CANCEL")
  1612. success = False
  1613. with open(pinfile, "r") as f:
  1614. lines = f.readlines()
  1615. for l in lines:
  1616. if uuid in l:
  1617. success = True
  1618. break
  1619. if not success:
  1620. raise Exception("PIN request entry not in the log file")
  1621. finally:
  1622. try:
  1623. os.remove(pinfile)
  1624. except:
  1625. pass
  1626. def test_ap_wps_auto_setup_with_config_file(dev, apdev):
  1627. """WPS auto-setup with configuration file"""
  1628. conffile = "/tmp/ap_wps_auto_setup_with_config_file.conf"
  1629. ifname = apdev[0]['ifname']
  1630. try:
  1631. with open(conffile, "w") as f:
  1632. f.write("driver=nl80211\n")
  1633. f.write("hw_mode=g\n")
  1634. f.write("channel=1\n")
  1635. f.write("ieee80211n=1\n")
  1636. f.write("interface=%s\n" % ifname)
  1637. f.write("ctrl_interface=/var/run/hostapd\n")
  1638. f.write("ssid=wps\n")
  1639. f.write("eap_server=1\n")
  1640. f.write("wps_state=1\n")
  1641. hostapd.add_bss('phy3', ifname, conffile)
  1642. hapd = hostapd.Hostapd(ifname)
  1643. hapd.request("WPS_PBC")
  1644. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  1645. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  1646. dev[0].wait_connected(timeout=30)
  1647. with open(conffile, "r") as f:
  1648. lines = f.read().splitlines()
  1649. vals = dict()
  1650. for l in lines:
  1651. try:
  1652. [name,value] = l.split('=', 1)
  1653. vals[name] = value
  1654. except ValueError, e:
  1655. if "# WPS configuration" in l:
  1656. pass
  1657. else:
  1658. raise Exception("Unexpected configuration line: " + l)
  1659. if vals['ieee80211n'] != '1' or vals['wps_state'] != '2' or "WPA-PSK" not in vals['wpa_key_mgmt']:
  1660. raise Exception("Incorrect configuration: " + str(vals))
  1661. finally:
  1662. try:
  1663. os.remove(conffile)
  1664. except:
  1665. pass
  1666. def test_ap_wps_pbc_timeout(dev, apdev, params):
  1667. """wpa_supplicant PBC walk time [long]"""
  1668. if not params['long']:
  1669. raise HwsimSkip("Skip test case with long duration due to --long not specified")
  1670. ssid = "test-wps"
  1671. hostapd.add_ap(apdev[0]['ifname'],
  1672. { "ssid": ssid, "eap_server": "1", "wps_state": "1" })
  1673. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  1674. logger.info("Start WPS_PBC and wait for PBC walk time expiration")
  1675. if "OK" not in dev[0].request("WPS_PBC"):
  1676. raise Exception("WPS_PBC failed")
  1677. ev = dev[0].wait_event(["WPS-TIMEOUT"], timeout=150)
  1678. if ev is None:
  1679. raise Exception("WPS-TIMEOUT not reported")
  1680. def add_ssdp_ap(ifname, ap_uuid):
  1681. ssid = "wps-ssdp"
  1682. ap_pin = "12345670"
  1683. hostapd.add_ap(ifname,
  1684. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  1685. "wpa_passphrase": "12345678", "wpa": "2",
  1686. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  1687. "device_name": "Wireless AP", "manufacturer": "Company",
  1688. "model_name": "WAP", "model_number": "123",
  1689. "serial_number": "12345", "device_type": "6-0050F204-1",
  1690. "os_version": "01020300",
  1691. "config_methods": "label push_button",
  1692. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo",
  1693. "friendly_name": "WPS Access Point",
  1694. "manufacturer_url": "http://www.example.com/",
  1695. "model_description": "Wireless Access Point",
  1696. "model_url": "http://www.example.com/model/",
  1697. "upc": "123456789012" })
  1698. def ssdp_send(msg, no_recv=False):
  1699. socket.setdefaulttimeout(1)
  1700. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  1701. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  1702. sock.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 2)
  1703. sock.bind(("127.0.0.1", 0))
  1704. sock.sendto(msg, ("239.255.255.250", 1900))
  1705. if no_recv:
  1706. return None
  1707. return sock.recv(1000)
  1708. def ssdp_send_msearch(st):
  1709. msg = '\r\n'.join([
  1710. 'M-SEARCH * HTTP/1.1',
  1711. 'HOST: 239.255.255.250:1900',
  1712. 'MX: 1',
  1713. 'MAN: "ssdp:discover"',
  1714. 'ST: ' + st,
  1715. '', ''])
  1716. return ssdp_send(msg)
  1717. def test_ap_wps_ssdp_msearch(dev, apdev):
  1718. """WPS AP and SSDP M-SEARCH messages"""
  1719. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1720. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  1721. msg = '\r\n'.join([
  1722. 'M-SEARCH * HTTP/1.1',
  1723. 'Host: 239.255.255.250:1900',
  1724. 'Mx: 1',
  1725. 'Man: "ssdp:discover"',
  1726. 'St: urn:schemas-wifialliance-org:device:WFADevice:1',
  1727. '', ''])
  1728. ssdp_send(msg)
  1729. msg = '\r\n'.join([
  1730. 'M-SEARCH * HTTP/1.1',
  1731. 'host:\t239.255.255.250:1900\t\t\t\t \t\t',
  1732. 'mx: \t1\t\t ',
  1733. 'man: \t \t "ssdp:discover" ',
  1734. 'st: urn:schemas-wifialliance-org:device:WFADevice:1\t\t',
  1735. '', ''])
  1736. ssdp_send(msg)
  1737. ssdp_send_msearch("ssdp:all")
  1738. ssdp_send_msearch("upnp:rootdevice")
  1739. ssdp_send_msearch("uuid:" + ap_uuid)
  1740. ssdp_send_msearch("urn:schemas-wifialliance-org:service:WFAWLANConfig:1")
  1741. ssdp_send_msearch("urn:schemas-wifialliance-org:device:WFADevice:1");
  1742. msg = '\r\n'.join([
  1743. 'M-SEARCH * HTTP/1.1',
  1744. 'HOST:\t239.255.255.250:1900',
  1745. 'MAN: "ssdp:discover"',
  1746. 'MX: 130',
  1747. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1748. '', ''])
  1749. ssdp_send(msg, no_recv=True)
  1750. def test_ap_wps_ssdp_invalid_msearch(dev, apdev):
  1751. """WPS AP and invalid SSDP M-SEARCH messages"""
  1752. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1753. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  1754. socket.setdefaulttimeout(1)
  1755. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  1756. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  1757. sock.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 2)
  1758. sock.bind(("127.0.0.1", 0))
  1759. logger.debug("Missing MX")
  1760. msg = '\r\n'.join([
  1761. 'M-SEARCH * HTTP/1.1',
  1762. 'HOST: 239.255.255.250:1900',
  1763. 'MAN: "ssdp:discover"',
  1764. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1765. '', ''])
  1766. sock.sendto(msg, ("239.255.255.250", 1900))
  1767. logger.debug("Negative MX")
  1768. msg = '\r\n'.join([
  1769. 'M-SEARCH * HTTP/1.1',
  1770. 'HOST: 239.255.255.250:1900',
  1771. 'MX: -1',
  1772. 'MAN: "ssdp:discover"',
  1773. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1774. '', ''])
  1775. sock.sendto(msg, ("239.255.255.250", 1900))
  1776. logger.debug("Invalid MX")
  1777. msg = '\r\n'.join([
  1778. 'M-SEARCH * HTTP/1.1',
  1779. 'HOST: 239.255.255.250:1900',
  1780. 'MX; 1',
  1781. 'MAN: "ssdp:discover"',
  1782. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1783. '', ''])
  1784. sock.sendto(msg, ("239.255.255.250", 1900))
  1785. logger.debug("Missing MAN")
  1786. msg = '\r\n'.join([
  1787. 'M-SEARCH * HTTP/1.1',
  1788. 'HOST: 239.255.255.250:1900',
  1789. 'MX: 1',
  1790. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1791. '', ''])
  1792. sock.sendto(msg, ("239.255.255.250", 1900))
  1793. logger.debug("Invalid MAN")
  1794. msg = '\r\n'.join([
  1795. 'M-SEARCH * HTTP/1.1',
  1796. 'HOST: 239.255.255.250:1900',
  1797. 'MX: 1',
  1798. 'MAN: foo',
  1799. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1800. '', ''])
  1801. sock.sendto(msg, ("239.255.255.250", 1900))
  1802. msg = '\r\n'.join([
  1803. 'M-SEARCH * HTTP/1.1',
  1804. 'HOST: 239.255.255.250:1900',
  1805. 'MX: 1',
  1806. 'MAN; "ssdp:discover"',
  1807. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1808. '', ''])
  1809. sock.sendto(msg, ("239.255.255.250", 1900))
  1810. logger.debug("Missing HOST")
  1811. msg = '\r\n'.join([
  1812. 'M-SEARCH * HTTP/1.1',
  1813. 'MAN: "ssdp:discover"',
  1814. 'MX: 1',
  1815. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1816. '', ''])
  1817. sock.sendto(msg, ("239.255.255.250", 1900))
  1818. logger.debug("Missing ST")
  1819. msg = '\r\n'.join([
  1820. 'M-SEARCH * HTTP/1.1',
  1821. 'HOST: 239.255.255.250:1900',
  1822. 'MAN: "ssdp:discover"',
  1823. 'MX: 1',
  1824. '', ''])
  1825. sock.sendto(msg, ("239.255.255.250", 1900))
  1826. logger.debug("Mismatching ST")
  1827. msg = '\r\n'.join([
  1828. 'M-SEARCH * HTTP/1.1',
  1829. 'HOST: 239.255.255.250:1900',
  1830. 'MAN: "ssdp:discover"',
  1831. 'MX: 1',
  1832. 'ST: uuid:16d5f8a9-4ee4-4f5e-81f9-cc6e2f47f42d',
  1833. '', ''])
  1834. sock.sendto(msg, ("239.255.255.250", 1900))
  1835. msg = '\r\n'.join([
  1836. 'M-SEARCH * HTTP/1.1',
  1837. 'HOST: 239.255.255.250:1900',
  1838. 'MAN: "ssdp:discover"',
  1839. 'MX: 1',
  1840. 'ST: foo:bar',
  1841. '', ''])
  1842. sock.sendto(msg, ("239.255.255.250", 1900))
  1843. msg = '\r\n'.join([
  1844. 'M-SEARCH * HTTP/1.1',
  1845. 'HOST: 239.255.255.250:1900',
  1846. 'MAN: "ssdp:discover"',
  1847. 'MX: 1',
  1848. 'ST: foobar',
  1849. '', ''])
  1850. sock.sendto(msg, ("239.255.255.250", 1900))
  1851. logger.debug("Invalid ST")
  1852. msg = '\r\n'.join([
  1853. 'M-SEARCH * HTTP/1.1',
  1854. 'HOST: 239.255.255.250:1900',
  1855. 'MAN: "ssdp:discover"',
  1856. 'MX: 1',
  1857. 'ST; urn:schemas-wifialliance-org:device:WFADevice:1',
  1858. '', ''])
  1859. sock.sendto(msg, ("239.255.255.250", 1900))
  1860. logger.debug("Invalid M-SEARCH")
  1861. msg = '\r\n'.join([
  1862. 'M+SEARCH * HTTP/1.1',
  1863. 'HOST: 239.255.255.250:1900',
  1864. 'MAN: "ssdp:discover"',
  1865. 'MX: 1',
  1866. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1867. '', ''])
  1868. sock.sendto(msg, ("239.255.255.250", 1900))
  1869. msg = '\r\n'.join([
  1870. 'M-SEARCH-* HTTP/1.1',
  1871. 'HOST: 239.255.255.250:1900',
  1872. 'MAN: "ssdp:discover"',
  1873. 'MX: 1',
  1874. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1875. '', ''])
  1876. sock.sendto(msg, ("239.255.255.250", 1900))
