]>
git.ipfire.org Git - thirdparty/hostap.git/blob - tests/hwsim/test_ap_track.py
1 # Test cases for hostapd tracking unconnected stations
2 # Copyright (c) 2015, Jouni Malinen <j@w1.fi>
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
8 logger
= logging
.getLogger()
13 from wpasupplicant
import WpaSupplicant
15 def test_ap_track_sta(dev
, apdev
):
16 """Dualband AP tracking unconnected stations"""
18 _test_ap_track_sta(dev
, apdev
)
20 subprocess
.call(['iw', 'reg', 'set', '00'])
22 def _test_ap_track_sta(dev
, apdev
):
23 params
= { "ssid": "track",
27 "track_sta_max_num": "2" }
28 hapd
= hostapd
.add_ap(apdev
[0], params
)
29 bssid
= apdev
[0]['bssid']
31 params
= { "ssid": "track",
35 "track_sta_max_num": "100",
36 "track_sta_max_age": "1" }
37 hapd2
= hostapd
.add_ap(apdev
[1], params
)
38 bssid2
= apdev
[1]['bssid']
41 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
42 dev
[0].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
43 dev
[1].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
44 dev
[2].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
46 addr0
= dev
[0].own_addr()
47 addr1
= dev
[1].own_addr()
48 addr2
= dev
[2].own_addr()
50 track
= hapd
.request("TRACK_STA_LIST")
51 if addr0
not in track
or addr1
not in track
:
52 raise Exception("Station missing from 2.4 GHz tracking")
54 raise Exception("Unexpected station included in 2.4 GHz tracking")
56 track
= hapd2
.request("TRACK_STA_LIST")
57 if addr0
not in track
or addr2
not in track
:
58 raise Exception("Station missing from 5 GHz tracking")
60 raise Exception("Unexpected station included in 5 GHz tracking")
64 track
= hapd
.request("TRACK_STA_LIST")
65 if addr0
not in track
or addr1
not in track
:
66 raise Exception("Station missing from 2.4 GHz tracking (expiration)")
67 track
= hapd2
.request("TRACK_STA_LIST")
68 if addr0
in track
or addr2
in track
:
69 raise Exception("Station not expired from 5 GHz tracking")
71 # Test maximum list length
72 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
73 dev
[1].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
74 dev
[2].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
75 track
= hapd
.request("TRACK_STA_LIST")
76 if len(track
.splitlines()) != 2:
77 raise Exception("Unexpected number of entries: %d" % len(track
.splitlines()))
78 if addr1
not in track
or addr2
not in track
:
79 raise Exception("Station missing from 2.4 GHz tracking (max limit)")
81 def test_ap_track_sta_no_probe_resp(dev
, apdev
):
82 """Dualband AP not replying to probes from dualband STA on 2.4 GHz"""
84 _test_ap_track_sta_no_probe_resp(dev
, apdev
)
86 subprocess
.call(['iw', 'reg', 'set', '00'])
88 def _test_ap_track_sta_no_probe_resp(dev
, apdev
):
89 dev
[0].flush_scan_cache()
91 params
= { "ssid": "track",
95 "beacon_int": "10000",
96 "no_probe_resp_if_seen_on": apdev
[1]['ifname'] }
97 hapd
= hostapd
.add_ap(apdev
[0], params
)
98 bssid
= apdev
[0]['bssid']
100 params
= { "ssid": "track",
101 "country_code": "US",
104 "track_sta_max_num": "100" }
105 hapd2
= hostapd
.add_ap(apdev
[1], params
)
106 bssid2
= apdev
[1]['bssid']
108 dev
[0].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
109 dev
[1].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
110 dev
[0].scan(freq
=2437, type="ONLY")
111 dev
[0].scan(freq
=2437, type="ONLY")
113 if dev
[0].get_bss(bssid
):
114 raise Exception("2.4 GHz AP found unexpectedly")
116 def test_ap_track_sta_no_auth(dev
, apdev
):
117 """Dualband AP rejecting authentication from dualband STA on 2.4 GHz"""
119 _test_ap_track_sta_no_auth(dev
, apdev
)
121 subprocess
.call(['iw', 'reg', 'set', '00'])
123 def _test_ap_track_sta_no_auth(dev
, apdev
):
124 params
= { "ssid": "track",
125 "country_code": "US",
128 "track_sta_max_num": "100",
129 "no_auth_if_seen_on": apdev
[1]['ifname'] }
130 hapd
= hostapd
.add_ap(apdev
[0], params
)
131 bssid
= apdev
[0]['bssid']
133 params
= { "ssid": "track",
134 "country_code": "US",
137 "track_sta_max_num": "100" }
138 hapd2
= hostapd
.add_ap(apdev
[1], params
)
139 bssid2
= apdev
[1]['bssid']
141 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
