]> git.ipfire.org Git - thirdparty/hostap.git/blob - tests/hwsim/test_wpas_mesh.py
46069beb19327174e1c578455054bf7a169211a3
[thirdparty/hostap.git] / tests / hwsim / test_wpas_mesh.py
1 # wpa_supplicant mesh mode tests
2 # Copyright (c) 2014, cozybit Inc.
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import os
10 import struct
11 import subprocess
12 import time
13 import json
14 import binascii
15
16 import hwsim_utils
17 import hostapd
18 from wpasupplicant import WpaSupplicant
19 from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger
20 from tshark import run_tshark, run_tshark_json
21 from test_ap_ht import set_world_reg
22 from test_sae import radiotap_build, start_monitor, stop_monitor, \
23 build_sae_commit, sae_rx_commit_token_req
24 from hwsim_utils import set_group_map
25
26 def check_mesh_support(dev, secure=False):
27 if "MESH" not in dev.get_capability("modes"):
28 raise HwsimSkip("Driver does not support mesh")
29 if secure and "SAE" not in dev.get_capability("auth_alg"):
30 raise HwsimSkip("SAE not supported")
31
32 def check_mesh_scan(dev, params, other_started=False, beacon_int=0):
33 if not other_started:
34 dev.dump_monitor()
35 id = dev.request("SCAN " + params)
36 if "FAIL" in id:
37 raise Exception("Failed to start scan")
38 id = int(id)
39
40 if other_started:
41 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
42 if ev is None:
43 raise Exception("Other scan did not start")
44 if "id=" + str(id) in ev:
45 raise Exception("Own scan id unexpectedly included in start event")
46
47 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
48 if ev is None:
49 raise Exception("Other scan did not complete")
50 if "id=" + str(id) in ev:
51 raise Exception(
52 "Own scan id unexpectedly included in completed event")
53
54 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
55 if ev is None:
56 raise Exception("Scan did not start")
57 if "id=" + str(id) not in ev:
58 raise Exception("Scan id not included in start event")
59
60 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
61 if ev is None:
62 raise Exception("Scan did not complete")
63 if "id=" + str(id) not in ev:
64 raise Exception("Scan id not included in completed event")
65
66 res = dev.request("SCAN_RESULTS")
67
68 if res.find("[MESH]") < 0:
69 raise Exception("Scan did not contain a MESH network")
70
71 bssid = res.splitlines()[1].split(' ')[0]
72 bss = dev.get_bss(bssid)
73 if bss is None:
74 raise Exception("Could not get BSS entry for mesh")
75 if 'mesh_capability' not in bss:
76 raise Exception("mesh_capability missing from BSS entry")
77 if beacon_int:
78 if 'beacon_int' not in bss:
79 raise Exception("beacon_int missing from BSS entry")
80 if str(beacon_int) != bss['beacon_int']:
81 raise Exception("Unexpected beacon_int in BSS entry: " + bss['beacon_int'])
82 if '[MESH]' not in bss['flags']:
83 raise Exception("BSS output did not include MESH flag")
84
85 def check_mesh_group_added(dev):
86 ev = dev.wait_event(["MESH-GROUP-STARTED"])
87 if ev is None:
88 raise Exception("Test exception: Couldn't join mesh")
89
90
91 def check_mesh_group_removed(dev):
92 ev = dev.wait_event(["MESH-GROUP-REMOVED"])
93 if ev is None:
94 raise Exception("Test exception: Couldn't leave mesh")
95
96
97 def check_mesh_peer_connected(dev, timeout=10):
98 ev = dev.wait_event(["MESH-PEER-CONNECTED"], timeout=timeout)
99 if ev is None:
100 raise Exception("Test exception: Remote peer did not connect.")
101
102
103 def check_mesh_peer_disconnected(dev):
104 ev = dev.wait_event(["MESH-PEER-DISCONNECTED"])
105 if ev is None:
106 raise Exception("Test exception: Peer disconnect event not detected.")
107
108 def check_mesh_joined2(dev):
109 check_mesh_group_added(dev[0])
110 check_mesh_group_added(dev[1])
111
112 def check_mesh_connected2(dev, timeout0=10, connectivity=False):
113 check_mesh_peer_connected(dev[0], timeout=timeout0)
114 check_mesh_peer_connected(dev[1])
115 if connectivity:
116 hwsim_utils.test_connectivity(dev[0], dev[1])
117
118 def check_mesh_joined_connected(dev, connectivity=False, timeout0=10):
119 check_mesh_joined2(dev)
120 check_mesh_connected2(dev, timeout0=timeout0, connectivity=connectivity)
121
122 def test_wpas_add_set_remove_support(dev):
123 """wpa_supplicant MESH add/set/remove network support"""
124 check_mesh_support(dev[0])
125 id = dev[0].add_network()
126 dev[0].set_network(id, "mode", "5")
127 dev[0].remove_network(id)
128
129 def add_open_mesh_network(dev, freq="2412", start=True, beacon_int=0,
130 basic_rates=None, chwidth=-1, disable_vht=False,
131 disable_ht40=False):
132 id = dev.add_network()
133 dev.set_network(id, "mode", "5")
134 dev.set_network_quoted(id, "ssid", "wpas-mesh-open")
135 dev.set_network(id, "key_mgmt", "NONE")
136 if freq:
137 dev.set_network(id, "frequency", freq)
138 if chwidth > -1:
139 dev.set_network(id, "max_oper_chwidth", str(chwidth))
140 if beacon_int:
141 dev.set_network(id, "beacon_int", str(beacon_int))
142 if basic_rates:
143 dev.set_network(id, "mesh_basic_rates", basic_rates)
144 if disable_vht:
145 dev.set_network(id, "disable_vht", "1")
146 if disable_ht40:
147 dev.set_network(id, "disable_ht40", "1")
148 if start:
149 dev.mesh_group_add(id)
150 return id
151
152 def test_wpas_mesh_group_added(dev):
153 """wpa_supplicant MESH group add"""
154 check_mesh_support(dev[0])
155 add_open_mesh_network(dev[0])
156
157 # Check for MESH-GROUP-STARTED event
158 check_mesh_group_added(dev[0])
159
160
161 def test_wpas_mesh_group_remove(dev):
162 """wpa_supplicant MESH group remove"""
163 check_mesh_support(dev[0])
164 add_open_mesh_network(dev[0])
165 # Check for MESH-GROUP-STARTED event
166 check_mesh_group_added(dev[0])
167 dev[0].mesh_group_remove()
168 # Check for MESH-GROUP-REMOVED event
169 check_mesh_group_removed(dev[0])
170 dev[0].mesh_group_remove()
171
172 def test_wpas_mesh_peer_connected(dev):
173 """wpa_supplicant MESH peer connected"""
174 check_mesh_support(dev[0])
175 add_open_mesh_network(dev[0], beacon_int=160)
176 add_open_mesh_network(dev[1], beacon_int=160)
177 check_mesh_joined_connected(dev)
178
179 def test_wpas_mesh_peer_disconnected(dev):
180 """wpa_supplicant MESH peer disconnected"""
181 check_mesh_support(dev[0])
182 add_open_mesh_network(dev[0])
183 add_open_mesh_network(dev[1])
184 check_mesh_joined_connected(dev)
185
186 # Remove group on dev 1
187 dev[1].mesh_group_remove()
188 # Device 0 should get a disconnection event
189 check_mesh_peer_disconnected(dev[0])
190
191
192 def test_wpas_mesh_mode_scan(dev):
193 """wpa_supplicant MESH scan support"""
194 check_mesh_support(dev[0])
195 add_open_mesh_network(dev[0])
196 add_open_mesh_network(dev[1], beacon_int=175)
197
198 check_mesh_joined2(dev)
199
200 # Check for Mesh scan
201 check_mesh_scan(dev[0], "use_id=1 freq=2412", beacon_int=175)
202
203 def test_wpas_mesh_open(dev, apdev):
204 """wpa_supplicant open MESH network connectivity"""
205 check_mesh_support(dev[0])
206 add_open_mesh_network(dev[0], freq="2462", basic_rates="60 120 240")
207 add_open_mesh_network(dev[1], freq="2462", basic_rates="60 120 240")
208
209 check_mesh_joined_connected(dev, connectivity=True)
210
211 state = dev[0].get_status_field("wpa_state")
212 if state != "COMPLETED":
213 raise Exception("Unexpected wpa_state on dev0: " + state)
214 state = dev[1].get_status_field("wpa_state")
215 if state != "COMPLETED":
216 raise Exception("Unexpected wpa_state on dev1: " + state)
217
218 mode = dev[0].get_status_field("mode")
219 if mode != "mesh":
220 raise Exception("Unexpected mode: " + mode)
221
222 def test_wpas_mesh_open_no_auto(dev, apdev):
223 """wpa_supplicant open MESH network connectivity"""
224 check_mesh_support(dev[0])
225 id = add_open_mesh_network(dev[0], start=False)
226 dev[0].set_network(id, "dot11MeshMaxRetries", "16")
227 dev[0].set_network(id, "dot11MeshRetryTimeout", "255")
228 dev[0].mesh_group_add(id)
229
230 id = add_open_mesh_network(dev[1], start=False)
231 dev[1].set_network(id, "no_auto_peer", "1")
232 dev[1].mesh_group_add(id)
233
234 check_mesh_joined_connected(dev, connectivity=True, timeout0=30)
235
236 def test_mesh_open_no_auto2(dev, apdev):
237 """Open mesh network connectivity, no_auto on both peers"""
238 check_mesh_support(dev[0])
239 id = add_open_mesh_network(dev[0], start=False)
240 dev[0].set_network(id, "no_auto_peer", "1")
241 dev[0].mesh_group_add(id)
242
243 id = add_open_mesh_network(dev[1], start=False)
244 dev[1].set_network(id, "no_auto_peer", "1")
245 dev[1].mesh_group_add(id)
246
247 check_mesh_joined2(dev)
248
249 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
250 if ev is None:
251 raise Exception("Missing no-initiate message")
252 addr1 = dev[1].own_addr()
253 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
254 raise Exception("MESH_PEER_ADD failed")
255 if "FAIL" not in dev[0].request("MESH_PEER_ADD ff:ff:ff:ff:ff:ff"):
256 raise Exception("MESH_PEER_ADD with unknown STA succeeded")
257 check_mesh_connected2(dev, timeout0=30)
258 if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
259 raise Exception("MESH_PEER_ADD succeeded for connected STA")
260 hwsim_utils.test_connectivity(dev[0], dev[1])
261
262 def test_mesh_open_rssi_threshold(dev, apdev):
263 """Open mesh network with RSSI threshold"""
264 check_mesh_support(dev[0])
265
266 _test_mesh_open_rssi_threshold(dev, apdev, -255, -255)
267 _test_mesh_open_rssi_threshold(dev, apdev, 0, 0)
268 _test_mesh_open_rssi_threshold(dev, apdev, 1, 0)
269
270 def _test_mesh_open_rssi_threshold(dev, apdev, value, expected):
271 id = add_open_mesh_network(dev[0], start=False)
272 dev[0].set_network(id, "mesh_rssi_threshold", str(value))
273 dev[0].mesh_group_add(id)
274 check_mesh_group_added(dev[0])
275
276 cmd = subprocess.Popen([ "iw", "dev", dev[0].ifname, "get", "mesh_param",
277 "mesh_rssi_threshold" ], stdout=subprocess.PIPE)
278 mesh_rssi_threshold = int(cmd.stdout.read().decode().split(" ")[0])
279
280 dev[0].mesh_group_remove()
281 check_mesh_group_removed(dev[0])
282
283 if mesh_rssi_threshold != expected:
284 raise Exception("mesh_rssi_threshold should be " + str(expected) +
285 ": " + str(mesh_rssi_threshold))
286
287 def add_mesh_secure_net(dev, psk=True, pmf=False, pairwise=None, group=None,
288 sae_password=False, sae_password_id=None, ocv=False):
289 id = dev.add_network()
290 dev.set_network(id, "mode", "5")
291 dev.set_network_quoted(id, "ssid", "wpas-mesh-sec")
292 dev.set_network(id, "key_mgmt", "SAE")
293 dev.set_network(id, "frequency", "2412")
294 if sae_password:
295 dev.set_network_quoted(id, "sae_password", "thisismypassphrase!")
296 if sae_password_id:
297 dev.set_network_quoted(id, "sae_password_id", sae_password_id)
298 if psk:
299 dev.set_network_quoted(id, "psk", "thisismypassphrase!")
