mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-12 17:08:20 -05:00
ae750570b6
Update grpform_pbc_overlap not to require PBC session overlap to be detected since in this sequence a single BSSID is specified and other APs can be ignored while checking for session overlap. Add other test cases to explicitly check for the PBC session overlap detection in non-P2P and P2P cases when the BSSID is specified. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
1189 lines
50 KiB
Python
1189 lines
50 KiB
Python
# P2P group formation test cases
|
|
# Copyright (c) 2013-2019, Jouni Malinen <j@w1.fi>
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
from remotehost import remote_compatible
|
|
import binascii
|
|
import logging
|
|
logger = logging.getLogger()
|
|
import struct
|
|
import time
|
|
import os
|
|
|
|
import hostapd
|
|
import hwsim_utils
|
|
import utils
|
|
from utils import HwsimSkip
|
|
from wpasupplicant import WpaSupplicant
|
|
from p2p_utils import *
|
|
from test_p2p_messages import parse_p2p_public_action, p2p_hdr, p2p_attr_capability, p2p_attr_go_intent, p2p_attr_config_timeout, p2p_attr_listen_channel, p2p_attr_intended_interface_addr, p2p_attr_channel_list, p2p_attr_device_info, p2p_attr_operating_channel, ie_p2p, ie_wsc, mgmt_tx, P2P_GO_NEG_REQ
|
|
|
|
@remote_compatible
|
|
def test_grpform(dev):
|
|
"""P2P group formation using PIN and authorized connection (init -> GO)"""
|
|
try:
|
|
dev[0].global_request("SET p2p_group_idle 2")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
check_grpform_results(i_res, r_res)
|
|
dev[1].remove_group()
|
|
ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO did not remove group on idle timeout")
|
|
if "GO reason=IDLE" not in ev:
|
|
raise Exception("Unexpected group removal event: " + ev)
|
|
finally:
|
|
dev[0].global_request("SET p2p_group_idle 0")
|
|
|
|
def test_grpform_a(dev):
|
|
"""P2P group formation using PIN and authorized connection (init -> GO) (init: group iface)"""
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
if "p2p-wlan" not in i_res['ifname']:
|
|
raise Exception("Unexpected group interface name")
|
|
check_grpform_results(i_res, r_res)
|
|
remove_group(dev[0], dev[1])
|
|
if i_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
|
|
def test_grpform_b(dev):
|
|
"""P2P group formation using PIN and authorized connection (init -> GO) (resp: group iface)"""
|
|
dev[1].global_request("SET p2p_no_group_iface 0")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
if "p2p-wlan" not in r_res['ifname']:
|
|
raise Exception("Unexpected group interface name")
|
|
check_grpform_results(i_res, r_res)
|
|
addr = dev[0].group_request("P2P_GROUP_MEMBER " + dev[1].p2p_dev_addr())
|
|
if "FAIL" in addr:
|
|
raise Exception("P2P_GROUP_MEMBER failed")
|
|
if addr != dev[1].p2p_interface_addr():
|
|
raise Exception("Unexpected P2P_GROUP_MEMBER result: " + addr)
|
|
if "FAIL" not in dev[0].group_request("P2P_GROUP_MEMBER a"):
|
|
raise Exception("Invalid P2P_GROUP_MEMBER command accepted")
|
|
if "FAIL" not in dev[0].group_request("P2P_GROUP_MEMBER 00:11:22:33:44:55"):
|
|
raise Exception("P2P_GROUP_MEMBER for non-member accepted")
|
|
remove_group(dev[0], dev[1])
|
|
if r_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
|
|
def test_grpform_c(dev):
|
|
"""P2P group formation using PIN and authorized connection (init -> GO) (group iface)"""
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
dev[1].global_request("SET p2p_no_group_iface 0")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
if "p2p-wlan" not in i_res['ifname']:
|
|
raise Exception("Unexpected group interface name")
|
|
if "p2p-wlan" not in r_res['ifname']:
|
|
raise Exception("Unexpected group interface name")
|
|
check_grpform_results(i_res, r_res)
|
|
remove_group(dev[0], dev[1])
|
|
if i_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
if r_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
|
|
@remote_compatible
|
|
def test_grpform2(dev):
|
|
"""P2P group formation using PIN and authorized connection (resp -> GO)"""
|
|
go_neg_pin_authorized(i_dev=dev[0], i_intent=0, r_dev=dev[1], r_intent=15)
|
|
remove_group(dev[0], dev[1])
|
|
|
|
def test_grpform2_c(dev):
|
|
"""P2P group formation using PIN and authorized connection (resp -> GO) (group iface)"""
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
dev[1].global_request("SET p2p_no_group_iface 0")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0, r_dev=dev[1], r_intent=15)
|
|
remove_group(dev[0], dev[1])
|
|
if i_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
if r_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
|
|
@remote_compatible
|
|
def test_grpform3(dev):
|
|
"""P2P group formation using PIN and re-init GO Negotiation"""
|
|
go_neg_pin(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=0)
|
|
remove_group(dev[0], dev[1])
|
|
|
|
def test_grpform3_c(dev):
|
|
"""P2P group formation using PIN and re-init GO Negotiation (group iface)"""
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
dev[1].global_request("SET p2p_no_group_iface 0")
|
|
[i_res, r_res] = go_neg_pin(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=0)
|
|
remove_group(dev[0], dev[1])
|
|
if i_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
if r_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
|
|
@remote_compatible
|
|
def test_grpform4(dev):
|
|
"""P2P group formation response during p2p_find"""
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
