]> git.ipfire.org Git - thirdparty/hostap.git/blame - tests/hwsim/test_ap_hs20.py
GAS: Remove all radio works before calling gas_query_deinit()
[thirdparty/hostap.git] / tests / hwsim / test_ap_hs20.py
CommitLineData
93a06242 1# Hotspot 2.0 tests
3b51cc63 2# Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
93a06242
JM
3#
4# This software may be distributed under the terms of the BSD license.
5# See README for more details.
6
67aeee11
JM
7import binascii
8import struct
93a06242
JM
9import time
10import subprocess
11import logging
c9aa4308 12logger = logging.getLogger()
97de642a 13import os
efd43d85 14import os.path
67aeee11 15import socket
efd43d85 16import subprocess
93a06242
JM
17
18import hostapd
81e787b7 19from utils import HwsimSkip
40e4c9c8 20import hwsim_utils
efd0a6fb 21from tshark import run_tshark
715bf904 22from wlantest import Wlantest
9d1e1172 23from wpasupplicant import WpaSupplicant
24579e70 24from test_ap_eap import check_eap_capa, check_domain_match_full
93a06242 25
d4058934
JM
26def hs20_ap_params(ssid="test-hs20"):
27 params = hostapd.wpa2_params(ssid=ssid)
93a06242
JM
28 params['wpa_key_mgmt'] = "WPA-EAP"
29 params['ieee80211w'] = "1"
30 params['ieee8021x'] = "1"
31 params['auth_server_addr'] = "127.0.0.1"
32 params['auth_server_port'] = "1812"
33 params['auth_server_shared_secret'] = "radius"
34 params['interworking'] = "1"
35 params['access_network_type'] = "14"
36 params['internet'] = "1"
37 params['asra'] = "0"
38 params['esr'] = "0"
39 params['uesa'] = "0"
40 params['venue_group'] = "7"
41 params['venue_type'] = "1"
42 params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
43 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
44 "fedcba" ]
45 params['domain_name'] = "example.com,another.example.com"
46 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
47 "0,another.example.com" ]
48 params['hs20'] = "1"
49 params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
50 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
51 params['hs20_operating_class'] = "5173"
52 params['anqp_3gpp_cell_net'] = "244,91"
53 return params
54
9714fbcd 55def check_auto_select(dev, bssid):
841bed04 56 dev.scan_for_bss(bssid, freq="2412")
9714fbcd 57 dev.request("INTERWORKING_SELECT auto freq=2412")
5f35a5e2 58 ev = dev.wait_connected(timeout=15)
9714fbcd
JM
59 if bssid not in ev:
60 raise Exception("Connected to incorrect network")
61 dev.request("REMOVE_NETWORK all")
092ac7bb 62 dev.wait_disconnected()
9714fbcd 63
2f37a66d 64def interworking_select(dev, bssid, type=None, no_match=False, freq=None):
bbe86767 65 dev.dump_monitor()
841bed04
JM
66 if bssid and freq and not no_match:
67 dev.scan_for_bss(bssid, freq=freq)
22653762 68 freq_extra = " freq=" + str(freq) if freq else ""
2f37a66d 69 dev.request("INTERWORKING_SELECT" + freq_extra)
bbe86767
JM
70 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
71 timeout=15)
93a06242
JM
72 if ev is None:
73 raise Exception("Network selection timed out");
bbe86767
JM
74 if no_match:
75 if "INTERWORKING-NO-MATCH" not in ev:
76 raise Exception("Unexpected network match")
77 return
93a06242 78 if "INTERWORKING-NO-MATCH" in ev:
0dee3a0a
JM
79 logger.info("Matching network not found - try again")
80 dev.dump_monitor()
81 dev.request("INTERWORKING_SELECT" + freq_extra)
82 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
83 timeout=15)
84 if ev is None:
85 raise Exception("Network selection timed out");
86 if "INTERWORKING-NO-MATCH" in ev:
87 raise Exception("Matching network not found")
2cdd91d8 88 if bssid and bssid not in ev:
93a06242 89 raise Exception("Unexpected BSSID in match")
bbe86767
JM
90 if type and "type=" + type not in ev:
91 raise Exception("Network type not recognized correctly")
93a06242 92
bbe86767
JM
93def check_sp_type(dev, sp_type):
94 type = dev.get_status_field("sp_type")
95 if type is None:
96 raise Exception("sp_type not available")
97 if type != sp_type:
98 raise Exception("sp_type did not indicate home network")
efd43d85 99
bbe86767 100def hlr_auc_gw_available():
efd43d85 101 if not os.path.exists("/tmp/hlr_auc_gw.sock"):
81e787b7 102 raise HwsimSkip("No hlr_auc_gw socket available")
efd43d85 103 if not os.path.exists("../../hostapd/hlr_auc_gw"):
81e787b7 104 raise HwsimSkip("No hlr_auc_gw available")
efd43d85 105
bbe86767
JM
106def interworking_ext_sim_connect(dev, bssid, method):
107 dev.request("INTERWORKING_CONNECT " + bssid)
078683ac 108 interworking_ext_sim_auth(dev, method)
efd43d85 109
078683ac 110def interworking_ext_sim_auth(dev, method):
bbe86767 111 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
efd43d85
JM
112 if ev is None:
113 raise Exception("Network connected timed out")
bbe86767 114 if "(" + method + ")" not in ev:
efd43d85
JM
115 raise Exception("Unexpected EAP method selection")
116
bbe86767 117 ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
efd43d85
JM
118 if ev is None:
119 raise Exception("Wait for external SIM processing request timed out")
120 p = ev.split(':', 2)
121 if p[1] != "GSM-AUTH":
122 raise Exception("Unexpected CTRL-REQ-SIM type")
123 id = p[0].split('-')[3]
124 rand = p[2].split(' ')[0]
125
126 res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
127 "-m",
128 "auth_serv/hlr_auc_gw.milenage_db",
129 "GSM-AUTH-REQ 232010000000000 " + rand])
130 if "GSM-AUTH-RESP" not in res:
131 raise Exception("Unexpected hlr_auc_gw response")
132 resp = res.split(' ')[2].rstrip()
133
bbe86767 134 dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
5f35a5e2 135 dev.wait_connected(timeout=15)
f4defd91 136
8fba2e5d
JM
137def interworking_connect(dev, bssid, method):
138 dev.request("INTERWORKING_CONNECT " + bssid)
078683ac 139 interworking_auth(dev, method)
8fba2e5d 140
078683ac 141def interworking_auth(dev, method):
8fba2e5d
JM
142 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
143 if ev is None:
144 raise Exception("Network connected timed out")
145 if "(" + method + ")" not in ev:
146 raise Exception("Unexpected EAP method selection")
147
5f35a5e2 148 dev.wait_connected(timeout=15)
8fba2e5d 149
715bf904
JM
150def check_probe_resp(wt, bssid_unexpected, bssid_expected):
151 if bssid_unexpected:
152 count = wt.get_bss_counter("probe_response", bssid_unexpected)
153 if count > 0:
154 raise Exception("Unexpected Probe Response frame from AP")
155
156 if bssid_expected:
157 count = wt.get_bss_counter("probe_response", bssid_expected)
158 if count == 0:
159 raise Exception("No Probe Response frame from AP")
160
2cdd91d8
JM
161def test_ap_anqp_sharing(dev, apdev):
162 """ANQP sharing within ESS and explicit unshare"""
57f08b3f
JM
163 dev[0].flush_scan_cache()
164
2cdd91d8
JM
165 bssid = apdev[0]['bssid']
166 params = hs20_ap_params()
167 params['hessid'] = bssid
168 hostapd.add_ap(apdev[0]['ifname'], params)
169
170 bssid2 = apdev[1]['bssid']
171 params = hs20_ap_params()
172 params['hessid'] = bssid
173 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
174 hostapd.add_ap(apdev[1]['ifname'], params)
175
2cdd91d8
JM
176 dev[0].hs20_enable()
177 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
178 'password': "secret",
179 'domain': "example.com" })
180 logger.info("Normal network selection with shared ANQP results")
841bed04
JM
181 dev[0].scan_for_bss(bssid, freq="2412")
182 dev[0].scan_for_bss(bssid2, freq="2412")
2f37a66d 183 interworking_select(dev[0], None, "home", freq="2412")
2cdd91d8
JM
184 dev[0].dump_monitor()
185
57f08b3f 186 logger.debug("BSS entries:\n" + dev[0].request("BSS RANGE=ALL"))
2cdd91d8
JM
187 res1 = dev[0].get_bss(bssid)
188 res2 = dev[0].get_bss(bssid2)
57f08b3f
JM
189 if 'anqp_nai_realm' not in res1:
190 raise Exception("anqp_nai_realm not found for AP1")
191 if 'anqp_nai_realm' not in res2:
192 raise Exception("anqp_nai_realm not found for AP2")
2cdd91d8
JM
193 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
194 raise Exception("ANQP results were not shared between BSSes")
195
196 logger.info("Explicit ANQP request to unshare ANQP results")
197 dev[0].request("ANQP_GET " + bssid + " 263")
198 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
199 if ev is None:
200 raise Exception("ANQP operation timed out")
201
202 dev[0].request("ANQP_GET " + bssid2 + " 263")
203 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
204 if ev is None:
205 raise Exception("ANQP operation timed out")
206
207 res1 = dev[0].get_bss(bssid)
208 res2 = dev[0].get_bss(bssid2)
209 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
210 raise Exception("ANQP results were not unshared")
211
cddc19e5
JM
212def test_ap_nai_home_realm_query(dev, apdev):
213 """NAI Home Realm Query"""
214 bssid = apdev[0]['bssid']
215 params = hs20_ap_params()
216 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
217 "0,another.example.org" ]
218 hostapd.add_ap(apdev[0]['ifname'], params)
219
220 dev[0].scan(freq="2412")
221 dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " realm=example.com")
222 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
223 if ev is None:
224 raise Exception("ANQP operation timed out")
225 nai1 = dev[0].get_bss(bssid)['anqp_nai_realm']
226 dev[0].dump_monitor()
227
228 dev[0].request("ANQP_GET " + bssid + " 263")
229 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
230 if ev is None:
231 raise Exception("ANQP operation timed out")
232 nai2 = dev[0].get_bss(bssid)['anqp_nai_realm']
233
234 if len(nai1) >= len(nai2):
235 raise Exception("Unexpected NAI Realm list response lengths")
236 if "example.com".encode('hex') not in nai1:
237 raise Exception("Home realm not reported")
238 if "example.org".encode('hex') in nai1:
239 raise Exception("Non-home realm reported")
240 if "example.com".encode('hex') not in nai2:
241 raise Exception("Home realm not reported in wildcard query")
242 if "example.org".encode('hex') not in nai2:
243 raise Exception("Non-home realm not reported in wildcard query ")
244
ea215c54
JM
245 cmds = [ "foo",
246 "00:11:22:33:44:55 123",
247 "00:11:22:33:44:55 qq" ]
248 for cmd in cmds:
249 if "FAIL" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + cmd):
250 raise Exception("Invalid HS20_GET_NAI_HOME_REALM_LIST accepted: " + cmd)
251
252 dev[0].dump_monitor()
253 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
254 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
255 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
256 if ev is None:
257 raise Exception("ANQP operation timed out")
258 ev = dev[0].wait_event(["RX-ANQP"], timeout=0.1)
259 if ev is not None:
260 raise Exception("Unexpected ANQP response: " + ev)
261
262 dev[0].dump_monitor()
263 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " 01000b6578616d706c652e636f6d"):
264 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
265 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
266 if ev is None:
267 raise Exception("No ANQP response")
268 if "NAI Realm list" not in ev:
269 raise Exception("Missing NAI Realm list: " + ev)
270
271 dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
272 'password': "secret",
273 'domain': "example.com" })
274 dev[0].dump_monitor()
275 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
276 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
277 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
278 if ev is None:
279 raise Exception("No ANQP response")
280 if "NAI Realm list" not in ev:
281 raise Exception("Missing NAI Realm list: " + ev)
282
715bf904
JM
283def test_ap_interworking_scan_filtering(dev, apdev):
284 """Interworking scan filtering with HESSID and access network type"""
e4d7b513 285 try:
81e787b7 286 _test_ap_interworking_scan_filtering(dev, apdev)
e4d7b513
JM
287 finally:
288 dev[0].request("SET hessid 00:00:00:00:00:00")
289 dev[0].request("SET access_network_type 15")
290
291def _test_ap_interworking_scan_filtering(dev, apdev):
715bf904
JM
292 bssid = apdev[0]['bssid']
293 params = hs20_ap_params()
294 ssid = "test-hs20-ap1"
295 params['ssid'] = ssid
296 params['hessid'] = bssid
297 hostapd.add_ap(apdev[0]['ifname'], params)
298
299 bssid2 = apdev[1]['bssid']
300 params = hs20_ap_params()
301 ssid2 = "test-hs20-ap2"
302 params['ssid'] = ssid2
303 params['hessid'] = bssid2
304 params['access_network_type'] = "1"
8175854e
JM
305 del params['venue_group']
306 del params['venue_type']
715bf904
JM
307 hostapd.add_ap(apdev[1]['ifname'], params)
308
715bf904
JM
309 dev[0].hs20_enable()
310
311 wt = Wlantest()
312 wt.flush()
313
314 logger.info("Check probe request filtering based on HESSID")
315
316 dev[0].request("SET hessid " + bssid2)
0589f401 317 dev[0].scan(freq="2412")
94a2dd0b 318 time.sleep(0.03)
715bf904
JM
319 check_probe_resp(wt, bssid, bssid2)
320
321 logger.info("Check probe request filtering based on access network type")
322
323 wt.clear_bss_counters(bssid)
324 wt.clear_bss_counters(bssid2)
325 dev[0].request("SET hessid 00:00:00:00:00:00")
326 dev[0].request("SET access_network_type 14")
0589f401 327 dev[0].scan(freq="2412")
94a2dd0b 328 time.sleep(0.03)
715bf904
JM
329 check_probe_resp(wt, bssid2, bssid)
330
331 wt.clear_bss_counters(bssid)
332 wt.clear_bss_counters(bssid2)
333 dev[0].request("SET hessid 00:00:00:00:00:00")
334 dev[0].request("SET access_network_type 1")
0589f401 335 dev[0].scan(freq="2412")
94a2dd0b 336 time.sleep(0.03)
715bf904
JM
337 check_probe_resp(wt, bssid, bssid2)
338
339 logger.info("Check probe request filtering based on HESSID and ANT")
340
341 wt.clear_bss_counters(bssid)
342 wt.clear_bss_counters(bssid2)
343 dev[0].request("SET hessid " + bssid)
344 dev[0].request("SET access_network_type 14")
0589f401 345 dev[0].scan(freq="2412")
94a2dd0b 346 time.sleep(0.03)
715bf904
JM
347 check_probe_resp(wt, bssid2, bssid)
348
349 wt.clear_bss_counters(bssid)
350 wt.clear_bss_counters(bssid2)
351 dev[0].request("SET hessid " + bssid2)
352 dev[0].request("SET access_network_type 14")
0589f401 353 dev[0].scan(freq="2412")
94a2dd0b 354 time.sleep(0.03)
715bf904
JM
355 check_probe_resp(wt, bssid, None)
356 check_probe_resp(wt, bssid2, None)
357
358 wt.clear_bss_counters(bssid)
359 wt.clear_bss_counters(bssid2)
360 dev[0].request("SET hessid " + bssid)
361 dev[0].request("SET access_network_type 1")
0589f401 362 dev[0].scan(freq="2412")
94a2dd0b 363 time.sleep(0.03)
715bf904
JM
364 check_probe_resp(wt, bssid, None)
365 check_probe_resp(wt, bssid2, None)
366
bbe86767
JM
367def test_ap_hs20_select(dev, apdev):
368 """Hotspot 2.0 network selection"""
369 bssid = apdev[0]['bssid']
370 params = hs20_ap_params()
371 params['hessid'] = bssid
372 hostapd.add_ap(apdev[0]['ifname'], params)
373
374 dev[0].hs20_enable()
2232edf8
JM
375 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
376 'password': "secret",
377 'domain': "example.com" })
bbe86767
JM
378 interworking_select(dev[0], bssid, "home")
379
380 dev[0].remove_cred(id)
2232edf8
JM
381 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
382 'password': "secret",
383 'domain': "no.match.example.com" })
2f37a66d 384 interworking_select(dev[0], bssid, "roaming", freq="2412")
bbe86767
JM
385
386 dev[0].set_cred_quoted(id, "realm", "no.match.example.com");
2f37a66d 387 interworking_select(dev[0], bssid, no_match=True, freq="2412")
bbe86767 388
d463c556
JM
389 res = dev[0].request("SCAN_RESULTS")
390 if "[HS20]" not in res:
391 raise Exception("HS20 flag missing from scan results: " + res)
392
4b572e3a
JM
393 bssid2 = apdev[1]['bssid']
394 params = hs20_ap_params()
395 params['nai_realm'] = [ "0,example.org,21" ]
396 params['hessid'] = bssid2
397 params['domain_name'] = "example.org"
398 hostapd.add_ap(apdev[1]['ifname'], params)
399 dev[0].remove_cred(id)
400 id = dev[0].add_cred_values({ 'realm': "example.org", 'username': "test",
401 'password': "secret",
402 'domain': "example.org" })
403 interworking_select(dev[0], bssid2, "home", freq="2412")
404
459e96cd
JM
405def hs20_simulated_sim(dev, ap, method):
406 bssid = ap['bssid']
407 params = hs20_ap_params()
408 params['hessid'] = bssid
409 params['anqp_3gpp_cell_net'] = "555,444"
410 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
411 hostapd.add_ap(ap['ifname'], params)
412
459e96cd
JM
413 dev.hs20_enable()
414 dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
415 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
2f37a66d 416 interworking_select(dev, "home", freq="2412")
459e96cd
JM
417 interworking_connect(dev, bssid, method)
418 check_sp_type(dev, "home")
419
420def test_ap_hs20_sim(dev, apdev):
421 """Hotspot 2.0 with simulated SIM and EAP-SIM"""
81e787b7 422 hlr_auc_gw_available()
459e96cd 423 hs20_simulated_sim(dev[0], apdev[0], "SIM")
16ab63f4
JM
424 dev[0].request("INTERWORKING_SELECT auto freq=2412")
425 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
426 if ev is None:
427 raise Exception("Timeout on already-connected event")
459e96cd
JM
428
429def test_ap_hs20_aka(dev, apdev):
430 """Hotspot 2.0 with simulated USIM and EAP-AKA"""
81e787b7 431 hlr_auc_gw_available()
459e96cd
JM
432 hs20_simulated_sim(dev[0], apdev[0], "AKA")
433
434def test_ap_hs20_aka_prime(dev, apdev):
435 """Hotspot 2.0 with simulated USIM and EAP-AKA'"""
81e787b7 436 hlr_auc_gw_available()
459e96cd
JM
437 hs20_simulated_sim(dev[0], apdev[0], "AKA'")
438
bbe86767
JM
439def test_ap_hs20_ext_sim(dev, apdev):
440 """Hotspot 2.0 with external SIM processing"""
81e787b7 441 hlr_auc_gw_available()
bbe86767
JM
442 bssid = apdev[0]['bssid']
443 params = hs20_ap_params()
444 params['hessid'] = bssid
445 params['anqp_3gpp_cell_net'] = "232,01"
446 params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
