mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-01 11:48:23 -05:00
6a673d0fb0
IEEE P802.11-REVmd was modified to require H2E to be used whenever Password Identifier is used with SAE. Since wpa_supplicant and mac80211 do not yet support SAE H2E in mesh, Password Identifier cannot be used in mesh cases. Remove the test cases that verified this behavior for now to allow H2E to be required per updated REVmd definition. These test cases will be restored once H2E is fully functionality in mesh cases. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2535 lines
94 KiB
Python
2535 lines
94 KiB
Python
# wpa_supplicant mesh mode tests
|
|
# Copyright (c) 2014, cozybit Inc.
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
import logging
|
|
logger = logging.getLogger()
|
|
import os
|
|
import struct
|
|
import subprocess
|
|
import time
|
|
import json
|
|
import binascii
|
|
|
|
import hwsim_utils
|
|
import hostapd
|
|
from wpasupplicant import WpaSupplicant
|
|
from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger, \
|
|
radiotap_build, start_monitor, stop_monitor
|
|
from tshark import run_tshark, run_tshark_json
|
|
from test_ap_ht import set_world_reg
|
|
from test_sae import build_sae_commit, sae_rx_commit_token_req
|
|
from hwsim_utils import set_group_map
|
|
|
|
def check_mesh_support(dev, secure=False):
|
|
if "MESH" not in dev.get_capability("modes"):
|
|
raise HwsimSkip("Driver does not support mesh")
|
|
if secure and "SAE" not in dev.get_capability("auth_alg"):
|
|
raise HwsimSkip("SAE not supported")
|
|
|
|
def check_mesh_scan(dev, params, other_started=False, beacon_int=0):
|
|
if not other_started:
|
|
dev.dump_monitor()
|
|
id = dev.request("SCAN " + params)
|
|
if "FAIL" in id:
|
|
raise Exception("Failed to start scan")
|
|
id = int(id)
|
|
|
|
if other_started:
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
if ev is None:
|
|
raise Exception("Other scan did not start")
|
|
if "id=" + str(id) in ev:
|
|
raise Exception("Own scan id unexpectedly included in start event")
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
|
|
if ev is None:
|
|
raise Exception("Other scan did not complete")
|
|
if "id=" + str(id) in ev:
|
|
raise Exception(
|
|
"Own scan id unexpectedly included in completed event")
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"])
|
|
if ev is None:
|
|
raise Exception("Scan did not start")
|
|
if "id=" + str(id) not in ev:
|
|
raise Exception("Scan id not included in start event")
|
|
|
|
ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"])
|
|
if ev is None:
|
|
raise Exception("Scan did not complete")
|
|
if "id=" + str(id) not in ev:
|
|
raise Exception("Scan id not included in completed event")
|
|
|
|
res = dev.request("SCAN_RESULTS")
|
|
|
|
if res.find("[MESH]") < 0:
|
|
raise Exception("Scan did not contain a MESH network")
|
|
|
|
bssid = res.splitlines()[1].split(' ')[0]
|
|
bss = dev.get_bss(bssid)
|
|
if bss is None:
|
|
raise Exception("Could not get BSS entry for mesh")
|
|
if 'mesh_capability' not in bss:
|
|
raise Exception("mesh_capability missing from BSS entry")
|
|
if beacon_int:
|
|
if 'beacon_int' not in bss:
|
|
raise Exception("beacon_int missing from BSS entry")
|
|
if str(beacon_int) != bss['beacon_int']:
|
|
raise Exception("Unexpected beacon_int in BSS entry: " + bss['beacon_int'])
|
|
if '[MESH]' not in bss['flags']:
|
|
raise Exception("BSS output did not include MESH flag")
|
|
|
|
def check_mesh_group_added(dev):
|
|
ev = dev.wait_event(["MESH-GROUP-STARTED"])
|
|
if ev is None:
|
|
raise Exception("Test exception: Couldn't join mesh")
|
|
|
|
|
|
def check_mesh_group_removed(dev):
|
|
ev = dev.wait_event(["MESH-GROUP-REMOVED"])
|
|
if ev is None:
|
|
raise Exception("Test exception: Couldn't leave mesh")
|
|
|
|
|
|
def check_mesh_peer_connected(dev, timeout=10):
|
|
ev = dev.wait_event(["MESH-PEER-CONNECTED"], timeout=timeout)
|
|
if ev is None:
|
|
raise Exception("Test exception: Remote peer did not connect.")
|
|
|
|
|
|
def check_mesh_peer_disconnected(dev):
|
|
ev = dev.wait_event(["MESH-PEER-DISCONNECTED"])
|
|
if ev is None:
|
|
raise Exception("Test exception: Peer disconnect event not detected.")
|
|
|
|
def check_mesh_joined2(dev):
|
|
check_mesh_group_added(dev[0])
|
|
check_mesh_group_added(dev[1])
|
|
|
|
def check_mesh_connected2(dev, timeout0=10, connectivity=False):
|
|
check_mesh_peer_connected(dev[0], timeout=timeout0)
|
|
check_mesh_peer_connected(dev[1])
|
|
if connectivity:
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
def check_mesh_joined_connected(dev, connectivity=False, timeout0=10):
|
|
check_mesh_joined2(dev)
|
|
check_mesh_connected2(dev, timeout0=timeout0, connectivity=connectivity)
|
|
|
|
def test_wpas_add_set_remove_support(dev):
|
|
"""wpa_supplicant MESH add/set/remove network support"""
|
|
check_mesh_support(dev[0])
|
|
id = dev[0].add_network()
|
|
dev[0].set_network(id, "mode", "5")
|
|
dev[0].remove_network(id)
|
|
|
|
def add_open_mesh_network(dev, freq="2412", start=True, beacon_int=0,
|
|
basic_rates=None, chwidth=-1, disable_vht=False,
|
|
disable_ht40=False):
|
|
id = dev.add_network()
|
|
dev.set_network(id, "mode", "5")
|
|
dev.set_network_quoted(id, "ssid", "wpas-mesh-open")
|
|
dev.set_network(id, "key_mgmt", "NONE")
|
|
if freq:
|
|
dev.set_network(id, "frequency", freq)
|
|
if chwidth > -1:
|
|
dev.set_network(id, "max_oper_chwidth", str(chwidth))
|
|
if beacon_int:
|
|
dev.set_network(id, "beacon_int", str(beacon_int))
|
|
if basic_rates:
|
|
dev.set_network(id, "mesh_basic_rates", basic_rates)
|
|
if disable_vht:
|
|
dev.set_network(id, "disable_vht", "1")
|
|
if disable_ht40:
|
|
dev.set_network(id, "disable_ht40", "1")
|
|
if start:
|
|
dev.mesh_group_add(id)
|
|
return id
|
|
|
|
def test_wpas_mesh_group_added(dev):
|
|
"""wpa_supplicant MESH group add"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
|
|
# Check for MESH-GROUP-STARTED event
|
|
check_mesh_group_added(dev[0])
|
|
|
|
|
|
def test_wpas_mesh_group_remove(dev):
|
|
"""wpa_supplicant MESH group remove"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
# Check for MESH-GROUP-STARTED event
|
|
check_mesh_group_added(dev[0])
|
|
dev[0].mesh_group_remove()
|
|
# Check for MESH-GROUP-REMOVED event
|
|
check_mesh_group_removed(dev[0])
|
|
dev[0].mesh_group_remove()
|
|
|
|
def test_wpas_mesh_peer_connected(dev):
|
|
"""wpa_supplicant MESH peer connected"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0], beacon_int=160)
|
|
add_open_mesh_network(dev[1], beacon_int=160)
|
|
check_mesh_joined_connected(dev)
|
|
|
|
def test_wpas_mesh_peer_disconnected(dev):
|
|
"""wpa_supplicant MESH peer disconnected"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_joined_connected(dev)
|
|
|
|
# Remove group on dev 1
|
|
dev[1].mesh_group_remove()
|
|
# Device 0 should get a disconnection event
|
|
check_mesh_peer_disconnected(dev[0])
|
|
|
|
|
|
def test_wpas_mesh_mode_scan(dev):
|
|
"""wpa_supplicant MESH scan support"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
add_open_mesh_network(dev[1], beacon_int=175)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Check for Mesh scan
|
|
check_mesh_scan(dev[0], "use_id=1 freq=2412", beacon_int=175)
|
|
|
|
def test_wpas_mesh_open(dev, apdev):
|
|
"""wpa_supplicant open MESH network connectivity"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0], freq="2462", basic_rates="60 120 240")
|
|
add_open_mesh_network(dev[1], freq="2462", basic_rates="60 120 240")
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
state = dev[0].get_status_field("wpa_state")
|
|
if state != "COMPLETED":
|
|
raise Exception("Unexpected wpa_state on dev0: " + state)
|
|
state = dev[1].get_status_field("wpa_state")
|
|
if state != "COMPLETED":
|
|
raise Exception("Unexpected wpa_state on dev1: " + state)
|
|
|
|
mode = dev[0].get_status_field("mode")
|
|
if mode != "mesh":
|
|
raise Exception("Unexpected mode: " + mode)
|
|
|
|
def test_wpas_mesh_open_no_auto(dev, apdev):
|
|
"""wpa_supplicant open MESH network connectivity"""
|
|
check_mesh_support(dev[0])
|
|
id = add_open_mesh_network(dev[0], start=False)
|
|
dev[0].set_network(id, "dot11MeshMaxRetries", "16")
|
|
dev[0].set_network(id, "dot11MeshRetryTimeout", "255")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
id = add_open_mesh_network(dev[1], start=False)
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True, timeout0=30)
|
|
|
|
def test_mesh_open_no_auto2(dev, apdev):
|
|
"""Open mesh network connectivity, no_auto on both peers"""
|
|
check_mesh_support(dev[0])
|
|
id = add_open_mesh_network(dev[0], start=False)
|
|
dev[0].set_network(id, "no_auto_peer", "1")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
id = add_open_mesh_network(dev[1], start=False)
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message")
|
|
addr1 = dev[1].own_addr()
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed")
|
|
if "FAIL" not in dev[0].request("MESH_PEER_ADD ff:ff:ff:ff:ff:ff"):
|
|
raise Exception("MESH_PEER_ADD with unknown STA succeeded")
|
|
check_mesh_connected2(dev, timeout0=30)
|
|
if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD succeeded for connected STA")
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
def test_mesh_open_rssi_threshold(dev, apdev):
|
|
"""Open mesh network with RSSI threshold"""
|
|
check_mesh_support(dev[0])
|
|
|
|
_test_mesh_open_rssi_threshold(dev, apdev, -255, -255)
|
|
_test_mesh_open_rssi_threshold(dev, apdev, 0, 0)
|
|
_test_mesh_open_rssi_threshold(dev, apdev, 1, 0)
|
|
|
|
def _test_mesh_open_rssi_threshold(dev, apdev, value, expected):
|
|
id = add_open_mesh_network(dev[0], start=False)
|
|
dev[0].set_network(id, "mesh_rssi_threshold", str(value))
|
|
dev[0].mesh_group_add(id)
|
|
check_mesh_group_added(dev[0])
|
|
|
|
cmd = subprocess.Popen(["iw", "dev", dev[0].ifname, "get", "mesh_param",
|
|
"mesh_rssi_threshold"], stdout=subprocess.PIPE)
|
|
mesh_rssi_threshold = int(cmd.stdout.read().decode().split(" ")[0])
|
|
|
|
dev[0].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
|
|
if mesh_rssi_threshold != expected:
|
|
raise Exception("mesh_rssi_threshold should be " + str(expected) +
|
|
": " + str(mesh_rssi_threshold))
|
|
|
|
def add_mesh_secure_net(dev, psk=True, pmf=False, pairwise=None, group=None,
|
|
group_mgmt=None,
|
|
sae_password=False, sae_password_id=None, ocv=False):
|
|
id = dev.add_network()
|
|
dev.set_network(id, "mode", "5")
|
|
dev.set_network_quoted(id, "ssid", "wpas-mesh-sec")
|
|
dev.set_network(id, "key_mgmt", "SAE")
|
|
dev.set_network(id, "frequency", "2412")
|
|
if sae_password:
|
|
dev.set_network_quoted(id, "sae_password", "thisismypassphrase!")
