mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-22 06:19:34 +01:00
auto-t: Add deauth during the 4-way handshake test
This test will fail with current upstream as IWD hangs when the deauthenticate event arrives. Once this is fixed the test should pass.
This commit is contained in:
parent
a972b77dc2
commit
b7da34a5d2
112
autotests/testPSK-roam/disconnect_during_handshake_test.py
Normal file
112
autotests/testPSK-roam/disconnect_during_handshake_test.py
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
#! /usr/bin/python3
|
||||||
|
|
||||||
|
import unittest
|
||||||
|
import sys, os
|
||||||
|
|
||||||
|
sys.path.append('../util')
|
||||||
|
import iwd
|
||||||
|
from iwd import IWD
|
||||||
|
from iwd import PSKAgent
|
||||||
|
from iwd import NetworkType
|
||||||
|
from hwsim import Hwsim
|
||||||
|
from hostapd import HostapdCLI
|
||||||
|
import testutil
|
||||||
|
|
||||||
|
class Test(unittest.TestCase):
|
||||||
|
def validate_connection(self, wd):
|
||||||
|
device = wd.list_devices(1)[0]
|
||||||
|
|
||||||
|
ordered_network = device.get_ordered_network('TestFT', full_scan=True)
|
||||||
|
|
||||||
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
||||||
|
|
||||||
|
condition = 'not obj.connected'
|
||||||
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||||
|
|
||||||
|
self.assertFalse(self.bss_hostapd[0].list_sta())
|
||||||
|
self.assertFalse(self.bss_hostapd[1].list_sta())
|
||||||
|
|
||||||
|
device.connect_bssid(self.bss_hostapd[0].bssid)
|
||||||
|
|
||||||
|
condition = 'obj.state == DeviceState.connected'
|
||||||
|
wd.wait_for_object_condition(device, condition)
|
||||||
|
|
||||||
|
self.bss_hostapd[0].wait_for_event('AP-STA-CONNECTED %s' % device.address)
|
||||||
|
|
||||||
|
testutil.test_iface_operstate(device.name)
|
||||||
|
testutil.test_ifaces_connected(self.bss_hostapd[0].ifname, device.name)
|
||||||
|
self.assertRaises(Exception, testutil.test_ifaces_connected,
|
||||||
|
(self.bss_hostapd[1].ifname, device.name, True, True))
|
||||||
|
|
||||||
|
self.rule0.enabled = True
|
||||||
|
|
||||||
|
device.roam(self.bss_hostapd[1].bssid)
|
||||||
|
|
||||||
|
device.clear_events()
|
||||||
|
device.wait_for_event("handshake-started")
|
||||||
|
self.bss_hostapd[1].deauthenticate(device.address, reason=15, test=1)
|
||||||
|
|
||||||
|
# Check that iwd is on BSS 1 once out of roaming state and doesn't
|
||||||
|
# go through 'disconnected', 'autoconnect', 'connecting' in between
|
||||||
|
from_condition = 'obj.state == DeviceState.roaming'
|
||||||
|
to_condition = 'obj.state == DeviceState.disconnected'
|
||||||
|
wd.wait_for_object_change(device, from_condition, to_condition)
|
||||||
|
|
||||||
|
def test_disconnect_during_handshake(self):
|
||||||
|
self.bss_hostapd[0].set_value('wpa_key_mgmt', 'WPA-PSK')
|
||||||
|
self.bss_hostapd[0].reload()
|
||||||
|
self.bss_hostapd[0].wait_for_event("AP-ENABLED")
|
||||||
|
|
||||||
|
self.bss_hostapd[1].set_value('wpa_key_mgmt', 'WPA-PSK')
|
||||||
|
self.bss_hostapd[1].reload()
|
||||||
|
self.bss_hostapd[1].wait_for_event("AP-ENABLED")
|
||||||
|
|
||||||
|