447 hostapd.add_ap(apdev[0]['ifname'], params)
448
449 dev[0].hs20_enable()
47dcb118
JM
450 try:
451 dev[0].request("SET external_sim 1")
452 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
453 interworking_select(dev[0], "home", freq="2412")
454 interworking_ext_sim_connect(dev[0], bssid, "SIM")
455 check_sp_type(dev[0], "home")
456 finally:
457 dev[0].request("SET external_sim 0")
59f8a3c6
JM
458
459def test_ap_hs20_ext_sim_roaming(dev, apdev):
460 """Hotspot 2.0 with external SIM processing in roaming network"""
81e787b7 461 hlr_auc_gw_available()
59f8a3c6
JM
462 bssid = apdev[0]['bssid']
463 params = hs20_ap_params()
464 params['hessid'] = bssid
465 params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
466 params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
467 hostapd.add_ap(apdev[0]['ifname'], params)
468
469 dev[0].hs20_enable()
47dcb118
JM
470 try:
471 dev[0].request("SET external_sim 1")
472 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
473 interworking_select(dev[0], "roaming", freq="2412")
474 interworking_ext_sim_connect(dev[0], bssid, "SIM")
475 check_sp_type(dev[0], "roaming")
476 finally:
477 dev[0].request("SET external_sim 0")
8fba2e5d
JM
478
479def test_ap_hs20_username(dev, apdev):
480 """Hotspot 2.0 connection in username/password credential"""
8fba2e5d
JM
481 bssid = apdev[0]['bssid']
482 params = hs20_ap_params()
483 params['hessid'] = bssid
d627e131 484 params['disable_dgaf'] = '1'
8fba2e5d
JM
485 hostapd.add_ap(apdev[0]['ifname'], params)
486
487 dev[0].hs20_enable()
2232edf8
JM
488 id = dev[0].add_cred_values({ 'realm': "example.com",
489 'username': "hs20-test",
490 'password': "password",
a1281b9f 491 'ca_cert': "auth_serv/ca.pem",
5f1e31cf
JM
492 'domain': "example.com",
493 'update_identifier': "1234" })
2f37a66d 494 interworking_select(dev[0], bssid, "home", freq="2412")
8fba2e5d
JM
495 interworking_connect(dev[0], bssid, "TTLS")
496 check_sp_type(dev[0], "home")
10b3cc67
JM
497 status = dev[0].get_status()
498 if status['pairwise_cipher'] != "CCMP":
499 raise Exception("Unexpected pairwise cipher")
500 if status['hs20'] != "2":
501 raise Exception("Unexpected HS 2.0 support indication")
8fba2e5d 502
a1281b9f
JM
503 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
504 identity="hs20-test", password="password",
505 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
506 scan_freq="2412")
507
1e780974
JM
508def test_ap_hs20_connect_api(dev, apdev):
509 """Hotspot 2.0 connection with connect API"""
510 bssid = apdev[0]['bssid']
511 params = hs20_ap_params()
512 params['hessid'] = bssid
513 params['disable_dgaf'] = '1'
514 hostapd.add_ap(apdev[0]['ifname'], params)
515
516 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
517 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
518 wpas.hs20_enable()
243dcc4a 519 wpas.flush_scan_cache()
1e780974
JM
520 id = wpas.add_cred_values({ 'realm': "example.com",
521 'username': "hs20-test",
522 'password': "password",
523 'ca_cert': "auth_serv/ca.pem",
524 'domain': "example.com",
525 'update_identifier': "1234" })
526 interworking_select(wpas, bssid, "home", freq="2412")
527 interworking_connect(wpas, bssid, "TTLS")
528 check_sp_type(wpas, "home")
529 status = wpas.get_status()
530 if status['pairwise_cipher'] != "CCMP":
531 raise Exception("Unexpected pairwise cipher")
532 if status['hs20'] != "2":
533 raise Exception("Unexpected HS 2.0 support indication")
534
543f9f7e
JM
535def test_ap_hs20_auto_interworking(dev, apdev):
536 """Hotspot 2.0 connection with auto_interworking=1"""
537 bssid = apdev[0]['bssid']
538 params = hs20_ap_params()
539 params['hessid'] = bssid
540 params['disable_dgaf'] = '1'
541 hostapd.add_ap(apdev[0]['ifname'], params)
542
543 dev[0].hs20_enable(auto_interworking=True)
544 id = dev[0].add_cred_values({ 'realm': "example.com",
545 'username': "hs20-test",
546 'password': "password",
547 'ca_cert': "auth_serv/ca.pem",
548 'domain': "example.com",
549 'update_identifier': "1234" })
550 dev[0].request("REASSOCIATE")
5f35a5e2 551 dev[0].wait_connected(timeout=15)
543f9f7e
JM
552 check_sp_type(dev[0], "home")
553 status = dev[0].get_status()
554 if status['pairwise_cipher'] != "CCMP":
555 raise Exception("Unexpected pairwise cipher")
556 if status['hs20'] != "2":
557 raise Exception("Unexpected HS 2.0 support indication")
558
e912e4bc
JM
559def test_ap_hs20_auto_interworking_no_match(dev, apdev):
560 """Hotspot 2.0 connection with auto_interworking=1 and no matching network"""
561 hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "mismatch" })
562
563 dev[0].hs20_enable(auto_interworking=True)
564 id = dev[0].connect("mismatch", psk="12345678", scan_freq="2412",
565 only_add_network=True)
566 dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
567
568 id = dev[0].add_cred_values({ 'realm': "example.com",
569 'username': "hs20-test",
570 'password': "password",
571 'ca_cert': "auth_serv/ca.pem",
572 'domain': "example.com",
573 'update_identifier': "1234" })
574 dev[0].request("INTERWORKING_SELECT auto freq=2412")
575 time.sleep(0.1)
576 dev[0].dump_monitor()
577 for i in range(5):
578 logger.info("start ping")
579 if "PONG" not in dev[0].ctrl.request("PING", timeout=2):
580 raise Exception("PING failed")
581 logger.info("ping done")
582 fetch = 0
583 scan = 0
584 for j in range(15):
585 ev = dev[0].wait_event([ "ANQP fetch completed",
586 "CTRL-EVENT-SCAN-RESULTS" ], timeout=0.05)
587 if ev is None:
588 break
589 if "ANQP fetch completed" in ev:
590 fetch += 1
591 else:
592 scan += 1
593 if fetch > 2 * scan + 3:
594 raise Exception("Too many ANQP fetch iterations")
595 dev[0].dump_monitor()
596 dev[0].request("DISCONNECT")
597
bedb6ea5
JM
598def test_ap_hs20_auto_interworking_no_cred_match(dev, apdev):
599 """Hotspot 2.0 connection with auto_interworking=1 but no cred match"""
600 bssid = apdev[0]['bssid']
601 params = { "ssid": "test" }
602 hostapd.add_ap(apdev[0]['ifname'], params)
603
604 dev[0].hs20_enable(auto_interworking=True)
605 dev[0].add_cred_values({ 'realm': "example.com",
606 'username': "hs20-test",
607 'password': "password",
608 'ca_cert': "auth_serv/ca.pem",
609 'domain': "example.com" })
610
611 id = dev[0].connect("test", psk="12345678", only_add_network=True)
612 dev[0].request("ENABLE_NETWORK %s" % id)
613 logger.info("Verify that scanning continues when there is partial network block match")
614 for i in range(0, 2):
615 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
616 if ev is None:
617 raise Exception("Scan timed out")
618 logger.info("Scan completed")
619
dcd68168
JM
620def eap_test(dev, ap, eap_params, method, user):
621 bssid = ap['bssid']
622 params = hs20_ap_params()
623 params['nai_realm'] = [ "0,example.com," + eap_params ]
624 hostapd.add_ap(ap['ifname'], params)
625
dcd68168
JM
626 dev.hs20_enable()
627 dev.add_cred_values({ 'realm': "example.com",
524c6c33 628 'ca_cert': "auth_serv/ca.pem",
dcd68168
JM
629 'username': user,
630 'password': "password" })
2f37a66d 631 interworking_select(dev, bssid, freq="2412")
dcd68168
JM
632 interworking_connect(dev, bssid, method)
633
932be82c
JM
634def test_ap_hs20_eap_unknown(dev, apdev):
635 """Hotspot 2.0 connection with unknown EAP method"""
636 bssid = apdev[0]['bssid']
637 params = hs20_ap_params()
638 params['nai_realm'] = "0,example.com,99"
639 hostapd.add_ap(apdev[0]['ifname'], params)
640
641 dev[0].hs20_enable()
642 dev[0].add_cred_values(default_cred())
643 interworking_select(dev[0], None, no_match=True, freq="2412")
644
dcd68168
JM
645def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
646 """Hotspot 2.0 connection with PEAP/MSCHAPV2"""
647 eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
648
932be82c
JM
649def test_ap_hs20_eap_peap_default(dev, apdev):
650 """Hotspot 2.0 connection with PEAP/MSCHAPV2 (as default)"""
651 eap_test(dev[0], apdev[0], "25", "PEAP", "user")
652
dcd68168
JM
653def test_ap_hs20_eap_peap_gtc(dev, apdev):
654 """Hotspot 2.0 connection with PEAP/GTC"""
655 eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
656
932be82c
JM
657def test_ap_hs20_eap_peap_unknown(dev, apdev):
658 """Hotspot 2.0 connection with PEAP/unknown"""
659 bssid = apdev[0]['bssid']
660 params = hs20_ap_params()
661 params['nai_realm'] = "0,example.com,25[3:99]"
662 hostapd.add_ap(apdev[0]['ifname'], params)
663
664 dev[0].hs20_enable()
665 dev[0].add_cred_values(default_cred())
666 interworking_select(dev[0], None, no_match=True, freq="2412")
667
dcd68168
JM
668def test_ap_hs20_eap_ttls_chap(dev, apdev):
669 """Hotspot 2.0 connection with TTLS/CHAP"""
670 eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
671
672def test_ap_hs20_eap_ttls_mschap(dev, apdev):
673 """Hotspot 2.0 connection with TTLS/MSCHAP"""
674 eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
675
676def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
677 """Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
932be82c
JM
678 eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user")
679
680def test_ap_hs20_eap_ttls_eap_unknown(dev, apdev):
681 """Hotspot 2.0 connection with TTLS/EAP-unknown"""
682 bssid = apdev[0]['bssid']
683 params = hs20_ap_params()
684 params['nai_realm'] = "0,example.com,21[3:99]"
685 hostapd.add_ap(apdev[0]['ifname'], params)
686
687 dev[0].hs20_enable()
688 dev[0].add_cred_values(default_cred())
689 interworking_select(dev[0], None, no_match=True, freq="2412")
690
691def test_ap_hs20_eap_ttls_eap_unsupported(dev, apdev):
692 """Hotspot 2.0 connection with TTLS/EAP-OTP(unsupported)"""
693 bssid = apdev[0]['bssid']
694 params = hs20_ap_params()
695 params['nai_realm'] = "0,example.com,21[3:5]"
696 hostapd.add_ap(apdev[0]['ifname'], params)
697
698 dev[0].hs20_enable()
699 dev[0].add_cred_values(default_cred())
700 interworking_select(dev[0], None, no_match=True, freq="2412")
701
702def test_ap_hs20_eap_ttls_unknown(dev, apdev):
703 """Hotspot 2.0 connection with TTLS/unknown"""
704 bssid = apdev[0]['bssid']
705 params = hs20_ap_params()
706 params['nai_realm'] = "0,example.com,21[2:5]"
707 hostapd.add_ap(apdev[0]['ifname'], params)
708
709 dev[0].hs20_enable()
710 dev[0].add_cred_values(default_cred())
711 interworking_select(dev[0], None, no_match=True, freq="2412")
dcd68168
JM
712
713def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
714 """Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
3b51cc63 715 check_eap_capa(dev[0], "FAST")
dcd68168
JM
716 eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
717
718def test_ap_hs20_eap_fast_gtc(dev, apdev):
719 """Hotspot 2.0 connection with FAST/EAP-GTC"""
3b51cc63 720 check_eap_capa(dev[0], "FAST")
dcd68168
JM
721 eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
722
723def test_ap_hs20_eap_tls(dev, apdev):
724 """Hotspot 2.0 connection with EAP-TLS"""
725 bssid = apdev[0]['bssid']
726 params = hs20_ap_params()
727 params['nai_realm'] = [ "0,example.com,13[5:6]" ]
728 hostapd.add_ap(apdev[0]['ifname'], params)
729
dcd68168
JM
730 dev[0].hs20_enable()
731 dev[0].add_cred_values({ 'realm': "example.com",
732 'username': "certificate-user",
733 'ca_cert': "auth_serv/ca.pem",
734 'client_cert': "auth_serv/user.pem",
735 'private_key': "auth_serv/user.key"})
2f37a66d 736 interworking_select(dev[0], bssid, freq="2412")
dcd68168
JM
737 interworking_connect(dev[0], bssid, "TLS")
738
932be82c
JM
739def test_ap_hs20_eap_cert_unknown(dev, apdev):
740 """Hotspot 2.0 connection with certificate, but unknown EAP method"""
741 bssid = apdev[0]['bssid']
742 params = hs20_ap_params()
743 params['nai_realm'] = [ "0,example.com,99[5:6]" ]
744 hostapd.add_ap(apdev[0]['ifname'], params)
745
746 dev[0].hs20_enable()
747 dev[0].add_cred_values({ 'realm': "example.com",
748 'username': "certificate-user",
749 'ca_cert': "auth_serv/ca.pem",
750 'client_cert': "auth_serv/user.pem",
751 'private_key': "auth_serv/user.key"})
752 interworking_select(dev[0], None, no_match=True, freq="2412")
753
754def test_ap_hs20_eap_cert_unsupported(dev, apdev):
755 """Hotspot 2.0 connection with certificate, but unsupported TTLS"""
756 bssid = apdev[0]['bssid']
757 params = hs20_ap_params()
758 params['nai_realm'] = [ "0,example.com,21[5:6]" ]
759 hostapd.add_ap(apdev[0]['ifname'], params)
760
761 dev[0].hs20_enable()
762 dev[0].add_cred_values({ 'realm': "example.com",
763 'username': "certificate-user",
764 'ca_cert': "auth_serv/ca.pem",
765 'client_cert': "auth_serv/user.pem",
766 'private_key': "auth_serv/user.key"})
767 interworking_select(dev[0], None, no_match=True, freq="2412")
768
769def test_ap_hs20_eap_invalid_cred(dev, apdev):
770 """Hotspot 2.0 connection with invalid cred configuration"""
771 bssid = apdev[0]['bssid']
772 params = hs20_ap_params()
773 hostapd.add_ap(apdev[0]['ifname'], params)
774
775 dev[0].hs20_enable()
776 dev[0].add_cred_values({ 'realm': "example.com",
777 'username': "certificate-user",
778 'client_cert': "auth_serv/user.pem" })
779 interworking_select(dev[0], None, no_match=True, freq="2412")
780
0aca5d13
JM
781def test_ap_hs20_nai_realms(dev, apdev):
782 """Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
783 bssid = apdev[0]['bssid']
784 params = hs20_ap_params()
785 params['hessid'] = bssid
786 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
787 hostapd.add_ap(apdev[0]['ifname'], params)
788
0aca5d13
JM
789 dev[0].hs20_enable()
790 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 791 'ca_cert': "auth_serv/ca.pem",
0aca5d13
JM
792 'username': "pap user",
793 'password': "password",
794 'domain': "example.com" })
2f37a66d 795 interworking_select(dev[0], bssid, "home", freq="2412")
0aca5d13
JM
796 interworking_connect(dev[0], bssid, "TTLS")
797 check_sp_type(dev[0], "home")
798
e209eb98
JM
799def test_ap_hs20_roaming_consortium(dev, apdev):
800 """Hotspot 2.0 connection based on roaming consortium match"""
801 bssid = apdev[0]['bssid']
802 params = hs20_ap_params()
803 params['hessid'] = bssid
804 hostapd.add_ap(apdev[0]['ifname'], params)
805
e209eb98 806 dev[0].hs20_enable()
80584122
JM
807 for consortium in [ "112233", "1020304050", "010203040506", "fedcba" ]:
808 id = dev[0].add_cred_values({ 'username': "user",
809 'password': "password",
810 'domain': "example.com",
524c6c33 811 'ca_cert': "auth_serv/ca.pem",
80584122
JM
812 'roaming_consortium': consortium,
813 'eap': "PEAP" })
814 interworking_select(dev[0], bssid, "home", freq="2412")
815 interworking_connect(dev[0], bssid, "PEAP")
816 check_sp_type(dev[0], "home")
817 dev[0].request("INTERWORKING_SELECT auto freq=2412")
818 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
819 if ev is None:
820 raise Exception("Timeout on already-connected event")
821 dev[0].remove_cred(id)
e209eb98 822
8fba2e5d
JM
823def test_ap_hs20_username_roaming(dev, apdev):
824 """Hotspot 2.0 connection in username/password credential (roaming)"""
8fba2e5d
JM
825 bssid = apdev[0]['bssid']
826 params = hs20_ap_params()
827 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
828 "0,roaming.example.com,21[2:4][5:7]",
829 "0,another.example.com" ]
830 params['domain_name'] = "another.example.com"
831 params['hessid'] = bssid
832 hostapd.add_ap(apdev[0]['ifname'], params)
833
834 dev[0].hs20_enable()
2232edf8
JM
835 id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
836 'username': "hs20-test",
837 'password': "password",
524c6c33 838 'ca_cert': "auth_serv/ca.pem",
2232edf8 839 'domain': "example.com" })
2f37a66d 840 interworking_select(dev[0], bssid, "roaming", freq="2412")
8fba2e5d
JM
841 interworking_connect(dev[0], bssid, "TTLS")
842 check_sp_type(dev[0], "roaming")
843
844def test_ap_hs20_username_unknown(dev, apdev):
845 """Hotspot 2.0 connection in username/password credential (no domain in cred)"""
8fba2e5d
JM
846 bssid = apdev[0]['bssid']
847 params = hs20_ap_params()
848 params['hessid'] = bssid
849 hostapd.add_ap(apdev[0]['ifname'], params)
850
851 dev[0].hs20_enable()
2232edf8 852 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 853 'ca_cert': "auth_serv/ca.pem",
2232edf8
JM
854 'username': "hs20-test",
855 'password': "password" })
2f37a66d 856 interworking_select(dev[0], bssid, "unknown", freq="2412")
8fba2e5d
JM
857 interworking_connect(dev[0], bssid, "TTLS")
858 check_sp_type(dev[0], "unknown")
859
860def test_ap_hs20_username_unknown2(dev, apdev):
861 """Hotspot 2.0 connection in username/password credential (no domain advertized)"""
8fba2e5d
JM
862 bssid = apdev[0]['bssid']
863 params = hs20_ap_params()
864 params['hessid'] = bssid
865 del params['domain_name']
866 hostapd.add_ap(apdev[0]['ifname'], params)
867
868 dev[0].hs20_enable()
2232edf8 869 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 870 'ca_cert': "auth_serv/ca.pem",
2232edf8
JM
871 'username': "hs20-test",
872 'password': "password",
873 'domain': "example.com" })
2f37a66d 874 interworking_select(dev[0], bssid, "unknown", freq="2412")
8fba2e5d
JM
875 interworking_connect(dev[0], bssid, "TTLS")
876 check_sp_type(dev[0], "unknown")
d1ba402f 877
483691bd
JM
878def test_ap_hs20_gas_while_associated(dev, apdev):
879 """Hotspot 2.0 connection with GAS query while associated"""
880 bssid = apdev[0]['bssid']
881 params = hs20_ap_params()
882 params['hessid'] = bssid
883 hostapd.add_ap(apdev[0]['ifname'], params)
884
483691bd
JM
885 dev[0].hs20_enable()
886 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 887 'ca_cert': "auth_serv/ca.pem",
483691bd
JM
888 'username': "hs20-test",
889 'password': "password",
890 'domain': "example.com" })