300 if pmf:
301 dev.set_network(id, "ieee80211w", "2")
302 if pairwise:
303 dev.set_network(id, "pairwise", pairwise)
304 if group:
305 dev.set_network(id, "group", group)
306 if ocv:
307 try:
308 dev.set_network(id, "ocv", "1")
309 except Exception as e:
310 if "SET_NETWORK failed" in str(e):
311 raise HwsimSkip("OCV not supported")
312 raise
313 return id
314
315 def test_wpas_mesh_secure(dev, apdev):
316 """wpa_supplicant secure MESH network connectivity"""
317 check_mesh_support(dev[0], secure=True)
318 dev[0].request("SET sae_groups ")
319 id = add_mesh_secure_net(dev[0])
320 dev[0].mesh_group_add(id)
321
322 dev[1].request("SET sae_groups ")
323 id = add_mesh_secure_net(dev[1])
324 dev[1].mesh_group_add(id)
325
326 check_mesh_joined_connected(dev, connectivity=True)
327
328 state = dev[0].get_status_field("wpa_state")
329 if state != "COMPLETED":
330 raise Exception("Unexpected wpa_state on dev0: " + state)
331 state = dev[1].get_status_field("wpa_state")
332 if state != "COMPLETED":
333 raise Exception("Unexpected wpa_state on dev1: " + state)
334
335 def test_wpas_mesh_secure_sae_password(dev, apdev):
336 """wpa_supplicant secure mesh using sae_password"""
337 check_mesh_support(dev[0], secure=True)
338 dev[0].request("SET sae_groups ")
339 id = add_mesh_secure_net(dev[0], psk=False, sae_password=True)
340 dev[0].mesh_group_add(id)
341
342 dev[1].request("SET sae_groups ")
343 id = add_mesh_secure_net(dev[1])
344 dev[1].mesh_group_add(id)
345
346 check_mesh_joined_connected(dev, connectivity=True)
347
348 def test_wpas_mesh_secure_sae_password_id(dev, apdev):
349 """Secure mesh using sae_password and password identifier"""
350 check_mesh_support(dev[0], secure=True)
351 dev[0].request("SET sae_groups ")
352 id = add_mesh_secure_net(dev[0], psk=False, sae_password=True,
353 sae_password_id="pw id")
354 dev[0].mesh_group_add(id)
355
356 dev[1].request("SET sae_groups ")
357 id = add_mesh_secure_net(dev[1], sae_password=True,
358 sae_password_id="pw id")
359 dev[1].mesh_group_add(id)
360
361 check_mesh_joined_connected(dev, connectivity=True)
362
363 def test_wpas_mesh_secure_sae_password_id_mismatch(dev, apdev):
364 """Secure mesh using sae_password and password identifier mismatch"""
365 check_mesh_support(dev[0], secure=True)
366 dev[0].request("SET sae_groups ")
367 id = add_mesh_secure_net(dev[0], psk=False, sae_password=True,
368 sae_password_id="pw id")
369 dev[0].mesh_group_add(id)
370
371 dev[1].request("SET sae_groups ")
372 id = add_mesh_secure_net(dev[1], sae_password=True,
373 sae_password_id="wrong")
374 dev[1].mesh_group_add(id)
375
376 check_mesh_joined2(dev)
377
378 ev = dev[0].wait_event(["CTRL-EVENT-SAE-UNKNOWN-PASSWORD-IDENTIFIER"],
379 timeout=10)
380 if ev is None:
381 raise Exception("Unknown Password Identifier not noticed")
382
383 def test_mesh_secure_pmf(dev, apdev):
384 """Secure mesh network connectivity with PMF enabled"""
385 check_mesh_support(dev[0], secure=True)
386 dev[0].request("SET sae_groups ")
387 id = add_mesh_secure_net(dev[0], pmf=True)
388 dev[0].mesh_group_add(id)
389
390 dev[1].request("SET sae_groups ")
391 id = add_mesh_secure_net(dev[1], pmf=True)
392 dev[1].mesh_group_add(id)
393
394 check_mesh_joined_connected(dev, connectivity=True)
395
396 def test_mesh_secure_ocv(dev, apdev):
397 """Secure mesh network connectivity with OCV enabled"""
398 check_mesh_support(dev[0], secure=True)
399 dev[0].request("SET sae_groups ")
400 id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
401 dev[0].mesh_group_add(id)
402 dev[1].request("SET sae_groups ")
403 id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
404 dev[1].mesh_group_add(id)
405
406 check_mesh_joined_connected(dev, connectivity=True)
407
408 def test_mesh_secure_ocv_compat(dev, apdev):
409 """Secure mesh network where only one peer has OCV enabled"""
410 check_mesh_support(dev[0], secure=True)
411 dev[0].request("SET sae_groups ")
412 id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
413 dev[0].mesh_group_add(id)
414 dev[1].request("SET sae_groups ")
415 id = add_mesh_secure_net(dev[1], pmf=True, ocv=False)
416 dev[1].mesh_group_add(id)
417
418 check_mesh_joined_connected(dev, connectivity=True)
419
420 def set_reg(dev, country):
421 subprocess.call(['iw', 'reg', 'set', country])
422 for i in range(2):
423 for j in range(5):
424 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
425 if ev is None:
426 raise Exception("No regdom change event")
427 if "alpha2=" + country in ev:
428 break
429
430 def clear_reg_setting(dev):
431 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
432 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
433 subprocess.call(['iw', 'reg', 'set', '00'])
434 dev[0].flush_scan_cache()
435 dev[1].flush_scan_cache()
436
437 def test_mesh_secure_ocv_mix_legacy(dev, apdev):
438 """Mesh network with a VHT STA and a legacy STA under OCV"""
439 try:
440 run_mesh_secure_ocv_mix_legacy(dev, apdev)
441 finally:
442 clear_reg_setting(dev)
443
444 def run_mesh_secure_ocv_mix_legacy(dev, apdev):
445 check_mesh_support(dev[0], secure=True)
446 set_reg(dev, 'AZ')
447
448 dev[0].request("SET sae_groups ")
449 id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
450 dev[0].set_network(id, "frequency", "5200")
451 dev[0].set_network(id, "max_oper_chwidth", "2")
452 dev[0].mesh_group_add(id)
453
454 dev[1].request("SET sae_groups ")
455 id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
456 dev[1].set_network(id, "frequency", "5200")
457 dev[1].set_network(id, "disable_vht", "1")
458 dev[1].set_network(id, "disable_ht40", "1")
459 dev[1].mesh_group_add(id)
460
461 check_mesh_joined_connected(dev, connectivity=True)
462
463 def test_mesh_secure_ocv_mix_ht(dev, apdev):
464 """Mesh network with a VHT STA and a HT STA under OCV"""
465 try:
466 run_mesh_secure_ocv_mix_ht(dev, apdev)
467 finally:
468 clear_reg_setting(dev)
469
470 def run_mesh_secure_ocv_mix_ht(dev, apdev):
471 check_mesh_support(dev[0], secure=True)
472 set_reg(dev, 'AZ')
473
474 dev[0].request("SET sae_groups ")
475 id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
476 dev[0].set_network(id, "frequency", "5200")
477 dev[0].set_network(id, "max_oper_chwidth", "2")
478 dev[0].mesh_group_add(id)
479
480 dev[1].request("SET sae_groups ")
481 id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
482 dev[1].set_network(id, "frequency", "5200")
483 dev[1].set_network(id, "disable_vht", "1")
484 dev[1].mesh_group_add(id)
485
486 check_mesh_joined_connected(dev, connectivity=True)
487
488 def run_mesh_secure(dev, cipher):
489 if cipher not in dev[0].get_capability("pairwise"):
490 raise HwsimSkip("Cipher %s not supported" % cipher)
491 check_mesh_support(dev[0], secure=True)
492 dev[0].request("SET sae_groups ")
493 id = add_mesh_secure_net(dev[0], pairwise=cipher, group=cipher)
494 dev[0].mesh_group_add(id)
495
496 dev[1].request("SET sae_groups ")
497 id = add_mesh_secure_net(dev[1], pairwise=cipher, group=cipher)
498 dev[1].mesh_group_add(id)
499
500 check_mesh_joined_connected(dev, connectivity=True)
501
502 def test_mesh_secure_ccmp(dev, apdev):
503 """Secure mesh with CCMP"""
504 run_mesh_secure(dev, "CCMP")
505
506 def test_mesh_secure_gcmp(dev, apdev):
507 """Secure mesh with GCMP"""
508 run_mesh_secure(dev, "GCMP")
509
510 def test_mesh_secure_gcmp_256(dev, apdev):
511 """Secure mesh with GCMP-256"""
512 run_mesh_secure(dev, "GCMP-256")
513
514 def test_mesh_secure_ccmp_256(dev, apdev):
515 """Secure mesh with CCMP-256"""
516 run_mesh_secure(dev, "CCMP-256")
517
518 def test_mesh_secure_invalid_pairwise_cipher(dev, apdev):
519 """Secure mesh and invalid group cipher"""
520 check_mesh_support(dev[0], secure=True)
521 dev[0].request("SET sae_groups ")
522 id = add_mesh_secure_net(dev[0], pairwise="TKIP", group="CCMP")
523 if dev[0].mesh_group_add(id) != None:
524 raise Exception("Unexpected group add success")
525 ev = dev[0].wait_event(["mesh: Invalid pairwise cipher"], timeout=1)
526 if ev is None:
527 raise Exception("Invalid pairwise cipher not reported")
528
529 def test_mesh_secure_invalid_group_cipher(dev, apdev):
530 """Secure mesh and invalid group cipher"""
531 check_mesh_support(dev[0], secure=True)
532 dev[0].request("SET sae_groups ")
533 id = add_mesh_secure_net(dev[0], pairwise="CCMP", group="TKIP")
534 if dev[0].mesh_group_add(id) != None:
535 raise Exception("Unexpected group add success")
536 ev = dev[0].wait_event(["mesh: Invalid group cipher"], timeout=1)
537 if ev is None:
538 raise Exception("Invalid group cipher not reported")
539
540 def test_wpas_mesh_secure_sae_group_mismatch(dev, apdev):
541 """wpa_supplicant secure MESH and SAE group mismatch"""
542 check_mesh_support(dev[0], secure=True)
543 addr0 = dev[0].p2p_interface_addr()
544 addr1 = dev[1].p2p_interface_addr()
545 addr2 = dev[2].p2p_interface_addr()
546
547 dev[0].request("SET sae_groups 19 25")
548 id = add_mesh_secure_net(dev[0])
549 dev[0].mesh_group_add(id)
550
551 dev[1].request("SET sae_groups 19")
552 id = add_mesh_secure_net(dev[1])
553 dev[1].mesh_group_add(id)
554
555 dev[2].request("SET sae_groups 26")
556 id = add_mesh_secure_net(dev[2])
557 dev[2].mesh_group_add(id)
558
559 check_mesh_group_added(dev[0])
560 check_mesh_group_added(dev[1])
561 check_mesh_group_added(dev[2])
562
563 ev = dev[0].wait_event(["MESH-PEER-CONNECTED"])
564 if ev is None:
565 raise Exception("Remote peer did not connect")
566 if addr1 not in ev:
567 raise Exception("Unexpected peer connected: " + ev)
568
569 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"])
570 if ev is None:
571 raise Exception("Remote peer did not connect")
572 if addr0 not in ev:
573 raise Exception("Unexpected peer connected: " + ev)
574
575 ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
576 if ev is not None:
577 raise Exception("Unexpected peer connection at dev[2]: " + ev)
578
579 ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
580 if ev is not None:
581 raise Exception("Unexpected peer connection: " + ev)
582
583 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
584 if ev is not None:
585 raise Exception("Unexpected peer connection: " + ev)
586
587 dev[0].request("SET sae_groups ")
588 dev[1].request("SET sae_groups ")
589 dev[2].request("SET sae_groups ")
590
591 def test_wpas_mesh_secure_sae_group_negotiation(dev, apdev):
592 """wpa_supplicant secure MESH and SAE group negotiation"""
593 check_mesh_support(dev[0], secure=True)
594 addr0 = dev[0].own_addr()
595 addr1 = dev[1].own_addr()
596
597 #dev[0].request("SET sae_groups 21 20 25 26")
598 dev[0].request("SET sae_groups 26")
599 id = add_mesh_secure_net(dev[0])
600 dev[0].mesh_group_add(id)
601
602 dev[1].request("SET sae_groups 19 26")
603 id = add_mesh_secure_net(dev[1])
604 dev[1].mesh_group_add(id)
605
606 check_mesh_joined_connected(dev)
607
608 dev[0].request("SET sae_groups ")
609 dev[1].request("SET sae_groups ")
610
611 def test_wpas_mesh_secure_sae_missing_password(dev, apdev):
612 """wpa_supplicant secure MESH and missing SAE password"""
613 check_mesh_support(dev[0], secure=True)
614 id = add_mesh_secure_net(dev[0], psk=False)
615 dev[0].set_network(id, "psk", "8f20b381f9b84371d61b5080ad85cac3c61ab3ca9525be5b2d0f4da3d979187a")
616 dev[0].mesh_group_add(id)
617 ev = dev[0].wait_event(["MESH-GROUP-STARTED", "Could not join mesh"],
618 timeout=5)
619 if ev is None:
620 raise Exception("Timeout on mesh start event")
621 if "MESH-GROUP-STARTED" in ev:
622 raise Exception("Unexpected mesh group start")
623 ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.1)
624 if ev is not None:
625 raise Exception("Unexpected mesh group start")
626
627 def test_wpas_mesh_secure_no_auto(dev, apdev):
628 """wpa_supplicant secure MESH network connectivity"""
629 check_mesh_support(dev[0], secure=True)
630 dev[0].request("SET sae_groups 19")
631 id = add_mesh_secure_net(dev[0])
632 dev[0].mesh_group_add(id)
633
634 dev[1].request("SET sae_groups 19")
635 id = add_mesh_secure_net(dev[1])
636 dev[1].set_network(id, "no_auto_peer", "1")
637 dev[1].mesh_group_add(id)
638
639 check_mesh_joined_connected(dev, connectivity=True)
640
641 dev[0].request("SET sae_groups ")
642 dev[1].request("SET sae_groups ")
643
644 def test_wpas_mesh_secure_dropped_frame(dev, apdev):
645 """Secure mesh network connectivity when the first plink Open is dropped"""
646 check_mesh_support(dev[0], secure=True)
647
648 dev[0].request("SET ext_mgmt_frame_handling 1")
649 dev[0].request("SET sae_groups ")
650 id = add_mesh_secure_net(dev[0])
651 dev[0].mesh_group_add(id)
652
653 dev[1].request("SET sae_groups ")
654 id = add_mesh_secure_net(dev[1])
655 dev[1].mesh_group_add(id)
656
657 check_mesh_joined2(dev)
658
659 # Drop the first Action frame (plink Open) to test unexpected order of
660 # Confirm/Open messages.
