test_connect_cmd.py 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. #!/usr/bin/python
  2. #
  3. # cfg80211 connect command (SME in the driver/firmware)
  4. # Copyright (c) 2013, Jouni Malinen <j@w1.fi>
  5. #
  6. # This software may be distributed under the terms of the BSD license.
  7. # See README for more details.
  8. import logging
  9. logger = logging.getLogger()
  10. import time
  11. import hwsim_utils
  12. import hostapd
  13. from wpasupplicant import WpaSupplicant
  14. from test_p2p_grpform import go_neg_pin_authorized
  15. from test_p2p_grpform import check_grpform_results
  16. from test_p2p_grpform import remove_group
  17. def test_connect_cmd_open(dev, apdev):
  18. """Open connection using cfg80211 connect command"""
  19. params = { "ssid": "sta-connect" }
  20. hostapd.add_ap(apdev[0]['ifname'], params)
  21. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  22. wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
  23. wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412")
  24. wpas.request("DISCONNECT")
  25. def test_connect_cmd_wpa2_psk(dev, apdev):
  26. """WPA2-PSK connection using cfg80211 connect command"""
  27. params = hostapd.wpa2_params(ssid="sta-connect", passphrase="12345678")
  28. hostapd.add_ap(apdev[0]['ifname'], params)
  29. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  30. wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
  31. wpas.connect("sta-connect", psk="12345678", scan_freq="2412")
  32. wpas.request("DISCONNECT")
  33. def test_connect_cmd_concurrent_grpform_while_connecting(dev, apdev):
  34. """Concurrent P2P group formation while connecting to an AP using cfg80211 connect command"""
  35. logger.info("Start connection to an infrastructure AP")
  36. hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-open" })
  37. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  38. wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
  39. wpas.connect("test-open", key_mgmt="NONE", wait_connect=False)
  40. logger.info("Form a P2P group while connecting to an AP")
  41. wpas.request("SET p2p_no_group_iface 0")
  42. [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_freq=2412,
  43. r_dev=wpas, r_freq=2412)
  44. check_grpform_results(i_res, r_res)
  45. remove_group(dev[0], wpas)
  46. logger.info("Confirm AP connection after P2P group removal")
  47. hwsim_utils.test_connectivity(wpas.ifname, apdev[0]['ifname'])