2f37a66d 891 interworking_select(dev[0], bssid, "home", freq="2412")
483691bd
JM
892 interworking_connect(dev[0], bssid, "TTLS")
893
894 logger.info("Verifying GAS query while associated")
895 dev[0].request("FETCH_ANQP")
896 for i in range(0, 6):
897 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
898 if ev is None:
899 raise Exception("Operation timed out")
900
ee2caef3
JM
901def test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
902 """Hotspot 2.0 connection with GAS query while associated and using PMF"""
909f13cc
JM
903 try:
904 _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev)
905 finally:
906 dev[0].request("SET pmf 0")
907
908def _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
ee2caef3
JM
909 bssid = apdev[0]['bssid']
910 params = hs20_ap_params()
911 params['hessid'] = bssid
912 hostapd.add_ap(apdev[0]['ifname'], params)
913
914 bssid2 = apdev[1]['bssid']
915 params = hs20_ap_params()
916 params['hessid'] = bssid2
917 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
918 hostapd.add_ap(apdev[1]['ifname'], params)
919
920 dev[0].hs20_enable()
921 dev[0].request("SET pmf 2")
922 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 923 'ca_cert': "auth_serv/ca.pem",
ee2caef3
JM
924 'username': "hs20-test",
925 'password': "password",
926 'domain': "example.com" })
927 interworking_select(dev[0], bssid, "home", freq="2412")
928 interworking_connect(dev[0], bssid, "TTLS")
929
930 logger.info("Verifying GAS query while associated")
931 dev[0].request("FETCH_ANQP")
932 for i in range(0, 2 * 6):
933 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
934 if ev is None:
935 raise Exception("Operation timed out")
936
483691bd
JM
937def test_ap_hs20_gas_frag_while_associated(dev, apdev):
938 """Hotspot 2.0 connection with fragmented GAS query while associated"""
939 bssid = apdev[0]['bssid']
940 params = hs20_ap_params()
941 params['hessid'] = bssid
942 hostapd.add_ap(apdev[0]['ifname'], params)
943 hapd = hostapd.Hostapd(apdev[0]['ifname'])
944 hapd.set("gas_frag_limit", "50")
945
483691bd
JM
946 dev[0].hs20_enable()
947 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 948 'ca_cert': "auth_serv/ca.pem",
483691bd
JM
949 'username': "hs20-test",
950 'password': "password",
951 'domain': "example.com" })
2f37a66d 952 interworking_select(dev[0], bssid, "home", freq="2412")
483691bd
JM
953 interworking_connect(dev[0], bssid, "TTLS")
954
955 logger.info("Verifying GAS query while associated")
956 dev[0].request("FETCH_ANQP")
957 for i in range(0, 6):
958 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
959 if ev is None:
960 raise Exception("Operation timed out")
961
6a0b4002
JM
962def test_ap_hs20_multiple_connects(dev, apdev):
963 """Hotspot 2.0 connection through multiple network selections"""
964 bssid = apdev[0]['bssid']
965 params = hs20_ap_params()
966 params['hessid'] = bssid
967 hostapd.add_ap(apdev[0]['ifname'], params)
968
969 dev[0].hs20_enable()
970 values = { 'realm': "example.com",
524c6c33 971 'ca_cert': "auth_serv/ca.pem",
6a0b4002
JM
972 'username': "hs20-test",
973 'password': "password",
974 'domain': "example.com" }
975 id = dev[0].add_cred_values(values)
976
841bed04
JM
977 dev[0].scan_for_bss(bssid, freq="2412")
978
6a0b4002
JM
979 for i in range(0, 3):
980 logger.info("Starting Interworking network selection")
2f37a66d 981 dev[0].request("INTERWORKING_SELECT auto freq=2412")
6a0b4002
JM
982 while True:
983 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
984 "INTERWORKING-ALREADY-CONNECTED",
985 "CTRL-EVENT-CONNECTED"], timeout=15)
986 if ev is None:
987 raise Exception("Connection timed out")
988 if "INTERWORKING-NO-MATCH" in ev:
989 raise Exception("Matching AP not found")
990 if "CTRL-EVENT-CONNECTED" in ev:
991 break
992 if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
993 break
994 if i == 0:
995 dev[0].request("DISCONNECT")
996 dev[0].dump_monitor()
997
998 networks = dev[0].list_networks()
999 if len(networks) > 1:
1000 raise Exception("Duplicated network block detected")
1001
b4264f8f
JM
1002def test_ap_hs20_disallow_aps(dev, apdev):
1003 """Hotspot 2.0 connection and disallow_aps"""
1004 bssid = apdev[0]['bssid']
1005 params = hs20_ap_params()
1006 params['hessid'] = bssid
1007 hostapd.add_ap(apdev[0]['ifname'], params)
1008
1009 dev[0].hs20_enable()
1010 values = { 'realm': "example.com",
524c6c33 1011 'ca_cert': "auth_serv/ca.pem",
b4264f8f
JM
1012 'username': "hs20-test",
1013 'password': "password",
1014 'domain': "example.com" }
1015 id = dev[0].add_cred_values(values)
1016
841bed04
JM
1017 dev[0].scan_for_bss(bssid, freq="2412")
1018
b4264f8f
JM
1019 logger.info("Verify disallow_aps bssid")
1020 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1021 dev[0].request("INTERWORKING_SELECT auto")
1022 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1023 if ev is None:
1024 raise Exception("Network selection timed out")
1025 dev[0].dump_monitor()
1026
1027 logger.info("Verify disallow_aps ssid")
1028 dev[0].request("SET disallow_aps ssid 746573742d68733230")
2f37a66d 1029 dev[0].request("INTERWORKING_SELECT auto freq=2412")
b4264f8f
JM
1030 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1031 if ev is None:
1032 raise Exception("Network selection timed out")
1033 dev[0].dump_monitor()
1034
1035 logger.info("Verify disallow_aps clear")
1036 dev[0].request("SET disallow_aps ")
2f37a66d 1037 interworking_select(dev[0], bssid, "home", freq="2412")
b4264f8f
JM
1038
1039 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1040 ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
1041 if "FAIL" not in ret:
1042 raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
1043
7e71fbc1
JM
1044 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT foo"):
1045 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1046 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT 00:11:22:33:44:55"):
1047 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1048
d1ba402f
JM
1049def policy_test(dev, ap, values, only_one=True):
1050 dev.dump_monitor()
19839f8e
JM
1051 if ap:
1052 logger.info("Verify network selection to AP " + ap['ifname'])
1053 bssid = ap['bssid']
841bed04 1054 dev.scan_for_bss(bssid, freq="2412")
19839f8e
JM
1055 else:
1056 logger.info("Verify network selection")
1057 bssid = None
d1ba402f
JM
1058 dev.hs20_enable()
1059 id = dev.add_cred_values(values)
2f37a66d 1060 dev.request("INTERWORKING_SELECT auto freq=2412")
19839f8e 1061 events = []
d1ba402f
JM
1062 while True:
1063 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
1965cc3a 1064 "INTERWORKING-BLACKLISTED",
953a574d 1065 "INTERWORKING-SELECTED"], timeout=15)
d1ba402f 1066 if ev is None:
953a574d 1067 raise Exception("Network selection timed out")
19839f8e 1068 events.append(ev)
d1ba402f
JM
1069 if "INTERWORKING-NO-MATCH" in ev:
1070 raise Exception("Matching AP not found")
19839f8e 1071 if bssid and only_one and "INTERWORKING-AP" in ev and bssid not in ev:
d1ba402f 1072 raise Exception("Unexpected AP claimed acceptable")
953a574d 1073 if "INTERWORKING-SELECTED" in ev:
19839f8e 1074 if bssid and bssid not in ev:
953a574d 1075 raise Exception("Selected incorrect BSS")
d1ba402f
JM
1076 break
1077
5f35a5e2 1078 ev = dev.wait_connected(timeout=15)
19839f8e 1079 if bssid and bssid not in ev:
953a574d
JM
1080 raise Exception("Connected to incorrect BSS")
1081
d1ba402f 1082 conn_bssid = dev.get_status_field("bssid")
19839f8e 1083 if bssid and conn_bssid != bssid:
d1ba402f
JM
1084 raise Exception("bssid information points to incorrect BSS")
1085
1086 dev.remove_cred(id)
1087 dev.dump_monitor()
19839f8e 1088 return events
d1ba402f 1089
22653762 1090def default_cred(domain=None, user="hs20-test"):
9714fbcd 1091 cred = { 'realm': "example.com",
524c6c33 1092 'ca_cert': "auth_serv/ca.pem",
22653762 1093 'username': user,
d355372c 1094 'password': "password" }
9714fbcd
JM
1095 if domain:
1096 cred['domain'] = domain
1097 return cred
d355372c 1098
cfa57df6
JM
1099def test_ap_hs20_prefer_home(dev, apdev):
1100 """Hotspot 2.0 required roaming consortium"""
1101 params = hs20_ap_params()
1102 params['domain_name'] = "example.org"
1103 hostapd.add_ap(apdev[0]['ifname'], params)
1104
1105 params = hs20_ap_params()
1106 params['ssid'] = "test-hs20-other"
1107 params['domain_name'] = "example.com"
1108 hostapd.add_ap(apdev[1]['ifname'], params)
1109
1110 values = default_cred()
1111 values['domain'] = "example.com"
1112 policy_test(dev[0], apdev[1], values, only_one=False)
1113 values['domain'] = "example.org"
1114 policy_test(dev[0], apdev[0], values, only_one=False)
1115
d1ba402f
JM
1116def test_ap_hs20_req_roaming_consortium(dev, apdev):
1117 """Hotspot 2.0 required roaming consortium"""
1118 params = hs20_ap_params()
1119 hostapd.add_ap(apdev[0]['ifname'], params)
1120
1121 params = hs20_ap_params()
1122 params['ssid'] = "test-hs20-other"
1123 params['roaming_consortium'] = [ "223344" ]
1124 hostapd.add_ap(apdev[1]['ifname'], params)
1125
d355372c
JM
1126 values = default_cred()
1127 values['required_roaming_consortium'] = "223344"
d1ba402f
JM
1128 policy_test(dev[0], apdev[1], values)
1129 values['required_roaming_consortium'] = "112233"
1130 policy_test(dev[0], apdev[0], values)
d355372c 1131
af70a093
JM
1132 id = dev[0].add_cred()
1133 dev[0].set_cred(id, "required_roaming_consortium", "112233")
1134 dev[0].set_cred(id, "required_roaming_consortium", "112233445566778899aabbccddeeff")
1135
1136 for val in [ "", "1", "11", "1122", "1122334", "112233445566778899aabbccddeeff00" ]:
1137 if "FAIL" not in dev[0].request('SET_CRED {} required_roaming_consortium {}'.format(id, val)):
1138 raise Exception("Invalid roaming consortium value accepted: " + val)
1139
d355372c
JM
1140def test_ap_hs20_excluded_ssid(dev, apdev):
1141 """Hotspot 2.0 exclusion based on SSID"""
1142 params = hs20_ap_params()
e2afdef2
JM
1143 params['roaming_consortium'] = [ "223344" ]
1144 params['anqp_3gpp_cell_net'] = "555,444"
d355372c
JM
1145 hostapd.add_ap(apdev[0]['ifname'], params)
1146
1147 params = hs20_ap_params()
1148 params['ssid'] = "test-hs20-other"
1149 params['roaming_consortium'] = [ "223344" ]
e2afdef2 1150 params['anqp_3gpp_cell_net'] = "555,444"
d355372c
JM
1151 hostapd.add_ap(apdev[1]['ifname'], params)
1152
1153 values = default_cred()
1154 values['excluded_ssid'] = "test-hs20"
1965cc3a
JM
1155 events = policy_test(dev[0], apdev[1], values)
1156 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1157 if len(ev) != 1:
1158 raise Exception("Excluded network not reported")
d355372c 1159 values['excluded_ssid'] = "test-hs20-other"
1965cc3a
JM
1160 events = policy_test(dev[0], apdev[0], values)
1161 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[1]['bssid'] in e]
1162 if len(ev) != 1:
1163 raise Exception("Excluded network not reported")
d4058934 1164
e2afdef2
JM
1165 values = default_cred()
1166 values['roaming_consortium'] = "223344"
1167 values['eap'] = "TTLS"
1168 values['phase2'] = "auth=MSCHAPV2"
1169 values['excluded_ssid'] = "test-hs20"
1170 events = policy_test(dev[0], apdev[1], values)
1171 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1172 if len(ev) != 1:
1173 raise Exception("Excluded network not reported")
1174
1175 values = { 'imsi': "555444-333222111", 'eap': "SIM",
1176 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1177 'excluded_ssid': "test-hs20" }
1178 events = policy_test(dev[0], apdev[1], values)
1179 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1180 if len(ev) != 1:
1181 raise Exception("Excluded network not reported")
1182
d4058934
JM
1183def test_ap_hs20_roam_to_higher_prio(dev, apdev):
1184 """Hotspot 2.0 and roaming from current to higher priority network"""
1185 bssid = apdev[0]['bssid']
1186 params = hs20_ap_params(ssid="test-hs20-visited")
1187 params['domain_name'] = "visited.example.org"
1188 hostapd.add_ap(apdev[0]['ifname'], params)
1189
1190 dev[0].hs20_enable()
1191 id = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 1192 'ca_cert': "auth_serv/ca.pem",
d4058934
JM
1193 'username': "hs20-test",
1194 'password': "password",
1195 'domain': "example.com" })
1196 logger.info("Connect to the only network option")
1197 interworking_select(dev[0], bssid, "roaming", freq="2412")
1198 dev[0].dump_monitor()
1199 interworking_connect(dev[0], bssid, "TTLS")
1200
1201 logger.info("Start another AP (home operator) and reconnect")
1202 bssid2 = apdev[1]['bssid']
1203 params = hs20_ap_params(ssid="test-hs20-home")
1204 params['domain_name'] = "example.com"
1205 hostapd.add_ap(apdev[1]['ifname'], params)
1206
841bed04 1207 dev[0].scan_for_bss(bssid2, freq="2412", force_scan=True)
d4058934
JM
1208 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1209 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1210 "INTERWORKING-ALREADY-CONNECTED",
1211 "CTRL-EVENT-CONNECTED"], timeout=15)
1212 if ev is None:
1213 raise Exception("Connection timed out")
1214 if "INTERWORKING-NO-MATCH" in ev:
1215 raise Exception("Matching AP not found")
1216 if "INTERWORKING-ALREADY-CONNECTED" in ev:
1217 raise Exception("Unexpected AP selected")
1218 if bssid2 not in ev:
1219 raise Exception("Unexpected BSSID after reconnection")
12c587a5 1220
24579e70 1221def test_ap_hs20_domain_suffix_match_full(dev, apdev):
12c587a5
JM
1222 """Hotspot 2.0 and domain_suffix_match"""
1223 bssid = apdev[0]['bssid']
1224 params = hs20_ap_params()
1225 hostapd.add_ap(apdev[0]['ifname'], params)
1226
1227 dev[0].hs20_enable()
1228 id = dev[0].add_cred_values({ 'realm': "example.com",
1229 'username': "hs20-test",
1230 'password': "password",
524c6c33 1231 'ca_cert': "auth_serv/ca.pem",
12c587a5 1232 'domain': "example.com",
24579e70 1233 'domain_suffix_match': "server.w1.fi" })
12c587a5
JM
1234 interworking_select(dev[0], bssid, "home", freq="2412")
1235 dev[0].dump_monitor()
1236 interworking_connect(dev[0], bssid, "TTLS")
1237 dev[0].request("REMOVE_NETWORK all")
1238 dev[0].dump_monitor()
1239
1240 dev[0].set_cred_quoted(id, "domain_suffix_match", "no-match.example.com")
1241 interworking_select(dev[0], bssid, "home", freq="2412")
1242 dev[0].dump_monitor()
1243 dev[0].request("INTERWORKING_CONNECT " + bssid)
1244 ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"])
1245 if ev is None:
1246 raise Exception("TLS certificate error not reported")
1247 if "Domain suffix mismatch" not in ev:
1248 raise Exception("Domain suffix mismatch not reported")
078683ac 1249
24579e70
JM
1250def test_ap_hs20_domain_suffix_match(dev, apdev):
1251 """Hotspot 2.0 and domain_suffix_match"""
1252 check_domain_match_full(dev[0])
1253 bssid = apdev[0]['bssid']
1254 params = hs20_ap_params()
1255 hostapd.add_ap(apdev[0]['ifname'], params)
1256
1257 dev[0].hs20_enable()
1258 id = dev[0].add_cred_values({ 'realm': "example.com",
1259 'username': "hs20-test",
1260 'password': "password",
1261 'ca_cert': "auth_serv/ca.pem",
1262 'domain': "example.com",
1263 'domain_suffix_match': "w1.fi" })
1264 interworking_select(dev[0], bssid, "home", freq="2412")
1265 dev[0].dump_monitor()
1266 interworking_connect(dev[0], bssid, "TTLS")
1267
2253ea44
JM
1268def test_ap_hs20_roaming_partner_preference(dev, apdev):
1269 """Hotspot 2.0 and roaming partner preference"""
1270 params = hs20_ap_params()
1271 params['domain_name'] = "roaming.example.org"
1272 hostapd.add_ap(apdev[0]['ifname'], params)
1273
1274 params = hs20_ap_params()
1275 params['ssid'] = "test-hs20-other"
1276 params['domain_name'] = "roaming.example.net"
1277 hostapd.add_ap(apdev[1]['ifname'], params)
1278
1279 logger.info("Verify default vs. specified preference")
1280 values = default_cred()
1281 values['roaming_partner'] = "roaming.example.net,1,127,*"
1282 policy_test(dev[0], apdev[1], values, only_one=False)
1283 values['roaming_partner'] = "roaming.example.net,1,129,*"
1284 policy_test(dev[0], apdev[0], values, only_one=False)
1285
1286 logger.info("Verify partial FQDN match")
1287 values['roaming_partner'] = "example.net,0,0,*"
1288 policy_test(dev[0], apdev[1], values, only_one=False)
1289 values['roaming_partner'] = "example.net,0,255,*"
1290 policy_test(dev[0], apdev[0], values, only_one=False)
1291
19839f8e
JM
1292def test_ap_hs20_max_bss_load(dev, apdev):
1293 """Hotspot 2.0 and maximum BSS load"""
1294 params = hs20_ap_params()
1295 params['bss_load_test'] = "12:200:20000"
1296 hostapd.add_ap(apdev[0]['ifname'], params)
1297
1298 params = hs20_ap_params()
1299 params['ssid'] = "test-hs20-other"
1300 params['bss_load_test'] = "5:20:10000"
1301 hostapd.add_ap(apdev[1]['ifname'], params)
1302
1303 logger.info("Verify maximum BSS load constraint")
1304 values = default_cred()
1305 values['domain'] = "example.com"
1306 values['max_bss_load'] = "100"
1307 events = policy_test(dev[0], apdev[1], values, only_one=False)
1308
1309 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1310 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1311 raise Exception("Maximum BSS Load case not noticed")
1312 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1313 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1314 raise Exception("Maximum BSS Load case reported incorrectly")
1315
1316 logger.info("Verify maximum BSS load does not prevent connection")
1317 values['max_bss_load'] = "1"
1318 events = policy_test(dev[0], None, values)
1319
1320 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1321 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1322 raise Exception("Maximum BSS Load case not noticed")