  1877. logger.debug("Invalid message format")
  1878. sock.sendto("NOTIFY * HTTP/1.1", ("239.255.255.250", 1900))
  1879. msg = '\r'.join([
  1880. 'M-SEARCH * HTTP/1.1',
  1881. 'HOST: 239.255.255.250:1900',
  1882. 'MAN: "ssdp:discover"',
  1883. 'MX: 1',
  1884. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1885. '', ''])
  1886. sock.sendto(msg, ("239.255.255.250", 1900))
  1887. try:
  1888. r = sock.recv(1000)
  1889. raise Exception("Unexpected M-SEARCH response: " + r)
  1890. except socket.timeout:
  1891. pass
  1892. logger.debug("Valid M-SEARCH")
  1893. msg = '\r\n'.join([
  1894. 'M-SEARCH * HTTP/1.1',
  1895. 'HOST: 239.255.255.250:1900',
  1896. 'MAN: "ssdp:discover"',
  1897. 'MX: 1',
  1898. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1899. '', ''])
  1900. sock.sendto(msg, ("239.255.255.250", 1900))
  1901. try:
  1902. r = sock.recv(1000)
  1903. pass
  1904. except socket.timeout:
  1905. raise Exception("No SSDP response")
  1906. def test_ap_wps_ssdp_burst(dev, apdev):
  1907. """WPS AP and SSDP burst"""
  1908. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1909. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  1910. msg = '\r\n'.join([
  1911. 'M-SEARCH * HTTP/1.1',
  1912. 'HOST: 239.255.255.250:1900',
  1913. 'MAN: "ssdp:discover"',
  1914. 'MX: 1',
  1915. 'ST: urn:schemas-wifialliance-org:device:WFADevice:1',
  1916. '', ''])
  1917. socket.setdefaulttimeout(1)
  1918. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  1919. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  1920. sock.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 2)
  1921. sock.bind(("127.0.0.1", 0))
  1922. for i in range(0, 25):
  1923. sock.sendto(msg, ("239.255.255.250", 1900))
  1924. resp = 0
  1925. while True:
  1926. try:
  1927. r = sock.recv(1000)
  1928. if not r.startswith("HTTP/1.1 200 OK\r\n"):
  1929. raise Exception("Unexpected message: " + r)
  1930. resp += 1
  1931. except socket.timeout:
  1932. break
  1933. if resp < 20:
  1934. raise Exception("Too few SSDP responses")
  1935. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  1936. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  1937. sock.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 2)
  1938. sock.bind(("127.0.0.1", 0))
  1939. for i in range(0, 25):
  1940. sock.sendto(msg, ("239.255.255.250", 1900))
  1941. while True:
  1942. try:
  1943. r = sock.recv(1000)
  1944. if ap_uuid in r:
  1945. break
  1946. except socket.timeout:
  1947. raise Exception("No SSDP response")
  1948. def ssdp_get_location(uuid):
  1949. res = ssdp_send_msearch("uuid:" + uuid)
  1950. location = None
  1951. for l in res.splitlines():
  1952. if l.lower().startswith("location:"):
  1953. location = l.split(':', 1)[1].strip()
  1954. break
  1955. if location is None:
  1956. raise Exception("No UPnP location found")
  1957. return location
  1958. def upnp_get_urls(location):
  1959. conn = urllib.urlopen(location)
  1960. tree = ET.parse(conn)
  1961. root = tree.getroot()
  1962. urn = '{urn:schemas-upnp-org:device-1-0}'
  1963. service = root.find("./" + urn + "device/" + urn + "serviceList/" + urn + "service")
  1964. res = {}
  1965. res['scpd_url'] = urlparse.urljoin(location, service.find(urn + 'SCPDURL').text)
  1966. res['control_url'] = urlparse.urljoin(location, service.find(urn + 'controlURL').text)
  1967. res['event_sub_url'] = urlparse.urljoin(location, service.find(urn + 'eventSubURL').text)
  1968. return res
  1969. def upnp_soap_action(conn, path, action, include_soap_action=True, soap_action_override=None):
  1970. soapns = 'http://schemas.xmlsoap.org/soap/envelope/'
  1971. wpsns = 'urn:schemas-wifialliance-org:service:WFAWLANConfig:1'
  1972. ET.register_namespace('soapenv', soapns)
  1973. ET.register_namespace('wfa', wpsns)
  1974. attrib = {}
  1975. attrib['{%s}encodingStyle' % soapns] = 'http://schemas.xmlsoap.org/soap/encoding/'
  1976. root = ET.Element("{%s}Envelope" % soapns, attrib=attrib)
  1977. body = ET.SubElement(root, "{%s}Body" % soapns)
  1978. act = ET.SubElement(body, "{%s}%s" % (wpsns, action))
  1979. tree = ET.ElementTree(root)
  1980. soap = StringIO.StringIO()
  1981. tree.write(soap, xml_declaration=True, encoding='utf-8')
  1982. headers = { "Content-type": 'text/xml; charset="utf-8"' }
  1983. if include_soap_action:
  1984. headers["SOAPAction"] = '"urn:schemas-wifialliance-org:service:WFAWLANConfig:1#%s"' % action
  1985. elif soap_action_override:
  1986. headers["SOAPAction"] = soap_action_override
  1987. conn.request("POST", path, soap.getvalue(), headers)
  1988. return conn.getresponse()
  1989. def test_ap_wps_upnp(dev, apdev):
  1990. """WPS AP and UPnP operations"""
  1991. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  1992. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  1993. location = ssdp_get_location(ap_uuid)
  1994. urls = upnp_get_urls(location)
  1995. conn = urllib.urlopen(urls['scpd_url'])
  1996. scpd = conn.read()
  1997. conn = urllib.urlopen(urlparse.urljoin(location, "unknown.html"))
  1998. if conn.getcode() != 404:
  1999. raise Exception("Unexpected HTTP response to GET unknown URL")
  2000. url = urlparse.urlparse(location)
  2001. conn = httplib.HTTPConnection(url.netloc)
  2002. #conn.set_debuglevel(1)
  2003. headers = { "Content-type": 'text/xml; charset="utf-8"',
  2004. "SOAPAction": '"urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo"' }
  2005. conn.request("POST", "hello", "\r\n\r\n", headers)
  2006. resp = conn.getresponse()
  2007. if resp.status != 404:
  2008. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2009. conn.request("UNKNOWN", "hello", "\r\n\r\n", headers)
  2010. resp = conn.getresponse()
  2011. if resp.status != 501:
  2012. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2013. headers = { "Content-type": 'text/xml; charset="utf-8"',
  2014. "SOAPAction": '"urn:some-unknown-action#GetDeviceInfo"' }
  2015. ctrlurl = urlparse.urlparse(urls['control_url'])
  2016. conn.request("POST", ctrlurl.path, "\r\n\r\n", headers)
  2017. resp = conn.getresponse()
  2018. if resp.status != 401:
  2019. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2020. logger.debug("GetDeviceInfo without SOAPAction header")
  2021. resp = upnp_soap_action(conn, ctrlurl.path, "GetDeviceInfo",
  2022. include_soap_action=False)
  2023. if resp.status != 401:
  2024. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2025. logger.debug("GetDeviceInfo with invalid SOAPAction header")
  2026. for act in [ "foo",
  2027. "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo",
  2028. '"urn:schemas-wifialliance-org:service:WFAWLANConfig:1"',
  2029. '"urn:schemas-wifialliance-org:service:WFAWLANConfig:123#GetDevice']:
  2030. resp = upnp_soap_action(conn, ctrlurl.path, "GetDeviceInfo",
  2031. include_soap_action=False,
  2032. soap_action_override=act)
  2033. if resp.status != 401:
  2034. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2035. resp = upnp_soap_action(conn, ctrlurl.path, "GetDeviceInfo")
  2036. if resp.status != 200:
  2037. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2038. dev = resp.read()
  2039. if "NewDeviceInfo" not in dev:
  2040. raise Exception("Unexpected GetDeviceInfo response")
  2041. logger.debug("PutMessage without required parameters")
  2042. resp = upnp_soap_action(conn, ctrlurl.path, "PutMessage")
  2043. if resp.status != 600:
  2044. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2045. logger.debug("PutWLANResponse without required parameters")
  2046. resp = upnp_soap_action(conn, ctrlurl.path, "PutWLANResponse")
  2047. if resp.status != 600:
  2048. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2049. logger.debug("SetSelectedRegistrar from unregistered ER")
  2050. resp = upnp_soap_action(conn, ctrlurl.path, "SetSelectedRegistrar")
  2051. if resp.status != 501:
  2052. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2053. logger.debug("Unknown action")
  2054. resp = upnp_soap_action(conn, ctrlurl.path, "Unknown")
  2055. if resp.status != 401:
  2056. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2057. def test_ap_wps_upnp_subscribe(dev, apdev):
  2058. """WPS AP and UPnP event subscription"""
  2059. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  2060. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  2061. location = ssdp_get_location(ap_uuid)
  2062. urls = upnp_get_urls(location)
  2063. eventurl = urlparse.urlparse(urls['event_sub_url'])
  2064. url = urlparse.urlparse(location)
  2065. conn = httplib.HTTPConnection(url.netloc)
  2066. #conn.set_debuglevel(1)
  2067. headers = { "callback": '<http://127.0.0.1:12345/event>',
  2068. "timeout": "Second-1234" }
  2069. conn.request("SUBSCRIBE", "hello", "\r\n\r\n", headers)
  2070. resp = conn.getresponse()
  2071. if resp.status != 412:
  2072. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2073. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2074. resp = conn.getresponse()
  2075. if resp.status != 412:
  2076. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2077. headers = { "NT": "upnp:event",
  2078. "timeout": "Second-1234" }
  2079. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2080. resp = conn.getresponse()
  2081. if resp.status != 412:
  2082. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2083. headers = { "callback": '<http://127.0.0.1:12345/event>',
  2084. "NT": "upnp:foobar",
  2085. "timeout": "Second-1234" }
  2086. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2087. resp = conn.getresponse()
  2088. if resp.status != 400:
  2089. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2090. logger.debug("Valid subscription")
  2091. headers = { "callback": '<http://127.0.0.1:12345/event>',
  2092. "NT": "upnp:event",
  2093. "timeout": "Second-1234" }
  2094. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2095. resp = conn.getresponse()