661 count = 0
662 while True:
663 count += 1
664 if count > 10:
665 raise Exception("Did not see Action frames")
666 rx_msg = dev[0].mgmt_rx()
667 if rx_msg is None:
668 raise Exception("MGMT-RX timeout")
669 if rx_msg['subtype'] == 13:
670 logger.info("Drop the first Action frame")
671 break
672 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
673 rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
674 raise Exception("MGMT_RX_PROCESS failed")
675
676 dev[0].request("SET ext_mgmt_frame_handling 0")
677
678 check_mesh_connected2(dev, connectivity=True)
679
680 def test_mesh_secure_fail(dev, apdev):
681 """Secure mesh network connectivity failure"""
682 check_mesh_support(dev[0], secure=True)
683 dev[0].request("SET sae_groups ")
684 id = add_mesh_secure_net(dev[0], pmf=True)
685 dev[0].mesh_group_add(id)
686
687 dev[1].request("SET sae_groups ")
688 id = add_mesh_secure_net(dev[1], pmf=True)
689
690 with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add;mesh_mpm_auth_peer"):
691 dev[1].mesh_group_add(id)
692
693 check_mesh_joined_connected(dev)
694
695 def test_wpas_mesh_ctrl(dev):
696 """wpa_supplicant ctrl_iface mesh command error cases"""
697 check_mesh_support(dev[0])
698 if "FAIL" not in dev[0].request("MESH_GROUP_ADD 123"):
699 raise Exception("Unexpected MESH_GROUP_ADD success")
700 id = dev[0].add_network()
701 if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
702 raise Exception("Unexpected MESH_GROUP_ADD success")
703 dev[0].set_network(id, "mode", "5")
704 dev[0].set_network(id, "key_mgmt", "WPA-PSK")
705 if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
706 raise Exception("Unexpected MESH_GROUP_ADD success")
707
708 if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE foo"):
709 raise Exception("Unexpected MESH_GROUP_REMOVE success")
710
711 def test_wpas_mesh_dynamic_interface(dev):
712 """wpa_supplicant mesh with dynamic interface"""
713 check_mesh_support(dev[0])
714 mesh0 = None
715 mesh1 = None
716 try:
717 mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
718 if "FAIL" in mesh0:
719 raise Exception("MESH_INTERFACE_ADD failed")
720 mesh1 = dev[1].request("MESH_INTERFACE_ADD")
721 if "FAIL" in mesh1:
722 raise Exception("MESH_INTERFACE_ADD failed")
723
724 wpas0 = WpaSupplicant(ifname=mesh0)
725 wpas1 = WpaSupplicant(ifname=mesh1)
726 logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
727 logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
728
729 add_open_mesh_network(wpas0)
730 add_open_mesh_network(wpas1)
731 check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
732
733 # Must not allow MESH_GROUP_REMOVE on dynamic interface
734 if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh0):
735 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
736 if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh1):
737 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
738
739 # Must not allow MESH_GROUP_REMOVE on another radio interface
740 if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh1):
741 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
742 if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh0):
743 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
744
745 wpas0.remove_ifname()
746 wpas1.remove_ifname()
747
748 if "OK" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
749 raise Exception("MESH_GROUP_REMOVE failed")
750 if "OK" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
751 raise Exception("MESH_GROUP_REMOVE failed")
752
753 if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
754 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
755 if "FAIL" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
756 raise Exception("Invalid MESH_GROUP_REMOVE accepted")
757
758 logger.info("Make sure another dynamic group can be added")
759 mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
760 if "FAIL" in mesh0:
761 raise Exception("MESH_INTERFACE_ADD failed")
762 mesh1 = dev[1].request("MESH_INTERFACE_ADD")
763 if "FAIL" in mesh1:
764 raise Exception("MESH_INTERFACE_ADD failed")
765
766 wpas0 = WpaSupplicant(ifname=mesh0)
767 wpas1 = WpaSupplicant(ifname=mesh1)
768 logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
769 logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
770
771 add_open_mesh_network(wpas0)
772 add_open_mesh_network(wpas1)
773 check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
774 finally:
775 if mesh0:
776 dev[0].request("MESH_GROUP_REMOVE " + mesh0)
777 if mesh1:
778 dev[1].request("MESH_GROUP_REMOVE " + mesh1)
779
780 def test_wpas_mesh_dynamic_interface_remove(dev):
781 """wpa_supplicant mesh with dynamic interface and removal"""
782 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
783 wpas.interface_add("wlan5")
784 check_mesh_support(wpas)
785 mesh5 = wpas.request("MESH_INTERFACE_ADD ifname=mesh5")
786 if "FAIL" in mesh5:
787 raise Exception("MESH_INTERFACE_ADD failed")
788
789 wpas5 = WpaSupplicant(ifname=mesh5)
790 logger.info(mesh5 + " address " + wpas5.get_status_field("address"))
791 add_open_mesh_network(wpas5)
792 add_open_mesh_network(dev[0])
793 check_mesh_joined_connected([wpas5, dev[0]], connectivity=True)
794
795 # Remove the main interface while mesh interface is in use
796 wpas.interface_remove("wlan5")
797
798 def test_wpas_mesh_max_peering(dev, apdev, params):
799 """Mesh max peering limit"""
800 check_mesh_support(dev[0])
801 try:
802 dev[0].request("SET max_peer_links 1")
803
804 # first, connect dev[0] and dev[1]
805 add_open_mesh_network(dev[0])
806 add_open_mesh_network(dev[1])
807 for i in range(2):
808 ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
809 if ev is None:
810 raise Exception("dev%d did not connect with any peer" % i)
811
812 # add dev[2] which will try to connect with both dev[0] and dev[1],
813 # but can complete connection only with dev[1]
814 add_open_mesh_network(dev[2])
815 for i in range(1, 3):
816 ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
817 if ev is None:
818 raise Exception("dev%d did not connect the second peer" % i)
819
820 ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
821 if ev is not None:
822 raise Exception("dev0 connection beyond max peering limit")
823
824 ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
825 if ev is not None:
826 raise Exception("dev2 reported unexpected peering: " + ev)
827
828 for i in range(3):
829 dev[i].mesh_group_remove()
830 check_mesh_group_removed(dev[i])
831 finally:
832 dev[0].request("SET max_peer_links 99")
833
834 addr0 = dev[0].own_addr()
835 addr1 = dev[1].own_addr()
836 addr2 = dev[2].own_addr()
837
838 capfile = os.path.join(params['logdir'], "hwsim0.pcapng")
839 filt = "wlan.fc.type_subtype == 8"
840 out = run_tshark(capfile, filt, [ "wlan.sa", "wlan.mesh.config.cap" ])
841 pkts = out.splitlines()
842 one = [ 0, 0, 0 ]
843 zero = [ 0, 0, 0 ]
844 all_cap_one = True
845 for pkt in pkts:
846 addr, cap = pkt.split('\t')
847 cap = int(cap, 16)
848 if cap != 1:
849 all_cap_one = False
850 if addr == addr0:
851 idx = 0
852 elif addr == addr1:
853 idx = 1
854 elif addr == addr2:
855 idx = 2
856 else:
857 continue
858 if cap & 0x01:
859 one[idx] += 1
860 else:
861 zero[idx] += 1
862 logger.info("one: " + str(one))
863 logger.info("zero: " + str(zero))
864 if all_cap_one:
865 # It looks like tshark parser was broken at some point for
866 # wlan.mesh.config.cap which is now (tshark 2.6.3) pointing to incorrect
867 # field (same as wlan.mesh.config.ps_protocol). This used to work with
868 # tshark 2.2.6.
869 #
870 # For now, assume the capability field ends up being the last octet of
871 # the frame.
872 one = [ 0, 0, 0 ]
873 zero = [ 0, 0, 0 ]
874 addrs = [ addr0, addr1, addr2 ]
875 for idx in range(3):
876 addr = addrs[idx]
877 out = run_tshark_json(capfile, filt + " && wlan.sa == " + addr)
878 pkts = json.loads(out)
879 for pkt in pkts:
880 frame = pkt["_source"]["layers"]["frame_raw"][0]
881 cap = int(frame[-2:], 16)
882 if cap & 0x01:
883 one[idx] += 1
884 else:
885 zero[idx] += 1
886 logger.info("one: " + str(one))
887 logger.info("zero: " + str(zero))
888 if zero[0] == 0:
889 raise Exception("Accepting Additional Mesh Peerings not cleared")
890 if one[0] == 0:
891 raise Exception("Accepting Additional Mesh Peerings was not set in the first Beacon frame")
892 if zero[1] > 0 or zero[2] > 0 or one[1] == 0 or one[2] == 0:
893 raise Exception("Unexpected value in Accepting Additional Mesh Peerings from other STAs")
894
895 def test_wpas_mesh_open_5ghz(dev, apdev):
896 """wpa_supplicant open MESH network on 5 GHz band"""
897 try:
898 _test_wpas_mesh_open_5ghz(dev, apdev)
899 finally:
900 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
901 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
902 subprocess.call(['iw', 'reg', 'set', '00'])
903 dev[0].flush_scan_cache()
904 dev[1].flush_scan_cache()
905
906 def _test_wpas_mesh_open_5ghz(dev, apdev):
907 check_mesh_support(dev[0])
908 subprocess.call(['iw', 'reg', 'set', 'US'])
909 for i in range(2):
910 for j in range(5):
911 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
912 if ev is None:
913 raise Exception("No regdom change event")
914 if "alpha2=US" in ev:
915 break
916 add_open_mesh_network(dev[i], freq="5180")
917
918 check_mesh_joined_connected(dev, connectivity=True)
919
920 dev[0].mesh_group_remove()
921 dev[1].mesh_group_remove()
922 check_mesh_group_removed(dev[0])
923 check_mesh_group_removed(dev[1])
924 dev[0].dump_monitor()
925 dev[1].dump_monitor()
926
927 def test_wpas_mesh_open_5ghz_coex(dev, apdev):
928 """Mesh network on 5 GHz band and 20/40 coex change"""
929 try:
930 _test_wpas_mesh_open_5ghz_coex(dev, apdev)
931 finally:
932 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
933 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
934 set_world_reg(apdev0=apdev[0], dev0=dev[0])
935 dev[0].flush_scan_cache()
936 dev[1].flush_scan_cache()
937
938 def _test_wpas_mesh_open_5ghz_coex(dev, apdev):
939 check_mesh_support(dev[0])
940 subprocess.call(['iw', 'reg', 'set', 'US'])
941
942 # Start a 20 MHz BSS on channel 40 that would be the secondary channel of
943 # HT40+ mesh on channel 36.