1323 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1324 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1325 raise Exception("Maximum BSS Load case not noticed")
1326
1327def test_ap_hs20_max_bss_load2(dev, apdev):
1328 """Hotspot 2.0 and maximum BSS load with one AP not advertising"""
1329 params = hs20_ap_params()
1330 params['bss_load_test'] = "12:200:20000"
1331 hostapd.add_ap(apdev[0]['ifname'], params)
1332
1333 params = hs20_ap_params()
1334 params['ssid'] = "test-hs20-other"
1335 hostapd.add_ap(apdev[1]['ifname'], params)
1336
1337 logger.info("Verify maximum BSS load constraint with AP advertisement")
1338 values = default_cred()
1339 values['domain'] = "example.com"
1340 values['max_bss_load'] = "100"
1341 events = policy_test(dev[0], apdev[1], values, only_one=False)
1342
1343 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1344 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1345 raise Exception("Maximum BSS Load case not noticed")
1346 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1347 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1348 raise Exception("Maximum BSS Load case reported incorrectly")
1349
078683ac
JM
1350def test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1351 """Hotspot 2.0 multi-cred sp_priority"""
47dcb118 1352 try:
81e787b7 1353 _test_ap_hs20_multi_cred_sp_prio(dev, apdev)
47dcb118
JM
1354 finally:
1355 dev[0].request("SET external_sim 0")
1356
1357def _test_ap_hs20_multi_cred_sp_prio(dev, apdev):
81e787b7 1358 hlr_auc_gw_available()
078683ac
JM
1359 bssid = apdev[0]['bssid']
1360 params = hs20_ap_params()
1361 params['hessid'] = bssid
1362 del params['domain_name']
1363 params['anqp_3gpp_cell_net'] = "232,01"
1364 hostapd.add_ap(apdev[0]['ifname'], params)
1365
1366 dev[0].hs20_enable()
852cb016 1367 dev[0].scan_for_bss(bssid, freq="2412")
078683ac
JM
1368 dev[0].request("SET external_sim 1")
1369 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1370 'provisioning_sp': "example.com",
1371 'sp_priority' :"1" })
1372 id2 = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 1373 'ca_cert': "auth_serv/ca.pem",
078683ac
JM
1374 'username': "hs20-test",
1375 'password': "password",
1376 'domain': "example.com",
1377 'provisioning_sp': "example.com",
1378 'sp_priority': "2" })
1379 dev[0].dump_monitor()
852cb016 1380 dev[0].scan_for_bss(bssid, freq="2412")
0b651713 1381 dev[0].request("INTERWORKING_SELECT auto freq=2412")
078683ac
JM
1382 interworking_ext_sim_auth(dev[0], "SIM")
1383 check_sp_type(dev[0], "unknown")
1384 dev[0].request("REMOVE_NETWORK all")
1385
1386 dev[0].set_cred(id1, "sp_priority", "2")
1387 dev[0].set_cred(id2, "sp_priority", "1")
1388 dev[0].dump_monitor()
0b651713 1389 dev[0].request("INTERWORKING_SELECT auto freq=2412")
078683ac
JM
1390 interworking_auth(dev[0], "TTLS")
1391 check_sp_type(dev[0], "unknown")
1392
1393def test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1394 """Hotspot 2.0 multi-cred sp_priority with two BSSes"""
47dcb118 1395 try:
81e787b7 1396 _test_ap_hs20_multi_cred_sp_prio2(dev, apdev)
47dcb118
JM
1397 finally:
1398 dev[0].request("SET external_sim 0")
1399
1400def _test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
81e787b7 1401 hlr_auc_gw_available()
078683ac
JM
1402 bssid = apdev[0]['bssid']
1403 params = hs20_ap_params()
1404 params['hessid'] = bssid
1405 del params['nai_realm']
1406 del params['domain_name']
1407 params['anqp_3gpp_cell_net'] = "232,01"
1408 hostapd.add_ap(apdev[0]['ifname'], params)
1409
1410 bssid2 = apdev[1]['bssid']
1411 params = hs20_ap_params()
1412 params['ssid'] = "test-hs20-other"
1413 params['hessid'] = bssid2
1414 del params['domain_name']
1415 del params['anqp_3gpp_cell_net']
1416 hostapd.add_ap(apdev[1]['ifname'], params)
1417
1418 dev[0].hs20_enable()
1419 dev[0].request("SET external_sim 1")
1420 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1421 'provisioning_sp': "example.com",
1422 'sp_priority': "1" })
1423 id2 = dev[0].add_cred_values({ 'realm': "example.com",
524c6c33 1424 'ca_cert': "auth_serv/ca.pem",
078683ac
JM
1425 'username': "hs20-test",
1426 'password': "password",
1427 'domain': "example.com",
1428 'provisioning_sp': "example.com",
1429 'sp_priority': "2" })
1430 dev[0].dump_monitor()
852cb016
JM
1431 dev[0].scan_for_bss(bssid, freq="2412")
1432 dev[0].scan_for_bss(bssid2, freq="2412")
0b651713 1433 dev[0].request("INTERWORKING_SELECT auto freq=2412")
078683ac
JM
1434 interworking_ext_sim_auth(dev[0], "SIM")
1435 check_sp_type(dev[0], "unknown")
1436 conn_bssid = dev[0].get_status_field("bssid")
1437 if conn_bssid != bssid:
1438 raise Exception("Connected to incorrect BSS")
1439 dev[0].request("REMOVE_NETWORK all")
1440
1441 dev[0].set_cred(id1, "sp_priority", "2")
1442 dev[0].set_cred(id2, "sp_priority", "1")
1443 dev[0].dump_monitor()
0b651713 1444 dev[0].request("INTERWORKING_SELECT auto freq=2412")
078683ac
JM
1445 interworking_auth(dev[0], "TTLS")
1446 check_sp_type(dev[0], "unknown")
1447 conn_bssid = dev[0].get_status_field("bssid")
1448 if conn_bssid != bssid2:
1449 raise Exception("Connected to incorrect BSS")
5e32f825 1450
a3dd0478
JM
1451def check_conn_capab_selection(dev, type, missing):
1452 dev.request("INTERWORKING_SELECT freq=2412")
1453 ev = dev.wait_event(["INTERWORKING-AP"])
1454 if ev is None:
1455 raise Exception("Network selection timed out");
1456 if "type=" + type not in ev:
1457 raise Exception("Unexpected network type")
1458 if missing and "conn_capab_missing=1" not in ev:
1459 raise Exception("conn_capab_missing not reported")
1460 if not missing and "conn_capab_missing=1" in ev:
1461 raise Exception("conn_capab_missing reported unexpectedly")
1462
1463def conn_capab_cred(domain=None, req_conn_capab=None):
1464 cred = default_cred(domain=domain)
1465 if req_conn_capab:
1466 cred['req_conn_capab'] = req_conn_capab
1467 return cred
1468
18153179
JM
1469def test_ap_hs20_req_conn_capab(dev, apdev):
1470 """Hotspot 2.0 network selection with req_conn_capab"""
1471 bssid = apdev[0]['bssid']
1472 params = hs20_ap_params()
1473 hostapd.add_ap(apdev[0]['ifname'], params)
1474
1475 dev[0].hs20_enable()
852cb016 1476 dev[0].scan_for_bss(bssid, freq="2412")
18153179 1477 logger.info("Not used in home network")
a3dd0478
JM
1478 values = conn_capab_cred(domain="example.com", req_conn_capab="6:1234")
1479 id = dev[0].add_cred_values(values)
1480 check_conn_capab_selection(dev[0], "home", False)
18153179
JM
1481
1482 logger.info("Used in roaming network")
1483 dev[0].remove_cred(id)
a3dd0478
JM
1484 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
1485 id = dev[0].add_cred_values(values)
1486 check_conn_capab_selection(dev[0], "roaming", True)
18153179
JM
1487
1488 logger.info("Verify that req_conn_capab does not prevent connection if no other network is available")
a3dd0478
JM
1489 check_auto_select(dev[0], bssid)
1490
1491 logger.info("Additional req_conn_capab checks")
1492
1493 dev[0].remove_cred(id)
1494 values = conn_capab_cred(domain="example.org", req_conn_capab="1:0")
1495 id = dev[0].add_cred_values(values)
1496 check_conn_capab_selection(dev[0], "roaming", True)
1497
1498 dev[0].remove_cred(id)
1499 values = conn_capab_cred(domain="example.org", req_conn_capab="17:5060")
1500 id = dev[0].add_cred_values(values)
1501 check_conn_capab_selection(dev[0], "roaming", True)
1502
1503 bssid2 = apdev[1]['bssid']
1504 params = hs20_ap_params(ssid="test-hs20b")
1505 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
1506 hostapd.add_ap(apdev[1]['ifname'], params)
1507
1508 dev[0].remove_cred(id)
1509 values = conn_capab_cred(domain="example.org", req_conn_capab="50")
1510 id = dev[0].add_cred_values(values)
1511 dev[0].set_cred(id, "req_conn_capab", "6:22")
841bed04 1512 dev[0].scan_for_bss(bssid2, freq="2412")
a3dd0478
JM
1513 dev[0].request("INTERWORKING_SELECT freq=2412")
1514 for i in range(0, 2):
1515 ev = dev[0].wait_event(["INTERWORKING-AP"])
1516 if ev is None:
1517 raise Exception("Network selection timed out");
1518 if bssid in ev and "conn_capab_missing=1" not in ev:
1519 raise Exception("Missing protocol connection capability not reported")
1520 if bssid2 in ev and "conn_capab_missing=1" in ev:
1521 raise Exception("Protocol connection capability not reported correctly")
1522
1523def test_ap_hs20_req_conn_capab_and_roaming_partner_preference(dev, apdev):
1524 """Hotspot 2.0 and req_conn_capab with roaming partner preference"""
1525 bssid = apdev[0]['bssid']
1526 params = hs20_ap_params()
1527 params['domain_name'] = "roaming.example.org"
1528 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
1529 hostapd.add_ap(apdev[0]['ifname'], params)
1530
1531 bssid2 = apdev[1]['bssid']
1532 params = hs20_ap_params(ssid="test-hs20-b")
1533 params['domain_name'] = "roaming.example.net"
1534 hostapd.add_ap(apdev[1]['ifname'], params)
1535
1536 values = default_cred()
1537 values['roaming_partner'] = "roaming.example.net,1,127,*"
1538 id = dev[0].add_cred_values(values)
1539 check_auto_select(dev[0], bssid2)
1540
1541 dev[0].set_cred(id, "req_conn_capab", "50")
1542 check_auto_select(dev[0], bssid)
1543
1544 dev[0].remove_cred(id)
1545 id = dev[0].add_cred_values(values)
1546 dev[0].set_cred(id, "req_conn_capab", "51")
1547 check_auto_select(dev[0], bssid2)
18153179 1548
9714fbcd
JM
1549def check_bandwidth_selection(dev, type, below):
1550 dev.request("INTERWORKING_SELECT freq=2412")
1551 ev = dev.wait_event(["INTERWORKING-AP"])
1552 if ev is None:
1553 raise Exception("Network selection timed out");
092ac7bb 1554 logger.debug("BSS entries:\n" + dev.request("BSS RANGE=ALL"))
9714fbcd
JM
1555 if "type=" + type not in ev:
1556 raise Exception("Unexpected network type")
1557 if below and "below_min_backhaul=1" not in ev:
1558 raise Exception("below_min_backhaul not reported")
1559 if not below and "below_min_backhaul=1" in ev:
1560 raise Exception("below_min_backhaul reported unexpectedly")
1561
1562def bw_cred(domain=None, dl_home=None, ul_home=None, dl_roaming=None, ul_roaming=None):
1563 cred = default_cred(domain=domain)
1564 if dl_home:
1565 cred['min_dl_bandwidth_home'] = str(dl_home)
1566 if ul_home:
1567 cred['min_ul_bandwidth_home'] = str(ul_home)
1568 if dl_roaming:
1569 cred['min_dl_bandwidth_roaming'] = str(dl_roaming)
1570 if ul_roaming:
1571 cred['min_ul_bandwidth_roaming'] = str(ul_roaming)
1572 return cred
1573
1574def test_ap_hs20_min_bandwidth_home(dev, apdev):
1575 """Hotspot 2.0 network selection with min bandwidth (home)"""
1576 bssid = apdev[0]['bssid']
1577 params = hs20_ap_params()
1578 hostapd.add_ap(apdev[0]['ifname'], params)
1579
1580 dev[0].hs20_enable()
852cb016 1581 dev[0].scan_for_bss(bssid, freq="2412")
9714fbcd
JM
1582 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
1583 id = dev[0].add_cred_values(values)
1584 check_bandwidth_selection(dev[0], "home", False)
1585 dev[0].remove_cred(id)
1586
1587 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
1588 id = dev[0].add_cred_values(values)
1589 check_bandwidth_selection(dev[0], "home", True)
1590 dev[0].remove_cred(id)
1591
1592 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
1593 id = dev[0].add_cred_values(values)
1594 check_bandwidth_selection(dev[0], "home", True)
1595 dev[0].remove_cred(id)
1596
1597 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
1598 id = dev[0].add_cred_values(values)
1599 check_bandwidth_selection(dev[0], "home", True)
1600 check_auto_select(dev[0], bssid)
1601
1602 bssid2 = apdev[1]['bssid']
1603 params = hs20_ap_params(ssid="test-hs20-b")
1604 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
1605 hostapd.add_ap(apdev[1]['ifname'], params)
1606
1607 check_auto_select(dev[0], bssid2)
1608
092ac7bb
JM
1609def test_ap_hs20_min_bandwidth_home_hidden_ssid_in_scan_res(dev, apdev):
1610 """Hotspot 2.0 network selection with min bandwidth (home) while hidden SSID is included in scan results"""
1611 bssid = apdev[0]['bssid']
1612
1613 hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": 'secret',
1614 "ignore_broadcast_ssid": "1" })
1615 dev[0].scan_for_bss(bssid, freq=2412)
1616 hapd.disable()
1617 hapd_global = hostapd.HostapdGlobal()
1618 hapd_global.flush()
1619 hapd_global.remove(apdev[0]['ifname'])
1620
1621 params = hs20_ap_params()
1622 hostapd.add_ap(apdev[0]['ifname'], params)
1623
1624 dev[0].hs20_enable()
1625 dev[0].scan_for_bss(bssid, freq="2412")
1626 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
1627 id = dev[0].add_cred_values(values)
1628 check_bandwidth_selection(dev[0], "home", False)
1629 dev[0].remove_cred(id)
1630
1631 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
1632 id = dev[0].add_cred_values(values)
1633 check_bandwidth_selection(dev[0], "home", True)
1634 dev[0].remove_cred(id)
1635
1636 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
1637 id = dev[0].add_cred_values(values)
1638 check_bandwidth_selection(dev[0], "home", True)
1639 dev[0].remove_cred(id)
1640
1641 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
1642 id = dev[0].add_cred_values(values)
1643 check_bandwidth_selection(dev[0], "home", True)
1644 check_auto_select(dev[0], bssid)
1645
1646 bssid2 = apdev[1]['bssid']
1647 params = hs20_ap_params(ssid="test-hs20-b")
1648 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
1649 hostapd.add_ap(apdev[1]['ifname'], params)
1650
1651 check_auto_select(dev[0], bssid2)
1652
1653 dev[0].flush_scan_cache()
1654
9714fbcd
JM
1655def test_ap_hs20_min_bandwidth_roaming(dev, apdev):
1656 """Hotspot 2.0 network selection with min bandwidth (roaming)"""
1657 bssid = apdev[0]['bssid']
1658 params = hs20_ap_params()
1659 hostapd.add_ap(apdev[0]['ifname'], params)
1660
1661 dev[0].hs20_enable()
852cb016 1662 dev[0].scan_for_bss(bssid, freq="2412")
9714fbcd
JM
1663 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=58)
1664 id = dev[0].add_cred_values(values)
1665 check_bandwidth_selection(dev[0], "roaming", False)
1666 dev[0].remove_cred(id)
1667
1668 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=58)
1669 id = dev[0].add_cred_values(values)
1670 check_bandwidth_selection(dev[0], "roaming", True)
1671 dev[0].remove_cred(id)
1672
1673 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=59)
1674 id = dev[0].add_cred_values(values)
1675 check_bandwidth_selection(dev[0], "roaming", True)
1676 dev[0].remove_cred(id)
1677
1678 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=59)
1679 id = dev[0].add_cred_values(values)
1680 check_bandwidth_selection(dev[0], "roaming", True)
1681 check_auto_select(dev[0], bssid)
1682
1683 bssid2 = apdev[1]['bssid']
1684 params = hs20_ap_params(ssid="test-hs20-b")
1685 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
1686 hostapd.add_ap(apdev[1]['ifname'], params)
1687
1688 check_auto_select(dev[0], bssid2)
1689
1690def test_ap_hs20_min_bandwidth_and_roaming_partner_preference(dev, apdev):
1691 """Hotspot 2.0 and minimum bandwidth with roaming partner preference"""
1692 bssid = apdev[0]['bssid']
1693 params = hs20_ap_params()
1694 params['domain_name'] = "roaming.example.org"
1695 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
1696 hostapd.add_ap(apdev[0]['ifname'], params)
1697
1698 bssid2 = apdev[1]['bssid']
1699 params = hs20_ap_params(ssid="test-hs20-b")
1700 params['domain_name'] = "roaming.example.net"
1701 hostapd.add_ap(apdev[1]['ifname'], params)
1702
1703 values = default_cred()
1704 values['roaming_partner'] = "roaming.example.net,1,127,*"
1705 id = dev[0].add_cred_values(values)
1706 check_auto_select(dev[0], bssid2)
1707
1708 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "6000")
1709 check_auto_select(dev[0], bssid)
1710
1711 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "10000")
1712 check_auto_select(dev[0], bssid2)
1713
1714def test_ap_hs20_min_bandwidth_no_wan_metrics(dev, apdev):
1715 """Hotspot 2.0 network selection with min bandwidth but no WAN Metrics"""
1716 bssid = apdev[0]['bssid']
1717 params = hs20_ap_params()
1718 del params['hs20_wan_metrics']
1719 hostapd.add_ap(apdev[0]['ifname'], params)
1720
1721 dev[0].hs20_enable()
852cb016 1722 dev[0].scan_for_bss(bssid, freq="2412")
9714fbcd
JM
1723 values = bw_cred(domain="example.com", dl_home=10000, ul_home=10000,
1724 dl_roaming=10000, ul_roaming=10000)
1725 dev[0].add_cred_values(values)
1726 check_bandwidth_selection(dev[0], "home", False)
1727
5e32f825
JM
1728def test_ap_hs20_deauth_req_ess(dev, apdev):
1729 """Hotspot 2.0 connection and deauthentication request for ESS"""
909f13cc
JM
1730 try:
1731 _test_ap_hs20_deauth_req_ess(dev, apdev)
1732 finally:
1733 dev[0].request("SET pmf 0")
1734
1735def _test_ap_hs20_deauth_req_ess(dev, apdev):
5e32f825
JM
1736 dev[0].request("SET pmf 2")
1737 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
1738 dev[0].dump_monitor()
1739 addr = dev[0].p2p_interface_addr()
1740 hapd = hostapd.Hostapd(apdev[0]['ifname'])
1741 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
1742 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
1743 if ev is None:
1744 raise Exception("Timeout on deauth imminent notice")
1745 if "1 120 http://example.com/" not in ev:
1746 raise Exception("Unexpected deauth imminent notice: " + ev)
1747 hapd.request("DEAUTHENTICATE " + addr)
5f35a5e2 1748 dev[0].wait_disconnected(timeout=10)
c61e5a82
JM
1749 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
1750 raise Exception("Network not marked temporarily disabled")
5e32f825
JM
1751 ev = dev[0].wait_event(["SME: Trying to authenticate",
1752 "Trying to associate",
1753 "CTRL-EVENT-CONNECTED"], timeout=5)
1754 if ev is not None:
1755 raise Exception("Unexpected connection attempt")
1756
1757def test_ap_hs20_deauth_req_bss(dev, apdev):
1758 """Hotspot 2.0 connection and deauthentication request for BSS"""
909f13cc
JM
1759 try:
1760 _test_ap_hs20_deauth_req_bss(dev, apdev)
1761 finally:
1762 dev[0].request("SET pmf 0")
1763
1764def _test_ap_hs20_deauth_req_bss(dev, apdev):
5e32f825
JM
1765 dev[0].request("SET pmf 2")
1766 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
1767 dev[0].dump_monitor()
1768 addr = dev[0].p2p_interface_addr()
1769 hapd = hostapd.Hostapd(apdev[0]['ifname'])
1770 hapd.request("HS20_DEAUTH_REQ " + addr + " 0 120 http://example.com/")
1771 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
1772 if ev is None:
1773 raise Exception("Timeout on deauth imminent notice")
1774 if "0 120 http://example.com/" not in ev:
1775 raise Exception("Unexpected deauth imminent notice: " + ev)
1776 hapd.request("DEAUTHENTICATE " + addr + " reason=4")
5f35a5e2 1777 ev = dev[0].wait_disconnected(timeout=10)
5e32f825
JM
1778 if "reason=4" not in ev:
1779 raise Exception("Unexpected disconnection reason")
c61e5a82
JM
1780 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
1781 raise Exception("Network not marked temporarily disabled")
5e32f825
JM
1782 ev = dev[0].wait_event(["SME: Trying to authenticate",
1783 "Trying to associate",
1784 "CTRL-EVENT-CONNECTED"], timeout=5)
1785 if ev is not None:
1786 raise Exception("Unexpected connection attempt")
9e709315 1787
48ef12e7
JM
1788def test_ap_hs20_deauth_req_from_radius(dev, apdev):
1789 """Hotspot 2.0 connection and deauthentication request from RADIUS"""
909f13cc
JM
1790 try:
1791 _test_ap_hs20_deauth_req_from_radius(dev, apdev)
1792 finally:
1793 dev[0].request("SET pmf 0")
1794
1795def _test_ap_hs20_deauth_req_from_radius(dev, apdev):
48ef12e7
JM
1796 bssid = apdev[0]['bssid']
1797 params = hs20_ap_params()
1798 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
1799 params['hs20_deauth_req_timeout'] = "2"
1800 hostapd.add_ap(apdev[0]['ifname'], params)
1801
1802 dev[0].request("SET pmf 2")
1803 dev[0].hs20_enable()
1804 dev[0].add_cred_values({ 'realm': "example.com",
1805 'username': "hs20-deauth-test",
1806 'password': "password" })
1807 interworking_select(dev[0], bssid, freq="2412")
1808 interworking_connect(dev[0], bssid, "TTLS")
1809 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=5)
1810 if ev is None:
1811 raise Exception("Timeout on deauth imminent notice")
1812 if " 1 100" not in ev:
1813 raise Exception("Unexpected deauth imminent contents")
5f35a5e2 1814 dev[0].wait_disconnected(timeout=3)
48ef12e7 1815
5cf88011
JM
1816def test_ap_hs20_remediation_required(dev, apdev):
1817 """Hotspot 2.0 connection and remediation required from RADIUS"""
909f13cc
JM
1818 try:
1819 _test_ap_hs20_remediation_required(dev, apdev)
1820 finally:
1821 dev[0].request("SET pmf 0")
1822
1823def _test_ap_hs20_remediation_required(dev, apdev):
5cf88011
JM
1824 bssid = apdev[0]['bssid']
1825 params = hs20_ap_params()
1826 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
1827 hostapd.add_ap(apdev[0]['ifname'], params)
1828
1829 dev[0].request("SET pmf 1")
1830 dev[0].hs20_enable()
1831 dev[0].add_cred_values({ 'realm': "example.com",
1832 'username': "hs20-subrem-test",
1833 'password': "password" })
1834 interworking_select(dev[0], bssid, freq="2412")
1835 interworking_connect(dev[0], bssid, "TTLS")
1836 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
1837 if ev is None:
1838 raise Exception("Timeout on subscription remediation notice")
1839 if " 1 https://example.com/" not in ev:
1840 raise Exception("Unexpected subscription remediation event contents")
1841
32b450fc
JM
1842def test_ap_hs20_remediation_required_ctrl(dev, apdev):
1843 """Hotspot 2.0 connection and subrem from ctrl_iface"""
909f13cc
JM
1844 try:
1845 _test_ap_hs20_remediation_required_ctrl(dev, apdev)
1846 finally:
1847 dev[0].request("SET pmf 0")
1848
1849def _test_ap_hs20_remediation_required_ctrl(dev, apdev):
32b450fc 1850 bssid = apdev[0]['bssid']
83e1bab0 1851 addr = dev[0].own_addr()
32b450fc
JM
1852 params = hs20_ap_params()
1853 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
1854 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
1855
1856 dev[0].request("SET pmf 1")
1857 dev[0].hs20_enable()
1858 dev[0].add_cred_values(default_cred())
1859 interworking_select(dev[0], bssid, freq="2412")
1860 interworking_connect(dev[0], bssid, "TTLS")
1861
1862 hapd.request("HS20_WNM_NOTIF " + addr + " https://example.com/")
1863 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
1864 if ev is None:
1865 raise Exception("Timeout on subscription remediation notice")
1866 if " 1 https://example.com/" not in ev:
1867 raise Exception("Unexpected subscription remediation event contents")
1868
1869 hapd.request("HS20_WNM_NOTIF " + addr)
1870 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
1871 if ev is None:
1872 raise Exception("Timeout on subscription remediation notice")
1873 if not ev.endswith("HS20-SUBSCRIPTION-REMEDIATION "):
1874 raise Exception("Unexpected subscription remediation event contents: " + ev)
1875
1876 if "FAIL" not in hapd.request("HS20_WNM_NOTIF "):
1877 raise Exception("Unexpected HS20_WNM_NOTIF success")
1878 if "FAIL" not in hapd.request("HS20_WNM_NOTIF foo"):
1879 raise Exception("Unexpected HS20_WNM_NOTIF success")
1880 if "FAIL" not in hapd.request("HS20_WNM_NOTIF " + addr + " https://12345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678927.very.long.example.com/"):
1881 raise Exception("Unexpected HS20_WNM_NOTIF success")
1882
8fc1f204
JM
1883def test_ap_hs20_session_info(dev, apdev):
1884 """Hotspot 2.0 connection and session information from RADIUS"""
909f13cc
JM
1885 try:
1886 _test_ap_hs20_session_info(dev, apdev)
1887 finally:
1888 dev[0].request("SET pmf 0")
1889
1890def _test_ap_hs20_session_info(dev, apdev):
8fc1f204
JM
1891 bssid = apdev[0]['bssid']
1892 params = hs20_ap_params()
1893 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
1894 hostapd.add_ap(apdev[0]['ifname'], params)
1895
1896 dev[0].request("SET pmf 1")
1897 dev[0].hs20_enable()
1898 dev[0].add_cred_values({ 'realm': "example.com",
1899 'username': "hs20-session-info-test",
1900 'password': "password" })
1901 interworking_select(dev[0], bssid, freq="2412")
1902 interworking_connect(dev[0], bssid, "TTLS")
1903 ev = dev[0].wait_event(["ESS-DISASSOC-IMMINENT"], timeout=10)
1904 if ev is None:
1905 raise Exception("Timeout on ESS disassociation imminent notice")
1906 if " 1 59904 https://example.com/" not in ev:
1907 raise Exception("Unexpected ESS disassociation imminent event contents")
1908 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
1909 if ev is None:
1910 raise Exception("Scan not started")
64502039 1911 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=30)
8fc1f204
JM
1912 if ev is None:
1913 raise Exception("Scan not completed")
1914
9e709315
JM
1915def test_ap_hs20_osen(dev, apdev):
1916 """Hotspot 2.0 OSEN connection"""
1917 params = { 'ssid': "osen",
1918 'osen': "1",
1919 'auth_server_addr': "127.0.0.1",
1920 'auth_server_port': "1812",
1921 'auth_server_shared_secret': "radius" }
1922 hostapd.add_ap(apdev[0]['ifname'], params)
1923
8abb3d4e
JM
1924 dev[1].connect("osen", key_mgmt="NONE", scan_freq="2412",
1925 wait_connect=False)
1926 dev[2].connect("osen", key_mgmt="NONE", wep_key0='"hello"',
1927 scan_freq="2412", wait_connect=False)
8278138e 1928 dev[0].flush_scan_cache()
9e709315
JM
1929 dev[0].connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
1930 group="GTK_NOT_USED",
1931 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
1932 ca_cert="auth_serv/ca.pem",
1933 scan_freq="2412")
8278138e
JM
1934 res = dev[0].get_bss(apdev[0]['bssid'])['flags']
1935 if "[OSEN-OSEN-CCMP]" not in res:
1936 raise Exception("OSEN not reported in BSS")
1937 if "[WEP]" in res:
1938 raise Exception("WEP reported in BSS")
1939 res = dev[0].request("SCAN_RESULTS")
1940 if "[OSEN-OSEN-CCMP]" not in res:
1941 raise Exception("OSEN not reported in SCAN_RESULTS")
a96066a5 1942
9d1e1172
JM
1943 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
1944 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
1945 wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
1946 group="GTK_NOT_USED",
1947 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
1948 ca_cert="auth_serv/ca.pem",
1949 scan_freq="2412")
1950 wpas.request("DISCONNECT")
1951
a96066a5
JM
1952def test_ap_hs20_network_preference(dev, apdev):
1953 """Hotspot 2.0 network selection with preferred home network"""
1954 bssid = apdev[0]['bssid']
1955 params = hs20_ap_params()
1956 hostapd.add_ap(apdev[0]['ifname'], params)
1957
1958 dev[0].hs20_enable()
1959 values = { 'realm': "example.com",
1960 'username': "hs20-test",
1961 'password': "password",
1962 'domain': "example.com" }
1963 dev[0].add_cred_values(values)
1964
1965 id = dev[0].add_network()
1966 dev[0].set_network_quoted(id, "ssid", "home")
1967 dev[0].set_network_quoted(id, "psk", "12345678")
1968 dev[0].set_network(id, "priority", "1")
1969 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
1970
852cb016 1971 dev[0].scan_for_bss(bssid, freq="2412")
a96066a5 1972 dev[0].request("INTERWORKING_SELECT auto freq=2412")
5f35a5e2 1973 ev = dev[0].wait_connected(timeout=15)
a96066a5
JM
1974 if bssid not in ev:
1975 raise Exception("Unexpected network selected")
1976
1977 bssid2 = apdev[1]['bssid']
1978 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
1979 hostapd.add_ap(apdev[1]['ifname'], params)
1980
852cb016 1981 dev[0].scan_for_bss(bssid2, freq="2412")
a96066a5
JM
1982 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1983 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
1984 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
1985 if ev is None:
1986 raise Exception("Connection timed out")
1987 if "INTERWORKING-ALREADY-CONNECTED" in ev:
1988 raise Exception("No roam to higher priority network")
1989 if bssid2 not in ev:
1990 raise Exception("Unexpected network selected")
1991
1992def test_ap_hs20_network_preference2(dev, apdev):
1993 """Hotspot 2.0 network selection with preferred credential"""
1994 bssid2 = apdev[1]['bssid']
1995 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
1996 hostapd.add_ap(apdev[1]['ifname'], params)
1997
1998 dev[0].hs20_enable()
1999 values = { 'realm': "example.com",
2000 'username': "hs20-test",
2001 'password': "password",
2002 'domain': "example.com",
2003 'priority': "1" }
2004 dev[0].add_cred_values(values)
2005
2006 id = dev[0].add_network()
2007 dev[0].set_network_quoted(id, "ssid", "home")
2008 dev[0].set_network_quoted(id, "psk", "12345678")
2009 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2010
852cb016 2011 dev[0].scan_for_bss(bssid2, freq="2412")
a96066a5 2012 dev[0].request("INTERWORKING_SELECT auto freq=2412")
5f35a5e2 2013 ev = dev[0].wait_connected(timeout=15)
a96066a5
JM
2014 if bssid2 not in ev:
2015 raise Exception("Unexpected network selected")
2016
2017 bssid = apdev[0]['bssid']
2018 params = hs20_ap_params()
2019 hostapd.add_ap(apdev[0]['ifname'], params)
2020
852cb016 2021 dev[0].scan_for_bss(bssid, freq="2412")
a96066a5
JM
2022 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2023 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2024 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2025 if ev is None:
2026 raise Exception("Connection timed out")
2027 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2028 raise Exception("No roam to higher priority network")
2029 if bssid not in ev:
2030 raise Exception("Unexpected network selected")
eaff3458
JM
2031
2032def test_ap_hs20_network_preference3(dev, apdev):
2033 """Hotspot 2.0 network selection with two credential (one preferred)"""
2034 bssid = apdev[0]['bssid']
2035 params = hs20_ap_params()
2036 hostapd.add_ap(apdev[0]['ifname'], params)
2037
2038 bssid2 = apdev[1]['bssid']
2039 params = hs20_ap_params(ssid="test-hs20b")
2040 params['nai_realm'] = "0,example.org,13[5:6],21[2:4][5:7]"
2041 hostapd.add_ap(apdev[1]['ifname'], params)
2042
2043 dev[0].hs20_enable()
2044 values = { 'realm': "example.com",
2045 'username': "hs20-test",
2046 'password': "password",
2047 'priority': "1" }
2048 dev[0].add_cred_values(values)
2049 values = { 'realm': "example.org",
2050 'username': "hs20-test",
2051 'password': "password" }
2052 id = dev[0].add_cred_values(values)
2053
852cb016
JM
2054 dev[0].scan_for_bss(bssid, freq="2412")
2055 dev[0].scan_for_bss(bssid2, freq="2412")
eaff3458 2056 dev[0].request("INTERWORKING_SELECT auto freq=2412")
5f35a5e2 2057 ev = dev[0].wait_connected(timeout=15)
eaff3458
JM
2058 if bssid not in ev:
2059 raise Exception("Unexpected network selected")
2060
2061 dev[0].set_cred(id, "priority", "2")
2062 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2063 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2064 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2065 if ev is None:
2066 raise Exception("Connection timed out")
2067 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2068 raise Exception("No roam to higher priority network")
2069 if bssid2 not in ev:
2070 raise Exception("Unexpected network selected")
1221639d
JM
2071
2072def test_ap_hs20_network_preference4(dev, apdev):
2073 """Hotspot 2.0 network selection with username vs. SIM credential"""
2074 bssid = apdev[0]['bssid']
2075 params = hs20_ap_params()
2076 hostapd.add_ap(apdev[0]['ifname'], params)
2077
2078 bssid2 = apdev[1]['bssid']
2079 params = hs20_ap_params(ssid="test-hs20b")
2080 params['hessid'] = bssid2
2081 params['anqp_3gpp_cell_net'] = "555,444"
2082 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
2083 hostapd.add_ap(apdev[1]['ifname'], params)
2084
2085 dev[0].hs20_enable()
2086 values = { 'realm': "example.com",
2087 'username': "hs20-test",
2088 'password': "password",
2089 'priority': "1" }
2090 dev[0].add_cred_values(values)
2091 values = { 'imsi': "555444-333222111",
2092 'eap': "SIM",
2093 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
2094 id = dev[0].add_cred_values(values)
2095
852cb016
JM
2096 dev[0].scan_for_bss(bssid, freq="2412")
2097 dev[0].scan_for_bss(bssid2, freq="2412")
1221639d 2098 dev[0].request("INTERWORKING_SELECT auto freq=2412")
5f35a5e2 2099 ev = dev[0].wait_connected(timeout=15)
1221639d
JM
2100 if bssid not in ev:
2101 raise Exception("Unexpected network selected")
2102
2103 dev[0].set_cred(id, "priority", "2")
2104 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2105 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2106 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2107 if ev is None:
2108 raise Exception("Connection timed out")
2109 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2110 raise Exception("No roam to higher priority network")
2111 if bssid2 not in ev:
2112 raise Exception("Unexpected network selected")
97de642a 2113
5f6ce5b5
JM
2114def test_ap_hs20_interworking_select_blocking_scan(dev, apdev):
2115 """Ongoing INTERWORKING_SELECT blocking SCAN"""
2116 bssid = apdev[0]['bssid']
2117 params = hs20_ap_params()
2118 hostapd.add_ap(apdev[0]['ifname'], params)
2119
2120 dev[0].hs20_enable()
2121 values = { 'realm': "example.com",
2122 'username': "hs20-test",
2123 'password': "password",
2124 'domain': "example.com" }
2125 dev[0].add_cred_values(values)
2126
2127 dev[0].scan_for_bss(bssid, freq="2412")
2128 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2129 if "FAIL-BUSY" not in dev[0].request("SCAN"):
2130 raise Exception("Unexpected SCAN command result")
2131 dev[0].wait_connected(timeout=15)
2132
97de642a
JM
2133def test_ap_hs20_fetch_osu(dev, apdev):
2134 """Hotspot 2.0 OSU provider and icon fetch"""
2135 bssid = apdev[0]['bssid']
2136 params = hs20_ap_params()
2137 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2138 params['osu_ssid'] = '"HS 2.0 OSU open"'
2139 params['osu_method_list'] = "1"
2140 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2141 params['osu_icon'] = "w1fi_logo"
2142 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2143 params['osu_server_uri'] = "https://example.com/osu/"
2144 hostapd.add_ap(apdev[0]['ifname'], params)
2145
2146 bssid2 = apdev[1]['bssid']
2147 params = hs20_ap_params(ssid="test-hs20b")
2148 params['hessid'] = bssid2
2149 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2150 params['osu_ssid'] = '"HS 2.0 OSU OSEN"'
2151 params['osu_method_list'] = "0"
6acecce1 2152 params['osu_nai'] = "osen@example.com"
97de642a
JM
2153 params['osu_friendly_name'] = [ "eng:Test2 OSU", "fin:Testi2-OSU" ]
2154 params['osu_icon'] = "w1fi_logo"
2155 params['osu_service_desc'] = [ "eng:Example services2", "fin:Esimerkkipalveluja2" ]
2156 params['osu_server_uri'] = "https://example.org/osu/"
2157 hostapd.add_ap(apdev[1]['ifname'], params)
2158
2159 with open("w1fi_logo.png", "r") as f:
2160 orig_logo = f.read()
2161 dev[0].hs20_enable()
2162 dir = "/tmp/osu-fetch"
2163 if os.path.isdir(dir):
2164 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2165 for f in files:
2166 os.remove(dir + "/" + f)
2167 else:
2168 try:
2169 os.makedirs(dir)
2170 except:
2171 pass
2172 try:
0a578716 2173 dev[1].scan_for_bss(bssid, freq="2412")
97de642a
JM
2174 dev[0].request("SET osu_dir " + dir)
2175 dev[0].request("FETCH_OSU")
44c41cdf
JM
2176 if "FAIL" not in dev[1].request("HS20_ICON_REQUEST foo w1fi_logo"):
2177 raise Exception("Invalid HS20_ICON_REQUEST accepted")
d2fb8b86
JM
2178 if "OK" not in dev[1].request("HS20_ICON_REQUEST " + bssid + " w1fi_logo"):