self.validate_connection(self.wd)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
os.system('ip link set "' + self.bss_hostapd[0].ifname + '" down')
|
||||||
|
os.system('ip link set "' + self.bss_hostapd[1].ifname + '" down')
|
||||||
|
os.system('ip link set "' + self.bss_hostapd[0].ifname + '" up')
|
||||||
|
os.system('ip link set "' + self.bss_hostapd[1].ifname + '" up')
|
||||||
|
|
||||||
|
for hapd in self.bss_hostapd:
|
||||||
|
hapd.default()
|
||||||
|
|
||||||
|
self.wd.stop()
|
||||||
|
self.wd = None
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.wd = IWD(True)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls):
|
||||||
|
hwsim = Hwsim()
|
||||||
|
|
||||||
|
IWD.copy_to_storage('TestFT.psk')
|
||||||
|
|
||||||
|
cls.bss_hostapd = [ HostapdCLI(config='ft-psk-ccmp-1.conf'),
|
||||||
|
HostapdCLI(config='ft-psk-ccmp-2.conf') ]
|
||||||
|
|
||||||
|
unused = HostapdCLI(config='ft-psk-ccmp-3.conf')
|
||||||
|
unused.disable()
|
||||||
|
|
||||||
|
cls.bss_hostapd[0].set_address('12:00:00:00:00:01')
|
||||||
|
cls.bss_hostapd[1].set_address('12:00:00:00:00:02')
|
||||||
|
|
||||||
|
rad1 = hwsim.get_radio('rad1')
|
||||||
|
|
||||||
|
cls.rule0 = hwsim.rules.create()
|
||||||
|
cls.rule0.destination = rad1.addresses[0]
|
||||||
|
cls.rule0.prefix = '08'
|
||||||
|
cls.rule0.drop = True
|
||||||
|
|
||||||
|
HostapdCLI.group_neighbors(*cls.bss_hostapd)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls):
|
||||||
|
IWD.clear_storage()
|
||||||
|
cls.bss_hostapd = None
|
||||||
|
cls.rule0.remove()
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
unittest.main(exit=True)
|
@ -13,7 +13,7 @@ wpa=2
|
|||||||
wpa_key_mgmt=FT-PSK
|
wpa_key_mgmt=FT-PSK
|
||||||
wpa_pairwise=CCMP
|
wpa_pairwise=CCMP
|
||||||
wpa_passphrase=EasilyGuessedPassword
|
wpa_passphrase=EasilyGuessedPassword
|
||||||
ieee80211w=1
|
ieee80211w=0
|
||||||
rsn_preauth=1
|
rsn_preauth=1
|
||||||
rsn_preauth_interfaces=lo
|
rsn_preauth_interfaces=lo
|
||||||
disable_pmksa_caching=0
|
disable_pmksa_caching=0
|
||||||
|
@ -13,7 +13,7 @@ wpa=2
|
|||||||
wpa_key_mgmt=FT-PSK
|
wpa_key_mgmt=FT-PSK
|
||||||
wpa_pairwise=CCMP
|
wpa_pairwise=CCMP
|
||||||
wpa_passphrase=EasilyGuessedPassword
|
wpa_passphrase=EasilyGuessedPassword
|
||||||
ieee80211w=1
|
ieee80211w=0
|
||||||
rsn_preauth=1
|
rsn_preauth=1
|
||||||
rsn_preauth_interfaces=lo
|
rsn_preauth_interfaces=lo
|
||||||
disable_pmksa_caching=0
|
disable_pmksa_caching=0
|
||||||
|
@ -13,7 +13,7 @@ wpa=2
|
|||||||
wpa_key_mgmt=FT-PSK
|
wpa_key_mgmt=FT-PSK
|
||||||
wpa_pairwise=CCMP
|
wpa_pairwise=CCMP
|
||||||
wpa_passphrase=EasilyGuessedPassword
|
wpa_passphrase=EasilyGuessedPassword
|
||||||
ieee80211w=1
|
ieee80211w=0
|
||||||
rsn_preauth=1
|
rsn_preauth=1
|
||||||
rsn_preauth_interfaces=lo
|
rsn_preauth_interfaces=lo
|
||||||
disable_pmksa_caching=0
|
disable_pmksa_caching=0
|
||||||
|
@ -3,3 +3,6 @@ DisableMacAddressRandomization=true
|
|||||||
|
|
||||||
[General]
|
[General]
|
||||||
RoamRetryInterval=1
|
RoamRetryInterval=1
|
||||||
|
|
||||||
|
# For disconnect_during_handshake_test
|
||||||
|
ManagementFrameProtection=0
|
||||||
|
Loading…
Reference in New Issue
Block a user