944 params = { "ssid": "test-ht40",
945 "hw_mode": "a",
946 "channel": "40",
947 "country_code": "US" }
948 hapd = hostapd.add_ap(apdev[0], params)
949 bssid = hapd.own_addr()
950
951 for i in range(2):
952 for j in range(5):
953 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
954 if ev is None:
955 raise Exception("No regdom change event")
956 if "alpha2=US" in ev:
957 break
958 dev[i].scan_for_bss(bssid, freq=5200)
959 add_open_mesh_network(dev[i], freq="5180")
960
961 check_mesh_joined_connected(dev)
962
963 freq = dev[0].get_status_field("freq")
964 if freq != "5200":
965 raise Exception("Unexpected STATUS freq=" + freq)
966 sig = dev[0].request("SIGNAL_POLL").splitlines()
967 if "FREQUENCY=5200" not in sig:
968 raise Exception("Unexpected SIGNAL_POLL output: " + str(sig))
969
970 hapd.disable()
971 dev[0].mesh_group_remove()
972 dev[1].mesh_group_remove()
973 check_mesh_group_removed(dev[0])
974 check_mesh_group_removed(dev[1])
975 dev[0].dump_monitor()
976 dev[1].dump_monitor()
977
978 def test_wpas_mesh_open_ht40(dev, apdev):
979 """Mesh and HT40 support difference"""
980 try:
981 _test_wpas_mesh_open_ht40(dev, apdev)
982 finally:
983 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
984 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
985 dev[2].request("MESH_GROUP_REMOVE " + dev[2].ifname)
986 subprocess.call(['iw', 'reg', 'set', '00'])
987 dev[0].flush_scan_cache()
988 dev[1].flush_scan_cache()
989 dev[2].flush_scan_cache()
990
991 def _test_wpas_mesh_open_ht40(dev, apdev):
992 check_mesh_support(dev[0])
993 subprocess.call(['iw', 'reg', 'set', 'US'])
994 for i in range(3):
995 for j in range(5):
996 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
997 if ev is None:
998 raise Exception("No regdom change event")
999 if "alpha2=US" in ev:
1000 break
1001 add_open_mesh_network(dev[i], freq="5180", disable_vht=True,
1002 disable_ht40=(i == 2))
1003
1004 check_mesh_group_added(dev[0])
1005 check_mesh_group_added(dev[1])
1006 check_mesh_group_added(dev[2])
1007
1008 check_mesh_peer_connected(dev[0])
1009 check_mesh_peer_connected(dev[1])
1010 check_mesh_peer_connected(dev[2])
1011
1012 hwsim_utils.test_connectivity(dev[0], dev[1])
1013 hwsim_utils.test_connectivity(dev[0], dev[2])
1014 hwsim_utils.test_connectivity(dev[1], dev[2])
1015
1016 dev[0].mesh_group_remove()
1017 dev[1].mesh_group_remove()
1018 dev[2].mesh_group_remove()
1019 check_mesh_group_removed(dev[0])
1020 check_mesh_group_removed(dev[1])
1021 check_mesh_group_removed(dev[2])
1022 dev[0].dump_monitor()
1023 dev[1].dump_monitor()
1024 dev[2].dump_monitor()
1025
1026 def test_wpas_mesh_open_vht40(dev, apdev):
1027 """wpa_supplicant open MESH network on VHT 40 MHz channel"""
1028 try:
1029 _test_wpas_mesh_open_vht40(dev, apdev)
1030 finally:
1031 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
1032 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
1033 subprocess.call(['iw', 'reg', 'set', '00'])
1034 dev[0].flush_scan_cache()
1035 dev[1].flush_scan_cache()
1036
1037 def _test_wpas_mesh_open_vht40(dev, apdev):
1038 check_mesh_support(dev[0])
1039 subprocess.call(['iw', 'reg', 'set', 'US'])
1040 for i in range(2):
1041 for j in range(5):
1042 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
1043 if ev is None:
1044 raise Exception("No regdom change event")
1045 if "alpha2=US" in ev:
1046 break
1047 add_open_mesh_network(dev[i], freq="5180", chwidth=0)
1048
1049 check_mesh_joined_connected(dev, connectivity=True)
1050
1051 sig = dev[0].request("SIGNAL_POLL").splitlines()
1052 if "WIDTH=40 MHz" not in sig:
1053 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
1054 if "CENTER_FRQ1=5190" not in sig:
1055 raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
1056
1057 sig = dev[1].request("SIGNAL_POLL").splitlines()
1058 if "WIDTH=40 MHz" not in sig:
1059 raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
1060 if "CENTER_FRQ1=5190" not in sig:
1061 raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
1062
1063 dev[0].mesh_group_remove()
1064 dev[1].mesh_group_remove()
1065 check_mesh_group_removed(dev[0])
1066 check_mesh_group_removed(dev[1])
1067 dev[0].dump_monitor()
1068 dev[1].dump_monitor()
1069
1070 def test_wpas_mesh_open_vht20(dev, apdev):
1071 """wpa_supplicant open MESH network on VHT 20 MHz channel"""
1072 try:
1073 _test_wpas_mesh_open_vht20(dev, apdev)
1074 finally:
1075 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
1076 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
1077 subprocess.call(['iw', 'reg', 'set', '00'])
1078 dev[0].flush_scan_cache()
1079 dev[1].flush_scan_cache()
1080
1081 def _test_wpas_mesh_open_vht20(dev, apdev):
1082 check_mesh_support(dev[0])
1083 subprocess.call(['iw', 'reg', 'set', 'US'])
1084 for i in range(2):
1085 for j in range(5):
1086 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
1087 if ev is None:
1088 raise Exception("No regdom change event")
1089 if "alpha2=US" in ev:
1090 break
1091 add_open_mesh_network(dev[i], freq="5180", chwidth=0, disable_ht40=True)
1092
1093 check_mesh_joined_connected(dev, connectivity=True)
1094
1095 sig = dev[0].request("SIGNAL_POLL").splitlines()
1096 if "WIDTH=20 MHz" not in sig:
1097 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
1098 if "CENTER_FRQ1=5180" not in sig:
1099 raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
1100
1101 sig = dev[1].request("SIGNAL_POLL").splitlines()
1102 if "WIDTH=20 MHz" not in sig:
1103 raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
1104 if "CENTER_FRQ1=5180" not in sig:
1105 raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
1106
1107 dev[0].mesh_group_remove()
1108 dev[1].mesh_group_remove()
1109 check_mesh_group_removed(dev[0])
1110 check_mesh_group_removed(dev[1])
1111 dev[0].dump_monitor()
1112 dev[1].dump_monitor()
1113
1114 def test_wpas_mesh_open_vht_80p80(dev, apdev):
1115 """wpa_supplicant open MESH network on VHT 80+80 MHz channel"""
1116 try:
1117 _test_wpas_mesh_open_vht_80p80(dev, apdev)
1118 finally:
1119 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
1120 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
1121 subprocess.call(['iw', 'reg', 'set', '00'])
1122 dev[0].flush_scan_cache()
1123 dev[1].flush_scan_cache()
1124
1125 def _test_wpas_mesh_open_vht_80p80(dev, apdev):
1126 check_mesh_support(dev[0])
1127 subprocess.call(['iw', 'reg', 'set', 'US'])
1128 for i in range(2):
1129 for j in range(5):
1130 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
1131 if ev is None:
1132 raise Exception("No regdom change event")
1133 if "alpha2=US" in ev:
1134 break
1135 add_open_mesh_network(dev[i], freq="5180", chwidth=3)
1136
1137 check_mesh_joined_connected(dev, connectivity=True)
1138
1139 sig = dev[0].request("SIGNAL_POLL").splitlines()
1140 if "WIDTH=80+80 MHz" not in sig:
1141 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
1142 if "CENTER_FRQ1=5210" not in sig:
1143 raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
1144 if "CENTER_FRQ2=5775" not in sig:
1145 raise Exception("Unexpected SIGNAL_POLL value(4): " + str(sig))
1146
1147 sig = dev[1].request("SIGNAL_POLL").splitlines()
1148 if "WIDTH=80+80 MHz" not in sig:
1149 raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
1150 if "CENTER_FRQ1=5210" not in sig:
1151 raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
1152 if "CENTER_FRQ2=5775" not in sig:
1153 raise Exception("Unexpected SIGNAL_POLL value(4b): " + str(sig))
1154
1155 dev[0].mesh_group_remove()
1156 dev[1].mesh_group_remove()
1157 check_mesh_group_removed(dev[0])
1158 check_mesh_group_removed(dev[1])
1159 dev[0].dump_monitor()
1160 dev[1].dump_monitor()
1161
1162 def test_mesh_open_vht_160(dev, apdev):
1163 """Open mesh network on VHT 160 MHz channel"""
1164 try:
1165 _test_mesh_open_vht_160(dev, apdev)
1166 finally:
1167 dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
1168 dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
1169 subprocess.call(['iw', 'reg', 'set', '00'])
1170 dev[0].flush_scan_cache()
1171 dev[1].flush_scan_cache()
1172
1173 def _test_mesh_open_vht_160(dev, apdev):
1174 check_mesh_support(dev[0])
1175 subprocess.call(['iw', 'reg', 'set', 'ZA'])
1176 for i in range(2):
1177 for j in range(5):
1178 ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
1179 if ev is None:
1180 raise Exception("No regdom change event")
1181 if "alpha2=ZA" in ev:
1182 break
1183
1184 cmd = subprocess.Popen(["iw", "reg", "get"], stdout=subprocess.PIPE)
1185 reg = cmd.stdout.read()
1186 found = False
1187 for entry in reg.splitlines():
1188 entry = entry.decode()
1189 if "@ 160)" in entry and "DFS" not in entry:
1190 found = True
1191 break
1192 if not found:
1193 raise HwsimSkip("160 MHz channel without DFS not supported in regulatory information")
1194
1195 add_open_mesh_network(dev[i], freq="5520", chwidth=2)
1196
1197 check_mesh_joined_connected(dev, connectivity=True)
1198 dev[0].dump_monitor()
1199 dev[1].dump_monitor()
1200
1201 sig = dev[0].request("SIGNAL_POLL").splitlines()
1202 if "WIDTH=160 MHz" not in sig:
1203 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
1204 if "FREQUENCY=5520" not in sig:
1205 raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
1206
1207 sig = dev[1].request("SIGNAL_POLL").splitlines()
1208 if "WIDTH=160 MHz" not in sig:
1209 raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
1210 if "FREQUENCY=5520" not in sig:
1211 raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
1212
1213 dev[0].mesh_group_remove()
1214 dev[1].mesh_group_remove()
1215 check_mesh_group_removed(dev[0])
1216 check_mesh_group_removed(dev[1])
1217 dev[0].dump_monitor()
1218 dev[1].dump_monitor()
1219
1220 def test_wpas_mesh_password_mismatch(dev, apdev):
1221 """Mesh network and one device with mismatching password"""
1222 check_mesh_support(dev[0], secure=True)
1223 dev[0].request("SET sae_groups ")
1224 id = add_mesh_secure_net(dev[0])
1225 dev[0].mesh_group_add(id)
1226
1227 dev[1].request("SET sae_groups ")
1228 id = add_mesh_secure_net(dev[1])
1229 dev[1].mesh_group_add(id)
1230
1231 dev[2].request("SET sae_groups ")
1232 id = add_mesh_secure_net(dev[2])
1233 dev[2].set_network_quoted(id, "psk", "wrong password")
1234 dev[2].mesh_group_add(id)
1235
1236 # The two peers with matching password need to be able to connect
1237 check_mesh_joined_connected(dev)
1238
1239 ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
1240 if ev is None:
1241 raise Exception("dev2 did not report auth failure (1)")
1242 ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
1243 if ev is None:
