test_ap_params.py 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612
  1. # Test various AP mode parameters
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. from remotehost import remote_compatible
  7. import logging
  8. logger = logging.getLogger()
  9. import os
  10. import subprocess
  11. import hwsim_utils
  12. import hostapd
  13. from tshark import run_tshark
  14. from utils import alloc_fail, HwsimSkip
  15. @remote_compatible
  16. def test_ap_fragmentation_rts_set_high(dev, apdev):
  17. """WPA2-PSK AP with fragmentation and RTS thresholds larger than frame length"""
  18. ssid = "test-wpa2-psk"
  19. passphrase = 'qwertyuiop'
  20. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  21. params['rts_threshold'] = "1000"
  22. params['fragm_threshold'] = "2000"
  23. hapd = hostapd.add_ap(apdev[0], params)
  24. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  25. hwsim_utils.test_connectivity(dev[0], hapd)
  26. @remote_compatible
  27. def test_ap_fragmentation_open(dev, apdev):
  28. """Open AP with fragmentation threshold"""
  29. ssid = "fragmentation"
  30. params = {}
  31. params['ssid'] = ssid
  32. params['fragm_threshold'] = "1000"
  33. hapd = hostapd.add_ap(apdev[0], params)
  34. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  35. hwsim_utils.test_connectivity(dev[0], hapd)
  36. @remote_compatible
  37. def test_ap_fragmentation_wpa2(dev, apdev):
  38. """WPA2-PSK AP with fragmentation threshold"""
  39. ssid = "test-wpa2-psk"
  40. passphrase = 'qwertyuiop'
  41. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  42. params['fragm_threshold'] = "1000"
  43. hapd = hostapd.add_ap(apdev[0], params)
  44. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  45. hwsim_utils.test_connectivity(dev[0], hapd)
  46. def test_ap_vendor_elements(dev, apdev):
  47. """WPA2-PSK AP with vendor elements added"""
  48. bssid = apdev[0]['bssid']
  49. ssid = "test-wpa2-psk"
  50. passphrase = 'qwertyuiop'
  51. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  52. params['vendor_elements'] = "dd0411223301"
  53. params['assocresp_elements'] = "dd0411223302"
  54. hapd = hostapd.add_ap(apdev[0], params)
  55. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  56. bss = dev[0].get_bss(bssid)
  57. if "dd0411223301" not in bss['ie']:
  58. raise Exception("Vendor element not shown in scan results")
  59. hapd.set('vendor_elements', 'dd051122330203dd0400137400dd04001374ff')
  60. if "OK" not in hapd.request("UPDATE_BEACON"):
  61. raise Exception("UPDATE_BEACON failed")
  62. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  63. bss = dev[1].get_bss(bssid)
  64. if "dd0411223301" in bss['ie']:
  65. raise Exception("Old vendor element still in scan results")
  66. if "dd051122330203" not in bss['ie']:
  67. raise Exception("New vendor element not shown in scan results")
  68. def test_ap_element_parse(dev, apdev):
  69. """Information element parsing - extra coverage"""
  70. bssid = apdev[0]['bssid']
  71. ssid = "test-wpa2-psk"
  72. params = { 'ssid': ssid,
  73. 'vendor_elements': "380501020304059e009e009e009e009e009e00" }
  74. hapd = hostapd.add_ap(apdev[0], params)
  75. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  76. bss = dev[0].get_bss(bssid)
  77. if "38050102030405" not in bss['ie']:
  78. raise Exception("Timeout element not shown in scan results")
  79. @remote_compatible
  80. def test_ap_element_parse_oom(dev, apdev):
  81. """Information element parsing OOM"""
  82. bssid = apdev[0]['bssid']
  83. ssid = "test-wpa2-psk"
  84. params = { 'ssid': ssid,
  85. 'vendor_elements': "dd0d506f9a0a00000600411c440028" }
  86. hapd = hostapd.add_ap(apdev[0], params)
  87. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  88. with alloc_fail(dev[0], 1, "wpabuf_alloc;ieee802_11_vendor_ie_concat"):
  89. bss = dev[0].get_bss(bssid)
  90. logger.info(str(bss))