|
|
if sae_password_id:
|
|
dev.set_network_quoted(id, "sae_password_id", sae_password_id)
|
|
if psk:
|
|
dev.set_network_quoted(id, "psk", "thisismypassphrase!")
|
|
if pmf:
|
|
dev.set_network(id, "ieee80211w", "2")
|
|
if pairwise:
|
|
dev.set_network(id, "pairwise", pairwise)
|
|
if group:
|
|
dev.set_network(id, "group", group)
|
|
if group_mgmt:
|
|
dev.set_network(id, "group_mgmt", group_mgmt)
|
|
if ocv:
|
|
try:
|
|
dev.set_network(id, "ocv", "1")
|
|
except Exception as e:
|
|
if "SET_NETWORK failed" in str(e):
|
|
raise HwsimSkip("OCV not supported")
|
|
raise
|
|
return id
|
|
|
|
def test_wpas_mesh_secure(dev, apdev):
|
|
"""wpa_supplicant secure MESH network connectivity"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
state = dev[0].get_status_field("wpa_state")
|
|
if state != "COMPLETED":
|
|
raise Exception("Unexpected wpa_state on dev0: " + state)
|
|
state = dev[1].get_status_field("wpa_state")
|
|
if state != "COMPLETED":
|
|
raise Exception("Unexpected wpa_state on dev1: " + state)
|
|
|
|
def test_wpas_mesh_secure_sae_password(dev, apdev):
|
|
"""wpa_supplicant secure mesh using sae_password"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], psk=False, sae_password=True)
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_pmf(dev, apdev):
|
|
"""Secure mesh network connectivity with PMF enabled"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True)
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True)
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_ocv(dev, apdev):
|
|
"""Secure mesh network connectivity with OCV enabled"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
|
|
dev[0].mesh_group_add(id)
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_ocv_compat(dev, apdev):
|
|
"""Secure mesh network where only one peer has OCV enabled"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
|
|
dev[0].mesh_group_add(id)
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True, ocv=False)
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def set_reg(dev, country):
|
|
subprocess.call(['iw', 'reg', 'set', country])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=" + country in ev:
|
|
break
|
|
|
|
def clear_reg_setting(dev):
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def test_mesh_secure_ocv_mix_legacy(dev, apdev):
|
|
"""Mesh network with a VHT STA and a legacy STA under OCV"""
|
|
try:
|
|
run_mesh_secure_ocv_mix_legacy(dev, apdev)
|
|
finally:
|
|
clear_reg_setting(dev)
|
|
|
|
def run_mesh_secure_ocv_mix_legacy(dev, apdev):
|
|
check_mesh_support(dev[0], secure=True)
|
|
set_reg(dev, 'AZ')
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
|
|
dev[0].set_network(id, "frequency", "5200")
|
|
dev[0].set_network(id, "max_oper_chwidth", "2")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
|
|
dev[1].set_network(id, "frequency", "5200")
|
|
dev[1].set_network(id, "disable_vht", "1")
|
|
dev[1].set_network(id, "disable_ht40", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_ocv_mix_ht(dev, apdev):
|
|
"""Mesh network with a VHT STA and a HT STA under OCV"""
|
|
try:
|
|
run_mesh_secure_ocv_mix_ht(dev, apdev)
|
|
finally:
|
|
clear_reg_setting(dev)
|
|
|
|
def run_mesh_secure_ocv_mix_ht(dev, apdev):
|
|
check_mesh_support(dev[0], secure=True)
|
|
set_reg(dev, 'AZ')
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True, ocv=True)
|
|
dev[0].set_network(id, "frequency", "5200")
|
|
dev[0].set_network(id, "max_oper_chwidth", "2")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True, ocv=True)
|
|
dev[1].set_network(id, "frequency", "5200")
|
|
dev[1].set_network(id, "disable_vht", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def run_mesh_secure(dev, cipher, pmf=False, group_mgmt=None):
|
|
if cipher not in dev[0].get_capability("pairwise"):
|
|
raise HwsimSkip("Cipher %s not supported" % cipher)
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pairwise=cipher, group=cipher, pmf=pmf,
|
|
group_mgmt=group_mgmt)
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pairwise=cipher, group=cipher, pmf=pmf,
|
|
group_mgmt=group_mgmt)
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_ccmp(dev, apdev):
|
|
"""Secure mesh with CCMP"""
|
|
run_mesh_secure(dev, "CCMP")
|
|
|
|
def test_mesh_secure_gcmp(dev, apdev):
|
|
"""Secure mesh with GCMP"""
|
|
run_mesh_secure(dev, "GCMP")
|
|
|
|
def test_mesh_secure_gcmp_256(dev, apdev):
|
|
"""Secure mesh with GCMP-256"""
|
|
run_mesh_secure(dev, "GCMP-256")
|
|
|
|
def test_mesh_secure_ccmp_256(dev, apdev):
|
|
"""Secure mesh with CCMP-256"""
|
|
run_mesh_secure(dev, "CCMP-256")
|
|
|
|
def test_mesh_secure_ccmp_cmac(dev, apdev):
|
|
"""Secure mesh with CCMP-128 and BIP-CMAC-128"""
|
|
run_mesh_secure(dev, "CCMP", pmf=True, group_mgmt="AES-128-CMAC")
|
|
|
|
def test_mesh_secure_gcmp_gmac(dev, apdev):
|
|
"""Secure mesh with GCMP-128 and BIP-GMAC-128"""
|
|
run_mesh_secure(dev, "GCMP", pmf=True, group_mgmt="BIP-GMAC-128")
|
|
|
|
def test_mesh_secure_ccmp_256_cmac_256(dev, apdev):
|
|
"""Secure mesh with CCMP-256 and BIP-CMAC-256"""
|
|
run_mesh_secure(dev, "CCMP-256", pmf=True, group_mgmt="BIP-CMAC-256")
|
|
|
|
def test_mesh_secure_gcmp_256_gmac_256(dev, apdev):
|
|
"""Secure mesh with GCMP-256 and BIP-GMAC-256"""
|
|
run_mesh_secure(dev, "GCMP-256", pmf=True, group_mgmt="BIP-GMAC-256")
|
|
|
|
def test_mesh_secure_invalid_pairwise_cipher(dev, apdev):
|
|
"""Secure mesh and invalid group cipher"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pairwise="TKIP", group="CCMP")
|
|
if dev[0].mesh_group_add(id) != None:
|
|
raise Exception("Unexpected group add success")
|
|
ev = dev[0].wait_event(["mesh: Invalid pairwise cipher"], timeout=1)
|
|
if ev is None:
|
|
raise Exception("Invalid pairwise cipher not reported")
|
|
|
|
def test_mesh_secure_invalid_group_cipher(dev, apdev):
|
|
"""Secure mesh and invalid group cipher"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pairwise="CCMP", group="TKIP")
|
|
if dev[0].mesh_group_add(id) != None:
|
|
raise Exception("Unexpected group add success")
|
|
ev = dev[0].wait_event(["mesh: Invalid group cipher"], timeout=1)
|
|
if ev is None:
|
|
raise Exception("Invalid group cipher not reported")
|
|
|
|
def test_wpas_mesh_secure_sae_group_mismatch(dev, apdev):
|
|
"""wpa_supplicant secure MESH and SAE group mismatch"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].p2p_interface_addr()
|
|
addr1 = dev[1].p2p_interface_addr()
|
|
addr2 = dev[2].p2p_interface_addr()
|
|
|
|
dev[0].request("SET sae_groups 19 25")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups 19")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
dev[2].request("SET sae_groups 26")
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[2].mesh_group_add(id)
|
|
|
|
check_mesh_group_added(dev[0])
|
|
check_mesh_group_added(dev[1])
|
|
check_mesh_group_added(dev[2])
|
|
|
|
ev = dev[0].wait_event(["MESH-PEER-CONNECTED"])
|
|
if ev is None:
|
|
raise Exception("Remote peer did not connect")
|
|
if addr1 not in ev:
|
|
raise Exception("Unexpected peer connected: " + ev)
|
|
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"])
|
|
if ev is None:
|
|
raise Exception("Remote peer did not connect")
|
|
if addr0 not in ev:
|
|
raise Exception("Unexpected peer connected: " + ev)
|
|
|
|
ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected peer connection at dev[2]: " + ev)
|
|
|
|
ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected peer connection: " + ev)
|
|
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected peer connection: " + ev)
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
dev[1].request("SET sae_groups ")
|
|
dev[2].request("SET sae_groups ")
|
|
|
|
def test_wpas_mesh_secure_sae_group_negotiation(dev, apdev):
|
|
"""wpa_supplicant secure MESH and SAE group negotiation"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
|
|
#dev[0].request("SET sae_groups 21 20 25 26")
|
|
dev[0].request("SET sae_groups 26")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups 19 26")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev)
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
dev[1].request("SET sae_groups ")
|
|
|
|
def test_wpas_mesh_secure_sae_missing_password(dev, apdev):
|
|
"""wpa_supplicant secure MESH and missing SAE password"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
id = add_mesh_secure_net(dev[0], psk=False)
|
|
dev[0].set_network(id, "psk", "8f20b381f9b84371d61b5080ad85cac3c61ab3ca9525be5b2d0f4da3d979187a")
|
|
dev[0].mesh_group_add(id)
|
|
ev = dev[0].wait_event(["MESH-GROUP-STARTED", "Could not join mesh"],
|
|
timeout=5)
|
|
if ev is None:
|
|
raise Exception("Timeout on mesh start event")
|
|
if "MESH-GROUP-STARTED" in ev:
|
|
raise Exception("Unexpected mesh group start")
|
|
ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected mesh group start")
|
|
|
|
def test_wpas_mesh_secure_no_auto(dev, apdev):
|
|
"""wpa_supplicant secure MESH network connectivity"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups 19")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups 19")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
dev[1].request("SET sae_groups ")
|
|
|
|
def test_wpas_mesh_secure_dropped_frame(dev, apdev):
|
|
"""Secure mesh network connectivity when the first plink Open is dropped"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Drop the first Action frame (plink Open) to test unexpected order of