dev[0].discover_peer(addr1)
|
|
dev[1].p2p_find(social=True)
|
|
time.sleep(0.4)
|
|
dev[0].global_request("P2P_CONNECT " + addr1 + " 12345670 display")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation RX timed out")
|
|
time.sleep(0.5)
|
|
dev[1].p2p_stop_find()
|
|
dev[0].p2p_stop_find()
|
|
|
|
@remote_compatible
|
|
def test_grpform_pbc(dev):
|
|
"""P2P group formation using PBC and re-init GO Negotiation"""
|
|
[i_res, r_res] = go_neg_pbc(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=0)
|
|
check_grpform_results(i_res, r_res)
|
|
if i_res['role'] != 'GO' or r_res['role'] != 'client':
|
|
raise Exception("Unexpected device roles")
|
|
remove_group(dev[0], dev[1])
|
|
|
|
@remote_compatible
|
|
def test_grpform_pd(dev):
|
|
"""P2P group formation with PD-before-GO-Neg workaround"""
|
|
[i_res, r_res] = go_neg_pbc(i_dev=dev[0], provdisc=True, r_dev=dev[1], r_listen=True)
|
|
check_grpform_results(i_res, r_res)
|
|
remove_group(dev[0], dev[1])
|
|
|
|
def test_grpform_ext_listen(dev):
|
|
"""P2P group formation with extended listen timing enabled"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
try:
|
|
if "FAIL" not in dev[0].global_request("P2P_EXT_LISTEN 100"):
|
|
raise Exception("Invalid P2P_EXT_LISTEN accepted")
|
|
if "OK" not in dev[0].global_request("P2P_EXT_LISTEN 300 1000"):
|
|
raise Exception("Failed to set extended listen timing")
|
|
if "OK" not in dev[1].global_request("P2P_EXT_LISTEN 200 40000"):
|
|
raise Exception("Failed to set extended listen timing")
|
|
[i_res, r_res] = go_neg_pbc(i_dev=dev[0], provdisc=True, r_dev=dev[1],
|
|
r_listen=True, i_freq="2417", r_freq="2417",
|
|
i_intent=1, r_intent=15)
|
|
check_grpform_results(i_res, r_res)
|
|
peer1 = dev[0].get_peer(dev[1].p2p_dev_addr())
|
|
if peer1['ext_listen_interval'] != "40000":
|
|
raise Exception("Extended listen interval not discovered correctly")
|
|
if peer1['ext_listen_period'] != "200":
|
|
raise Exception("Extended listen period not discovered correctly")
|
|
peer0 = dev[1].get_peer(dev[0].p2p_dev_addr())
|
|
if peer0['ext_listen_interval'] != "1000":
|
|
raise Exception("Extended listen interval not discovered correctly")
|
|
if peer0['ext_listen_period'] != "300":
|
|
raise Exception("Extended listen period not discovered correctly")
|
|
if not dev[2].discover_peer(addr0):
|
|
raise Exception("Could not discover peer during ext listen")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
if "OK" not in dev[0].global_request("P2P_EXT_LISTEN"):
|
|
raise Exception("Failed to clear extended listen timing")
|
|
if "OK" not in dev[1].global_request("P2P_EXT_LISTEN"):
|
|
raise Exception("Failed to clear extended listen timing")
|
|
|
|
def test_grpform_ext_listen_oper(dev):
|
|
"""P2P extended listen timing operations"""
|
|
try:
|
|
_test_grpform_ext_listen_oper(dev)
|
|
finally:
|
|
dev[0].global_request("P2P_EXT_LISTEN")
|
|
|
|
def _test_grpform_ext_listen_oper(dev):
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add("wlan5")
|
|
addr1 = wpas.p2p_dev_addr()
|
|
wpas.request("P2P_SET listen_channel 1")
|
|
wpas.global_request("SET p2p_no_group_iface 0")
|
|
wpas.request("P2P_LISTEN")
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].request("P2P_LISTEN")
|
|
if not wpas.discover_peer(addr0):
|
|
raise Exception("Could not discover peer (2)")
|
|
|
|
dev[0].global_request("P2P_EXT_LISTEN 300 500")
|
|
dev[0].global_request("P2P_CONNECT " + addr1 + " 12345670 display auth go_intent=0 freq=2417")
|
|
wpas.global_request("P2P_CONNECT " + addr0 + " 12345670 enter go_intent=15 freq=2417")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failed")
|
|
ifaces = wpas.request("INTERFACES").splitlines()
|
|
iface = ifaces[0] if "p2p-wlan" in ifaces[0] else ifaces[1]
|
|
wpas.group_ifname = iface
|
|
if "OK" not in wpas.group_request("STOP_AP"):
|
|
raise Exception("STOP_AP failed")
|
|
wpas.group_request("SET ext_mgmt_frame_handling 1")
|
|
dev[1].p2p_find(social=True)
|
|
time.sleep(1)
|
|
if dev[1].peer_known(addr0):
|
|
raise Exception("Unexpected peer discovery")
|
|
ifaces = dev[0].request("INTERFACES").splitlines()
|
|
iface = ifaces[0] if "p2p-wlan" in ifaces[0] else ifaces[1]
|
|
if "OK" not in dev[0].global_request("P2P_GROUP_REMOVE " + iface):
|
|
raise Exception("Failed to request group removal")
|
|
wpas.remove_group()
|
|
|
|
count = 0
|
|
timeout = 15
|
|
found = False
|
|
while count < timeout * 4:
|
|
time.sleep(0.25)
|
|
count = count + 1
|
|
if dev[1].peer_known(addr0):
|
|
found = True
|
|
break
|
|
dev[1].p2p_stop_find()
|
|
if not found:
|
|
raise Exception("Could not discover peer that was supposed to use extended listen")
|
|
|
|
@remote_compatible
|
|
def test_both_go_intent_15(dev):
|
|
"""P2P GO Negotiation with both devices using GO intent 15"""
|
|
go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=15, expect_failure=True, i_go_neg_status=9)
|
|
|
|
@remote_compatible
|
|
def test_both_go_neg_display(dev):
|
|
"""P2P GO Negotiation with both devices trying to display PIN"""
|
|
go_neg_pin_authorized(i_dev=dev[0], r_dev=dev[1], expect_failure=True, i_go_neg_status=10, i_method='display', r_method='display')
|
|
|
|
@remote_compatible
|
|
def test_both_go_neg_enter(dev):
|
|
"""P2P GO Negotiation with both devices trying to enter PIN"""
|
|
go_neg_pin_authorized(i_dev=dev[0], r_dev=dev[1], expect_failure=True, i_go_neg_status=10, i_method='enter', r_method='enter')
|
|
|
|
@remote_compatible