  2096. if resp.status != 200:
  2097. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2098. sid = resp.getheader("sid")
  2099. logger.debug("Subscription SID " + sid)
  2100. logger.debug("Invalid re-subscription")
  2101. headers = { "NT": "upnp:event",
  2102. "sid": "123456734567854",
  2103. "timeout": "Second-1234" }
  2104. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2105. resp = conn.getresponse()
  2106. if resp.status != 400:
  2107. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2108. logger.debug("Invalid re-subscription")
  2109. headers = { "NT": "upnp:event",
  2110. "sid": "uuid:123456734567854",
  2111. "timeout": "Second-1234" }
  2112. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2113. resp = conn.getresponse()
  2114. if resp.status != 400:
  2115. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2116. logger.debug("Invalid re-subscription")
  2117. headers = { "callback": '<http://127.0.0.1:12345/event>',
  2118. "NT": "upnp:event",
  2119. "sid": sid,
  2120. "timeout": "Second-1234" }
  2121. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2122. resp = conn.getresponse()
  2123. if resp.status != 400:
  2124. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2125. logger.debug("SID mismatch in re-subscription")
  2126. headers = { "NT": "upnp:event",
  2127. "sid": "uuid:4c2bca79-1ff4-4e43-85d4-952a2b8a51fb",
  2128. "timeout": "Second-1234" }
  2129. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2130. resp = conn.getresponse()
  2131. if resp.status != 412:
  2132. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2133. logger.debug("Valid re-subscription")
  2134. headers = { "NT": "upnp:event",
  2135. "sid": sid,
  2136. "timeout": "Second-1234" }
  2137. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2138. resp = conn.getresponse()
  2139. if resp.status != 200:
  2140. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2141. sid2 = resp.getheader("sid")
  2142. logger.debug("Subscription SID " + sid2)
  2143. if sid != sid2:
  2144. raise Exception("Unexpected SID change")
  2145. logger.debug("Valid re-subscription")
  2146. headers = { "NT": "upnp:event",
  2147. "sid": "uuid: \t \t" + sid.split(':')[1],
  2148. "timeout": "Second-1234" }
  2149. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2150. resp = conn.getresponse()
  2151. if resp.status != 200:
  2152. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2153. logger.debug("Invalid unsubscription")
  2154. headers = { "sid": sid }
  2155. conn.request("UNSUBSCRIBE", "/hello", "\r\n\r\n", headers)
  2156. resp = conn.getresponse()
  2157. if resp.status != 412:
  2158. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2159. headers = { "foo": "bar" }
  2160. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2161. resp = conn.getresponse()
  2162. if resp.status != 412:
  2163. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2164. logger.debug("Valid unsubscription")
  2165. headers = { "sid": sid }
  2166. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2167. resp = conn.getresponse()
  2168. if resp.status != 200:
  2169. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2170. logger.debug("Unsubscription for not existing SID")
  2171. headers = { "sid": sid }
  2172. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2173. resp = conn.getresponse()
  2174. if resp.status != 412:
  2175. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2176. logger.debug("Invalid unsubscription")
  2177. headers = { "sid": " \t \tfoo" }
  2178. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2179. resp = conn.getresponse()
  2180. if resp.status != 400:
  2181. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2182. logger.debug("Invalid unsubscription")
  2183. headers = { "sid": "uuid:\t \tfoo" }
  2184. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2185. resp = conn.getresponse()
  2186. if resp.status != 400:
  2187. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2188. logger.debug("Invalid unsubscription")
  2189. headers = { "NT": "upnp:event",
  2190. "sid": sid }
  2191. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2192. resp = conn.getresponse()
  2193. if resp.status != 400:
  2194. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2195. headers = { "callback": '<http://127.0.0.1:12345/event>',
  2196. "sid": sid }
  2197. conn.request("UNSUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2198. resp = conn.getresponse()
  2199. if resp.status != 400:
  2200. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2201. logger.debug("Valid subscription with multiple callbacks")
  2202. headers = { "callback": '<http://127.0.0.1:12345/event> <http://127.0.0.1:12345/event>\t<http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event><http://127.0.0.1:12345/event>',
  2203. "NT": "upnp:event",
  2204. "timeout": "Second-1234" }
  2205. conn.request("SUBSCRIBE", eventurl.path, "\r\n\r\n", headers)
  2206. resp = conn.getresponse()
  2207. if resp.status != 200:
  2208. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2209. sid = resp.getheader("sid")
  2210. logger.debug("Subscription SID " + sid)
  2211. def test_ap_wps_upnp_http_proto(dev, apdev):
  2212. """WPS AP and UPnP/HTTP protocol testing"""
  2213. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  2214. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  2215. location = ssdp_get_location(ap_uuid)
  2216. url = urlparse.urlparse(location)
  2217. conn = httplib.HTTPConnection(url.netloc, timeout=0.2)
  2218. #conn.set_debuglevel(1)
  2219. conn.request("HEAD", "hello")
  2220. resp = conn.getresponse()
  2221. if resp.status != 501:
  2222. raise Exception("Unexpected response to HEAD: " + str(resp.status))
  2223. conn.close()
  2224. for cmd in [ "PUT", "DELETE", "TRACE", "CONNECT", "M-SEARCH", "M-POST" ]:
  2225. try:
  2226. conn.request(cmd, "hello")
  2227. resp = conn.getresponse()
  2228. except Exception, e:
  2229. pass
  2230. conn.close()
  2231. headers = { "Content-Length": 'abc' }
  2232. conn.request("HEAD", "hello", "\r\n\r\n", headers)
  2233. try:
  2234. resp = conn.getresponse()
  2235. except Exception, e:
  2236. pass
  2237. conn.close()
  2238. headers = { "Content-Length": '-10' }
  2239. conn.request("HEAD", "hello", "\r\n\r\n", headers)
  2240. try:
  2241. resp = conn.getresponse()
  2242. except Exception, e:
  2243. pass
  2244. conn.close()
  2245. headers = { "Content-Length": '10000000000000' }
  2246. conn.request("HEAD", "hello", "\r\n\r\nhello", headers)
  2247. try:
  2248. resp = conn.getresponse()
  2249. except Exception, e:
  2250. pass
  2251. conn.close()
  2252. headers = { "Transfer-Encoding": 'abc' }
  2253. conn.request("HEAD", "hello", "\r\n\r\n", headers)
  2254. resp = conn.getresponse()
  2255. if resp.status != 501:
  2256. raise Exception("Unexpected response to HEAD: " + str(resp.status))
  2257. conn.close()
  2258. headers = { "Transfer-Encoding": 'chunked' }
  2259. conn.request("HEAD", "hello", "\r\n\r\n", headers)
  2260. resp = conn.getresponse()
  2261. if resp.status != 501:
  2262. raise Exception("Unexpected response to HEAD: " + str(resp.status))
  2263. conn.close()
  2264. # Too long a header
  2265. conn.request("HEAD", 5000 * 'A')
  2266. try:
  2267. resp = conn.getresponse()
  2268. except Exception, e:
  2269. pass
  2270. conn.close()
  2271. # Long URL but within header length limits
  2272. conn.request("HEAD", 3000 * 'A')
  2273. resp = conn.getresponse()
  2274. if resp.status != 501:
  2275. raise Exception("Unexpected response to HEAD: " + str(resp.status))
  2276. conn.close()
  2277. headers = { "Content-Length": '20' }
  2278. conn.request("POST", "hello", 10 * 'A' + "\r\n\r\n", headers)
  2279. try:
  2280. resp = conn.getresponse()
  2281. except Exception, e:
  2282. pass
  2283. conn.close()
  2284. conn.request("POST", "hello", 5000 * 'A' + "\r\n\r\n")
  2285. resp = conn.getresponse()
  2286. if resp.status != 404:
  2287. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2288. conn.close()
  2289. conn.request("POST", "hello", 60000 * 'A' + "\r\n\r\n")
  2290. try:
  2291. resp = conn.getresponse()
  2292. except Exception, e:
  2293. pass
  2294. conn.close()
  2295. def test_ap_wps_upnp_http_proto_chunked(dev, apdev):
  2296. """WPS AP and UPnP/HTTP protocol testing for chunked encoding"""
  2297. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  2298. add_ssdp_ap(apdev[0]['ifname'], ap_uuid)
  2299. location = ssdp_get_location(ap_uuid)
  2300. url = urlparse.urlparse(location)
  2301. conn = httplib.HTTPConnection(url.netloc)
  2302. #conn.set_debuglevel(1)
  2303. headers = { "Transfer-Encoding": 'chunked' }
  2304. conn.request("POST", "hello",
  2305. "a\r\nabcdefghij\r\n" + "2\r\nkl\r\n" + "0\r\n\r\n",
  2306. headers)
  2307. resp = conn.getresponse()
  2308. if resp.status != 404:
  2309. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2310. conn.close()
  2311. conn.putrequest("POST", "hello")
  2312. conn.putheader('Transfer-Encoding', 'chunked')
  2313. conn.endheaders()
  2314. conn.send("a\r\nabcdefghij\r\n")
  2315. time.sleep(0.1)
  2316. conn.send("2\r\nkl\r\n")
  2317. conn.send("0\r\n\r\n")
  2318. resp = conn.getresponse()
  2319. if resp.status != 404:
  2320. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2321. conn.close()
  2322. conn.putrequest("POST", "hello")
  2323. conn.putheader('Transfer-Encoding', 'chunked')
  2324. conn.endheaders()
  2325. completed = False
  2326. try:
  2327. for i in range(20000):
  2328. conn.send("1\r\nZ\r\n")
  2329. conn.send("0\r\n\r\n")
  2330. resp = conn.getresponse()
  2331. completed = True
  2332. except Exception, e:
  2333. pass
  2334. conn.close()
  2335. if completed:
  2336. raise Exception("Too long chunked request did not result in connection reset")