  91. def test_ap_country(dev, apdev):
  92. """WPA2-PSK AP setting country code and using 5 GHz band"""
  93. try:
  94. hapd = None
  95. bssid = apdev[0]['bssid']
  96. ssid = "test-wpa2-psk"
  97. passphrase = 'qwertyuiop'
  98. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  99. params['country_code'] = 'FI'
  100. params['ieee80211d'] = '1'
  101. params['hw_mode'] = 'a'
  102. params['channel'] = '36'
  103. hapd = hostapd.add_ap(apdev[0], params)
  104. dev[0].connect(ssid, psk=passphrase, scan_freq="5180")
  105. hwsim_utils.test_connectivity(dev[0], hapd)
  106. finally:
  107. dev[0].request("DISCONNECT")
  108. if hapd:
  109. hapd.request("DISABLE")
  110. hostapd.cmd_execute(apdev[0], ['iw', 'reg', 'set', '00'])
  111. dev[0].flush_scan_cache()
  112. def test_ap_acl_accept(dev, apdev):
  113. """MAC ACL accept list"""
  114. ssid = "acl"
  115. params = {}
  116. params['ssid'] = ssid
  117. params['accept_mac_file'] = "hostapd.macaddr"
  118. hapd = hostapd.add_ap(apdev[0], params)
  119. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  120. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  121. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  122. dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  123. dev[0].request("REMOVE_NETWORK all")
  124. dev[1].request("REMOVE_NETWORK all")
  125. hapd.request("SET macaddr_acl 1")
  126. dev[1].dump_monitor()
  127. dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412", wait_connect=False)
  128. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  129. ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  130. if ev is not None:
  131. raise Exception("Unexpected association")
  132. def test_ap_acl_deny(dev, apdev):
  133. """MAC ACL deny list"""
  134. ssid = "acl"
  135. params = {}
  136. params['ssid'] = ssid
  137. params['deny_mac_file'] = "hostapd.macaddr"
  138. hapd = hostapd.add_ap(apdev[0], params)
  139. dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
  140. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412", wait_connect=False)
  141. dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412")
  142. dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  143. ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  144. if ev is not None:
  145. raise Exception("Unexpected association")
  146. @remote_compatible
  147. def test_ap_wds_sta(dev, apdev):
  148. """WPA2-PSK AP with STA using 4addr mode"""
  149. ssid = "test-wpa2-psk"
  150. passphrase = 'qwertyuiop'
  151. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  152. params['wds_sta'] = "1"
  153. params['wds_bridge'] = "wds-br0"
  154. hapd = hostapd.add_ap(apdev[0], params)
  155. try:
  156. dev[0].cmd_execute(['brctl', 'addbr', 'wds-br0'])
  157. dev[0].cmd_execute(['brctl', 'setfd', 'wds-br0', '0'])
  158. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'up'])
  159. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'on'])
  160. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  161. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  162. max_tries=15)
  163. dev[0].request("REATTACH")
  164. dev[0].wait_connected()
  165. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  166. max_tries=15)
  167. dev[0].request("SET reassoc_same_bss_optim 1")
  168. dev[0].request("REATTACH")
  169. dev[0].wait_connected()
  170. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  171. max_tries=5, timeout=1)
  172. finally:
  173. dev[0].request("SET reassoc_same_bss_optim 0")
  174. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'off'])
  175. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'down'])
  176. dev[0].cmd_execute(['brctl', 'delbr', 'wds-br0'])
  177. def test_ap_wds_sta_open(dev, apdev):
  178. """Open AP with STA using 4addr mode"""
  179. ssid = "test-wds-open"
  180. params = {}
  181. params['ssid'] = ssid