|
|
def test_go_neg_pbc_vs_pin(dev):
|
|
"""P2P GO Negotiation with one device using PBC and the other PIN"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_listen()
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " pbc auth"):
|
|
raise Exception("Failed to authorize GO Neg")
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
if "OK" not in dev[1].request("P2P_CONNECT " + addr0 + " 12345670 display"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failure timed out")
|
|
if "status=10" not in ev:
|
|
raise Exception("Unexpected failure reason: " + ev)
|
|
|
|
@remote_compatible
|
|
def test_go_neg_pin_vs_pbc(dev):
|
|
"""P2P GO Negotiation with one device using PIN and the other PBC"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_listen()
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " 12345670 display auth"):
|
|
raise Exception("Failed to authorize GO Neg")
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
if "OK" not in dev[1].request("P2P_CONNECT " + addr0 + " pbc"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failure timed out")
|
|
if "status=10" not in ev:
|
|
raise Exception("Unexpected failure reason: " + ev)
|
|
|
|
def test_grpform_per_sta_psk(dev):
|
|
"""P2P group formation with per-STA PSKs"""
|
|
dev[0].global_request("P2P_SET per_sta_psk 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=0)
|
|
check_grpform_results(i_res, r_res)
|
|
|
|
pin = dev[2].wps_read_pin()
|
|
dev[0].p2p_go_authorize_client(pin)
|
|
c_res = dev[2].p2p_connect_group(dev[0].p2p_dev_addr(), pin, timeout=60)
|
|
check_grpform_results(i_res, c_res)
|
|
|
|
if r_res['psk'] == c_res['psk']:
|
|
raise Exception("Same PSK assigned for both clients")
|
|
|
|
hwsim_utils.test_connectivity_p2p(dev[1], dev[2])
|
|
|
|
dev[0].remove_group()
|
|
dev[1].wait_go_ending_session()
|
|
dev[2].wait_go_ending_session()
|
|
|
|
def test_grpform_per_sta_psk_wps(dev):
|
|
"""P2P group formation with per-STA PSKs with non-P2P WPS STA"""
|
|
dev[0].global_request("P2P_SET per_sta_psk 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=dev[1], r_intent=0)
|
|
check_grpform_results(i_res, r_res)
|
|
|
|
dev[0].p2p_go_authorize_client_pbc()
|
|
dev[2].request("WPS_PBC")
|
|
dev[2].wait_connected(timeout=30)
|
|
|
|
hwsim_utils.test_connectivity_p2p_sta(dev[1], dev[2])
|
|
|
|
dev[0].remove_group()
|
|
dev[2].request("DISCONNECT")
|
|
dev[1].wait_go_ending_session()
|
|
|
|
@remote_compatible
|
|
def test_grpform_force_chan_go(dev):
|
|
"""P2P group formation forced channel selection by GO"""
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
i_freq=2432,
|
|
r_dev=dev[1], r_intent=0,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if i_res['freq'] != "2432":
|
|
raise Exception("Unexpected channel - did not follow GO's forced channel")
|
|
remove_group(dev[0], dev[1])
|
|
|
|
@remote_compatible
|
|
def test_grpform_force_chan_cli(dev):
|
|
"""P2P group formation forced channel selection by client"""
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
i_freq=2417,
|
|
r_dev=dev[1], r_intent=15,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if i_res['freq'] != "2417":
|
|
raise Exception("Unexpected channel - did not follow GO's forced channel")
|
|
remove_group(dev[0], dev[1])
|
|
|
|
@remote_compatible
|
|
def test_grpform_force_chan_conflict(dev):
|
|
"""P2P group formation fails due to forced channel mismatch"""
|
|
go_neg_pin_authorized(i_dev=dev[0], i_intent=0, i_freq=2422,
|
|
r_dev=dev[1], r_intent=15, r_freq=2427,
|
|
expect_failure=True, i_go_neg_status=7)
|
|
|
|
@remote_compatible
|
|
def test_grpform_pref_chan_go(dev):
|
|
"""P2P group formation preferred channel selection by GO"""
|
|
try:
|
|
dev[0].request("SET p2p_pref_chan 81:7")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if i_res['freq'] != "2442":
|
|
raise Exception("Unexpected channel - did not follow GO's p2p_pref_chan")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[0].request("SET p2p_pref_chan ")
|
|
|
|
@remote_compatible
|
|
def test_grpform_pref_chan_go_overridden(dev):
|
|
"""P2P group formation preferred channel selection by GO overridden by client"""
|
|
try:
|
|
dev[1].request("SET p2p_pref_chan 81:7")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
i_freq=2422,
|
|
r_dev=dev[1], r_intent=15,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if i_res['freq'] != "2422":
|
|
raise Exception("Unexpected channel - did not follow client's forced channel")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[1].request("SET p2p_pref_chan ")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_go_freq_forcing_chan(dev):
|
|
"""P2P group formation with no-GO freq forcing channel"""
|
|
try:
|
|
dev[1].request("SET p2p_no_go_freq 100-200,300,4000-6000")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
r_dev=dev[1], r_intent=15,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow no-GO freq")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[1].request("SET p2p_no_go_freq ")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_go_freq_conflict(dev):
|
|
"""P2P group formation fails due to no-GO range forced by client"""
|
|
try:
|
|
dev[1].request("SET p2p_no_go_freq 2000-3000")
|
|
go_neg_pin_authorized(i_dev=dev[0], i_intent=0, i_freq=2422,
|
|
r_dev=dev[1], r_intent=15,
|
|
expect_failure=True, i_go_neg_status=7)
|
|
finally:
|
|
dev[1].request("SET p2p_no_go_freq ")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_5ghz_world_roaming(dev):