  2337. headers = { "Transfer-Encoding": 'chunked' }
  2338. conn.request("POST", "hello", "80000000\r\na", headers)
  2339. try:
  2340. resp = conn.getresponse()
  2341. except Exception, e:
  2342. pass
  2343. conn.close()
  2344. conn.request("POST", "hello", "10000000\r\na", headers)
  2345. try:
  2346. resp = conn.getresponse()
  2347. except Exception, e:
  2348. pass
  2349. conn.close()
  2350. def test_ap_wps_disabled(dev, apdev):
  2351. """WPS operations while WPS is disabled"""
  2352. ssid = "test-wps-disabled"
  2353. hostapd.add_ap(apdev[0]['ifname'], { "ssid": ssid })
  2354. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2355. if "FAIL" not in hapd.request("WPS_PBC"):
  2356. raise Exception("WPS_PBC succeeded unexpectedly")
  2357. if "FAIL" not in hapd.request("WPS_CANCEL"):
  2358. raise Exception("WPS_CANCEL succeeded unexpectedly")
  2359. def test_ap_wps_mixed_cred(dev, apdev):
  2360. """WPS 2.0 STA merging mixed mode WPA/WPA2 credentials"""
  2361. ssid = "test-wps-wep"
  2362. hostapd.add_ap(apdev[0]['ifname'],
  2363. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2364. "skip_cred_build": "1", "extra_cred": "wps-mixed-cred" })
  2365. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2366. hapd.request("WPS_PBC")
  2367. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2368. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  2369. ev = dev[0].wait_event(["WPS-SUCCESS"], timeout=30)
  2370. if ev is None:
  2371. raise Exception("WPS-SUCCESS event timed out")
  2372. nets = dev[0].list_networks()
  2373. if len(nets) != 1:
  2374. raise Exception("Unexpected number of network blocks")
  2375. id = nets[0]['id']
  2376. proto = dev[0].get_network(id, "proto")
  2377. if proto != "WPA RSN":
  2378. raise Exception("Unexpected merged proto field value: " + proto)
  2379. pairwise = dev[0].get_network(id, "pairwise")
  2380. if pairwise != "CCMP TKIP" and pairwise != "CCMP GCMP TKIP":
  2381. raise Exception("Unexpected merged pairwise field value: " + pairwise)
  2382. def test_ap_wps_while_connected(dev, apdev):
  2383. """WPS PBC provisioning while connected to another AP"""
  2384. ssid = "test-wps-conf"
  2385. hostapd.add_ap(apdev[0]['ifname'],
  2386. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2387. "wpa_passphrase": "12345678", "wpa": "2",
  2388. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2389. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2390. hostapd.add_ap(apdev[1]['ifname'], { "ssid": "open" })
  2391. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  2392. logger.info("WPS provisioning step")
  2393. hapd.request("WPS_PBC")
  2394. dev[0].dump_monitor()
  2395. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  2396. dev[0].wait_connected(timeout=30)
  2397. status = dev[0].get_status()
  2398. if status['bssid'] != apdev[0]['bssid']:
  2399. raise Exception("Unexpected BSSID")
  2400. def test_ap_wps_while_connected_no_autoconnect(dev, apdev):
  2401. """WPS PBC provisioning while connected to another AP and STA_AUTOCONNECT disabled"""
  2402. ssid = "test-wps-conf"
  2403. hostapd.add_ap(apdev[0]['ifname'],
  2404. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2405. "wpa_passphrase": "12345678", "wpa": "2",
  2406. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2407. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2408. hostapd.add_ap(apdev[1]['ifname'], { "ssid": "open" })
  2409. try:
  2410. dev[0].request("STA_AUTOCONNECT 0")
  2411. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  2412. logger.info("WPS provisioning step")
  2413. hapd.request("WPS_PBC")
  2414. dev[0].dump_monitor()
  2415. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  2416. dev[0].wait_connected(timeout=30)
  2417. status = dev[0].get_status()
  2418. if status['bssid'] != apdev[0]['bssid']:
  2419. raise Exception("Unexpected BSSID")
  2420. finally:
  2421. dev[0].request("STA_AUTOCONNECT 1")
  2422. def test_ap_wps_from_event(dev, apdev):
  2423. """WPS PBC event on AP to enable PBC"""
  2424. ssid = "test-wps-conf"
  2425. hapd = hostapd.add_ap(apdev[0]['ifname'],
  2426. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2427. "wpa_passphrase": "12345678", "wpa": "2",
  2428. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2429. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2430. dev[0].dump_monitor()
  2431. hapd.dump_monitor()
  2432. dev[0].request("WPS_PBC " + apdev[0]['bssid'])
  2433. ev = hapd.wait_event(['WPS-ENROLLEE-SEEN'], timeout=15)
  2434. if ev is None:
  2435. raise Exception("No WPS-ENROLLEE-SEEN event on AP")
  2436. vals = ev.split(' ')
  2437. if vals[1] != dev[0].p2p_interface_addr():
  2438. raise Exception("Unexpected enrollee address: " + vals[1])
  2439. if vals[5] != '4':
  2440. raise Exception("Unexpected Device Password Id: " + vals[5])
  2441. hapd.request("WPS_PBC")
  2442. dev[0].wait_connected(timeout=30)
  2443. def test_ap_wps_ap_scan_2(dev, apdev):
  2444. """AP_SCAN 2 for WPS"""
  2445. ssid = "test-wps-conf"
  2446. hapd = hostapd.add_ap(apdev[0]['ifname'],
  2447. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2448. "wpa_passphrase": "12345678", "wpa": "2",
  2449. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2450. hapd.request("WPS_PBC")
  2451. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  2452. wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
  2453. if "OK" not in wpas.request("AP_SCAN 2"):
  2454. raise Exception("Failed to set AP_SCAN 2")
  2455. wpas.flush_scan_cache()
  2456. wpas.scan_for_bss(apdev[0]['bssid'], freq="2412")
  2457. wpas.request("WPS_PBC " + apdev[0]['bssid'])
  2458. ev = wpas.wait_event(["WPS-SUCCESS"], timeout=15)
  2459. if ev is None:
  2460. raise Exception("WPS-SUCCESS event timed out")
  2461. wpas.wait_connected(timeout=30)
  2462. wpas.request("DISCONNECT")
  2463. wpas.request("BSS_FLUSH 0")
  2464. wpas.dump_monitor()
  2465. wpas.request("REASSOCIATE")
  2466. wpas.wait_connected(timeout=30)
  2467. def test_ap_wps_eapol_workaround(dev, apdev):
  2468. """EAPOL workaround code path for 802.1X header length mismatch"""
  2469. ssid = "test-wps"
  2470. hostapd.add_ap(apdev[0]['ifname'],
  2471. { "ssid": ssid, "eap_server": "1", "wps_state": "1" })
  2472. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2473. bssid = apdev[0]['bssid']
  2474. hapd.request("SET ext_eapol_frame_io 1")
  2475. dev[0].request("SET ext_eapol_frame_io 1")
  2476. hapd.request("WPS_PBC")
  2477. dev[0].request("WPS_PBC")
  2478. ev = hapd.wait_event(["EAPOL-TX"], timeout=15)
  2479. if ev is None:
  2480. raise Exception("Timeout on EAPOL-TX from hostapd")
  2481. res = dev[0].request("EAPOL_RX " + bssid + " 020000040193000501FFFF")
  2482. if "OK" not in res:
  2483. raise Exception("EAPOL_RX to wpa_supplicant failed")
  2484. def test_ap_wps_iteration(dev, apdev):
  2485. """WPS PIN and iterate through APs without selected registrar"""
  2486. ssid = "test-wps-conf"
  2487. hapd = hostapd.add_ap(apdev[0]['ifname'],
  2488. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2489. "wpa_passphrase": "12345678", "wpa": "2",
  2490. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2491. ssid2 = "test-wps-conf2"
  2492. hapd2 = hostapd.add_ap(apdev[1]['ifname'],
  2493. { "ssid": ssid2, "eap_server": "1", "wps_state": "2",
  2494. "wpa_passphrase": "12345678", "wpa": "2",
  2495. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2496. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2497. dev[0].scan_for_bss(apdev[1]['bssid'], freq="2412")
  2498. dev[0].dump_monitor()
  2499. pin = dev[0].request("WPS_PIN any")
  2500. # Wait for iteration through all WPS APs to happen before enabling any
  2501. # Registrar.
  2502. for i in range(2):
  2503. ev = dev[0].wait_event(["Associated with"], timeout=30)
  2504. if ev is None:
  2505. raise Exception("No association seen")
  2506. ev = dev[0].wait_event(["WPS-M2D"], timeout=10)
  2507. if ev is None:
  2508. raise Exception("No M2D from AP")
  2509. dev[0].wait_disconnected()
  2510. # Verify that each AP requested PIN
  2511. ev = hapd.wait_event(["WPS-PIN-NEEDED"], timeout=1)
  2512. if ev is None:
  2513. raise Exception("No WPS-PIN-NEEDED event from AP")
  2514. ev = hapd2.wait_event(["WPS-PIN-NEEDED"], timeout=1)
  2515. if ev is None:
  2516. raise Exception("No WPS-PIN-NEEDED event from AP2")
  2517. # Provide PIN to one of the APs and verify that connection gets formed
  2518. hapd.request("WPS_PIN any " + pin)
  2519. dev[0].wait_connected(timeout=30)
  2520. def test_ap_wps_iteration_error(dev, apdev):
  2521. """WPS AP iteration on no Selected Registrar and error case with an AP"""
  2522. ssid = "test-wps-conf-pin"
  2523. hapd = hostapd.add_ap(apdev[0]['ifname'],
  2524. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2525. "wpa_passphrase": "12345678", "wpa": "2",
  2526. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  2527. "wps_independent": "1" })
  2528. hapd.request("SET ext_eapol_frame_io 1")
  2529. bssid = apdev[0]['bssid']
  2530. pin = dev[0].wps_read_pin()
  2531. dev[0].request("WPS_PIN any " + pin)
  2532. ev = hapd.wait_event(["EAPOL-TX"], timeout=15)
  2533. if ev is None:
  2534. raise Exception("No EAPOL-TX (EAP-Request/Identity) from hostapd")
  2535. dev[0].request("EAPOL_RX " + bssid + " " + ev.split(' ')[2])
  2536. ev = hapd.wait_event(["EAPOL-TX"], timeout=15)
  2537. if ev is None:
  2538. raise Exception("No EAPOL-TX (EAP-WSC/Start) from hostapd")
  2539. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED"], timeout=5)
  2540. if ev is None:
  2541. raise Exception("No CTRL-EVENT-EAP-STARTED")
  2542. # Do not forward any more EAPOL frames to test wpa_supplicant behavior for
  2543. # a case with an incorrectly behaving WPS AP.
  2544. # Start the real target AP and activate registrar on it.