  182. params['wds_sta'] = "1"
  183. params['wds_bridge'] = "wds-br0"
  184. hapd = hostapd.add_ap(apdev[0], params)
  185. try:
  186. dev[0].cmd_execute(['brctl', 'addbr', 'wds-br0'])
  187. dev[0].cmd_execute(['brctl', 'setfd', 'wds-br0', '0'])
  188. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'up'])
  189. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'on'])
  190. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  191. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  192. max_tries=15)
  193. dev[0].request("REATTACH")
  194. dev[0].wait_connected()
  195. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  196. max_tries=15)
  197. dev[0].request("SET reassoc_same_bss_optim 1")
  198. dev[0].request("REATTACH")
  199. dev[0].wait_connected()
  200. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  201. max_tries=5, timeout=1)
  202. finally:
  203. dev[0].request("SET reassoc_same_bss_optim 0")
  204. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'off'])
  205. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'down'])
  206. dev[0].cmd_execute(['brctl', 'delbr', 'wds-br0'])
  207. def test_ap_wds_sta_wep(dev, apdev):
  208. """WEP AP with STA using 4addr mode"""
  209. ssid = "test-wds-wep"
  210. params = {}
  211. params['ssid'] = ssid
  212. params["ieee80211n"] = "0"
  213. params['wep_key0'] = '"hello"'
  214. params['wds_sta'] = "1"
  215. params['wds_bridge'] = "wds-br0"
  216. hapd = hostapd.add_ap(apdev[0], params)
  217. try:
  218. dev[0].cmd_execute(['brctl', 'addbr', 'wds-br0'])
  219. dev[0].cmd_execute(['brctl', 'setfd', 'wds-br0', '0'])
  220. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'up'])
  221. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'on'])
  222. dev[0].connect(ssid, key_mgmt="NONE", wep_key0='"hello"',
  223. scan_freq="2412")
  224. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  225. max_tries=15)
  226. dev[0].request("REATTACH")
  227. dev[0].wait_connected()
  228. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  229. max_tries=15)
  230. dev[0].request("SET reassoc_same_bss_optim 1")
  231. dev[0].request("REATTACH")
  232. dev[0].wait_connected()
  233. hwsim_utils.test_connectivity_iface(dev[0], hapd, "wds-br0",
  234. max_tries=5, timeout=1)
  235. finally:
  236. dev[0].request("SET reassoc_same_bss_optim 0")
  237. dev[0].cmd_execute(['iw', dev[0].ifname, 'set', '4addr', 'off'])
  238. dev[0].cmd_execute(['ip', 'link', 'set', 'dev', 'wds-br0', 'down'])
  239. dev[0].cmd_execute(['brctl', 'delbr', 'wds-br0'])
  240. @remote_compatible
  241. def test_ap_inactivity_poll(dev, apdev):
  242. """AP using inactivity poll"""
  243. ssid = "test-wpa2-psk"
  244. passphrase = 'qwertyuiop'
  245. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  246. params['ap_max_inactivity'] = "1"
  247. hapd = hostapd.add_ap(apdev[0], params)
  248. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  249. hapd.set("ext_mgmt_frame_handling", "1")
  250. dev[0].request("DISCONNECT")
  251. ev = hapd.wait_event(["MGMT-RX"], timeout=5)
  252. if ev is None:
  253. raise Exception("MGMT RX wait timed out for Deauth")
  254. hapd.set("ext_mgmt_frame_handling", "0")
  255. ev = hapd.wait_event(["AP-STA-DISCONNECTED"], timeout=30)
  256. if ev is None:
  257. raise Exception("STA disconnection on inactivity was not reported")
  258. @remote_compatible
  259. def test_ap_inactivity_disconnect(dev, apdev):
  260. """AP using inactivity disconnect"""
  261. ssid = "test-wpa2-psk"
  262. passphrase = 'qwertyuiop'
  263. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  264. params['ap_max_inactivity'] = "1"
  265. params['skip_inactivity_poll'] = "1"
  266. hapd = hostapd.add_ap(apdev[0], params)
  267. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  268. hapd.set("ext_mgmt_frame_handling", "1")
  269. dev[0].request("DISCONNECT")
