2017-03-26 03:16:57 +02:00
|
|
|
#! /usr/bin/python3
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
import sys, os
|
|
|
|
|
|
|
|
sys.path.append('../util')
|
|
|
|
import iwd
|
|
|
|
from iwd import IWD
|
|
|
|
from iwd import PSKAgent
|
|
|
|
from iwd import NetworkType
|
|
|
|
from hwsim import Hwsim
|
2020-09-11 01:12:22 +02:00
|
|
|
from hostapd import HostapdCLI
|
2017-05-22 10:49:47 +02:00
|
|
|
import testutil
|
2017-03-26 03:16:57 +02:00
|
|
|
|
|
|
|
class Test(unittest.TestCase):
|
2021-08-12 22:22:04 +02:00
|
|
|
def validate_connection(self, wd, over_ds=False):
|
2018-12-14 20:15:26 +01:00
|
|
|
device = wd.list_devices(1)[0]
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
# Scanning is unavoidable in this case since several hostapd
|
|
|
|
# configurations are tested and changed mid-test
|
2017-08-14 14:31:22 +02:00
|
|
|
device.scan()
|
|
|
|
|
|
|
|
condition = 'obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
2018-12-14 20:15:28 +01:00
|
|
|
ordered_network = device.get_ordered_network('TestFT')
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
2017-03-26 03:16:57 +02:00
|
|
|
|
2017-08-14 14:31:22 +02:00
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
|
|
|
self.assertFalse(self.bss_hostapd[0].list_sta())
|
|
|
|
self.assertFalse(self.bss_hostapd[1].list_sta())
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
device.connect_bssid(self.bss_hostapd[0].bssid)
|
2017-08-14 14:31:22 +02:00
|
|
|
|
2020-09-11 01:12:47 +02:00
|
|
|
condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
self.assertTrue(self.bss_hostapd[0].list_sta())
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
# list_sta actually reports any authenticated stations. Due to the
|
|
|
|
# nature of FT-over-DS IWD should authenticate to all stations with
|
|
|
|
# the same mobility domain. This means both APs should show our station.
|
|
|
|
if over_ds:
|
|
|
|
self.assertTrue(self.bss_hostapd[1].list_sta())
|
|
|
|
else:
|
|
|
|
self.assertFalse(self.bss_hostapd[1].list_sta())
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
testutil.test_iface_operstate(device.name)
|
|
|
|
testutil.test_ifaces_connected(self.bss_hostapd[0].ifname, device.name)
|
|
|
|
self.assertRaises(Exception, testutil.test_ifaces_connected,
|
2021-08-12 22:22:04 +02:00
|
|
|
(self.bss_hostapd[1].ifname, device.name, True, True))
|
2017-08-14 14:31:22 +02:00
|
|
|
|
2021-09-29 00:36:06 +02:00
|
|
|
if over_ds:
|
|
|
|
self.rule0.enabled = True
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
device.roam(self.bss_hostapd[1].bssid)
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.roaming'
|
2020-09-11 01:12:37 +02:00
|
|
|
wd.wait_for_object_condition(device, condition)
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
# Check that iwd is on BSS 1 once out of roaming state and doesn't
|
|
|
|
# go through 'disconnected', 'autoconnect', 'connecting' in between
|
2021-02-05 20:06:37 +01:00
|
|
|
from_condition = 'obj.state == DeviceState.roaming'
|
|
|
|
to_condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_change(device, from_condition, to_condition)
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
self.assertTrue(self.bss_hostapd[1].list_sta())
|
|
|
|
|
|
|
|
testutil.test_iface_operstate(device.name)