  2545. hapd2 = hostapd.add_ap(apdev[1]['ifname'],
  2546. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2547. "wpa_passphrase": "12345678", "wpa": "2",
  2548. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  2549. "wps_independent": "1" })
  2550. hapd2.request("WPS_PIN any " + pin)
  2551. dev[0].wait_disconnected(timeout=15)
  2552. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED"], timeout=15)
  2553. if ev is None:
  2554. raise Exception("No CTRL-EVENT-EAP-STARTED for the second AP")
  2555. ev = dev[0].wait_event(["WPS-CRED-RECEIVED"], timeout=15)
  2556. if ev is None:
  2557. raise Exception("No WPS-CRED-RECEIVED for the second AP")
  2558. dev[0].wait_connected(timeout=15)
  2559. def test_ap_wps_priority(dev, apdev):
  2560. """WPS PIN provisioning with configured AP and wps_priority"""
  2561. ssid = "test-wps-conf-pin"
  2562. hostapd.add_ap(apdev[0]['ifname'],
  2563. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2564. "wpa_passphrase": "12345678", "wpa": "2",
  2565. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2566. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2567. logger.info("WPS provisioning step")
  2568. pin = dev[0].wps_read_pin()
  2569. hapd.request("WPS_PIN any " + pin)
  2570. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2571. dev[0].dump_monitor()
  2572. try:
  2573. dev[0].request("SET wps_priority 6")
  2574. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  2575. dev[0].wait_connected(timeout=30)
  2576. netw = dev[0].list_networks()
  2577. prio = dev[0].get_network(netw[0]['id'], 'priority')
  2578. if prio != '6':
  2579. raise Exception("Unexpected network priority: " + prio)
  2580. finally:
  2581. dev[0].request("SET wps_priority 0")
  2582. def test_ap_wps_and_non_wps(dev, apdev):
  2583. """WPS and non-WPS AP in single hostapd process"""
  2584. params = { "ssid": "wps", "eap_server": "1", "wps_state": "1" }
  2585. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  2586. params = { "ssid": "no wps" }
  2587. hapd2 = hostapd.add_ap(apdev[1]['ifname'], params)
  2588. appin = hapd.request("WPS_AP_PIN random")
  2589. if "FAIL" in appin:
  2590. raise Exception("Could not generate random AP PIN")
  2591. if appin not in hapd.request("WPS_AP_PIN get"):
  2592. raise Exception("Could not fetch current AP PIN")
  2593. if "FAIL" in hapd.request("WPS_PBC"):
  2594. raise Exception("WPS_PBC failed")
  2595. if "FAIL" in hapd.request("WPS_CANCEL"):
  2596. raise Exception("WPS_CANCEL failed")
  2597. def test_ap_wps_init_oom(dev, apdev):
  2598. """Initial AP configuration and OOM during PSK generation"""
  2599. ssid = "test-wps"
  2600. params = { "ssid": ssid, "eap_server": "1", "wps_state": "1" }
  2601. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  2602. with alloc_fail(hapd, 1, "base64_encode;wps_build_cred"):
  2603. pin = dev[0].wps_read_pin()
  2604. hapd.request("WPS_PIN any " + pin)
  2605. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2606. dev[0].request("WPS_PIN %s %s" % (apdev[0]['bssid'], pin))
  2607. dev[0].wait_disconnected()
  2608. hapd.request("WPS_PIN any " + pin)
  2609. dev[0].wait_connected(timeout=30)
  2610. def test_ap_wps_er_oom(dev, apdev):
  2611. """WPS ER OOM in XML processing"""
  2612. try:
  2613. _test_ap_wps_er_oom(dev, apdev)
  2614. finally:
  2615. dev[0].request("WPS_ER_STOP")
  2616. dev[1].request("WPS_CANCEL")
  2617. dev[0].request("DISCONNECT")
  2618. def _test_ap_wps_er_oom(dev, apdev):
  2619. ssid = "wps-er-ap-config"
  2620. ap_pin = "12345670"
  2621. ap_uuid = "27ea801a-9e5c-4e73-bd82-f89cbcd10d7e"
  2622. hostapd.add_ap(apdev[0]['ifname'],
  2623. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2624. "wpa_passphrase": "12345678", "wpa": "2",
  2625. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP",
  2626. "device_name": "Wireless AP", "manufacturer": "Company",
  2627. "model_name": "WAP", "model_number": "123",
  2628. "serial_number": "12345", "device_type": "6-0050F204-1",
  2629. "os_version": "01020300",
  2630. "config_methods": "label push_button",
  2631. "ap_pin": ap_pin, "uuid": ap_uuid, "upnp_iface": "lo"})
  2632. dev[0].connect(ssid, psk="12345678", scan_freq="2412")
  2633. with alloc_fail(dev[0], 1, "base64_decode;xml_get_base64_item"):
  2634. dev[0].request("WPS_ER_START ifname=lo")
  2635. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=3)
  2636. if ev is not None:
  2637. raise Exception("Unexpected AP discovery")
  2638. dev[0].request("WPS_ER_STOP")
  2639. dev[0].request("WPS_ER_START ifname=lo")
  2640. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=10)
  2641. if ev is None:
  2642. raise Exception("AP discovery timed out")
  2643. dev[1].scan_for_bss(apdev[0]['bssid'], freq=2412)
  2644. with alloc_fail(dev[0], 1, "base64_decode;xml_get_base64_item"):
  2645. dev[1].request("WPS_PBC " + apdev[0]['bssid'])
  2646. ev = dev[1].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
  2647. if ev is None:
  2648. raise Exception("PBC scan failed")
  2649. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=15)
  2650. if ev is None:
  2651. raise Exception("Enrollee discovery timed out")
  2652. def test_ap_wps_er_init_oom(dev, apdev):
  2653. """WPS ER and OOM during init"""
  2654. try:
  2655. _test_ap_wps_er_init_oom(dev, apdev)
  2656. finally:
  2657. dev[0].request("WPS_ER_STOP")
  2658. def _test_ap_wps_er_init_oom(dev, apdev):
  2659. with alloc_fail(dev[0], 1, "wps_er_init"):
  2660. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo"):
  2661. raise Exception("WPS_ER_START succeeded during OOM")
  2662. with alloc_fail(dev[0], 1, "http_server_init"):
  2663. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo"):
  2664. raise Exception("WPS_ER_START succeeded during OOM")
  2665. with alloc_fail(dev[0], 2, "http_server_init"):
  2666. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo"):
  2667. raise Exception("WPS_ER_START succeeded during OOM")
  2668. with alloc_fail(dev[0], 1, "eloop_register_sock;wps_er_ssdp_init"):
  2669. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo"):
  2670. raise Exception("WPS_ER_START succeeded during OOM")
  2671. with fail_test(dev[0], 1, "os_get_random;wps_er_init"):
  2672. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo"):
  2673. raise Exception("WPS_ER_START succeeded during os_get_random failure")
  2674. def test_ap_wps_wpa_cli_action(dev, apdev, test_params):
  2675. """WPS events and wpa_cli action script"""
  2676. logdir = os.path.abspath(test_params['logdir'])
  2677. pidfile = os.path.join(logdir, 'ap_wps_wpa_cli_action.wpa_cli.pid')
  2678. logfile = os.path.join(logdir, 'ap_wps_wpa_cli_action.wpa_cli.res')
  2679. actionfile = os.path.join(logdir, 'ap_wps_wpa_cli_action.wpa_cli.action.sh')
  2680. with open(actionfile, 'w') as f:
  2681. f.write('#!/bin/sh\n')
  2682. f.write('echo $* >> %s\n' % logfile)
  2683. # Kill the process and wait some time before returning to allow all the
  2684. # pending events to be processed with some of this happening after the
  2685. # eloop SIGALRM signal has been scheduled.
  2686. f.write('if [ $2 = "WPS-SUCCESS" -a -r %s ]; then kill `cat %s`; sleep 1; fi\n' % (pidfile, pidfile))
  2687. os.chmod(actionfile, stat.S_IREAD | stat.S_IWRITE | stat.S_IEXEC |
  2688. stat.S_IRGRP | stat.S_IXGRP | stat.S_IROTH | stat.S_IXOTH)
  2689. ssid = "test-wps-conf"
  2690. hostapd.add_ap(apdev[0]['ifname'],
  2691. { "ssid": ssid, "eap_server": "1", "wps_state": "2",
  2692. "wpa_passphrase": "12345678", "wpa": "2",
  2693. "wpa_key_mgmt": "WPA-PSK", "rsn_pairwise": "CCMP"})
  2694. hapd = hostapd.Hostapd(apdev[0]['ifname'])
  2695. prg = os.path.join(test_params['logdir'],
  2696. 'alt-wpa_supplicant/wpa_supplicant/wpa_cli')
  2697. if not os.path.exists(prg):
  2698. prg = '../../wpa_supplicant/wpa_cli'
  2699. arg = [ prg, '-P', pidfile, '-B', '-i', dev[0].ifname, '-a', actionfile ]
  2700. subprocess.call(arg)
  2701. arg = [ 'ps', 'ax' ]
  2702. cmd = subprocess.Popen(arg, stdout=subprocess.PIPE)
  2703. out = cmd.communicate()[0]
  2704. cmd.wait()
  2705. logger.debug("Processes:\n" + out)
  2706. if "wpa_cli -P %s -B -i %s" % (pidfile, dev[0].ifname) not in out:
  2707. raise Exception("Did not see wpa_cli running")
  2708. hapd.request("WPS_PIN any 12345670")
  2709. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  2710. dev[0].dump_monitor()
  2711. dev[0].request("WPS_PIN " + apdev[0]['bssid'] + " 12345670")
  2712. dev[0].wait_connected(timeout=30)
  2713. for i in range(30):
  2714. if not os.path.exists(pidfile):
  2715. break
  2716. time.sleep(0.1)
  2717. if not os.path.exists(logfile):
  2718. raise Exception("wpa_cli action results file not found")
  2719. with open(logfile, 'r') as f:
  2720. res = f.read()
  2721. if "WPS-SUCCESS" not in res:
  2722. raise Exception("WPS-SUCCESS event not seen in action file")
  2723. arg = [ 'ps', 'ax' ]
  2724. cmd = subprocess.Popen(arg, stdout=subprocess.PIPE)
  2725. out = cmd.communicate()[0]
  2726. cmd.wait()
  2727. logger.debug("Remaining processes:\n" + out)
  2728. if "wpa_cli -P %s -B -i %s" % (pidfile, dev[0].ifname) in out:
  2729. raise Exception("wpa_cli still running")
  2730. if os.path.exists(pidfile):
  2731. raise Exception("PID file not removed")
  2732. def test_ap_wps_er_ssdp_proto(dev, apdev):
  2733. """WPS ER SSDP protocol testing"""
  2734. try:
  2735. _test_ap_wps_er_ssdp_proto(dev, apdev)
  2736. finally:
  2737. dev[0].request("WPS_ER_STOP")
  2738. def _test_ap_wps_er_ssdp_proto(dev, apdev):
  2739. socket.setdefaulttimeout(1)