1244 raise Exception("dev2 did not report auth failure (2)")
1245 dev[2].dump_monitor()
1246
1247 count = 0
1248 ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
1249 if ev is None:
1250 logger.info("dev0 did not report auth failure")
1251 else:
1252 if "addr=" + dev[2].own_addr() not in ev:
1253 raise Exception("Unexpected peer address in dev0 event: " + ev)
1254 count += 1
1255 dev[0].dump_monitor()
1256
1257 ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
1258 if ev is None:
1259 logger.info("dev1 did not report auth failure")
1260 else:
1261 if "addr=" + dev[2].own_addr() not in ev:
1262 raise Exception("Unexpected peer address in dev1 event: " + ev)
1263 count += 1
1264 dev[1].dump_monitor()
1265
1266 hwsim_utils.test_connectivity(dev[0], dev[1])
1267
1268 for i in range(2):
1269 try:
1270 hwsim_utils.test_connectivity(dev[i], dev[2], timeout=1)
1271 raise Exception("Data connectivity test passed unexpectedly")
1272 except Exception as e:
1273 if "data delivery failed" not in str(e):
1274 raise
1275
1276 if count == 0:
1277 raise Exception("Neither dev0 nor dev1 reported auth failure")
1278
1279 def test_wpas_mesh_password_mismatch_retry(dev, apdev, params):
1280 """Mesh password mismatch and retry [long]"""
1281 if not params['long']:
1282 raise HwsimSkip("Skip test case with long duration due to --long not specified")
1283 check_mesh_support(dev[0], secure=True)
1284 dev[0].request("SET sae_groups ")
1285 id = add_mesh_secure_net(dev[0])
1286 dev[0].mesh_group_add(id)
1287
1288 dev[1].request("SET sae_groups ")
1289 id = add_mesh_secure_net(dev[1])
1290 dev[1].set_network_quoted(id, "psk", "wrong password")
1291 dev[1].mesh_group_add(id)
1292
1293 check_mesh_joined2(dev)
1294
1295 for i in range(4):
1296 ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
1297 if ev is None:
1298 raise Exception("dev0 did not report auth failure (%d)" % i)
1299 ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
1300 if ev is None:
1301 raise Exception("dev1 did not report auth failure (%d)" % i)
1302
1303 ev = dev[0].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
1304 if ev is None:
1305 raise Exception("dev0 did not report auth blocked")
1306 ev = dev[1].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
1307 if ev is None:
1308 raise Exception("dev1 did not report auth blocked")
1309
1310 def test_mesh_wpa_auth_init_oom(dev, apdev):
1311 """Secure mesh network setup failing due to wpa_init() OOM"""
1312 check_mesh_support(dev[0], secure=True)
1313 dev[0].request("SET sae_groups ")
1314 with alloc_fail(dev[0], 1, "wpa_init"):
1315 id = add_mesh_secure_net(dev[0])
1316 dev[0].mesh_group_add(id)
1317 ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.2)
1318 if ev is not None:
1319 raise Exception("Unexpected mesh group start during OOM")
1320
1321 def test_mesh_wpa_init_fail(dev, apdev):
1322 """Secure mesh network setup local failure"""
1323 check_mesh_support(dev[0], secure=True)
1324 dev[0].request("SET sae_groups ")
1325
1326 with fail_test(dev[0], 1, "os_get_random;=__mesh_rsn_auth_init"):
1327 id = add_mesh_secure_net(dev[0])
1328 dev[0].mesh_group_add(id)
1329 wait_fail_trigger(dev[0], "GET_FAIL")
1330
1331 dev[0].dump_monitor()
1332 with alloc_fail(dev[0], 1, "mesh_rsn_auth_init"):
1333 id = add_mesh_secure_net(dev[0])
1334 dev[0].mesh_group_add(id)
1335 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
1336
1337 dev[0].dump_monitor()
1338 with fail_test(dev[0], 1, "os_get_random;mesh_rsn_init_ampe_sta"):
1339 id = add_mesh_secure_net(dev[0])
1340 dev[0].mesh_group_add(id)
1341 dev[1].request("SET sae_groups ")
1342 id = add_mesh_secure_net(dev[1])
1343 dev[1].mesh_group_add(id)
1344 wait_fail_trigger(dev[0], "GET_FAIL")
1345
1346 def test_wpas_mesh_reconnect(dev, apdev):
1347 """Secure mesh network plink counting during reconnection"""
1348 check_mesh_support(dev[0])
1349 try:
1350 _test_wpas_mesh_reconnect(dev)
1351 finally:
1352 dev[0].request("SET max_peer_links 99")
1353
1354 def _test_wpas_mesh_reconnect(dev):
1355 dev[0].request("SET max_peer_links 2")
1356 dev[0].request("SET sae_groups ")
1357 id = add_mesh_secure_net(dev[0])
1358 dev[0].set_network(id, "beacon_int", "100")
1359 dev[0].mesh_group_add(id)
1360 dev[1].request("SET sae_groups ")
1361 id = add_mesh_secure_net(dev[1])
1362 dev[1].mesh_group_add(id)
1363 check_mesh_joined_connected(dev)
1364
1365 for i in range(3):
1366 # Drop incoming management frames to avoid handling link close
1367 dev[0].request("SET ext_mgmt_frame_handling 1")
1368 dev[1].mesh_group_remove()
1369 check_mesh_group_removed(dev[1])
1370 dev[1].request("FLUSH")
1371 dev[0].request("SET ext_mgmt_frame_handling 0")
1372 id = add_mesh_secure_net(dev[1])
1373 dev[1].mesh_group_add(id)
1374 check_mesh_group_added(dev[1])
1375 check_mesh_peer_connected(dev[1])
1376 dev[0].dump_monitor()
1377 dev[1].dump_monitor()
1378
1379 def test_wpas_mesh_gate_forwarding(dev, apdev, p):
1380 """Mesh forwards traffic to unknown sta to mesh gates"""
1381 addr0 = dev[0].own_addr()
1382 addr1 = dev[1].own_addr()
1383 addr2 = dev[2].own_addr()
1384 external_sta = '02:11:22:33:44:55'
1385
1386 # start 3 node connected mesh
1387 check_mesh_support(dev[0])
1388 for i in range(3):
1389 add_open_mesh_network(dev[i])
1390 check_mesh_group_added(dev[i])
1391 for i in range(3):
1392 check_mesh_peer_connected(dev[i])
1393
1394 hwsim_utils.test_connectivity(dev[0], dev[1])
1395 hwsim_utils.test_connectivity(dev[1], dev[2])
1396 hwsim_utils.test_connectivity(dev[0], dev[2])
1397
1398 # dev0 and dev1 are mesh gates
1399 subprocess.call(['iw', 'dev', dev[0].ifname, 'set', 'mesh_param',
1400 'mesh_gate_announcements=1'])
1401 subprocess.call(['iw', 'dev', dev[1].ifname, 'set', 'mesh_param',
1402 'mesh_gate_announcements=1'])
1403
1404 # wait for gate announcement frames
1405 time.sleep(1)
1406
1407 # data frame from dev2 -> external sta should be sent to both gates
1408 dev[2].request("DATA_TEST_CONFIG 1")
1409 dev[2].request("DATA_TEST_TX {} {} 0".format(external_sta, addr2))
1410 dev[2].request("DATA_TEST_CONFIG 0")
1411
1412 capfile = os.path.join(p['logdir'], "hwsim0.pcapng")
1413 filt = "wlan.sa==%s && wlan_mgt.fixed.mesh_addr5==%s" % (addr2,
1414 external_sta)
1415 for i in range(15):
1416 da = run_tshark(capfile, filt, [ "wlan.da" ])
1417 if addr0 in da and addr1 in da:
1418 logger.debug("Frames seen in tshark iteration %d" % i)
1419 break
1420 time.sleep(0.3)
1421
1422 if addr0 not in da:
1423 raise Exception("Frame to gate %s not observed" % addr0)
1424 if addr1 not in da:
1425 raise Exception("Frame to gate %s not observed" % addr1)
1426
1427 def test_wpas_mesh_pmksa_caching(dev, apdev):
1428 """Secure mesh network and PMKSA caching"""
1429 check_mesh_support(dev[0], secure=True)
1430 dev[0].request("SET sae_groups ")
1431 id = add_mesh_secure_net(dev[0])
1432 dev[0].mesh_group_add(id)
1433
1434 dev[1].request("SET sae_groups ")
1435 id = add_mesh_secure_net(dev[1])
1436 dev[1].mesh_group_add(id)
1437
1438 check_mesh_joined_connected(dev)
1439
1440 addr0 = dev[0].own_addr()
1441 addr1 = dev[1].own_addr()
1442 pmksa0 = dev[0].get_pmksa(addr1)
1443 pmksa1 = dev[1].get_pmksa(addr0)
1444 if pmksa0 is None or pmksa1 is None:
1445 raise Exception("No PMKSA cache entry created")
1446 if pmksa0['pmkid'] != pmksa1['pmkid']:
1447 raise Exception("PMKID mismatch in PMKSA cache entries")
1448
1449 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
1450 raise Exception("Failed to remove peer")
1451 pmksa0b = dev[0].get_pmksa(addr1)
1452 if pmksa0b is None:
1453 raise Exception("PMKSA cache entry not maintained")
1454 time.sleep(0.1)
1455
1456 if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
1457 raise Exception("MESH_PEER_ADD unexpectedly succeeded in no_auto_peer=0 case")
1458
1459 def test_wpas_mesh_pmksa_caching2(dev, apdev):
1460 """Secure mesh network and PMKSA caching with no_auto_peer=1"""
1461 check_mesh_support(dev[0], secure=True)
1462 addr0 = dev[0].own_addr()
1463 addr1 = dev[1].own_addr()
1464 dev[0].request("SET sae_groups ")
1465 id = add_mesh_secure_net(dev[0])
1466 dev[0].set_network(id, "no_auto_peer", "1")
1467 dev[0].mesh_group_add(id)
1468
1469 dev[1].request("SET sae_groups ")
1470 id = add_mesh_secure_net(dev[1])
1471 dev[1].set_network(id, "no_auto_peer", "1")
1472 dev[1].mesh_group_add(id)
1473
1474 check_mesh_joined2(dev)
1475
1476 # Check for peer connected
1477 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1478 if ev is None:
1479 raise Exception("Missing no-initiate message")
1480 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1481 raise Exception("MESH_PEER_ADD failed")
1482 check_mesh_connected2(dev)
1483
1484 pmksa0 = dev[0].get_pmksa(addr1)
1485 pmksa1 = dev[1].get_pmksa(addr0)
1486 if pmksa0 is None or pmksa1 is None:
1487 raise Exception("No PMKSA cache entry created")
1488 if pmksa0['pmkid'] != pmksa1['pmkid']:
1489 raise Exception("PMKID mismatch in PMKSA cache entries")
1490
1491 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
1492 raise Exception("Failed to remove peer")
1493 pmksa0b = dev[0].get_pmksa(addr1)
1494 if pmksa0b is None:
1495 raise Exception("PMKSA cache entry not maintained")
1496
1497 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1498 if ev is None:
1499 raise Exception("Missing no-initiate message (2)")
1500 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1501 raise Exception("MESH_PEER_ADD failed (2)")
1502 check_mesh_connected2(dev)
1503
1504 pmksa0c = dev[0].get_pmksa(addr1)
1505 pmksa1c = dev[1].get_pmksa(addr0)
1506 if pmksa0c is None or pmksa1c is None:
1507 raise Exception("No PMKSA cache entry created (2)")
1508 if pmksa0c['pmkid'] != pmksa1c['pmkid']:
1509 raise Exception("PMKID mismatch in PMKSA cache entries")
1510 if pmksa0['pmkid'] != pmksa0c['pmkid']:
1511 raise Exception("PMKID changed")
1512
1513 hwsim_utils.test_connectivity(dev[0], dev[1])
1514
1515 def test_wpas_mesh_pmksa_caching_no_match(dev, apdev):
1516 """Secure mesh network and PMKSA caching with no PMKID match"""
1517 check_mesh_support(dev[0], secure=True)
1518 addr0 = dev[0].own_addr()
1519 addr1 = dev[1].own_addr()
1520 dev[0].request("SET sae_groups ")
1521 id = add_mesh_secure_net(dev[0])
1522 dev[0].set_network(id, "no_auto_peer", "1")
1523 dev[0].mesh_group_add(id)
1524
1525 dev[1].request("SET sae_groups ")
1526 id = add_mesh_secure_net(dev[1])
1527 dev[1].set_network(id, "no_auto_peer", "1")
1528 dev[1].mesh_group_add(id)
1529
1530 check_mesh_joined2(dev)
1531
1532 # Check for peer connected
1533 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1534 if ev is None:
1535 raise Exception("Missing no-initiate message")
1536 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1537 raise Exception("MESH_PEER_ADD failed")
1538 check_mesh_connected2(dev)
1539
1540 pmksa0 = dev[0].get_pmksa(addr1)
1541 pmksa1 = dev[1].get_pmksa(addr0)
1542 if pmksa0 is None or pmksa1 is None:
1543 raise Exception("No PMKSA cache entry created")
1544 if pmksa0['pmkid'] != pmksa1['pmkid']:
1545 raise Exception("PMKID mismatch in PMKSA cache entries")
1546
1547 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
1548 raise Exception("Failed to remove peer")
1549
1550 if "OK" not in dev[1].request("PMKSA_FLUSH"):
1551 raise Exception("Failed to flush PMKSA cache")
1552
1553 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1554 if ev is None:
1555 raise Exception("Missing no-initiate message (2)")
1556 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1557 raise Exception("MESH_PEER_ADD failed (2)")
1558 check_mesh_connected2(dev)
1559
1560 pmksa0c = dev[0].get_pmksa(addr1)
1561 pmksa1c = dev[1].get_pmksa(addr0)
1562 if pmksa0c is None or pmksa1c is None:
1563 raise Exception("No PMKSA cache entry created (2)")
1564 if pmksa0c['pmkid'] != pmksa1c['pmkid']:
1565 raise Exception("PMKID mismatch in PMKSA cache entries")
1566 if pmksa0['pmkid'] == pmksa0c['pmkid']:
1567 raise Exception("PMKID did not change")
1568
1569 hwsim_utils.test_connectivity(dev[0], dev[1])
1570
1571 def test_mesh_pmksa_caching_oom(dev, apdev):
1572 """Secure mesh network and PMKSA caching failing due to OOM"""
1573 check_mesh_support(dev[0], secure=True)
1574 addr0 = dev[0].own_addr()
1575 addr1 = dev[1].own_addr()
1576 dev[0].request("SET sae_groups ")
1577 id = add_mesh_secure_net(dev[0])
1578 dev[0].set_network(id, "no_auto_peer", "1")
1579 dev[0].mesh_group_add(id)
1580
1581 dev[1].request("SET sae_groups ")
1582 id = add_mesh_secure_net(dev[1])
1583 dev[1].set_network(id, "no_auto_peer", "1")
1584 dev[1].mesh_group_add(id)
1585
1586 check_mesh_joined2(dev)
1587
1588 # Check for peer connected
1589 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1590 if ev is None:
1591 raise Exception("Missing no-initiate message")
1592 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1593 raise Exception("MESH_PEER_ADD failed")
1594 check_mesh_connected2(dev)
1595
1596 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
1597 raise Exception("Failed to remove peer")
1598 pmksa0b = dev[0].get_pmksa(addr1)
1599 if pmksa0b is None:
1600 raise Exception("PMKSA cache entry not maintained")
1601
1602 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
1603 if ev is None:
1604 raise Exception("Missing no-initiate message (2)")
1605
1606 with alloc_fail(dev[0], 1, "wpa_auth_sta_init;mesh_rsn_auth_sae_sta"):
1607 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
1608 raise Exception("MESH_PEER_ADD failed (2)")
1609 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
1610
1611 def test_wpas_mesh_pmksa_caching_ext(dev, apdev):
1612 """Secure mesh network and PMKSA caching and external storage"""
1613 check_mesh_support(dev[0], secure=True)
1614 dev[0].request("SET sae_groups ")
1615 id = add_mesh_secure_net(dev[0])
1616 dev[0].mesh_group_add(id)
1617
1618 dev[1].request("SET sae_groups ")
1619 id = add_mesh_secure_net(dev[1])
1620 dev[1].mesh_group_add(id)
1621
1622 check_mesh_joined_connected(dev)
1623 dev[0].dump_monitor()
1624 dev[1].dump_monitor()
1625
1626 addr0 = dev[0].own_addr()
1627 addr1 = dev[1].own_addr()
1628 pmksa0 = dev[0].get_pmksa(addr1)
1629 pmksa1 = dev[1].get_pmksa(addr0)
1630 if pmksa0 is None or pmksa1 is None:
1631 raise Exception("No PMKSA cache entry created")
1632 if pmksa0['pmkid'] != pmksa1['pmkid']:
1633 raise Exception("PMKID mismatch in PMKSA cache entries")
1634
1635 res1 = dev[1].request("MESH_PMKSA_GET any")
1636 res2 = dev[1].request("MESH_PMKSA_GET " + addr0)
1637 logger.info("MESH_PMKSA_GET: " + res1)
1638 if "UNKNOWN COMMAND" in res1:
1639 raise HwsimSkip("MESH_PMKSA_GET not supported in the build")
1640 logger.info("MESH_PMKSA_GET: " + res2)
1641 if pmksa0['pmkid'] not in res1:
1642 raise Exception("PMKID not included in PMKSA entry")
1643 if res1 != res2:
1644 raise Exception("Unexpected difference in MESH_PMKSA_GET output")
1645
1646 dev[1].mesh_group_remove()
1647 check_mesh_group_removed(dev[1])
1648 dev[0].dump_monitor()
1649 dev[1].dump_monitor()
1650 res = dev[1].get_pmksa(addr0)
1651 if res is not None:
1652 raise Exception("Unexpected PMKSA cache entry remaining")
1653
1654 if "OK" not in dev[1].request("MESH_PMKSA_ADD " + res2):
1655 raise Exception("MESH_PMKSA_ADD failed")
1656 dev[1].mesh_group_add(id)
1657 check_mesh_group_added(dev[1])
1658 check_mesh_peer_connected(dev[1])
1659 dev[0].dump_monitor()
1660 dev[1].dump_monitor()
1661 pmksa1b = dev[1].get_pmksa(addr0)
1662 if pmksa1b is None:
1663 raise Exception("No PMKSA cache entry created after external storage restore")
1664 if pmksa1['pmkid'] != pmksa1b['pmkid']:
1665 raise Exception("PMKID mismatch in PMKSA cache entries after external storage restore")
1666
1667 hwsim_utils.test_connectivity(dev[0], dev[1])
1668
1669 res = dev[1].request("MESH_PMKSA_GET foo")
1670 if "FAIL" not in res:
1671 raise Exception("Invalid MESH_PMKSA_GET accepted")
1672
1673 dev[1].mesh_group_remove()
1674 check_mesh_group_removed(dev[1])
1675 dev[0].dump_monitor()
1676 dev[1].dump_monitor()
1677 dev[1].request("REMOVE_NETWORK all")
1678 res = dev[1].request("MESH_PMKSA_GET any")
1679 if "FAIL" not in res:
1680 raise Exception("MESH_PMKSA_GET accepted when not in mesh")
1681
1682 tests = [ "foo",
1683 "02:02:02:02:02:02",
1684 "02:02:02:02:02:02 q",
1685 "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b",
1686 "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b q",
1687 "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f",
1688 "02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f q" ]
1689 for t in tests:
1690 if "FAIL" not in dev[1].request("MESH_PMKSA_ADD " + t):
1691 raise Exception("Invalid MESH_PMKSA_ADD accepted")
1692
1693 def test_mesh_oom(dev, apdev):
1694 """Mesh network setup failing due to OOM"""
1695 check_mesh_support(dev[0], secure=True)
1696 dev[0].request("SET sae_groups ")
1697
1698 with alloc_fail(dev[0], 1, "mesh_config_create"):
1699 add_open_mesh_network(dev[0])
1700 ev = dev[0].wait_event(["Failed to init mesh"])
1701 if ev is None:
1702 raise Exception("Init failure not reported")
1703
1704 with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
1705 add_open_mesh_network(dev[0], basic_rates="60 120 240")
1706 ev = dev[0].wait_event(["Failed to init mesh"])
1707 if ev is None:
1708 raise Exception("Init failure not reported")
1709
1710 for i in range(1, 66):
1711 dev[0].dump_monitor()
1712 logger.info("Test instance %d" % i)
1713 try:
1714 with alloc_fail(dev[0], i, "wpa_supplicant_mesh_init"):
1715 add_open_mesh_network(dev[0])
1716 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
1717 ev = dev[0].wait_event(["Failed to init mesh",
1718 "MESH-GROUP-STARTED"])
1719 if ev is None:
1720 raise Exception("Init failure not reported")
1721 except Exception as e:
1722 if i < 15:
1723 raise
1724 logger.info("Ignore no-oom for i=%d" % i)
1725
1726 with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
1727 id = add_mesh_secure_net(dev[0])
1728 dev[0].mesh_group_add(id)
1729 ev = dev[0].wait_event(["Failed to init mesh"])
1730 if ev is None:
1731 raise Exception("Init failure not reported")
1732
1733 def test_mesh_add_interface_oom(dev):
1734 """wpa_supplicant mesh with dynamic interface addition failing"""
1735 check_mesh_support(dev[0])
1736 for i in range(1, 3):
1737 mesh = None
1738 try:
1739 with alloc_fail(dev[0], i, "wpas_mesh_add_interface"):
1740 mesh = dev[0].request("MESH_INTERFACE_ADD").strip()
1741 finally:
1742 if mesh and mesh != "FAIL":
1743 dev[0].request("MESH_GROUP_REMOVE " + mesh)
1744
1745 def test_mesh_scan_oom(dev):
1746 """wpa_supplicant mesh scan results and OOM"""
1747 check_mesh_support(dev[0])
1748 add_open_mesh_network(dev[0])
1749 check_mesh_group_added(dev[0])
1750 for i in range(5):
1751 dev[1].scan(freq="2412")
1752 res = dev[1].request("SCAN_RESULTS")
1753 if "[MESH]" in res:
1754 break
1755 for r in res.splitlines():
1756 if "[MESH]" in r:
1757 break
1758 bssid = r.split('\t')[0]
1759
1760 bss = dev[1].get_bss(bssid)
1761 if bss is None:
1762 raise Exception("Could not get BSS entry for mesh")
1763
1764 for i in range(1, 3):
1765 with alloc_fail(dev[1], i, "mesh_attr_text"):
1766 bss = dev[1].get_bss(bssid)
1767 if bss and "mesh_id" in bss:
1768 raise Exception("Unexpected BSS result during OOM")
1769
1770 def test_mesh_drv_fail(dev, apdev):
1771 """Mesh network setup failing due to driver command failure"""
1772 check_mesh_support(dev[0], secure=True)
1773 dev[0].request("SET sae_groups ")
1774
1775 with fail_test(dev[0], 1, "nl80211_join_mesh"):
1776 add_open_mesh_network(dev[0])
1777 ev = dev[0].wait_event(["mesh join error"])
1778 if ev is None:
1779 raise Exception("Join failure not reported")
1780
1781 dev[0].dump_monitor()
1782 with fail_test(dev[0], 1, "wpa_driver_nl80211_if_add"):
1783 if "FAIL" not in dev[0].request("MESH_INTERFACE_ADD").strip():
1784 raise Exception("Interface added unexpectedly")
1785
1786 dev[0].dump_monitor()
1787 with fail_test(dev[0], 1, "wpa_driver_nl80211_init_mesh"):
1788 add_open_mesh_network(dev[0])
1789 ev = dev[0].wait_event(["Could not join mesh"])
1790 if ev is None:
1791 raise Exception("Join failure not reported")
1792
1793 def test_mesh_sae_groups_invalid(dev, apdev):
1794 """Mesh with invalid SAE group configuration"""
1795 check_mesh_support(dev[0], secure=True)
1796
1797 dev[0].request("SET sae_groups 26")
1798 id = add_mesh_secure_net(dev[0])
1799 dev[0].mesh_group_add(id)
1800
1801 dev[1].request("SET sae_groups 123 122 121")
1802 id = add_mesh_secure_net(dev[1])
1803 dev[1].mesh_group_add(id)
1804
1805 check_mesh_joined2(dev)
1806
1807 ev = dev[0].wait_event(["new peer notification"], timeout=10)
1808 if ev is None:
1809 raise Exception("dev[0] did not see peer")
1810 ev = dev[1].wait_event(["new peer notification"], timeout=10)
1811 if ev is None:
1812 raise Exception("dev[1] did not see peer")
1813
1814 ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
1815 if ev is not None:
1816 raise Exception("Unexpected connection(0)")
1817
1818 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
1819 if ev is not None:
1820 raise Exception("Unexpected connection(1)")
1821
1822 # Additional coverage in mesh_rsn_sae_group() with non-zero
1823 # wpa_s->mesh_rsn->sae_group_index.