  270. ev = hapd.wait_event(["MGMT-RX"], timeout=5)
  271. if ev is None:
  272. raise Exception("MGMT RX wait timed out for Deauth")
  273. hapd.set("ext_mgmt_frame_handling", "0")
  274. ev = hapd.wait_event(["AP-STA-DISCONNECTED"], timeout=30)
  275. if ev is None:
  276. raise Exception("STA disconnection on inactivity was not reported")
  277. @remote_compatible
  278. def test_ap_basic_rates(dev, apdev):
  279. """Open AP with lots of basic rates"""
  280. ssid = "basic rates"
  281. params = {}
  282. params['ssid'] = ssid
  283. params['basic_rates'] = "10 20 55 110 60 90 120 180 240 360 480 540"
  284. hostapd.add_ap(apdev[0], params)
  285. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  286. @remote_compatible
  287. def test_ap_short_preamble(dev, apdev):
  288. """Open AP with short preamble"""
  289. ssid = "short preamble"
  290. params = {}
  291. params['ssid'] = ssid
  292. params['preamble'] = "1"
  293. hostapd.add_ap(apdev[0], params)
  294. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  295. def test_ap_spectrum_management_required(dev, apdev):
  296. """Open AP with spectrum management required"""
  297. ssid = "spectrum mgmt"
  298. params = {}
  299. params['ssid'] = ssid
  300. params["country_code"] = "JP"
  301. params["hw_mode"] = "a"
  302. params["channel"] = "36"
  303. params["ieee80211d"] = "1"
  304. params["local_pwr_constraint"] = "3"
  305. params['spectrum_mgmt_required'] = "1"
  306. try:
  307. hapd = None
  308. hapd = hostapd.add_ap(apdev[0], params)
  309. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="5180")
  310. finally:
  311. dev[0].request("DISCONNECT")
  312. if hapd:
  313. hapd.request("DISABLE")
  314. hostapd.cmd_execute(apdev[0], ['iw', 'reg', 'set', '00'])
  315. dev[0].flush_scan_cache()
  316. @remote_compatible
  317. def test_ap_max_listen_interval(dev, apdev):
  318. """Open AP with maximum listen interval limit"""
  319. ssid = "listen"
  320. params = {}
  321. params['ssid'] = ssid
  322. params['max_listen_interval'] = "1"
  323. hostapd.add_ap(apdev[0], params)
  324. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412", wait_connect=False)
  325. ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"])
  326. if ev is None:
  327. raise Exception("Association rejection not reported")
  328. if "status_code=51" not in ev:
  329. raise Exception("Unexpected ASSOC-REJECT reason")
  330. @remote_compatible
  331. def test_ap_max_num_sta(dev, apdev):
  332. """Open AP with maximum STA count"""
  333. ssid = "max"
  334. params = {}
  335. params['ssid'] = ssid
  336. params['max_num_sta'] = "1"
  337. hostapd.add_ap(apdev[0], params)
  338. dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  339. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412", wait_connect=False)
  340. ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
  341. if ev is not None:
  342. raise Exception("Unexpected association")
  343. def test_ap_max_num_sta_no_probe_resp(dev, apdev, params):
  344. """Maximum STA count and limit on Probe Response frames"""
  345. logdir = params['logdir']
  346. dev[0].flush_scan_cache()
  347. ssid = "max"
  348. params = {}
  349. params['ssid'] = ssid
  350. params['beacon_int'] = "2000"
  351. params['max_num_sta'] = "1"
  352. params['no_probe_resp_if_max_sta'] = "1"
  353. hostapd.add_ap(apdev[0], params)
  354. dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  355. dev[0].scan(freq=2412, type="ONLY")
  356. dev[0].scan(freq=2412, type="ONLY")
  357. seen = dev[0].get_bss(apdev[0]['bssid']) != None
  358. dev[1].scan(freq=2412, type="ONLY")
  359. if seen:
  360. out = run_tshark(os.path.join(logdir, "hwsim0.pcapng"),
  361. "wlan.fc.type_subtype == 5", ["wlan.da" ])
  362. if out:
  363. if dev[0].own_addr() not in out:
  364. # Discovery happened through Beacon frame reception. That's not
  365. # an error case.