  2740. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  2741. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  2742. sock.bind(("239.255.255.250", 1900))
  2743. if "FAIL" not in dev[0].request("WPS_ER_START ifname=lo foo"):
  2744. raise Exception("Invalid filter accepted")
  2745. if "OK" not in dev[0].request("WPS_ER_START ifname=lo 1.2.3.4"):
  2746. raise Exception("WPS_ER_START with filter failed")
  2747. (msg,addr) = sock.recvfrom(1000)
  2748. logger.debug("Received SSDP message from %s: %s" % (str(addr), msg))
  2749. if "M-SEARCH" not in msg:
  2750. raise Exception("Not an M-SEARCH")
  2751. sock.sendto("FOO", addr)
  2752. time.sleep(0.1)
  2753. dev[0].request("WPS_ER_STOP")
  2754. dev[0].request("WPS_ER_START ifname=lo")
  2755. (msg,addr) = sock.recvfrom(1000)
  2756. logger.debug("Received SSDP message from %s: %s" % (str(addr), msg))
  2757. if "M-SEARCH" not in msg:
  2758. raise Exception("Not an M-SEARCH")
  2759. sock.sendto("FOO", addr)
  2760. sock.sendto("HTTP/1.1 200 OK\r\nFOO\r\n\r\n", addr)
  2761. sock.sendto("HTTP/1.1 200 OK\r\nNTS:foo\r\n\r\n", addr)
  2762. sock.sendto("HTTP/1.1 200 OK\r\nNTS:ssdp:byebye\r\n\r\n", addr)
  2763. sock.sendto("HTTP/1.1 200 OK\r\ncache-control: foo=1\r\n\r\n", addr)
  2764. sock.sendto("HTTP/1.1 200 OK\r\ncache-control: max-age=1\r\n\r\n", addr)
  2765. sock.sendto("HTTP/1.1 200 OK\r\nusn:\r\n\r\n", addr)
  2766. sock.sendto("HTTP/1.1 200 OK\r\nusn:foo\r\n\r\n", addr)
  2767. sock.sendto("HTTP/1.1 200 OK\r\nusn: uuid:\r\n\r\n", addr)
  2768. sock.sendto("HTTP/1.1 200 OK\r\nusn: uuid: \r\n\r\n", addr)
  2769. sock.sendto("HTTP/1.1 200 OK\r\nusn: uuid: foo\r\n\r\n", addr)
  2770. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\n\r\n", addr)
  2771. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nNTS:ssdp:byebye\r\n\r\n", addr)
  2772. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:foo\r\n\r\n", addr)
  2773. with alloc_fail(dev[0], 1, "wps_er_ap_add"):
  2774. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:foo\r\ncache-control:max-age=1\r\n\r\n", addr)
  2775. time.sleep(0.1)
  2776. with alloc_fail(dev[0], 2, "wps_er_ap_add"):
  2777. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:foo\r\ncache-control:max-age=1\r\n\r\n", addr)
  2778. time.sleep(0.1)
  2779. # Add an AP with bogus URL
  2780. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:foo\r\ncache-control:max-age=1\r\n\r\n", addr)
  2781. # Update timeout on AP without updating URL
  2782. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:http://127.0.0.1:12345/foo.xml\r\ncache-control:max-age=1\r\n\r\n", addr)
  2783. ev = dev[0].wait_event(["WPS-ER-AP-REMOVE"], timeout=5)
  2784. if ev is None:
  2785. raise Exception("No WPS-ER-AP-REMOVE event on max-age timeout")
  2786. # Add an AP with a valid URL (but no server listing to it)
  2787. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:http://127.0.0.1:12345/foo.xml\r\ncache-control:max-age=1\r\n\r\n", addr)
  2788. ev = dev[0].wait_event(["WPS-ER-AP-REMOVE"], timeout=5)
  2789. if ev is None:
  2790. raise Exception("No WPS-ER-AP-REMOVE event on max-age timeout")
  2791. sock.close()
  2792. wps_event_url = None
  2793. def gen_upnp_info(eventSubURL='wps_event', controlURL='wps_control',
  2794. udn='uuid:27ea801a-9e5c-4e73-bd82-f89cbcd10d7e'):
  2795. payload = '''<?xml version="1.0"?>
  2796. <root xmlns="urn:schemas-upnp-org:device-1-0">
  2797. <specVersion>
  2798. <major>1</major>
  2799. <minor>0</minor>
  2800. </specVersion>
  2801. <device>
  2802. <deviceType>urn:schemas-wifialliance-org:device:WFADevice:1</deviceType>
  2803. <friendlyName>WPS Access Point</friendlyName>
  2804. <manufacturer>Company</manufacturer>
  2805. <modelName>WAP</modelName>
  2806. <modelNumber>123</modelNumber>
  2807. <serialNumber>12345</serialNumber>
  2808. '''
  2809. if udn:
  2810. payload += '<UDN>' + udn + '</UDN>'
  2811. payload += '''<serviceList>
  2812. <service>
  2813. <serviceType>urn:schemas-wifialliance-org:service:WFAWLANConfig:1</serviceType>
  2814. <serviceId>urn:wifialliance-org:serviceId:WFAWLANConfig1</serviceId>
  2815. <SCPDURL>wps_scpd.xml</SCPDURL>
  2816. '''
  2817. if controlURL:
  2818. payload += '<controlURL>' + controlURL + '</controlURL>\n'
  2819. if eventSubURL:
  2820. payload += '<eventSubURL>' + eventSubURL + '</eventSubURL>\n'
  2821. payload += '''</service>
  2822. </serviceList>
  2823. </device>
  2824. </root>
  2825. '''
  2826. hdr = 'HTTP/1.1 200 OK\r\n' + \
  2827. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  2828. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  2829. 'Connection: close\r\n' + \
  2830. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  2831. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  2832. return hdr + payload
  2833. def gen_wps_control(payload_override=None):
  2834. payload = '''<?xml version="1.0"?>
  2835. <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
  2836. <s:Body>
  2837. <u:GetDeviceInfoResponse xmlns:u="urn:schemas-wifialliance-org:service:WFAWLANConfig:1">
  2838. <NewDeviceInfo>EEoAARAQIgABBBBHABAn6oAanlxOc72C+Jy80Q1+ECAABgIAAAADABAaABCJZ7DPtbU3Ust9
  2839. Z3wJF07WEDIAwH45D3i1OqB7eJGwTzqeapS71h3KyXncK2xJZ+xqScrlorNEg6LijBJzG2Ca
  2840. +FZli0iliDJd397yAx/jk4nFXco3q5ylBSvSw9dhJ5u1xBKSnTilKGlUHPhLP75PUqM3fot9
  2841. 7zwtFZ4bx6x1sBA6oEe2d0aUJmLumQGCiKEIWlnxs44zego/2tAe81bDzdPBM7o5HH/FUhD+
  2842. KoGzFXp51atP+1n9Vta6AkI0Vye99JKLcC6Md9dMJltSVBgd4Xc4lRAEAAIAIxAQAAIADRAN
  2843. AAEBEAgAAgAEEEQAAQIQIQAHQ29tcGFueRAjAANXQVAQJAADMTIzEEIABTEyMzQ1EFQACAAG
  2844. AFDyBAABEBEAC1dpcmVsZXNzIEFQEDwAAQEQAgACAAAQEgACAAAQCQACAAAQLQAEgQIDABBJ
  2845. AAYANyoAASA=
  2846. </NewDeviceInfo>
  2847. </u:GetDeviceInfoResponse>
  2848. </s:Body>
  2849. </s:Envelope>
  2850. '''
  2851. if payload_override:
  2852. payload = payload_override
  2853. hdr = 'HTTP/1.1 200 OK\r\n' + \
  2854. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  2855. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  2856. 'Connection: close\r\n' + \
  2857. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  2858. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  2859. return hdr + payload
  2860. def gen_wps_event(sid='uuid:7eb3342a-8a5f-47fe-a585-0785bfec6d8a'):
  2861. payload = ""
  2862. hdr = 'HTTP/1.1 200 OK\r\n' + \
  2863. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  2864. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  2865. 'Connection: close\r\n' + \
  2866. 'Content-Length: ' + str(len(payload)) + '\r\n'
  2867. if sid:
  2868. hdr += 'SID: ' + sid + '\r\n'
  2869. hdr += 'Timeout: Second-1801\r\n' + \
  2870. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  2871. return hdr + payload
  2872. class WPSAPHTTPServer(SocketServer.StreamRequestHandler):
  2873. def handle(self):
  2874. data = self.rfile.readline().strip()
  2875. logger.info("HTTP server received: " + data)
  2876. while True:
  2877. hdr = self.rfile.readline().strip()
  2878. if len(hdr) == 0:
  2879. break
  2880. logger.info("HTTP header: " + hdr)
  2881. if "CALLBACK:" in hdr:
  2882. global wps_event_url
  2883. wps_event_url = hdr.split(' ')[1].strip('<>')
  2884. if "GET /foo.xml" in data:
  2885. self.handle_upnp_info()
  2886. elif "POST /wps_control" in data:
  2887. self.handle_wps_control()
  2888. elif "SUBSCRIBE /wps_event" in data:
  2889. self.handle_wps_event()
  2890. def handle_upnp_info(self):
  2891. self.wfile.write(gen_upnp_info())
  2892. def handle_wps_control(self):
  2893. self.wfile.write(gen_wps_control())
  2894. def handle_wps_event(self):
  2895. self.wfile.write(gen_wps_event())
  2896. class MyTCPServer(SocketServer.TCPServer):
  2897. def __init__(self, addr, handler):
  2898. self.allow_reuse_address = True
  2899. SocketServer.TCPServer.__init__(self, addr, handler)
  2900. def wps_er_start(dev, http_server, max_age=1):
  2901. socket.setdefaulttimeout(1)
  2902. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
  2903. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  2904. sock.bind(("239.255.255.250", 1900))
  2905. dev.request("WPS_ER_START ifname=lo")
  2906. (msg,addr) = sock.recvfrom(1000)
  2907. logger.debug("Received SSDP message from %s: %s" % (str(addr), msg))
  2908. if "M-SEARCH" not in msg:
  2909. raise Exception("Not an M-SEARCH")
  2910. # Add an AP with a valid URL and server listing to it
  2911. server = MyTCPServer(("127.0.0.1", 12345), http_server)
  2912. sock.sendto("HTTP/1.1 200 OK\r\nST: urn:schemas-wifialliance-org:device:WFADevice:1\r\nlocation:http://127.0.0.1:12345/foo.xml\r\ncache-control:max-age=%d\r\n\r\n" % max_age, addr)
  2913. server.timeout = 1
  2914. return server,sock
  2915. def wps_er_stop(dev, sock, server, on_alloc_fail=False):
  2916. sock.close()
  2917. server.server_close()
  2918. if on_alloc_fail:
  2919. done = False
  2920. for i in range(50):
  2921. res = dev.request("GET_ALLOC_FAIL")
  2922. if res.startswith("0:"):
  2923. done = True
  2924. break
  2925. time.sleep(0.1)
  2926. if not done:
  2927. raise Exception("No allocation failure reported")
  2928. else:
  2929. ev = dev.wait_event(["WPS-ER-AP-REMOVE"], timeout=5)
  2930. if ev is None:
  2931. raise Exception("No WPS-ER-AP-REMOVE event on max-age timeout")
  2932. dev.request("WPS_ER_STOP")
  2933. def run_wps_er_proto_test(dev, handler, no_event_url=False):
  2934. try:
  2935. uuid = '27ea801a-9e5c-4e73-bd82-f89cbcd10d7e'
  2936. server,sock = wps_er_start(dev, handler)
  2937. global wps_event_url
  2938. wps_event_url = None
  2939. server.handle_request()