2179 raise Exception("HS20_ICON_REQUEST failed")
97de642a
JM
2180 icons = 0
2181 while True:
2182 ev = dev[0].wait_event(["OSU provider fetch completed",
2183 "RX-HS20-ANQP-ICON"], timeout=15)
2184 if ev is None:
2185 raise Exception("Timeout on OSU fetch")
2186 if "OSU provider fetch completed" in ev:
2187 break
2188 if "RX-HS20-ANQP-ICON" in ev:
2189 with open(ev.split(' ')[1], "r") as f:
2190 logo = f.read()
2191 if logo == orig_logo:
2192 icons += 1
2193
2194 with open(dir + "/osu-providers.txt", "r") as f:
2195 prov = f.read()
27f527e0 2196 logger.debug("osu-providers.txt: " + prov)
97de642a 2197 if "OSU-PROVIDER " + bssid not in prov:
27f527e0 2198 raise Exception("Missing OSU_PROVIDER(1)")
97de642a 2199 if "OSU-PROVIDER " + bssid2 not in prov:
27f527e0 2200 raise Exception("Missing OSU_PROVIDER(2)")
97de642a
JM
2201 finally:
2202 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2203 for f in files:
2204 os.remove(dir + "/" + f)
2205 os.rmdir(dir)
2206
2207 if icons != 2:
2208 raise Exception("Unexpected number of icons fetched")
d2fb8b86
JM
2209
2210 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=5)
2211 if ev is None:
2212 raise Exception("Timeout on GAS-QUERY-DONE")
2213 ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=5)
2214 if ev is None:
2215 raise Exception("Timeout on GAS-QUERY-DONE")
2216 if "freq=2412 status_code=0 result=SUCCESS" not in ev:
2217 raise Exception("Unexpected GAS-QUERY-DONE: " + ev)
2218 ev = dev[1].wait_event(["RX-HS20-ANQP"], timeout=15)
2219 if ev is None:
2220 raise Exception("Timeout on icon fetch")
2221 if "Icon Binary File" not in ev:
2222 raise Exception("Unexpected ANQP element")
37ffe7c5 2223
69f99123
JM
2224def test_ap_hs20_fetch_osu_stop(dev, apdev):
2225 """Hotspot 2.0 OSU provider fetch stopped"""
2226 bssid = apdev[0]['bssid']
2227 params = hs20_ap_params()
2228 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2229 params['osu_ssid'] = '"HS 2.0 OSU open"'
2230 params['osu_method_list'] = "1"
2231 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2232 params['osu_icon'] = "w1fi_logo"
2233 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2234 params['osu_server_uri'] = "https://example.com/osu/"
2235 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
2236
2237 dev[0].hs20_enable()
2238 dir = "/tmp/osu-fetch"
2239 if os.path.isdir(dir):
2240 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2241 for f in files:
2242 os.remove(dir + "/" + f)
2243 else:
2244 try:
2245 os.makedirs(dir)
2246 except:
2247 pass
2248 try:
2249 dev[0].request("SET osu_dir " + dir)
2250 dev[0].request("SCAN freq=2412-2462")
2251 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=10)
2252 if ev is None:
2253 raise Exception("Scan did not start")
2254 if "FAIL" not in dev[0].request("FETCH_OSU"):
2255 raise Exception("FETCH_OSU accepted while scanning")
2256 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
2257 if ev is None:
2258 raise Exception("Scan timed out")
2259 hapd.set("ext_mgmt_frame_handling", "1")
2260 dev[0].request("FETCH_ANQP")
2261 if "FAIL" not in dev[0].request("FETCH_OSU"):
2262 raise Exception("FETCH_OSU accepted while in FETCH_ANQP")
2263 dev[0].request("STOP_FETCH_ANQP")
2264 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5)
2265 dev[0].dump_monitor()
2266 hapd.dump_monitor()
2267 dev[0].request("INTERWORKING_SELECT freq=2412")
2268 for i in range(5):
2269 msg = hapd.mgmt_rx()
2270 if msg['subtype'] == 13:
2271 break
2272 if "FAIL" not in dev[0].request("FETCH_OSU"):
2273 raise Exception("FETCH_OSU accepted while in INTERWORKING_SELECT")
2274 ev = dev[0].wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
2275 timeout=15)
2276 if ev is None:
2277 raise Exception("Network selection timed out");
2278
2279 dev[0].dump_monitor()
2280 if "OK" not in dev[0].request("FETCH_OSU"):
2281 raise Exception("FETCH_OSU failed")
2282 dev[0].request("CANCEL_FETCH_OSU")
2283
2284 for i in range(15):
2285 time.sleep(0.5)
2286 if dev[0].get_driver_status_field("scan_state") == "SCAN_COMPLETED":
2287 break
2288
2289 dev[0].dump_monitor()
2290 if "OK" not in dev[0].request("FETCH_OSU"):
2291 raise Exception("FETCH_OSU failed")
2292 if "FAIL" not in dev[0].request("FETCH_OSU"):
2293 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
2294 ev = dev[0].wait_event(["GAS-QUERY-START"], 10)
2295 if ev is None:
2296 raise Exception("GAS timed out")
2297 if "FAIL" not in dev[0].request("FETCH_OSU"):
2298 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
2299 dev[0].request("CANCEL_FETCH_OSU")
2300 ev = dev[0].wait_event(["GAS-QUERY-DONE"], 10)
2301 if ev is None:
2302 raise Exception("GAS event timed out after CANCEL_FETCH_OSU")
2303 finally:
2304 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2305 for f in files:
2306 os.remove(dir + "/" + f)
2307 os.rmdir(dir)
2308
37ffe7c5
JM
2309def test_ap_hs20_ft(dev, apdev):
2310 """Hotspot 2.0 connection with FT"""
2311 bssid = apdev[0]['bssid']
2312 params = hs20_ap_params()
2313 params['wpa_key_mgmt'] = "FT-EAP"
2314 params['nas_identifier'] = "nas1.w1.fi"
2315 params['r1_key_holder'] = "000102030405"
2316 params["mobility_domain"] = "a1b2"
2317 params["reassociation_deadline"] = "1000"
2318 hostapd.add_ap(apdev[0]['ifname'], params)
2319
2320 dev[0].hs20_enable()
2321 id = dev[0].add_cred_values({ 'realm': "example.com",
2322 'username': "hs20-test",
2323 'password': "password",
2324 'ca_cert': "auth_serv/ca.pem",
2325 'domain': "example.com",
2326 'update_identifier': "1234" })
2327 interworking_select(dev[0], bssid, "home", freq="2412")
2328 interworking_connect(dev[0], bssid, "TTLS")
350a7ba9
JM
2329
2330def test_ap_hs20_remediation_sql(dev, apdev, params):
2331 """Hotspot 2.0 connection and remediation required using SQLite for user DB"""
2332 try:
2333 import sqlite3
2334 except ImportError:
81e787b7 2335 raise HwsimSkip("No sqlite3 module available")
350a7ba9
JM
2336 dbfile = os.path.join(params['logdir'], "eap-user.db")
2337 try:
2338 os.remove(dbfile)
2339 except:
2340 pass
2341 con = sqlite3.connect(dbfile)
2342 with con:
2343 cur = con.cursor()
2344 cur.execute("CREATE TABLE users(identity TEXT PRIMARY KEY, methods TEXT, password TEXT, remediation TEXT, phase2 INTEGER)")
2345 cur.execute("CREATE TABLE wildcards(identity TEXT PRIMARY KEY, methods TEXT)")
2346 cur.execute("INSERT INTO users(identity,methods,password,phase2,remediation) VALUES ('user-mschapv2','TTLS-MSCHAPV2','password',1,'user')")
2347 cur.execute("INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS')")
2348 cur.execute("CREATE TABLE authlog(timestamp TEXT, session TEXT, nas_ip TEXT, username TEXT, note TEXT)")
2349
2350 try:
2351 params = { "ssid": "as", "beacon_int": "2000",
2352 "radius_server_clients": "auth_serv/radius_clients.conf",
2353 "radius_server_auth_port": '18128',
2354 "eap_server": "1",
2355 "eap_user_file": "sqlite:" + dbfile,
2356 "ca_cert": "auth_serv/ca.pem",
2357 "server_cert": "auth_serv/server.pem",
2358 "private_key": "auth_serv/server.key",
2359 "subscr_remediation_url": "https://example.org/",
2360 "subscr_remediation_method": "1" }
2361 hostapd.add_ap(apdev[1]['ifname'], params)
2362
2363 bssid = apdev[0]['bssid']
2364 params = hs20_ap_params()
2365 params['auth_server_port'] = "18128"
2366 hostapd.add_ap(apdev[0]['ifname'], params)
2367
2368 dev[0].request("SET pmf 1")
2369 dev[0].hs20_enable()
2370 id = dev[0].add_cred_values({ 'realm': "example.com",
2371 'username': "user-mschapv2",
2372 'password': "password",
2373 'ca_cert': "auth_serv/ca.pem" })
2374 interworking_select(dev[0], bssid, freq="2412")
2375 interworking_connect(dev[0], bssid, "TTLS")
2376 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2377 if ev is None:
2378 raise Exception("Timeout on subscription remediation notice")
2379 if " 1 https://example.org/" not in ev:
2380 raise Exception("Unexpected subscription remediation event contents")
2381
2382 with con:
2383 cur = con.cursor()
2384 cur.execute("SELECT * from authlog")
2385 rows = cur.fetchall()
2386 if len(rows) < 1:
2387 raise Exception("No authlog entries")
2388
2389 finally:
2390 os.remove(dbfile)
909f13cc 2391 dev[0].request("SET pmf 0")
f1a36a53
JM
2392
2393def test_ap_hs20_external_selection(dev, apdev):
2394 """Hotspot 2.0 connection using external network selection and creation"""
2395 bssid = apdev[0]['bssid']
2396 params = hs20_ap_params()
2397 params['hessid'] = bssid
2398 params['disable_dgaf'] = '1'
2399 hostapd.add_ap(apdev[0]['ifname'], params)
2400
2401 dev[0].hs20_enable()
2402 dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS",
2403 identity="hs20-test", password="password",
2404 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
2405 scan_freq="2412", update_identifier="54321")
2406 if dev[0].get_status_field("hs20") != "2":
2407 raise Exception("Unexpected hs20 indication")
816e3df9
JM
2408
2409def test_ap_hs20_random_mac_addr(dev, apdev):
2410 """Hotspot 2.0 connection with random MAC address"""
2411 bssid = apdev[0]['bssid']
2412 params = hs20_ap_params()
2413 params['hessid'] = bssid
2414 params['disable_dgaf'] = '1'
2415 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
2416
2417 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
2418 wpas.interface_add("wlan5")
2419 addr = wpas.p2p_interface_addr()
2420 wpas.request("SET mac_addr 1")
2421 wpas.request("SET preassoc_mac_addr 1")
2422 wpas.request("SET rand_addr_lifetime 60")
2423 wpas.hs20_enable()
243dcc4a 2424 wpas.flush_scan_cache()
816e3df9
JM
2425 id = wpas.add_cred_values({ 'realm': "example.com",
2426 'username': "hs20-test",
2427 'password': "password",
2428 'ca_cert': "auth_serv/ca.pem",
2429 'domain': "example.com",
2430 'update_identifier': "1234" })
2431 interworking_select(wpas, bssid, "home", freq="2412")
2432 interworking_connect(wpas, bssid, "TTLS")
816e3df9
JM
2433 addr1 = wpas.get_driver_status_field("addr")
2434 if addr == addr1:
2435 raise Exception("Did not use random MAC address")
2436
2437 sta = hapd.get_sta(addr)
2438 if sta['addr'] != "FAIL":
2439 raise Exception("Unexpected STA association with permanent address")
2440 sta = hapd.get_sta(addr1)
2441 if sta['addr'] != addr1:
2442 raise Exception("STA association with random address not found")
5f7b07de 2443
76b76941
JM
2444def test_ap_hs20_multi_network_and_cred_removal(dev, apdev):
2445 """Multiple networks and cred removal"""
2446 bssid = apdev[0]['bssid']
2447 params = hs20_ap_params()
2448 params['nai_realm'] = [ "0,example.com,25[3:26]"]
2449 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
2450
2451 dev[0].add_network()
2452 dev[0].hs20_enable()
2453 id = dev[0].add_cred_values({ 'realm': "example.com",
2454 'username': "user",
2455 'password': "password" })
2456 interworking_select(dev[0], bssid, freq="2412")
2457 interworking_connect(dev[0], bssid, "PEAP")
2458 dev[0].add_network()
2459
2460 dev[0].request("DISCONNECT")
5f35a5e2 2461 dev[0].wait_disconnected(timeout=10)
76b76941
JM
2462
2463 hapd.disable()
2464 hapd.set("ssid", "another ssid")
2465 hapd.enable()
2466
2467 interworking_select(dev[0], bssid, freq="2412")
2468 interworking_connect(dev[0], bssid, "PEAP")
2469 dev[0].add_network()
2470 if len(dev[0].list_networks()) != 5:
2471 raise Exception("Unexpected number of networks prior to remove_crec")
2472
2473 dev[0].dump_monitor()
2474 dev[0].remove_cred(id)
2475 if len(dev[0].list_networks()) != 3:
2476 raise Exception("Unexpected number of networks after to remove_crec")
5f35a5e2 2477 dev[0].wait_disconnected(timeout=10)
76b76941 2478
22653762
JM
2479def test_ap_hs20_interworking_add_network(dev, apdev):
2480 """Hotspot 2.0 connection using INTERWORKING_ADD_NETWORK"""
2481 bssid = apdev[0]['bssid']
2482 params = hs20_ap_params()
2483 params['nai_realm'] = [ "0,example.com,21[3:26][6:7][99:99]" ]
2484 hostapd.add_ap(apdev[0]['ifname'], params)
2485
2486 dev[0].hs20_enable()
2487 dev[0].add_cred_values(default_cred(user="user"))
2488 interworking_select(dev[0], bssid, freq=2412)
2489 id = dev[0].interworking_add_network(bssid)
2490 dev[0].select_network(id, freq=2412)
2491 dev[0].wait_connected()
2492
5f7b07de
JM
2493def _test_ap_hs20_proxyarp(dev, apdev):
2494 bssid = apdev[0]['bssid']
2495 params = hs20_ap_params()
2496 params['hessid'] = bssid
2497 params['disable_dgaf'] = '0'
2498 params['proxy_arp'] = '1'
2499 hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
2500 if "OK" in hapd.request("ENABLE"):
2501 raise Exception("Incomplete hostapd configuration was accepted")
2502 hapd.set("ap_isolate", "1")
2503 if "OK" in hapd.request("ENABLE"):
2504 raise Exception("Incomplete hostapd configuration was accepted")
2505 hapd.set('bridge', 'ap-br0')
2506 hapd.dump_monitor()
2507 try:
2508 hapd.enable()
2509 except:
2510 # For now, do not report failures due to missing kernel support
81e787b7 2511 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
5f7b07de
JM
2512 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
2513 if ev is None:
2514 raise Exception("AP startup timed out")
2515 if "AP-ENABLED" not in ev:
2516 raise Exception("AP startup failed")
2517
2518 dev[0].hs20_enable()
2519 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
2520 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
5f7b07de
JM
2521
2522 id = dev[0].add_cred_values({ 'realm': "example.com",
2523 'username': "hs20-test",
2524 'password': "password",
2525 'ca_cert': "auth_serv/ca.pem",
2526 'domain': "example.com",
2527 'update_identifier': "1234" })
2528 interworking_select(dev[0], bssid, "home", freq="2412")
2529 interworking_connect(dev[0], bssid, "TTLS")
2530
2531 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
2532 identity="hs20-test", password="password",
2533 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
2534 scan_freq="2412")
2535 time.sleep(0.1)
2536
67aeee11
JM
2537 addr0 = dev[0].p2p_interface_addr()
2538 addr1 = dev[1].p2p_interface_addr()
2539
2540 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
2541 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
2542
2543 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
2544 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
2545 opt=src_ll_opt0)
2546 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
2547 raise Exception("DATA_TEST_FRAME failed")
2548
2549 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:dddd::2",
2550 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:dddd::2",
2551 opt=src_ll_opt1)
2552 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
2553 raise Exception("DATA_TEST_FRAME failed")
2554
2555 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:eeee::2",
2556 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:eeee::2",
2557 opt=src_ll_opt1)
2558 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
2559 raise Exception("DATA_TEST_FRAME failed")
2560
5f7b07de
JM
2561 matches = get_permanent_neighbors("ap-br0")
2562 logger.info("After connect: " + str(matches))
67aeee11
JM
2563 if len(matches) != 3:
2564 raise Exception("Unexpected number of neighbor entries after connect")
2565 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
2566 raise Exception("dev0 addr missing")
2567 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
2568 raise Exception("dev1 addr(1) missing")
2569 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
2570 raise Exception("dev1 addr(2) missing")
5f7b07de
JM
2571 dev[0].request("DISCONNECT")
2572 dev[1].request("DISCONNECT")
2573 time.sleep(0.5)
2574 matches = get_permanent_neighbors("ap-br0")
2575 logger.info("After disconnect: " + str(matches))
2576 if len(matches) > 0:
2577 raise Exception("Unexpected neighbor entries after disconnect")
2578
e1f8fe88
JM
2579def test_ap_hs20_hidden_ssid_in_scan_res(dev, apdev):
2580 """Hotspot 2.0 connection with hidden SSId in scan results"""
2581 bssid = apdev[0]['bssid']
2582
2583 hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": 'secret',
2584 "ignore_broadcast_ssid": "1" })
2585 dev[0].scan_for_bss(bssid, freq=2412)
2586 hapd.disable()
2587 hapd_global = hostapd.HostapdGlobal()
2588 hapd_global.flush()
2589 hapd_global.remove(apdev[0]['ifname'])
2590
2591 params = hs20_ap_params()
2592 params['hessid'] = bssid
45de3286 2593 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
e1f8fe88
JM
2594
2595 dev[0].hs20_enable()
2596 id = dev[0].add_cred_values({ 'realm': "example.com",
2597 'username': "hs20-test",
2598 'password': "password",
2599 'ca_cert': "auth_serv/ca.pem",
2600 'domain': "example.com" })
2601 interworking_select(dev[0], bssid, "home", freq="2412")
2602 interworking_connect(dev[0], bssid, "TTLS")
2603
2604 # clear BSS table to avoid issues in following test cases
2605 dev[0].request("DISCONNECT")
2606 dev[0].wait_disconnected()
45de3286
JM
2607 hapd.disable()
2608 dev[0].flush_scan_cache()
e1f8fe88
JM
2609 dev[0].flush_scan_cache()
2610
5f7b07de
JM
2611def test_ap_hs20_proxyarp(dev, apdev):
2612 """Hotspot 2.0 and ProxyARP"""
5f7b07de 2613 try:
81e787b7 2614 _test_ap_hs20_proxyarp(dev, apdev)
5f7b07de
JM
2615 finally:
2616 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
2617 stderr=open('/dev/null', 'w'))
2618 subprocess.call(['brctl', 'delbr', 'ap-br0'],
2619 stderr=open('/dev/null', 'w'))
5f7b07de 2620
356a497d
JM
2621def _test_ap_hs20_proxyarp_dgaf(dev, apdev, disabled):
2622 bssid = apdev[0]['bssid']
2623 params = hs20_ap_params()
2624 params['hessid'] = bssid
2625 params['disable_dgaf'] = '1' if disabled else '0'
2626 params['proxy_arp'] = '1'
798c7951 2627 params['na_mcast_to_ucast'] = '1'