|
|
# Confirm/Open messages.
|
|
count = 0
|
|
while True:
|
|
count += 1
|
|
if count > 10:
|
|
raise Exception("Did not see Action frames")
|
|
rx_msg = dev[0].mgmt_rx()
|
|
if rx_msg is None:
|
|
raise Exception("MGMT-RX timeout")
|
|
if rx_msg['subtype'] == 13:
|
|
logger.info("Drop the first Action frame")
|
|
break
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
|
|
rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 0")
|
|
|
|
check_mesh_connected2(dev, connectivity=True)
|
|
|
|
def test_mesh_secure_fail(dev, apdev):
|
|
"""Secure mesh network connectivity failure"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0], pmf=True)
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1], pmf=True)
|
|
|
|
with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add;mesh_mpm_auth_peer"):
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev)
|
|
|
|
def test_wpas_mesh_ctrl(dev):
|
|
"""wpa_supplicant ctrl_iface mesh command error cases"""
|
|
check_mesh_support(dev[0])
|
|
if "FAIL" not in dev[0].request("MESH_GROUP_ADD 123"):
|
|
raise Exception("Unexpected MESH_GROUP_ADD success")
|
|
id = dev[0].add_network()
|
|
if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
|
|
raise Exception("Unexpected MESH_GROUP_ADD success")
|
|
dev[0].set_network(id, "mode", "5")
|
|
dev[0].set_network(id, "key_mgmt", "WPA-PSK")
|
|
if "FAIL" not in dev[0].request("MESH_GROUP_ADD %d" % id):
|
|
raise Exception("Unexpected MESH_GROUP_ADD success")
|
|
|
|
if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE foo"):
|
|
raise Exception("Unexpected MESH_GROUP_REMOVE success")
|
|
|
|
def test_wpas_mesh_dynamic_interface(dev):
|
|
"""wpa_supplicant mesh with dynamic interface"""
|
|
check_mesh_support(dev[0])
|
|
mesh0 = None
|
|
mesh1 = None
|
|
try:
|
|
mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
|
|
if "FAIL" in mesh0:
|
|
raise Exception("MESH_INTERFACE_ADD failed")
|
|
mesh1 = dev[1].request("MESH_INTERFACE_ADD")
|
|
if "FAIL" in mesh1:
|
|
raise Exception("MESH_INTERFACE_ADD failed")
|
|
|
|
wpas0 = WpaSupplicant(ifname=mesh0)
|
|
wpas1 = WpaSupplicant(ifname=mesh1)
|
|
logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
|
|
logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
|
|
|
|
add_open_mesh_network(wpas0)
|
|
add_open_mesh_network(wpas1)
|
|
check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
|
|
|
|
# Must not allow MESH_GROUP_REMOVE on dynamic interface
|
|
if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh0):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh1):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
|
|
# Must not allow MESH_GROUP_REMOVE on another radio interface
|
|
if "FAIL" not in wpas0.request("MESH_GROUP_REMOVE " + mesh1):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
if "FAIL" not in wpas1.request("MESH_GROUP_REMOVE " + mesh0):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
|
|
wpas0.remove_ifname()
|
|
wpas1.remove_ifname()
|
|
|
|
if "OK" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
|
|
raise Exception("MESH_GROUP_REMOVE failed")
|
|
if "OK" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
|
|
raise Exception("MESH_GROUP_REMOVE failed")
|
|
|
|
if "FAIL" not in dev[0].request("MESH_GROUP_REMOVE " + mesh0):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
if "FAIL" not in dev[1].request("MESH_GROUP_REMOVE " + mesh1):
|
|
raise Exception("Invalid MESH_GROUP_REMOVE accepted")
|
|
|
|
logger.info("Make sure another dynamic group can be added")
|
|
mesh0 = dev[0].request("MESH_INTERFACE_ADD ifname=mesh0")
|
|
if "FAIL" in mesh0:
|
|
raise Exception("MESH_INTERFACE_ADD failed")
|
|
mesh1 = dev[1].request("MESH_INTERFACE_ADD")
|
|
if "FAIL" in mesh1:
|
|
raise Exception("MESH_INTERFACE_ADD failed")
|
|
|
|
wpas0 = WpaSupplicant(ifname=mesh0)
|
|
wpas1 = WpaSupplicant(ifname=mesh1)
|
|
logger.info(mesh0 + " address " + wpas0.get_status_field("address"))
|
|
logger.info(mesh1 + " address " + wpas1.get_status_field("address"))
|
|
|
|
add_open_mesh_network(wpas0)
|
|
add_open_mesh_network(wpas1)
|
|
check_mesh_joined_connected([wpas0, wpas1], connectivity=True)
|
|
finally:
|
|
if mesh0:
|
|
dev[0].request("MESH_GROUP_REMOVE " + mesh0)
|
|
if mesh1:
|
|
dev[1].request("MESH_GROUP_REMOVE " + mesh1)
|
|
|
|
def test_wpas_mesh_dynamic_interface_remove(dev):
|
|
"""wpa_supplicant mesh with dynamic interface and removal"""
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add("wlan5")
|
|
check_mesh_support(wpas)
|
|
mesh5 = wpas.request("MESH_INTERFACE_ADD ifname=mesh5")
|
|
if "FAIL" in mesh5:
|
|
raise Exception("MESH_INTERFACE_ADD failed")
|
|
|
|
wpas5 = WpaSupplicant(ifname=mesh5)
|
|
logger.info(mesh5 + " address " + wpas5.get_status_field("address"))
|
|
add_open_mesh_network(wpas5)
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_joined_connected([wpas5, dev[0]], connectivity=True)
|
|
|
|
# Remove the main interface while mesh interface is in use
|
|
wpas.interface_remove("wlan5")
|
|
|
|
def test_wpas_mesh_max_peering(dev, apdev, params):
|
|
"""Mesh max peering limit"""
|
|
check_mesh_support(dev[0])
|
|
try:
|
|
dev[0].request("SET max_peer_links 1")
|
|
|
|
# first, connect dev[0] and dev[1]
|
|
add_open_mesh_network(dev[0])
|
|
add_open_mesh_network(dev[1])
|
|
for i in range(2):
|
|
ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
|
|
if ev is None:
|
|
raise Exception("dev%d did not connect with any peer" % i)
|
|
|
|
# add dev[2] which will try to connect with both dev[0] and dev[1],
|
|
# but can complete connection only with dev[1]
|
|
add_open_mesh_network(dev[2])
|
|
for i in range(1, 3):
|
|
ev = dev[i].wait_event(["MESH-PEER-CONNECTED"])
|
|
if ev is None:
|
|
raise Exception("dev%d did not connect the second peer" % i)
|
|
|
|
ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=1)
|
|
if ev is not None:
|
|
raise Exception("dev0 connection beyond max peering limit")
|
|
|
|
ev = dev[2].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("dev2 reported unexpected peering: " + ev)
|
|
|
|
for i in range(3):
|
|
dev[i].mesh_group_remove()
|
|
check_mesh_group_removed(dev[i])
|
|
finally:
|
|
dev[0].request("SET max_peer_links 99")
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
addr2 = dev[2].own_addr()
|
|
|
|
capfile = os.path.join(params['logdir'], "hwsim0.pcapng")
|
|
filt = "wlan.fc.type_subtype == 8"
|
|
out = run_tshark(capfile, filt, ["wlan.sa", "wlan.mesh.config.cap"])
|
|
pkts = out.splitlines()
|
|
one = [0, 0, 0]
|
|
zero = [0, 0, 0]
|
|
all_cap_one = True
|
|
for pkt in pkts:
|
|
addr, cap = pkt.split('\t')
|
|
cap = int(cap, 16)
|
|
if cap != 1:
|
|
all_cap_one = False
|
|
if addr == addr0:
|
|
idx = 0
|
|
elif addr == addr1:
|
|
idx = 1
|
|
elif addr == addr2:
|
|
idx = 2
|
|
else:
|
|
continue
|
|
if cap & 0x01:
|
|
one[idx] += 1
|
|
else:
|
|
zero[idx] += 1
|
|
logger.info("one: " + str(one))
|
|
logger.info("zero: " + str(zero))
|
|
if all_cap_one:
|
|
# It looks like tshark parser was broken at some point for
|
|
# wlan.mesh.config.cap which is now (tshark 2.6.3) pointing to incorrect
|
|
# field (same as wlan.mesh.config.ps_protocol). This used to work with
|
|
# tshark 2.2.6.
|
|
#
|
|
# For now, assume the capability field ends up being the last octet of
|
|
# the frame.
|
|
one = [0, 0, 0]
|
|
zero = [0, 0, 0]
|
|
addrs = [addr0, addr1, addr2]
|
|
for idx in range(3):
|
|
addr = addrs[idx]
|
|
out = run_tshark_json(capfile, filt + " && wlan.sa == " + addr)
|
|
pkts = json.loads(out)
|
|
for pkt in pkts:
|
|
wlan = pkt["_source"]["layers"]["wlan"]
|
|
if "wlan.tagged.all" not in wlan:
|
|
continue
|
|
|
|
tagged = wlan["wlan.tagged.all"]
|
|
if "wlan.tag" not in tagged:
|
|
continue
|
|
|
|
wlan_tag = tagged["wlan.tag"]
|
|
if "wlan.mesh.config.ps_protocol_raw" not in wlan_tag:
|
|
continue
|
|
|
|
frame = pkt["_source"]["layers"]["frame_raw"][0]
|
|
cap_offset = wlan_tag["wlan.mesh.config.ps_protocol_raw"][1] + 6
|
|
cap = int(frame[(cap_offset * 2):(cap_offset * 2 + 2)], 16)
|
|
if cap & 0x01:
|
|
one[idx] += 1
|
|
else:
|
|
zero[idx] += 1
|
|
logger.info("one: " + str(one))
|
|
logger.info("zero: " + str(zero))
|
|
if zero[0] == 0:
|
|
raise Exception("Accepting Additional Mesh Peerings not cleared")
|
|
if one[0] == 0:
|
|
raise Exception("Accepting Additional Mesh Peerings was not set in the first Beacon frame")
|
|
if zero[1] > 0 or zero[2] > 0 or one[1] == 0 or one[2] == 0:
|
|
raise Exception("Unexpected value in Accepting Additional Mesh Peerings from other STAs")
|
|
|
|
def test_wpas_mesh_open_5ghz(dev, apdev):
|
|
"""wpa_supplicant open MESH network on 5 GHz band"""
|
|
try:
|
|
_test_wpas_mesh_open_5ghz(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_5ghz(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
add_open_mesh_network(dev[i], freq="5180")
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_open_5ghz_coex(dev, apdev):
|
|
"""Mesh network on 5 GHz band and 20/40 coex change"""
|
|
try:
|
|
_test_wpas_mesh_open_5ghz_coex(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
set_world_reg(apdev0=apdev[0], dev0=dev[0])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_5ghz_coex(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
|
|
# Start a 20 MHz BSS on channel 40 that would be the secondary channel of
|
|
# HT40+ mesh on channel 36.
|
|
params = {"ssid": "test-ht40",
|
|
"hw_mode": "a",
|
|
"channel": "40",
|
|
"country_code": "US"}
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
dev[i].scan_for_bss(bssid, freq=5200)
|
|
add_open_mesh_network(dev[i], freq="5180")
|
|
|
|
check_mesh_joined_connected(dev)
|
|
|
|
freq = dev[0].get_status_field("freq")
|
|
if freq != "5200":
|
|
raise Exception("Unexpected STATUS freq=" + freq)
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "FREQUENCY=5200" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL output: " + str(sig))
|
|
|
|
hapd.disable()
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_open_ht40(dev, apdev):
|
|
"""Mesh and HT40 support difference"""
|
|
try:
|
|
_test_wpas_mesh_open_ht40(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
dev[2].request("MESH_GROUP_REMOVE " + dev[2].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
dev[2].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_ht40(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
for i in range(3):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
add_open_mesh_network(dev[i], freq="5180", disable_vht=True,
|
|
disable_ht40=(i == 2))
|
|
|
|
check_mesh_group_added(dev[0])
|
|
check_mesh_group_added(dev[1])
|
|
check_mesh_group_added(dev[2])
|
|
|
|
check_mesh_peer_connected(dev[0])
|
|
check_mesh_peer_connected(dev[1])
|
|
check_mesh_peer_connected(dev[2])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
dev[2].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
check_mesh_group_removed(dev[2])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
dev[2].dump_monitor()
|
|
|
|
def test_wpas_mesh_open_vht40(dev, apdev):
|
|
"""wpa_supplicant open MESH network on VHT 40 MHz channel"""
|
|
try:
|
|
_test_wpas_mesh_open_vht40(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_vht40(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
add_open_mesh_network(dev[i], freq="5180", chwidth=0)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=40 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
if "CENTER_FRQ1=5190" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=40 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
|
|
if "CENTER_FRQ1=5190" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_open_vht20(dev, apdev):
|
|
"""wpa_supplicant open MESH network on VHT 20 MHz channel"""
|
|
try:
|
|
_test_wpas_mesh_open_vht20(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_vht20(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
add_open_mesh_network(dev[i], freq="5180", chwidth=0, disable_ht40=True)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=20 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
if "CENTER_FRQ1=5180" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=20 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
|
|
if "CENTER_FRQ1=5180" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_open_vht_80p80(dev, apdev):
|
|
"""wpa_supplicant open MESH network on VHT 80+80 MHz channel"""
|
|
try:
|
|
_test_wpas_mesh_open_vht_80p80(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_wpas_mesh_open_vht_80p80(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'US'])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=US" in ev:
|
|
break
|
|
add_open_mesh_network(dev[i], freq="5180", chwidth=3)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=80+80 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
if "CENTER_FRQ1=5210" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
|
|
if "CENTER_FRQ2=5775" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(4): " + str(sig))
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=80+80 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
|
|
if "CENTER_FRQ1=5210" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
|
|
if "CENTER_FRQ2=5775" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(4b): " + str(sig))
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_mesh_open_vht_160(dev, apdev):
|
|
"""Open mesh network on VHT 160 MHz channel"""
|
|
try:
|
|
_test_mesh_open_vht_160(dev, apdev)
|
|
finally:
|
|
dev[0].request("MESH_GROUP_REMOVE " + dev[0].ifname)
|
|
dev[1].request("MESH_GROUP_REMOVE " + dev[1].ifname)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
dev[1].flush_scan_cache()
|
|
|
|
def _test_mesh_open_vht_160(dev, apdev):
|
|
check_mesh_support(dev[0])
|
|
subprocess.call(['iw', 'reg', 'set', 'ZA'])
|
|
for i in range(2):
|
|
for j in range(5):
|
|
ev = dev[i].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No regdom change event")
|
|
if "alpha2=ZA" in ev:
|
|
break
|
|
|
|
cmd = subprocess.Popen(["iw", "reg", "get"], stdout=subprocess.PIPE)
|
|
reg = cmd.stdout.read()
|
|
found = False
|
|
for entry in reg.splitlines():
|
|
entry = entry.decode()
|
|
if "@ 160)" in entry and "DFS" not in entry:
|
|
found = True
|
|
break
|
|
if not found:
|
|
raise HwsimSkip("160 MHz channel without DFS not supported in regulatory information")
|
|
|
|
add_open_mesh_network(dev[i], freq="5520", chwidth=2)
|
|
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=160 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig))
|
|
if "FREQUENCY=5520" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3): " + str(sig))
|
|
|
|
sig = dev[1].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=160 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(2b): " + str(sig))
|
|
if "FREQUENCY=5520" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value(3b): " + str(sig))
|
|
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_password_mismatch(dev, apdev):
|
|
"""Mesh network and one device with mismatching password"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
dev[2].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[2].set_network_quoted(id, "psk", "wrong password")
|
|
dev[2].mesh_group_add(id)
|
|
|
|
# The two peers with matching password need to be able to connect
|
|
check_mesh_joined_connected(dev)
|
|
|
|
ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("dev2 did not report auth failure (1)")
|
|
ev = dev[2].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("dev2 did not report auth failure (2)")
|
|
dev[2].dump_monitor()
|
|
|
|
count = 0
|
|
ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
|
|
if ev is None:
|
|
logger.info("dev0 did not report auth failure")
|
|
else:
|
|
if "addr=" + dev[2].own_addr() not in ev:
|
|
raise Exception("Unexpected peer address in dev0 event: " + ev)
|
|
count += 1
|
|
dev[0].dump_monitor()
|
|
|
|
ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=5)
|
|
if ev is None:
|
|
logger.info("dev1 did not report auth failure")
|
|
else:
|
|
if "addr=" + dev[2].own_addr() not in ev:
|
|
raise Exception("Unexpected peer address in dev1 event: " + ev)
|
|
count += 1
|
|
dev[1].dump_monitor()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
for i in range(2):
|
|
try:
|
|
hwsim_utils.test_connectivity(dev[i], dev[2], timeout=1)
|
|
raise Exception("Data connectivity test passed unexpectedly")
|
|
except Exception as e:
|
|
if "data delivery failed" not in str(e):
|
|
raise
|
|
|
|
if count == 0:
|
|
raise Exception("Neither dev0 nor dev1 reported auth failure")
|
|
|
|
def test_wpas_mesh_password_mismatch_retry(dev, apdev, params):
|
|
"""Mesh password mismatch and retry [long]"""
|
|
if not params['long']:
|
|
raise HwsimSkip("Skip test case with long duration due to --long not specified")
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network_quoted(id, "psk", "wrong password")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
for i in range(4):
|
|