142 dev
[0].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
143 dev
[1].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
145 dev
[1].connect("track", key_mgmt
="NONE", scan_freq
="2437")
147 dev
[0].connect("track", key_mgmt
="NONE", scan_freq
="2437",
148 freq_list
="2437", wait_connect
=False)
149 dev
[1].request("DISCONNECT")
150 ev
= dev
[0].wait_event([ "CTRL-EVENT-CONNECTED",
151 "CTRL-EVENT-AUTH-REJECT" ], timeout
=10)
153 raise Exception("Unknown connection result")
154 if "CTRL-EVENT-CONNECTED" in ev
:
155 raise Exception("Unexpected connection")
156 if "status_code=82" not in ev
:
157 raise Exception("Unexpected rejection reason: " + ev
)
158 if "ie=34" not in ev
:
159 raise Exception("No Neighbor Report element: " + ev
)
160 dev
[0].request("DISCONNECT")
162 def test_ap_track_sta_no_auth_passive(dev
, apdev
):
163 """AP rejecting authentication from dualband STA on 2.4 GHz (passive)"""
165 _test_ap_track_sta_no_auth_passive(dev
, apdev
)
167 subprocess
.call(['iw', 'reg', 'set', '00'])
169 def _test_ap_track_sta_no_auth_passive(dev
, apdev
):
170 dev
[0].flush_scan_cache()
172 params
= { "ssid": "track",
173 "country_code": "US",
176 "no_auth_if_seen_on": apdev
[1]['ifname'] }
177 hapd
= hostapd
.add_ap(apdev
[0], params
)
178 bssid
= apdev
[0]['bssid']
180 params
= { "ssid": "track",
181 "country_code": "US",
185 "venue_name": "eng:Venue",
186 "track_sta_max_num": "100" }
187 hapd2
= hostapd
.add_ap(apdev
[1], params
)
188 bssid2
= apdev
[1]['bssid']
190 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
192 dev
[0].request("SCAN freq=5200 passive=1")
193 ev
= dev
[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout
=5)
195 raise Exception("Scan did not complete")
196 if dev
[0].get_bss(bssid2
):
199 raise Exception("AP not found with passive scans")
201 if "OK" not in dev
[0].request("ANQP_GET " + bssid2
+ " 258"):
202 raise Exception("ANQP_GET command failed")
203 ev
= dev
[0].wait_event(["RX-ANQP"], timeout
=1)
204 if ev
is None or "Venue Name" not in ev
:
205 raise Exception("Did not receive Venue Name")
207 dev
[0].connect("track", key_mgmt
="NONE", scan_freq
="2437",
208 freq_list
="2437", wait_connect
=False)
209 ev
= dev
[0].wait_event([ "CTRL-EVENT-CONNECTED",
210 "CTRL-EVENT-AUTH-REJECT" ], timeout
=10)
212 raise Exception("Unknown connection result")
213 if "CTRL-EVENT-CONNECTED" in ev
:
214 raise Exception("Unexpected connection")
215 if "status_code=82" not in ev
:
216 raise Exception("Unexpected rejection reason: " + ev
)
217 dev
[0].request("DISCONNECT")
219 def test_ap_track_sta_force_5ghz(dev
, apdev
):
220 """Dualband AP forcing dualband STA to connect on 5 GHz"""
222 _test_ap_track_sta_force_5ghz(dev
, apdev
)
224 subprocess
.call(['iw', 'reg', 'set', '00'])
226 def _test_ap_track_sta_force_5ghz(dev
, apdev
):
227 params
= { "ssid": "track",
228 "country_code": "US",
231 "no_probe_resp_if_seen_on": apdev
[1]['ifname'],
232 "no_auth_if_seen_on": apdev
[1]['ifname'] }
233 hapd
= hostapd
.add_ap(apdev
[0], params
)
234 bssid
= apdev
[0]['bssid']
236 params
= { "ssid": "track",
237 "country_code": "US",
240 "track_sta_max_num": "100" }
241 hapd2
= hostapd
.add_ap(apdev
[1], params
)
242 bssid2
= apdev
[1]['bssid']
244 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
245 dev
[0].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
247 dev
[0].connect("track", key_mgmt
="NONE", scan_freq
="2437 5200")
248 freq
= dev
[0].get_status_field('freq')
250 raise Exception("Unexpected operating channel")
251 dev
[0].request("DISCONNECT")
253 def test_ap_track_sta_force_2ghz(dev
, apdev
):
254 """Dualband AP forcing dualband STA to connect on 2.4 GHz"""
256 _test_ap_track_sta_force_2ghz(dev
, apdev
)
258 subprocess
.call(['iw', 'reg', 'set', '00'])
260 def _test_ap_track_sta_force_2ghz(dev
, apdev
):
261 params
= { "ssid": "track",
262 "country_code": "US",
265 "track_sta_max_num": "100" }
266 hapd
= hostapd
.add_ap(apdev
[0], params
)
267 bssid
= apdev
[0]['bssid']
269 params
= { "ssid": "track",
270 "country_code": "US",
273 "no_probe_resp_if_seen_on": apdev
[0]['ifname'],