|
|
|
|
testutil.test_ifaces_connected(self.bss_hostapd[1].ifname, device.name)
|
2017-05-22 10:49:47 +02:00
|
|
|
self.assertRaises(Exception, testutil.test_ifaces_connected,
|
2021-08-12 22:22:04 +02:00
|
|
|
(self.bss_hostapd[0].ifname, device.name, True, True))
|
2017-05-22 10:49:47 +02:00
|
|
|
|
2021-09-29 00:36:09 +02:00
|
|
|
self.bss_hostapd[1].rekey(device.address)
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
device.roam(self.bss_hostapd[0].bssid)
|
2021-04-30 20:20:36 +02:00
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.roaming'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
# Check that iwd is on BSS 0 once out of roaming state and doesn't
|
|
|
|
# go through 'disconnected', 'autoconnect', 'connecting' in between
|
|
|
|
from_condition = 'obj.state == DeviceState.roaming'
|
|
|
|
to_condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_change(device, from_condition, to_condition)
|
|
|
|
|
|
|
|
self.assertTrue(self.bss_hostapd[0].list_sta())
|
|
|
|
|
|
|
|
testutil.test_iface_operstate(device.name)
|
|
|
|
testutil.test_ifaces_connected(self.bss_hostapd[0].ifname, device.name)
|
|
|
|
self.assertRaises(Exception, testutil.test_ifaces_connected,
|
2021-08-12 22:22:04 +02:00
|
|
|
(self.bss_hostapd[1].ifname, device.name, True, True))
|
|
|
|
|
2021-11-23 19:17:32 +01:00
|
|
|
self.bss_hostapd[0].deauthenticate(device.address)
|
|
|
|
condition = 'obj.state == DeviceState.disconnected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
def test_ft_psk(self):
|
|
|
|
wd = IWD(True)
|
|
|
|
|
|
|
|
self.bss_hostapd[0].set_value('wpa_key_mgmt', 'FT-PSK')
|
|
|
|
self.bss_hostapd[0].set_value('ft_over_ds', '0')
|
2021-09-28 17:46:56 +02:00
|
|
|
self.bss_hostapd[0].set_value('ocv', '1')
|
2021-08-12 22:22:04 +02:00
|
|
|
self.bss_hostapd[0].reload()
|
|
|
|
self.bss_hostapd[0].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.bss_hostapd[1].set_value('wpa_key_mgmt', 'FT-PSK')
|
|
|
|
self.bss_hostapd[1].set_value('ft_over_ds', '0')
|
2021-09-28 17:46:56 +02:00
|
|
|
self.bss_hostapd[0].set_value('ocv', '1')
|
2021-08-12 22:22:04 +02:00
|
|
|
self.bss_hostapd[1].reload()
|
|
|
|
self.bss_hostapd[1].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.validate_connection(wd)
|
|
|
|
|
|
|
|
def test_ft_psk_over_ds(self):
|
|
|
|
wd = IWD(True)
|
|
|
|
|
|
|
|
self.bss_hostapd[0].set_value('wpa_key_mgmt', 'FT-PSK')
|
|
|
|
self.bss_hostapd[0].set_value('ft_over_ds', '1')
|
2021-09-28 17:46:56 +02:00
|
|
|
self.bss_hostapd[0].set_value('ocv', '1')
|
2021-08-12 22:22:04 +02:00
|
|
|
self.bss_hostapd[0].reload()
|
|
|
|
self.bss_hostapd[0].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.bss_hostapd[1].set_value('wpa_key_mgmt', 'FT-PSK')
|
|
|
|
self.bss_hostapd[1].set_value('ft_over_ds', '1')
|
2021-09-28 17:46:56 +02:00
|
|
|
self.bss_hostapd[1].set_value('ocv', '1')
|
2021-08-12 22:22:04 +02:00
|
|
|
self.bss_hostapd[1].reload()
|
|
|
|
self.bss_hostapd[1].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.validate_connection(wd, over_ds=True)
|
|
|
|
|
|
|
|
def test_reassociate_psk(self):
|
|
|
|
wd = IWD(True)
|
|
|
|
|
|
|
|
self.bss_hostapd[0].set_value('wpa_key_mgmt', 'WPA-PSK')
|
|
|
|
self.bss_hostapd[0].set_value('ft_over_ds', '0')
|
|
|