ev = dev[0].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("dev0 did not report auth failure (%d)" % i)
|
|
ev = dev[1].wait_event(["MESH-SAE-AUTH-FAILURE"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("dev1 did not report auth failure (%d)" % i)
|
|
|
|
ev = dev[0].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("dev0 did not report auth blocked")
|
|
ev = dev[1].wait_event(["MESH-SAE-AUTH-BLOCKED"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("dev1 did not report auth blocked")
|
|
|
|
def test_mesh_wpa_auth_init_oom(dev, apdev):
|
|
"""Secure mesh network setup failing due to wpa_init() OOM"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
with alloc_fail(dev[0], 1, "wpa_init"):
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
ev = dev[0].wait_event(["MESH-GROUP-STARTED"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected mesh group start during OOM")
|
|
|
|
def test_mesh_wpa_init_fail(dev, apdev):
|
|
"""Secure mesh network setup local failure"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
check_mesh_support(dev[1], secure=True)
|
|
check_mesh_support(dev[2], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
|
|
with fail_test(dev[0], 1, "os_get_random;=__mesh_rsn_auth_init"):
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
wait_fail_trigger(dev[0], "GET_FAIL")
|
|
|
|
dev[0].dump_monitor()
|
|
with alloc_fail(dev[0], 1, "mesh_rsn_auth_init"):
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
dev[0].dump_monitor()
|
|
with fail_test(dev[0], 1, "os_get_random;mesh_rsn_init_ampe_sta"):
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
wait_fail_trigger(dev[0], "GET_FAIL")
|
|
|
|
with fail_test(dev[0], 2, "=omac1_aes_vector;aes_siv_encrypt"):
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[0].mesh_group_add(id)
|
|
dev[2].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[2].mesh_group_add(id)
|
|
wait_fail_trigger(dev[0], "GET_FAIL")
|
|
|
|
def test_wpas_mesh_reconnect(dev, apdev):
|
|
"""Secure mesh network plink counting during reconnection"""
|
|
check_mesh_support(dev[0])
|
|
try:
|
|
_test_wpas_mesh_reconnect(dev)
|
|
finally:
|
|
dev[0].request("SET max_peer_links 99")
|
|
|
|
def _test_wpas_mesh_reconnect(dev):
|
|
dev[0].request("SET max_peer_links 2")
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].set_network(id, "beacon_int", "100")
|
|
dev[0].mesh_group_add(id)
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
check_mesh_joined_connected(dev)
|
|
|
|
for i in range(3):
|
|
# Drop incoming management frames to avoid handling link close
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[1])
|
|
dev[1].request("FLUSH")
|
|
dev[0].request("SET ext_mgmt_frame_handling 0")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
check_mesh_group_added(dev[1])
|
|
check_mesh_peer_connected(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
def test_wpas_mesh_gate_forwarding(dev, apdev, p):
|
|
"""Mesh forwards traffic to unknown sta to mesh gates"""
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
addr2 = dev[2].own_addr()
|
|
external_sta = '02:11:22:33:44:55'
|
|
|
|
# start 3 node connected mesh
|
|
check_mesh_support(dev[0])
|
|
for i in range(3):
|
|
add_open_mesh_network(dev[i])
|
|
check_mesh_group_added(dev[i])
|
|
for i in range(3):
|
|
check_mesh_peer_connected(dev[i])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
|
|
# dev0 and dev1 are mesh gates
|
|
subprocess.call(['iw', 'dev', dev[0].ifname, 'set', 'mesh_param',
|
|
'mesh_gate_announcements=1'])
|
|
subprocess.call(['iw', 'dev', dev[1].ifname, 'set', 'mesh_param',
|
|
'mesh_gate_announcements=1'])
|
|
|
|
# wait for gate announcement frames
|
|
time.sleep(1)
|
|
|
|
# data frame from dev2 -> external sta should be sent to both gates
|
|
dev[2].request("DATA_TEST_CONFIG 1")
|
|
dev[2].request("DATA_TEST_TX {} {} 0".format(external_sta, addr2))
|
|
dev[2].request("DATA_TEST_CONFIG 0")
|
|
|
|
capfile = os.path.join(p['logdir'], "hwsim0.pcapng")
|
|
filt = "wlan.sa==%s && wlan_mgt.fixed.mesh_addr5==%s" % (addr2,
|
|
external_sta)
|
|
time.sleep(4)
|
|
for i in range(5):
|
|
da = run_tshark(capfile, filt, ["wlan.da"])
|
|
if addr0 in da and addr1 in da:
|
|
logger.debug("Frames seen in tshark iteration %d" % i)
|
|
break
|
|
time.sleep(0.5)
|
|
|
|
if addr0 not in da and addr1 not in da:
|
|
filt = "wlan.sa==%s" % addr2
|
|
mesh = run_tshark(capfile, filt, ["wlan.mesh.control_field"])
|
|
if "1" not in mesh:
|
|
# Wireshark regression in mesh control field parsing:
|
|
# https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15521
|
|
raise HwsimSkip("tshark bug 15521")
|
|
if addr0 not in da:
|
|
raise Exception("Frame to gate %s not observed" % addr0)
|
|
if addr1 not in da:
|
|
raise Exception("Frame to gate %s not observed" % addr1)
|
|
|
|
def test_wpas_mesh_pmksa_caching(dev, apdev):
|
|
"""Secure mesh network and PMKSA caching"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev)
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
pmksa0 = dev[0].get_pmksa(addr1)
|
|
pmksa1 = dev[1].get_pmksa(addr0)
|
|
if pmksa0 is None or pmksa1 is None:
|
|
raise Exception("No PMKSA cache entry created")
|
|
if pmksa0['pmkid'] != pmksa1['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
pmksa0b = dev[0].get_pmksa(addr1)
|
|
if pmksa0b is None:
|
|
raise Exception("PMKSA cache entry not maintained")
|
|
time.sleep(0.1)
|
|
|
|
if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD unexpectedly succeeded in no_auto_peer=0 case")
|
|
|
|
def test_wpas_mesh_pmksa_caching2(dev, apdev):
|
|
"""Secure mesh network and PMKSA caching with no_auto_peer=1"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].set_network(id, "no_auto_peer", "1")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Check for peer connected
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed")
|
|
check_mesh_connected2(dev)
|
|
|
|
pmksa0 = dev[0].get_pmksa(addr1)
|
|
pmksa1 = dev[1].get_pmksa(addr0)
|
|
if pmksa0 is None or pmksa1 is None:
|
|
raise Exception("No PMKSA cache entry created")
|
|
if pmksa0['pmkid'] != pmksa1['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
pmksa0b = dev[0].get_pmksa(addr1)
|
|
if pmksa0b is None:
|
|
raise Exception("PMKSA cache entry not maintained")
|
|
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message (2)")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed (2)")
|
|
check_mesh_connected2(dev)
|
|
|
|
pmksa0c = dev[0].get_pmksa(addr1)
|
|
pmksa1c = dev[1].get_pmksa(addr0)
|
|
if pmksa0c is None or pmksa1c is None:
|
|
raise Exception("No PMKSA cache entry created (2)")
|
|
if pmksa0c['pmkid'] != pmksa1c['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
if pmksa0['pmkid'] != pmksa0c['pmkid']:
|
|
raise Exception("PMKID changed")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
def test_wpas_mesh_pmksa_caching_no_match(dev, apdev):
|
|
"""Secure mesh network and PMKSA caching with no PMKID match"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].set_network(id, "no_auto_peer", "1")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Check for peer connected
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed")
|
|
check_mesh_connected2(dev)
|
|
|
|
pmksa0 = dev[0].get_pmksa(addr1)
|
|
pmksa1 = dev[1].get_pmksa(addr0)
|
|
if pmksa0 is None or pmksa1 is None:
|
|
raise Exception("No PMKSA cache entry created")
|
|
if pmksa0['pmkid'] != pmksa1['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
|
|
if "OK" not in dev[1].request("PMKSA_FLUSH"):
|
|
raise Exception("Failed to flush PMKSA cache")
|
|
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message (2)")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed (2)")
|
|
check_mesh_connected2(dev)
|
|
|
|
pmksa0c = dev[0].get_pmksa(addr1)
|
|
pmksa1c = dev[1].get_pmksa(addr0)
|
|
if pmksa0c is None or pmksa1c is None:
|
|
raise Exception("No PMKSA cache entry created (2)")
|
|
if pmksa0c['pmkid'] != pmksa1c['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
if pmksa0['pmkid'] == pmksa0c['pmkid']:
|
|
raise Exception("PMKID did not change")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
def test_mesh_pmksa_caching_oom(dev, apdev):
|
|
"""Secure mesh network and PMKSA caching failing due to OOM"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].set_network(id, "no_auto_peer", "1")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Check for peer connected
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed")
|
|
check_mesh_connected2(dev)
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
pmksa0b = dev[0].get_pmksa(addr1)
|
|
if pmksa0b is None:
|
|
raise Exception("PMKSA cache entry not maintained")
|
|
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message (2)")
|
|
|
|
with alloc_fail(dev[0], 1, "wpa_auth_sta_init;mesh_rsn_auth_sae_sta"):
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed (2)")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
def test_wpas_mesh_pmksa_caching_ext(dev, apdev):
|
|
"""Secure mesh network and PMKSA caching and external storage"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined_connected(dev)
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
pmksa0 = dev[0].get_pmksa(addr1)
|
|
pmksa1 = dev[1].get_pmksa(addr0)
|
|
if pmksa0 is None or pmksa1 is None:
|
|
raise Exception("No PMKSA cache entry created")
|
|
if pmksa0['pmkid'] != pmksa1['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries")
|
|
|
|
res1 = dev[1].request("MESH_PMKSA_GET any")
|
|
res2 = dev[1].request("MESH_PMKSA_GET " + addr0)
|
|
logger.info("MESH_PMKSA_GET: " + res1)
|
|
if "UNKNOWN COMMAND" in res1:
|
|
raise HwsimSkip("MESH_PMKSA_GET not supported in the build")
|
|
logger.info("MESH_PMKSA_GET: " + res2)
|
|
if pmksa0['pmkid'] not in res1:
|
|
raise Exception("PMKID not included in PMKSA entry")
|
|
if res1 != res2:
|
|
raise Exception("Unexpected difference in MESH_PMKSA_GET output")
|
|
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[1])
|
|
