mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
tests: MBO association disallowed indication
Add a test that verifies that no Association Request frame is sent to APs that include the MBO IE with association disallowed attribute in Beacon and Probe Response frames. Signed-off-by: Avraham Stern <avraham.stern@intel.com>
This commit is contained in:
parent
85cc109ea6
commit
6605562af6
59
tests/hwsim/test_mbo.py
Normal file
59
tests/hwsim/test_mbo.py
Normal file
@ -0,0 +1,59 @@
|
||||
# MBO tests
|
||||
# Copyright (c) 2016, Intel Deutschland GmbH
|
||||
#
|
||||
# This software may be distributed under the terms of the BSD license.
|
||||
# See README for more details.
|
||||
|
||||
import logging
|
||||
logger = logging.getLogger()
|
||||
|
||||
import hostapd
|
||||
import os
|
||||
|
||||
from tshark import run_tshark
|
||||
|
||||
def test_mbo_assoc_disallow(dev, apdev, params):
|
||||
hapd1 = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "MBO", "mbo": "1" })
|
||||
hapd2 = hostapd.add_ap(apdev[1]['ifname'], { "ssid": "MBO", "mbo": "1" })
|
||||
|
||||
logger.debug("Set mbo_assoc_disallow with invalid value")
|
||||
if "FAIL" not in hapd1.request("SET mbo_assoc_disallow 2"):
|
||||
raise Exception("Set mbo_assoc_disallow for AP1 succeeded unexpectedly with value 2")
|
||||
|
||||
logger.debug("Disallow associations to AP1 and allow association to AP2")
|
||||
if "OK" not in hapd1.request("SET mbo_assoc_disallow 1"):
|
||||
raise Exception("Failed to set mbo_assoc_disallow for AP1")
|
||||
if "OK" not in hapd2.request("SET mbo_assoc_disallow 0"):
|
||||
raise Exception("Failed to set mbo_assoc_disallow for AP2")
|
||||
|
||||
dev[0].connect("MBO", key_mgmt="NONE", scan_freq="2412")
|
||||
|
||||
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
||||
"wlan.fc.type == 0 && wlan.fc.type_subtype == 0x00",
|
||||
wait=False)
|
||||
if "Destination address: " + hapd1.own_addr() in out:
|
||||
raise Exception("Association request sent to disallowed AP")
|
||||
|
||||
timestamp = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
||||
"wlan.fc.type_subtype == 0x00",
|
||||
display=['frame.time'], wait=False)
|
||||
|
||||
logger.debug("Allow associations to AP1 and disallow assications to AP2")
|
||||
if "OK" not in hapd1.request("SET mbo_assoc_disallow 0"):
|
||||
raise Exception("Failed to set mbo_assoc_disallow for AP1")
|
||||
if "OK" not in hapd2.request("SET mbo_assoc_disallow 1"):
|
||||
raise Exception("Failed to set mbo_assoc_disallow for AP2")
|
||||
|
||||
dev[0].request("DISCONNECT")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
# Force new scan, so the assoc_disallowed indication is updated */
|
||||
dev[0].request("FLUSH")
|
||||
|
||||
dev[0].connect("MBO", key_mgmt="NONE", scan_freq="2412")
|
||||
|
||||
filter = 'wlan.fc.type == 0 && wlan.fc.type_subtype == 0x00 && frame.time > "' + timestamp.rstrip() + '"'
|
||||
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
||||
filter, wait=False)
|
||||
if "Destination address: " + hapd2.own_addr() in out:
|
||||
raise Exception("Association request sent to disallowed AP 2")
|
Loading…
Reference in New Issue
Block a user