|
|
"""P2P group formation with world roaming regulatory"""
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
r_dev=dev[1], r_intent=15,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow world roaming rules")
|
|
remove_group(dev[0], dev[1])
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_5ghz_add_cli(dev):
|
|
"""P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1"""
|
|
try:
|
|
dev[0].request("SET p2p_add_cli_chan 1")
|
|
dev[1].request("SET p2p_add_cli_chan 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
r_dev=dev[1], r_intent=14,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow world roaming rules")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[0].request("SET p2p_add_cli_chan 0")
|
|
dev[1].request("SET p2p_add_cli_chan 0")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_5ghz_add_cli2(dev):
|
|
"""P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse)"""
|
|
try:
|
|
dev[0].request("SET p2p_add_cli_chan 1")
|
|
dev[1].request("SET p2p_add_cli_chan 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=14,
|
|
r_dev=dev[1], r_intent=0,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow world roaming rules")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[0].request("SET p2p_add_cli_chan 0")
|
|
dev[1].request("SET p2p_add_cli_chan 0")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_5ghz_add_cli3(dev):
|
|
"""P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (intent 15)"""
|
|
try:
|
|
dev[0].request("SET p2p_add_cli_chan 1")
|
|
dev[1].request("SET p2p_add_cli_chan 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=0,
|
|
r_dev=dev[1], r_intent=15,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow world roaming rules")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[0].request("SET p2p_add_cli_chan 0")
|
|
dev[1].request("SET p2p_add_cli_chan 0")
|
|
|
|
@remote_compatible
|
|
def test_grpform_no_5ghz_add_cli4(dev):
|
|
"""P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse; intent 15)"""
|
|
try:
|
|
dev[0].request("SET p2p_add_cli_chan 1")
|
|
dev[1].request("SET p2p_add_cli_chan 1")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0,
|
|
test_data=False)
|
|
check_grpform_results(i_res, r_res)
|
|
if int(i_res['freq']) > 4000:
|
|
raise Exception("Unexpected channel - did not follow world roaming rules")
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[0].request("SET p2p_add_cli_chan 0")
|
|
dev[1].request("SET p2p_add_cli_chan 0")
|
|
|
|
@remote_compatible
|
|
def test_grpform_incorrect_pin(dev):
|
|
"""P2P GO Negotiation with incorrect PIN"""
|
|
dev[1].p2p_listen()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Peer not found")
|
|
res = dev[1].global_request("P2P_CONNECT " + dev[0].p2p_dev_addr() + " pin auth go_intent=0")
|
|
if "FAIL" in res:
|
|
raise Exception("P2P_CONNECT failed to generate PIN")
|
|
logger.info("PIN from P2P_CONNECT: " + res)
|
|
dev[0].global_request("P2P_CONNECT " + addr1 + " 00000000 enter go_intent=15")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation did not complete successfully(0)")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation did not complete successfully(1)")
|
|
ev = dev[1].wait_global_event(["WPS-FAIL"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("WPS failure not reported(1)")
|
|
if "msg=8 config_error=18" not in ev:
|
|
raise Exception("Unexpected WPS failure(1): " + ev)
|
|
ev = dev[0].wait_global_event(["WPS-FAIL"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("WPS failure not reported")
|
|
if "msg=8 config_error=18" not in ev:
|
|
raise Exception("Unexpected WPS failure: " + ev)
|
|
ev = dev[1].wait_global_event(["P2P-GROUP-FORMATION-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Group formation failure timed out")
|
|
ev = dev[0].wait_global_event(["P2P-GROUP-FORMATION-FAILURE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("Group formation failure timed out")
|
|
|
|
@remote_compatible
|
|
def test_grpform_reject(dev):
|
|
"""User rejecting group formation attempt by a P2P peer"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
dev[1].p2p_go_neg_init(addr0, None, "pbc")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation timed out")
|
|
if "OK" in dev[0].global_request("P2P_REJECT foo"):
|
|
raise Exception("Invalid P2P_REJECT accepted")
|
|
if "FAIL" in dev[0].global_request("P2P_REJECT " + ev.split(' ')[1]):
|
|
raise Exception("P2P_REJECT failed")
|
|
dev[1].request("P2P_STOP_FIND")
|
|
dev[1].p2p_go_neg_init(addr0, None, "pbc")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Rejection not reported")
|
|
if "status=11" not in ev:
|
|
raise Exception("Unexpected status code in rejection")
|
|
|
|
@remote_compatible
|
|
def test_grpform_pd_no_probe_resp(dev):
|
|
"""GO Negotiation after PD, but no Probe Response"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Peer not found")
|
|
dev[1].p2p_stop_find()
|
|
dev[0].p2p_stop_find()
|
|
peer = dev[0].get_peer(addr1)
|
|
if peer['listen_freq'] == '0':
|
|
raise Exception("Peer listen frequency not learned from Probe Request")
|
|
time.sleep(0.3)
|
|
dev[0].request("P2P_FLUSH")
|
|
dev[0].p2p_listen()
|
|
dev[1].global_request("P2P_PROV_DISC " + addr0 + " display")
|
|
ev = dev[0].wait_global_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("PD Request timed out")
|
|
ev = dev[1].wait_global_event(["P2P-PROV-DISC-ENTER-PIN"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("PD Response timed out")