check_mesh_peer_disconnected(dev[0])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
res = dev[1].get_pmksa(addr0)
|
|
if res is not None:
|
|
raise Exception("Unexpected PMKSA cache entry remaining")
|
|
|
|
time.sleep(0.1)
|
|
if "OK" not in dev[1].request("MESH_PMKSA_ADD " + res2):
|
|
raise Exception("MESH_PMKSA_ADD failed")
|
|
dev[1].mesh_group_add(id)
|
|
check_mesh_group_added(dev[1])
|
|
check_mesh_peer_connected(dev[1])
|
|
check_mesh_peer_connected(dev[0])
|
|
time.sleep(0.1)
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
pmksa1b = dev[1].get_pmksa(addr0)
|
|
if pmksa1b is None:
|
|
raise Exception("No PMKSA cache entry created after external storage restore")
|
|
if pmksa1['pmkid'] != pmksa1b['pmkid']:
|
|
raise Exception("PMKID mismatch in PMKSA cache entries after external storage restore")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
|
|
res = dev[1].request("MESH_PMKSA_GET foo")
|
|
if "FAIL" not in res:
|
|
raise Exception("Invalid MESH_PMKSA_GET accepted")
|
|
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[1])
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
dev[1].request("REMOVE_NETWORK all")
|
|
res = dev[1].request("MESH_PMKSA_GET any")
|
|
if "FAIL" not in res:
|
|
raise Exception("MESH_PMKSA_GET accepted when not in mesh")
|
|
|
|
tests = ["foo",
|
|
"02:02:02:02:02:02",
|
|
"02:02:02:02:02:02 q",
|
|
"02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b",
|
|
"02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b q",
|
|
"02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f",
|
|
"02:02:02:02:02:02 c3d51a7ccfca0c6d5287291a7169d79b 1bed4fa22ece7997ca1bdc8b829019fe63acac91cba3405522c24c91f7cfb49f q"]
|
|
for t in tests:
|
|
if "FAIL" not in dev[1].request("MESH_PMKSA_ADD " + t):
|
|
raise Exception("Invalid MESH_PMKSA_ADD accepted")
|
|
|
|
def test_mesh_oom(dev, apdev):
|
|
"""Mesh network setup failing due to OOM"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
|
|
with alloc_fail(dev[0], 1, "mesh_config_create"):
|
|
add_open_mesh_network(dev[0])
|
|
ev = dev[0].wait_event(["Failed to init mesh"])
|
|
if ev is None:
|
|
raise Exception("Init failure not reported")
|
|
|
|
with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
|
|
add_open_mesh_network(dev[0], basic_rates="60 120 240")
|
|
ev = dev[0].wait_event(["Failed to init mesh"])
|
|
if ev is None:
|
|
raise Exception("Init failure not reported")
|
|
|
|
for i in range(1, 66):
|
|
dev[0].dump_monitor()
|
|
logger.info("Test instance %d" % i)
|
|
try:
|
|
with alloc_fail(dev[0], i, "wpa_supplicant_mesh_init"):
|
|
add_open_mesh_network(dev[0])
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = dev[0].wait_event(["Failed to init mesh",
|
|
"MESH-GROUP-STARTED"])
|
|
if ev is None:
|
|
raise Exception("Init failure not reported")
|
|
except Exception as e:
|
|
if i < 15:
|
|
raise
|
|
logger.info("Ignore no-oom for i=%d" % i)
|
|
|
|
with alloc_fail(dev[0], 2, "=wpa_supplicant_mesh_init"):
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
ev = dev[0].wait_event(["Failed to init mesh"])
|
|
if ev is None:
|
|
raise Exception("Init failure not reported")
|
|
|
|
def test_mesh_add_interface_oom(dev):
|
|
"""wpa_supplicant mesh with dynamic interface addition failing"""
|
|
check_mesh_support(dev[0])
|
|
for i in range(1, 3):
|
|
mesh = None
|
|
try:
|
|
with alloc_fail(dev[0], i, "wpas_mesh_add_interface"):
|
|
mesh = dev[0].request("MESH_INTERFACE_ADD").strip()
|
|
finally:
|
|
if mesh and mesh != "FAIL":
|
|
dev[0].request("MESH_GROUP_REMOVE " + mesh)
|
|
|
|
def test_mesh_scan_oom(dev):
|
|
"""wpa_supplicant mesh scan results and OOM"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_group_added(dev[0])
|
|
for i in range(5):
|
|
dev[1].scan(freq="2412")
|
|
res = dev[1].request("SCAN_RESULTS")
|
|
if "[MESH]" in res:
|
|
break
|
|
for r in res.splitlines():
|
|
if "[MESH]" in r:
|
|
break
|
|
bssid = r.split('\t')[0]
|
|
|
|
bss = dev[1].get_bss(bssid)
|
|
if bss is None:
|
|
raise Exception("Could not get BSS entry for mesh")
|
|
|
|
for i in range(1, 3):
|
|
with alloc_fail(dev[1], i, "mesh_attr_text"):
|
|
bss = dev[1].get_bss(bssid)
|
|
if bss and "mesh_id" in bss:
|
|
raise Exception("Unexpected BSS result during OOM")
|
|
|
|
def test_mesh_drv_fail(dev, apdev):
|
|
"""Mesh network setup failing due to driver command failure"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
dev[0].request("SET sae_groups ")
|
|
|
|
with fail_test(dev[0], 1, "nl80211_join_mesh"):
|
|
add_open_mesh_network(dev[0])
|
|
ev = dev[0].wait_event(["mesh join error"])
|
|
if ev is None:
|
|
raise Exception("Join failure not reported")
|
|
|
|
dev[0].dump_monitor()
|
|
with fail_test(dev[0], 1, "wpa_driver_nl80211_if_add"):
|
|
if "FAIL" not in dev[0].request("MESH_INTERFACE_ADD").strip():
|
|
raise Exception("Interface added unexpectedly")
|
|
|
|
dev[0].dump_monitor()
|
|
with fail_test(dev[0], 1, "wpa_driver_nl80211_init_mesh"):
|
|
add_open_mesh_network(dev[0])
|
|
ev = dev[0].wait_event(["Could not join mesh"])
|
|
if ev is None:
|
|
raise Exception("Join failure not reported")
|
|
|
|
def test_mesh_sae_groups_invalid(dev, apdev):
|
|
"""Mesh with invalid SAE group configuration"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
|
|
dev[0].request("SET sae_groups 26")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups 123 122 121")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
ev = dev[0].wait_event(["new peer notification"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("dev[0] did not see peer")
|
|
ev = dev[1].wait_event(["new peer notification"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("dev[1] did not see peer")
|
|
|
|
ev = dev[0].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected connection(0)")
|
|
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev is not None:
|
|
raise Exception("Unexpected connection(1)")
|
|
|
|
# Additional coverage in mesh_rsn_sae_group() with non-zero
|
|
# wpa_s->mesh_rsn->sae_group_index.
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
dev[2].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[2].mesh_group_add(id)
|
|
check_mesh_group_added(dev[2])
|
|
check_mesh_peer_connected(dev[0])
|
|
check_mesh_peer_connected(dev[2])
|
|
ev = dev[1].wait_event(["new peer notification"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("dev[1] did not see peer(2)")
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
dev[2].dump_monitor()
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
dev[1].request("SET sae_groups ")
|
|
dev[2].request("SET sae_groups ")
|
|
|
|
def test_mesh_sae_failure(dev, apdev):
|
|
"""Mesh and local SAE failures"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
|
|
dev[0].request("SET sae_groups ")
|
|
dev[1].request("SET sae_groups ")
|
|
|
|
funcs = [(1, "=mesh_rsn_auth_sae_sta", True),
|
|
(1, "mesh_rsn_build_sae_commit;mesh_rsn_auth_sae_sta", False),
|
|
(1, "auth_sae_init_committed;mesh_rsn_auth_sae_sta", True),
|
|
(1, "=mesh_rsn_protect_frame", True),
|
|
(2, "=mesh_rsn_protect_frame", True),
|
|
(1, "aes_siv_encrypt;mesh_rsn_protect_frame", True),
|
|
(1, "=mesh_rsn_process_ampe", True),
|
|
(1, "aes_siv_decrypt;mesh_rsn_process_ampe", True)]
|
|
for count, func, success in funcs:
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
with alloc_fail(dev[1], count, func):
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
check_mesh_joined2(dev)
|
|
if success:
|
|
# retry is expected to work
|
|
check_mesh_connected2(dev)
|
|
else:
|
|
wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
|
|
def test_mesh_failure(dev, apdev):
|
|
"""Mesh and local failures"""
|
|
check_mesh_support(dev[0])
|
|
|
|
funcs = [(1, "ap_sta_add;mesh_mpm_add_peer", True),
|
|
(1, "wpabuf_alloc;mesh_mpm_send_plink_action", True)]
|
|
for count, func, success in funcs:
|
|
add_open_mesh_network(dev[0])
|
|
|
|
with alloc_fail(dev[1], count, func):
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_joined2(dev)
|
|
if success:
|
|
# retry is expected to work
|
|
check_mesh_connected2(dev)
|
|
else:
|
|
wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
|
|
funcs = [(1, "mesh_mpm_init_link", True)]
|
|
for count, func, success in funcs:
|
|
add_open_mesh_network(dev[0])
|
|
|
|
with fail_test(dev[1], count, func):
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_joined2(dev)
|
|
if success:
|
|
# retry is expected to work
|
|
check_mesh_connected2(dev)
|
|
else:
|
|
wait_fail_trigger(dev[1], "GET_FAIL")
|
|
dev[0].mesh_group_remove()
|
|
dev[1].mesh_group_remove()
|
|
check_mesh_group_removed(dev[0])
|
|
check_mesh_group_removed(dev[1])
|
|
|
|
def test_mesh_invalid_frequency(dev, apdev):
|
|
"""Mesh and invalid frequency configuration"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0], freq=None)
|
|
ev = dev[0].wait_event(["MESH-GROUP-STARTED",
|
|
"Could not join mesh"])
|
|
if ev is None or "Could not join mesh" not in ev:
|
|
raise Exception("Mesh join failure not reported")
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
add_open_mesh_network(dev[0], freq="2413")
|
|
ev = dev[0].wait_event(["MESH-GROUP-STARTED",
|
|
"Could not join mesh"])
|
|
if ev is None or "Could not join mesh" not in ev:
|
|
raise Exception("Mesh join failure not reported")
|
|
|
|
def test_mesh_default_beacon_int(dev, apdev):
|
|
"""Mesh and default beacon interval"""
|
|
check_mesh_support(dev[0])
|
|
try:
|
|
dev[0].request("SET beacon_int 200")
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_group_added(dev[0])
|
|
finally:
|
|
dev[0].request("SET beacon_int 0")
|
|
|
|
def test_mesh_scan_parse_error(dev, apdev):
|
|
"""Mesh scan element parse error"""
|
|
check_mesh_support(dev[0])
|
|
params = {"ssid": "open",
|
|
"beacon_int": "2000"}
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
bssid = apdev[0]['bssid']
|
|
hapd.set('vendor_elements', 'dd0201')
|
|
for i in range(10):
|
|
dev[0].scan(freq=2412)
|
|
if bssid in dev[0].request("SCAN_RESULTS"):