356a497d
JM
2628 params['ap_isolate'] = '1'
2629 params['bridge'] = 'ap-br0'
2630 hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
2631 try:
2632 hapd.enable()
2633 except:
2634 # For now, do not report failures due to missing kernel support
81e787b7 2635 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
356a497d
JM
2636 ev = hapd.wait_event(["AP-ENABLED"], timeout=10)
2637 if ev is None:
2638 raise Exception("AP startup timed out")
2639
2640 dev[0].hs20_enable()
2641 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
2642 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
2643
2644 id = dev[0].add_cred_values({ 'realm': "example.com",
2645 'username': "hs20-test",
2646 'password': "password",
2647 'ca_cert': "auth_serv/ca.pem",
2648 'domain': "example.com",
2649 'update_identifier': "1234" })
2650 interworking_select(dev[0], bssid, "home", freq="2412")
2651 interworking_connect(dev[0], bssid, "TTLS")
2652
2653 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
2654 identity="hs20-test", password="password",
2655 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
2656 scan_freq="2412")
2657 time.sleep(0.1)
2658
2659 addr0 = dev[0].p2p_interface_addr()
2660
2661 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
2662
2663 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
2664 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
2665 opt=src_ll_opt0)
2666 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
2667 raise Exception("DATA_TEST_FRAME failed")
2668
2669 pkt = build_ra(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::33",
2670 ip_dst="ff01::1")
2671 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
2672 raise Exception("DATA_TEST_FRAME failed")
2673
2674 pkt = build_na(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::44",
2675 ip_dst="ff01::1", target="aaaa:bbbb:cccc::55")
2676 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
2677 raise Exception("DATA_TEST_FRAME failed")
2678
a712282b
JM
2679 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
2680 ip_src="192.168.1.1", ip_dst="255.255.255.255",
2681 yiaddr="192.168.1.123", chaddr=addr0)
2682 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
2683 raise Exception("DATA_TEST_FRAME failed")
2684 # another copy for additional code coverage
2685 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
2686 ip_src="192.168.1.1", ip_dst="255.255.255.255",
2687 yiaddr="192.168.1.123", chaddr=addr0)
2688 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
2689 raise Exception("DATA_TEST_FRAME failed")
2690
356a497d
JM
2691 matches = get_permanent_neighbors("ap-br0")
2692 logger.info("After connect: " + str(matches))
a712282b 2693 if len(matches) != 2:
356a497d
JM
2694 raise Exception("Unexpected number of neighbor entries after connect")
2695 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
2696 raise Exception("dev0 addr missing")
a712282b
JM
2697 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
2698 raise Exception("dev0 IPv4 addr missing")
356a497d
JM
2699 dev[0].request("DISCONNECT")
2700 dev[1].request("DISCONNECT")
2701 time.sleep(0.5)
2702 matches = get_permanent_neighbors("ap-br0")
2703 logger.info("After disconnect: " + str(matches))
2704 if len(matches) > 0:
2705 raise Exception("Unexpected neighbor entries after disconnect")
2706
2707def test_ap_hs20_proxyarp_disable_dgaf(dev, apdev):
2708 """Hotspot 2.0 and ProxyARP with DGAF disabled"""
356a497d 2709 try:
81e787b7 2710 _test_ap_hs20_proxyarp_dgaf(dev, apdev, True)
356a497d
JM
2711 finally:
2712 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
2713 stderr=open('/dev/null', 'w'))
2714 subprocess.call(['brctl', 'delbr', 'ap-br0'],
2715 stderr=open('/dev/null', 'w'))
2716
356a497d
JM
2717def test_ap_hs20_proxyarp_enable_dgaf(dev, apdev):
2718 """Hotspot 2.0 and ProxyARP with DGAF enabled"""
356a497d 2719 try:
81e787b7 2720 _test_ap_hs20_proxyarp_dgaf(dev, apdev, False)
356a497d
JM
2721 finally:
2722 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
2723 stderr=open('/dev/null', 'w'))
2724 subprocess.call(['brctl', 'delbr', 'ap-br0'],
2725 stderr=open('/dev/null', 'w'))
2726
67aeee11
JM
2727def ip_checksum(buf):
2728 sum = 0
2729 if len(buf) & 0x01:
2730 buf += '\0x00'
2731 for i in range(0, len(buf), 2):
2732 val, = struct.unpack('H', buf[i:i+2])
2733 sum += val
2734 while (sum >> 16):
2735 sum = (sum & 0xffff) + (sum >> 16)
2736 return struct.pack('H', ~sum & 0xffff)
2737
5a3ce802
JM
2738def ipv6_solicited_node_mcaddr(target):
2739 prefix = socket.inet_pton(socket.AF_INET6, "ff02::1:ff00:0")
2740 mask = socket.inet_pton(socket.AF_INET6, "::ff:ffff")
2741 _target = socket.inet_pton(socket.AF_INET6, target)
2742 p = struct.unpack('4I', prefix)
2743 m = struct.unpack('4I', mask)
2744 t = struct.unpack('4I', _target)
2745 res = (p[0] | (t[0] & m[0]),
2746 p[1] | (t[1] & m[1]),
2747 p[2] | (t[2] & m[2]),
2748 p[3] | (t[3] & m[3]))
2749 return socket.inet_ntop(socket.AF_INET6, struct.pack('4I', *res))
2750
67aeee11
JM
2751def build_icmpv6(ipv6_addrs, type, code, payload):
2752 start = struct.pack("BB", type, code)
2753 end = payload
2754 icmp = start + '\x00\x00' + end
2755 pseudo = ipv6_addrs + struct.pack(">LBBBB", len(icmp), 0, 0, 0, 58)
2756 csum = ip_checksum(pseudo + icmp)
2757 return start + csum + end
2758
356a497d
JM
2759def build_ra(src_ll, ip_src, ip_dst, cur_hop_limit=0, router_lifetime=0,
2760 reachable_time=0, retrans_timer=0, opt=None):
2761 link_mc = binascii.unhexlify("3333ff000002")
2762 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
2763 proto = '\x86\xdd'
2764 ehdr = link_mc + _src_ll + proto
2765 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
2766 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
2767
2768 adv = struct.pack('>BBHLL', cur_hop_limit, 0, router_lifetime,
2769 reachable_time, retrans_timer)
2770 if opt:
2771 payload = adv + opt
2772 else:
2773 payload = adv
2774 icmp = build_icmpv6(_ip_src + _ip_dst, 134, 0, payload)
2775
2776 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
2777 ipv6 += _ip_src + _ip_dst
2778
2779 return ehdr + ipv6 + icmp
2780
67aeee11
JM
2781def build_ns(src_ll, ip_src, ip_dst, target, opt=None):
2782 link_mc = binascii.unhexlify("3333ff000002")
2783 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
2784 proto = '\x86\xdd'
2785 ehdr = link_mc + _src_ll + proto
2786 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
5a3ce802
JM
2787 if ip_dst is None:
2788 ip_dst = ipv6_solicited_node_mcaddr(target)
67aeee11
JM
2789 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
2790
2791 reserved = '\x00\x00\x00\x00'
2792 _target = socket.inet_pton(socket.AF_INET6, target)
2793 if opt:
2794 payload = reserved + _target + opt
2795 else:
2796 payload = reserved + _target
2797 icmp = build_icmpv6(_ip_src + _ip_dst, 135, 0, payload)
2798
2799 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
2800 ipv6 += _ip_src + _ip_dst
2801
2802 return ehdr + ipv6 + icmp
2803
5a3ce802
JM
2804def send_ns(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
2805 hapd_bssid=None):
2806 if hapd_bssid:
2807 if src_ll is None:
2808 src_ll = hapd_bssid
2809 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
2810 else:
2811 if src_ll is None:
2812 src_ll = dev.p2p_interface_addr()
2813 cmd = "DATA_TEST_FRAME "
2814
2815 if opt is None:
2816 opt = "\x01\x01" + binascii.unhexlify(src_ll.replace(':',''))
2817
2818 pkt = build_ns(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
2819 opt=opt)
2820 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
2821 raise Exception("DATA_TEST_FRAME failed")
2822
356a497d
JM
2823def build_na(src_ll, ip_src, ip_dst, target, opt=None):
2824 link_mc = binascii.unhexlify("3333ff000002")
2825 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
2826 proto = '\x86\xdd'
2827 ehdr = link_mc + _src_ll + proto
2828 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
2829 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
2830
2831 reserved = '\x00\x00\x00\x00'
2832 _target = socket.inet_pton(socket.AF_INET6, target)
2833 if opt:
2834 payload = reserved + _target + opt
2835 else:
2836 payload = reserved + _target
2837 icmp = build_icmpv6(_ip_src + _ip_dst, 136, 0, payload)
2838
2839 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
2840 ipv6 += _ip_src + _ip_dst
2841
2842 return ehdr + ipv6 + icmp
2843
5a3ce802
JM
2844def send_na(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
2845 hapd_bssid=None):
2846 if hapd_bssid:
2847 if src_ll is None:
2848 src_ll = hapd_bssid
2849 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
2850 else:
2851 if src_ll is None:
2852 src_ll = dev.p2p_interface_addr()
2853 cmd = "DATA_TEST_FRAME "
2854
2855 pkt = build_na(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
2856 opt=opt)
2857 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
2858 raise Exception("DATA_TEST_FRAME failed")
2859
a712282b
JM
2860def build_dhcp_ack(dst_ll, src_ll, ip_src, ip_dst, yiaddr, chaddr,
2861 subnet_mask="255.255.255.0", truncated_opt=False,
2862 wrong_magic=False, force_tot_len=None, no_dhcp=False):
2863 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
2864 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
2865 proto = '\x08\x00'
2866 ehdr = _dst_ll + _src_ll + proto
2867 _ip_src = socket.inet_pton(socket.AF_INET, ip_src)
2868 _ip_dst = socket.inet_pton(socket.AF_INET, ip_dst)
2869 _subnet_mask = socket.inet_pton(socket.AF_INET, subnet_mask)
2870
2871 _ciaddr = '\x00\x00\x00\x00'
2872 _yiaddr = socket.inet_pton(socket.AF_INET, yiaddr)
2873 _siaddr = '\x00\x00\x00\x00'
2874 _giaddr = '\x00\x00\x00\x00'
2875 _chaddr = binascii.unhexlify(chaddr.replace(':','') + "00000000000000000000")
2876 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
2877 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
2878 # magic
2879 if wrong_magic:
2880 payload += '\x63\x82\x53\x00'
2881 else:
2882 payload += '\x63\x82\x53\x63'
2883 if truncated_opt:
2884 payload += '\x22\xff\x00'
2885 # Option: DHCP Message Type = ACK
2886 payload += '\x35\x01\x05'
2887 # Pad Option
2888 payload += '\x00'
2889 # Option: Subnet Mask
2890 payload += '\x01\x04' + _subnet_mask
2891 # Option: Time Offset
2892 payload += struct.pack('>BBL', 2, 4, 0)
2893 # End Option
2894 payload += '\xff'
2895 # Pad Option
2896 payload += '\x00\x00\x00\x00'
2897
2898 if no_dhcp:
2899 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
2900 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
2901
2902 udp = struct.pack('>HHHH', 67, 68, 8 + len(payload), 0) + payload
2903
2904 if force_tot_len:
2905 tot_len = force_tot_len
2906 else:
2907 tot_len = 20 + len(udp)
2908 start = struct.pack('>BBHHBBBB', 0x45, 0, tot_len, 0, 0, 0, 128, 17)
2909 ipv4 = start + '\x00\x00' + _ip_src + _ip_dst
2910 csum = ip_checksum(ipv4)
2911 ipv4 = start + csum + _ip_src + _ip_dst
2912
2913 return ehdr + ipv4 + udp
2914
d9f3bb1a
JM
2915def build_arp(dst_ll, src_ll, opcode, sender_mac, sender_ip,
2916 target_mac, target_ip):
2917 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
2918 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
2919 proto = '\x08\x06'
2920 ehdr = _dst_ll + _src_ll + proto
2921
2922 _sender_mac = binascii.unhexlify(sender_mac.replace(':',''))
2923 _sender_ip = socket.inet_pton(socket.AF_INET, sender_ip)
2924 _target_mac = binascii.unhexlify(target_mac.replace(':',''))
2925 _target_ip = socket.inet_pton(socket.AF_INET, target_ip)
2926
2927 arp = struct.pack('>HHBBH', 1, 0x0800, 6, 4, opcode)
2928 arp += _sender_mac + _sender_ip
2929 arp += _target_mac + _target_ip
2930
2931 return ehdr + arp
2932
2933def send_arp(dev, dst_ll="ff:ff:ff:ff:ff:ff", src_ll=None, opcode=1,
2934 sender_mac=None, sender_ip="0.0.0.0",
2935 target_mac="00:00:00:00:00:00", target_ip="0.0.0.0",
2936 hapd_bssid=None):
2937 if hapd_bssid:
2938 if src_ll is None:
2939 src_ll = hapd_bssid
2940 if sender_mac is None:
2941 sender_mac = hapd_bssid
2942 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
2943 else:
2944 if src_ll is None:
2945 src_ll = dev.p2p_interface_addr()
2946 if sender_mac is None:
2947 sender_mac = dev.p2p_interface_addr()
2948 cmd = "DATA_TEST_FRAME "
2949
89cd4355 2950 pkt = build_arp(dst_ll=dst_ll, src_ll=src_ll, opcode=opcode,
d9f3bb1a
JM
2951 sender_mac=sender_mac, sender_ip=sender_ip,
2952 target_mac=target_mac, target_ip=target_ip)
2953 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
2954 raise Exception("DATA_TEST_FRAME failed")
2955
5f7b07de
JM
2956def get_permanent_neighbors(ifname):
2957 cmd = subprocess.Popen(['ip', 'nei'], stdout=subprocess.PIPE)
2958 res = cmd.stdout.read()
2959 cmd.stdout.close()
2960 return [ line for line in res.splitlines() if "PERMANENT" in line and ifname in line ]
2961
87f0ede9
JM
2962def get_bridge_macs(ifname):
2963 cmd = subprocess.Popen(['brctl', 'showmacs', ifname],
2964 stdout=subprocess.PIPE)
2965 res = cmd.stdout.read()
2966 cmd.stdout.close()
2967 return res
2968
efd0a6fb
JM
2969def tshark_get_arp(cap, filter):
2970 res = run_tshark(cap, filter,
2971 [ "eth.dst", "eth.src",
2972 "arp.src.hw_mac", "arp.src.proto_ipv4",
2973 "arp.dst.hw_mac", "arp.dst.proto_ipv4" ],
2974 wait=False)
2975 frames = []
2976 for l in res.splitlines():
2977 frames.append(l.split('\t'))
2978 return frames
2979
55c430b6
JM
2980def tshark_get_ns(cap):
2981 res = run_tshark(cap, "icmpv6.type == 135",
2982 [ "eth.dst", "eth.src",
2983 "ipv6.src", "ipv6.dst",
2984 "icmpv6.nd.ns.target_address",
2985 "icmpv6.opt.linkaddr" ],
2986 wait=False)
2987 frames = []
2988 for l in res.splitlines():
2989 frames.append(l.split('\t'))
2990 return frames
2991
2992def tshark_get_na(cap):
2993 res = run_tshark(cap, "icmpv6.type == 136",
2994 [ "eth.dst", "eth.src",
2995 "ipv6.src", "ipv6.dst",
2996 "icmpv6.nd.na.target_address",
2997 "icmpv6.opt.linkaddr" ],
2998 wait=False)
2999 frames = []
3000 for l in res.splitlines():
3001 frames.append(l.split('\t'))
3002 return frames
3003
9934ee19
JM
3004def _test_proxyarp_open(dev, apdev, params, ebtables=False):
3005 prefix = "proxyarp_open"
3006 if ebtables:
3007 prefix += "_ebtables"
3008 cap_br = os.path.join(params['logdir'], prefix + ".ap-br0.pcap")
3009 cap_dev0 = os.path.join(params['logdir'],
3010 prefix + ".%s.pcap" % dev[0].ifname)
3011 cap_dev1 = os.path.join(params['logdir'],
3012 prefix + ".%s.pcap" % dev[1].ifname)
210a4f6a
JM
3013 cap_dev2 = os.path.join(params['logdir'],
3014 prefix + ".%s.pcap" % dev[2].ifname)
d9f3bb1a 3015
5f7b07de
JM
3016 bssid = apdev[0]['bssid']
3017 params = { 'ssid': 'open' }
3018 params['proxy_arp'] = '1'
3019 hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
3020 hapd.set("ap_isolate", "1")
3021 hapd.set('bridge', 'ap-br0')
3022 hapd.dump_monitor()
3023 try:
3024 hapd.enable()
3025 except:
3026 # For now, do not report failures due to missing kernel support
81e787b7 3027 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
5f7b07de
JM
3028 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
3029 if ev is None:
3030 raise Exception("AP startup timed out")
3031 if "AP-ENABLED" not in ev:
3032 raise Exception("AP startup failed")
3033
210a4f6a
JM
3034 params2 = { 'ssid': 'another' }
3035 hapd2 = hostapd.add_ap(apdev[1]['ifname'], params2, no_enable=True)
3036 hapd2.set('bridge', 'ap-br0')
3037 hapd2.enable()
3038
5f7b07de
JM
3039 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3040 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
5f7b07de 3041
9934ee19
JM
3042 if ebtables:
3043 for chain in [ 'FORWARD', 'OUTPUT' ]:
3044 subprocess.call(['ebtables', '-A', chain, '-p', 'ARP',
3045 '-d', 'Broadcast', '-o', apdev[0]['ifname'],
3046 '-j', 'DROP'])
3047 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3048 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3049 '--ip6-icmp-type', 'neighbor-solicitation',
3050 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3051 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3052 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3053 '--ip6-icmp-type', 'neighbor-advertisement',
3054 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3055 subprocess.call(['ebtables', '-A', chain,
3056 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3057 '--ip6-icmp-type', 'router-solicitation',
3058 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3059 # Multicast Listener Report Message
3060 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3061 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3062 '--ip6-icmp-type', '143',
3063 '-o', apdev[0]['ifname'], '-j', 'DROP'])
19cbe062 3064
55c430b6 3065 time.sleep(0.5)
d9f3bb1a 3066 cmd = {}
a95c6973
JM
3067 cmd[0] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', 'ap-br0',
3068 '-w', cap_br, '-s', '2000'],
3069 stderr=open('/dev/null', 'w'))
3070 cmd[1] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[0].ifname,
3071 '-w', cap_dev0, '-s', '2000'],
3072 stderr=open('/dev/null', 'w'))
3073 cmd[2] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[1].ifname,
3074 '-w', cap_dev1, '-s', '2000'],
3075 stderr=open('/dev/null', 'w'))
210a4f6a
JM
3076 cmd[3] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[2].ifname,
3077 '-w', cap_dev2, '-s', '2000'],
3078 stderr=open('/dev/null', 'w'))
d9f3bb1a 3079
5f7b07de
JM
3080 dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
3081 dev[1].connect("open", key_mgmt="NONE", scan_freq="2412")
210a4f6a 3082 dev[2].connect("another", key_mgmt="NONE", scan_freq="2412")
5f7b07de
JM
3083 time.sleep(0.1)
3084
210a4f6a
JM