|
|
peer = dev[0].get_peer(addr1)
|
|
if peer['listen_freq'] != '0':
|
|
raise Exception("Peer listen frequency learned unexpectedly from PD Request")
|
|
|
|
pin = dev[0].wps_read_pin()
|
|
if "FAIL" in dev[1].global_request("P2P_CONNECT " + addr0 + " " + pin + " enter"):
|
|
raise Exception("P2P_CONNECT on initiator failed")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation start timed out")
|
|
peer = dev[0].get_peer(addr1)
|
|
if peer['listen_freq'] == '0':
|
|
raise Exception("Peer listen frequency not learned from PD followed by GO Neg Req")
|
|
if "FAIL" in dev[0].global_request("P2P_CONNECT " + addr1 + " " + pin + " display"):
|
|
raise Exception("P2P_CONNECT on responder failed")
|
|
ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out")
|
|
ev = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out")
|
|
|
|
def test_go_neg_two_peers(dev):
|
|
"""P2P GO Negotiation rejected due to already started negotiation with another peer"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
addr2 = dev[2].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
dev[2].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
if not dev[0].discover_peer(addr2):
|
|
raise Exception("Could not discover peer")
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + addr2 + " pbc auth"):
|
|
raise Exception("Failed to authorize GO Neg")
|
|
dev[0].p2p_listen()
|
|
if not dev[2].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " pbc"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("timeout on GO Neg RX event")
|
|
dev[2].request("P2P_CONNECT " + addr0 + " pbc")
|
|
ev = dev[2].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Rejection not reported")
|
|
if "status=5" not in ev:
|
|
raise Exception("Unexpected status code in rejection: " + ev)
|
|
|
|
def clear_pbc_overlap(dev, ap):
|
|
hostapd.remove_bss(ap)
|
|
dev[0].request("P2P_CANCEL")
|
|
dev[1].request("P2P_CANCEL")
|
|
dev[0].p2p_stop_find()
|
|
dev[1].p2p_stop_find()
|
|
remove_group(dev[0], dev[1], allow_failure=True)
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
time.sleep(0.1)
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
time.sleep(0.1)
|
|
|
|
@remote_compatible
|
|
def test_grpform_pbc_overlap(dev, apdev):
|
|
"""P2P group formation during PBC overlap"""
|
|
params = {"ssid": "wps", "eap_server": "1", "wps_state": "1"}
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd.request("WPS_PBC")
|
|
time.sleep(0.1)
|
|
|
|
# Since P2P Client scan case is now optimized to use a specific SSID, the
|
|
# WPS AP will not reply to that and the scan after GO Negotiation can quite
|
|
# likely miss the AP due to dwell time being short enough to miss the Beacon
|
|
# frame. This has made the test case somewhat pointless, but keep it here
|
|
# for now with an additional scan to confirm that PBC detection works if
|
|
# there is a BSS entry for a overlapping AP.
|
|
for i in range(0, 5):
|
|
dev[0].scan(freq="2412")
|
|
if dev[0].get_bss(apdev[0]['bssid']) is not None:
|
|
break
|
|
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_listen()
|
|
if "OK" not in dev[0].global_request("P2P_CONNECT " + addr1 + " pbc auth go_intent=0"):
|
|
raise Exception("Failed to authorize GO Neg")
|
|
if "OK" not in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=15 freq=2412"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
ev = dev[0].wait_global_event(["WPS-OVERLAP-DETECTED",
|
|
"P2P-GROUP-FORMATION-SUCCESS"], timeout=15)
|
|
clear_pbc_overlap(dev, apdev[0])
|
|
if ev is None or "P2P-GROUP-FORMATION-SUCCESS" not in ev:
|
|
raise Exception("P2P group formation did not complete")
|
|
|
|
@remote_compatible
|
|
def test_grpform_pbc_overlap_group_iface(dev, apdev):
|
|
"""P2P group formation during PBC overlap using group interfaces"""
|
|
# Note: Need to include P2P IE from the AP to get the P2P interface BSS
|
|
# update use this information.
|
|
params = {"ssid": "wps", "eap_server": "1", "wps_state": "1",
|
|
"beacon_int": "15", 'manage_p2p': '1'}
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd.request("WPS_PBC")
|
|
|
|
dev[0].request("SET p2p_no_group_iface 0")
|
|
dev[1].request("SET p2p_no_group_iface 0")
|
|
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_stop_find()
|
|
dev[0].scan(freq="2412")
|
|
dev[0].p2p_listen()
|
|
if "OK" not in dev[0].global_request("P2P_CONNECT " + addr1 + " pbc auth go_intent=0"):
|
|
raise Exception("Failed to authorize GO Neg")
|
|
if "OK" not in dev[1].global_request("P2P_CONNECT " + addr0 + " pbc go_intent=15 freq=2412"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
ev = dev[0].wait_global_event(["WPS-OVERLAP-DETECTED",
|
|
"P2P-GROUP-FORMATION-SUCCESS"], timeout=15)
|
|
clear_pbc_overlap(dev, apdev[0])
|
|
if ev is None or "P2P-GROUP-FORMATION-SUCCESS" not in ev:
|
|
raise Exception("P2P group formation did not complete")
|
|
|
|
@remote_compatible
|
|
def test_grpform_goneg_fail_with_group_iface(dev):
|
|
"""P2P group formation fails while using group interface"""
|
|
dev[0].request("SET p2p_no_group_iface 0")
|
|
dev[1].p2p_listen()
|
|
peer = dev[1].p2p_dev_addr()
|
|
if not dev[0].discover_peer(peer):
|
|
raise Exception("Peer " + peer + " not found")
|
|
if "OK" not in dev[1].request("P2P_REJECT " + dev[0].p2p_dev_addr()):
|
|
raise Exception("P2P_REJECT failed")
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + peer + " pbc"):
|
|
raise Exception("P2P_CONNECT failed")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failure timed out")