|
|
break
|
|
# This will fail in IE parsing due to the truncated IE in the Probe
|
|
# Response frame.
|
|
bss = dev[0].request("BSS " + bssid)
|
|
|
|
def test_mesh_missing_mic(dev, apdev):
|
|
"""Secure mesh network and missing MIC"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
count = 0
|
|
remove_mic = True
|
|
while True:
|
|
count += 1
|
|
if count > 15:
|
|
raise Exception("Did not see Action frames")
|
|
rx_msg = dev[0].mgmt_rx()
|
|
if rx_msg is None:
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev:
|
|
break
|
|
raise Exception("MGMT-RX timeout")
|
|
if rx_msg['subtype'] == 13:
|
|
payload = rx_msg['payload']
|
|
frame = rx_msg['frame']
|
|
(categ, action) = struct.unpack('BB', payload[0:2])
|
|
if categ == 15 and action == 1 and remove_mic:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x8c\x10')
|
|
if not pos:
|
|
raise Exception("Could not find MIC element")
|
|
logger.info("Found MIC at %d" % pos)
|
|
# Remove MIC
|
|
rx_msg['frame'] = frame[0:pos]
|
|
remove_mic = False
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
|
|
rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev:
|
|
break
|
|
|
|
def test_mesh_pmkid_mismatch(dev, apdev):
|
|
"""Secure mesh network and PMKID mismatch"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
dev[0].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].set_network(id, "no_auto_peer", "1")
|
|
dev[0].mesh_group_add(id)
|
|
|
|
dev[1].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].set_network(id, "no_auto_peer", "1")
|
|
dev[1].mesh_group_add(id)
|
|
|
|
check_mesh_joined2(dev)
|
|
|
|
# Check for peer connected
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed")
|
|
check_mesh_connected2(dev)
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
|
|
ev = dev[0].wait_event(["will not initiate new peer link"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Missing no-initiate message (2)")
|
|
dev[0].dump_monitor()
|
|
dev[1].dump_monitor()
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1):
|
|
raise Exception("MESH_PEER_ADD failed (2)")
|
|
|
|
count = 0
|
|
break_pmkid = True
|
|
while True:
|
|
count += 1
|
|
if count > 50:
|
|
raise Exception("Did not see Action frames")
|
|
rx_msg = dev[0].mgmt_rx()
|
|
if rx_msg is None:
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.1)
|
|
if ev:
|
|
break
|
|
raise Exception("MGMT-RX timeout")
|
|
if rx_msg['subtype'] == 13:
|
|
payload = rx_msg['payload']
|
|
frame = rx_msg['frame']
|
|
(categ, action) = struct.unpack('BB', payload[0:2])
|
|
if categ == 15 and action == 1 and break_pmkid:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x75\x14')
|
|
if not pos:
|
|
raise Exception("Could not find Mesh Peering Management element")
|
|
logger.info("Found Mesh Peering Management element at %d" % pos)
|
|
# Break PMKID to hit "Mesh RSN: Invalid PMKID (Chosen PMK did
|
|
# not match calculated PMKID)"
|
|
rx_msg['frame'] = frame[0:pos + 6] + b'\x00\x00\x00\x00' + frame[pos + 10:]
|
|
break_pmkid = False
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
|
|
rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev:
|
|
break
|
|
|
|
def test_mesh_peering_proto(dev, apdev):
|
|
"""Mesh peering management protocol testing"""
|
|
check_mesh_support(dev[0])
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
add_open_mesh_network(dev[0], beacon_int=160)
|
|
add_open_mesh_network(dev[1], beacon_int=160)
|
|
|
|
count = 0
|
|
test = 1
|
|
while True:
|
|
count += 1
|
|
if count > 50:
|
|
raise Exception("Did not see Action frames")
|
|
rx_msg = dev[0].mgmt_rx()
|
|
if rx_msg is None:
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev:
|
|
break
|
|
raise Exception("MGMT-RX timeout")
|
|
if rx_msg['subtype'] == 13:
|
|
payload = rx_msg['payload']
|
|
frame = rx_msg['frame']
|
|
(categ, action) = struct.unpack('BB', payload[0:2])
|
|
if categ == 15 and action == 1 and test == 1:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x75\x04')
|
|
if not pos:
|
|
raise Exception("Could not find Mesh Peering Management element")
|
|
logger.info("Found Mesh Peering Management element at %d" % pos)
|
|
# Remove the element to hit
|
|
# "MPM: No Mesh Peering Management element"
|
|
rx_msg['frame'] = frame[0:pos]
|
|
test += 1
|
|
elif categ == 15 and action == 1 and test == 2:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x72\x0e')
|
|
if not pos:
|
|
raise Exception("Could not find Mesh ID element")
|
|
logger.info("Found Mesh ID element at %d" % pos)
|
|
# Remove the element to hit
|
|
# "MPM: No Mesh ID or Mesh Configuration element"
|
|
rx_msg['frame'] = frame[0:pos] + frame[pos + 16:]
|
|
test += 1
|
|
elif categ == 15 and action == 1 and test == 3:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x72\x0e')
|
|
if not pos:
|
|
raise Exception("Could not find Mesh ID element")
|
|
logger.info("Found Mesh ID element at %d" % pos)
|
|
# Replace Mesh ID to hit "MPM: Mesh ID or Mesh Configuration
|
|
# element do not match local MBSS"
|
|
rx_msg['frame'] = frame[0:pos] + b'\x72\x0etest-test-test' + frame[pos + 16:]
|
|
test += 1
|
|
elif categ == 15 and action == 1 and test == 4:
|
|
# Mesh Peering Open
|
|
# Remove IEs to hit
|
|
# "MPM: Ignore too short action frame 1 ie_len 0"
|
|
rx_msg['frame'] = frame[0:26]
|
|
test += 1
|
|
elif categ == 15 and action == 1 and test == 5:
|
|
# Mesh Peering Open
|
|
# Truncate IEs to hit
|
|
# "MPM: Failed to parse PLINK IEs"
|
|
rx_msg['frame'] = frame[0:30]
|
|
test += 1
|
|
elif categ == 15 and action == 1 and test == 6:
|
|
# Mesh Peering Open
|
|
pos = frame.find(b'\x75\x04')
|
|
if not pos:
|
|
raise Exception("Could not find Mesh Peering Management element")
|
|
logger.info("Found Mesh Peering Management element at %d" % pos)
|
|
# Truncate the element to hit
|
|
# "MPM: Invalid peer mgmt ie" and
|
|
# "MPM: Mesh parsing rejected frame"
|
|
rx_msg['frame'] = frame[0:pos] + b'\x75\x00\x00\x00' + frame[pos + 6:]
|
|
test += 1
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
|
|
rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = dev[1].wait_event(["MESH-PEER-CONNECTED"], timeout=0.01)
|
|
if ev:
|
|
break
|
|
|
|
if test != 7:
|
|
raise Exception("Not all test frames completed")
|
|
|
|
def test_mesh_mpm_init_proto(dev, apdev):
|
|
"""Mesh peering management protocol testing for peer addition"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_group_added(dev[0])
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
addr = "020000000100"
|
|
hdr = "d000ac00020000000000" + addr + addr + "1000"
|
|
fixed = "0f010000"
|
|
supp_rates = "010802040b168c129824"
|
|
ext_supp_rates = "3204b048606c"
|
|
mesh_id = "720e777061732d6d6573682d6f70656e"
|
|
mesh_conf = "710701010001000009"
|
|
mpm = "75040000079d"
|
|
ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
|
|
ht_oper = "3d160b000000000000000000000000000000000000000000"
|
|
|
|
dev[0].request("NOTE no supported rates")
|
|
frame = hdr + fixed + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE Invalid supported rates element length 33+0")
|
|
long_supp_rates = "012100112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00"
|
|
frame = hdr + fixed + long_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE Too short mesh config")
|
|
short_mesh_conf = "710401010001"
|
|
frame = hdr + fixed + supp_rates + mesh_id + short_mesh_conf + mpm + ht_capab + ht_oper
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE Add STA failure")
|
|
frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
with fail_test(dev[0], 1, "wpa_driver_nl80211_sta_add"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE Send Action failure")
|
|
with fail_test(dev[0], 1, "driver_nl80211_send_action"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE Set STA failure")
|
|
addr = "020000000101"
|
|
hdr = "d000ac00020000000000" + addr + addr + "1000"
|
|
frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
with fail_test(dev[0], 2, "wpa_driver_nl80211_sta_add"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE ap_sta_add OOM")
|
|
addr = "020000000102"
|
|
hdr = "d000ac00020000000000" + addr + addr + "1000"
|
|
frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
with alloc_fail(dev[0], 1, "ap_sta_add"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
dev[0].request("NOTE hostapd_get_aid() failure")
|
|
addr = "020000000103"
|
|
hdr = "d000ac00020000000000" + addr + addr + "1000"
|
|
frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
with fail_test(dev[0], 1, "hostapd_get_aid"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:00"):
|
|
raise Exception("Failed to remove peer")
|
|
if "FAIL" not in dev[0].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
|
|
raise Exception("Unexpected MESH_PEER_REMOVE success")
|
|
if "FAIL" not in dev[1].request("MESH_PEER_REMOVE 02:00:00:00:01:02"):
|
|
raise Exception("Unexpected MESH_PEER_REMOVE success(2)")
|
|
if "FAIL" not in dev[1].request("MESH_PEER_ADD 02:00:00:00:01:02"):
|
|
raise Exception("Unexpected MESH_PEER_ADD success")
|
|
|
|
def test_mesh_holding(dev, apdev):
|
|
"""Mesh MPM FSM and HOLDING state event OPN_ACPT"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_joined_connected(dev)
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
if "OK" not in dev[0].request("MESH_PEER_REMOVE " + addr1):
|
|
raise Exception("Failed to remove peer")
|
|
|
|
rx_msg = dev[0].mgmt_rx()
|
|
if rx_msg is None:
|
|
raise Exception("MGMT-RX timeout")
|
|
if rx_msg['subtype'] != 13:
|
|
raise Exception("Unexpected management frame")
|
|
payload = rx_msg['payload']
|
|
(categ, action) = struct.unpack('BB', payload[0:2])
|
|
if categ != 0x0f or action != 0x03:
|
|
raise Exception("Did not see Mesh Peering Close")
|
|
|
|
peer_lid = binascii.hexlify(payload[-6:-4]).decode()
|
|
my_lid = binascii.hexlify(payload[-4:-2]).decode()