1824 dev[0].dump_monitor()
1825 dev[1].dump_monitor()
1826 id = add_mesh_secure_net(dev[2])
1827 dev[2].mesh_group_add(id)
1828 check_mesh_group_added(dev[2])
1829 check_mesh_peer_connected(dev[0])
1830 check_mesh_peer_connected(dev[2])
1831 ev = dev[1].wait_event(["new peer notification"], timeout=10)
1832 if ev is None:
1833 raise Exception("dev[1] did not see peer(2)")
1834 dev[0].dump_monitor()
1835 dev[1].dump_monitor()
1836 dev[2].dump_monitor()
1837
1838 dev[0].request("SET sae_groups ")
1839 dev[1].request("SET sae_groups ")
1840
1841 def test_mesh_sae_failure(dev, apdev):
1842 """Mesh and local SAE failures"""
1843 check_mesh_support(dev[0], secure=True)
1844
1845 dev[0].request("SET sae_groups ")
1846 dev[1].request("SET sae_groups ")
1847
1848 funcs = [ (1, "=mesh_rsn_auth_sae_sta", True),
1849 (1, "mesh_rsn_build_sae_commit;mesh_rsn_auth_sae_sta", False),
1850 (1, "auth_sae_init_committed;mesh_rsn_auth_sae_sta", True),
1851 (1, "=mesh_rsn_protect_frame", True),
1852 (2, "=mesh_rsn_protect_frame", True),
1853 (1, "aes_siv_encrypt;mesh_rsn_protect_frame", True),
1854 (1, "=mesh_rsn_process_ampe", True),
1855 (1, "aes_siv_decrypt;mesh_rsn_process_ampe", True) ]
1856 for count, func, success in funcs:
1857 id = add_mesh_secure_net(dev[0])
1858 dev[0].mesh_group_add(id)
1859
1860 with alloc_fail(dev[1], count, func):
1861 id = add_mesh_secure_net(dev[1])
1862 dev[1].mesh_group_add(id)
1863 check_mesh_joined2(dev)
1864 if success:
1865 # retry is expected to work
1866 check_mesh_connected2(dev)
1867 else:
1868 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
1869 dev[0].mesh_group_remove()
1870 dev[1].mesh_group_remove()
1871 check_mesh_group_removed(dev[0])
1872 check_mesh_group_removed(dev[1])
1873
1874 def test_mesh_failure(dev, apdev):
1875 """Mesh and local failures"""
1876 check_mesh_support(dev[0])
1877
1878 funcs = [ (1, "ap_sta_add;mesh_mpm_add_peer", True),
1879 (1, "wpabuf_alloc;mesh_mpm_send_plink_action", True) ]
1880 for count, func, success in funcs:
1881 add_open_mesh_network(dev[0])
1882
1883 with alloc_fail(dev[1], count, func):
1884 add_open_mesh_network(dev[1])
1885 check_mesh_joined2(dev)
1886 if success:
1887 # retry is expected to work
1888 check_mesh_connected2(dev)
1889 else:
1890 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
1891 dev[0].mesh_group_remove()
1892 dev[1].mesh_group_remove()
1893 check_mesh_group_removed(dev[0])
1894 check_mesh_group_removed(dev[1])
1895
1896 funcs = [ (1, "mesh_mpm_init_link", True) ]
1897 for count, func, success in funcs:
1898 add_open_mesh_network(dev[0])
1899
1900 with fail_test(dev[1], count, func):
1901 add_open_mesh_network(dev[1])
1902 check_mesh_joined2(dev)
1903 if success:
1904 # retry is expected to work
1905 check_mesh_connected2(dev)
1906 else:
1907 wait_fail_trigger(dev[1], "GET_FAIL")
1908 dev[0].mesh_group_remove()
1909 dev[1].mesh_group_remove()
1910 check_mesh_group_removed(dev[0])
1911 check_mesh_group_removed(dev[1])
1912
1913 def test_mesh_invalid_frequency(dev, apdev):
1914 """Mesh and invalid frequency configuration"""
1915 check_mesh_support(dev[0])
1916 add_open_mesh_network(dev[0], freq=None)
1917 ev = dev[0].wait_event(["MESH-GROUP-STARTED",
1918 "Could not join mesh"])
1919 if ev is None or "Could not join mesh" not in ev:
1920 raise Exception("Mesh join failure not reported")
1921 dev[0].request("REMOVE_NETWORK all")
1922
1923 add_open_mesh_network(dev[0], freq="2413")
1924 ev = dev[0].wait_event(["MESH-GROUP-STARTED",
1925 "Could not join mesh"])
1926 if ev is None or "Could not join mesh" not in ev:
1927 raise Exception("Mesh join failure not reported")
1928
1929 def test_mesh_default_beacon_int(dev, apdev):
1930 """Mesh and default beacon interval"""
1931 check_mesh_support(dev[0])
1932 try:
1933 dev[0].request("SET beacon_int 200")
1934 add_open_mesh_network(dev[0])
1935 check_mesh_group_added(dev[0])
1936 finally:
1937 dev[0].request("SET beacon_int 0")
1938
1939 def test_mesh_scan_parse_error(dev, apdev):
1940 """Mesh scan element parse error"""
1941 check_mesh_support(dev[0])
1942 params = { "ssid": "open",
1943 "beacon_int": "2000" }
1944 hapd = hostapd.add_ap(apdev[0], params)
1945 bssid = apdev[0]['bssid']
1946 hapd.set('vendor_elements', 'dd0201')
1947 for i in range(10):
1948 dev[0].scan(freq=2412)
1949 if bssid in dev[0].request("SCAN_RESULTS"):
1950 break
1951 # This will fail in IE parsing due to the truncated IE in the Probe
1952 # Response frame.
1953 bss = dev[0].request("BSS " + bssid)
1954
1955 def test_mesh_missing_mic(dev, apdev):
1956 """Secure mesh network and missing MIC"""
1957 check_mesh_support(dev[0], secure=True)
1958
1959 dev[0].request("SET ext_mgmt_frame_handling 1")
1960 dev[0].request("SET sae_groups ")
1961 id = add_mesh_secure_net(dev[0])
1962 dev[0].mesh_group_add(id)
1963
1964 dev[1].request("SET sae_groups ")
1965 id = add_mesh_secure_net(dev[1])
1966 dev[1].mesh_group_add(id)
1967
1968 check_mesh_joined2(dev)
1969
1970 count = 0
1971 remove_mic = True
1972 while True:
1973 count += 1
1974 if count > 15:
1975 raise Exception("Did not see Action frames")
1976 rx_msg = dev[0].mgmt_rx()
1977 if rx_msg is None:
1978 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
1979 if ev:
1980 break
1981 raise Exception("MGMT-RX timeout")
1982 if rx_msg['subtype'] == 13:
1983 payload = rx_msg['payload']
1984 frame = rx_msg['frame']
1985 (categ, action) = struct.unpack('BB', payload[0:2])
1986 if categ == 15 and action == 1 and remove_mic:
1987 # Mesh Peering Open
1988 pos = frame.find(b'\x8c\x10')
1989 if not pos:
1990 raise Exception("Could not find MIC element")
1991 logger.info("Found MIC at %d" % pos)
1992 # Remove MIC
1993 rx_msg['frame'] = frame[0:pos]
1994 remove_mic = False
1995 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
1996 rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
1997 raise Exception("MGMT_RX_PROCESS failed")
1998 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
1999 if ev:
2000 break
2001
2002 def test_mesh_pmkid_mismatch(dev, apdev):
2003 """Secure mesh network and PMKID mismatch"""
2004 check_mesh_support(dev[0], secure=True)
2005 addr0 = dev[0].own_addr()
2006 addr1 = dev[1].own_addr()
2007 dev[0].request("SET sae_groups ")
2008 id = add_mesh_secure_net(dev[0])
2009 dev[0].set_network(id, "no_auto_peer", "1")
2010 dev[0].mesh_group_add(id)
2011
2012 dev[1].request("SET sae_groups ")
2013 id = add_mesh_secure_net(dev[1])
2014 dev[1].set_network(id, "no_auto_peer", "1")
2015 dev[1].mesh_group_add(id)
2016
2017 check_mesh_joined2(dev)
2018
2019 # Check for peer connected
2020 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
2021 if ev is None:
2022 raise Exception("Missing no-initiate message")
2023 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
2024 raise Exception("MESH_PEER_ADD failed")
2025 check_mesh_connected2(dev)
2026
2027 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
2028 raise Exception("Failed to remove peer")
2029
2030 ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
2031 if ev is None:
2032 raise Exception("Missing no-initiate message (2)")
2033 dev[0].dump_monitor()
2034 dev[1].dump_monitor()
2035 dev[0].request("SET ext_mgmt_frame_handling 1")
2036 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
2037 raise Exception("MESH_PEER_ADD failed (2)")
2038
2039 count = 0
2040 break_pmkid = True
2041 while True:
2042 count += 1
2043 if count > 50:
2044 raise Exception("Did not see Action frames")
2045 rx_msg = dev[0].mgmt_rx()
2046 if rx_msg is None:
2047 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
2048 if ev:
2049 break
2050 raise Exception("MGMT-RX timeout")
2051 if rx_msg['subtype'] == 13:
2052 payload = rx_msg['payload']
2053 frame = rx_msg['frame']
2054 (categ, action) = struct.unpack('BB', payload[0:2])
2055 if categ == 15 and action == 1 and break_pmkid:
2056 # Mesh Peering Open
2057 pos = frame.find(b'\x75\x14')
2058 if not pos:
2059 raise Exception("Could not find Mesh Peering Management element")
2060 logger.info("Found Mesh Peering Management element at %d" % pos)
2061 # Break PMKID to hit "Mesh RSN: Invalid PMKID (Chosen PMK did
2062 # not match calculated PMKID)"
2063 rx_msg['frame'] = frame[0:pos + 6] + b'\x00\x00\x00\x00' + frame[pos + 10:]
2064 break_pmkid = False
2065 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
2066 rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
2067 raise Exception("MGMT_RX_PROCESS failed")
2068 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
2069 if ev:
2070 break
2071
2072 def test_mesh_peering_proto(dev, apdev):
2073 """Mesh peering management protocol testing"""
2074 check_mesh_support(dev[0])
2075
2076 dev[0].request("SET ext_mgmt_frame_handling 1")
2077 add_open_mesh_network(dev[0], beacon_int=160)
2078 add_open_mesh_network(dev[1], beacon_int=160)
2079
2080 count = 0
2081 test = 1
2082 while True:
2083 count += 1
2084 if count > 50:
2085 raise Exception("Did not see Action frames")
2086 rx_msg = dev[0].mgmt_rx()
2087 if rx_msg is None:
2088 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
2089 if ev:
2090 break
2091 raise Exception("MGMT-RX timeout")
2092 if rx_msg['subtype'] == 13:
2093 payload = rx_msg['payload']
2094 frame = rx_msg['frame']
2095 (categ, action) = struct.unpack('BB', payload[0:2])
2096 if categ == 15 and action == 1 and test == 1:
2097 # Mesh Peering Open
2098 pos = frame.find(b'\x75\x04')
2099 if not pos:
2100 raise Exception("Could not find Mesh Peering Management element")
2101 logger.info("Found Mesh Peering Management element at %d" % pos)
2102 # Remove the element to hit
2103 # "MPM: No Mesh Peering Management element"
2104 rx_msg['frame'] = frame[0:pos]
2105 test += 1
2106 elif categ == 15 and action == 1 and test == 2:
2107 # Mesh Peering Open
2108 pos = frame.find(b'\x72\x0e')
2109 if not pos:
2110 raise Exception("Could not find Mesh ID element")
2111 logger.info("Found Mesh ID element at %d" % pos)
2112 # Remove the element to hit
2113 # "MPM: No Mesh ID or Mesh Configuration element"
2114 rx_msg['frame'] = frame[0:pos] + frame[pos + 16:]
2115 test += 1
2116 elif categ == 15 and action == 1 and test == 3:
2117 # Mesh Peering Open
2118 pos = frame.find(b'\x72\x0e')
2119 if not pos:
2120 raise Exception("Could not find Mesh ID element")
2121 logger.info("Found Mesh ID element at %d" % pos)
2122 # Replace Mesh ID to hit "MPM: Mesh ID or Mesh Configuration
2123 # element do not match local MBSS"
2124 rx_msg['frame'] = frame[0:pos] + b'\x72\x0etest-test-test' + frame[pos + 16:]
2125 test += 1
2126 elif categ == 15 and action == 1 and test == 4:
2127 # Mesh Peering Open
2128 # Remove IEs to hit
2129 # "MPM: Ignore too short action frame 1 ie_len 0"
2130 rx_msg['frame'] = frame[0:26]
2131 test += 1
2132 elif categ == 15 and action == 1 and test == 5:
2133 # Mesh Peering Open
2134 # Truncate IEs to hit
2135 # "MPM: Failed to parse PLINK IEs"
2136 rx_msg['frame'] = frame[0:30]
2137 test += 1
2138 elif categ == 15 and action == 1 and test == 6:
2139 # Mesh Peering Open
2140 pos = frame.find(b'\x75\x04')
2141 if not pos:
2142 raise Exception("Could not find Mesh Peering Management element")
2143 logger.info("Found Mesh Peering Management element at %d" % pos)
2144 # Truncate the element to hit
2145 # "MPM: Invalid peer mgmt ie" and
2146 # "MPM: Mesh parsing rejected frame"
2147 rx_msg['frame'] = frame[0:pos] + b'\x75\x00\x00\x00' + frame[pos + 6:]
2148 test += 1
2149 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
2150 rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
2151 raise Exception("MGMT_RX_PROCESS failed")
2152 ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
2153 if ev:
2154 break
2155
2156 if test != 7:
2157 raise Exception("Not all test frames completed")
2158
2159 def test_mesh_mpm_init_proto(dev, apdev):
2160 """Mesh peering management protocol testing for peer addition"""
2161 check_mesh_support(dev[0])
2162 add_open_mesh_network(dev[0])
2163 check_mesh_group_added(dev[0])
2164 dev[0].dump_monitor()
2165
2166 dev[0].request("SET ext_mgmt_frame_handling 1")
2167
2168 addr = "020000000100"
2169 hdr = "d000ac00020000000000" + addr + addr + "1000"
2170 fixed = "0f010000"
2171 supp_rates = "010802040b168c129824"
2172 ext_supp_rates = "3204b048606c"
2173 mesh_id = "720e777061732d6d6573682d6f70656e"
2174 mesh_conf = "710701010001000009"
2175 mpm = "75040000079d"
2176 ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
2177 ht_oper = "3d160b000000000000000000000000000000000000000000"
2178
2179 dev[0].request("NOTE no supported rates")
2180 frame = hdr + fixed + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2181 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2182 raise Exception("MGMT_RX_PROCESS failed")
2183
2184 dev[0].request("NOTE Invalid supported rates element length 33+0")
2185 long_supp_rates = "012100112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00"
2186 frame = hdr + fixed + long_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2187 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2188 raise Exception("MGMT_RX_PROCESS failed")
2189
2190 dev[0].request("NOTE Too short mesh config")
2191 short_mesh_conf = "710401010001"
2192 frame = hdr + fixed + supp_rates + mesh_id + short_mesh_conf + mpm + ht_capab + ht_oper
2193 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2194 raise Exception("MGMT_RX_PROCESS failed")
2195
2196 dev[0].request("NOTE Add STA failure")
2197 frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2198 with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add"):
2199 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2200 raise Exception("MGMT_RX_PROCESS failed")
2201
2202 dev[0].request("NOTE Send Action failure")
2203 with fail_test(dev[0], 1, "driver_nl80211_send_action"):
2204 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2205 raise Exception("MGMT_RX_PROCESS failed")
2206
2207 dev[0].request("NOTE Set STA failure")
2208 addr = "020000000101"
2209 hdr = "d000ac00020000000000" + addr + addr + "1000"
2210 frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2211 with fail_test(dev[0], 2, "wpa_driver_nl80211_sta_add"):
2212 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2213 raise Exception("MGMT_RX_PROCESS failed")
2214
2215 dev[0].request("NOTE ap_sta_add OOM")
2216 addr = "020000000102"
2217 hdr = "d000ac00020000000000" + addr + addr + "1000"
2218 frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2219 with alloc_fail(dev[0], 1, "ap_sta_add"):
2220 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2221 raise Exception("MGMT_RX_PROCESS failed")
2222
2223 dev[0].request("NOTE hostapd_get_aid() failure")
2224 addr = "020000000103"
2225 hdr = "d000ac00020000000000" + addr + addr + "1000"
2226 frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2227 with fail_test(dev[0], 1, "hostapd_get_aid"):
2228 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2229 raise Exception("MGMT_RX_PROCESS failed")
2230
2231 if "OK" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:00"):
2232 raise Exception("Failed to remove peer")
2233 if "FAIL" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
2234 raise Exception("Unexpected MESH_PEER_REMOVE success")
2235 if "FAIL" not in dev[1].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
2236 raise Exception("Unexpected MESH_PEER_REMOVE success(2)")
2237 if "FAIL" not in dev[1].request("MESH_PEER_ADD 02:00:00:00:01:02"):
2238 raise Exception("Unexpected MESH_PEER_ADD success")
2239
2240 def test_mesh_holding(dev, apdev):
2241 """Mesh MPM FSM and HOLDING state event OPN_ACPT"""
2242 check_mesh_support(dev[0])
2243 add_open_mesh_network(dev[0])
2244 add_open_mesh_network(dev[1])
2245 check_mesh_joined_connected(dev)
2246
2247 addr0 = dev[0].own_addr()
2248 addr1 = dev[1].own_addr()
2249
2250 dev[0].request("SET ext_mgmt_frame_handling 1")
2251 if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
2252 raise Exception("Failed to remove peer")
2253
2254 rx_msg = dev[0].mgmt_rx()
2255 if rx_msg is None:
2256 raise Exception("MGMT-RX timeout")
2257 if rx_msg['subtype'] != 13:
2258 raise Exception("Unexpected management frame")
2259 payload = rx_msg['payload']
2260 (categ, action) = struct.unpack('BB', payload[0:2])
2261 if categ != 0x0f or action != 0x03:
2262 raise Exception("Did not see Mesh Peering Close")
2263
2264 peer_lid = binascii.hexlify(payload[-6:-4]).decode()
2265 my_lid = binascii.hexlify(payload[-4:-2]).decode()
2266
2267 # Drop Mesh Peering Close and instead, process an unexpected Mesh Peering
2268 # Open to trigger transmission of another Mesh Peering Close in the HOLDING
2269 # state based on an OPN_ACPT event.