274 "no_auth_if_seen_on": apdev
[0]['ifname'] }
275 hapd2
= hostapd
.add_ap(apdev
[1], params
)
276 bssid2
= apdev
[1]['bssid']
278 dev
[0].scan_for_bss(bssid2
, freq
=5200, force_scan
=True)
279 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
281 dev
[0].connect("track", key_mgmt
="NONE", scan_freq
="2437 5200")
282 freq
= dev
[0].get_status_field('freq')
284 raise Exception("Unexpected operating channel")
285 dev
[0].request("DISCONNECT")
287 def test_ap_track_taxonomy(dev
, apdev
):
288 """AP tracking STA taxonomy"""
290 _test_ap_track_taxonomy(dev
, apdev
)
292 dev
[1].request("SET p2p_disabled 0")
294 def _test_ap_track_taxonomy(dev
, apdev
):
295 params
= { "ssid": "track",
296 "country_code": "US",
299 "track_sta_max_num": "2" }
300 hapd
= hostapd
.add_ap(apdev
[0], params
)
301 bssid
= apdev
[0]['bssid']
303 dev
[0].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
304 addr0
= dev
[0].own_addr()
305 dev
[0].connect("track", key_mgmt
="NONE", scan_freq
="2437")
307 dev
[1].request("SET p2p_disabled 1")
308 dev
[1].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
309 addr1
= dev
[1].own_addr()
310 dev
[1].connect("track", key_mgmt
="NONE", scan_freq
="2437")
312 wpas
= WpaSupplicant(global_iface
='/tmp/wpas-wlan5')
313 wpas
.interface_add("wlan5")
314 wpas
.request("SET model_name track test")
315 wpas
.scan_for_bss(bssid
, freq
=2437, force_scan
=True)
316 addr
= wpas
.own_addr()
317 wpas
.connect("track", key_mgmt
="NONE", scan_freq
="2437")
319 if "FAIL" not in hapd
.request("SIGNATURE abc"):
320 raise Exception("SIGNATURE failure not reported (1)")
321 if "FAIL" not in hapd
.request("SIGNATURE 22:33:44:55:66:77"):
322 raise Exception("SIGNATURE failure not reported (2)")
324 res
= hapd
.request("SIGNATURE " + addr0
)
325 logger
.info("sta0: " + res
)
326 if not res
.startswith("wifi4|probe:"):
327 raise Exception("Unexpected SIGNATURE prefix")
328 if "|assoc:" not in res
:
329 raise Exception("Missing assoc info in SIGNATURE")
330 if "wps:track_test" in res
:
331 raise Exception("Unexpected WPS model name")
333 res
= hapd
.request("SIGNATURE " + addr1
)
334 logger
.info("sta1: " + res
)
335 if not res
.startswith("wifi4|probe:"):
336 raise Exception("Unexpected SIGNATURE prefix")
337 if "|assoc:" not in res
:
338 raise Exception("Missing assoc info in SIGNATURE")
340 raise Exception("Unexpected WPS info");
341 if ",221(0050f2,4)," in res
:
342 raise Exception("Unexpected WPS IE info");
343 if ",221(506f9a,9)," in res
:
344 raise Exception("Unexpected P2P IE info");
346 res
= hapd
.request("SIGNATURE " + addr
)
347 logger
.info("sta: " + res
)
348 if not res
.startswith("wifi4|probe:"):
349 raise Exception("Unexpected SIGNATURE prefix")
350 if "|assoc:" not in res
:
351 raise Exception("Missing assoc info in SIGNATURE")
352 if "wps:track_test" not in res
:
353 raise Exception("Missing WPS model name")
354 if ",221(0050f2,4)," not in res
:
355 raise Exception("Missing WPS IE info");
356 if ",221(506f9a,9)," not in res
:
357 raise Exception("Missing P2P IE info");
359 addr2
= dev
[2].own_addr()
360 res
= hapd
.request("SIGNATURE " + addr2
)
361 if "FAIL" not in res
:
362 raise Exception("Unexpected SIGNATURE success for sta2 (1)")
365 dev
[2].request("SCAN freq=2437 passive=1")
366 ev
= dev
[2].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout
=10)
368 raise Exception("Scan did not complete")
369 if dev
[2].get_bss(bssid
):
372 res
= hapd
.request("SIGNATURE " + addr2
)
373 if "FAIL" not in res
:
374 raise Exception("Unexpected SIGNATURE success for sta2 (2)")
376 dev
[2].connect("track", key_mgmt
="NONE", scan_freq
="2437")
378 res
= hapd
.request("SIGNATURE " + addr2
)
379 if "FAIL" not in res
and len(res
) > 0:
380 raise Exception("Unexpected SIGNATURE success for sta2 (3)")
382 dev
[2].scan_for_bss(bssid
, freq
=2437, force_scan
=True)
384 res
= hapd
.request("SIGNATURE " + addr2
)
385 logger
.info("sta2: " + res
)
386 if not res
.startswith("wifi4|probe:"):
387 raise Exception("Unexpected SIGNATURE prefix")
388 if "|assoc:" not in res
:
389 raise Exception("Missing assoc info in SIGNATURE")