|
self.bss_hostapd[0].reload()
|
|
|
|
self.bss_hostapd[0].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.bss_hostapd[1].set_value('wpa_key_mgmt', 'WPA-PSK')
|
|
|
|
self.bss_hostapd[1].set_value('ft_over_ds', '0')
|
|
|
|
self.bss_hostapd[1].reload()
|
|
|
|
self.bss_hostapd[1].wait_for_event("AP-ENABLED")
|
|
|
|
|
|
|
|
self.validate_connection(wd)
|
2021-04-30 20:20:36 +02:00
|
|
|
|
2017-08-14 14:31:22 +02:00
|
|
|
def tearDown(self):
|
2021-11-11 03:12:02 +01:00
|
|
|
os.system('ip link set "' + self.bss_hostapd[0].ifname + '" down')
|
|
|
|
os.system('ip link set "' + self.bss_hostapd[1].ifname + '" down')
|
|
|
|
os.system('ip link set "' + self.bss_hostapd[0].ifname + '" up')
|
|
|
|
os.system('ip link set "' + self.bss_hostapd[1].ifname + '" up')
|
2017-03-26 03:16:57 +02:00
|
|
|
|
2021-09-29 00:36:06 +02:00
|
|
|
self.rule0.enabled = False
|
|
|
|
|
2017-03-26 03:16:57 +02:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2021-09-29 00:36:06 +02:00
|
|
|
hwsim = Hwsim()
|
|
|
|
|
2021-08-12 22:22:04 +02:00
|
|
|
IWD.copy_to_storage('TestFT.psk')
|
2017-08-14 14:31:22 +02:00
|
|
|
|
2019-06-11 18:25:54 +02:00
|
|
|
cls.bss_hostapd = [ HostapdCLI(config='ft-psk-ccmp-1.conf'),
|
|
|
|
HostapdCLI(config='ft-psk-ccmp-2.conf') ]
|
2021-09-29 00:36:06 +02:00
|
|
|
rad2 = hwsim.get_radio('rad2')
|
|
|
|
|
|
|
|
cls.rule0 = hwsim.rules.create()
|
|
|
|
cls.rule0.source = rad2.addresses[0]
|
|
|
|
cls.rule0.bidirectional = True
|
|
|
|
cls.rule0.signal = -2000
|
|
|
|
cls.rule0.prefix = 'b0'
|
|
|
|
cls.rule0.drop = True
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
# Set interface addresses to those expected by hostapd config files
|
2021-11-11 03:12:02 +01:00
|
|
|
os.system('ip link set dev "' + cls.bss_hostapd[0].ifname + '" down')
|
|
|
|
os.system('ip link set dev "' + cls.bss_hostapd[0].ifname + '" addr 12:00:00:00:00:01 up')
|
|
|
|
os.system('ip link set dev "' + cls.bss_hostapd[1].ifname + '" down')
|
|
|
|
os.system('ip link set dev "' + cls.bss_hostapd[1].ifname + '" addr 12:00:00:00:00:02 up')
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
cls.bss_hostapd[0].reload()
|
2021-05-21 19:33:23 +02:00
|
|
|
cls.bss_hostapd[0].wait_for_event("AP-ENABLED")
|
2017-08-14 14:31:22 +02:00
|
|
|
cls.bss_hostapd[1].reload()
|
2021-05-21 19:33:23 +02:00
|
|
|
cls.bss_hostapd[1].wait_for_event("AP-ENABLED")
|
2017-08-14 14:31:22 +02:00
|
|
|
|
|
|
|
# Fill in the neighbor AP tables in both BSSes. By default each
|
|
|
|
# instance knows only about current BSS, even inside one hostapd
|
|
|
|
# process.
|
|
|
|
# FT still works without the neighbor AP table but neighbor reports
|
|
|
|
# have to be disabled in the .conf files
|
|
|
|
cls.bss_hostapd[0].set_neighbor('12:00:00:00:00:02', 'TestFT',
|
|
|
|
'1200000000028f0000005102060603000000')
|
|
|
|
cls.bss_hostapd[1].set_neighbor('12:00:00:00:00:01', 'TestFT',
|
|
|
|
'1200000000018f0000005101060603000000')
|
2017-03-26 03:16:57 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
IWD.clear_storage()
|
2021-02-25 23:00:54 +01:00
|
|
|
cls.bss_hostapd = None
|
2022-01-19 23:26:52 +01:00
|
|
|
cls.rule0.enabled = False
|
|
|
|
cls.rule0.remove()
|
2017-03-26 03:16:57 +02:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(exit=True)
|