|
|
|
|
# Drop Mesh Peering Close and instead, process an unexpected Mesh Peering
|
|
# Open to trigger transmission of another Mesh Peering Close in the HOLDING
|
|
# state based on an OPN_ACPT event.
|
|
|
|
dst = addr0.replace(':', '')
|
|
src = addr1.replace(':', '')
|
|
hdr = "d000ac00" + dst + src + src + "1000"
|
|
fixed = "0f010000"
|
|
supp_rates = "010802040b168c129824"
|
|
ext_supp_rates = "3204b048606c"
|
|
mesh_id = "720e777061732d6d6573682d6f70656e"
|
|
mesh_conf = "710701010001000009"
|
|
mpm = "7504" + my_lid + peer_lid
|
|
ht_capab = "2d1a7c001bffff000000000000000000000100000000000000000000"
|
|
ht_oper = "3d160b000000000000000000000000000000000000000000"
|
|
|
|
frame = hdr + fixed + supp_rates + ext_supp_rates + mesh_id + mesh_conf + mpm + ht_capab + ht_oper
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
time.sleep(0.1)
|
|
|
|
def test_mesh_cnf_rcvd_event_cls_acpt(dev, apdev):
|
|
"""Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_group_added(dev[0])
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_group_added(dev[1])
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
|
|
rx_msg = dev[0].mgmt_rx()
|
|
# Drop Mesh Peering Open
|
|
|
|
rx_msg = dev[0].mgmt_rx()
|
|
# Allow Mesh Peering Confirm to go through
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(
|
|
rx_msg['freq'], rx_msg['datarate'], rx_msg['ssi_signal'], binascii.hexlify(rx_msg['frame']).decode())):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
payload = rx_msg['payload']
|
|
peer_lid = binascii.hexlify(payload[51:53]).decode()
|
|
my_lid = binascii.hexlify(payload[53:55]).decode()
|
|
|
|
dst = addr0.replace(':', '')
|
|
src = addr1.replace(':', '')
|
|
hdr = "d000ac00" + dst + src + src + "1000"
|
|
fixed = "0f03"
|
|
mesh_id = "720e777061732d6d6573682d6f70656e"
|
|
mpm = "75080000" + peer_lid + my_lid + "3700"
|
|
frame = hdr + fixed + mesh_id + mpm
|
|
|
|
# Inject Mesh Peering Close to hit "state CNF_RCVD event CLS_ACPT" to
|
|
# HOLDING transition.
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
def test_mesh_opn_snt_event_cls_acpt(dev, apdev):
|
|
"""Mesh peering management protocol testing - CLS_ACPT event in OPN_SNT"""
|
|
check_mesh_support(dev[0])
|
|
add_open_mesh_network(dev[0])
|
|
check_mesh_group_added(dev[0])
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
add_open_mesh_network(dev[1])
|
|
check_mesh_group_added(dev[1])
|
|
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
|
|
rx_msg = dev[0].mgmt_rx()
|
|
# Drop Mesh Peering Open
|
|
|
|
rx_msg = dev[0].mgmt_rx()
|
|
# Drop Mesh Peering Confirm
|
|
|
|
payload = rx_msg['payload']
|
|
peer_lid = "0000"
|
|
my_lid = binascii.hexlify(payload[53:55]).decode()
|
|
|
|
dst = addr0.replace(':', '')
|
|
src = addr1.replace(':', '')
|
|
hdr = "d000ac00" + dst + src + src + "1000"
|
|
fixed = "0f03"
|
|
mesh_id = "720e777061732d6d6573682d6f70656e"
|
|
mpm = "75080000" + peer_lid + my_lid + "3700"
|
|
frame = hdr + fixed + mesh_id + mpm
|
|
|
|
# Inject Mesh Peering Close to hit "state OPN_SNTevent CLS_ACPT" to
|
|
# HOLDING transition.
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + frame):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
def test_mesh_select_network(dev):
|
|
"""Mesh network and SELECT_NETWORK"""
|
|
check_mesh_support(dev[0])
|
|
id0 = add_open_mesh_network(dev[0], start=False)
|
|
id1 = add_open_mesh_network(dev[1], start=False)
|
|
dev[0].select_network(id0)
|
|
dev[1].select_network(id1)
|
|
check_mesh_joined_connected(dev, connectivity=True)
|
|
|
|
def test_mesh_forwarding(dev):
|
|
"""Mesh with two stations that can't reach each other directly"""
|
|
try:
|
|
set_group_map(dev[0], 1)
|
|
set_group_map(dev[1], 3)
|
|
set_group_map(dev[2], 2)
|
|
check_mesh_support(dev[0])
|
|
for i in range(3):
|
|
add_open_mesh_network(dev[i])
|
|
check_mesh_group_added(dev[i])
|
|
for i in range(3):
|
|
check_mesh_peer_connected(dev[i])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
finally:
|
|
# reset groups
|
|
set_group_map(dev[0], 1)
|
|
set_group_map(dev[1], 1)
|
|
set_group_map(dev[2], 1)
|
|
|
|
def test_mesh_forwarding_secure(dev):
|
|
"""Mesh with two stations that can't reach each other directly (RSN)"""
|
|
check_mesh_support(dev[0], secure=True)
|
|
try:
|
|
set_group_map(dev[0], 1)
|
|
set_group_map(dev[1], 3)
|
|
set_group_map(dev[2], 2)
|
|
for i in range(3):
|
|
dev[i].request("SET sae_groups ")
|
|
id = add_mesh_secure_net(dev[i])
|
|
dev[i].mesh_group_add(id)
|
|
check_mesh_group_added(dev[i])
|
|
for i in range(3):
|
|
check_mesh_peer_connected(dev[i])
|
|
|
|
hwsim_utils.test_connectivity(dev[0], dev[1])
|
|
hwsim_utils.test_connectivity(dev[1], dev[2])
|
|
hwsim_utils.test_connectivity(dev[0], dev[2])
|
|
finally:
|
|
# reset groups
|
|
set_group_map(dev[0], 1)
|
|
set_group_map(dev[1], 1)
|
|
set_group_map(dev[2], 1)
|
|
|
|
def test_mesh_sae_anti_clogging(dev, apdev):
|
|
"""Mesh using SAE and anti-clogging"""
|
|
try:
|
|
run_mesh_sae_anti_clogging(dev, apdev)
|
|
finally:
|
|
stop_monitor(apdev[1]["ifname"])
|
|
|
|
def run_mesh_sae_anti_clogging(dev, apdev):
|
|
check_mesh_support(dev[0], secure=True)
|
|
check_mesh_support(dev[1], secure=True)
|
|
check_mesh_support(dev[2], secure=True)
|
|
|
|
sock = start_monitor(apdev[1]["ifname"])
|
|
radiotap = radiotap_build()
|
|
|
|
dev[0].request("SET sae_groups 21")
|
|
id = add_mesh_secure_net(dev[0])
|
|
dev[0].mesh_group_add(id)
|
|
check_mesh_group_added(dev[0])
|
|
|
|
# This flood of SAE authentication frames is from not yet known mesh STAs,
|
|
# so the messages get dropped.
|
|
addr0 = binascii.unhexlify(dev[0].own_addr().replace(':', ''))
|
|
for i in range(16):
|
|
addr = binascii.unhexlify("f2%010x" % i)
|
|
frame = build_sae_commit(addr0, addr)
|
|
sock.send(radiotap + frame)
|
|
|
|
dev[1].request("SET sae_groups 21")
|
|
id = add_mesh_secure_net(dev[1])
|
|
dev[1].mesh_group_add(id)
|
|
check_mesh_group_added(dev[1])
|
|
check_mesh_connected2(dev)
|
|
|
|
# Inject Beacon frames to make the sources of the second flood known to the
|
|
# target.
|
|
bcn1 = binascii.unhexlify("80000000" + "ffffffffffff")
|
|
bcn2 = binascii.unhexlify("0000dd20c44015840500e80310000000010882848b968c1298240301010504000200003204b048606c30140100000fac040100000fac040100000fac0800002d1afe131bffff0000000000000000000001000000000000000000003d16010000000000ffff0000000000000000000000000000720d777061732d6d6573682d736563710701010001010009")
|
|
for i in range(16):
|
|
addr = binascii.unhexlify("f4%010x" % i)
|
|
frame = bcn1 + addr + addr + bcn2
|
|
sock.send(radiotap + frame)
|
|
|
|
# This flood of SAE authentication frames is from known mesh STAs, so the
|
|
# target will need to process these.
|
|
for i in range(16):
|
|
addr = binascii.unhexlify("f4%010x" % i)
|
|
frame = build_sae_commit(addr0, addr)
|
|
sock.send(radiotap + frame)
|
|
|
|
dev[2].request("SET sae_groups 21")
|
|
id = add_mesh_secure_net(dev[2])
|
|
dev[2].mesh_group_add(id)
|
|
check_mesh_group_added(dev[2])
|
|
check_mesh_peer_connected(dev[2])
|
|
check_mesh_peer_connected(dev[0])
|
|
|
|
def test_mesh_link_probe(dev, apdev, params):
|
|
"""Mesh link probing"""
|
|
addr0 = dev[0].own_addr()
|
|
addr1 = dev[1].own_addr()
|
|
addr2 = dev[2].own_addr()
|
|
|
|
check_mesh_support(dev[0])
|
|
for i in range(3):
|
|
add_open_mesh_network(dev[i])
|
|
check_mesh_group_added(dev[i])
|
|
for i in range(3):
|
|
check_mesh_peer_connected(dev[i])
|
|
|
|
res = dev[0].request("MESH_LINK_PROBE " + addr1)
|
|
if "FAIL" in res:
|
|
raise HwsimSkip("MESH_LINK_PROBE kernel side support missing")
|
|
dev[0].request("MESH_LINK_PROBE " + addr2 + " payload=aabbccdd")
|
|
dev[1].request("MESH_LINK_PROBE " + addr0 + " payload=bbccddee")
|
|
dev[1].request("MESH_LINK_PROBE " + addr2 + " payload=ccddeeff")
|
|
dev[2].request("MESH_LINK_PROBE " + addr0 + " payload=aaaa")
|
|
dev[2].request("MESH_LINK_PROBE " + addr1 + " payload=000102030405060708090a0b0c0d0e0f")
|
|
|
|
capfile = os.path.join(params['logdir'], "hwsim0.pcapng")
|
|
filt = "wlan.fc == 0x8803"
|
|
for i in range(10):
|
|
out = run_tshark(capfile, filt, ["wlan.sa", "wlan.da"])
|
|
if len(out.splitlines()) >= 6:
|
|
break
|
|
time.sleep(0.5)
|
|
for i in [addr0, addr1, addr2]:
|
|
for j in [addr0, addr1, addr2]:
|
|
if i == j:
|
|
continue
|
|
if i + "\t" + j not in out:
|
|
raise Exception("Did not see probe %s --> %s" % (i, j))
|