|
|
|
|
def test_grpform_cred_ready_timeout(dev, apdev, params):
|
|
"""P2P GO Negotiation wait for credentials to become ready [long]"""
|
|
if not params['long']:
|
|
raise HwsimSkip("Skip test case with long duration due to --long not specified")
|
|
|
|
dev[1].p2p_listen()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Peer " + addr1 + " not found")
|
|
if not dev[2].discover_peer(addr1):
|
|
raise Exception("Peer " + addr1 + " not found(2)")
|
|
|
|
start = os.times()[4]
|
|
|
|
cmd = "P2P_CONNECT " + addr1 + " 12345670 display"
|
|
if "OK" not in dev[0].global_request(cmd):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
|
|
if "OK" not in dev[2].global_request(cmd):
|
|
raise Exception("Failed to initiate GO Neg(2)")
|
|
|
|
# First, check with p2p_find
|
|
ev = dev[2].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=30)
|
|
if ev is not None:
|
|
raise Exception("Too early GO Negotiation timeout reported(2)")
|
|
dev[2].dump_monitor()
|
|
logger.info("Starting p2p_find to change state")
|
|
dev[2].p2p_find()
|
|
for i in range(10):
|
|
ev = dev[2].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=10)
|
|
if ev:
|
|
break
|
|
dev[2].dump_monitor(global_mon=False)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failure timed out(2)")
|
|
dev[2].dump_monitor()
|
|
end = os.times()[4]
|
|
logger.info("GO Negotiation wait time: {} seconds(2)".format(end - start))
|
|
if end - start < 120:
|
|
raise Exception("Too short GO Negotiation wait time(2): {}".format(end - start))
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add("wlan5")
|
|
|
|
wpas.p2p_listen()
|
|
ev = dev[2].wait_global_event(["P2P-DEVICE-FOUND"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Did not discover new device after GO Negotiation failure")
|
|
if wpas.p2p_dev_addr() not in ev:
|
|
raise Exception("Unexpected device found: " + ev)
|
|
dev[2].p2p_stop_find()
|
|
dev[2].dump_monitor()
|
|
wpas.p2p_stop_find()
|
|
wpas.close_monitor()
|
|
del wpas
|
|
|
|
# Finally, verify without p2p_find
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-FAILURE"], timeout=120)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation failure timed out")
|
|
end = os.times()[4]
|
|
logger.info("GO Negotiation wait time: {} seconds".format(end - start))
|
|
if end - start < 120:
|
|
raise Exception("Too short GO Negotiation wait time: {}".format(end - start))
|
|
|
|
def test_grpform_no_wsc_done(dev):
|
|
"""P2P group formation with WSC-Done not sent"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
|
|
for i in range(0, 2):
|
|
dev[0].request("SET ext_eapol_frame_io 1")
|
|
dev[1].request("SET ext_eapol_frame_io 1")
|
|
dev[0].p2p_listen()
|
|
dev[1].p2p_go_neg_auth(addr0, "12345670", "display", 0)
|
|
dev[1].p2p_listen()
|
|
dev[0].p2p_go_neg_init(addr1, "12345670", "enter", timeout=20,
|
|
go_intent=15, wait_group=False)
|
|
|
|
mode = None
|
|
while True:
|
|
ev = dev[0].wait_event(["EAPOL-TX"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Timeout on EAPOL-TX from GO")
|
|
if not mode:
|
|
mode = dev[0].get_status_field("mode")
|
|
res = dev[1].request("EAPOL_RX " + addr0 + " " + ev.split(' ')[2])
|
|
if "OK" not in res:
|
|
raise Exception("EAPOL_RX failed")
|
|
ev = dev[1].wait_event(["EAPOL-TX"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Timeout on EAPOL-TX from P2P Client")
|
|
msg = ev.split(' ')[2]
|
|
if msg[46:56] == "102200010f":
|
|
logger.info("Drop WSC_Done")
|
|
dev[0].request("SET ext_eapol_frame_io 0")
|
|
dev[1].request("SET ext_eapol_frame_io 0")
|
|
# Fake EAP-Failure to complete session on the client
|
|
id = msg[10:12]
|
|
dev[1].request("EAPOL_RX " + addr0 + " 0300000404" + id + "0004")
|
|
break
|
|
res = dev[0].request("EAPOL_RX " + addr1 + " " + msg)
|
|
if "OK" not in res:
|
|
raise Exception("EAPOL_RX failed")
|
|
|
|
ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out on GO")
|
|
ev = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out on P2P Client")
|
|
dev[0].remove_group()
|
|
dev[1].wait_go_ending_session()
|
|
|
|
if mode != "P2P GO - group formation":
|
|
raise Exception("Unexpected mode on GO during group formation: " + mode)
|
|
|
|
@remote_compatible
|
|
def test_grpform_wait_peer(dev):
|
|
"""P2P group formation wait for peer to become ready"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Peer " + addr1 + " not found")
|
|
dev[0].request("SET extra_roc_dur 500")
|
|
if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " 12345670 display go_intent=15"):
|
|
raise Exception("Failed to initiate GO Neg")
|
|
time.sleep(3)
|
|
dev[1].request("P2P_CONNECT " + addr0 + " 12345670 enter go_intent=0")
|
|
|
|
ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out")
|
|
dev[0].group_form_result(ev)
|
|
|
|
dev[0].request("SET extra_roc_dur 0")
|
|
ev = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev is None:
|
|
raise Exception("Group formation timed out")
|
|
dev[0].remove_group()
|
|
|
|
@remote_compatible
|
|
def test_invalid_p2p_connect_command(dev):
|
|
"""P2P_CONNECT error cases"""
|
|
id = dev[0].add_network()
|
|
for cmd in ["foo",
|
|
"00:11:22:33:44:55",
|
|
"00:11:22:33:44:55 pbc persistent=123",
|
|
"00:11:22:33:44:55 pbc persistent=%d" % id,
|
|
"00:11:22:33:44:55 pbc go_intent=-1",
|
|
"00:11:22:33:44:55 pbc go_intent=16",
|
|
"00:11:22:33:44:55 pin",
|
|
"00:11:22:33:44:55 pbc freq=0"]:
|
|
if "FAIL" not in dev[0].request("P2P_CONNECT " + cmd):