  2940. server.handle_request()
  2941. server.handle_request()
  2942. server.server_close()
  2943. if no_event_url:
  2944. if wps_event_url:
  2945. raise Exception("Received event URL unexpectedly")
  2946. return
  2947. if wps_event_url is None:
  2948. raise Exception("Did not get event URL")
  2949. logger.info("Event URL: " + wps_event_url)
  2950. finally:
  2951. dev.request("WPS_ER_STOP")
  2952. def send_wlanevent(url, uuid, data):
  2953. conn = httplib.HTTPConnection(url.netloc)
  2954. payload = '''<?xml version="1.0" encoding="utf-8"?>
  2955. <e:propertyset xmlns:e="urn:schemas-upnp-org:event-1-0">
  2956. <e:property><STAStatus>1</STAStatus></e:property>
  2957. <e:property><APStatus>1</APStatus></e:property>
  2958. <e:property><WLANEvent>'''
  2959. payload += base64.b64encode(data)
  2960. payload += '</WLANEvent></e:property></e:propertyset>'
  2961. headers = { "Content-type": 'text/xml; charset="utf-8"',
  2962. "Server": "Unspecified, UPnP/1.0, Unspecified",
  2963. "HOST": url.netloc,
  2964. "NT": "upnp:event",
  2965. "SID": "uuid:" + uuid,
  2966. "SEQ": "0",
  2967. "Content-Length": str(len(payload)) }
  2968. conn.request("NOTIFY", url.path, payload, headers)
  2969. resp = conn.getresponse()
  2970. if resp.status != 200:
  2971. raise Exception("Unexpected HTTP response: %d" % resp.status)
  2972. def test_ap_wps_er_http_proto(dev, apdev):
  2973. """WPS ER HTTP protocol testing"""
  2974. try:
  2975. _test_ap_wps_er_http_proto(dev, apdev)
  2976. finally:
  2977. dev[0].request("WPS_ER_STOP")
  2978. def _test_ap_wps_er_http_proto(dev, apdev):
  2979. uuid = '27ea801a-9e5c-4e73-bd82-f89cbcd10d7e'
  2980. server,sock = wps_er_start(dev[0], WPSAPHTTPServer, max_age=15)
  2981. global wps_event_url
  2982. wps_event_url = None
  2983. server.handle_request()
  2984. server.handle_request()
  2985. server.handle_request()
  2986. server.server_close()
  2987. if wps_event_url is None:
  2988. raise Exception("Did not get event URL")
  2989. logger.info("Event URL: " + wps_event_url)
  2990. ev = dev[0].wait_event(["WPS-ER-AP-ADD"], timeout=10)
  2991. if ev is None:
  2992. raise Exception("No WPS-ER-AP-ADD event")
  2993. if uuid not in ev:
  2994. raise Exception("UUID mismatch")
  2995. sock.close()
  2996. logger.info("Valid Probe Request notification")
  2997. url = urlparse.urlparse(wps_event_url)
  2998. conn = httplib.HTTPConnection(url.netloc)
  2999. payload = '''<?xml version="1.0" encoding="utf-8"?>
  3000. <e:propertyset xmlns:e="urn:schemas-upnp-org:event-1-0">
  3001. <e:property><STAStatus>1</STAStatus></e:property>
  3002. <e:property><APStatus>1</APStatus></e:property>
  3003. <e:property><WLANEvent>ATAyOjAwOjAwOjAwOjAwOjAwEEoAARAQOgABAhAIAAIxSBBHABA2LbR7pTpRkYj7VFi5hrLk
  3004. EFQACAAAAAAAAAAAEDwAAQMQAgACAAAQCQACAAAQEgACAAAQIQABIBAjAAEgECQAASAQEQAI
  3005. RGV2aWNlIEEQSQAGADcqAAEg
  3006. </WLANEvent></e:property>
  3007. </e:propertyset>
  3008. '''
  3009. headers = { "Content-type": 'text/xml; charset="utf-8"',
  3010. "Server": "Unspecified, UPnP/1.0, Unspecified",
  3011. "HOST": url.netloc,
  3012. "NT": "upnp:event",
  3013. "SID": "uuid:" + uuid,
  3014. "SEQ": "0",
  3015. "Content-Length": str(len(payload)) }
  3016. conn.request("NOTIFY", url.path, payload, headers)
  3017. resp = conn.getresponse()
  3018. if resp.status != 200:
  3019. raise Exception("Unexpected HTTP response: %d" % resp.status)
  3020. ev = dev[0].wait_event(["WPS-ER-ENROLLEE-ADD"], timeout=5)
  3021. if ev is None:
  3022. raise Exception("No WPS-ER-ENROLLEE-ADD event")
  3023. if "362db47b-a53a-5191-88fb-5458b986b2e4" not in ev:
  3024. raise Exception("No Enrollee UUID match")
  3025. logger.info("Incorrect event URL AP id")
  3026. conn = httplib.HTTPConnection(url.netloc)
  3027. conn.request("NOTIFY", url.path + '123', payload, headers)
  3028. resp = conn.getresponse()
  3029. if resp.status != 404:
  3030. raise Exception("Unexpected HTTP response: %d" % resp.status)
  3031. logger.info("Missing AP id")
  3032. conn = httplib.HTTPConnection(url.netloc)
  3033. conn.request("NOTIFY", '/event/' + url.path.split('/')[2],
  3034. payload, headers)
  3035. time.sleep(0.1)
  3036. logger.info("Incorrect event URL event id")
  3037. conn = httplib.HTTPConnection(url.netloc)
  3038. conn.request("NOTIFY", '/event/123456789/123', payload, headers)
  3039. time.sleep(0.1)
  3040. logger.info("Incorrect event URL prefix")
  3041. conn = httplib.HTTPConnection(url.netloc)
  3042. conn.request("NOTIFY", '/foobar/123456789/123', payload, headers)
  3043. resp = conn.getresponse()
  3044. if resp.status != 404:
  3045. raise Exception("Unexpected HTTP response: %d" % resp.status)
  3046. logger.info("Unsupported request")
  3047. conn = httplib.HTTPConnection(url.netloc)
  3048. conn.request("FOOBAR", '/foobar/123456789/123', payload, headers)
  3049. resp = conn.getresponse()
  3050. if resp.status != 501:
  3051. raise Exception("Unexpected HTTP response: %d" % resp.status)
  3052. logger.info("Unsupported request and OOM")
  3053. with alloc_fail(dev[0], 1, "wps_er_http_req"):
  3054. conn = httplib.HTTPConnection(url.netloc)
  3055. conn.request("FOOBAR", '/foobar/123456789/123', payload, headers)
  3056. time.sleep(0.5)
  3057. logger.info("Too short WLANEvent")
  3058. data = '\x00'
  3059. send_wlanevent(url, uuid, data)
  3060. logger.info("Invalid WLANEventMAC")
  3061. data = '\x00qwertyuiopasdfghjklzxcvbnm'
  3062. send_wlanevent(url, uuid, data)
  3063. logger.info("Unknown WLANEventType")
  3064. data = '\xff02:00:00:00:00:00'
  3065. send_wlanevent(url, uuid, data)
  3066. logger.info("Probe Request notification without any attributes")
  3067. data = '\x0102:00:00:00:00:00'
  3068. send_wlanevent(url, uuid, data)
  3069. logger.info("Probe Request notification with invalid attribute")
  3070. data = '\x0102:00:00:00:00:00\xff'
  3071. send_wlanevent(url, uuid, data)
  3072. logger.info("EAP message without any attributes")
  3073. data = '\x0202:00:00:00:00:00'
  3074. send_wlanevent(url, uuid, data)
  3075. logger.info("EAP message with invalid attribute")
  3076. data = '\x0202:00:00:00:00:00\xff'
  3077. send_wlanevent(url, uuid, data)
  3078. logger.info("EAP message from new STA and not M1")
  3079. data = '\x0202:ff:ff:ff:ff:ff' + '\x10\x22\x00\x01\x05'
  3080. send_wlanevent(url, uuid, data)
  3081. logger.info("EAP message: M1")
  3082. data = '\x0202:00:00:00:00:00'
  3083. data += '\x10\x22\x00\x01\x04'
  3084. data += '\x10\x47\x00\x10' + 16*'\x00'
  3085. data += '\x10\x20\x00\x06\x02\x00\x00\x00\x00\x00'
  3086. data += '\x10\x1a\x00\x10' + 16*'\x00'
  3087. data += '\x10\x32\x00\xc0' + 192*'\x00'
  3088. data += '\x10\x04\x00\x02\x00\x00'
  3089. data += '\x10\x10\x00\x02\x00\x00'
  3090. data += '\x10\x0d\x00\x01\x00'
  3091. data += '\x10\x08\x00\x02\x00\x00'
  3092. data += '\x10\x44\x00\x01\x00'
  3093. data += '\x10\x21\x00\x00'
  3094. data += '\x10\x23\x00\x00'
  3095. data += '\x10\x24\x00\x00'
  3096. data += '\x10\x42\x00\x00'
  3097. data += '\x10\x54\x00\x08' + 8*'\x00'
  3098. data += '\x10\x11\x00\x00'
  3099. data += '\x10\x3c\x00\x01\x00'
  3100. data += '\x10\x02\x00\x02\x00\x00'
  3101. data += '\x10\x12\x00\x02\x00\x00'
  3102. data += '\x10\x09\x00\x02\x00\x00'
  3103. data += '\x10\x2d\x00\x04\x00\x00\x00\x00'
  3104. m1 = data
  3105. send_wlanevent(url, uuid, data)
  3106. logger.info("EAP message: WSC_ACK")
  3107. data = '\x0202:00:00:00:00:00' + '\x10\x22\x00\x01\x0d'
  3108. send_wlanevent(url, uuid, data)
  3109. logger.info("EAP message: M1")
  3110. send_wlanevent(url, uuid, m1)
  3111. logger.info("EAP message: WSC_NACK")
  3112. data = '\x0202:00:00:00:00:00' + '\x10\x22\x00\x01\x0e'
  3113. send_wlanevent(url, uuid, data)
  3114. logger.info("EAP message: M1 - Too long attribute values")
  3115. data = '\x0202:00:00:00:00:00'
  3116. data += '\x10\x11\x00\x21' + 33*'\x00'
  3117. data += '\x10\x45\x00\x21' + 33*'\x00'
  3118. data += '\x10\x42\x00\x21' + 33*'\x00'
  3119. data += '\x10\x24\x00\x21' + 33*'\x00'
  3120. data += '\x10\x23\x00\x21' + 33*'\x00'
  3121. data += '\x10\x21\x00\x41' + 65*'\x00'
  3122. data += '\x10\x49\x00\x09\x00\x37\x2a\x05\x02\x00\x00\x05\x00'
  3123. send_wlanevent(url, uuid, data)
  3124. logger.info("EAP message: M1 missing UUID-E")
  3125. data = '\x0202:00:00:00:00:00'
  3126. data += '\x10\x22\x00\x01\x04'
  3127. send_wlanevent(url, uuid, data)
  3128. logger.info("EAP message: M1 missing MAC Address")
  3129. data += '\x10\x47\x00\x10' + 16*'\x00'
  3130. send_wlanevent(url, uuid, data)
  3131. logger.info("EAP message: M1 missing Enrollee Nonce")
  3132. data += '\x10\x20\x00\x06\x02\x00\x00\x00\x00\x00'
  3133. send_wlanevent(url, uuid, data)
  3134. logger.info("EAP message: M1 missing Public Key")
  3135. data += '\x10\x1a\x00\x10' + 16*'\x00'
  3136. send_wlanevent(url, uuid, data)
  3137. logger.info("EAP message: M1 missing Authentication Type flags")
  3138. data += '\x10\x32\x00\xc0' + 192*'\x00'
  3139. send_wlanevent(url, uuid, data)
  3140. logger.info("EAP message: M1 missing Encryption Type Flags")
  3141. data += '\x10\x04\x00\x02\x00\x00'
  3142. send_wlanevent(url, uuid, data)
  3143. logger.info("EAP message: M1 missing Connection Type flags")
  3144. data += '\x10\x10\x00\x02\x00\x00'
  3145. send_wlanevent(url, uuid, data)
  3146. logger.info("EAP message: M1 missing Config Methods")
  3147. data += '\x10\x0d\x00\x01\x00'
  3148. send_wlanevent(url, uuid, data)
  3149. logger.info("EAP message: M1 missing Wi-Fi Protected Setup State")