2270
2271 dst = addr0.replace(':', '')
2272 src = addr1.replace(':', '')
2273 hdr = "d000ac00" + dst + src + src + "1000"
2274 fixed = "0f010000"
2275 supp_rates = "010802040b168c129824"
2276 ext_supp_rates = "3204b048606c"
2277 mesh_id = "720e777061732d6d6573682d6f70656e"
2278 mesh_conf = "710701010001000009"
2279 mpm = "7504" + my_lid + peer_lid
2280 ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
2281 ht_oper = "3d160b000000000000000000000000000000000000000000"
2282
2283 frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
2284 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
2285 raise Exception("MGMT_RX_PROCESS failed")
2286 time.sleep(0.1)
2287
2288 def test_mesh_cnf_rcvd_event_cls_acpt(dev, apdev):
2289 """Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD"""
2290 check_mesh_support(dev[0])
2291 add_open_mesh_network(dev[0])
2292 check_mesh_group_added(dev[0])
2293 dev[0].dump_monitor()
2294
2295 dev[0].request("SET ext_mgmt_frame_handling 1")
2296 add_open_mesh_network(dev[1])
2297 check_mesh_group_added(dev[1])
2298
2299 addr0 = dev[0].own_addr()
2300 addr1 = dev[1].own_addr()
2301
2302 rx_msg = dev[0].mgmt_rx()
2303 # Drop Mesh Peering Open
2304
2305 rx_msg = dev[0].mgmt_rx()
2306 # Allow Mesh Peering Confirm to go through
2307 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
2308 rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
2309 raise Exception("MGMT_RX_PROCESS failed")
2310
2311 payload = rx_msg['payload']
2312 peer_lid = binascii.hexlify(payload[51:53]).decode()
2313 my_lid = binascii.hexlify(payload[53:55]).decode()
2314
2315 dst = addr0.replace(':', '')
2316 src = addr1.replace(':', '')
2317 hdr = "d000ac00" + dst + src + src + "1000"
2318 fixed = "0f03"
2319 mesh_id = "720e777061732d6d6573682d6f70656e"
2320 mpm = "75080000" + peer_lid + my_lid + "3700"
2321 frame = hdr + fixed + mesh_id + mpm
2322
2323 # Inject Mesh Peering Close to hit "state CNF_RCVD event CLS_ACPT" to
2324 # HOLDING transition.
2325 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
2326 raise Exception("MGMT_RX_PROCESS failed")
2327
2328 def test_mesh_opn_snt_event_cls_acpt(dev, apdev):
2329 """Mesh peering management protocol testing - CLS_ACPT event in OPN_SNT"""
2330 check_mesh_support(dev[0])
2331 add_open_mesh_network(dev[0])
2332 check_mesh_group_added(dev[0])
2333 dev[0].dump_monitor()
2334
2335 dev[0].request("SET ext_mgmt_frame_handling 1")
2336 add_open_mesh_network(dev[1])
2337 check_mesh_group_added(dev[1])
2338
2339 addr0 = dev[0].own_addr()
2340 addr1 = dev[1].own_addr()
2341
2342 rx_msg = dev[0].mgmt_rx()
2343 # Drop Mesh Peering Open
2344
2345 rx_msg = dev[0].mgmt_rx()
2346 # Drop Mesh Peering Confirm
2347
2348 payload = rx_msg['payload']
2349 peer_lid = "0000"
2350 my_lid = binascii.hexlify(payload[53:55]).decode()
2351
2352 dst = addr0.replace(':', '')
2353 src = addr1.replace(':', '')
2354 hdr = "d000ac00" + dst + src + src + "1000"
2355 fixed = "0f03"
2356 mesh_id = "720e777061732d6d6573682d6f70656e"
2357 mpm = "75080000" + peer_lid + my_lid + "3700"
2358 frame = hdr + fixed + mesh_id + mpm
2359
2360 # Inject Mesh Peering Close to hit "state OPN_SNTevent CLS_ACPT" to
2361 # HOLDING transition.
2362 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
2363 raise Exception("MGMT_RX_PROCESS failed")
2364
2365 def test_mesh_select_network(dev):
2366 """Mesh network and SELECT_NETWORK"""
2367 check_mesh_support(dev[0])
2368 id0 = add_open_mesh_network(dev[0], start=False)
2369 id1 = add_open_mesh_network(dev[1], start=False)
2370 dev[0].select_network(id0)
2371 dev[1].select_network(id1)
2372 check_mesh_joined_connected(dev, connectivity=True)
2373
2374 def test_mesh_forwarding(dev):
2375 """Mesh with two stations that can't reach each other directly"""
2376 try:
2377 set_group_map(dev[0], 1)
2378 set_group_map(dev[1], 3)
2379 set_group_map(dev[2], 2)
2380 check_mesh_support(dev[0])
2381 for i in range(3):
2382 add_open_mesh_network(dev[i])
2383 check_mesh_group_added(dev[i])
2384 for i in range(3):
2385 check_mesh_peer_connected(dev[i])
2386
2387 hwsim_utils.test_connectivity(dev[0], dev[1])
2388 hwsim_utils.test_connectivity(dev[1], dev[2])
2389 hwsim_utils.test_connectivity(dev[0], dev[2])
2390 finally:
2391 # reset groups
2392 set_group_map(dev[0], 1)
2393 set_group_map(dev[1], 1)
2394 set_group_map(dev[2], 1)
2395
2396 def test_mesh_forwarding_secure(dev):
2397 """Mesh with two stations that can't reach each other directly (RSN)"""
2398 check_mesh_support(dev[0], secure=True)
2399 try:
2400 set_group_map(dev[0], 1)
2401 set_group_map(dev[1], 3)
2402 set_group_map(dev[2], 2)
2403 for i in range(3):
2404 dev[i].request("SET sae_groups ")
2405 id = add_mesh_secure_net(dev[i])
2406 dev[i].mesh_group_add(id)
2407 check_mesh_group_added(dev[i])
2408 for i in range(3):
2409 check_mesh_peer_connected(dev[i])
2410
2411 hwsim_utils.test_connectivity(dev[0], dev[1])
2412 hwsim_utils.test_connectivity(dev[1], dev[2])
2413 hwsim_utils.test_connectivity(dev[0], dev[2])
2414 finally:
2415 # reset groups
2416 set_group_map(dev[0], 1)
2417 set_group_map(dev[1], 1)
2418 set_group_map(dev[2], 1)
2419
2420 def test_mesh_sae_anti_clogging(dev, apdev):
2421 """Mesh using SAE and anti-clogging"""
2422 try:
2423 run_mesh_sae_anti_clogging(dev, apdev)
2424 finally:
2425 stop_monitor(apdev[1]["ifname"])
2426
2427 def run_mesh_sae_anti_clogging(dev, apdev):
2428 check_mesh_support(dev[0], secure=True)
2429 check_mesh_support(dev[1], secure=True)
2430 check_mesh_support(dev[2], secure=True)
2431
2432 sock = start_monitor(apdev[1]["ifname"])
2433 radiotap = radiotap_build()
2434
2435 dev[0].request("SET sae_groups 21")
2436 id = add_mesh_secure_net(dev[0])
2437 dev[0].mesh_group_add(id)
2438 check_mesh_group_added(dev[0])
2439
2440 # This flood of SAE authentication frames is from not yet known mesh STAs,
2441 # so the messages get dropped.
2442 addr0 = binascii.unhexlify(dev[0].own_addr().replace(':', ''))
2443 for i in range(16):
2444 addr = binascii.unhexlify("f2%010x" % i)
2445 frame = build_sae_commit(addr0, addr)
2446 sock.send(radiotap + frame)
2447
2448 dev[1].request("SET sae_groups 21")
2449 id = add_mesh_secure_net(dev[1])
2450 dev[1].mesh_group_add(id)
2451 check_mesh_group_added(dev[1])
2452 check_mesh_connected2(dev)
2453
2454 # Inject Beacon frames to make the sources of the second flood known to the
2455 # target.
2456 bcn1 = binascii.unhexlify("80000000" + "ffffffffffff")
2457 bcn2 = binascii.unhexlify("0000dd20c44015840500e80310000000010882848b968c1298240301010504000200003204b048606c30140100000fac040100000fac040100000fac0800002d1afe131bffff0000000000000000000001000000000000000000003d16010000000000ffff0000000000000000000000000000720d777061732d6d6573682d736563710701010001010009")
2458 for i in range(16):
2459 addr = binascii.unhexlify("f4%010x" % i)
2460 frame = bcn1 + addr + addr + bcn2
2461 sock.send(radiotap + frame)
2462
2463 # This flood of SAE authentication frames is from known mesh STAs, so the
2464 # target will need to process these.
2465 for i in range(16):
2466 addr = binascii.unhexlify("f4%010x" % i)
2467 frame = build_sae_commit(addr0, addr)
2468 sock.send(radiotap + frame)
2469
2470 dev[2].request("SET sae_groups 21")
2471 id = add_mesh_secure_net(dev[2])
2472 dev[2].mesh_group_add(id)
2473 check_mesh_group_added(dev[2])
2474 check_mesh_peer_connected(dev[2])
2475 check_mesh_peer_connected(dev[0])