|
|
raise Exception("Invalid P2P_CONNECT command accepted: " + cmd)
|
|
|
|
if "FAIL-INVALID-PIN" not in dev[0].request("P2P_CONNECT 00:11:22:33:44:55 1234567"):
|
|
raise Exception("Invalid PIN was not rejected")
|
|
if "FAIL-INVALID-PIN" not in dev[0].request("P2P_CONNECT 00:11:22:33:44:55 12345678a"):
|
|
raise Exception("Invalid PIN was not rejected")
|
|
|
|
if "FAIL-CHANNEL-UNSUPPORTED" not in dev[0].request("P2P_CONNECT 00:11:22:33:44:55 pin freq=3000"):
|
|
raise Exception("Unsupported channel not reported")
|
|
|
|
@remote_compatible
|
|
def test_p2p_unauthorize(dev):
|
|
"""P2P_UNAUTHORIZE to unauthorize a peer"""
|
|
if "FAIL" not in dev[0].request("P2P_UNAUTHORIZE foo"):
|
|
raise Exception("Invalid P2P_UNAUTHORIZE accepted")
|
|
if "FAIL" not in dev[0].request("P2P_UNAUTHORIZE 00:11:22:33:44:55"):
|
|
raise Exception("P2P_UNAUTHORIZE for unknown peer accepted")
|
|
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
pin = dev[0].wps_read_pin()
|
|
dev[0].p2p_go_neg_auth(addr1, pin, "display")
|
|
dev[0].p2p_listen()
|
|
if "OK" not in dev[0].request("P2P_UNAUTHORIZE " + addr1):
|
|
raise Exception("P2P_UNAUTHORIZE failed")
|
|
dev[1].p2p_go_neg_init(addr0, pin, "keypad", timeout=0)
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("No GO Negotiation Request RX reported")
|
|
|
|
@remote_compatible
|
|
def test_grpform_pbc_multiple(dev):
|
|
"""P2P group formation using PBC multiple times in a row"""
|
|
try:
|
|
dev[1].request("SET passive_scan 1")
|
|
for i in range(5):
|
|
[i_res, r_res] = go_neg_pbc_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
remove_group(dev[0], dev[1])
|
|
finally:
|
|
dev[1].request("SET passive_scan 0")
|
|
dev[1].flush_scan_cache()
|
|
|
|
def test_grpform_not_ready(dev):
|
|
"""Not ready for GO Negotiation (listen)"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr2 = dev[2].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
dev[1].global_request("P2P_CONNECT " + addr0 + " pbc")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No P2P-GO-NEG-REQUEST event")
|
|
dev[0].dump_monitor()
|
|
time.sleep(5)
|
|
if not dev[2].discover_peer(addr0):
|
|
raise Exception("Could not discover peer(2)")
|
|
for i in range(3):
|
|
dev[i].p2p_stop_find()
|
|
|
|
def test_grpform_not_ready2(dev):
|
|
"""Not ready for GO Negotiation (search)"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr2 = dev[2].p2p_dev_addr()
|
|
dev[0].p2p_find(social=True)
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
dev[1].global_request("P2P_CONNECT " + addr0 + " pbc")
|
|
ev = dev[0].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No P2P-GO-NEG-REQUEST event")
|
|
dev[0].dump_monitor()
|
|
time.sleep(1)
|
|
dev[2].p2p_listen()
|
|
ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Peer not discovered after GO Neg Resp(status=1) TX")
|
|
if addr2 not in ev:
|
|
raise Exception("Unexpected peer discovered: " + ev)
|
|
for i in range(3):
|
|
dev[i].p2p_stop_find()
|
|
|
|
@remote_compatible
|
|
def test_grpform_and_scan(dev):
|
|
"""GO Negotiation and scan operations"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
dev[1].p2p_listen()
|
|
if not dev[0].discover_peer(addr1):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_stop_find()
|
|
dev[1].p2p_stop_find()
|
|
|
|
if "OK" not in dev[0].request("SCAN TYPE=ONLY freq=2412-2472"):
|
|
raise Exception("Could not start scan")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("Scan did not start")
|
|
time.sleep(0.1)
|
|
# Request PD while the previously started scan is still in progress
|
|
if "OK" not in dev[0].request("P2P_PROV_DISC %s pbc" % addr1):
|
|
raise Exception("Could not request PD")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Scan did not complete")
|
|
time.sleep(0.3)
|
|
|
|
dev[1].p2p_listen()
|
|
ev = dev[0].wait_global_event(["P2P-PROV-DISC-PBC-RESP"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("PD Response not received")
|
|
|
|
if "OK" not in dev[0].request("SCAN TYPE=ONLY freq=2412-2472"):
|
|
raise Exception("Could not start scan")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("Scan did not start")
|
|
time.sleep(0.1)
|
|
# Request GO Neg while the previously started scan is still in progress
|
|
if "OK" not in dev[0].request("P2P_CONNECT %s pbc" % addr1):
|
|
raise Exception("Could not request GO Negotiation")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Scan did not complete")
|
|
|
|
ev = dev[1].wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Neg Req RX not reported")
|
|
|
|
dev[1].p2p_stop_find()
|
|
|
|
if "OK" not in dev[1].request("SCAN TYPE=ONLY freq=2412-2472"):
|
|
raise Exception("Could not start scan")
|
|
ev = dev[1].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("Scan did not start")
|
|
time.sleep(0.1)
|
|
dev[1].global_request("P2P_CONNECT " + addr0 + " pbc")
|
|
ev = dev[1].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Scan did not complete")
|
|
|
|
ev0 = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev0 is None:
|
|
raise Exception("Group formation timed out on dev0")
|
|
dev[0].group_form_result(ev0)
|
|
|
|
ev1 = dev[1].wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev1 is None:
|
|
raise Exception("Group formation timed out on dev1")
|
|
dev[1].group_form_result(ev1)
|
|
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
remove_group(dev[0], dev[1])
|
|
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_grpform_go_neg_dup_on_restart(dev):
|
|