  3150. data += '\x10\x08\x00\x02\x00\x00'
  3151. send_wlanevent(url, uuid, data)
  3152. logger.info("EAP message: M1 missing Manufacturer")
  3153. data += '\x10\x44\x00\x01\x00'
  3154. send_wlanevent(url, uuid, data)
  3155. logger.info("EAP message: M1 missing Model Name")
  3156. data += '\x10\x21\x00\x00'
  3157. send_wlanevent(url, uuid, data)
  3158. logger.info("EAP message: M1 missing Model Number")
  3159. data += '\x10\x23\x00\x00'
  3160. send_wlanevent(url, uuid, data)
  3161. logger.info("EAP message: M1 missing Serial Number")
  3162. data += '\x10\x24\x00\x00'
  3163. send_wlanevent(url, uuid, data)
  3164. logger.info("EAP message: M1 missing Primary Device Type")
  3165. data += '\x10\x42\x00\x00'
  3166. send_wlanevent(url, uuid, data)
  3167. logger.info("EAP message: M1 missing Device Name")
  3168. data += '\x10\x54\x00\x08' + 8*'\x00'
  3169. send_wlanevent(url, uuid, data)
  3170. logger.info("EAP message: M1 missing RF Bands")
  3171. data += '\x10\x11\x00\x00'
  3172. send_wlanevent(url, uuid, data)
  3173. logger.info("EAP message: M1 missing Association State")
  3174. data += '\x10\x3c\x00\x01\x00'
  3175. send_wlanevent(url, uuid, data)
  3176. logger.info("EAP message: M1 missing Device Password ID")
  3177. data += '\x10\x02\x00\x02\x00\x00'
  3178. send_wlanevent(url, uuid, data)
  3179. logger.info("EAP message: M1 missing Configuration Error")
  3180. data += '\x10\x12\x00\x02\x00\x00'
  3181. send_wlanevent(url, uuid, data)
  3182. logger.info("EAP message: M1 missing OS Version")
  3183. data += '\x10\x09\x00\x02\x00\x00'
  3184. send_wlanevent(url, uuid, data)
  3185. def test_ap_wps_er_http_proto_no_event_sub_url(dev, apdev):
  3186. """WPS ER HTTP protocol testing - no eventSubURL"""
  3187. class WPSAPHTTPServer_no_event_sub_url(WPSAPHTTPServer):
  3188. def handle_upnp_info(self):
  3189. self.wfile.write(gen_upnp_info(eventSubURL=None))
  3190. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_no_event_sub_url,
  3191. no_event_url=True)
  3192. def test_ap_wps_er_http_proto_event_sub_url_dns(dev, apdev):
  3193. """WPS ER HTTP protocol testing - DNS name in eventSubURL"""
  3194. class WPSAPHTTPServer_event_sub_url_dns(WPSAPHTTPServer):
  3195. def handle_upnp_info(self):
  3196. self.wfile.write(gen_upnp_info(eventSubURL='http://example.com/wps_event'))
  3197. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_event_sub_url_dns,
  3198. no_event_url=True)
  3199. def test_ap_wps_er_http_proto_subscribe_oom(dev, apdev):
  3200. """WPS ER HTTP protocol testing - subscribe OOM"""
  3201. try:
  3202. _test_ap_wps_er_http_proto_subscribe_oom(dev, apdev)
  3203. finally:
  3204. dev[0].request("WPS_ER_STOP")
  3205. def _test_ap_wps_er_http_proto_subscribe_oom(dev, apdev):
  3206. tests = [ (1, "http_client_url_parse"),
  3207. (1, "wpabuf_alloc;wps_er_subscribe"),
  3208. (1, "http_client_addr"),
  3209. (1, "eloop_register_sock;http_client_addr"),
  3210. (1, "eloop_register_timeout;http_client_addr") ]
  3211. for count,func in tests:
  3212. with alloc_fail(dev[0], count, func):
  3213. server,sock = wps_er_start(dev[0], WPSAPHTTPServer)
  3214. server.handle_request()
  3215. server.handle_request()
  3216. wps_er_stop(dev[0], sock, server, on_alloc_fail=True)
  3217. def test_ap_wps_er_http_proto_no_sid(dev, apdev):
  3218. """WPS ER HTTP protocol testing - no SID"""
  3219. class WPSAPHTTPServer_no_sid(WPSAPHTTPServer):
  3220. def handle_wps_event(self):
  3221. self.wfile.write(gen_wps_event(sid=None))
  3222. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_no_sid)
  3223. def test_ap_wps_er_http_proto_invalid_sid_no_uuid(dev, apdev):
  3224. """WPS ER HTTP protocol testing - invalid SID - no UUID"""
  3225. class WPSAPHTTPServer_invalid_sid_no_uuid(WPSAPHTTPServer):
  3226. def handle_wps_event(self):
  3227. self.wfile.write(gen_wps_event(sid='FOO'))
  3228. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_invalid_sid_no_uuid)
  3229. def test_ap_wps_er_http_proto_invalid_sid_uuid(dev, apdev):
  3230. """WPS ER HTTP protocol testing - invalid SID UUID"""
  3231. class WPSAPHTTPServer_invalid_sid_uuid(WPSAPHTTPServer):
  3232. def handle_wps_event(self):
  3233. self.wfile.write(gen_wps_event(sid='uuid:FOO'))
  3234. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_invalid_sid_uuid)
  3235. def test_ap_wps_er_http_proto_subscribe_failing(dev, apdev):
  3236. """WPS ER HTTP protocol testing - SUBSCRIBE failing"""
  3237. class WPSAPHTTPServer_fail_subscribe(WPSAPHTTPServer):
  3238. def handle_wps_event(self):
  3239. payload = ""
  3240. hdr = 'HTTP/1.1 404 Not Found\r\n' + \
  3241. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  3242. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  3243. 'Connection: close\r\n' + \
  3244. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  3245. 'Timeout: Second-1801\r\n' + \
  3246. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  3247. self.wfile.write(hdr + payload)
  3248. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_fail_subscribe)
  3249. def test_ap_wps_er_http_proto_subscribe_invalid_response(dev, apdev):
  3250. """WPS ER HTTP protocol testing - SUBSCRIBE and invalid response"""
  3251. class WPSAPHTTPServer_subscribe_invalid_response(WPSAPHTTPServer):
  3252. def handle_wps_event(self):
  3253. payload = ""
  3254. hdr = 'HTTP/1.1 FOO\r\n' + \
  3255. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  3256. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  3257. 'Connection: close\r\n' + \
  3258. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  3259. 'Timeout: Second-1801\r\n' + \
  3260. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  3261. self.wfile.write(hdr + payload)
  3262. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_subscribe_invalid_response)
  3263. def test_ap_wps_er_http_proto_subscribe_invalid_response(dev, apdev):
  3264. """WPS ER HTTP protocol testing - SUBSCRIBE and invalid response"""
  3265. class WPSAPHTTPServer_invalid_m1(WPSAPHTTPServer):
  3266. def handle_wps_control(self):
  3267. payload = '''<?xml version="1.0"?>
  3268. <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
  3269. <s:Body>
  3270. <u:GetDeviceInfoResponse xmlns:u="urn:schemas-wifialliance-org:service:WFAWLANConfig:1">
  3271. <NewDeviceInfo>Rk9P</NewDeviceInfo>
  3272. </u:GetDeviceInfoResponse>
  3273. </s:Body>
  3274. </s:Envelope>
  3275. '''
  3276. self.wfile.write(gen_wps_control(payload_override=payload))
  3277. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_invalid_m1, no_event_url=True)
  3278. def test_ap_wps_er_http_proto_upnp_info_no_device(dev, apdev):
  3279. """WPS ER HTTP protocol testing - No device in UPnP info"""
  3280. class WPSAPHTTPServer_no_device(WPSAPHTTPServer):
  3281. def handle_upnp_info(self):
  3282. payload = '''<?xml version="1.0"?>
  3283. <root xmlns="urn:schemas-upnp-org:device-1-0">
  3284. <specVersion>
  3285. <major>1</major>
  3286. <minor>0</minor>
  3287. </specVersion>
  3288. </root>
  3289. '''
  3290. hdr = 'HTTP/1.1 200 OK\r\n' + \
  3291. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  3292. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  3293. 'Connection: close\r\n' + \
  3294. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  3295. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  3296. self.wfile.write(hdr + payload)
  3297. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_no_device, no_event_url=True)
  3298. def test_ap_wps_er_http_proto_upnp_info_no_device_type(dev, apdev):
  3299. """WPS ER HTTP protocol testing - No deviceType in UPnP info"""
  3300. class WPSAPHTTPServer_no_device(WPSAPHTTPServer):
  3301. def handle_upnp_info(self):
  3302. payload = '''<?xml version="1.0"?>
  3303. <root xmlns="urn:schemas-upnp-org:device-1-0">
  3304. <specVersion>
  3305. <major>1</major>
  3306. <minor>0</minor>
  3307. </specVersion>
  3308. <device>
  3309. </device>
  3310. </root>
  3311. '''
  3312. hdr = 'HTTP/1.1 200 OK\r\n' + \
  3313. 'Content-Type: text/xml; charset="utf-8"\r\n' + \
  3314. 'Server: Unspecified, UPnP/1.0, Unspecified\r\n' + \
  3315. 'Connection: close\r\n' + \
  3316. 'Content-Length: ' + str(len(payload)) + '\r\n' + \
  3317. 'Date: Sat, 15 Aug 2015 18:55:08 GMT\r\n\r\n'
  3318. self.wfile.write(hdr + payload)
  3319. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_no_device, no_event_url=True)
  3320. def test_ap_wps_er_http_proto_upnp_info_invalid_udn_uuid(dev, apdev):
  3321. """WPS ER HTTP protocol testing - Invalid UDN UUID"""
  3322. class WPSAPHTTPServer_invalid_udn_uuid(WPSAPHTTPServer):
  3323. def handle_upnp_info(self):
  3324. self.wfile.write(gen_upnp_info(udn='uuid:foo'))
  3325. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_invalid_udn_uuid)
  3326. def test_ap_wps_er_http_proto_no_control_url(dev, apdev):
  3327. """WPS ER HTTP protocol testing - no controlURL"""
  3328. class WPSAPHTTPServer_no_control_url(WPSAPHTTPServer):
  3329. def handle_upnp_info(self):
  3330. self.wfile.write(gen_upnp_info(controlURL=None))
  3331. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_no_control_url,
  3332. no_event_url=True)
  3333. def test_ap_wps_er_http_proto_control_url_dns(dev, apdev):
  3334. """WPS ER HTTP protocol testing - DNS name in controlURL"""
  3335. class WPSAPHTTPServer_control_url_dns(WPSAPHTTPServer):
  3336. def handle_upnp_info(self):
  3337. self.wfile.write(gen_upnp_info(controlURL='http://example.com/wps_control'))
  3338. run_wps_er_proto_test(dev[0], WPSAPHTTPServer_control_url_dns,
  3339. no_event_url=True)