  366. seen = False
  367. if dev[1].own_addr() not in out:
  368. raise Exception("No Probe Response frames to dev[1] seen")
  369. if seen:
  370. raise Exception("AP found unexpectedly")
  371. @remote_compatible
  372. def test_ap_tx_queue_params(dev, apdev):
  373. """Open AP with TX queue params set"""
  374. ssid = "tx"
  375. params = {}
  376. params['ssid'] = ssid
  377. params['tx_queue_data2_aifs'] = "4"
  378. params['tx_queue_data2_cwmin'] = "7"
  379. params['tx_queue_data2_cwmax'] = "1023"
  380. params['tx_queue_data2_burst'] = "4.2"
  381. params['tx_queue_data1_aifs'] = "4"
  382. params['tx_queue_data1_cwmin'] = "7"
  383. params['tx_queue_data1_cwmax'] = "1023"
  384. params['tx_queue_data1_burst'] = "2"
  385. hapd = hostapd.add_ap(apdev[0], params)
  386. dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412")
  387. hwsim_utils.test_connectivity(dev[0], hapd)
  388. def test_ap_tx_queue_params_invalid(dev, apdev):
  389. """Invalid TX queue params set (cwmin/cwmax)"""
  390. ssid = "tx"
  391. params = {}
  392. params['ssid'] = ssid
  393. params['tx_queue_data2_aifs'] = "4"
  394. params['tx_queue_data2_cwmin'] = "7"
  395. params['tx_queue_data2_cwmax'] = "1023"
  396. params['tx_queue_data2_burst'] = "4.2"
  397. params['wmm_ac_bk_cwmin'] = "4"
  398. params['wmm_ac_bk_cwmax'] = "10"
  399. params['wmm_ac_bk_aifs'] = "7"
  400. params['wmm_ac_bk_txop_limit'] = "0"
  401. params['wmm_ac_bk_acm'] = "0"
  402. hapd = hostapd.add_ap(apdev[0], params)
  403. # "Invalid TX queue cwMin/cwMax values. cwMin(7) greater than cwMax(3)"
  404. if "FAIL" not in hapd.request('SET tx_queue_data2_cwmax 3'):
  405. raise Exception("TX cwMax < cwMin accepted")
  406. # "Invalid WMM AC cwMin/cwMax values. cwMin(4) greater than cwMax(3)"
  407. if "FAIL" not in hapd.request('SET wmm_ac_bk_cwmax 3'):
  408. raise Exception("AC cwMax < cwMin accepted")
  409. def test_ap_beacon_rate_legacy(dev, apdev):
  410. """Open AP with Beacon frame TX rate 5.5 Mbps"""
  411. hapd = hostapd.add_ap(apdev[0], { 'ssid': 'beacon-rate' })
  412. res = hapd.get_driver_status_field('capa.flags')
  413. if (int(res, 0) & 0x0000080000000000) == 0:
  414. raise HwsimSkip("Setting Beacon frame TX rate not supported")
  415. hapd.disable()
  416. hapd.set('beacon_rate', '55')
  417. hapd.enable()
  418. dev[0].connect('beacon-rate', key_mgmt="NONE", scan_freq="2412")
  419. def test_ap_beacon_rate_legacy2(dev, apdev):
  420. """Open AP with Beacon frame TX rate 12 Mbps in VHT BSS"""
  421. hapd = hostapd.add_ap(apdev[0], { 'ssid': 'beacon-rate' })
  422. res = hapd.get_driver_status_field('capa.flags')
  423. if (int(res, 0) & 0x0000080000000000) == 0:
  424. raise HwsimSkip("Setting Beacon frame TX rate not supported")
  425. hapd.disable()
  426. hapd.set('beacon_rate', '120')
  427. hapd.set("country_code", "DE")
  428. hapd.set("hw_mode", "a")
  429. hapd.set("channel", "36")