"""Duplicated GO Negotiation Request after GO Neg restart"""
|
|
if dev[0].p2p_dev_addr() > dev[1].p2p_dev_addr():
|
|
higher = dev[0]
|
|
lower = dev[1]
|
|
else:
|
|
higher = dev[1]
|
|
lower = dev[0]
|
|
addr_low = lower.p2p_dev_addr()
|
|
addr_high = higher.p2p_dev_addr()
|
|
higher.p2p_listen()
|
|
if not lower.discover_peer(addr_high):
|
|
raise Exception("Could not discover peer")
|
|
lower.p2p_stop_find()
|
|
|
|
if "OK" not in lower.request("P2P_CONNECT %s pbc" % addr_high):
|
|
raise Exception("Could not request GO Negotiation")
|
|
ev = higher.wait_global_event(["P2P-GO-NEG-REQUEST"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Neg Req RX not reported")
|
|
|
|
# Wait for GO Negotiation Response (Status=1) to go through
|
|
time.sleep(0.2)
|
|
|
|
if "FAIL" in lower.request("SET ext_mgmt_frame_handling 1"):
|
|
raise Exception("Failed to enable external management frame handling")
|
|
|
|
higher.p2p_stop_find()
|
|
higher.global_request("P2P_CONNECT " + addr_low + " pbc")
|
|
|
|
# Wait for the GO Negotiation Request frame of the restarted GO Negotiation
|
|
rx_msg = lower.mgmt_rx()
|
|
if rx_msg is None:
|
|
raise Exception("MGMT-RX timeout")
|
|
p2p = parse_p2p_public_action(rx_msg['payload'])
|
|
if p2p is None:
|
|
raise Exception("Not a P2P Public Action frame")
|
|
if p2p['subtype'] != 0:
|
|
raise Exception("Unexpected P2P Public Action subtype %d" % p2p['subtype'])
|
|
|
|
# Send duplicate GO Negotiation Request from the prior instance of GO
|
|
# Negotiation
|
|
lower.p2p_stop_find()
|
|
peer = higher.get_peer(addr_low)
|
|
|
|
msg = p2p_hdr(addr_high, addr_low, type=P2P_GO_NEG_REQ, dialog_token=123)
|
|
attrs = p2p_attr_capability(dev_capab=0x25, group_capab=0x08)
|
|
attrs += p2p_attr_go_intent(go_intent=7, tie_breaker=1)
|
|
attrs += p2p_attr_config_timeout()
|
|
attrs += p2p_attr_listen_channel(chan=(int(peer['listen_freq']) - 2407) // 5)
|
|
attrs += p2p_attr_intended_interface_addr(lower.p2p_dev_addr())
|
|
attrs += p2p_attr_channel_list()
|
|
attrs += p2p_attr_device_info(addr_low, config_methods=0x80, name="Device A")
|
|
attrs += p2p_attr_operating_channel()
|
|
wsc_attrs = struct.pack(">HHH", 0x1012, 2, 4)
|
|
msg['payload'] += ie_p2p(attrs) + ie_wsc(wsc_attrs)
|
|
mgmt_tx(lower, "MGMT_TX {} {} freq={} wait_time=200 no_cck=1 action={}".format(addr_high, addr_high, peer['listen_freq'], binascii.hexlify(msg['payload']).decode()))
|
|
|
|
# Wait for the GO Negotiation Response frame which would have been sent in
|
|
# this case previously, but not anymore after the check for
|
|
# dev->go_neg_req_sent and dev->flags & P2P_DEV_PEER_WAITING_RESPONSE.
|
|
rx_msg = lower.mgmt_rx(timeout=0.2)
|
|
if rx_msg is not None:
|
|
raise Exception("Unexpected management frame")
|
|
|
|
if "FAIL" in lower.request("SET ext_mgmt_frame_handling 0"):
|
|
raise Exception("Failed to disable external management frame handling")
|
|
lower.p2p_listen()
|
|
|
|
ev = lower.wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation did not succeed on dev0")
|
|
|
|
ev = higher.wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("GO Negotiation did not succeed on dev1")
|
|
|
|
ev0 = lower.wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev0 is None:
|
|
raise Exception("Group formation timed out on dev0")
|
|
lower.group_form_result(ev0)
|
|
|
|
ev1 = higher.wait_global_event(["P2P-GROUP-STARTED"], timeout=15)
|
|
if ev1 is None:
|
|
raise Exception("Group formation timed out on dev1")
|
|
higher.group_form_result(ev1)
|
|
|
|
lower.dump_monitor()
|
|
higher.dump_monitor()
|
|
|
|
remove_group(lower, higher)
|
|
|
|
lower.dump_monitor()
|
|
higher.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_grpform_go_neg_stopped(dev):
|
|
"""GO Negotiation stopped after TX start"""
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
dev[0].p2p_listen()
|
|
if not dev[1].discover_peer(addr0):
|
|
raise Exception("Could not discover peer")
|
|
dev[0].p2p_stop_find()
|
|
if "OK" not in dev[1].request("P2P_CONNECT %s pbc" % addr0):
|
|
raise Exception("Could not request GO Negotiation")
|
|
dev[1].p2p_stop_find()
|
|
dev[1].p2p_listen()
|
|
dev[0].p2p_find(social=True)
|
|
ev = dev[0].wait_global_event(["P2P-DEVICE-FOUND"], timeout=1.2)
|
|
dev[0].p2p_stop_find()
|
|
dev[1].p2p_stop_find()
|
|
if ev is None:
|
|
raise Exception("Did not find peer quickly enough after stopped P2P_CONNECT")
|
|
|
|
def test_grpform_random_addr(dev):
|
|
"""P2P group formation with random interface addresses"""
|
|
dev[0].global_request("SET p2p_no_group_iface 0")
|
|
dev[1].global_request("SET p2p_no_group_iface 0")
|
|
try:
|
|
if "OK" not in dev[0].global_request("SET p2p_interface_random_mac_addr 1"):
|
|
raise Exception("Failed to set p2p_interface_random_mac_addr")
|
|
if "OK" not in dev[1].global_request("SET p2p_interface_random_mac_addr 1"):
|
|
raise Exception("Failed to set p2p_interface_random_mac_addr")
|
|
[i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15,
|
|
r_dev=dev[1], r_intent=0)
|
|
if "p2p-wlan" not in i_res['ifname']:
|
|
raise Exception("Unexpected group interface name")
|
|
check_grpform_results(i_res, r_res)
|
|
hwsim_utils.test_connectivity_p2p(dev[0], dev[1])
|
|
remove_group(dev[0], dev[1])
|
|
if i_res['ifname'] in utils.get_ifnames():
|
|
raise Exception("Group interface netdev was not removed")
|
|
finally:
|
|
dev[0].global_request("SET p2p_interface_random_mac_addr 0")
|
|
dev[1].global_request("SET p2p_interface_random_mac_addr 0")
|