3085 brcmd = subprocess.Popen(['brctl', 'show'], stdout=subprocess.PIPE)
3086 res = brcmd.stdout.read()
3087 brcmd.stdout.close()
3088 logger.info("Bridge setup: " + res)
3089
3090 brcmd = subprocess.Popen(['brctl', 'showstp', 'ap-br0'],
3091 stdout=subprocess.PIPE)
3092 res = brcmd.stdout.read()
3093 brcmd.stdout.close()
3094 logger.info("Bridge showstp: " + res)
3095
67aeee11
JM
3096 addr0 = dev[0].p2p_interface_addr()
3097 addr1 = dev[1].p2p_interface_addr()
efd0a6fb 3098 addr2 = dev[2].p2p_interface_addr()
67aeee11
JM
3099
3100 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3101 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
3102
3103 # DAD NS
6d533294 3104 send_ns(dev[0], ip_src="::", target="aaaa:bbbb:cccc::2")
67aeee11 3105
6d533294 3106 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2")
67aeee11 3107 # test frame without source link-layer address option
6d533294
JM
3108 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3109 opt='')
67aeee11 3110 # test frame with bogus option
6d533294
JM
3111 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3112 opt="\x70\x01\x01\x02\x03\x04\x05\x05")
67aeee11 3113 # test frame with truncated source link-layer address option
6d533294
JM
3114 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3115 opt="\x01\x01\x01\x02\x03\x04")
67aeee11 3116 # test frame with foreign source link-layer address option
6d533294
JM
3117 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3118 opt="\x01\x01\x01\x02\x03\x04\x05\x06")
67aeee11 3119
6d533294 3120 send_ns(dev[1], ip_src="aaaa:bbbb:dddd::2", target="aaaa:bbbb:dddd::2")
67aeee11 3121
6d533294 3122 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
67aeee11 3123 # another copy for additional code coverage
6d533294 3124 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
67aeee11 3125
a712282b
JM
3126 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3127 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3128 yiaddr="192.168.1.124", chaddr=addr0)
3129 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3130 raise Exception("DATA_TEST_FRAME failed")
3131 # Change address and verify unicast
3132 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
3133 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3134 yiaddr="192.168.1.123", chaddr=addr0)
3135 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3136 raise Exception("DATA_TEST_FRAME failed")
3137
3138 # Not-associated client MAC address
3139 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3140 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3141 yiaddr="192.168.1.125", chaddr="22:33:44:55:66:77")
3142 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3143 raise Exception("DATA_TEST_FRAME failed")
3144
3145 # No IP address
3146 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3147 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3148 yiaddr="0.0.0.0", chaddr=addr1)
3149 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3150 raise Exception("DATA_TEST_FRAME failed")
3151
3152 # Zero subnet mask
3153 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3154 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3155 yiaddr="192.168.1.126", chaddr=addr1,
3156 subnet_mask="0.0.0.0")
3157 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3158 raise Exception("DATA_TEST_FRAME failed")
3159
3160 # Truncated option
3161 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3162 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3163 yiaddr="192.168.1.127", chaddr=addr1,
3164 truncated_opt=True)
3165 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3166 raise Exception("DATA_TEST_FRAME failed")
3167
3168 # Wrong magic
3169 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3170 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3171 yiaddr="192.168.1.128", chaddr=addr1,
3172 wrong_magic=True)
3173 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3174 raise Exception("DATA_TEST_FRAME failed")
3175
3176 # Wrong IPv4 total length
3177 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3178 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3179 yiaddr="192.168.1.129", chaddr=addr1,
3180 force_tot_len=1000)
3181 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3182 raise Exception("DATA_TEST_FRAME failed")
3183
3184 # BOOTP
3185 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3186 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3187 yiaddr="192.168.1.129", chaddr=addr1,
3188 no_dhcp=True)
3189 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3190 raise Exception("DATA_TEST_FRAME failed")
3191
87f0ede9
JM
3192 macs = get_bridge_macs("ap-br0")
3193 logger.info("After connect (showmacs): " + str(macs))
3194
5f7b07de
JM
3195 matches = get_permanent_neighbors("ap-br0")
3196 logger.info("After connect: " + str(matches))
a712282b 3197 if len(matches) != 4:
5f7b07de 3198 raise Exception("Unexpected number of neighbor entries after connect")
67aeee11
JM
3199 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3200 raise Exception("dev0 addr missing")
3201 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3202 raise Exception("dev1 addr(1) missing")
3203 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3204 raise Exception("dev1 addr(2) missing")
a712282b
JM
3205 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3206 raise Exception("dev0 IPv4 addr missing")
67aeee11 3207
d9f3bb1a
JM
3208 targets = [ "192.168.1.123", "192.168.1.124", "192.168.1.125",
3209 "192.168.1.126" ]
3210 for target in targets:
3211 send_arp(dev[1], sender_ip="192.168.1.100", target_ip=target)
3212
3213 for target in targets:
3214 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.101",
3215 target_ip=target)
3216
210a4f6a
JM
3217 for target in targets:
3218 send_arp(dev[2], sender_ip="192.168.1.103", target_ip=target)
3219
d9f3bb1a
JM
3220 # ARP Probe from wireless STA
3221 send_arp(dev[1], target_ip="192.168.1.127")
3222 # ARP Announcement from wireless STA
3223 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127")
3224 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127",
3225 opcode=2)
3226
87f0ede9
JM
3227 macs = get_bridge_macs("ap-br0")
3228 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
3229
d9f3bb1a
JM
3230 matches = get_permanent_neighbors("ap-br0")
3231 logger.info("After ARP Probe + Announcement: " + str(matches))
3232
3233 # ARP Request for the newly introduced IP address from wireless STA
3234 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
3235
3236 # ARP Request for the newly introduced IP address from bridge
3237 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
3238 target_ip="192.168.1.127")
210a4f6a 3239 send_arp(dev[2], sender_ip="192.168.1.103", target_ip="192.168.1.127")
d9f3bb1a
JM
3240
3241 # ARP Probe from bridge
89cd4355 3242 send_arp(hapd, hapd_bssid=bssid, target_ip="192.168.1.130")
210a4f6a 3243 send_arp(dev[2], target_ip="192.168.1.131")
89cd4355
JM
3244 # ARP Announcement from bridge (not to be learned by AP for proxyarp)
3245 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
3246 target_ip="192.168.1.130")
3247 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
3248 target_ip="192.168.1.130", opcode=2)
210a4f6a
JM
3249 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131")
3250 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131",
3251 opcode=2)
d9f3bb1a 3252
87f0ede9
JM
3253 macs = get_bridge_macs("ap-br0")
3254 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
3255
d9f3bb1a
JM
3256 matches = get_permanent_neighbors("ap-br0")
3257 logger.info("After ARP Probe + Announcement: " + str(matches))
3258
3259 # ARP Request for the newly introduced IP address from wireless STA
89cd4355
JM
3260 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.130")
3261 # ARP Response from bridge (AP does not proxy for non-wireless devices)
3262 send_arp(hapd, hapd_bssid=bssid, dst_ll=addr0, sender_ip="192.168.1.130",
3263 target_ip="192.168.1.123", opcode=2)
d9f3bb1a 3264
210a4f6a
JM
3265 # ARP Request for the newly introduced IP address from wireless STA
3266 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.131")
3267 # ARP Response from bridge (AP does not proxy for non-wireless devices)
3268 send_arp(dev[2], dst_ll=addr0, sender_ip="192.168.1.131",
3269 target_ip="192.168.1.123", opcode=2)
3270
d9f3bb1a
JM
3271 # ARP Request for the newly introduced IP address from bridge
3272 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
89cd4355 3273 target_ip="192.168.1.130")
210a4f6a 3274 send_arp(dev[2], sender_ip="192.168.1.104", target_ip="192.168.1.131")
d9f3bb1a
JM
3275
3276 # ARP Probe from wireless STA (duplicate address; learned through DHCP)
3277 send_arp(dev[1], target_ip="192.168.1.123")
3278 # ARP Probe from wireless STA (duplicate address; learned through ARP)
3279 send_arp(dev[0], target_ip="192.168.1.127")
3280
3281 # Gratuitous ARP Reply for another STA's IP address
3282 send_arp(dev[0], opcode=2, sender_mac=addr0, sender_ip="192.168.1.127",
3283 target_mac=addr1, target_ip="192.168.1.127")
3284 send_arp(dev[1], opcode=2, sender_mac=addr1, sender_ip="192.168.1.123",
3285 target_mac=addr0, target_ip="192.168.1.123")
3286 # ARP Request to verify previous mapping
3287 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.123")
3288 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
3289
3290 time.sleep(0.1)
3291
5a3ce802
JM
3292 send_ns(dev[0], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:cccc::2")
3293 time.sleep(0.1)
3294 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:dddd::2")
3295 time.sleep(0.1)
3296 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:dddd::2",
3297 ip_src="aaaa:bbbb:ffff::2")
3298 time.sleep(0.1)
210a4f6a
JM
3299 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:ff00::2")
3300 time.sleep(0.1)
3301 send_ns(dev[2], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:ff00::2")
3302 time.sleep(0.1)
3303 send_ns(dev[2], target="aaaa:bbbb:eeee::2", ip_src="aaaa:bbbb:ff00::2")
3304 time.sleep(0.1)
5a3ce802
JM
3305
3306 # Try to probe for an already assigned address
3307 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="::")
3308 time.sleep(0.1)
3309 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc::2", ip_src="::")
3310 time.sleep(0.1)
210a4f6a
JM
3311 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="::")
3312 time.sleep(0.1)
5a3ce802
JM
3313
3314 # Unsolicited NA
3315 send_na(dev[1], target="aaaa:bbbb:cccc:aeae::3",
3316 ip_src="aaaa:bbbb:cccc:aeae::3", ip_dst="ff02::1")
3317 send_na(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc:aeae::4",
3318 ip_src="aaaa:bbbb:cccc:aeae::4", ip_dst="ff02::1")
210a4f6a
JM
3319 send_na(dev[2], target="aaaa:bbbb:cccc:aeae::5",
3320 ip_src="aaaa:bbbb:cccc:aeae::5", ip_dst="ff02::1")
5a3ce802 3321
7e3a6c9e
JM
3322 try:
3323 hwsim_utils.test_connectivity_iface(dev[0], hapd, "ap-br0")
3324 except Exception, e:
3325 logger.info("test_connectibity_iface failed: " + str(e))
3326 raise HwsimSkip("Assume kernel did not have the required patches for proxyarp")
40e4c9c8
JM
3327 hwsim_utils.test_connectivity_iface(dev[1], hapd, "ap-br0")
3328 hwsim_utils.test_connectivity(dev[0], dev[1])
3329
5f7b07de
JM
3330 dev[0].request("DISCONNECT")
3331 dev[1].request("DISCONNECT")
3332 time.sleep(0.5)
210a4f6a 3333 for i in range(len(cmd)):
d9f3bb1a 3334 cmd[i].terminate()
87f0ede9
JM
3335 macs = get_bridge_macs("ap-br0")
3336 logger.info("After disconnect (showmacs): " + str(macs))
5f7b07de
JM
3337 matches = get_permanent_neighbors("ap-br0")
3338 logger.info("After disconnect: " + str(matches))
3339 if len(matches) > 0:
3340 raise Exception("Unexpected neighbor entries after disconnect")
9934ee19
JM
3341 if ebtables:
3342 cmd = subprocess.Popen(['ebtables', '-L', '--Lc'],
3343 stdout=subprocess.PIPE)
3344 res = cmd.stdout.read()
3345 cmd.stdout.close()
3346 logger.info("ebtables results:\n" + res)
5f7b07de 3347
efd0a6fb
JM
3348 # Verify that expected ARP messages were seen and no unexpected
3349 # ARP messages were seen.
3350
3351 arp_req = tshark_get_arp(cap_dev0, "arp.opcode == 1")
3352 arp_reply = tshark_get_arp(cap_dev0, "arp.opcode == 2")
3353 logger.info("dev0 seen ARP requests:\n" + str(arp_req))
3354 logger.info("dev0 seen ARP replies:\n" + str(arp_reply))
3355
3356 if [ 'ff:ff:ff:ff:ff:ff', addr1,
3357 addr1, '192.168.1.100',
3358 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
3359 raise Exception("dev0 saw ARP request from dev1")
3360 if [ 'ff:ff:ff:ff:ff:ff', addr2,
3361 addr2, '192.168.1.103',
3362 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
3363 raise Exception("dev0 saw ARP request from dev2")
3364 # TODO: Uncomment once fixed in kernel
3365 #if [ 'ff:ff:ff:ff:ff:ff', bssid,
3366 # bssid, '192.168.1.101',
3367 # '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
3368 # raise Exception("dev0 saw ARP request from br")
3369
3370 if ebtables:
3371 for req in arp_req:
3372 if req[1] != addr0:
3373 raise Exception("Unexpected foreign ARP request on dev0")
3374
3375 arp_req = tshark_get_arp(cap_dev1, "arp.opcode == 1")
3376 arp_reply = tshark_get_arp(cap_dev1, "arp.opcode == 2")
3377 logger.info("dev1 seen ARP requests:\n" + str(arp_req))
3378 logger.info("dev1 seen ARP replies:\n" + str(arp_reply))
3379
3380 if [ 'ff:ff:ff:ff:ff:ff', addr2,
3381 addr2, '192.168.1.103',
3382 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
3383 raise Exception("dev1 saw ARP request from dev2")
3384 if [addr1, addr0, addr0, '192.168.1.123', addr1, '192.168.1.100'] not in arp_reply:
3385 raise Exception("dev1 did not get ARP response for 192.168.1.123")
3386
3387 if ebtables:
3388 for req in arp_req:
3389 if req[1] != addr1:
3390 raise Exception("Unexpected foreign ARP request on dev1")
3391
3392 arp_req = tshark_get_arp(cap_dev2, "arp.opcode == 1")
3393 arp_reply = tshark_get_arp(cap_dev2, "arp.opcode == 2")
3394 logger.info("dev2 seen ARP requests:\n" + str(arp_req))
3395 logger.info("dev2 seen ARP replies:\n" + str(arp_reply))
3396
3397 if [ addr2, addr0,
3398 addr0, '192.168.1.123',
3399 addr2, '192.168.1.103' ] not in arp_reply:
3400 raise Exception("dev2 did not get ARP response for 192.168.1.123")
3401
3402 arp_req = tshark_get_arp(cap_br, "arp.opcode == 1")
3403 arp_reply = tshark_get_arp(cap_br, "arp.opcode == 2")
3404 logger.info("br seen ARP requests:\n" + str(arp_req))
3405 logger.info("br seen ARP replies:\n" + str(arp_reply))
3406
3407 # TODO: Uncomment once fixed in kernel
3408 #if [ bssid, addr0,
3409 # addr0, '192.168.1.123',
3410 # bssid, '192.168.1.101' ] not in arp_reply:
3411 # raise Exception("br did not get ARP response for 192.168.1.123")
3412
55c430b6
JM
3413 ns = tshark_get_ns(cap_dev0)
3414 logger.info("dev0 seen NS: " + str(ns))
3415 na = tshark_get_na(cap_dev0)
3416 logger.info("dev0 seen NA: " + str(na))
3417
05121d35 3418 if [ addr0, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:cccc::2',
55c430b6
JM
3419 'aaaa:bbbb:dddd::2', addr1 ] not in na:
3420 raise Exception("dev0 did not get NA for aaaa:bbbb:dddd::2")
3421
3422 if ebtables:
3423 for req in ns:
3424 if req[1] != addr0:
3425 raise Exception("Unexpected foreign NS on dev0: " + str(req))
3426
3427 ns = tshark_get_ns(cap_dev1)
3428 logger.info("dev1 seen NS: " + str(ns))
3429 na = tshark_get_na(cap_dev1)
3430 logger.info("dev1 seen NA: " + str(na))
3431
05121d35 3432 if [ addr1, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:dddd::2',
55c430b6
JM
3433 'aaaa:bbbb:cccc::2', addr0 ] not in na:
3434 raise Exception("dev1 did not get NA for aaaa:bbbb:cccc::2")
3435
3436 if ebtables:
3437 for req in ns:
3438 if req[1] != addr1:
3439 raise Exception("Unexpected foreign NS on dev1: " + str(req))
3440
3441 ns = tshark_get_ns(cap_dev2)
3442 logger.info("dev2 seen NS: " + str(ns))
3443 na = tshark_get_na(cap_dev2)
3444 logger.info("dev2 seen NA: " + str(na))
3445
3446 # FIX: enable once kernel implementation for proxyarp IPv6 is fixed
05121d35 3447 #if [ addr2, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:ff00::2',
55c430b6
JM
3448 # 'aaaa:bbbb:cccc::2', addr0 ] not in na:
3449 # raise Exception("dev2 did not get NA for aaaa:bbbb:cccc::2")
05121d35 3450 #if [ addr2, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:ff00::2',
55c430b6
JM
3451 # 'aaaa:bbbb:dddd::2', addr1 ] not in na:
3452 # raise Exception("dev2 did not get NA for aaaa:bbbb:dddd::2")
05121d35 3453 #if [ addr2, addr1, 'aaaa:bbbb:eeee::2', 'aaaa:bbbb:ff00::2',
55c430b6
JM
3454 # 'aaaa:bbbb:eeee::2', addr1 ] not in na:
3455 # raise Exception("dev2 did not get NA for aaaa:bbbb:eeee::2")
3456
d9f3bb1a 3457def test_proxyarp_open(dev, apdev, params):
5f7b07de 3458 """ProxyARP with open network"""
5f7b07de 3459 try:
81e787b7 3460 _test_proxyarp_open(dev, apdev, params)
9934ee19
JM
3461 finally:
3462 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3463 stderr=open('/dev/null', 'w'))
3464 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3465 stderr=open('/dev/null', 'w'))
3466
3467def test_proxyarp_open_ebtables(dev, apdev, params):
3468 """ProxyARP with open network"""
3469 try:
3470 _test_proxyarp_open(dev, apdev, params, ebtables=True)
5f7b07de 3471 finally:
01c87519
JM
3472 try:
3473 subprocess.call(['ebtables', '-F', 'FORWARD'])
3474 subprocess.call(['ebtables', '-F', 'OUTPUT'])
3475 except:
3476 pass
5f7b07de
JM
3477 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3478 stderr=open('/dev/null', 'w'))
3479 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3480 stderr=open('/dev/null', 'w'))