  430. hapd.set("ieee80211n", "1")
  431. hapd.set("ieee80211ac", "1")
  432. hapd.set("ht_capab", "[HT40+]")
  433. hapd.set("vht_capab", "")
  434. hapd.set("vht_oper_chwidth", "0")
  435. hapd.set("vht_oper_centr_freq_seg0_idx", "0")
  436. try:
  437. hapd.enable()
  438. dev[0].scan_for_bss(hapd.own_addr(), freq="5180")
  439. dev[0].connect('beacon-rate', key_mgmt="NONE", scan_freq="5180")
  440. finally:
  441. dev[0].request("DISCONNECT")
  442. hapd.request("DISABLE")
  443. subprocess.call(['iw', 'reg', 'set', '00'])
  444. dev[0].flush_scan_cache()
  445. def test_ap_beacon_rate_ht(dev, apdev):
  446. """Open AP with Beacon frame TX rate HT-MCS 0"""
  447. hapd = hostapd.add_ap(apdev[0], { 'ssid': 'beacon-rate' })
  448. res = hapd.get_driver_status_field('capa.flags')
  449. if (int(res, 0) & 0x0000100000000000) == 0:
  450. raise HwsimSkip("Setting Beacon frame TX rate not supported")
  451. hapd.disable()
  452. hapd.set('beacon_rate', 'ht:0')
  453. hapd.enable()
  454. dev[0].connect('beacon-rate', key_mgmt="NONE", scan_freq="2412")
  455. def test_ap_beacon_rate_ht2(dev, apdev):
  456. """Open AP with Beacon frame TX rate HT-MCS 1 in VHT BSS"""
  457. hapd = hostapd.add_ap(apdev[0], { 'ssid': 'beacon-rate' })
  458. res = hapd.get_driver_status_field('capa.flags')
  459. if (int(res, 0) & 0x0000100000000000) == 0:
  460. raise HwsimSkip("Setting Beacon frame TX rate not supported")
  461. hapd.disable()
  462. hapd.set('beacon_rate', 'ht:1')
  463. hapd.set("country_code", "DE")
  464. hapd.set("hw_mode", "a")
  465. hapd.set("channel", "36")
  466. hapd.set("ieee80211n", "1")
  467. hapd.set("ieee80211ac", "1")
  468. hapd.set("ht_capab", "[HT40+]")
  469. hapd.set("vht_capab", "")
  470. hapd.set("vht_oper_chwidth", "0")
  471. hapd.set("vht_oper_centr_freq_seg0_idx", "0")
  472. try:
  473. hapd.enable()
  474. dev[0].scan_for_bss(hapd.own_addr(), freq="5180")
  475. dev[0].connect('beacon-rate', key_mgmt="NONE", scan_freq="5180")
  476. finally:
  477. dev[0].request("DISCONNECT")
  478. hapd.request("DISABLE")
  479. subprocess.call(['iw', 'reg', 'set', '00'])
  480. dev[0].flush_scan_cache()
  481. def test_ap_beacon_rate_vht(dev, apdev):
  482. """Open AP with Beacon frame TX rate VHT-MCS 0"""
  483. hapd = hostapd.add_ap(apdev[0], { 'ssid': 'beacon-rate' })
  484. res = hapd.get_driver_status_field('capa.flags')
  485. if (int(res, 0) & 0x0000200000000000) == 0:
  486. raise HwsimSkip("Setting Beacon frame TX rate not supported")
  487. hapd.disable()
  488. hapd.set('beacon_rate', 'vht:0')
  489. hapd.set("country_code", "DE")
  490. hapd.set("hw_mode", "a")
  491. hapd.set("channel", "36")
  492. hapd.set("ieee80211n", "1")
  493. hapd.set("ieee80211ac", "1")
  494. hapd.set("ht_capab", "[HT40+]")
  495. hapd.set("vht_capab", "")
  496. hapd.set("vht_oper_chwidth", "0")
  497. hapd.set("vht_oper_centr_freq_seg0_idx", "0")
  498. try:
  499. hapd.enable()
  500. dev[0].scan_for_bss(hapd.own_addr(), freq="5180")
  501. dev[0].connect('beacon-rate', key_mgmt="NONE", scan_freq="5180")
  502. finally:
  503. dev[0].request("DISCONNECT")
  504. hapd.request("DISABLE")
  505. subprocess.call(['iw', 'reg', 'set', '00'])
  506. dev[0].flush_scan_cache()
  507. def test_ap_wep_to_wpa(dev, apdev):
  508. """WEP to WPA2-PSK configuration change in hostapd"""
  509. hapd = hostapd.add_ap(apdev[0],
  510. { "ssid": "wep-to-wpa",
  511. "wep_key0": '"hello"' })
  512. dev[0].flush_scan_cache()
  513. dev[0].connect("wep-to-wpa", key_mgmt="NONE", wep_key0='"hello"',
  514. scan_freq="2412")
  515. hwsim_utils.test_connectivity(dev[0], hapd)
  516. dev[0].request("DISCONNECT")
  517. dev[0].wait_disconnected()
  518. hapd.disable()
  519. hapd.set("wep_key0", "")
  520. hapd.set("wpa_passphrase", "12345678")
  521. hapd.set("wpa", "2")
  522. hapd.set("wpa_key_mgmt", "WPA-PSK")
  523. hapd.set("rsn_pairwise", "CCMP")
  524. hapd.enable()
  525. dev[0].connect("wep-to-wpa", psk="12345678", scan_freq="2412")
  526. hwsim_utils.test_connectivity(dev[0], hapd)
  527. def test_ap_missing_psk(dev, apdev):
  528. """WPA2-PSK AP and no PSK configured"""
  529. ssid = "test-wpa2-psk"
  530. params = hostapd.wpa2_params(ssid=ssid)
  531. try:
  532. # "WPA-PSK enabled, but PSK or passphrase is not configured."
  533. hostapd.add_ap(apdev[0], params)
  534. raise Exception("AP setup succeeded unexpectedly")
  535. except Exception, e:
  536. if "Failed to enable hostapd" in str(e):
  537. pass
  538. else:
  539. raise
  540. def test_ap_eapol_version(dev, apdev):
  541. """hostapd eapol_version configuration"""
  542. passphrase = "asdfghjkl"
  543. params = hostapd.wpa2_params(ssid="test1", passphrase=passphrase)
  544. hapd = hostapd.add_ap(apdev[0], params)
  545. params = hostapd.wpa2_params(ssid="test2", passphrase=passphrase)
  546. params['eapol_version'] = '1'
  547. hapd2 = hostapd.add_ap(apdev[1], params)
  548. hapd.request("SET ext_eapol_frame_io 1")
  549. dev[0].connect("test1", psk=passphrase, scan_freq="2412",
  550. wait_connect=False)
  551. ev1 = hapd.wait_event(["EAPOL-TX"], timeout=15)
  552. if ev1 is None:
  553. raise Exception("Timeout on EAPOL-TX from hostapd")
  554. hapd.request("SET ext_eapol_frame_io 0")
  555. hapd2.request("SET ext_eapol_frame_io 1")
  556. dev[1].connect("test2", psk=passphrase, scan_freq="2412",
  557. wait_connect=False)
  558. ev2 = hapd2.wait_event(["EAPOL-TX"], timeout=15)
  559. if ev2 is None:
  560. raise Exception("Timeout on EAPOL-TX from hostapd")
  561. hapd2.request("SET ext_eapol_frame_io 0")
  562. dev[0].wait_connected()
  563. dev[1].wait_connected()
  564. ver1 = ev1.split(' ')[2][0:2]
  565. ver2 = ev2.split(' ')[2][0:2]
  566. if ver1 != "02":
  567. raise Exception("Unexpected default eapol_version: " + ver1)
  568. if ver2 != "01":
  569. raise Exception("eapol_version did not match configuration: " + ver2)